Web development and programming
191828 questions • Page 249 / 3837
1. Use the “man” command to view documentation of the “more” command. Find out w
1. Use the “man” command to view documentation of the “more” command. Find out what the option “-d” does. Use this option with the “more” command to view the “rgb.txt” file. 2. Us…
1. Use this redirection symbol to write to standard error: A) 101 > (\'101\' for
1. Use this redirection symbol to write to standard error: A) 101 > ('101' for binary errors since all errors in Linux are binary) B) e > C) output > error D) 2> E) er…
1. Use your Web browser to go to support.dlink.com/emulators/dap1522/ 2. Click D
1. Use your Web browser to go to support.dlink.com/emulators/dap1522/ 2. Click DAP-1522 AP Mode. 3. The emulated login screen will appear. Click Login without entering a password.…
1. Use your Web browser to go to support.dlink.com/emulators/dap1522/ 2. Click D
1. Use your Web browser to go to support.dlink.com/emulators/dap1522/ 2. Click DAP-1522 AP Mode. 3. The emulated login screen will appear. Click Login without entering a password.…
1. Use your Web browser to go to support.dlink.com/emulators/dap1522/ 2. Click D
1. Use your Web browser to go to support.dlink.com/emulators/dap1522/ 2. Click DAP-1522 AP Mode. 3. The emulated login screen will appear. Click Login without entering a password.…
1. Using Arrays: Driver\'s License Exam Grader System The local Drivers License
1. Using Arrays: Driver's License Exam Grader System The local Drivers License Office has asked you to write a program that grades the written portion of the drivers license exam.…
1. Using Binary Frequency-Shift Keying (BFSK) how many bits per symbol can be se
1. Using Binary Frequency-Shift Keying (BFSK) how many bits per symbol can be sent? (1 point) a) 2 b)3 d) Depends on bandwidth. 2. How many frequencies are needed if we want to se…
1. Using C++, write and test a class called CreditReport. This class represents
1. Using C++, write and test a class called CreditReport. This class represents a real-world credit report. In this problem we will model the credit report in the following way. I…
1. Using C/C++, declare three integer variables (e.g. A, B, C) in main0 assign t
1. Using C/C++, declare three integer variables (e.g. A, B, C) in main0 assign thell and values from standard input (cin). Then, call a function swap10 to swap their values throug…
1. Using C/C++, define two integer arrays; each has 30 integers within [0, 999].
1. Using C/C++, define two integer arrays; each has 30 integers within [0, 999]. Use loop and rand() to assign random integers to the arrays; then implement Selection and Insertio…
1. Using Dr. Racket to compute the following expressions. [5 points] (1) 3 + 5 -
1. Using Dr. Racket to compute the following expressions. [5 points] (1) 3 + 5 - 7 (2) 2 * ( 8 + 5 + 4 ) - 25 (3) 10 - ( ( 3 * 5 ) + ( 2 +…
1. Using Euclid’s formula to find the GCD of 342 and -7542. Please show work Euc
1. Using Euclid’s formula to find the GCD of 342 and -7542. Please show work Euclid’s formula: gcd(a,b) = gcd(b, a mod b) 2. What is the value of c in the following equation: c = …
1. Using Excel, determine the length of finite sequence for the following ratios
1. Using Excel, determine the length of finite sequence for the following ratios: a. 22/7 b. 1/34 c. 1/334 d. 17001001986/999999999 Note 1: The “use” of Excel should be general… t…
1. Using Java Write a class Name that stores a person’s first, middle, and last
1. Using Java Write a class Name that stores a person’s first, middle, and last names and provides the following methods: public Name(String first, String middle, String last)—con…
1. Using Java program: Write a simple program to sum data points. Create a Scann
1. Using Java program: Write a simple program to sum data points. Create a Scanner object console to read data from the console. First read the number of data points to be summed.…
1. Using SID or Student ID: 104085031, solve the following. For this tutorial, p
1. Using SID or Student ID: 104085031, solve the following. For this tutorial, please download the MARS (MIPS Assembler and Runtime Simulator) at nvo It is a Java application so i…
1. Using SPIM, write a program that determines if an ASCII stringentered into th
1. Using SPIM, write a program that determines if an ASCII stringentered into the console is a palindrome. A palindrome is a string that is the sameforwards and backwards. For exa…
1. Using a ROT-5 cipher encrypt the following plaintext. Prove your answer by sh
1. Using a ROT-5 cipher encrypt the following plaintext. Prove your answer by showing the steps for both the encryption and decryption Meet at the baseball field at three oclock U…
1. Using a commonly used sound recorder, utter your first and last names and rec
1. Using a commonly used sound recorder, utter your first and last names and record your speech. You can use a free version of a sound analysis program such as Wavesurfer or just …
1. Using a loop of your choice, read information from the console about employee
1. Using a loop of your choice, read information from the console about employees in a company. Each employee has an ID (integer) and number of hours worked that week (double) and…
1. Using a loop, determine the size of the string by counting characters until y
1. Using a loop, determine the size of the string by counting characters until you encounter the null terminating character at the end of the string. 2. Establish a pointer that p…
1. Using a situation from real life, where you would use a for loop. Write pseud
1. Using a situation from real life, where you would use a for loop. Write pseudocode to describe the situation and be careful to indent your code. 2. Explain if each of the follo…
1. Using a switch statement If the employee type is P or p, then display \"Part-
1. Using a switch statement If the employee type is P or p, then display "Part- time employee" on the screen If the employee type is F or f, then display "Full-time employee" on t…
1. Using an array For each implementation define the following functions 1. func
1. Using an array For each implementation define the following functions 1. function push that pushes a value onto the stack 2. function pop that pops a value off the stack 3. fun…
1. Using an inheritance hierarchy, design a Java program to model 3-dimensional
1. Using an inheritance hierarchy, design a Java program to model 3-dimensional shapes (square pyramid, sphere, rectangular prism, cube, cylinder, circular cone). Have a top level…
1. Using are hypothetical machines (3-address, 2-address, 1-address and 0-addres
1. Using are hypothetical machines (3-address, 2-address, 1-address and 0-address) and the following commands: load= puts value in address add = + mult = * sub = - lda=load in acc…
1. Using branch and jump instructions implement the following code blocks in MIP
1. Using branch and jump instructions implement the following code blocks in MIPS assembly language: Assuming array A is stored in memory starting at the memory address that is th…
1. Using classes,design an online address book to keep track of the names,addres
1. Using classes,design an online address book to keep track of the names,addresses,phone number and birthdays of family memebers,close friends and certain bussiness associates.yo…
1. Using current and competitive computer monitor manufacturers (e.g. Samsung, D
1. Using current and competitive computer monitor manufacturers (e.g. Samsung, Dell, ASUS, …) research monitors of at least 28” in screen size (if possible), and gather the follow…
1. Using e-notation, provide asymptotically tight bounds in terms of n for the s
1. Using e-notation, provide asymptotically tight bounds in terms of n for the solution to each of the following recurrences. Assume each recurrence has a non-trivial base case of…
1. Using estimates of rainfall, evaporation, and water consumption, the town eng
1. Using estimates of rainfall, evaporation, and water consumption, the town engineer developed the following model of the water volume in the reservoir as a function of time Wher…
1. Using example code from Snmp.zip 2. Read through the reference and make sure
1. Using example code from Snmp.zip 2. Read through the reference and make sure you can compile the source code and make it works as defind. 3. Submit your output of: a:SNMPUTIL g…
1. Using figure illustrate how address mapping takes place in a virtual memory u
1. Using figure illustrate how address mapping takes place in a virtual memory using page table based the information given below: a. 32-bit virtual address b. 26-bit ph…
1. Using figure illustrate how address mapping takes place in a virtual memory u
1. Using figure illustrate how address mapping takes place in a virtual memory using page table based the information given below: a. 32-bit virtual address b. 26-bit ph…
1. Using object-oriented programming approach, write a Java program that compute
1. Using object-oriented programming approach, write a Java program that computes and outputs the area of the shaded region in the diagram. - Define a class Circle (Ci…
1. Using only sequential control (no conditional or iterative control), write a
1. Using only sequential control (no conditional or iterative control), write a program that accepts an amount of money as a double (e.g., 24.61), and prints out how many dollar (…
1. Using our logical constructions for \"exactly one\" and exactly two\" express
1. Using our logical constructions for "exactly one" and exactly two" expressions, convert these English sentences to logic such that their (a) Exactly one man was first on the Mo…
1. Using pseudocode or C++ code, and the following ADT stack operations, write a
1. Using pseudocode or C++ code, and the following ADT stack operations, write a procedure void AppendStack( StackType &S, StackType &T ) to append, in order, the elements…
1. Using regular expressions with \'grep\' Download the GNU GPL License file fro
1. Using regular expressions with 'grep' Download the GNU GPL License file from: https://www.gnu.org/licenses/gpl-2.0.txt Display the lines of that start with any Uppercase letter…
1. Using the C++ programming language, indicate the binding time (language desig
1. Using the C++ programming language, indicate the binding time (language design, language implementation, compilation, program writing time, link, run, etc.) for each of the fol…
1. Using the Palindrome.java file and the PalindromeApp.java file, rewrite and c
1. Using the Palindrome.java file and the PalindromeApp.java file, rewrite and correct the Palindrome.java file so that it correctly tests whether a string is a palindrome or not.…
1. Using the STUDENT table structure shown in Table P6.4, do the following. Tabl
1. Using the STUDENT table structure shown in Table P6.4, do the following. Table P6.4 Sample STUDENT Records Attributes Name Sample Value Sample Value Sample Value Sample Value S…
1. Using the Xendesktop, open Visual Studio 2015. Create a new project and add a
1. Using the Xendesktop, open Visual Studio 2015. Create a new project and add a new .c file to the project. Type the programming shell template as stated up above and continu…
1. Using the big-Oh notation, what is the worst-case time complexity of each of
1. Using the big-Oh notation, what is the worst-case time complexity of each of the following pieces of code? In every case consider n being the growth rate variable. When there i…
1. Using the cheddar data: (a) Fit a linear model with taste as the response and
1. Using the cheddar data: (a) Fit a linear model with taste as the response and the other three variables as predictors. (b) Suppose that the observations were taken in time orde…
1. Using the combination theory rule, check each of the following given expressi
1. Using the combination theory rule, check each of the following given expression, and see if you can combine them. If you can combine them, then write down the algebraic form of…
1. Using the following declarations, int counter = 0; double val; double [ ] bAr
1. Using the following declarations, int counter = 0; double val; double [ ] bArray = new double [10]; To display the contents of bArray, show what the foreach loop control cons…
1. Using the information below, CPU W = 4 ms (the average time to execute 1,000
1. Using the information below, CPU W = 4 ms (the average time to execute 1,000 instructions) Drive A = 45 ms (average data access speed) Drive B = 3 ms (average data access speed…
1. Using the l_employees table, add 10 dollars to everyone’s credit limit. If th
1. Using the l_employees table, add 10 dollars to everyone’s credit limit. If they don’t have a credit limit, assume that it is zero. 2. Show the primary key column(s) of the l_lu…
1. Using the linked list program given in class , alter the program to input twe
1. Using the linked list program given in class , alter the program to input twenty five FLOATS , sorting them as they are inserted into the list. Print out the sorted…
Subject
Web development and programming
Use Browse or pick another subject.