Web development and programming
191828 questions • Page 250 / 3837
1. Using the numeric mode for assigning permissions, what command is used to rem
1. Using the numeric mode for assigning permissions, what command is used to remove the “read” permission from the “others” group only? -r-…
1. Using the same tables you made last week 2. Add to each, a new column (field)
1. Using the same tables you made last week 2. Add to each, a new column (field). Not new data, and additional field 3. Make sure you fun this create5.sql program 4. Submit the pr…
1. Using the same tables you made last week 2. Add to each, a new column (field)
1. Using the same tables you made last week 2. Add to each, a new column (field). Not new data, and additional field 3. Make sure you fun this create5.sql program 4. Submit the pr…
1. Using the table information above, write a SQL statement that will return onl
1. Using the table information above, write a SQL statement that will return only the following fields: Animal name, Animal type, Animal breed, Owner name, Owner address (street, …
1. Using vectors or arrays, write a function named word_rev() that reverse any g
1. Using vectors or arrays, write a function named word_rev() that reverse any given word. 2. Write a program that will: Ask the user to enter a word. Save the entry as word_enter…
1. Utility Functions (8 Points). In the written Hawaiian language, only 13 lette
1. Utility Functions (8 Points). In the written Hawaiian language, only 13 letters are used: the five vowels (a,e,i,o, and u), and 8 consonants (h,k,l,m,n,p,w, and ` (this backwar…
1. Values that are sent into a function are called _______. 2. Special variables
1. Values that are sent into a function are called _______. 2. Special variables that hold copies of function arguments are called _______. 3. ________ variables are defined outsi…
1. Values that are sent into a function are called _______. 2. Special variables
1. Values that are sent into a function are called _______. 2. Special variables that hold copies of function arguments are called _______. 3. ________ variables are defined outsi…
1. Variables Choose One 7 points Which one of the following choices is NOT a cor
1. Variables Choose One 7 points Which one of the following choices is NOT a correct way to declare and define a variable that we have discussed in class? O string comicTitle "Spi…
1. Variables created within a method can be accessed outside that method. OFalse
1. Variables created within a method can be accessed outside that method. OFalse 2. The structure of a class consists of properties and behaviors. False 3. Which two statements ar…
1. Verify that Goldbach’s Conjecture is true for all the even integers from 14 t
1. Verify that Goldbach’s Conjecture is true for all the even integers from 14 to 50. 2. Another unproven conjecture in number theory is the following: Let f: N N be dened by f(n)…
1. Vernam Encryption Write a program in C that will encrypt a file use XOR and a
1. Vernam Encryption Write a program in C that will encrypt a file use XOR and a Vernam key. A Vernam key is a short string. (The real system used a much longer random sequence.) …
1. Vernam Encryption Write a program in C that will encrypt a file use XOR and a
1. Vernam Encryption Write a program in C that will encrypt a file use XOR and a Vernam key. A Vernam key is a short string. (The real system used a much longer random sequence.) …
1. View models in an ASP.NET web application are A. any model that drives a view
1. View models in an ASP.NET web application are A. any model that drives a view. B. models that drive views but are not stored in the database. C. models that are stored in the d…
1. Void methods use the return statement to return the value 0. False 2. An actu
1. Void methods use the return statement to return the value 0. False 2. An actual parameter is a variable or expression listed in a method call. 3. Actual and formal parameters h…
1. WHICH SOFTWARE WOULD YOU USE? Which type or types of computer-aided decision
1. WHICH SOFTWARE WOULD YOU USE? Which type or types of computer-aided decision support software would you use for each of the situations in the following tasks? Note why you thin…
1. WRK Systems, Inc. You have been hired as a consultant to help a new service d
1. WRK Systems, Inc. You have been hired as a consultant to help a new service desk develop scripts and call-handling procedures. The service desk has an incident management syste…
1. WRK Systems, Inc. You have been hired as a consultant to help a new service d
1. WRK Systems, Inc. You have been hired as a consultant to help a new service desk develop scripts and call-handling procedures. The service desk has an incident management syste…
1. We call the pieces of information that are passed to a function, which it the
1. We call the pieces of information that are passed to a function, which it then uses to do its task a/an ___________. 2. A function may return __________ or __________ result(s)…
1. We can sort any array of 4 integers using at most _______ comparisons. 2. In
1. We can sort any array of 4 integers using at most _______ comparisons. 2. In the worst case, quicksort needs O(_______________________) comparisons to sort an array of n intege…
1. We have a laptop user transmitting at 1 Mbps with no loss. The packets, inclu
1. We have a laptop user transmitting at 1 Mbps with no loss. The packets, including payload and all headers, are 100 bytes long and the average CSMA backoff is 32 microseconds. A…
1. We have the following set-up: • 256 byte main memory • words are aligned (tha
1. We have the following set-up: • 256 byte main memory • words are aligned (that is, they have an address divisible by 4) • addresses are 8 bits • 64 byte cache that uses direct-…
1. We introduced the Unit Testing, Integration Testing and System Testing, pleas
1. We introduced the Unit Testing, Integration Testing and System Testing, please do a detail description for each testing stage, what is the main purpose of each testing, what ki…
1. We investigate the increase in CPI (clocks per instruction) due to cache miss
1. We investigate the increase in CPI (clocks per instruction) due to cache misses that occur during memory references. For simplicity, we pretend that instruction fetches never m…
1. We learned that an 802.11 network can choose to operate using any of the 11 d
1. We learned that an 802.11 network can choose to operate using any of the 11 different available channels (frequency bands). Consider the figure shown in below. Can you assign c…
1. We saw that Queues and Stacks are quite similar. One may ask a natural questi
1. We saw that Queues and Stacks are quite similar. One may ask a natural question , how similar they are; c an you buil d one of them from the other ? It turns out that, they can…
1. Web developers commonly use DNS to transfer web page files from their compute
1. Web developers commonly use DNS to transfer web page files from their computers to web servers. TRUE FALSE 2. send HTTP requests for web pages and their associated files. a. We…
1. Well-known port numbers are contained in the file /etc/services on most Unix
1. Well-known port numbers are contained in the file /etc/services on most Unix systems. Use "grep" to determine the port number(s) and transport layer protocol(s) (e.g. TCP, UDP,…
1. What C statement is used to open a file? 2. Write a single line of code (assu
1. What C statement is used to open a file? 2. Write a single line of code (assume that all other needed code is present) that will create a FILE pointer named myfile. 3. Write a …
1. What DNS record details server IP addresses that are allowed to send Email fo
1. What DNS record details server IP addresses that are allowed to send Email for a domain? 2. What freeware software can be used to set up a low cost VPN? 3. What internet sites …
1. What IP address CIDRs are not allowed to be communicated with by our malware?
1. What IP address CIDRs are not allowed to be communicated with by our malware? a. Hint: Cuckoo uses the IP addresses 192.168.56.1 and 192.168.56.101 to connect the malware to th…
1. What Microsoft tools are you working with. Provide a screen shot of each of t
1. What Microsoft tools are you working with. Provide a screen shot of each of the tools and which version you have on your computer. 3. Why are software updates so important? Be …
1. What actions does the operating system take when a program issues the open an
1. What actions does the operating system take when a program issues the open and close operations for a file that is to be read from disk? For a file that is to be created? (Ther…
1. What are primitive data types in Java? Is String a primitive data type? Why w
1. What are primitive data types in Java? Is String a primitive data type? Why we can’t use == to compare the values of two strings? 2. How to declare and use arrays of objects? W…
1. What are regular expressions? What are they used for? (each 10 points) 2. Ass
1. What are regular expressions? What are they used for? (each 10 points) 2. Assume you have a file that contains these lines: a3b adcbcbc 12c5a36 a5 3c 1) In the above file which…
1. What are some characteristics of a CNAME record? What is the purpose of havin
1. What are some characteristics of a CNAME record? What is the purpose of having one? 2. In your own words, define stubby areas and totally stubby areas. 3. In your own words, de…
1. What are some of the benefits of modularity? 2. What is functional abstractio
1. What are some of the benefits of modularity? 2. What is functional abstraction? 3. What is information hiding? 4. What are the three types of operations on a data colle…
1. What are some of the things from your favorite game that you could represent
1. What are some of the things from your favorite game that you could represent as objects? What might their data members and member functions be? 2. What are the advantages of us…
1. What are some other programming languages besides C++? How do they compare to
1. What are some other programming languages besides C++? How do they compare to C++? 2. C++ is a superset of the C programming language. C itself is a descendant of several gener…
1. What are some valid reasons to include document properties with a file? Why m
1. What are some valid reasons to include document properties with a file? Why might you want to go to the extra time and trouble to include this information? What if your manager…
1. What are the Cybersecurity risks that blog website faces? Why does it face th
1. What are the Cybersecurity risks that blog website faces? Why does it face those risks? 2. How will the blog website business be protected from such Cybersecurity risks? 3. Wha…
1. What are the SQL statements to perform the following tasks? a) Create a table
1. What are the SQL statements to perform the following tasks? a) Create a tablespace Hw3Tbs that contains a 32MB datafile in directory ‘C:ppStudentoradatacsc544744TEMP’. b) Add …
1. What are the addresses of the following elements? a) int array[10]; and the s
1. What are the addresses of the following elements? a) int array[10]; and the starting address of the array is 48. What is the address of the element array[2]? Give answer in dec…
1. What are the differences between machine language and high-level language? 2.
1. What are the differences between machine language and high-level language? 2. What are the differences between memory address bus and memory data bus? 3. What are the advantage…
1. What are the essential attributes of good software? 2. What is the distinctio
1. What are the essential attributes of good software? 2. What is the distinction between computer science and software engineering? 3. List 5 different types of software applicat…
1. What are the five (5) threat mitigation techniques recommended by NIST? 2. Wh
1. What are the five (5) threat mitigation techniques recommended by NIST? 2. What is 'secure' software? If you were in the role of CISO (Chief Information Security Officer) at a …
1. What are the four basic processes of the Network Layer? 2. Match the common n
1. What are the four basic processes of the Network Layer? 2. Match the common network protocols described below. AppleTalk, CLNS, IPv4, IPv6, IPX The most common network protocol…
1. What are the four important attributes that all professional software should
1. What are the four important attributes that all professional software should have? Suggest four other attributes ( not listed in the book) that may sometimes be significant. 2.…
1. What are the four main functions of a computer? 2. List and briefly define th
1. What are the four main functions of a computer? 2. List and briefly define the main structural components of a computer. 3. List and briefly define the main structural componen…
1. What are the key deliverables that are created during the analysis phase? Wha
1. What are the key deliverables that are created during the analysis phase? What is the final deliverable from the analysis phase, and what does it contain? 7. Describe the five …
Subject
Web development and programming
Use Browse or pick another subject.