Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 252 / 3837

1. What header file may be used when reading input from a file and writing outpu
1.       What header file may be used when reading input from a file and writing output to a file? 2.       How do you test for the end of an input file? 3.       Can fstream be u…
1. What important part of the process switch operation is not shown in Figure 3.
1. What important part of the process switch operation is not shown in Figure 3.4? 2. What is the operational difference between single-threaded and multi-threaded processes? i.e.…
1. What is 4-bit BCD value of 101010102? 2. What is the difference between polli
1. What is 4-bit BCD value of 101010102? 2. What is the difference between polling and interupt? Use an example to describe the operation of polling and interrupt. 3. How many dif…
1. What is 5.5 10 in Binary? a. 101.101 b. 101.1 c. 1.1 d. 1011 2. What is A.2 1
1. What is 5.510 in Binary? a. 101.101          b. 101.1               c. 1.1 d. 1011 2. What is A.216 in Binary? a. 1010.1 b. 1010.001 c. 1010.01 d. 1010.0001 3. Which of the fol…
1. What is IEEE 802.x? 2. Explain what is the difference between persistent, non
1. What is IEEE 802.x? 2. Explain what is the difference between persistent, non-persistent and p-persistent CSMA. 3. What is the purpose of the soF start of frame field in the Et…
1. What is IP address of the client. If there is more than one, spell out IP add
1. What is IP address of the client. If there is more than one, spell out IP addresses. 2. What is the IP address of the server. If there is more than one, spell out IP addresses.…
1. What is IT infrastructure and what are its components? 2.What are the stages
1. What is IT infrastructure and what are its components? 2.What are the stages and technology drivers of IT infrastructure evolution? 3. What are the current trends in computer h…
1. What is JavaScript? What are the advantages of implementing JavaScript on a s
1. What is JavaScript? What are the advantages of implementing JavaScript on a site? Min: 75 words 2. How is ECMAScript and JavaScript related? Min: 75 words 3. What do these logi…
1. What is Lucent\'s Security Framework (X.805)? 2. What is the purpose of threa
1. What is Lucent's Security Framework (X.805)?   2. What is the purpose of threat categories? How can it future-proof against attacks? 3. Example activity at user data plane, con…
1. What is ON DELETE CASCADE ? 2. Can a child\'s FK field have a different name
1. What is ON DELETE CASCADE ? 2. Can a child's FK field have a different name than the parent's PK field? Provide examples. 3. What is referential integrity? How referential inte…
1. What is Regression testing? 2. What is the control flow graph of a program (e
1. What is Regression testing? 2. What is the control flow graph of a program (e.g. written in a Java-like language)? 3. Give an example of a short program (different to the ones …
1. What is TCP/IP architecture? What is PDU and how does the model (TCP/IP) use
1. What is TCP/IP architecture? What is PDU and how does the model (TCP/IP) use PDU? 2. Compare the individual fields of the IPv4 header with the IPv6 header. Account for the func…
1. What is a Project? 2. What is the range of sizes of an information system dev
1. What is a Project? 2. What is the range of sizes of an information system development project? 3. What is the System Development Life Cycle (SDLC)? 4. What characteristics of a…
1. What is a RFID tag and how does an RFID tag reader function as an input devic
1. What is a RFID tag and how does an RFID tag reader function as an input device? 2. What is Network Attached Storage or NAS? How can this be a useful data storage device? 3. As …
1. What is a class constructor used for? 2. How do constructors differ from othe
1. What is a class constructor used for? 2. How do constructors differ from other methods in a class? 3. What is the difference between private and public attributes and methods i…
1. What is a classification model? As the classification model serves two vital
1. What is a classification model? As the classification model serves two vital functions in data mining: predictive and descriptive model. Explain the models’ critical applicatio…
1. What is a file? 2. What are different types of files 3. What is a folder ? 4.
1. What is a file? 2. What are different types of files 3. What is a folder ? 4. What is File Explorer? 5. What is an address bar in FIle Explorer? 6. What are the 2 main ways to …
1. What is a handshaking protocol? Does HTTP use handshaking at the application
1. What is a handshaking protocol? Does HTTP use handshaking at the application layer? If not which layer? What about SMTP? If so, how does it use it in these layers. Please cite/…
1. What is a mobile architecture and what are some of the design considerations?
1. What is a mobile architecture and what are some of the design considerations? 2. What is the difference between a disruptive and a sustaining technology? 3. Describe the differ…
1. What is a model? What do we use them for in engineering school? 2. Give two d
1. What is a model? What do we use them for in engineering school? 2. Give two different definitions of Operating Systems. 3. Explain what TimeSharing systems are and how their te…
1. What is a naming model used for? 2. List the four major activities associated
1. What is a naming model used for? 2. List the four major activities associated with software configuration management. 3. What are check-in and check-out? 4. List three concerns…
1. What is a project plan? List what a project plan can accomplish. 2. What is t
1. What is a project plan? List what a project plan can accomplish. 2. What is the value of a statement of vision and objectives? Why is it needed before a project plan is develop…
1. What is a quorum? Describe the four different quorum mode configurations in W
1. What is a quorum? Describe the four different quorum mode configurations in Windows Server 2008. 2. Describe how a two-node file server failover cluster can improve availabilit…
1. What is a scalar variable? 2. What is an array? 3. What is scope (define it i
1. What is a scalar variable? 2. What is an array? 3. What is scope (define it in terms of global versus local)? 4. What are the values in an array called? 5. What is the position…
1. What is a variable? A) A name and a type B) A name and a value C) A name, a t
1. What is a variable? A) A name and a type B) A name and a value C) A name, a type, and a value D) A name, a type, and a memory location 2. All objects have what in common? A) Th…
1. What is a virtual world? 2. How do you see virtual worlds being used in the f
1. What is a virtual world? 2. How do you see virtual worlds being used in the future? Do you think that the technology is just a trend, or something that is here to stay? Explain…
1. What is a web bug? How does a web bug work? Discuss the benefits and security
1.       What is a web bug? How does a web bug work? Discuss the benefits and security concerns of using web bugs. 2.       What is Clickjacking? How to prevent Clickjacking? 3.  …
1. What is additive color mixing? 2. What is subtractive color mixing? 3. What i
1. What is additive color mixing? 2. What is subtractive color mixing? 3. What is the hue of a color? 4. What is the saturation of a color? 5.What is the definition of color tempe…
1. What is an If statement? Please put definition in own words. 2. What is the s
1. What is an If statement? Please put definition in own words. 2. What is the syntax for an if statement? Hint it how the code will be written. 3. What is if/ else Statement? Ple…
1. What is an Object? 2. What is a method? Does it relate to the concept ofOOP(o
1. What is an Object? 2. What is a method? Does it relate to the concept ofOOP(object-oriented programming)? 3. Name two instances of the MAMMAL class. 4. a. Discuss the concept o…
1. What is an RFP? Why is it important to follow a customer’s prescribed format
1. What is an RFP? Why is it important to follow a customer’s prescribed format when submitting an RFP? 2. What should be included in a network map of the current network? 3. Why …
1. What is an advantage to an organization of using a CENTR3X system vice PBX. a
1. What is an advantage to an organization of using a CENTR3X system vice PBX. a. Organizations retain in-house technical expertise to operate and maintain the CENTR3X system b. T…
1. What is an operating system? What function does operating system provide? Giv
1. What is an operating system? What function does operating system provide? Give the history and evolution of operating system 2. Discuss the various hardware platforms that have…
1. What is an: a. Open subroutine? b. Closed subroutine? 2. When is: a. An open
1. What is an: a. Open subroutine? b. Closed subroutine? 2. When is: a. An open subroutine better than a closed subroutine? b. A closed subroutine better than an open subroutine? …
1. What is another name for an “is-a”relationship? a) composition b) abstraction
1. What is another name for an “is-a”relationship? a) composition b) abstraction c) generalization/specialization d) kind-of/example 2.Inheritance is a) a mechanism that uses gene…
1. What is ans bound to after the following ML code is evaluated? 2. Given these
1. What is ans bound to after the following ML code is evaluated? 2. Given these type synonyms three of the types below are interchangeable with each other. Which one is not? 3. I…
1. What is apattern? 2. Patterns -- discuss one in detail , giving its name, des
1. What is apattern? 2. Patterns -- discuss onein detail, giving its name, description, problemthat it solves, solution and consequences. It is ok to state theofficial pattern. 3.…
1. What is awk? The UNIX awk program is another popular stream editor. The basic
1.What is awk? The UNIX awk program is another popular stream editor. The basic function of awk is to search files for lines or other text units containing 1 or more patterns. Whe…
1. What is cyberethics? How is it different from and similar to computer ethics
1. What is cyberethics? How is it different from and similar to computer ethics and Internet ethics? 2. Summarize the key aspects of each of the "four phases" we used to describe …
1. What is direct recursion? 2. Consider the following recursive function: void
1. What is direct recursion? 2. Consider the following recursive function: void funcRec(int u, char v)                       //Line 1 {   if (u == 0)                              …
1. What is encapsulation 2. Why should an object\'s dta attributes be hidden fro
1. What is encapsulation 2. Why should an object's dta attributes be hidden from code outside the class 3. What is the diference between a class and an instance of a class? 4. The…
1. What is important for an internet user to know about https:// ? All answers a
1. What is important for an internet user to know about https:// ? All answers are correct As long as you keep your browser up-to-date and install good anti-virus software, it doe…
1. What is information security? 2. How is the CNSS model of information securit
1. What is information security? 2. How is the CNSS model of information security organized? 3. What three principles are used to define the C.I.A. triangle? Define each in the co…
1. What is involved in creating a web crawler? What are the differences between
1. What is involved in creating a web crawler? What are the differences between static and dynamic web content? One of the topics covered in Analysis of Algorithms are algorithms …
1. What is joint application design (JAD)? What are the benefits of using this a
1.       What is joint application design (JAD)? What are the benefits of using this approach? Briefly describe how the approach works. 2.       Consider the object-oriented appro…
1. What is machine code? Why is it preferable to write programs in a high level
1. What is machine code? Why is it preferable to write programs in a high level language such as C++? 2. What does a compiler do? What kinds of errors are reported by a compiler? …
1. What is meant by a moral system? What are some of the key differences between
1. What is meant by a moral system? What are some of the key differences between the "rules of conduct" and the "principles of evaluation" that comprise a moral system? 2. How do …
1. What is meant by a sunk cost? Give examples of typical sunk costs for an IT p
1. What is meant by a sunk cost? Give examples of typical sunk costs for an IT project. 2. Explain what happens during the process to determine the project budget. 3. What is proj…
1. What is ment by \"User Date is User Feedback\"? 3. Explain one way to asset s
1. What is ment by "User Date is User Feedback"? 3. Explain one way to asset someone's actual engagement with a web site? 6. How can we achieve " ANALYTICSPARADIGM ACROSS "? 7. Wh…
1. What is ment by \"User Date is User Feedback\"? 3. Explain one way to asset s
1. What is ment by "User Date is User Feedback"? 3. Explain one way to asset someone's actual engagement with a web site? 9. How can you measure "the ecosystem return on investmen…