Web development and programming
191828 questions • Page 253 / 3837
1. What is middleware A layer of software to mask heterogeniety A medium in whic
1. What is middleware A layer of software to mask heterogeniety A medium in which to connect end points A way to connect hardware and software Supports abstraction for process com…
1. What is politics? 2. What is the main purpose of government? 3. What is Harol
1. What is politics? 2. What is the main purpose of government? 3. What is Harold Lasswell definition of politics? 4. What is liberty? 5. What is the concept of totalitarianism? 6…
1. What is polymorphism? Give an example. 2. What is inheritance? Give an exampl
1. What is polymorphism? Give an example. 2. What is inheritance? Give an example. 3. What is dynamic method lookup? Give an example. 4. What is the shadowing of variables? Give a…
1. What is printed by the following code? user_str = ‘aabbcc’ print(user_str[2:]
1. What is printed by the following code? user_str = ‘aabbcc’ print(user_str[2:]) print(user_str[1:4]) print(user_str[1: :2]) print(user_str[:-2]) index_int = 0 print(user_str[ind…
1. What is risk management? Why is the identification of risks, by listing asset
1. What is risk management? Why is the identification of risks, by listing assets and their vulnerabilities, so important to the risk management process? 2. According to Sun Tzu, …
1. What is software-configurationmanagement? Also, discuss, in brief, the variou
1. What is software-configurationmanagement? Also, discuss, in brief, the varioussoftware-configuration management activities.
1. What is stored in alpha after the following code executes? int alpha[5] = {0}
1. What is stored in alpha after the following code executes? int alpha[5] = {0}; int j; for (j = 0; j < 5; j++) { alpha[j] = 2 * j; if (j % 2 == 1) //see if j is an even numbe…
1. What is the 8-bit 2’s complement representation of a number which is represen
1. What is the 8-bit 2’s complement representation of a number which is represented as 8116 in 8-bit sign-magnitude integer representation? a. FF16 b. 1816 c. 1116 d. Canno…
1. What is the ASCII value of the character \'c\'? 2 .Explain what the tolower()
1. What is the ASCII value of the character 'c'? 2 .Explain what the tolower() function does to a character. The answer should include the argument(s) that are passed to tolower()…
1. What is the ASCII value of the character \'c\'? 2 .Explain what the tolower()
1. What is the ASCII value of the character 'c'? 2 .Explain what the tolower() function does to a character. The answer should include the argument(s) that are passed to tolower()…
1. What is the Big-O running time of the following code fragment? Assume lst1 ha
1. What is the Big-O running time of the following code fragment? Assume lst1 has N items, and lst2 is initially empty. public static void add( List<Integer> lst1, List<I…
1. What is the Big-O running time of the following code fragment? Assume lst1 ha
1. What is the Big-O running time of the following code fragment? Assume lst1 has N items, and lst2 is initially empty. public static void add( List<Integer> lst1, List<I…
1. What is the Python module for regular expressions? A. regex B. pyregex C. re
1. What is the Python module for regular expressions? A. regex B. pyregex C. re D. pyre 2. What is the output of the code shown below? re.split(r'(a)(t)', 'Maths is a difficult su…
1. What is the access time for a 32-bit word if your Cache Hit Rate is 98%. Memo
1. What is the access time for a 32-bit word if your Cache Hit Rate is 98%. Memory access time for a byte is 1 microsecond and cache operate at half the clock speed. The CPU is a …
1. What is the advantage of using a pointing device to enter patient’s vital sig
1. What is the advantage of using a pointing device to enter patient’s vital signs compared with simply typing in the values using a keyboard? 2. How is the use of a patient ID br…
1. What is the advantages and disadvantages of Test driven testing and model bas
1. What is the advantages and disadvantages of Test driven testing and model based testing? (10 points) 2. Why do we need to do software configuration management, and what is the …
1. What is the binary result in the remainder when the operation is complete? 2.
1. What is the binary result in the remainder when the operation is complete? 2. How many iterations will the hardware go through to complete the operation? 3 ta Chapter 3 Arithme…
1. What is the character position of ‘O’ of the description Microware Oven from
1. What is the character position of ‘O’ of the description Microware Oven from parts when this SQL statement is executed? SELECT INSTR(DESCRIPTION,'O') FROM PART; 2. How many war…
1. What is the command netstat -r used for? to display the TCP sockets to renew
1. What is the command netstat -r used for? to display the TCP sockets to renew the default gateway to release the assigned IP address to display the ho…
1. What is the command that will allow you to enter privileged mode? 2. What is
1. What is the command that will allow you to enter privileged mode? 2. What is the command that will allow you to enter global config mode? 3. What is the command to set a device…
1. What is the cycle time of the above CPU? a. 2/4510 sec b. 1/(2 * 10 ^ 9) sec
1. What is the cycle time of the above CPU? a. 2/4510 sec b. 1/(2 * 10 ^ 9) sec c. 4 sec d. 1600 sec 2. How many single cycle instructions can be executed by this laptop in 1 sec?…
1. What is the decibel of the signal that inputs 100 watt into a repeater and ou
1. What is the decibel of the signal that inputs 100 watt into a repeater and outputs 1,000 watt?s it loss or gain? (10%) 2. Use the following tables to answer the question below.…
1. What is the difference between DRAM and SRAM, in terms of characteristics suc
1. What is the difference between DRAM and SRAM, in terms of characteristics such as speed, size and cost? 2. List and briefly define three techniques for performing I/O (i.e., co…
1. What is the difference between a class and an object? What is “Unique Identit
1. What is the difference between a class and an object? What is “Unique Identity” in regards to objects? 2. What do we mean by the following statement: “The UML has syntax and se…
1. What is the difference between a class and an object? What is “Unique Identit
1. What is the difference between a class and an object? What is “Unique Identity” in regards to objects? 2. What do we mean by the following statement: “The UML has syntax and se…
1. What is the difference between fork and vfork system calls? 2. Describe the f
1. What is the difference between fork and vfork system calls? 2. Describe the functionality of each of the following system calls: a. kill(456, 0); b. waitpid(-1,&status, 0);…
1. What is the difference between incident response and disaster recovery? 2. Wh
1. What is the difference between incident response and disaster recovery? 2. Why is law seeming behind new technology? 3. What is the purpose of HIPAA? Also what is medical ident…
1. What is the difference between multiprogramming and multiprocessing? Multipro
1. What is the difference between multiprogramming and multiprocessing? Multiprogramming and multithreading? 2. Why should assembly language be avoided for general application dev…
1. What is the difference between overriding a method and overloading a method n
1. What is the difference between overriding a method and overloading a method name? 2. Suppose the class SportsCar is a derived class of a class Automobile. Suppose also that the…
1. What is the difference between tangible value and intangible value? Give thre
1. What is the difference between tangible value and intangible value? Give three examples of each. 2. Compare and contrast between parallel development and iterative…
1. What is the difference between “Save” and “Save All” buttons on ToolBar of Vi
1. What is the difference between “Save” and “Save All” buttons on ToolBar of Visual Studio application? 2. Where can we find controls used to build GUI? a)Menu bar b)Toolbar c)So…
1. What is the effect ofthe following recursive function? void Mystery(int A[ ],
1. What is the effect ofthe following recursive function? void Mystery(int A[ ], intsize) { if (size > 0) {A[0] = 0; Mystery(A+1, size -1);} } A) It sets the firstelement…
1. What is the expected output you\'d get when this program is run? 2. Including
1. What is the expected output you'd get when this program is run? 2. Including the original call to the mystery method, how many times is the method called? 3. What is the correc…
1. What is the function of the stack? How does it work? Show the stack and stack
1. What is the function of the stack? How does it work? Show the stack and stack pointer for each line of the following program. ORG 0 MOV R0, #66H MOV R3, #7FH MOV R7, #5DH PUSH …
1. What is the general approach to disaster recovery as specified in Schmidt? 2.
1. What is the general approach to disaster recovery as specified in Schmidt? 2. What is the role of policy in disaster recovery? 3. Compare and contrast shared systems, hot stand…
1. What is the highest address of a 264K x 8 memory with base address of 00000 (
1. What is the highest address of a 264K x 8 memory with base address of 00000 (hex)? a. 0FFFF b. 1FFFF c. 3FFFF d. 7FFFF 2. What is the last location of a 12Kbyte memory starting…
1. What is the highest address of a 264K x 8 memory with base address of 00000 (
1. What is the highest address of a 264K x 8 memory with base address of 00000 (hex)? a. 0FFFF b. 1FFFF c. 3FFFF d. 7FFFF 2. What is the last location of a 12Kbyte memory starting…
1. What is the index of the first element accessed in the array when searching f
1. What is the index of the first element accessed in the array when searching for the number 20? Only put in the integer for the index, not the value of the array. 2. What is t…
1. What is the index of the first element accessed in the array when searching f
1. What is the index of the first element accessed in the array when searching for the number 20? Only put in the integer for the index, not the value of the array. 2. What is t…
1. What is the last number output by the following code? Enter \"nothing\" if it
1. What is the last number output by the following code? Enter "nothing" if it produces no output. #include <iostream> using namespace std; const int NUM = 10; void food_on_…
1. What is the longest directed path in this graph? 2. Which vertex has the high
1. What is the longest directed path in this graph? 2. Which vertex has the highest in-degree? 3. What is the sum of the degrees of all vertices? (Ignore dashed lines with arrows)…
1. What is the longest directed path in this graph? 2. Which vertex has the high
1. What is the longest directed path in this graph? 2. Which vertex has the highest in-degree? 3. What is the sum of the degrees of all vertices? (Ignore dashed lines with arrows)…
1. What is the main difference between open source software and proprietary soft
1. What is the main difference between open source software and proprietary software? 2. Name at least 3 examples of open source software besides Ubuntu and give a link to their s…
1. What is the maximum number of characters you can input? 2. What happens when
1. What is the maximum number of characters you can input? 2. What happens when you enter more than this number? 3. What is passed to the *getnchar() function? 4. What is returned…
1. What is the meaning of a Singly Linked List data structure? Answer in one sen
1. What is the meaning of a Singly Linked List data structure? Answer in one sentence 2. What is meaning of list traversal 3. What is the meaning of a Circular Linked List data st…
1. What is the meaning of analysis? What is the purpose of the analysis phase of
1. What is the meaning of analysis? What is the purpose of the analysis phase of the SDLC; and what are the key elements of a system proposal? 2. Distinguish between business, use…
1. What is the most popular L. AN technology? 2. Describe how an Ethernet frame
1. What is the most popular L. AN technology? 2. Describe how an Ethernet frame is constructed. 3. What are the CSMA and CD technologies? 4. What are the advantages ofa VLAN? 5. W…
1. What is the name of data that is stored in memory? volatile persistent static
1. What is the name of data that is stored in memory? volatile persistent static forensically sound 2. What type of risk assessment uses monetary values to assess a risk? ongoing …
1. What is the number of B-+tree internal nodes at the next higher level needed
1. What is the number of B-+tree internal nodes at the next higher level needed if blocks are approximately 69% full (round up for convenience)? 2. How many index blocks bi are ne…
1. What is the number of B-+tree internal nodes at the next higher level needed
1. What is the number of B-+tree internal nodes at the next higher level needed if blocks are approximately 69% full (round up for convenience)? 2. How many index blocks bi are ne…
Subject
Web development and programming
Use Browse or pick another subject.