Web development and programming
191828 questions • Page 257 / 3837
1. Where the default value of parameter have to be specified? A. Function call B
1. Where the default value of parameter have to be specified? A. Function call B. Function definition C. Function prototype D. Both B or C 2. Which of the following statement is c…
1. Whic ofthe JCF interfaces would be the most useful if we want to store a coll
1. Whic ofthe JCF interfaces would be the most useful if we want to store a collection of students enrolled in COMP2402 so that we can quickly check if a student is enrolled in CO…
1. Which Internet of Things (IoT) challenge involves the difficulty of developin
1. Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion? a) Security b…
1. Which Internet of Things (IoT) challenge involves the difficulty of developin
1. Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion? a) Security b…
1. Which Swing layout manager uses a grid, but allows selected grid locations to
1. Which Swing layout manager uses a grid, but allows selected grid locations to span multiple rows or columns? I GridBagLayout II BorderLayout III GridLayout 2. What is the best …
1. Which action represents a conditional macro statement? a. SetLocalVar b. Mess
1. Which action represents a conditional macro statement? a. SetLocalVar b. MessageBox c. If - Then d. CancelEvent 2. Which statement is false for a Named Data Macro? a. It must b…
1. Which answer choice shows the correct values of the Carry, Zero, and Sign fla
1. Which answer choice shows the correct values of the Carry, Zero, and Sign flags after the following instructions execute? mov al,00110011b test al,2 Choose one answer. a. CF= 0…
1. Which assignment statements will copy the value \"toaster\" into a string var
1. Which assignment statements will copy the value "toaster" into a string variable (str1)? a. strcpy(str1,"toaster"); b. str1 = "toaster"; c. str1 = toaster; d. str1…
1. Which boolean operation is described by the following table? A B Operation Tr
1. Which boolean operation is described by the following table? A B Operation True True True True False True False True True False False False a. or b. and c. not d. …
1. Which came first, the World Wide Web or the Internet? World Wide Web Internet
1. Which came first, the World Wide Web or the Internet? World Wide Web Internet Neither. The Web is the same thing as the Internet 2. When the cursor is positioned over a hyperli…
1. Which class of IP addresses is the following address in: 192.168.1.1? 1. Clas
1. Which class of IP addresses is the following address in: 192.168.1.1? 1. Class A 2. Class B 3. Class C 4. Class d 2. Which class of IP addresses is the following address in: 10…
1. Which command allows you to display the current vi mode at the bottom of the
1. Which command allows you to display the current vi mode at the bottom of the screen? __________________________ 2. Which command allows you to display line numbers in vi? _____…
1. Which command is used to verify bits 7 and 0 of Port A are both logic zeroes?
1. Which command is used to verify bits 7 and 0 of Port A are both logic zeroes? if (PORTA = 0x7E) if (PORTA & 0x81) = 0) if (PORTA & 0x81) == 0) if (PORTA & 0x7E) = 0…
1. Which command of MS-DOS is used to copy only files that have been modified on
1. Which command of MS-DOS is used to copy only files that have been modified on or after the date you specify? A. XCOPY/D : date B. COPY/D : date C. COPY/M D. XCOPY/V E. None of …
1. Which command will find all files under /me/mine/ whose name is horses find -
1. Which command will find all files under /me/mine/ whose name is horses find -af /me/mine -name horses 2. sed 's/[BW]ill/William/g' somefile changes the first occurance of 'Bill…
1. Which command would you give to update all installed packages using yum? $yum
1. Which command would you give to update all installed packages using yum? $yum check $yum update $yum check $yum install 2. Suppose under your home directory there is a folder c…
1. Which edge is chosen in a phase of Kruskal’s algorithm? A. An edge that is on
1. Which edge is chosen in a phase of Kruskal’s algorithm? A. An edge that is on a shortest path from the source B. The unprocessed edge (x, y) of smallest…
1. Which featur ewill enable you to apply motion as one slide exits and another
1. Which featur ewill enable you to apply motion as one slide exits and another enters? a. advance b.transition c. timing 2. In reference to content development, which of the foll…
1. Which file system should never be backed up, and therefore never have to be r
1. Which file system should never be backed up, and therefore never have to be restored? Ufs Usr Tmp Swap 2. To check the swap info $swaps $swap $cat /proc/swaps $swapinfo 3. What…
1. Which formula is typically used to describe the components of information sec
1. Which formula is typically used to describe the components of information security risks? A) Risk = Likelihood X Vulnerability B) Risk = Threat X Vulnerability C) Risk = Threat…
1. Which fusion musician recorded an album of Free Jazz with Ornette Coleman? A)
1. Which fusion musician recorded an album of Free Jazz with Ornette Coleman? A) Pat Metheny B) Miles Davis C) Herbie Hancock D) John McLauglin 2. The World Saxophone Quartet: A) …
1. Which implementation is more efficient to accomplish the following task? test
1. Which implementation is more efficient to accomplish the following task? test whether an edge exists between two vertices Select one: adjacency list adjacency matrix they are e…
1. Which is a viable solution for solving the philosophers problem from chapter
1. Which is a viable solution for solving the philosophers problem from chapter 30 of your textbook? Select one: a. The last philosopher tries to grab the right fork before the le…
1. Which is the address operator? A. * B. @ C. & D. -> 2. Which is true about po
1. Which is the address operator? A. * B. @ C. & D. -> 2. Which is true about pointers? A. A pointer is a datatype. B. A pointer is a ke…
1. Which is the best choice for a local area network - where the network is \"fl
1. Which is the best choice for a local area network - where the network is "flat", i.e. there is only one segment to the network, and there are 8 computer systems on the network …
1. Which is the correct name of a variable in C language A. 3L C. size-length B.
1. Which is the correct name of a variable in C language A. 3L C. size-length B. size.length D. length3 2. An array a is initialized as: int all - 10.9.8,7,6 What is value of elem…
1. Which keyboard number is most often used as the short cut for the home page?
…
1. Which language is described by regular expression ab* + c? A. {, a, c, ab, ab
1. Which language is described by regular expression ab* + c? A. {, a, c, ab, abb, abbb, …, abn, …} B. {, a, c, b, bb, bbb, …, bn, …} C. {a, c, ab, abb, abbb, …, abn, …} D. {a, c,…
1. Which layer of the OSI model does switches function? 2. Describe the network
1. Which layer of the OSI model does switches function? 2. Describe the network security advantage of using a VLAN. 3. A router, similar to a VLAN, can subdivide a large network i…
1. Which level of feasibility is concerned with tangible and intangible benefits
1. Which level of feasibility is concerned with tangible and intangible benefits? A. Technical feasibility B. Operational feasibility C. Schedule feasibility D. Economic feasibili…
1. Which line completes this code fragment to define a text file named txtfile f
1. Which line completes this code fragment to define a text file named txtfile for reading? ____________________________________________________ Reader scan = new Reader(new File(…
1. Which loop structure can we use to loop through a range object? a. FOR EACH c
1. Which loop structure can we use to loop through a range object? a. FOR EACH cell b. SELECT CASE c. IF THEN ELSE 2. What is the correct way to find the number of rows in a range…
1. Which method would you use to parse an xml data type that has been stored in
1. Which method would you use to parse an xml data type that has been stored in a database into multiple columns? a. value b. nodes c. modify d. query 2. Code example 18-1 <Err…
1. Which of the JCF interfaces would be the most useful if we want to store a co
1. Which of the JCF interfaces would be the most useful if we want to store a collection of students enrolled in COMP2102 so that we can quickly check if a student is enrolled in …
1. Which of the following CANNOT be used to add another spreadsheet to a workboo
1. Which of the following CANNOT be used to add another spreadsheet to a workbook? On the insert ribbon, add a table In the cell area of the home ribbon, insert pulldown and inser…
1. Which of the following PHP statement is correct to display a dynamic message
1. Which of the following PHP statement is correct to display a dynamic message with the variable $score? echo "Your score is "+$score; echo 'Your score is $score'; echo Your scor…
1. Which of the following SUBTRACT statements is NOT correct? SUBTRACT AMT1 FROM
1. Which of the following SUBTRACT statements is NOT correct? SUBTRACT AMT1 FROM AMT2 SUBTRACT A FROM 10 SUBTRACT AMT1 FROM 10 GIVING AMT2 SUBTRACT AMT1 AMT2 FROM AMT3 SUBTRACT AM…
1. Which of the following are Functional Requirements. (check all that apply) a.
1. Which of the following are Functional Requirements. (check all that apply) a. Sort the input data b. Use efficent code c. Display the results on the screen d. Make sure the app…
1. Which of the following are Functional Requirements. (check all that apply) a.
1. Which of the following are Functional Requirements. (check all that apply) a. Sort the input data b. Use efficent code c. Display the results on the screen d. Make sure the app…
1. Which of the following are advantages of server virtualization? There is more
1. Which of the following are advantages of server virtualization? There is more than one correct answer. a. Is easier to backup applications b. Is only used by very large organi…
1. Which of the following are advantages of using arrays to implement bags and l
1. Which of the following are advantages of using arrays to implement bags and lists? A. arrays can become full and need to be expanded B. arrays reuire shifting under certain cir…
1. Which of the following are local data (local variables)? balance name acctNum
1. Which of the following are local data (local variables)? balance name acctNum initBal owner number withdraw amtToTake deposit amtToAdd getBalance toString s There are no local …
1. Which of the following are possible characteristics of the incremental develo
1. Which of the following are possible characteristics of the incremental development model? Select ALL that apply. Select one or more: a. Customer can use (limited functionality)…
1. Which of the following are possible characteristics of the incremental develo
1. Which of the following are possible characteristics of the incremental development model? Select ALL that apply. Select one or more: a. Customer can use (limited functionality)…
1. Which of the following are true about risk-based security testing? a. Softwar
1. Which of the following are true about risk-based security testing? a. Software security tester can properly focus on area of code where an attack is likely to succeed b.…
1. Which of the following are true as it applies to Naïve Bayes Incorporate the
1. Which of the following are true as it applies to Naïve Bayes Incorporate the Concept of conditional probability Named after the Reverend Thomas Bayes Can only be used with Cate…
1. Which of the following are true as it applies to Naïve Bayes Incorporate the
1. Which of the following are true as it applies to Naïve Bayes Incorporate the Concept of conditional probability Named after the Reverend Thomas Bayes Can only be used with Cate…
1. Which of the following are valid data-names (variables)? A. FED-TAX-2017 ____
1. Which of the following are valid data-names (variables)? A. FED-TAX-2017 ____ B. 123O456 ____ C. TOTAL PAY ____ D. -AMOUNT- ____ 2. Identify the errors in the following set of …
1. Which of the following are valid variable names in C? a. char b. limit7e c. 1
1. Which of the following are valid variable names in C? a. char b. limit7e c. 1234 d. count_of apples_in_one_basket e. $2000_address_for_input 2. Please write the output of the f…
1. Which of the following best describes a local area network? A. A network that
1. Which of the following best describes a local area network? A. A network that covers a large geographic area, such as a city or state B. A network that connects computers withi…
Subject
Web development and programming
Use Browse or pick another subject.