Web development and programming
191828 questions • Page 274 / 3837
1. [10 pts] Use basic input/output in C++ (cin, cout). 2. [10 pts] Use arrays in
1. [10 pts] Use basic input/output in C++ (cin, cout). 2. [10 pts] Use arrays in C/C++. 3. [20 pts] Use at least 2 classes with constructors(default and non-default), destructors,…
1. [100 25*4] Create a script of the session while experimenting with the follow
1. [100 25*4] Create a script of the session while experimenting with the following commands in one your directories I. List currently running jobs II. Kill one of the running job…
1. [100] Your login name: jsmith i.e., home directory/home/jsmith. The home dire
1. [100] Your login name: jsmith i.e., home directory/home/jsmith. The home directory contains the following sub-directories: code, tests, personal, misc Unless otherwise specifie…
1. [12 pts] Given a 10-bit floating-point representation in the IEEE format, wit
1. [12 pts] Given a 10-bit floating-point representation in the IEEE format, with 3 bits for the exponent. Answer the following: a. (4 points) What decimal value does 1011010010 r…
1. [15 marks] Consider the following set of known facts and rules for a producti
1. [15 marks] Consider the following set of known facts and rules for a production system. (Check the Forward and Backward Chaining slides in the Rule Based Systems file in Module…
1. [15 points] Consider the HOTEL database used in the SQL in-class discussions
1. [15 points] Consider the HOTEL database used in the SQL in-class discussions Hotel (hotelNo, hotelName, city) Room (roomNo, H_hotelNo, roomType, price) Booking …
1. [1] What is the cache line size? 2. [1] How many entries does the cache have?
1. [1] What is the cache line size? 2. [1] How many entries does the cache have? 3. [5] Starting from power on, the following byte addressed cache references are recorded. 4,16,13…
1. [20 marks] We investigate the increase in CPI (clocks per instruction) due to
1. [20 marks] We investigate the increase in CPI (clocks per instruction) due to cache misses that occur during memory references. For simplicity, we pretend that instruction fetc…
1. [20 points] Write a shell script called fixCprogram.sh which looks up every c
1. [20 points] Write a shell script called fixCprogram.sh which looks up every c file in the current directory for the strings printf or fprintf. If found, the script adds the sta…
1. [20 pt] Memory hierarchy: Let us assume a 2-way set associative 128 KB L1 cac
1. [20 pt] Memory hierarchy: Let us assume a 2-way set associative 128 KB L1 cache with LRU replacement policy. The cache implements write back and no write allocate policy. Cache…
1. [20 pts] 111/p5/lab-week-8.html and lab-week-8.js. See the Lab Week 8 documen
1. [20 pts] 111/p5/lab-week-8.html and lab-week-8.js. See the Lab Week 8 document in Canvas for instructions. In addition, Add a button to lab-week-8.html labeled, Change List Typ…
1. [25 points Write a Python function that takes an instance of the Stable Match
1. [25 points Write a Python function that takes an instance of the Stable Matching problerm and a perfect matching of the men and women, and returns a list of all rogue couples w…
1. [2pts each] True/ False: Circle the correct answer- 1) Pair programming can b
1. [2pts each] True/ False: Circle the correct answer- 1) Pair programming can be used in eXtreme Programming Answer 2) Beta Testing mainly uses white box testing Answer 2. 2pts e…
1. [30 points] A computer is designed to use a 4-stage pipeline, and each stage
1. [30 points] A computer is designed to use a 4-stage pipeline, and each stage needs 2 nsec to complete its job. 1) [10 points] How much time does it take for the computer to com…
1. [35 points] For each of the following propositions concerning mapping reducti
1. [35 points] For each of the following propositions concerning mapping reductions, determine whether it's true or false and justify your answer: la. [7 points] For every languag…
1. [4 marks] Binary representation and algorithm analysis. Consider the followin
1. [4 marks] Binary representation and algorithm analysis. Consider the following algorithm, which manually counts up to a given number n, using an array of O's and 1's to mimic b…
1. [4 points] Consider two different implementations, P1 and P2, of the same ins
1. [4 points] Consider two different implementations, P1 and P2, of the same instruction set. There are five classes of instructions (A, B, C, D, and E) in the instruction set. Th…
1. [4 pts] Perform a breadth-first search (BFS) of this directed graph, starting
1. [4 pts] Perform a breadth-first search (BFS) of this directed graph, starting at node A. When you have a choice of the next node to process, choose the one earliest in the alph…
1. [42 pointa) Fillin each void entry on the left with Tif the right statement i
1. [42 pointa) Fillin each void entry on the left with Tif the right statement is true, or F otherwise -() A system call typically involves a software interrupt (trap). () Always …
1. [6 marks] Conversion - Show your work (as illustrated in lectures). Convert e
1. [6 marks] Conversion - Show your work (as illustrated in lectures). Convert each of the decimal numbers below into an 8-bit unsigned binary number, then convert the binary numb…
1. [6] Starting with an empty hash table with a fixed size of 11, insert the fol
1. [6] Starting with an empty hash table with a fixed size of 11, insert the following keys in order into four distinct hash tables (one for each collision mechanism): 12, 9, 1, 0…
1. [70 points] Write an assembly program to compute the nth number in the Fibona
1. [70 points] Write an assembly program to compute the nth number in the Fibonacci series. The first and second Fibonacci numbers are 0 and 1, respectively. Every subsequent Fibo…
1. [] Which of the following types does the Java programming language support? S
1. [] Which of the following types does the Java programming language support? Select all that apply. a. integer b. Integer c. Object d. object 2. [] What is the range of values t…
1. \"The Barley Mow\" is a cumulative drinking song which has been sung througho
1. "The Barley Mow" is a cumulative drinking song which has been sung throughout the British Isles for centuries. (An early version entitled "Giue vs once a drinke" appears in Tho…
1. _F_ The reverse postorder of a digraph’s reverse is the same as the postorder
1. _F_ The reverse postorder of a digraph’s reverse is the same as the postorder of the digraph. 2. _F_ Adding a constant to every edge weight does not change the solution to the …
1. __ is installed into special, read-only memory of devices like printers and p
1. __ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. • 2. A client-server application t…
1. ____ A do-while loop is guaranteed to run at least ______ time(s): a) zero b)
1. ____ A do-while loop is guaranteed to run at least ______ time(s): a) zero b) one c) infinite d) thirteen 2. _____ Consider the following code snippet: public class Vehicle { p…
1. ____ is the transfer of information systems development, operation, or mainte
1. ____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis…
1. _____ is accelerated and enhanced by the Internet and the technology that sup
1. _____ is accelerated and enhanced by the Internet and the technology that supports it. A. IPO B. E-commerce C. Merchandising D. M-commerce 2. _____ is a formal business plan th…
1. _____ is(are) the activity(ies) organizations perform in order to reach their
1. _____ is(are) the activity(ies) organizations perform in order to reach their business goals. Estimation Business principles Automation work Making decisions Business processes…
1. _____ refers to a loosely coupled group of people and resources that work tog
1. _____ refers to a loosely coupled group of people and resources that work together as though they were an organization. A) Virtual organization B) World Wide Web C) Private net…
1. ________ allow you to specify the style of your page elements (spacing, margi
1. ________ allow you to specify the style of your page elements (spacing, margins, etc.) separately from the structure of your document. 2. ________ are specified in an individua…
1. ________ are technology-independent business policies that the system must ob
1. ________ are technology-independent business policies that the system must observe above and beyond other analysis and design issues. a. Technology rules b. Business rules c. S…
1. _________ states that performance increase is roughly proportional to square
1. _________ states that performance increase is roughly proportional to square root of increase in complexity. 2. _______ law assumes a program in which a fraction (1- f )of the …
1. __________ are the building blocks of each functional area, e.g., accounts re
1. __________ are the building blocks of each functional area, e.g., accounts receivable (A/R) and accounts payable (A/P) a) IT procedures b) Business processes c) Business strate…
1. _____________ is the ability for a particular method call to perform differen
1. _____________ is the ability for a particular method call to perform different operations at different times? (Points : 4) Hierarchy Polymorphism Inheritance Dynamic Binding 2.…
1. _____________ is the ability for a particular method call to perform differen
1. _____________ is the ability for a particular method call to perform different operations at different times? (Points : 4) Hierarchy Polymorphism Inheritance Dynamic Binding 2.…
1. _____________ is the ability for a particular method call to perform differen
1. _____________ is the ability for a particular method call to perform different operations at different times? (Points : 4) Hierarchy Polymorphism Inheritance Dynamic Binding ..…
1. ______________ invented punched card tabulation to help the U.S. Bureau of th
1. ______________ invented punched card tabulation to help the U.S. Bureau of the Census tally information about tens of millions of residents. 2. A series of inventions led t…
1. ______________ is a value that does not change during the program’s execution
1. ______________ is a value that does not change during the program’s execution. 2. ______________ is a data type that only holds numbers with no fractional component. 3. _______…
1. ___________________ is the term that describes the size of the wires connecti
1. ___________________ is the term that describes the size of the wires connecting two computers in a network. 2. __________________ data is a continuous representation of the inf…
1. __________is a common method of infringement for music and video and involves
1. __________is a common method of infringement for music and video and involves two computers running common software to swap files. 2. Textual URls pointing to a Web site do not…
1. _____situation that occurs when a process is never given the CPU time that it
1. _____situation that occurs when a process is never given the CPU time that it needs to execute. 2. _____ is the System Dispatching Objective that satisfies the algorithm shorte…
1. a Create a named pipe. Open second terminal. Attach a consumer process (for e
1. a Create a named pipe. Open second terminal. Attach a consumer process (for example less or caf) to that pipe. From the first terminal start piping some text there. What do you…
1. a graph position vs time presented in Fig. 1 (described below . Define the mo
1. a graph position vs time presented in Fig. 1 (described below . Define the motion of the cart presented by each part of the graph. AB - ___________________________________…
1. a hacker group hacked into the Bay Area Rapid Transit (BART) system to protes
1. a hacker group hacked into the Bay Area Rapid Transit (BART) system to protest BART’s shut down of wireless communication in some BART stations. Was this a form of hacktivism? …
1. a program will calculate and print the fahrenheit or celsius temperature of a
1. a program will calculate and print the fahrenheit or celsius temperature of a given temperature reading: Input: Temperature entered from keyboard and choice to either calculate…
1. a) A memory unit has 28-bit address lines and 64-bit input/output data lines.
1. a) A memory unit has 28-bit address lines and 64-bit input/output data lines. How many bytes of data can this memory hold? How many words does it contain, and how large is each…
1. a) Add the prototype of a new member function called quadrant to the Point cl
1. a) Add the prototype of a new member function called quadrant to the Point class. This method will return the quadrant in which the point is located. Quadrant numbers are shown…
1. a) Complete the Set ADT by implementing intersect() and difference(). b) Modi
1. a) Complete the Set ADT by implementing intersect() and difference(). b) Modify the Set() constructor to accept an optional variable argument to which a collection of initial v…
Subject
Web development and programming
Use Browse or pick another subject.