Web development and programming
191828 questions • Page 275 / 3837
1. a) Convert decimal rational number 1/6 to the binary form, keep 8-bits in the
1. a) Convert decimal rational number 1/6 to the binary form, keep 8-bits in the binary fraction. b) Convert the binary form of 1/6 to decimal fraction by addition of bit weigh…
1. a) Declare a variable of type int and initialize to 3. b) Declare a variable
1. a) Declare a variable of type int and initialize to 3. b) Declare a variable that stores an array of ints of size 5 and initialize it to the integer 1 to 5 c) Provide the proto…
1. a) Define Scope, as it relates to a project. (5 pts) b) Explain the use of su
1. a) Define Scope, as it relates to a project. (5 pts) b) Explain the use of supporting documents in project scope management. (10 pts) 2. The following table indicates the activ…
1. a) Describe the features and an example of Lossy and Lossless Compression. b)
1. a) Describe the features and an example of Lossy and Lossless Compression. b) Describe the relationship between MAR, Address Decoder and MDR 2. Analyze the fo…
1. a) Explain the role of routers, email servers, firewalls, and authentication
1. a) Explain the role of routers, email servers, firewalls, and authentication servers in addressing the problems associated with DHCP and Network Translation to using network tr…
1. a) G 1 is a context-free grammar with start symbol S 1 , and no other nonterm
1. a) G1 is a context-free grammar with start symbol S1, and no other nonterminals whose name begins with "S." Similarly, G2 is a context-free grammar with start symbol S2, and no…
1. a) In a priority queue (not necessarily a min-heap) with n > 0 nodes, how man
1. a) In a priority queue (not necessarily a min-heap) with n > 0 nodes, how many are leaves? Write one mathematical formula (not a C0 expression) that expresses the number of …
1. a) Is it possible to simulate the function of an OR gate in Logisim using NAN
1. a) Is it possible to simulate the function of an OR gate in Logisim using NAND gates only ? Select one: a. Yes, it's possible using three NAND gates. b. Why should I do that? L…
1. a) Why is the D-Wave quantum processor cooled? Justify your answer. b) At wha
1. a) Why is the D-Wave quantum processor cooled? Justify your answer. b) At what temperature is the quantum processor cooled? How cold is this? c) The D-Wave quantum computer is …
1. a) Write a function called collatz() that takes a number and checks whether i
1. a) Write a function called collatz() that takes a number and checks whether it's even or odd. If it's even, the function should return half the number. If it's odd, it should r…
1. a) Write a function forth type \'a list->\'a that returns the forth element o
1. a) Write a function forth type 'a list->'a that returns the forth element of a list that returns the forth element of a list. Your function need not behave well on lists wit…
1. a) as Encryption conceals of network messages, the ability of intrusion detec
1. a) as Encryption conceals of network messages, the ability of intrusion detection systems to read these packets decreases. some have speculated that all intrusion detection wil…
1. a) b) c) d) e) One of the methods I have created allows me to set thequestion
1. a) b) c) d) e) One of the methods I have created allows me to set thequestion. It is publicvoid setQuestion(StringquestionText). So if I create an instance, q, all i have to do…
1. a, Create an application named ArithmetricMethods whose main() method holds t
1. a, Create an application named ArithmetricMethods whose main() method holds two integer variables. Assign values to the variables. In turn, pass each value to methods named dis…
1. a. According to your textbook (figure 1.11, page 52) the low-end access time
1. a. According to your textbook (figure 1.11, page 52) the low-end access time for SSDs is 25,000 ns, and magnetic disk is 5,000,000 ns. You create a hybrid SSD/hard disk that ca…
1. a. Are internal security threats more dangerous than external security threat
1. a. Are internal security threats more dangerous than external security threats? Why? b. Under what conditions should you consider implementing a honeypot? Under what conditions…
1. a. Create an abstract class named Book. Include a String field for the book\'
1. a. Create an abstract class named Book. Include a String field for the book's title and a double field for the books price. Within the class, include a constructor that require…
1. a. Declare a enum datatype named standingType b. Initialize the list with the
1. a. Declare a enum datatype named standingType b. Initialize the list with the following values: FRESHMAN, SOPHMORE, JUNIOR, SENIOR c. declare a proper enum variable d. write a …
1. a. Design a class named Book that holds a stock number, author, title, price,
1. a. Design a class named Book that holds a stock number, author, title, price, and number of pages for a book. Include methods to get and set the values for each data field. Cre…
1. a. Fill in the table for the Quotient, Divisor and Dividend for each step. Yo
1. a. Fill in the table for the Quotient, Divisor and Dividend for each step. You need to provide the DESCRIPTION of the step being performed (shift left, shift right, sub). The v…
1. a. Interpolate the function sin(x) at 5 Chebyshev points (using both Chebyshe
1. a. Interpolate the function sin(x) at 5 Chebyshev points (using both Chebyshev-Gauss-Lobatto, and Chebyshev-Gauss) over the interval [0; pi/2]. Compare your results to those yo…
1. a. Prove (without MATLAB) that (AB) -1 = B -1 A -1 using the associative law
1. a. Prove (without MATLAB) that (AB)-1 = B-1A-1 using the associative law of matrix multiplication. Hint: multiply the right-hand side of the equation by the inverse of the left…
1. a. University researchers occasionally ask students in a class to participate
1. a. University researchers occasionally ask students in a class to participate in research studies. However, this practice may involve elements of coercion, as students may be…
1. a. What are the ways in which we can keep a check on the number of duplicate
1. a. What are the ways in which we can keep a check on the number of duplicate packets generated due to the Flooding Routing technique? b. Though Flooding is not a very efficient…
1. a. Write an application that displays a menu of three items in a restaurant a
1. a. Write an application that displays a menu of three items in a restaurant as follows: (1) Cheeseburger 3.99 (2) Pepsi 1.50 (3) Chips 1.00 Prompt the user to choose an item us…
1. a. b. Digital Computers (30Pts) What is a digital computer? Explain the opera
1. a. b. Digital Computers (30Pts) What is a digital computer? Explain the operating cycle of a digital computer. (5Pts) Define microprocessor and microcontroller. What are the sy…
1. a...... The difference equation of a discrete time system is given by y(n) +
1. a...... The difference equation of a discrete time system is given by y(n) + 0.7 y(n-1) + 0.8 y(n-2) = x(n) + 2 x(n-1) + 0.5 x(n-2). Determine the transfer function of the disc…
1. a.Write a single assignment statement that assigns to k the 1\'s digit of the
1. a.Write a single assignment statement that assigns to k the 1's digit of the value of j. For example, if j has a value of 235, your assignment statement should end up assigning…
1. a.brieftly discuss two important computer technological development and their
1. a.brieftly discuss two important computer technological development and their societal impacts. b. List and discribe two necessart qualities information shoulf posses. 2. a. Br…
1. a: The function below titled CANDY CLASS has a business rule enforced on set_
1. a: The function below titled CANDY CLASS has a business rule enforced on set_unit_price. Create a similar function that will allow the caller to set the packing price. It must …
1. accept input of three words into a C-string 2. parse the input into three sep
1. accept input of three words into a C-string 2. parse the input into three separate variables 3. change each c-string into a string 4. concatenate all strings together into a si…
1. algorithm 2. proof of correctness. 1 Star Wars In a galaxy far, far away, the
1. algorithm 2. proof of correctness. 1 Star Wars In a galaxy far, far away, the Empire has builtn Death Satellites to attack n planets controlled by the rebels (each satellite wi…
1. all project names 2. unique project locations 3. all works on data 4. all wor
1. all project names 2. unique project locations 3. all works on data 4. all works on data for more than 17 hours 5. all department numbers with a Houston department location 6. a…
1. an interaction of a body with its environment 2. the characteristic of a body
1. an interaction of a body with its environment 2. the characteristic of a body relating a force on the body to its resulting acceleration 3. The ratio of the magnitude of the ne…
1. any error condition or unexpected behavior in a executing program is known as
1. any error condition or unexpected behavior in a executing program is known as an a. exception b. anomaly c. exclusion d. omission 2. most exceptions you will use derive from th…
1. chapter 2: How many different port addresses are possible and list two differ
1. chapter 2: How many different port addresses are possible and list two different ports with their associated processes? 2. chapter 2 draw a fully connected mesh with 11 nodes. …
1. chmod: WARNING: can\'t access prog.cpp chmod: WARNING: can\'t access ans.cpp
1. chmod: WARNING: can't access prog.cpp chmod: WARNING: can't access ans.cpp // Consider the class diagram below. // // +---------------------------------------+ // | class STUFF…
1. chmod: WARNING: can\'t access prog.cpp chmod: WARNING: can\'t access ans.cpp
1. chmod: WARNING: can't access prog.cpp chmod: WARNING: can't access ans.cpp #include <iostream> #include <iomanip> using namespace std; // --------------------------…
1. circuits are often referred to as \"memoryless\" circuits because their outpu
1. circuits are often referred to as "memoryless" circuits because their output depend (A Sequential on their current input and no history of prior inputs is retained. B. Volatile…
1. class rectangleType { public: //Postcondition: length = x; width = y; void se
1. class rectangleType { public: //Postcondition: length = x; width = y; void setLengthWidth(double x, double y); //Output length and width; void print() const; //Calculate and re…
1. code an array using an initializer list that contains the following categorie
1. code an array using an initializer list that contains the following categories from the 2017 Oscars: Best Picture Best Animated Feature Film", "Best Directing" 2. Code a second…
1. command determine whologged in the system 2. command determine processid 3. c
1. command determine whologged in the system 2. command determine processid 3. command transfer file inanfenticated way 4. command to mount an isoima…
1. consider the following processors: Processor Clock rate P1 P2 P3 CPI 4 GHz 2.
1. consider the following processors: Processor Clock rate P1 P2 P3 CPI 4 GHz 2.5 GHz 3 GHz 2.5 a) If the same ISA is used for the three machines. Which machine is faster? Why? b)…
1. creat a list of 10 specific concerns that a consumer might have when consider
1. creat a list of 10 specific concerns that a consumer might have when considering an online-only bank. write a paragraph for each concern that describes how First Online Bank of…
1. create a FICTION table with structure shown in figure 6-29 2. Insert into the
1. create a FICTION table with structure shown in figure 6-29 2. Insert into the FICTION table the book code, book title, publisher code, and price from the BOOK table for only th…
1. create a class called MemoryBoard. a. MemoryBoard will represent a grid of me
1. create a class called MemoryBoard. a. MemoryBoard will represent a grid of memory squares. it needs to track all of the squares on the board, the cars set it's using, the width…
1. create a source file titled lab_fg.c 2. include a comment at the beginning of
1. create a source file titled lab_fg.c 2. include a comment at the beginning of the program including your name, who your lab instructir is, and the day and date. 3. the program …
1. deserialize a Java object that contains data about a movie. The serialized ob
1. deserialize a Java object that contains data about a movie. The serialized object contains a String containing the movie's title, a String containing the name of the movie's di…
1. design the logic deciding whether to use AND or OR logic. write the decision
1. design the logic deciding whether to use AND or OR logic. write the decision statement to identify when a discount should be offered and when a disocunt should not be offered. …
1. double sum = 0; double d; for (d = 0; d < 10; d = d + 0.1 ) { sum = sum + d;
1. double sum = 0; double d; for (d = 0; d < 10; d = d + 0.1 ) { sum = sum + d; } a. The program has a syntax error because the semicolons in the for loop are in …
Subject
Web development and programming
Use Browse or pick another subject.