Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 279 / 3837

1.) Create a function named DD_PROJTOT_SF that determines the total pledge amoun
1.) Create a function named DD_PROJTOT_SF that determines the total pledge amount for a project. Use the function in an SQL statement that lists all projects, displaying project I…
1.) Create a linked list with all the courses(CSIS1000,CSIS1020,CSIS1040,CSIS105
1.) Create a linked list with all the courses(CSIS1000,CSIS1020,CSIS1040,CSIS1050,CSIS2030,CSIS2050,CSIS2060,CSIS2065,FIT1012,FIT 1014,ITEC1020,ENG1030,ENG1020,ENG1021,MATH1020,MA…
1.) Create a new class called Course, with attributes such as FIUCourseName, cre
1.) Create a new class called Course, with attributes such as FIUCourseName, credits, FloridaCourseName, arrayList of preRequisites, and yearLevel. The Course class must implement…
1.) DNA Strands For this assignment you will implement a class that roughly mode
1.) DNA Strands For this assignment you will implement a class that roughly models a DNA Strand. For our purposes, a DNA strand is a sequence of characters and each character in t…
1.) Decimal Binary and Octal : Write a series of functions that convert a decima
1.) Decimal Binary and Octal : Write a series of functions that convert a decimal number into binary and octal. 2.) Binary and Octal Decimal: Write a series of functions that conv…
1.) Define Your Project: Write a one to two page (max) summary develop requireme
1.) Define Your Project: Write a one to two page (max) summary develop requirements for applications for ecommerce sports store business that you envision starting on your own. Le…
1.) Describe the out put for the following sequence of queueoperations: enqueue
1.) Describe the out put for the following sequence of queueoperations: enqueue (5), enqueue (3), .dequeue ( ), enqueue (2), enqueue(8), dequeue( ), dequeue( ), enqueue(9), enqueu…
1.) Describe various virtualization architectures and discuss pro & cons each wi
1.) Describe various virtualization architectures and discuss pro & cons each with specific real-life examples to support your answers. Then explain why virtualization technol…
1.) Design a class named Book that holds a stock number, author, title, price, a
1.) Design a class named Book that holds a stock number, author, title, price, and number of pages for a book. Include a constructor that prompts the user for the data and a toStr…
1.) Draw an arithmetic expression tree that has four external nodes, storing the
1.) Draw an arithmetic expression tree that has four external nodes, storing the numbers 1, 5, 6, and 7 (with each number stored in a distinct external node, but not necessarily i…
1.) Flowchart of your program. (4 points) Printout of your C++ program with a he
1.) Flowchart of your program. (4 points) Printout of your C++ program with a heading comment (Do not forget to add comments within your program). (4 points) Copy of a screenshot …
1.) For the SQL file listed below, provide the correct SQL command for completin
1.) For the SQL file listed below, provide the correct SQL command for completing each query. CREATE TABLE Location (LocationNum DECIMAL (2,0) PRIMARY KEY, LocationName CHAR(25), …
1.) For this problem, you will be getting some intuition for how much faster O(n
1.) For this problem, you will be getting some intuition for how much faster O(n log n) algorithms are compared to O(n^2). Here is an implementation of selection sort for you... p…
1.) Get J# values for projects using at least one part available from supplier S
1.) Get J# values for projects using at least one part available from supplier S1. 1115 : Table E SPJ: Table St +S Smith +S2 Jones S3 Blake SA Clark S5 Adams 10 Paris SI PI IJA 70…
1.) Given int foo [50]; .... what is an equivalent way to represent: & foo [0] f
1.) Given  int foo [50];   .... what is an equivalent way to represent:   & foo [0] foo& foo foo [0] None of the above 2.) Given an array defined as:   int foo [5];  ... t…
1.) How many countries won Gold medals but no other medals? List of countries Ol
1.) How many countries won Gold medals but no other medals? List of countries Olympic Event Gold Silver Bronze Honduras Event 74 Nigeria Tuvalu Denmark Iran Event 79 Burundi Croat…
1.) Implement a class Purse. A purse contains a collection of coins. For simplic
1.) Implement a class Purse. A purse contains a collection of coins. For simplicity, we will only store the coin names in an ArrayList<String>. Supply a method void addCoin(…
1.) In order to sort a 15 element array using a bubble sort algorithm, the syste
1.) In order to sort a 15 element array using a bubble sort algorithm, the system needs to make, at the most, _______ passes of the data 13 14 15 16 2.) If the item being searched…
1.) In this problem, assume a propagation speed of 100 km/hr and that each toll
1.) In this problem, assume a propagation speed of 100 km/hr and that each toll booth takes 30 seconds to service a car. a) (7 points) Suppose the caravan travels 160 km beginning…
1.) In wxPython setting a control location using pos=(x, y) is called _____. abs
1.) In wxPython setting a control location using pos=(x, y) is called _____. absolute positioning base positioning grid positioning relative positioning 2.) Consider the following…
1.) In your own words, what is the difference between Transport Control Protocol
1.) In your own words, what is the difference between Transport Control Protocol (TCP) and User Datagram Protocol (UDP)? Also give some examples of services that use TCP and UDP. …
1.) Integer multiplication can be defines as mult(m,n) = m for n=1 m + mult(m,n-
1.) Integer multiplication can be defines as mult(m,n) = m                            for n=1       m + mult(m,n-1)       for n>1 Write a recursive function that multiplies int…
1.) Interfaces to memory and I/O devices are made through a. Central Switch b. B
1.)     Interfaces to memory and I/O devices are made through a.       Central Switch b.       Buses c.       Data Links d.       All of the Above 2.)     Which of the following c…
1.) Investigate three common vulnerabilities of ICSs and SCADA systems. Examine
1.) Investigate three common vulnerabilities of ICSs and SCADA systems. Examine the vulnerabilities and summarize how you would discover them. 2.) Document how frequently you woul…
1.) Let T be the binary tree a.) Give the out put of algorithm preorderPrint (T,
1.) Let T be the binary tree a.) Give the out put of algorithm preorderPrint (T,T.root( )). b.) Give the out put of algorithm parenPrint(T, T.root( )). c.) Give the out of postord…
1.) Majestic Bank, located in the United States, doesn’t have an online presence
1.) Majestic Bank, located in the United States, doesn’t have an online presence. It wants to launch a Web site where customers can perform all banking transactions online. The pr…
1.) Modify the Brandi\'s Bagel House Application to capture all the items sold f
1.) Modify the Brandi's Bagel House Application to capture all the items sold for each transaction. You will create an EDI 850 outfile transaction segment for each transaction. Yo…
1.) Name at least four different application layer protocols other than HTTP. Fo
1.) Name at least four different application layer protocols other than HTTP. For each, describe the purpose of the protocol, and give a brief overview of the methodology of its o…
1.) Please write a SELECT STATEMENT FOR each of the following queries. a.) Get t
1.) Please write a SELECT STATEMENT FOR each of the following queries. a.) Get the total number of projects supplied by supplier S1. b.) Get the total quantity of part1 supplied b…
1.) Regex Pattern in HTML5- Define a pattern which recognizes text that consists
1.) Regex Pattern in HTML5- Define a pattern which recognizes text that consists only of a's and b's like aabbbabbabababba or bbbabbabbbba etc. 2.) Write an SQL statement in PHP t…
1.) Rewrite prob1 so that it uses >>= instead of “do” notation. Please use >>= ,
1.) Rewrite prob1 so that it uses >>= instead of “do” notation. Please use >>= , not >> 2.) Rewrite prob2 so it uses “do” notation 3.) Modify prob3 so it does th…
1.) Row two of this table proves that this argument is invalid. True or False? 2
1.) Row two of this table proves that this argument is invalid. True or False? 2.) Row 4 of this table proves that this argument is invalid. True or False? 3.) Row 7 of this truth…
1.) Suppose you have an int variable and you want to know how many digits are in
1.) Suppose you have an int variable and you want to know how many digits are in it. You recall that the String class a length() method that you could use if you had a String repr…
1.) Take in a word from a user 2.) Create a character stack that will store the
1.) Take in a word from a user 2.) Create a character stack that will store the word. Use a for loop o push each letter onto the stack. 3.) Write a method that takes in the Stack …
1.) Take in a word from the User 2.) create a character stack that will store th
1.) Take in a word from the User 2.) create a character stack that will store the word. Use a for loop to push each letter onto the stack. 3.) Write a method that takes in the sta…
1.) Tell me about Node.js in you own words (don’t just copy it). Cover the follo
1.) Tell me about Node.js in you own words (don’t just copy it). Cover the following What is it? How is it different from Javascript? Give me three examples where it is/has been u…
1.) The DoGood Donor organization decided to reduce SQL join activity in its app
1.) The DoGood Donor organization decided to reduce SQL join activity in its application by eliminating the DD_STATUS table and replacing it with a function that returns a status …
1.) The idea of a digital divide is becoming a concern as technology moves expon
1.) The idea of a digital divide is becoming a concern as technology moves exponentially forward. Explain the concept of the “Digital Divide”. What Implications does this have for…
1.) The value of can be estimated using an infinite sum and the “Leibniz Formula
1.) The value of can be estimated using an infinite sum and the “Leibniz Formula for Pi,” which states: Therefore, your calculated value of will get closer to “true” the more term…
1.) Unix/linux commands were designed following the \"do-one-thing-well\" princi
1.) Unix/linux commands were designed following the "do-one-thing-well" principle. Explain how unix commands are designed to fit this method. Give three examples of commands that …
1.) Use the CSS to configure a table that has a border around both the entie tab
1.) Use the CSS to configure a table that has a border around both the entie table and the table cells. Write the HTML to creat a table with three rows and two colums. The cell in…
1.) Using the attached catalog.txt file, create a program that begins by loading
1.) Using the attached catalog.txt file, create a program that begins by loading the file onto an arraylist of Album classes called Catalog. Each Album class consists of 3 attribu…
1.) Using the ch07_saleco database write a T-SQL query to display the customer c
1.) Using the ch07_saleco database write a T-SQL query to display the customer code and customer last name from the customer table where a record is returned from the invoice tabl…
1.) What are the advantages of flash memory over hard disk storage? What are the
1.) What are the advantages of flash memory over hard disk storage? What are the advantages of hard disk over flash memory storage? What are the advantages of both hard disk and f…
1.) What are the differences in the function calls between the four member funct
1.) What are the differences in the function calls between the four member functions of the Shape class below? void Shape::member(Shape s1, Shape s2); void Shape::member(Shape *s1…
1.) What are the pros and cons of languages that distinguish between capital and
1.) What are the pros and cons of languages that distinguish between capital and lowercase lettersin user-defined names? 2.)Suppose that the equal_lists function (page 49 of Sebes…
1.) What does the following snippet print? int temperature = 78; if (temperature
1.) What does the following snippet print? int temperature = 78; if (temperature < 60) { printf("The temperature is cold"); } if (temperature > 90) { printf("The temperature…
1.) What is a Layer 3 device that receives an electrical signal in one port, int
1.) What is a Layer 3 device that receives an electrical signal in one port, interprets the bits, decodes the logical address and makes a filtered, forwarding decision about the p…
1.) What is the term used for each of the layers in the OSI Model? A.) Protocols
1.) What is the term used for each of the layers in the OSI Model? A.) Protocols B.) Interfaces C.) Processes D.) Methods 2.) Which of the layers would be resposible for making su…
1.) What is the tightest asymptotic time complexity for this algorithm? 2.) Give
1.) What is the tightest asymptotic time complexity for this algorithm? 2.) Give at least TWO advantages for this algorithm 3.) Give at least THREE drawbacks for this algorithm Th…