Web development and programming
191828 questions • Page 281 / 3837
1.. Theworsto aseoccurinlinearsearch algorithmwhen A. Item is somewhere in the m
1.. Theworsto aseoccurinlinearsearch algorithmwhen A. Item is somewhere in the middle of the B. Item is not in the array at all C. Item is the last element in the array D, Item is…
1... How many times will the Bird class default constructor be called in the fol
1... How many times will the Bird class default constructor be called in the following declarations: Bird Parrot[5]; Select one: a. 0 b. 1 c. 5 d. 6 2... Which of the follow will …
1... Write a Java method with a one-character parameter that returns the paramet
1... Write a Java method with a one-character parameter that returns the parameter shifted one letter to the right ('A' becomes 'B', 'B' becomes 'C', etc.) if it is a capital lett…
1.... Which of the following functions correctly passes in a constant pass-by-va
1.... Which of the following functions correctly passes in a constant pass-by-value vector of integers: Select one: a. void myFunction(const vector<int> nums) b. void myFunc…
1....... You are to write a program which will 1. Display an appropriate prompt.
1....... You are to write a program which will 1. Display an appropriate prompt. 2. input a valid base-16 integer (0 - FFFF) from the keyboard 3. convert the characters as they ar…
1..How do you input or output a C-style string? What kinds of tools are availabl
1..How do you input or output a C-style string? What kinds of tools are available to work with C-style strings? Show some examples of using those tools! 2.Discuss how C style stri…
1..How many total elements are in an array with 4 rows and 3 columns? Select one
1..How many total elements are in an array with 4 rows and 3 columns? Select one: a. 4 b. 6 c. 12 d. 16 2.. Which statement is equivalent to the following code? if (x > 4) { …
1..Which statement would store a user-entered number into a variable named numQu
1..Which statement would store a user-entered number into a variable named numQuiz? Select one: a. cin >> numQuiz b. cin << numQuiz; c. cout << numQuiz ; d. cin …
1.0 Design a Ship class that has the following members: 1.1 A field for the name
1.0 Design a Ship class that has the following members: 1.1 A field for the name of a ship (a string) 1.2 A field for the year that ship was build (a string) 1.3 A constructor and…
1.0 Loops Westerm New A England the 105 University The wishes to award a player
1.0 Loops Westerm New A England the 105 University The wishes to award a player based upon the highest average for year. the league keeps records the players in an array. Write th…
1.0 Loops Westerm New A England the 105 University The wishes to award a player
1.0 Loops Westerm New A England the 105 University The wishes to award a player based upon the highest average for year. the league keeps records the players in an array. Write th…
1.0 Overview Madame Pince, the head librarian at Hogwarts has expressed an inter
1.0 Overview Madame Pince, the head librarian at Hogwarts has expressed an interest in the new "Computational Magic" to Professor Dumbledore and has asked if it would be possible …
1.0 Overview Pointers, Structures, and Classes are the building block of every p
1.0 Overview Pointers, Structures, and Classes are the building block of every piece of software written in C/C++. This programming assignment provides a basic introduction to the…
1.1 A generic checksum algorithm The checksum algorithm that you will implement
1.1 A generic checksum algorithm The checksum algorithm that you will implement requires a key, and is illustrated in Figure 2. The left most bit of the key is always a 1. If the …
1.1 A speaker connected to a computer is considered as a) CPU (b) Memory e) Inpu
1.1 A speaker connected to a computer is considered as a) CPU (b) Memory e) Input id Output 12 MOV AL3 :The instruction is equivalent to MOV AL )OFCh c) OFEh; a OFFh 1.3 PUSH [BXI…
1.1 Add members to this family. Please pay close attention when adding these mem
1.1 Add members to this family. Please pay close attention when adding these members, spelling counts and all letters should be lowercase. It may help to construct a family tre…
1.1 Beginning with the computing core and moving to the complete system and its
1.1 Beginning with the computing core and moving to the complete system and its environment, the chapter identified a hierarchy of views of an embedded system. Please identify an…
1.1 Calculate Factorial Write a function that calculates factorial of a number.
1.1 Calculate Factorial Write a function that calculates factorial of a number. Factorial function should accept integer number n as input and return the factorial of a number. Pr…
1.1 Define what is Cyclomatic complexity? What does this software metric mean? 1
1.1 Define what is Cyclomatic complexity? What does this software metric mean? 1.2 Code coverage is commonly used in software testing. It is one consideration in the safety certif…
1.1 For your first Visual Basic exercise, you must first complete the Hello Worl
1.1 For your first Visual Basic exercise, you must first complete the Hello World project. Then add buttons and event procedures to display the “Hello World” message in two more l…
1.1 In this sequence of problems we practice recursion by abandoning our relianc
1.1 In this sequence of problems we practice recursion by abandoning our reliance on iteration. We resolve to solve a sequence of problems without using while or for loops. Instea…
1.1 Loading an image The javax.imageio.ImageIO utility class can read various im
1.1 Loading an image The javax.imageio.ImageIO utility class can read various image formats, including png and jpg. It returns a BufferedImage object. BufferedImage image = ImageI…
1.1 Purpose of this document This document is intended to guide development of (
1.1 Purpose of this document This document is intended to guide development of (Alumni Management System Project)project name. It will go through several stages during the course …
1.1 Several Super Markets, Hyper Stores, Shops or Grocery Stores charge customer
1.1 Several Super Markets, Hyper Stores, Shops or Grocery Stores charge customers with different prices for the same product. For example, a customer who has a “loyalty card” pays…
1.1 Topic The topic of this project is to create a system based on Ethereum for
1.1 Topic The topic of this project is to create a system based on Ethereum for playing a lottery. You will create an Ethereum smart contract and one or more Python programs to in…
1.1 Which of the following overloaded assignment operators should be used if our
1.1 Which of the following overloaded assignment operators should be used if our intention is to place the two Robots into separate collections, while still referring to the same …
1.1 Which of the following statements about bagging is false? a. Bagging combine
1.1 Which of the following statements about bagging is false? a. Bagging combines several models b. Bagging generally reduces variance and increases model stability c. Bagging oft…
1.1 Which question is best answered with a classification model? a. What charact
1.1 Which question is best answered with a classification model? a. What characteristics describe a person who purchases video games? b. What is the average salary of a high schoo…
1.1 [15 points] Using the assembly language of the accumulator machine (tiny mac
1.1 [15 points] Using the assembly language of the accumulator machine (tiny machine), write a program to evaluate the following expression: a = b * c * d; 1.2 [10 points] Assumin…
1.1) An online web search on \"programming languages\" willyeild links to major
1.1) An online web search on "programming languages" willyeild links to major information sources for all the majorprogramming languages, past and present. For each of the followi…
1.1) In this lab, you will implement a “guess your name” game where the computer
1.1) In this lab, you will implement a “guess your name” game where the computer finds a name in a sorted list of names. The computer will use this method to “guess” your last nam…
1.1) The bytes inside a TCP sender\'s sliding window A) have been received, ackn
1.1) The bytes inside a TCP sender's sliding window A) have been received, acknowledged and consumed B) can’t be sent yet C) can be sent or have been sent but not yet ack…
1.1) There are numerous opportunities for error in any program, many times in pl
1.1) There are numerous opportunities for error in any program, many times in places that seem too simple to require close attention. What do you think the following program is su…
1.1) Which of the following are block tags? Choose all b) chlocks le None of the
1.1) Which of the following are block tags? Choose all b) chlocks le None of the above (1.2) Which tag is the most appropniate container for a lst ef mavigation links to internal …
1.1. Assume you have a source alphabet that includes the 5 symbols {a, b, c, d,
1.1. Assume you have a source alphabet that includes the 5 symbols {a, b, c, d, (eof)}, and that your table is initialized with these symbols. Encode the following sequence using …
1.1. Define the following terms: data, database, DBMS, database system, database
1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive databa…
1.1. In an Ethernet network, which of the following are true: Which of the follo
1.1. In an Ethernet network, which of the following are true: Which of the following are true? a) Repeater uses protocols to communicate with one another to determine the best rou…
1.1. Multiplication Write a multiplication subroutine that takes two values and
1.1. Multiplication Write a multiplication subroutine that takes two values and multiplies them together. The two input values should be stored in R1 and R2 before multiplication …
1.1.____ is a set of rules for exchanging data over the Web 2.____ was developed
1.1.____ is a set of rules for exchanging data over the Web 2.____ was developed to enable Web authors to implement interactive content on Web sites, such as to animate an item, o…
1.10 (10 pts) For each of the following examples, determine whether this is an e
1.10 (10 pts) For each of the following examples, determine whether this is an embedded system, explaining why or why not. if not give explaination A kiosk in the UH library with …
1.10110 is ________ in decimal assuming unsigned binary representation. 2. 35 de
1.10110 is ________ in decimal assuming unsigned binary representation. 2. 35 decimal is _________ in unsigned binary representation 3.Convert the following number from decimal …
1.11 [20/20/20] In a server farm such as that used by Amazon or eBay, a single f
1.11 [20/20/20] In a server farm such as that used by Amazon or eBay, a single failure does not cause the entire system to crash. Instead, it will reduce the number of requests th…
1.12 Ch 1 Warm up: Basic output with variables (Python 3) This zyLab activity pr
1.12 Ch 1 Warm up: Basic output with variables (Python 3) This zyLab activity prepares a student for a full programming assignment. Warm up exercises are typically simpler and wor…
1.15 [10/10/20/20] Your company has just bought a new 22-core processor, and you
1.15 [10/10/20/20] Your company has just bought a new 22-core processor, and you have been tasked with optimizing your software for this processor. You will run four applications …
1.15 [5] When a program is adapted to run on multiple processors in a mul
1.15 [5] <§1.8> When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comprised of computing time and t…
1.15 [5] When a execution time on each processor is comprised of its fair share
1.15 [5] When a execution time on each processor is comprised of its fair share of the computing time and the additional overhead time required to "lock" critical shared sections …
1.160 Pts] Programming Question: In this problem you will be comparing the runni
1.160 Pts] Programming Question: In this problem you will be comparing the running time of merge sort, quick sort and selection sort algorithms a) Frist, develop three C++C method…
1.1Login, passwords, shell and prompt Login to the system. Read the man page for
1.1Login, passwords, shell and prompt Login to the system. Read the man page for script Initiate a script named lab1pt1, and use the following commands: date whoam…
1.2 Class PointXY class PointXY { public: PointXY() { x = 0; y = 0; } void set(d
1.2 Class PointXY class PointXY { public: PointXY() { x = 0; y = 0; } void set(double a, double b) { x = a; y = b; } double getx() const { return x; } double gety() const { return…
1.2 [15/10] Assume—as in the Amdahl’s Law Example on page 41—that we make
1.2 [15/10] <1.6> Assume—as in the Amdahl’s Law Example on page 41—that we make an enhancement to a computer that improves some mode of execution by a factor of 10. Enhanced…
Subject
Web development and programming
Use Browse or pick another subject.