Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 283 / 3837

1.A full binary tree is a tree whose leaves are all at the same level, and every
1.A full binary tree is a tree whose leaves are all at the same level, and every node that is not a leaf has exactly two nodes under it. The drawing below is a full binary tree wi…
1.A library function that can find one string inside another is A.strstr B.strse
1.A library function that can find one string inside another is A.strstr B.strsearch C.strfind D.strcmp E.None of these 2.Which of the following is an example of a C++ primitive d…
1.A line includes a _________ that identifies which particular block is currentl
1.A line includes a _________ that identifies which particular block is currently being stored. Select one: a. cache (this one is incorrect) b. hit c. tag d. locality 2.RAID level…
1.A marble rolls on the track shown in the figure below, with h B = 23 cm and h
1.A marble rolls on the track shown in the figure below, with hB = 23 cm and hC = 12 cm. If the marble has a speed of 2.3 m/s at point A, what is its speed at points B and C? vB =…
1.A new thread begins its life cycle by transitioning to the __________ state. r
1.A new thread begins its life cycle by transitioning to the __________ state. runnable. waiting. terminated. new. 2: The preferred means of creating multithreaded Java applicatio…
1.A pointer may be initialized with A. the value of an existing variable of the
1.A pointer may be initialized with A. the value of an existing variable of the same type B. the address of an existing variable of the appropriate type. C. The value of a floatin…
1.A processor has 8-bit data bus width. How many times does it needed to read a
1.A processor has 8-bit data bus width. How many times does it needed to read a 28-bit data into the processor? What if the processor has a 32-bit data bus? 2.USB is the most comm…
1.A report written in the indirect order _____. first states its main point and
1.A report written in the indirect order _____. first states its main point and then supplies the supporting information is especially beneficial for readers who are in a hurry to…
1.A return statement without any value can be used in _______. 2. . If a method
1.A return statement without any value can be used in _______. 2. . If a method does not contain any parameters, you must invoke it with a pair of empty parentheses. True False 3.…
1.A router R has forwarding table: 6 pts Network/Mask Next_Hop 128.235.223.0/24
1.A router R has forwarding table: 6 pts          Network/Mask                                 Next_Hop          128.235.223.0/24                                 deliver directly …
1.A subclass of a Swing component can customize the way the compenent is rendere
1.A subclass of a Swing component can customize the way the compenent is rendered visually by overriding which of these methods? Select one: a. public void repaint( ); b. public v…
1.A throw block is where A) an exception may be thrown B) where execution contin
1.A throw block is where A) an exception may be thrown B) where execution continues after an exception C) a catch takes place D) an exception is handled 2.Which function declarati…
1.A user need to know which customer was referred by 1006. List the last name wi
1.A user need to know which customer was referred by 1006. List the last name with the first character capitalized and the rest of the last name lower case. List the first name in…
1.A white space detected during numeric input ___________. A. is ignored B. term
1.A white space detected during numeric input ___________. A. is ignored B. terminates the reading of the current numeric input value C. causes the program to skip to the next lin…
1.A(n) ____ is a constantly updated commentary on a Web page. For example, you c
1.A(n) ____ is a constantly updated commentary on a Web page. For example, you could create one about what it is like to attend college. a.blog b.wiki c.group d.chat 2. A(n) ____ …
1.A/an ____________________ advances time in arbitrary time steps between succes
1.A/an ____________________ advances time in arbitrary time steps between successive events. This is the type of simulation most often used for system or process analyses. One or …
1.ADTs should be in separate files because Select one: a. this promotes informat
1.ADTs should be in separate files because Select one: a. this promotes information hiding. b. this promotes data abstraction. c. this promotes software reusability. d. this resul…
1.Abby, Bob, Carl, Doug, Elliot, Frank, and Grace are waiting in line. How many
1.Abby, Bob, Carl, Doug, Elliot, Frank, and Grace are waiting in line. How many orderings are there? 2.Abby, Bob, Carl, Doug, Elliot, Frank, and Grace are waiting in line. Abby an…
1.Addition Web sites on the same Windows server: differences between additional
1.Addition Web sites on the same Windows server: differences between additional web sites and the default web sit. 2.Addition Web sites on the same Linux server: differences betwe…
1.Address of the next instruction can be obtained from Choose one answer. a. Opc
1.Address of the next instruction can be obtained from Choose one answer. a. Opcode b. Program counter c. Instruction queue d. Any of the above 2.Memory management operations are …
1.An experiment picked 100 high school students from Springfield area. Can you a
1.An experiment picked 100 high school students from Springfield area. Can you assume that the height of these 100 students be a normal distribution? Why? 2.An experiment surveyed…
1.An imaginary computer has four data registers. (R0 to R3), 1024 words in memor
1.An imaginary computer has four data registers. (R0 to R3), 1024 words in memory, and 16 different instructions (add, subtract, etc). What is the minimum size of an instruction i…
1.Another name for member function of a class is_______ 2. Another name for data
1.Another name for member function of a class is_______ 2. Another name for data member of a class is_____ 3. A/An______function is the mechanism used to generate multiple functio…
1.Answer the following questions: 1.1 Which multiple access methods are controll
1.Answer the following questions:                 1.1 Which multiple access methods are controlled access protocols? a. CSMA/CD and CSMA/CA b. FDM and TDM c. Reservation, polling …
1.Answer the questions below about this function prototype: double coinTotal (do
1.Answer the questions below about this function prototype: double coinTotal (double coinValue, int nCoins); What is the type of the return value? How many parameters does the fun…
1.Are the following true or false? a.)For PIC 18F, we can have two integers a an
1.Are the following true or false? a.)For PIC 18F, we can have two integers a and b with 0 < a < 128 and 0 < b < 128, but sum a + b > 128 (called overflow). Explain…
1.Assume 64K of real storage (16-bit addresses) and 1M virtual storage (20-bit a
1.Assume 64K of real storage (16-bit addresses) and 1M virtual storage (20-bit addresses) The virtual addresses have the following format. page no. displacement 7-bits 13-bits pag…
1.Assume proper includes have been executed, but no using directive or declarati
1.Assume proper includes have been executed, but no using directive or declaration. Write a definition of an iterator for a vector of ints that is initialized to point to the firs…
1.Assume proper includes have been executed, but no using directive or declarati
1.Assume proper includes have been executed, but no using directive or declaration. Write a definition of an iterator for a vector of ints that is initialized to point to the firs…
1.Assume that size is an int variable which is storing a value between 0 and 90
1.Assume that size is an int variable which is storing a value between 0 and 90 inclusive. a. Assume that the “else” part on if-else statements is no longer valid in Java. Convert…
1.Assume the number 32 is on the data lines and the number 20 is on the address
1.Assume the number 32 is on the data lines and the number 20 is on the address bus. At the same time the WRITE signal activated. Explain what CPU and memory will do. 2.Assume the…
1.Assume we have a 16-bit Arithmetic Logic Unit. List the inputs and outputs in
1.Assume we have a 16-bit Arithmetic Logic Unit. List the inputs and outputs in binary for the ALU if we are using it to determine if X = 2510 < Y = 3210. Remember: the ALU has…
1.Assume you have created a mechanical arm that can hold a pen. The arm can perf
1.Assume you have created a mechanical arm that can hold a pen. The arm can perform the following tasks: >>Lower the pen to a piece of paper. >>Raise the pen from the …
1.Based on previous discussions in class/online about FISMA, HIPPA, and Sarbanes
1.Based on previous discussions in class/online about FISMA, HIPPA, and Sarbanes Oxley (SOX) security controls, answer the following questions: a.Your IT enterprise is comprised o…
1.Briefly describe the difference between primary and secondary care. 2. Explain
1.Briefly describe the difference between primary and secondary care. 2. Explain why it is important for hospitals to monitor and control length of stay. 3. Briefly describe what …
1.Build a class called “TestExceptions.java”.Put the following code in the main
1.Build a class called “TestExceptions.java”.Put the following code in the main method. int myArr = new int[10]; int x,y,z; x=0; y=10; z=y/x; myArr[10] = 0; Compile and run this c…
1.Can an Object variable refer to a String? To a Location? To an IntArrayBag? 2.
1.Can an Object variable refer to a String? To a Location? To an IntArrayBag? 2.Write some code that creates a Character wrapper object called example, initializing with the char …
1.Can any aspect of nursing wisdom be automated? 2. The chapter states that rese
1.Can any aspect of nursing wisdom be automated? 2. The chapter states that research will be invaluable in building information systems to support expert healthcare practitioners …
1.Change the representation for the ProduceItems in the database from an array t
1.Change the representation for the ProduceItems in the database from an array to a linked list of ProduceItems. The linked list should have a first and last pointer and a length …
1.Change the representation for the ProduceItems in the database from an array t
1.Change the representation for the ProduceItems in the database from an array to a linked list of ProduceItems. The linked list should have a first and last pointer and a length …
1.Chuck downloaded, installed, and ran a Python program. To Chuck\'s dismay, the
1.Chuck downloaded, installed, and ran a Python program. To Chuck's dismay, the program did not seem to be doing anything at all -- not even terminating. What could be a reason fo…
1.Code the following: a. 10% is stored in a variable called discount when the cu
1.Code the following: a. 10% is stored in a variable called discount when the customer is military; otherwise, it stores 0%. Code this if … else control structure using the condit…
1.Compare linear search to binary search as algorithms for searching records in
1.Compare linear search to binary search as algorithms for searching records in a Java program. Describe each one. When would you use each of them? What is the "bigO" complexity o…
1.Consider Dekker\'s algorithm, written for an arbitrary number of processes by
1.Consider Dekker's algorithm, written for an arbitrary number of processes by changing the statement executed when leaving the critical section from turn = 1 - i //i.e. P0 sets t…
1.Consider a byte-addressable RAM for which memory addresses are 24 bits long. a
1.Consider a byte-addressable RAM for which memory addresses are 24 bits long. a.What is the capacity of RAM? In other words, what is the maximum number of bytes addressable? Expr…
1.Consider a virtual memory system that can address a total of 2^50 bytes. You h
1.Consider a virtual memory system that can address a total of 2^50 bytes. You have unlimited hard drive space, but are limited to only 2 GB of semiconductor (physical) memory. As…
1.Consider additional requirements and technology to further complicate your ana
1.Consider additional requirements and technology to further complicate your analysis of an Automated Teller Machine (ATM) design:         a)Use eye-tracker data to further analyz…
1.Consider collaboration as one of the social IT categories in which Facebook, L
1.Consider collaboration as one of the social IT categories in which Facebook, LinkedIn, blogs, and Twitter are used to extend the reach of stakeholders and employees. Determine a…
1.Consider the IEEE 754 single precision floating point number representation. a
1.Consider the IEEE 754 single precision floating point number representation. a.Determine the 32 bit pattern that represents the smallest normalized positive number that can be r…
1.Consider the file below: -bash-3.2$ cat info 012-34-5678 Ambercrombie, Al 01/0
1.Consider the file below: -bash-3.2$ cat info 012-34-5678          Ambercrombie, Al      01/01/72          555-1111 123-45-6789          Barton, Barbara          02/02/73        …