Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 285 / 3837

1.Download the following class source files. ? CircularDoublyLinkedListTest.java
1.Download the following class source files. ? CircularDoublyLinkedListTest.java ? CircularDoublyLinkedList.java (the only source file that you must change!) ? DoublyNode.java ? E…
1.Each repetition of a loop is known as a(n)________. 2.A loop that evaluates it
1.Each repetition of a loop is known as a(n)________. 2.A loop that evaluates its test expression before each repetition is a(n) _______ loop. 3.A loop that evaluates its test exp…
1.Each repetition of a loop is known as a(n)________. 2.A loop that evaluates it
1.Each repetition of a loop is known as a(n)________. 2.A loop that evaluates its test expression before each repetition is a(n) _______ loop. 3.A loop that evaluates its test exp…
1.Each repetition of a loop is known as a(n)________. 2.A loop that evaluates it
1.Each repetition of a loop is known as a(n)________. 2.A loop that evaluates its test expression before each repetition is a(n) _______ loop. 3.A loop that evaluates its test exp…
1.Each repetition of a loop is known as a(n)________. 2.A loop that evaluates it
1.Each repetition of a loop is known as a(n)________. 2.A loop that evaluates its test expression before each repetition is a(n) _______ loop. 3.A loop that evaluates its test exp…
1.Evaluate the following: a) 18 - 3 + 6 b) 30 % 12 + 56 - 35 / 5 * 8 c) 14 - 4 %
1.Evaluate the following: a) 18 - 3 + 6 b) 30 % 12 + 56 - 35 / 5 * 8 c) 14 - 4 % 11 d) 18.0 + 5.0 * 3.0 / 6.0 2. Given int x = 3; int y = 18; double z = 3.5; and double w = 2.0; e…
1.Explain how encryption can be used to provide confidentiality, integrity, auth
1.Explain how encryption can be used to provide confidentiality, integrity, authenticity, and non-repudiation. 2.What is digital signature? Describe the signing and verifying proc…
1.Explain the pointer data type and pointer variables 2.Explore how to declare a
1.Explain the pointer data type and pointer variables 2.Explore how to declare and manipulate pointer variables 3.Use the address of operator and the dereferencing operator to man…
1.Explain the pointer data type and pointer variables 2.Use the address of opera
1.Explain the pointer data type and pointer variables 2.Use the address of operator and the dereferencing operator to manipulate dynamic variables 3. Explain how pointer arithmeti…
1.Explain the purpose of MIS and give at least two applications where MIS can be
1.Explain the purpose of MIS and give at least two applications where MIS can be used. 2.Identify and elaborate on ethical issues related to e-commerce. Give examples. 3. These ar…
1.Explain what a modification problem is. What are the three possible types of m
1.Explain what a modification problem is. What are the three possible types of modification problems? Use the following spreadsheet segment to answer the next three questions: Gir…
1.Explain what an information security blueprint is, identify its major componen
1.Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program 2.Discuss how an organization inst…
1.Explain what each instruction in the following procedure does. void get_table(
1.Explain what each instruction in the following procedure does. void get_table(vector<vector <double> >& table) { int rows = table.size(); for (int r = 0; r < …
1.Fill it with buttons, each containing a description indicating which question
1.Fill it with buttons, each containing a description indicating which question it will answer. Each button will answer only one of the questions (3A, 3B, 3C, 4A, 4B, 4C and 4D). …
1.Find the average cost of treatment for each type of pet. 2.List the name (firs
1.Find the average cost of treatment for each type of pet. 2.List the name (first and last) of every pet owner who owns more than one pet. 3.List the name of every drug and its cu…
1.Finding a row where every entry is \'a\' in a 2-D array. Create an algorithm t
1.Finding a row where every entry is 'a' in a 2-D array. Create an algorithm to solve the problem Identify the factors that would influence the running time, and which can be know…
1.Fix the problem by implementing the Comparable interface in BankAccount. The c
1.Fix the problem by implementing the Comparable interface in BankAccount. The class header needs to specify that we are implementing Comparable interface.BankAccount already impl…
1.Following code will result in: int num = 5/0; Compilation error: Divisions mus
1.Following code will result in: int num = 5/0; Compilation error: Divisions must be in a try block 2. Assume a, b, and c have been defined to be integer variables. Which of the f…
1.Following the instructions in Class Notes How Tos How to import Java source co
1.Following the instructions in Class Notes How Tos How to import Java source code (.java) files into a NetBeans project on this Isidore site: i.create a new empty NetBeans projec…
1.Following the instructions in Class Notes How Tos How to import Java source co
1.Following the instructions in Class Notes How Tos How to import Java source code (.java) files into a NetBeans project on this Isidore site: i.create a new empty NetBeans projec…
1.For IEEE 754 single precision floating point, what is the number, as written i
1.For IEEE 754 single precision floating point, what is the number, as written in binary scientific notation, whose hexadecimal representation is: B350 0000 ____________ 2.For IEE…
1.For a particular project the customer does not have a clear idea on the softwa
1.For a particular project the customer does not have a clear idea on the software system that needs to be buit. There is a great need to clarify the details of the requirements b…
1.For each of the following kinds of errors, define the error type and give an a
1.For each of the following kinds of errors, define the error type and give an actual occurrence of an error of that type: data-entry error, data-retrieval error, software bug. 2.…
1.For each pair a, b of integers, determine whether a | b. If a | b, then find a
1.For each pair a, b of integers, determine whether a | b. If a | b, then find an integer c such that b = ac. a) a = 7 and b = -70 b) a = 14 and b = 0 c) a = 1 and b = 10 2. Give …
1.For each statement below, say whether it applies to TCP, UDP, both, or neither
1.For each statement below, say whether it applies to TCP, UDP, both, or neither (2 pts) a._________     Uses source and destination protocol ports in the header b._________      …
1.For the PIC18F452, how many bits represent an “unsigned char” data type? 2. De
1.For the PIC18F452, how many bits represent an “unsigned char” data type? 2. Describe the DATA memory structure of the PIC18F452. What is a bank?How many banks are there? How man…
1.From the /etc/passwd file, provide user ID of root, its home directory, and th
1.From the /etc/passwd file, provide user ID of root, its home directory, and the initial program the system runs for root 2.The /etc/passwd file contains login names used by the …
1.Given a list of integers, write Python code to create a new list with same num
1.Given a list of integers, write Python code to create a new list with same number of elements as the original list such that each integer in the new list is the sum of its neigh…
1.Given a list of integers, write Python code to create a new list with same num
1.Given a list of integers, write Python code to create a new list with same number of elements as the original list such that each integer in the new list is the sum of its neigh…
1.Given int *i = &some_val; How would I change the value of some_val to 55 using
1.Given int *i = &some_val; How would I change the value of some_val to 55 using the pointer i? i = &55; i = 55; *i = 55; &i = 55; 2.Given int *i = &some_val; int …
1.Given that the stack is initially empty. What will it contain after these inst
1.Given that the stack is initially empty. What will it contain after these instructions? (starting with the top)        BiPush 1        BiPush 2        DUP        BiPush 4       …
1.Given the following characteristics for a magnetic disk pack with 10 platters
1.Given the following characteristics for a magnetic disk pack with 10 platters yielding 18 recordable surfaces (not using the top and bottom surfaces): Rotational speed = 13 ms  …
1.Given the following characteristics for a magnetic tape using linear recording
1.Given the following characteristics for a magnetic tape using linear recording as described in this chapter: Density = 1600 bpi Speed = 1500 inches/second          Size = 2400 f…
1.Given the following declarations, evaluate the boolean expressions labelled a-
1.Given the following declarations, evaluate the boolean expressions labelled a-f below as either true or false: (Section 3.1-3.2) int age = 19; double weight = 180.0; int length …
1.Given the following function, how would you insert it into the main function (
1.Given the following function, how would you insert it into the main function (int main()) using c++ language. The function should be a case within a switch statement. float comp…
1.Given the variables temperature and humidity, write an expression that evaluat
1.Given the variables temperature and humidity, write an expression that evaluates to true if and only if the temperature is greater than 90 and the humidity is less than 10 2. Gi…
1.Given three int variables that have been declared and given values , areaCode,
1.Given  three int variables  that have been declared  and given  values , areaCode, exchange, and lastFour, write a String  expression  whose value  is the String  equivalent of …
1.Given two relation schema with referential integrity constraints as follows, S
1.Given two relation schema with referential integrity constraints as follows, Schema: EMPLOYEE(SSN, NAME, AGE, SALARY, SUPERSSN, DNO) DEPARTMENT(DNUMBER, DNAME, MGRSSN, MGRSTARTD…
1.Grading this diagram above according to these criteria 2) List at least one sy
1.Grading this diagram above according to these criteria 2) List at least one syntax error: incorrect use of symbols and/or an error from the diagrams AND how to correct it (.5%) …
1.Grading this diagram above according to these criteria 2) List at least one sy
1.Grading this diagram above according to these criteria 2) List at least one syntax error: incorrect use of symbols and/or an error from the diagrams AND how to correct it (.5%) …
1.Grading this diagram above according to these criteria 2) List at least one sy
1.Grading this diagram above according to these criteria 2) List at least one syntax error: incorrect use of symbols and/or an error from the diagrams AND how to correct it (.5%) …
1.Has the increased reliance on technology over the decades impeded the value ph
1.Has the increased reliance on technology over the decades impeded the value physicians provide? 2.To make significant progress to health IT,is emphasizing only the technological…
1.How can you modify your operating system congurations so that when a DNS query
1.How can you modify your operating system congurations so that when a DNS query is made, that is sent to a specic DNS sever (e.g., Google’s)? 2.Suppose within your Web browser yo…
1.How do I Print out Make,Years? output I have right now \"C:\\Program Files\\Ja
1.How do I Print out Make,Years? output I have right now "C:Program FilesJavajdk1.8.0_131injava" "-javaagent:C:Program FilesJetBrainsIntelliJ IDEA 2017.1.2libidea_rt.jar=52867:C:…
1.How granular should information security policies get? For example, should the
1.How granular should information security policies get? For example, should they get down to the level of specifying required operating system configuration settings? 2.A struggl…
1.How is PHP integrated into an HTML document? 2.When is PHP interpreted by the
1.How is PHP integrated into an HTML document? 2.When is PHP interpreted by the server? 3.How are PHP statements terminated? 4.What is the purpose of the settype and gettype funct…
1.How is the following string of 9 characters stored in ASCII? Tot $0.92 Fill in
1.How is the following string of 9 characters stored in ASCII? Tot $0.92 Fill in the table below going from left to right: 2.Convert the following number from binary to decimal: 1…
1.How might a company benefit from people who are supportive of the company on s
1.How might a company benefit from people who are supportive of the company on social media, but don't work for the company? (Hint: sometimes such people are treated as knowledgea…
1.I am trying to write a progam using a java tree set. 2.The set must contain ja
1.I am trying to write a progam using a java tree set. 2.The set must contain java.awt.Rectangle objects and I need to make a custom comparator to sort them by area in ascending o…
1.I am working on React.js. I worte simple code in App.js and All data presented
1.I am working on React.js. I worte simple code in App.js and All data presented must be written in a JSON blob in index.js. but when I changed the code from index.js, it wont cha…