Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 286 / 3837

1.I created a node file that will scrape the provided url: https://www.billboard
1.I created a node file that will scrape the provided url: https://www.billboard.com/charts/rap-song and send an email of all artists that are sung. However for some reason it's n…
1.I havepart of this but I can\'t seem to make the whole thing worktogether. I c
1.I havepart of this but I can't seem to make the whole thing worktogether. I can make it add a character at the beginning anddelete a character and exit. I can't figure out how t…
1.Identify functional dependencies and derive candidate keys, and 2.Follow the n
1.Identify functional dependencies and derive candidate keys, and 2.Follow the normalization process to determine tables and relationships based on eight tables (AIRPORT, FLIGHT, …
1.Identify what two benefit objectives you will measure for your electronic comm
1.Identify what two benefit objectives you will measure for your electronic commerce site? Explain why you picked those two? Describe how will you measure them? 2. List and descri…
1.If a series of characters are put into a stack and then output to the screen a
1.If a series of characters are put into a stack and then output to the screen as they come out they will appear a. The first followed by the last, etc until all have been removed…
1.If the 16 MHz crystal is connected to X1, X2? What is the clock frequency? 2.
1.If the 16 MHz crystal is connected to X1, X2? What is the clock frequency? 2. Write the 8086 instruction which will perform the following operations: a. Copy AL to BL b. Increme…
1.If x contains the integer decimal value 42, which of the following are TRUE st
1.If x contains the integer decimal value 42, which of the following are TRUE statements? Select ALL correct responses. The binary (base 2) representation of x is 101010. The hexa…
1.If you were designing a database to record the transaction that takes place be
1.If you were designing a database to record the transaction that takes place between a customer and a "store", what would the likely relationship be between the customer and the …
1.Implement a pair of IPv6 TCP client and server for a simple DVD store ordering
1.Implement a pair of IPv6 TCP client and server for a simple DVD store ordering system( that support both IPv4 and IPv6 peers. -The “hw3-ipv4.zip” bundle (available athttps://www…
1.Implement a superclass Appointment and subclasses Onetime, Daily, and Monthly.
1.Implement a superclass Appointment and subclasses Onetime, Daily, and Monthly. An appointment has a description (for example, "see the dentist") and a date. Write a method occur…
1.Implement the popCount function located in the header “hw1part1.h”. The popcou
1.Implement the popCount function located in the header “hw1part1.h”. The popcount routine accepts an integer and then returns the number of 1’s in the binary representation of th…
1.In Java, elements of an array are automatically initialized to some default va
1.In Java, elements of an array are automatically initialized to some default value. What is the default value for the elements of an array of integers? 2.Variables are used to st…
1.In a forensic investigation, it is not possible to over document. It is likely
1.In a forensic investigation, it is not possible to over document. It is likely that some cases will depend more on certain aspects of the documentation than others; however, you…
1.In a one-page (at least one-page) paper, explain why an analyst needs to under
1.In a one-page (at least one-page) paper, explain why an analyst needs to understand how people think, how they learn, how they react to change, how they communicate, and how the…
1.In a simple authentication dialogue of Kerberos version 4, why should a networ
1.In a simple authentication dialogue of Kerberos version 4, why should a network address of client C be included in the ticket? 2. (Select all correct answers) Kerbros security t…
1.In all of the following sub-questions, give an algorithm in recursive form and
1.In all of the following sub-questions, give an algorithm in recursive form and show its running time using the Master Theorem or just by solving the recurrence in the simpler ca…
1.In class Complex, define a multiply method that returns the product of two Com
1.In class Complex, define a multiply method that returns the product of two Complex numbers. Suppose you are trying to compute the product of two complex numbers a + bi and c + d…
1.In javascript, RegExp Object Method test() is used to search a string and retu
1.In javascript, RegExp Object Method test() is used to search a string and returns _________ a) true or false b) found value c) index d) None of the above 2) What property would …
1.In order to change the size of any window you should use__________________. a.
1.In order to change the size of any window you should use__________________. a. the mouse b.the sizing buttons c. the close button d.either the mouse or the sizing buttons 2.To c…
1.In the JavaScript file, note that three functions are supplied. The $ function
1.In the JavaScript file, note that three functions are supplied. The $ function. The validatePhone function that contains the validation code. And an onload event handler that at…
1.In the JavaScript file, note that three functions are supplied. The $ function
1.In the JavaScript file, note that three functions are supplied. The $ function. The validatePhone function that contains the validation code. And an onload event handler that at…
1.In the box below, create a 10 element array of type Integer called nums2. (Not
1.In the box below, create a 10 element array of type Integer called nums2. (Note: this should be an array of type Integer, not int.) 2.In the box below, use { } notation to creat…
1.In the definition of Big-O, why is the \"for N >= n0\" needed? 2. If f1(N) = 2
1.In the definition of Big-O, why is the "for N >= n0" needed? 2. If f1(N) = 2N and f2(N) = 3N, why are they both O(N), since 3N is larger than 2N for N>=1? 3. For f1(N) = 2…
1.In the following report identify the control breaks. Discuss if the correct co
1.In the following report identify the control breaks. Discuss if the correct control breaks are used in these reports. Review the example and mention whether control breaks menti…
1.In the following report identify the control breaks. Discuss if the correct co
1.In the following report identify the control breaks. Discuss if the correct control breaks are used in these reports. Review the example and mention whether control breaks menti…
1.In your own words, explain how the Compare and Swap instruction can prevent mo
1.In your own words, explain how the Compare and Swap instruction can prevent more than one process using the shared resource. 2.In your own words, explain how a Semaphore can pre…
1.In your ubuntu, open course website (https://github.com/syracuse-fullstacksecu
1.In your ubuntu, open course website (https://github.com/syracuse-fullstacksecurity/cis342) (e.g. using Firefox) and hit the green "Clone or download" button to download all the …
1.In your words, describe the purpose of normalization in database design 2.For
1.In your words, describe the purpose of normalization in database design 2.For the relations listed below, identify if the relations are normalized to BCNF and if not, normalize …
1.Information Technology leaders, including information assurance and security p
1.Information Technology leaders, including information assurance and security professionals, communicate through various channels including e-mails, texts, and social media. It i…
1.Is a firewall sufficient in blocking outside intrusion? Why or Why Not? 2.Defi
1.Is a firewall sufficient in blocking outside intrusion? Why or Why Not? 2.Define NIDS and HIDS. What are their pros and cons of NIDS and HIDS? 3.What are the differences between…
1.Is pen color a local variable or a global variable? import turtle import rando
1.Is pen color a local variable or a global variable? import turtle import random def square(tortoise, fcolor, pcolor, length): Draws a square. Parameters: tortoise: a Turtle obje…
1.Is the following a legitimate reason for purchasing individual apps from multi
1.Is the following a legitimate reason for purchasing individual apps from multiple vendors instead of purchasing a bundled suite from a single vendor? There are many apps in the …
1.Jesse wants me to investigate Open Workbench software to determine whether it
1.Jesse wants me to investigate Open Workbench software to determine whether it would be suitable for SCR. She asked me to prepare a summary of pros and cons, and a sample of scre…
1.Knowing the machine instruction set does not play a part in knowing the functi
1.Knowing the machine instruction set does not play a part in knowing the functions that the processor must perform. True False 2.The processor needs to store instructions and dat…
1.Let A and B be two semaphores initialized to 1, whether this following code ha
1.Let A and B be two semaphores initialized to 1, whether this following code has problem, if so, which problem and explain your answer                 P0                         …
1.Let\'s discuss how C-style strings are used in a program. How do you create a
1.Let's discuss how C-style strings are used in a program. How do you create a C-style string? Give examples. 2.You have been using the string type throughout this course. What ne…
1.Line height is best described by which of the following statements? More than
1.Line height is best described by which of the following statements? More than one answer. a)Distance a baseball player runs 4 times to make a home run. b)The width of an upperca…
1.Line height is best described by which of the following statements? Select all
1.Line height is best described by which of the following statements? Select all that apply. a)Distance a baseball player runs 4 times to make a home run. b)The width of an upperc…
1.List all the students and their GPA (result schema: sid and GPA). The GPA is c
1.List all the students and their GPA (result schema: sid and GPA). The GPA is calculated by summing up the grade of each course multiplied the number of credits for the course an…
1.List and then describe in details some of the responsibilities of the chief in
1.List and then describe in details some of the responsibilities of the chief information officer? 2.List 5 examples of bias on the Web and then describe each examples with detail…
1.List any two features that make mobile devices important in our daily life? No
1.List any two features that make mobile devices important in our daily life? Notes: 1. Only list each feature within one line, no need to discuss or explain. 2. The question rela…
1.List th nams of th 16 gnral purpos 64 bit rgistrs for th Intl x68_64 architctu
1.List th nams of th 16 gnral purpos 64 bit rgistrs for th Intl x68_64 architctur. 2.What nasm kyword is usd to mak an assmbly function or labl visibl to xtrnal C cods? 3.What nas…
1.List the available residential access technologies in your city. For each type
1.List the available residential access technologies in your city. For each type of access, provide the advertised downstream rate, upstream rate, and monthly price.(charleston,So…
1.List the name and type of pet for every pet that has been treated more than 2
1.List the name and type of pet for every pet that has been treated more than 2 days and spent more than $100 for treatment. 2.List the staff’s first name and last name for all st…
1.List the name and type of pet for every pet that has been treated more than 2
1.List the name and type of pet for every pet that has been treated more than 2 days and spent more than $100 for treatment. 2.List the staff’s first name and last name for all st…
1.Log different levels of messages (MessageLevel?) using enums. a.Examples: Proc
1.Log different levels of messages (MessageLevel?) using enums. a.Examples: Process, Info, Warning, Error, Fatal Error, Others? 2.Log messages containing variable data a.Example: …
1.Look at the following code: Line 1 public class ClassA Line 2 { Line 3 public
1.Look at the following code: Line   1   public class ClassA Line   2   { Line   3   public ClassA() {} Line   4   public void method1(int a){} Line   5   } Line   6   public clas…
1.Lookup the ASCII character code on the web and give the ASCII code in binary f
1.Lookup the ASCII character code on the web and give the ASCII code in binary for the following 5 characters and the decimal equivalent for the binary pattern. Q, q, 6 0 and blan…
1.Magnetic disks are the most common form of storage hardware.T/F 2. A Web page
1.Magnetic disks are the most common form of storage hardware.T/F 2. A Web page is a document that is coded in one of the standard page markup languages.T/F 3.Which of the followi…
1.Make a class Rational to provide at least following methods and constructors:
1.Make a class Rational to provide at least following methods and constructors: Rational r1= new Rational (3,5); Rational r2= new Rational (4,7); Rational r3=r1.add(r2); // also s…