Web development and programming
191828 questions • Page 288 / 3837
1.Suggest reasons why RAMs traditionally have been organized as only one bit per
1.Suggest reasons why RAMs traditionally have been organized as only one bit per chip whereas ROMs are usually organized with multiple bits per chip. 2. Consider a dynamic RAM tha…
1.Suggest reasons why RAMs traditionally have been organized as only one bit per
1.Suggest reasons why RAMs traditionally have been organized as only one bit per chip whereas ROMs are usually organized with multiple bits per chip. 2. Consider a dynamic RAM tha…
1.Summarize the most interesting lesson learned from gaining strategic value fro
1.Summarize the most interesting lesson learned from gaining strategic value from information (book: Information system business) chapter 4. 2.How are the virtual value chain and …
1.Suppose a RISC machine uses overlapping register windows with: 10 global regis
1.Suppose a RISC machine uses overlapping register windows with: 10 global registers 6 input parameter registers 10 local registers 6 output parameter registers How large is each …
1.Suppose a complete binary tree has _______ items. In theworst case time, how m
1.Suppose a complete binary tree has _______ items. In theworst case time, how many items would be examined by thesearch? a)7____b)15_____c)31_____d)63______e)13______f)22_______g…
1.Suppose that a method has one node as a parameter and it returns two reference
1.Suppose that a method has one node as a parameter and it returns two references to nodes. What's the best header for the method? 4. Answer A. IntNode foo(IntNode p) B. IntNode, …
1.Suppose that the chance to hit the jackpot in a lottery is one in one million.
1.Suppose that the chance to hit the jackpot in a lottery is one in one million. Which of the following code snippets simulates that random number? Select one: a. (long) (Math.ran…
1.Suppose we are working with the following knowledge base: wizard(ron). wizard(
1.Suppose we are working with the following knowledge base: wizard(ron). wizard(X) :- hasBroom(X),hasWand(X). hasWand(harry). quidditchPlayer(harry). hasBroom(…
1.Suppose we insert the numbers 32, 57, 43, 20, 28, 67, 41, 62, 91, 54 in this o
1.Suppose we insert the numbers 32, 57, 43, 20, 28, 67, 41, 62, 91, 54 in this order into an initially empty binary search tree, and we do not do any restructuring. How many leave…
1.Suppose you want to design a class that is given numbers one at a time. The cl
1.Suppose you want to design a class that is given numbers one at a time. The class computes the smallest, second smallest, and average of the numbers that have been seen so far. …
1.The Bluetooth access code is defined by the master node within a piconet, and
1.The Bluetooth access code is defined by the master node within a piconet, and is unique to that piconet True False 2. What are ways to increase data capacity on an 802.11 WLAN? …
1.The Ethernet Standards are also known as the _______ standards. a. IEEE b. 802
1.The Ethernet Standards are also known as the _______ standards. a. IEEE b. 802.3* c. 802 d. ATM e. LAN 2.CSMA/CD provides a way to: a. control networks so that only …
1.The French and Chinese prime ministers need to come to an agreement by telepho
1.The French and Chinese prime ministers need to come to an agreement by telephone, but neither speaks the other’s language. Further, neither has on hand a translator that can tra…
1.The IXP acts as an interface between autonomous systems. True False 2. What is
1.The IXP acts as an interface between autonomous systems. True False 2. What is correct regarding a connectionless protocol such as IP? a. Since no connection is established betw…
1.The Java library contains an interface called Comparable that is defined as fo
1.The Java library contains an interface called Comparable that is defined as follows: public interface Comparable { intcompareTo(T o); } The variable T is called a generic type a…
1.The Rockford Daily Clarion wants you to design a class named Issue. Fields inc
1.The Rockford Daily Clarion wants you to design a class named Issue. Fields include the issue number, total number of advertisements sold in the issue, and total advertising reve…
1.The Wambeezy Hardware Company makes very small microprocessors.The model Wambe
1.The Wambeezy Hardware Company makes very small microprocessors.The model Wambeezy Mark 100 has just an instruction pointer register (PC) and a read-only memory of 1K items, whic…
1.The Wambeezy Hardware Company makes very small microprocessors.The model Wambe
1.The Wambeezy Hardware Company makes very small microprocessors.The model Wambeezy Mark 100 has just an instruction pointer register (PC) and a read-only memory of 1K items, whic…
1.The _______ loop is ideal for situations that require a counter. 2.The _______
1.The _______ loop is ideal for situations that require a counter. 2.The _______ loop always iterates at least once. 3.The _______ and _______ loops will not iterate at all if the…
1.The _____________________ is the computer-based information system that suppor
1.The _____________________ is the computer-based information system that supports radiology department operations. It includes management of the film library, scheduling of patie…
1.The actual value of NULL is Select one: a. -1 b. 0 c. 99999 d. -99 2. There is
1.The actual value of NULL is Select one: a. -1 b. 0 c. 99999 d. -99 2. There is no need for error checking when popping a stack. Select one: True False 3. Select one: a. You have…
1.The binary search tree provides us with a structure that allows us O( __ ) acc
1.The binary search tree provides us with a structure that allows us O( __ ) access to any node in the structure - an improvement over the sequential search of a(n)___(list which …
1.The code box below includes a live 2 dimensional array variable called gridNum
1.The code box below includes a live 2 dimensional array variable called gridNums. This array holds integers. You cannot see its declaration or initialization. What value is in th…
1.The concept of virtual memory is based on the fact that some parts of a softwa
1.The concept of virtual memory is based on the fact that some parts of a software application are never accessed. . Identify and explain the parts of software applications th…
1.The decimal number, 1,836 represents what number in binary notation? 2.The mea
1.The decimal number, 1,836 represents what number in binary notation? 2.The measure of the ability to distinguish between two points that are close to each other in an image is k…
1.The file /usr/dict/words contains a long list of words in the English language
1.The file /usr/dict/words contains a long list of words in the English language, one per line, arranged into alphabetical order. This file is normally used as the dictionary for …
1.The following code segment is to exchange the two images. What\'s wrong with i
1.The following code segment is to exchange the two images. What's wrong with it? How to fix it? document.getElementById('leftImage').src = document.getElementById('rightImage').s…
1.The goal of network design is to _____. a. create a visually attractive networ
1.The goal of network design is to _____. a. create a visually attractive network b. use the latest technologies to implement the network c. meet end user needs within budget d. u…
1.The head of the IT group in a company often is called the chief information of
1.The head of the IT group in a company often is called the chief information officer (CIO) or chief technology officer (CTO). Should the CIO or CTO report to the company presiden…
1.The head of the IT group in a company often is called the chief information of
1.The head of the IT group in a company often is called the chief information officer (CIO) or chief technology officer (CTO). Should the CIO or CTO report to the company presiden…
1.The hypothetical machine of Figure 3.4 also has two I/O instructions: 0011 ; e
1.The hypothetical machine of Figure 3.4 also has two I/O instructions: 0011 ; equals ; Load AC from I/O ; 0111 ; equals ; Store AC to I/O ; In these cases, the 12-bit address ide…
1.The java.uti.ArrayList a.Create two instances of ArrayList. One instance must
1.The java.uti.ArrayList a.Create two instances of ArrayList. One instance must contain only String objects, one instance must contain Book objects. b. Add a number of String and …
1.The ladder logic program language is basically a(n) _______ set of instruction
1.The ladder logic program language is basically a(n) _______ set of instructions used to create the controller program. 2. When using an XIC instruction, the reference address co…
1.The milk silo has an internal diameter of 4.2 m and is pumped out at a constan
1.The milk silo has an internal diameter of 4.2 m and is pumped out at a constant flow rate of 29532 L h-1. How many minutes does it take to empty the silo? (Give answer to 1 DP).…
1.The musical note \"middle C\" has a frequency of 262Hz. What is its period of
1.The musical note "middle C" has a frequency of 262Hz. What is its period of vibration? 2.You observe that the delay between a lightning flash and the thunder is 3.1 s. How far a…
1.The name of the class is Question_16. 2.Class Question_16 has 3 instance varia
1.The name of the class is Question_16. 2.Class Question_16 has 3 instance variables: name of type String, age of type int and height of type double.. 3.Class Question_16 has the …
1.The only difference between the containers set and multiset is that the contai
1.The only difference between the containers set and multiset is that the container multiset allows ____________________. 2.Every container contains the typedef __________________…
1.The process of hand-tracing code is valuable because Select one: a. It is usua
1.The process of hand-tracing code is valuable because Select one: a. It is usually faster than just running the code. b. It is the best way to design an algorithm. c. You must al…
1.The put function outputs Select one: a. one character value. b. one float valu
1.The put function outputs Select one: a. one character value. b. one float value. c. one integer value. d. one double value. 2.Which function returns TRUE if the character argume…
1.The remainder r in the division algorithm is often referred to as a __________
1.The remainder r in the division algorithm is often referred to as a __________ 2. The _________ class [x + 1] consists of all polynomials a(x) that satisfy the quality a(x) mod …
1.The stack\'s empty function a. Clears all items from the stack b. Removes the
1.The stack's empty function a. Clears all items from the stack b. Removes the top item from the stack c. Returns whether or not there's anything in the stack d. 2.Finds and remov…
1.The string that identifies a schema is a(n) _______ a. algorithm b. URL c. cra
1.The string that identifies a schema is a(n) _______ a. algorithm b. URL c. crawler d. URI Adding a page _________ enables a search result to display a concise page summary, rath…
1.The values of an enumeration type may be output directly to the standard outpu
1.The values of an enumeration type may be output directly to the standard output device. 2.An enumeration type can be passed as a parameter to a function only by value. 3.An anon…
1.The variation of the one-way delay for two consecutive packets is called a. de
1.The variation of the one-way delay for two consecutive packets is calleda. delay jitterb. packet lossc. noise/cross talkd. latency 2. Pots stands for what in networking 3. Devic…
1.There is a lot of debate worldwide concerning encryption and the right to priv
1.There is a lot of debate worldwide concerning encryption and the right to privacy and security versus the right of law enforcement to be able to access all encrypted material. A…
1.Think of a windows application you use on a daily basis. The application you c
1.Think of a windows application you use on a daily basis. The application you choose must be unique to other students. 2.Choose an application that does store something—settings …
1.This is a Python programming langauege. I got these codes, but I can\'t answer
1.This is a Python programming langauege. I got these codes, but I can't answer questions blew the codes. The topic is Classes and object oriented programs coverage = 350 #One gal…
1.This is the escape sequence representing the null terminator. Select one: a. \
1.This is the escape sequence representing the null terminator. Select one: a. b. c. d. nullptr e. None of these 2.The null terminator stands for this ASCII code. Select one: a. 5…
1.This is using Java. Write a method called makeCircle that returns a new Circle
1.This is using Java. Write a method called makeCircle that returns a new Circle object based on the method's parameters: two integer values representing the (x, y) coordinates of…
1.Transporting Units . Your company builds computers at three locations (Plant 1
1.Transporting Units. Your company builds computers at three locations (Plant 1-Plant 3) and ships it to five distributors (D1-D5). The cost per unit of building a computer and th…
Subject
Web development and programming
Use Browse or pick another subject.