Web development and programming
191828 questions • Page 290 / 3837
1.What is the output of the code snippet given below? Select one: a. No output b
1.What is the output of the code snippet given below? Select one: a. No output b. 0 3 6 9 12 15 18 c. 0 1 3 5 7 9 d. 0 3 6 9 …. (infinite loop) 2. What is the output of the follow…
1.What is the output of the following code snippet? int s1 = 20; if (s1
1.What is the output of the following code snippet? int s1 = 20; if (s1 <= 20) { System.out.print("1"); } if (s1 <= 40) { System.out.print("2"); } if (s1 <= 20) { System.…
1.What is the output of the following program segment? int num = 0;int count;int
1.What is the output of the following program segment? int num = 0;int count;int y = 1;for (count = 0; count < 5; ++count){ num = 2 * (count - 2) + y; cout << num <<…
1.What is the output of the following program? #include #include
1.What is the output of the following program? #include <iostream> #include <string> #include "myStack.h" using namespace std; template <class type> void mystery…
1.What is the output of the following statements? Select one: a. Cal, Bob, Ann b
1.What is the output of the following statements? Select one: a. Cal, Bob, Ann b. Ann, Bob c. Ann, Cal, Tony d. Array list bound error 2.Consider the following 2-dimensional array…
1.What is the password for the user Ashok in the shadow file? If you could not d
1.What is the password for the user Ashok in the shadow file? If you could not decrypt it, why do you believe it was difficult/impossible to decrypt? If you did decrypt it, what i…
1.What is the primary motivation for piggy-backed acknowledgements in a Data-Lin
1.What is the primary motivation for piggy-backed acknowledgements in a Data-Link layer protocol? 2.In some protocol stacks, such as the Internet Protocol (IP) and Asynchronous Tr…
1.What is the risk management? Why in the den a vacation of risk and bought abil
1.What is the risk management? Why in the den a vacation of risk and bought ability to add assets so important in risk management? 2. According to sun tzu,what do you key understa…
1.What is the value of r0 after the code below executes? do: add r0, 12 bx lr ma
1.What is the value of r0 after the code below executes? do: add r0, 12 bx lr main: mov r0, 10 bl do add r0, 5 5 12 22 10 27 17 2.What is the value of r0 after t…
1.What is time-slice? How is the end of the time slice indicated? 2.How is a pro
1.What is time-slice? How is the end of the time slice indicated? 2.How is a process executed? What is the state of a process? How many states are there? 3.What is the context of …
1.What is wrong with this statement? int number = Math.pow(9, 9); There is nothi
1.What is wrong with this statement? int number = Math.pow(9, 9); There is nothing wrong with the statement 2. for (int a = 0; a < 60; a++) { array[a] = (int)(Math.random()*(50…
1.What should be your last resort when you want to find out what methods are pro
1.What should be your last resort when you want to find out what methods are provided by an object? Select one: a. Find and ask a TA b. Consult the Java API documentation c. Use E…
1.What type does CompareTo return? int string boolean char 2.The variable top in
1.What type does CompareTo return? int string boolean char 2.The variable top in the array implementation of a stack referes to the next available position in the array the number…
1.What will be output of following program? #include int main(){ int a = 320; ch
1.What will be output of following program? #include int main(){ int a = 320; char *ptr; ptr =( char *)&a; printf("%d ",*ptr); return 0; } (A) 2 (B) 320 (C) 64 (D) Compilation…
1.What will be output of following program? #include int main(){ int a
1.What will be output of following program? #include<stdio.h> int main(){ int a = 320; char *ptr; ptr =( char *)&a; printf("%d ",*ptr); return 0; } (A) 2 …
1.What will be the output of following copde snippet?
1.What will be the output of following copde snippet? <script type="text/javascript"> function x() { var cst = "We are Fast Growing Software Company located in Jalandhar, In…
1.What will display from the following program when it is compiled and executed?
1.What will display from the following program when it is compiled and executed? Hint: It does compile clean. No partial credit. Must be exactly what displays. import java.util.St…
1.When a multi-threaded process forks, there\'s a chance that a problem could oc
1.When a multi-threaded process forks, there's a chance that a problem could occur if the child gets copies of all the parent's threads. Consider what would happen if one of the o…
1.When are menu selection and formfillin more appropriate thandirect manipulatio
1.When are menu selection and formfillin more appropriate thandirect manipulation? 2.Sketch an interface to demonstrate each of the following menu types: Binary Menu, MultipleItem…
1.When computer systems perform in ways that would be considered intelligent if
1.When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____. 2.____ are most often used to create Web pages…
1.When designing a user interface (GUI for example) what considerations should y
1.When designing a user interface (GUI for example) what considerations should you make for users with disabilities. Give at least one practical example. 2.imagine you are given a…
1.When determining the appropriate hardware components of a new information syst
1.When determining the appropriate hardware components of a new information system, what role must the user of the system play? 2. Identify two basic characteristics of RAM and RO…
1.When saving a new MS Word file for the first time you must specify a. the name
1.When saving a new MS Word file for the first time you must specify a. the name of the new file b. the location for the new file c. the file-type for the new file d. all of the a…
1.When saving a new MS Word file for the first time you must specify a. the name
1.When saving a new MS Word file for the first time you must specify a. the name of the new file b. the location for the new file c. the file-type for the new file d. all of the a…
1.When shopping for a firewall, what 3 pieces of documentation should you bring
1.When shopping for a firewall, what 3 pieces of documentation should you bring to a meeting with a vendor or consultant on the purchase 2. Complete the following statement: Acces…
1.When shopping for a firewall, what 3 pieces of documentation should you bring
1.When shopping for a firewall, what 3 pieces of documentation should you bring to a meeting with a vendor or consultant on the purchase 2. Complete the following statement: Acces…
1.When the program access address less than base (relocation) register, what wil
1.When the program access address less than base (relocation) register, what will happen? The operating system checks the priority of the process and allow it to access the addres…
1.When we measure the cost of a find operation run against a Hashtable and say i
1.When we measure the cost of a find operation run against a Hashtable and say it runs in O(1) that means that the find operation 2. A message was used to create the following Pre…
1.When we measure the cost of a find operation run against a Hashtable and say i
1.When we measure the cost of a find operation run against a Hashtable and say it runs in O(1) that means that the find operation 2. A message was used to create the following Pre…
1.When will the loop in the following code snippet stop? I. When the user enters
1.When will the loop in the following code snippet stop? I. When the user enters an integer II. When the user enters an alphabetic character III. After the user enters 100 numbers…
1.Where is a global variable defined? A. Outside a function B. Inside a function
1.Where is a global variable defined? A. Outside a function B. Inside a function C. Anywhere D. In a function header line 2.Where can a local variable be d…
1.Which best explains getSelection()? a) Returns the VALUE of a selected OPTION.
1.Which best explains getSelection()? a) Returns the VALUE of a selected OPTION. b) Returns document.URL of the window in focus. c) Returns the value of cursor-selected text d) Re…
1.Which command can be used to verify route redistribution show summary show ip
1.Which command can be used to verify route redistribution show summary show ip protocol show redistribution show ip route 2. T/F The redistribute static command would allow a sta…
1.Which emerging educational technology do you feel will have the biggest impact
1.Which emerging educational technology do you feel will have the biggest impact in the years to come? Why? (Support your answer) 2. Describe the limitations or problems of Kansei…
1.Which is correct? A)The compiler ha no problem distinguishing these two functi
1.Which is correct? A)The compiler ha no problem distinguishing these two function definitions: void func(double &x){/*...*/} void func(double x){/*...*/} B)There is no proble…
1.Which is not a proper function prototype? void doThis (string x); 2.If a funct
1.Which is not a proper function prototype? void doThis (string x); 2.If a function has six parameters defined, how many arguments must appear in the function call? 3. What is wro…
1.Which is the Java equivalent of the following mathematical expression? c = (a
1.Which is the Java equivalent of the following mathematical expression? c = (a2 + b2) 2. What is wrong with the following code? int count = 2000 * 3000 * 4000; 3. Consider the fo…
1.Which layer(s) do(es) a packet filter firewall examine? a. 1 and 2 b. 3 and 4*
1.Which layer(s) do(es) a packet filter firewall examine? a. 1 and 2 b. 3 and 4* c. 5 d. 1 through 4 e. All layers 2.Which layer(s) do(es) a proxy firewall filter? a. …
1.Which method of the Document interface retrieves an array of all the elements
1.Which method of the Document interface retrieves an array of all the elements of the specified type? a. getElementByTagName () b.getElementByClassName () c.getElementByName () d…
1.Which method of the Document interface retrieves an array of all the elements
1.Which method of the Document interface retrieves an array of all the elements of the specified type? a. getElementByTagName () b.getElementByClassName () c.getElementByName () d…
1.Which of the following are true about UDP Variable size b.Guaranteed Delivery
1.Which of the following are true about UDP Variable size b.Guaranteed Delivery c. Guaranteed Send Order d. Bandwidth Efficient 2. What is the application software defined entry/e…
1.Which of the following determines how the field names can be made more readabl
1.Which of the following determines how the field names can be made more readable in table and query datasheets? A.Normalization B. Caption property C. Field size D. Data type 2.W…
1.Which of the following is NOT a concern of computer science? Algorithms Data s
1.Which of the following is NOT a concern of computer science? Algorithms Data structures Operating systems Reducing time to market QUESTION 2 Which of the following estimation ef…
1.Which of the following is NOT a type of compression? lossless lossy lost all o
1.Which of the following is NOT a type of compression? lossless lossy lost all of the above 2.VR is only used for video games. A) True B) False 3.The Sony PlayStation is a popular…
1.Which of the following is NOT one of the basic technologies or techniques norm
1.Which of the following is NOT one of the basic technologies or techniques normally used to construct a WAN? a. Ordinary telephone lines and telephone modems b. A…
1.Which of the following is always necessary in order for a transition to take p
1.Which of the following is always necessary in order for a transition to take place in a finite state machine (FSM)? A. At least one input must be true. B. At least one input mus…
1.Which of the following is false about a method that does not return a value? S
1.Which of the following is false about a method that does not return a value? Select one: a. It can contain a return statement b. It cannot be embedded in an expression c. Its he…
1.Which of the following is out of your control as a developer? a.a user\'s Inte
1.Which of the following is out of your control as a developer? a.a user's Internet connection speed b.the number of HTTP requests c.the size of embedded file…
1.Which of the following is used for repeating signals without analyzing the dat
1.Which of the following is used for repeating signals without analyzing the data? is it bridge, hub, switch, or router 2.Which of the following is true about layer 2 switches? a.…
1.Which of the following jQuery statement is correct and equivalent to the follo
1.Which of the following jQuery statement is correct and equivalent to the following traditional JS statement? document.getElementById("result").innerHTML="<p>hello</p>…
Subject
Web development and programming
Use Browse or pick another subject.