Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 294 / 3837

10) A vector v stores for several employees of the Green Fuel Cells Corporation
10) A vector v stores for several employees of the Green Fuel Cells Corporation their hours worked one week followed for each by the hourly pay rate. For example, if the variable …
10) After a value is returned from a called function, program control reverts to
10) After a value is returned from a called function, program control reverts to the ____. a. compiler c. in-line function b. called function d. calling function The value returne…
10) CONSTRUCTORS Q: a) Which methods are the constructors? How do you know? b) W
10) CONSTRUCTORS Q: a) Which methods are the constructors? How do you know? b) Where are they called? c) What is the purpose of the constructor? d) What gets printed e) What happe…
10) If you write a class called Car, but do not write a toString( ) method. Then
10) If you write a class called Car, but do not write a toString( ) method. Then in main( ) you create a Car object like this: //assume a constructor exists that takes these param…
10) TRUE/FALSE The idea of a map is to be able to look up one value with another
10) TRUE/FALSE The idea of a map is to be able to look up one value with another. TRUE/FALSE Often the lookup value is called the key and the looked-up value is called simply the …
10) The Switch ports of Hubs 1A and 2A are programmed to belong to VLAN 1. Switc
10) The Switch ports of Hubs 1A and 2A are programmed to belong to VLAN 1. Switch ports connected to HUBS 1B and 2B are VLAN 2. ALL other switch ports are in VLAN 3. All computers…
10) The gap between the groups having access to, or knowledge of information & c
10) The gap between the groups having access to, or knowledge of information & communication technology is known as A) Analog divide B) Digital divide C) Great divide D) None …
10) Which of the following is defined as a series of activities undertaken by th
10) Which of the following is defined as a series of activities undertaken by the company to produce a product or service? A) business processes B) value chain C) strategic direct…
10) a) Continue the previous problem by writing a MATLAB code to solve Gaussian
10) a) Continue the previous problem by writing a MATLAB code to solve Gaussian elimination with PARTIAL pivoting by modifying the faster Gaussian elimination with no pivoting cod…
10) assume you have the following java statement: Scanner input; Question - what
10) assume you have the following java statement: Scanner input; Question - what does the variable input refer to? 11) write a valid statement to declare a variable called phrase …
10)- A Game of Twenty-One For this assignment, you will write a program that let
10)- A Game of Twenty-One For this assignment, you will write a program that lets the user play against the computer in a variation of the popular blackjack card game. In this var…
10- a) What construct a programming language requires to support Polymorphic Var
10- a) What construct a programming language requires to support Polymorphic Variables? b) When does the binding of Polymorphic variables to their values can happen? c) Use the co…
10-16. Write a program that ask the user to enter a string, and then converts th
10-16. Write a program that ask the user to enter a string, and then converts that string to Morse code. Morse code is provided. I have already put it in the program. Here is my p…
10-17. The Resort The Mountain Top Resort Community is an elegant, thriving four
10-17. The Resort The Mountain Top Resort Community is an elegant, thriving four-season resort and community of over 1,200 single family homes, 1,000 time-share units, and a multi…
10-2 Show output as well Create an array that holds 1000 random integers between
10-2 Show output as well Create an array that holds 1000 random integers between 1-1000. Allow the user to enter an integer to search. Create and implement modified Quick sort alg…
10-4. Create the Department and Employee tables, as per the examples earlier in
10-4. Create the Department and Employee tables, as per the examples earlier in the chapter, with all the constraints (PRIMARY KEYs, referential and UNIQUE constraints, CHECK cons…
10-Server-side scripting ______________ to the client. 11-Localhost is the _____
10-Server-side scripting ______________ to the client. 11-Localhost is the ______________ that always refers to the local computer. 12-SQL is ________________________ 13-A relatio…
10-points Due 2 Background Your employer, Fabulous Weight-loss Formula, has prov
10-points Due 2 Background Your employer, Fabulous Weight-loss Formula, has provided you a data file for analysis. Your task is to write a program to compute weekly weight loss/ga…
10. (1 point) True or False: If you refer to an identifier with out declaring it
10. (1 point) True or False: If you refer to an identifier with out declaring it, the compiler will generate an error message 11. (1 point) A variable is said to be palced in it. …
10. (10 points) You are running quicksort. List the comparisons between elements
10. (10 points) You are running quicksort. List the comparisons between elements (in the order the happen), and the pivots chosen (in the order they happen). Assume that you alway…
10. (10) Two hydrogen atoms and one oxygen atom combine to make a water molecule
10. (10) Two hydrogen atoms and one oxygen atom combine to make a water molecule. Write code to count the number of water molecules given the following scenario: each time a Hydro…
10. (30 pts) Answer includes Analysis, pseudocode and program Write a program to
10. (30 pts) Answer includes Analysis, pseudocode and program Write a program to solve the following problem. It will help if you a (inputs, outputs, equations) and write pseudoco…
10. (4 marks) Define the headers of the following two methods. You need to assum
10. (4 marks) Define the headers of the following two methods. You need to assume that they are defined in a class and that they are invoked through the class. a) A method that se…
10. (4 pts) In physics, the escape velocity from a spherical planet (are there n
10. (4 pts) In physics, the escape velocity from a spherical planet (are there non-s be computed using the formula pherical planets?...) can 2GM where G is the universal gravitati…
10. (DDL) Solve following four questions (15 points). A. Create the vendor table
10. (DDL) Solve following four questions (15 points). A. Create the vendor table based on the following specification? COLUMN_NAME Data_TYPE Length CONSTRAINT_TYPE IS_NULLABLE Ven…
10. (RSA Public Key Cryptosystem) Let us pick two prime numbers p 41,q 67 Then,
10. (RSA Public Key Cryptosystem) Let us pick two prime numbers p 41,q 67 Then, npq 41 67 2747 ?(n)-. (p-1)(q-1)-40 * 66 2640 We pick a small prime number s, with gcd(s, ?(n))-1. …
10. (TCO 2) A user inputs his name in response to a prompt for a numeric value.
10. (TCO 2) A user inputs his name in response to a prompt for a numeric value. The subsequent cin statement tries to get a numeric value and store it into an integer variable. Ho…
10. (TCO 2) A user inputs his name in response to a prompt for a numeric value.
10. (TCO 2) A user inputs his name in response to a prompt for a numeric value. The subsequent cin statement tries to get a numeric value and store it into an integer variable. Ho…
10. (TCO 4) How many elements does the following array contain? double data [100
10. (TCO 4) How many elements does the following array contain? double data [100] [500]; (Points : 7)                                        500                                   …
10. A byte value in the range -10 to -1 is added to a byte value in the range 50
10. A byte value in the range -10 to -1 is added to a byte value in the range 50 to 128. Can 11. Write a code sequence which will increment the four byte value at location S1020 1…
10. A data verification loop is a loop that asks the user to input a value withi
10. A data verification loop is a loop that asks the user to input a value within a restricted range repeatedly until the user has input a value within the requested range. Write …
10. A switch and a NIC are negotiating a connection. The switch operates at 10 M
10. A switch and a NIC are negotiating a connection. The switch operates at 10 Mbps, and 10000 Mbps. The switch supports both half-duplex and full-duplex connect The NIC operates …
10. A. Write an application that prompts a user for the number of years the user
10. A. Write an application that prompts a user for the number of years the user has until retirement and the amount of money the user can save annually. If the user enter 0 or a …
10. An Internet service provider sets its base rate for data transfers in a give
10. An Internet service provider sets its base rate for data transfers in a given month according to market conditions. Customers are billed for data transferred in a given month …
10. An electrical engineer has designed a circuit with three light emitting diod
10. An electrical engineer has designed a circuit with three light emitting diodes (LEDs) placed at various points along the circuit to detect ifa current is running through that …
10. An even trickier question: In a three-message authentication protocol, Alice
10. An even trickier question: In a three-message authentication protocol, Alice initiates contact with Bob. Bob is a stateless server, and thus it is inconvenient for him to reme…
10. Analyze the following code public class Test { public static void main(Strin
10. Analyze the following code public class Test { public static void main(Stringl] args) { Object a1 = new AOs Object a2-new Obiect0; System.out.println(al); System.out.println(a…
10. Answer the following questions about cache memory using a computer system wi
10. Answer the following questions about cache memory using a computer system with the following characteristics: Total Memory Requests: 5000, Memory Requests Found in Cache 3500,…
10. Arguments are also known as ____. A. parameters B. variables C. members D. r
10. Arguments are also known as ____. A. parameters B. variables C. members D. records 12. A(n) ____ program produces the expected output for any legitimate input. A. correct B. a…
10. Can the following function throw any unhandled exception? void f1() _____ 11
10. Can the following function throw any unhandled exception? void f1() _____ 11. If the following function throws an unhandled exception, what happens? void f1() _____ 12. If the…
10. Cartesian Circle- Use just one function and pass by reference— please follow
10. Cartesian Circle- Use just one function and pass by reference— please follow the instructions below to complete this assignment. NAME OF UNIT: USER-DEFINED FUNCTIONS UNIT OBJE…
10. Comparing first come-first serve process and disk scheduling (a) What is the
10. Comparing first come-first serve process and disk scheduling (a) What is the principal advantage of FCFS process scheduling? (b) What is the principal disadvantage of FCFS pro…
10. Compute the perimeter of a cirele (circle _perimeter 2 11.Compute the area o
10. Compute the perimeter of a cirele (circle _perimeter 2 11.Compute the area of a circle (cirele area 12.Compute the total square feet needed: (square feet-number of tables 3 tr…
10. Consider a class Movie that contains information about a movie. The class ha
10. Consider a class Movie that contains information about a movie. The class has the following attributes: The movie name The MPAA rating (e.g., G, PG, PG-13, R) The number of pe…
10. Consider the IBM 370 architecture and the Rx format discussed above. The eff
10. Consider the IBM 370 architecture and the Rx format discussed above. The effective memory address (that is, the address of the operand) is computed by adding the contents of t…
10. Consider the following function: int test(int x, int y) { if (x == y) return
10. Consider the following function: int test(int x, int y) { if (x == y) return x; else if (x > y) return (x + y); else return test(x + 1, y - 1); } What is the output of the …
10. Correctly overloaded methods must have the same a. return type b. identifier
10. Correctly overloaded methods must have the same a. return type b. identifier c. parameter list d. All of the above. 11. Methods are ambiguous when they a. are overloaded b. ar…
10. Data struc algorithms c++ Create an array that holds 100000 random integers
10. Data struc algorithms c++ Create an array that holds 100000 random integers between 1-1000. Allow the user to enter an integer to search. Create and implement Quicksort algori…
10. Display one special character as the cursor using ascii code \"@\" at the po
10. Display one special character as the cursor using ascii code "@" at the position of mytext[0][0]. 11. Replace Step 5. "Change all your texts to upper case" with "Display 20 li…
10. Driver\'s License Exam rhe local Driver\'s License Office has asked you to w
10. Driver's License Exam rhe local Driver's License Office has asked you to write a program that grades the written portion of the driver's license exam. The exam has 20 multiple…