Web development and programming
191828 questions • Page 298 / 3837
11,Given a JPanel panel2 that sits in a JFrame. Create and add Go! and Stop! but
11,Given a JPanel panel2 that sits in a JFrame. Create and add Go! and Stop! buttons to panel2. 12,Given the method average below, write an overloaded method average that has thre…
11- Name the three goals of information security. (This is not the same as the t
11- Name the three goals of information security. (This is not the same as the three properties of a secure system.) 12- What is the difference between identification and authenti…
11- Which is NOT a primary option for addressing missing data? a. To generate ra
11- Which is NOT a primary option for addressing missing data? a. To generate random data to replace the missing values b. To discard any variable with missing values c. To fill i…
11- Write a class called Employee that has two integer member variables variable
11- Write a class called Employee that has two integer member variables variable called salary. The Employee must have setter and getter range 0 to 100 then an exception must be s…
11-13 b) ed datal.txt Mydir/ c) ep datal.txt Mydir/ d) Is datal.txt Mydir/ 0. Wh
11-13 b) ed datal.txt Mydir/ c) ep datal.txt Mydir/ d) Is datal.txt Mydir/ 0. Which of the following Linux command can move a file datal.txt to a director a) mv datal.txt Mydir/ b…
11-Array Expander: Write a function that accepts an int array and the array s si
11-Array Expander: Write a function that accepts an int array and the array s size as arguments. The function should create a new array that is twice the size of the argument arra…
11. (1) Suppose after timeout, one of the fragments for an IP datagram is not re
11. (1) Suppose after timeout, one of the fragments for an IP datagram is not received by the destination. What will the destination do then? a. Ask the source to retransmit the m…
11. (10 points) This question deals with cryptographic hashes. (a) What are the
11. (10 points) This question deals with cryptographic hashes. (a) What are the key properties for a cryptographic hash? (b) Given a hash value of n bits, what is the expected wor…
11. (10 pts) For the following operations in the ARCTool program below: the inst
11. (10 pts) For the following operations in the ARCTool program below: the instruction he is defined in table 4, 10 as branch equal ( the instruction bu is defined as branch alwa…
11. (12 pts; 3 pts each Running 1s-1 in a directory prints the following to the
11. (12 pts; 3 pts each Running 1s-1 in a directory prints the following to the standard out. wx-wxr-1 altintas staff 17 Feb 18 17:34 temp.txt The user runs the following commands…
11. (5 points) Fill out the stack and heap information for the following code to
11. (5 points) Fill out the stack and heap information for the following code to illustrate why the append action on myScramber1 does not affect the word output by myScrambler2. T…
11. (TCO 3) A network engineer types the following commands on a production (liv
11. (TCO 3) A network engineer types the following commands on a production (live) router that is connected to a WAN link from NY to CA. interface serial 0/3/1 ip address 206.167.…
11. (TCO 3) FlowLayout(Points : 6) is a layout manager that organizes components
11.(TCO 3) FlowLayout(Points : 6) is a layout manager that organizes components left to right, top to bottom. displays only the last component added to each of its areas. places c…
11. (TCO 4) Which of the following expressions is correct if you want to end a w
11.(TCO 4) Which of the following expressions is correct if you want to end a while-loop when the character variableansweris anything other than the character 'y' in either upper …
11. (p. 115) If Option Strict is turned off and a declaration statement does not
11. (p. 115) If Option Strict is turned off and a declaration statement does not specify a data type, it will default to _______. A. boolean B. string C. object D. variable 12. (p…
11. 1. Challenge A simple blog database A sql-5-7.sql file has been opened for y
11. 1. Challenge A simple blog database A sql-5-7.sql file has been opened for you. In the sql-5-7.sql file: 1. Use the blog database 2. Write a SQL RIGHT OUTER JOIN statement tha…
11. 1. Challenge A simple blog database A sql-5-7.sql file has been opened for y
11. 1. Challenge A simple blog database A sql-5-7.sql file has been opened for you. In the sql-5-7.sql file: Use the blog database Write a SQL RIGHT OUTER JOIN statement that join…
11. A collection that remembers the order of items, and allows items to be added
11. A collection that remembers the order of items, and allows items to be added and removed only at one end is called a ____. list stack set queue QUESTION 12 You need to write a…
11. A vertical steel beam in a building supports a load of4.0 times 10^4 N. (a)
11. A vertical steel beam in a building supports a load of4.0 times 10^4 N. (a) if the length of the beam is 3.0 m and its cross sectional area is4.0 times 10^-3 m^2 , find the di…
11. A. Create a class named Sandwich. Data fields include a string for the main
11. A. Create a class named Sandwich. Data fields include a string for the main ingredient (such as "tuna") , a string for bread type (such as "wheat"l , and a double for price (s…
11. After a large snowstorm, the newspaper reports the water equivalent of the p
11. After a large snowstorm, the newspaper reports the water equivalent of the precipitation for 1Yorkton, Saskatchewan to be 25 mm. If we assume all of the precipitation fell as …
11. An example of a one-to-many type of relationship in database design might be
11. An example of a one-to-many type of relationship in database design might be _________. a. an employee can be assigned one and only one computer. b. an employee cannot be assi…
11. An iflelse statement is used when you need to choose between two alternative
11. An iflelse statement is used when you need to choose between two alternatives. True False 12. In a boolean expression which uses the && operator, what would make this …
11. Analyze and the select the correct answer/s: public class A extends B{ class
11. Analyze and the select the correct answer/s: public class A extends B{ class B public B(String s) s A. The program has a compilation error because A does not have a default co…
11. Answer the following regarding the RAID levels: a. We use RAID 5 instead of
11. Answer the following regarding the RAID levels: a. We use RAID 5 instead of RAID 4. In what way is RAID 5 better than RAID 4? b. A home computer users wishes to select some fo…
11. BIS infrastructure components correspond to EA\'s ______ architecture. Quest
11. BIS infrastructure components correspond to EA's ______ architecture. Question 11 options: A) technology B) application C) data/information D) All of the above 12. A(n) ___ is…
11. Complete the table below by filling in the ethical issue that each situation
11. Complete the table below by filling in the ethical issue that each situation relates to, Choose an ethical issue from the list: Reliability Security Value for money Confidenti…
11. Consider a file system that uses a structure similar to an i-node with the f
11. Consider a file system that uses a structure similar to an i-node with the following differences. If the file size is less than 100 bytes, the data is stored directly in the i…
11. Consider the following Linked List programs written in C e This code segment
11. Consider the following Linked List programs written in C e This code segment is int data, NodeType "next W This is a header file saved under finclude "Node Type.h class Unsort…
11. Consider the following skeletal Cprogram: void funl (void) /*prototype void
11. Consider the following skeletal Cprogram: void funl (void) /*prototype void fun2 (vo1d) prototype void fun3 (void) /prototype void main) I int a, b, c void funl (vo1d) int b, …
11. Consider the following snapshot of a system with five processes(p1,...p5) an
11. Consider the following snapshot of a system with five processes(p1,...p5) and four resources (r1,...r4). There are no current outstanding queued unsatisfied requests. currentl…
11. Consider this class: class Node implements Comparable T> t public int compar
11. Consider this class: class Node implements Comparable T> t public int compare To(T obj) I/ Will the following code compile? If not, why? Node-String> node = new Node(); …
11. Course Grades In a course, a teacher gives the following tests and assignmen
11. Course Grades In a course, a teacher gives the following tests and assignments: • A lab activity that is observed by the teacher and assigned a numeric score. • A pass/fail ex…
11. Data types, default values, check constraints, and NOT NULL constraints are
11. Data types, default values, check constraints, and NOT NULL constraints are examples of which type of integrity? *This question is required. a. Referential integrity b. Entity…
11. During which phase of the access control process does the system answer the
11. During which phase of the access control process does the system answer the question, "What can the requestor access?" A. Identification B. Authentication C. Authorization D. …
11. Explain the differences in the following two machine recovery schemes. Comme
11. Explain the differences in the following two machine recovery schemes. Comment on their implementation requirements, advantages and shortcomings, and application potentials. (…
11. Final challenges User settings are another example of data that needs to be
11. Final challenges User settings are another example of data that needs to be updated. Users otten decide to change their username, password, email accounts, email notification …
11. Five-click House. You are to write a program that allows the user to draw a
11. Five-click House. You are to write a program that allows the user to draw a simple ho using five mouse clicks. The first two clicks will be the opposite come the rectangular f…
11. For each accident, list the registration number, year, make, and model of th
11. For each accident, list the registration number, year, make, and model of the car(s) involved. 12. List all accidents that occurred during 2005. 13. List the SSN, first name, …
11. Function Tracing (20 points) Trace the following program. Show a work includ
11. Function Tracing (20 points) Trace the following program. Show a work including labeled designated spaces. You should draw a box for each variable and show value updates. ll o…
11. Hash Tables (Just give me the equations for these with the right load factor
11. Hash Tables (Just give me the equations for these with the right load factor plugged in.) 11a. Suppose you have a hash table that uses open addressing with linear probing for …
11. How can you get more information from the same amount of data by using a dat
11. How can you get more information from the same amount of data by using a database approach instead of a nondatabase approach? 12. What is meant by the sharing of data? 13. Wha…
11. If a method is declared to return void, then which statement below is true?
11. If a method is declared to return void, then which statement below is true? Select one: a. The method cannot return until reaching the end of the method body b. The method nee…
11. Implement the following method as a new static method for the IntNode class.
11. Implement the following method as a new static method for the IntNode class. (Use the usual Node definition with instance variables called data and link.) public static boolea…
11. In Android systems, the contacts with related data are shared and handled by
11. In Android systems, the contacts with related data are shared and handled by (A) XMPP (B) Resources Manager (C) Package Manager (D) Telephony Manager (E) Content Providers 12.…
11. In Chapter 1, the class clockType was designed and implemented to implement
11. In Chapter 1, the class clockType was designed and implemented to implement the time of day in a program. This chapter discussed how to overload various operators. Redesign th…
11. In _____, systems analysts use a prototype to verify user requirements, afte
11. In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. a. system prototyping b. command p…
11. In the following code, correct any errors that would prevent the program fro
11. In the following code, correct any errors that would prevent the program from compiling or running and write output. Point 5 package javaapplication4; import java.util.Scanner…
11. Indicate whether the following statemets are valid or not. int cat[10]; //Co
11. Indicate whether the following statemets are valid or not. int cat[10]; //Correct? Incorrect? double rat[5.5]; //Correct? Incorrect? int n = 5; string dog[n]; //Correct? Incor…
11. Industrial systems become part of the IoT when ______ . 12. What is the prim
11. Industrial systems become part of the IoT when ______ . 12. What is the primary difference between an open loop system and a closed loop system? 13. Which network components s…
Subject
Web development and programming
Use Browse or pick another subject.