Web development and programming
191828 questions • Page 315 / 3837
19.9 Write a PHP script that obtains a URL and its description from a user and s
19.9 Write a PHP script that obtains a URL and its description from a user and stores the information into a databaseusing MySQL. create and run a SQL script with a database named…
192.168.1.1 11000000.10101000.00000001.00000001 IP address 192.168.1.0 11000000.
192.168.1.1 11000000.10101000.00000001.00000001 IP address 192.168.1.0 11000000.10101000.00000001.00000000 Subnet # 192.168.1.2 11000000.10101000.00000001.00000010 IP address 192.…
1994 Weekly Gas Graph (in python) Using matplotlib, write a Python program that
1994 Weekly Gas Graph (in python) Using matplotlib, write a Python program that reads the contentes of the file then plots the data as either a line graph or a bar chart. Be sure …
19Which of the following statements are false? (There are multiple correct answe
19Which of the following statements are false? (There are multiple correct answers and you must select all correct choices in order to get full credit for the question.) A single …
1: (10 points) Judge the correctness of the following r cach of he the following
1: (10 points) Judge the correctness of the following r cach of he the following datements and choose·True, or , False. (1) For a given se · i ved by usit ng Arastrong's asioms de…
1: Add methods peek() and updateFront(E item) to LinkedQueue< E > class. Method
1: Add methods peek() and updateFront(E item) to LinkedQueue< E > class. Method peek() should return the item from the front of the queue without removing it from the queue.…
1: Add methods peek() and updateFront(E item) to LinkedQueue< E > class. Method
1: Add methods peek() and updateFront(E item) to LinkedQueue< E > class. Method peek() should return the item from the front of the queue without removing it from the queue.…
1: Assume that age has the value 0. List the actions the computer executes when
1: Assume that age has the value 0. List the actions the computer executes when it 2. Assume that age has the value 8 List the actions thecomputer executes when it runs the follow…
1: Assume that dataTransmitter is a variable that refers to an object that provi
1: Assume that dataTransmitter is a variable that refers to an object that provides a method, sendSignal that takes no arguments. Write the code for invoking this method. 2: Assum…
1: Briefly explain, why we use Data Mining, specifically on large data sets (big
1: Briefly explain, why we use Data Mining, specifically on large data sets (big data)? 2: List and briefly explain major data mining tasks with examples? 3: Explain different app…
1: Create an HTML5 document containing an ordered list of three elements – ice c
1: Create an HTML5 document containing an ordered list of three elements – ice cream, soft server and frozen yogurt. Each ordered list should contain a nested, unordered list of y…
1: Create the Multifile Project and the Main (Base) Class Create a new project t
1: Create the Multifile Project and the Main (Base) Class Create a new project that consists of the base class BankAccount. The BankAccount class should contain, at minimum, the f…
1: Create the Multifile Project and the Main (Base) Class Create a new project t
1: Create the Multifile Project and the Main (Base) Class Create a new project that consists of the base class BankAccount. The BankAccount class should contain, at minimum, the f…
1: Define an abstract base class called BasicShape. The BasicShape class should
1: Define an abstract base class called BasicShape. The BasicShape class should have the following members: a) Protected Member Variable: area (a double used to hold the shape’…
1: Give the single BEST answer for the question below. Which of the following st
1: Give the single BEST answer for the question below. Which of the following statements are correct? 1) Several Entity Pictures cannot be combined into a Set, but they can be com…
1: Here is my question and I had attached 4a.cpp file also i.e 4th picture. 2: w
1: Here is my question and I had attached 4a.cpp file also i.e 4th picture. 2: we need to add code to work properly and send me code as well as out picture on my details. AT&T…
1: In the following code, what is the access specifier of the attribut (data)len
1: In the following code, what is the access specifier of the attribut (data)length? class Rectangle { double length;double width; public: double area(double length, double width)…
1: Problem Description: JAVA (The Account class) Design a class named Account th
1: Problem Description: JAVA (The Account class) Design a class named Account that contains: • A private String data field named id for the account (default “00000000”). • A priva…
1: Temperature [30 marks] Complete the provided Temperature class. Add any attri
1: Temperature [30 marks] Complete the provided Temperature class. Add any attributes and helper methods as needed You must complete the constructors and methods in the provided c…
1: The regular expression String regex = \"[xy]\"; matches (choose the best answ
1: The regular expression String regex = "[xy]"; matches (choose the best answer): A. "x" B. "y" C. both A and B D. neither A nor B 2: The regular expression String regex = "[A-Z]…
1: When a program runs on a computer, it is stored in: 2: The code that a progra
1: When a program runs on a computer, it is stored in: 2: The code that a programmer writes is called 3: The ability to a language to let a programmer develop a program on compute…
1: Which of the following classes is not used for file input? a. FileInputStream
1: Which of the following classes is not used for file input? a. FileInputStream b. FileReader c. ObjectInputStream d. Formatter 2: Streams that input bytes from and output bytes …
1: Which of the following names seem like good variable names to you? If a name
1: Which of the following names seem like good variable names to you? If a name doesn’t seem like a good variable name, explain why not. a) C The Variable is too short and…
1: Write a program (with the name Palindrome.java) that will use stacks to recog
1: Write a program (with the name Palindrome.java) that will use stacks to recognize palindromic sequences of integers. A sequence of integers is palindromic if it reads the same …
1: Write the header file Car.h for the Car class. The Car class has three data m
1: Write the header file Car.h for the Car class. The Car class has three data members: miles_per_gallon (double), fuel (double), and model (string). The Car class has a construct…
1: can constants ever be dynamically bound ina. Compiled language? Explain. 2: e
1: can constants ever be dynamically bound ina. Compiled language? Explain. 2: explain the difference between a variables scope and it's lifetime. 3: what is the difference betwee…
1: function SUMELEMENT array A 2: if length(A)1: 3: return ?? 4: else: 6: 7: 8:
1: function SUMELEMENT array A 2: if length(A)1: 3: return ?? 4: else: 6: 7: 8: end function Al ? A10 : length(A)/2] A2Allength(A)/2 length(A)] return SumElement(A1) + 2* SumEleme…
1:-1 4G Orange Ii. vclass.ammanu.edu.jo 1. Write a C++ program that prompts the
1:-1 4G Orange Ii. vclass.ammanu.edu.jo 1. Write a C++ program that prompts the user to input three integer values and find the greatest value of the three values. 2. Write a C++ …
1:17 PM Keep in mind that some students have joined more than one intramural tea
1:17 PM Keep in mind that some students have joined more than one intramural team in different sports. When John needs to schedule games or tournaments, he uses a large wall calen…
1:21 PM savstate.view.usg.edu The directory contains configuration files that th
1:21 PM savstate.view.usg.edu The directory contains configuration files that the T-Mobile Wi-Fi 3396 system uses when the computer starts. /boot /bin /dev /etc Save Question 14 (…
1:26 PM psu.instructure.com iPad Overall Problem You are playing the game of Mon
1:26 PM psu.instructure.com iPad Overall Problem You are playing the game of Monopoly and you decide you wish to construct houses on one of your property groups. The rules of the …
1:27 PM savstate view usgedu Data Base Manageme.. EPI Antron Johnson Question 15
1:27 PM savstate view usgedu Data Base Manageme.. EPI Antron Johnson Question 15 (3 points) Two entities: ssu Faculty and ssu Course The relationship is Teaches so the participati…
1:36 PM a savstate view.usg.edu UNIX/Linux are_systems, which let many people si
1:36 PM a savstate view.usg.edu UNIX/Linux are_systems, which let many people simultaneously access and share the resources of a .11 T-Mobile Wi-Fi 29%) server computer superuser …
1:39 PM .oooo Sprint 43% In order for excercise to be beneficial to the cardiova
1:39 PM .oooo Sprint 43% In order for excercise to be beneficial to the cardiovascular system, the heart rate (number of hear beats per minute) must exceed a value called the trai…
1:47 PM 10% .oooo H20 ehacc hacc.edu Fractions Task: Add several pairs of fracti
1:47 PM 10% .oooo H20 ehacc hacc.edu Fractions Task: Add several pairs of fractions and sim the resulting sums. plity The program should be able to manage signed numbers, like or …
1:51 PM elearn.uta.edu \'11 AT&T; Write C programs for the following: 1. Write a
1:51 PM elearn.uta.edu '11 AT&T; Write C programs for the following: 1. Write a function to ask to user a number of elements, create random decimal numbers ranging between -3 …
1:52 Back Assignment 1.pdf 1. [6] Give a PEAS description of the task environmen
1:52 Back Assignment 1.pdf 1. [6] Give a PEAS description of the task environment and characterize it in terms of the properties discussed in the class a) Playing soccer b) Knitti…
1:Compare the array and linked list implementations of queues. What are the adva
1:Compare the array and linked list implementations of queues. What are the advantages and disadvantages of each implementation? Consider memory space, the complexity of the imple…
1:Consider the following statement: The behavior that a user sees a program exhi
1:Consider the following statement: The behavior that a user sees a program exhibit is fully defined in the machine code contained by it's executable. Is this statement correct? A…
1:How can you force Excel not to show the error of a formula? 2: Absolute cell r
1:How can you force Excel not to show the error of a formula? 2: Absolute cell referencing uses the # symbol. (True/False) 4:=$B$2 - 2 is an example of mixed cell referencing. (Tr…
1>A person can be a single point of failure. True False 2>The steps of a BCP are
1>A person can be a single point of failure. True False 2>The steps of a BCP are the same as the phases of a BCP. True False 3>The more data you store, the more valuable …
1>The main benefit of a vulnerability assessment is that hackers cannot perform
1>The main benefit of a vulnerability assessment is that hackers cannot perform the same steps as people performing the assessment. T/F 2>Change management ensures that simi…
1>The value of an assessment is only as valuable as the expertise of the experts
1>The value of an assessment is only as valuable as the expertise of the experts. True False 2>Formulas for quantitative risk assessments usually look at a period of _______…
1>Which of these patterns works best to help people achieve security? (Choose on
1>Which of these patterns works best to help people achieve security? (Choose one) Provide a modal warning they can understand Use a spiky button for the dangerous choice Show …
1? URUEor FALSE The Leftist Heap would have voted for Bernie Sanders, if he had
1? URUEor FALSE The Leftist Heap would have voted for Bernie Sanders, if he had made it past the DNC. 2. TRUE or FALS If you want to keep your data sorted, you should use a hash t…
1?Which statement converts value in double variable x to a String variable str?
1?Which statement converts value in double variable x to a String variable str? str = x.toString(); str = x; str = Double.toString(x); str = String.double(x); 2?Which statement co…
1A Pentium III Branch Cost What is slowdown as compared to the ideal pipeline fo
1A Pentium III Branch Cost What is slowdown as compared to the ideal pipeline for the Pentium III? 1B Pentium 4 prediction rate Given this data, what was the branch prediction rat…
1A is done, need B,C,D Pipeline 1. Consider the processor with a five stage pipe
1A is done, need B,C,D Pipeline 1. Consider the processor with a five stage pipeline with delays listed in Table 1 IF MEM EX ID WB 300 ps 200 ps 250ps 350ps 150ps Table 1. Delay o…
1A nitialize objects -) a HashMap object, stMap, that the key set is a set of St
1A nitialize objects -) a HashMap object, stMap, that the key set is a set of String objects and the value set is a set of Student objects -) a TreeMap object, cardvalue, that the…
1A) Describe how to define an M4 macro B) Describe the effect a definition has w
1A) Describe how to define an M4 macro B) Describe the effect a definition has when M4 processes the file C) List step-by-step how the macro you wrote for Programming Assignment 1…
Subject
Web development and programming
Use Browse or pick another subject.