Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 318 / 3837

2 Assignment Define a class BinaryNumber that represents binary numbers and a fe
2 Assignment Define a class BinaryNumber that represents binary numbers and a few simple operations on them, as indicated below. An example of a binary number is 1011 Its length i…
2 Basic List Manipulations Problem 1 (5 points) Write an ML function, called alt
2 Basic List Manipulations Problem 1 (5 points) Write an ML function, called alternate: 0a list ? 0a list ? 0a list, that takes two lists, having the same length, as input and pro…
2 Boolean Formula Evaluation 4. (a) Consider the formula ((A B) (A C)) (B C) wit
2 Boolean Formula Evaluation 4. (a) Consider the formula ((A B) (A C)) (B C) with assignment to the variables A, B TRUE, C FALSE. Evaluate the formula. You do not need to show you…
2 C programs required. The 2nd is just a slight change of the first, not much mo
2 C programs required. The 2nd is just a slight change of the first, not much more work required. 1.Write a C program to implement a “linked list” of items, where each item is imp…
2 Call-by-value (applicative order) and Call-by-name (normal order) (SICP Exerci
2 Call-by-value (applicative order) and Call-by-name (normal order) (SICP Exercise 1.5) Ben Bitdiddle has invented a test to determine whether the interpreter he is faced with is …
2 Capitalizing Words This task requires writing a C program which reads text fro
2 Capitalizing Words This task requires writing a C program which reads text from standard input (one character at a time) and outputs the text with the capitalization of some cha…
2 Cashier A cashier is responsible for helping a queue of customers. It serves o
2 Cashier A cashier is responsible for helping a queue of customers. It serves one customer at a time. Since the simulation is used to produce statistics, a cashier also memorizes…
2 Clerk A clerk is given by the following attributes: his Name and lastname (of
2 Clerk A clerk is given by the following attributes: his Name and lastname (of type String) the year of birth (of type int) his salary class (of type int) a boolean value that in…
2 Comment on the following statements Information produced by the information pr
2 Comment on the following statements Information produced by the information processor must t ac frmation as possible. An information processor should provide the m be free of er…
2 Comp ete the program based on the given comments. The program uses two to disp
2 Comp ete the program based on the given comments. The program uses two to display messages on the console. (16 points) buttons public class of JButton with label "ok" JFrame //c…
2 Consider the following program: (5pts each, total 20 pts 1 Fig. 10.9: Payrolls
2 Consider the following program: (5pts each, total 20 pts 1 Fig. 10.9: Payrollsystenrest java 2 Employee hierarchy test program 4 public class payrollsystemTest public static voi…
2 Convert each of the following octal numbers to 10-bit binary, hexadecimal, and
2 Convert each of the following octal numbers to 10-bit binary, hexadecimal, and decimal. Show your work. (a) 368 (b) 7568 3 Convert the following binary values into Decimal, Octa…
2 Decision Tree Models (40 points) In class, we have used the decision tree mode
2 Decision Tree Models (40 points) In class, we have used the decision tree model to derive a lower bound for the worst-case running time of comparison-based sorting, including in…
2 Design and write your own space-invaders game. Control a gun si mouse over the
2 Design and write your own space-invaders game. Control a gun si mouse over the enemy space-craft to zap the invaders. Invader space craft should be generated at random intervals…
2 Encryption In this assignment, you will implement a very crude encryption algo
2 Encryption In this assignment, you will implement a very crude encryption algorithm. Each byte of a file will be increased by a varying value based on a password. User Input A d…
2 Error checking - part 1: In the original program, it asked the user for a ques
2 Error checking - part 1: In the original program, it asked the user for a question and then "shook" the 8 ball to get an answer. It checks to see if the question was too long. I…
2 Exercises CISC/RISC Architectures For each of these items, specify if the item
2 Exercises CISC/RISC Architectures For each of these items, specify if the item is more characteristic of a traditional CISC architecture or a RISC architecture. Type CISC or RIS…
2 Four in a Diagonal Line You are given a two-dimensional array of size 6x7 that
2 Four in a Diagonal Line You are given a two-dimensional array of size 6x7 that contains 1's, 2's, and 3's. Write a function that determines if there are four 1's or 2's in a dia…
2 Heaps and Heapsort (25 points) 2.1 Is the sequence a max-heap? Why or why not?
2 Heaps and Heapsort (25 points) 2.1 Is the sequence a max-heap? Why or why not? 2.2 Illustrate the operation of Max-HEAPIPY(A; 3) on the array A27, 17,3, 16, 13, 10, 1,5, 7,12,4,…
2 In the circular double linked list, the operations are as follows to insert th
2 In the circular double linked list, the operations are as follows to insert the node pointed by S before P: S->next P: S>prior : P>prior->next - S: Pprior S 3 Please…
2 Input File Specification The first part of your program will read in possible
2 Input File Specification The first part of your program will read in possible puzzle configurations from a file and choose one of them randomly. The file format is as follows: T…
2 Instructions Write a Matlab function called hw10.m that computes the maximum h
2 Instructions Write a Matlab function called hw10.m that computes the maximum horizontal and vertical distance of a projectile and the total travel time, given the firing angle a…
2 Interface to get statistics from a text file. Used in the testing program. 3 a
2 Interface to get statistics from a text file. Used in the testing program. 3 author CS121 Instructors 5 public interface TextStatisticsInterface *greturn the number of character…
2 Lab Questions 1. Long multiplica on Write a program (called gl.py) that maltip
2 Lab Questions 1. Long multiplica on Write a program (called gl.py) that maltiplies two numbers and counts the number of carry operations. The output will pint a) the multiplicat…
2 Lab Questions 1. Primary arithmetic. Write a program (called q1.py) that adds
2 Lab Questions 1. Primary arithmetic. Write a program (called q1.py) that adds two numbers and counts the number of carry operations. You will define your own defined functions f…
2 MARIE Rock Paper Scissors, best two of three This task will have you preparing
2 MARIE Rock Paper Scissors, best two of three This task will have you preparing a MARIE program which together. We will break it down into small steps for you allows two players …
2 MODIFY the Player class from the previous assignment Add the following PRIVATE
2 MODIFY the Player class from the previous assignment Add the following PRIVATE data: ArrayList cItem> inventory (default: new Array List) Add the following PUBLIC methods voi…
2 Many cryptographic applications support a range of diffterent cryptographic al
2 Many cryptographic applications support a range of diffterent cryptographic algorithms (a) Which of the applications discussed in this chapter support a range of cryptographic a…
2 Numeric Base Conversion and Calculator Implement a program called calc with th
2 Numeric Base Conversion and Calculator Implement a program called calc with the following usage interface: calc The first argument, , is either the string"+", for addition, or "…
2 PARTS: A) Write an application that allows a user to enter the names and birth
2 PARTS: A) Write an application that allows a user to enter the names and birthdates of up to 10 friends. Continue to prompt the user for names and birthdates until the user ente…
2 Part Question Alice has a picture-based password system, where she has each us
2 Part Question Alice has a picture-based password system, where she has each user pick a set of their 20 favorite pictures, say, of cats, dogs, cars, etc. To login, a user is sho…
2 Part question: PART 1: You are writing buffer overflow attack. The target of y
2 Part question: PART 1: You are writing buffer overflow attack. The target of your attack is a procedure named victim, which receives a packet from the network and stores it in a…
2 Passing Lane Passing Lane is a small trucking company headquartered in Portlan
2 Passing Lane Passing Lane is a small trucking company headquartered in Portland, Oregon. Passing Lane's information system consists of a file server and three workstations where…
2 Passing Lane Passing Lane is a small trucking company headquartered in Portlan
2 Passing Lane Passing Lane is a small trucking company headquartered in Portland, Oregon. Passing Lane's information system consists of a file server and three workstations where…
2 Question 1 For this question, you must implement the class (static) method boo
2 Question 1 For this question, you must implement the class (static) method boolean isSkipped (Stack s1, Stack s2) . The method isSkipped returns true if and only if the stacks d…
2 Question about Database SQL exercise 1. Our company needs a listing of each pr
2 Question about Database SQL exercise 1. Our company needs a listing of each product we sell. Create a query that shows the Category Name, Product Name, Description, and Price fo…
2 RSA encryption For the following questions, we are using the RSA cryptosystem.
2 RSA encryption For the following questions, we are using the RSA cryptosystem. For each of the questions below, write down the operation you need to perform in addition to the a…
2 Red-Black Trees (30 points) Consider the binary tree as shown in Figure 2. 65
2 Red-Black Trees (30 points) Consider the binary tree as shown in Figure 2. 65 50 80 10 60 85 5 45 62 Figure 2: Binary Tree: The letter next to each node (e.g., a, b) denotes the…
2 Researching BI tools: Researching BI Tools Select 3 Vendors from the list belo
2 Researching BI tools: Researching BI Tools Select 3 Vendors from the list below (or 2 from below and 1 of your choice that is not on the list.) For each of the 3 you choose, usi…
2 SavingsAccount class CHANGE TO A TEMPLATE CLASS . Add accountNumber to the con
2 SavingsAccount class CHANGE TO A TEMPLATE CLASS . Add accountNumber to the constructor. You may make interestRate ‘protected’ so you can directly access it in CDAccount. No othe…
2 SavingsAccount class Change to a template class. Add accountNumber to the cons
2 SavingsAccount class Change to a template class. Add accountNumber to the constructor. You may make interestRate ‘protected’ so you can directly access it in CDAccount. No other…
2 Statistics (30 points) Write a program called Average java that prompts a user
2 Statistics (30 points) Write a program called Average java that prompts a user to enter a number, and allows the user to continue to enter numbers until she responds with a nega…
2 Tasks 2.1 The “main” class The main class that runs the whole code is “Main.ja
2 Tasks 2.1 The “main” class The main class that runs the whole code is “Main.java”. This class is responsible for reading the input file, creating the object that maintains the t…
2 The Arrays class contains various methods for manipulating arrays (such as sor
2 The Arrays class contains various methods for manipulating arrays (such as sorting and searching). Research this in the Java API via a web browser. Use the methods of this class…
2 The Game of Life (45 points) Imagine a world of organisms living in a two-dime
2 The Game of Life (45 points) Imagine a world of organisms living in a two-dimensional cell grid size n x m. Each organism can only occupy a single cell. Each cell, of world), ha…
2 The Methods For each of the following, create a static method with the appropr
2 The Methods For each of the following, create a static method with the appropriate inputs and outputs. Call each of them in the main method. 2.1 Uniqueness Write a method called…
2 The Story... Vehicle trajectories provide insights for improving the transport
2 The Story... Vehicle trajectories provide insights for improving the transport system, such as understanding people's commute patters, identifying traffic congestions, detecting…
2 The code extract below inserts a record into a table named \"STUDENT. The prim
2 The code extract below inserts a record into a table named "STUDENT. The primary key is matric" s?php Shostname "localhost Susername "mweb" Spassword "rigbonla Sdatabase student…
2 Web Browser (35 points) Your program should have a text edit box at the top of
2 Web Browser (35 points) Your program should have a text edit box at the top of the Write a very simple GUI web window for the user to type a URL. Provide a listener that activat…
2 What is the output produced when the following code iscompiled and executed? #
2 What is the output produced when the following code iscompiled and executed? #include <iostream> using namespace std; //introduces namespace std int main() { int *p1, *p2,…