Web development and programming
191828 questions • Page 325 / 3837
2. 3. A 2500-km long T1 trunk is used to transmit 128-byte frames using protocol
2. 3. A 2500-km long T1 trunk is used to transmit 128-byte frames using protocol 5. a) If the propagation speed is 6 microseconds/km, how large should the window size be? b) How m…
2. 3. A permutation on a set of numbers (o..n-1) is a function from 50,.n-1) int
2. 3. A permutation on a set of numbers (o..n-1) is a function from 50,.n-1) into itself such that no two numbers are mapped on the same image For instance, the function f on (0,1…
2. 4. The following problems deal with translating from C to ARM. Assume that th
2.4. The following problems deal with translating from C to ARM. Assume that the variables f, g, h, i, and j are assigned to registers r0, r1, r2, r3, and r4, respectively. Assume…
2. 5 points] In fairy chess, pieces with non-traditional types of moves are used
2. 5 points] In fairy chess, pieces with non-traditional types of moves are used in place of (or in addition to) the usual pieces. One such piece is called a Major, which can move…
2. A boolean formula is said to be in Monotone 2-CNF if it is the conjunction of
2. A boolean formula is said to be in Monotone 2-CNF if it is the conjunction of clauses, each of which has exactly 2 literals and all the literals in the formula are positive (i.…
2. A branch instruction that uses relative addressing has a signed operand equal
2. A branch instruction that uses relative addressing has a signed operand equal to-31, The instruction is 3-bytes long and is located at decimal 200 in memory. What is the addres…
2. A community has 7 swimming pools, as shown in the following map 10 (12,9 (6,
2. A community has 7 swimming pools, as shown in the following map 10 (12,9 (6, 6) (10,5 1 234 56 78910 1112 13 14 Your project must satisfy the following requirements 1. Create t…
2. A divide-and-conquer algorithm solves a problem by dividing its given instanc
2. A divide-and-conquer algorithm solves a problem by dividing its given instance into several smaller instances, solving each of them recursively, and then, if necessary, combini…
2. A four-bit addition machine is built with four full adders such that the carr
2. A four-bit addition machine is built with four full adders such that the carry out of the first adder is the carry in to the second adder, and the carry out of the second is th…
2. A generic computer has a two level cache, suppose the CPU makes a series of 4
2. A generic computer has a two level cache, suppose the CPU makes a series of 4000 address requests. The L1 cache, L2 cache, and main memory response times are 25ns, 50ns, and 20…
2. A less familiar chapter in the Tower of Hanoi\'s history is its brief relocat
2. A less familiar chapter in the Tower of Hanoi's history is its brief relocation of the temple from Benares to Pisa in the early 13th century. The relocation was organized by th…
2. A logic circuit was measured in the lab and produces the following digital ou
2. A logic circuit was measured in the lab and produces the following digital output function F in the time domain on the oscilloscope. Assume the higher voltages are interpreted …
2. A mail order house sells five different products whose retail prices are: pro
2. A mail order house sells five different products whose retail prices are: product 1: $2.98 product 2: $4.50 product 3: $9.98 product 4: $4.49 product 5: $6.87. Write a program …
2. A member function that returns a special error code can also be accomplished
2. A member function that returns a special error code can also be accomplished by throwing an exception. The following class maintains an account balance, where each member funct…
2. A palindrome is a word or phrase that reads the same forward and backward, ig
2. A palindrome is a word or phrase that reads the same forward and backward, ignoring blanks and considering uppercase and lowercase versions of the same letter to be equal. For …
2. A polygonal path is a sequence of line segments joined end-to-end; the endpoi
2. A polygonal path is a sequence of line segments joined end-to-end; the endpoints of these line segments are called the vertices of the path. The length of the polygonal path is…
2. A risk manager has performed a risk analysis on a server that is worth $120,0
2. A risk manager has performed a risk analysis on a server that is worth $120,000. The risk manager has determined that the Single Loss Expectancy is $100,000. The Exposure Facto…
2. A robot is to be programmed to unload parts from one pallet and load them ont
2. A robot is to be programmed to unload parts from one pallet and load them onto another pallet. The parts are located on the unload pallet (pallet 1) in a 3 by 4 pattern in know…
2. A rocket is launched vertically. At time t=0, the rocket\'s engine shuts down
2. A rocket is launched vertically. At time t=0, the rocket's engine shuts down. At that time, the rocket has reached an altitude of 500 m and is rising at a velocity of 125 m/s. …
2. A software company asked 100 of its programmers to develop a certain program
2. A software company asked 100 of its programmers to develop a certain program individually. The following histogram shows the time it takes a programmer to finish the task: …
2. A solution to critical region problem for n processes is suggested as follows
2. A solution to critical region problem for n processes is suggested as follows: All elements of flag are initially idle. The initial value of turn is something between 0 and n -…
2. A spelling checker program reads an input file and prints al the words not fo
2. A spelling checker program reads an input file and prints al the words not found in some on-line dictionary. Suppose the dictionary contains 20,000 words and the input file is …
2. A spelling checker program reads an input file and prints al the words not fo
2. A spelling checker program reads an input file and prints al the words not found in some on-line dictionary. Suppose the dictionary contains 20,000 words and the input file is …
2. A store gives a 15% discount to customers who are at least 55 years old, and
2. A store gives a 15% discount to customers who are at least 55 years old, and a 10% discount to all other customers. Using only the instructions shown in Figure 1-9, write an al…
2. A system is computing results for a set of different requests. Each request i
2. A system is computing results for a set of different requests. Each request is answered by first querying a database, and then processing the query results to produce an answer…
2. A team has N people and they are trying to reach the same destination. They m
2. A team has N people and they are trying to reach the same destination. They must first cross a bridge with distance B and then run on a wide road with distance R (wide enough f…
2. A team has N people and they are trying to reach the same destination. They m
2. A team has N people and they are trying to reach the same destination. They must first cross a bridge with distance B and then run on a wide road with distance R (wide enough f…
2. A vector is an ordered collection of values in mathematics. An array is a ver
2. A vector is an ordered collection of values in mathematics. An array is a very straightforward way to implement a vector on a computer. Two vectors are multiplied on an entry-b…
2. A(n) ___________ diagram is like a blueprint of a database application. a. fl
2. A(n) ___________ diagram is like a blueprint of a database application. a. flowchart b. data model c. data flow diagram d. workflow model 3. In one to many, or 1:M, type of rel…
2. A). What is the difference between TCP and UDP protocols. Select one: a. TCP
2. A). What is the difference between TCP and UDP protocols. Select one: a. TCP is better when fast transmission is important, whereas UDP is better when having less bit errors is…
2. Add a JSON file called members.json to the Lab10 folder with the following in
2. Add a JSON file called members.json to the Lab10 folder with the following information: [5 points] Person 1: • name=Cara Van • address=2 Highway • city=Cleveland • zip=12345 • …
2. Add a new function find(n) for class ArrayList. The function will return the
2. Add a new function find(n) for class ArrayList. The function will return the position of the first occurrence of n, if the element cannot be found, return 0. Note that in this …
2. Alan and Bill agree (through a public exchange) on using the Diffie-Hellman a
2. Alan and Bill agree (through a public exchange) on using the Diffie-Hellman algorithm to create a common secret key. They also agree on two public numbers: q (large prime numbe…
2. Algorithm and Running Time Analysis: Give the tightest possible upper bound f
2. Algorithm and Running Time Analysis: Give the tightest possible upper bound for the worst case running time for each of the following in terms of N. Assume that the most time-e…
2. All routers today implement policies for packet filtering and forwarding and
2. All routers today implement policies for packet filtering and forwarding and most of them use what are called Access Control Lists (ACLs) to configure these policies. Do some r…
2. All the following questions are against the penetration scenario shown in Fig
2. All the following questions are against the penetration scenario shown in Figure 1. In this penetration scenario, Mallory is a remote attacker who has no user account of the co…
2. All the following questions are against the penetration scenario shown in Fig
2. All the following questions are against the penetration scenario shown in Figure 1. In this penetration scenario, Mallory is a remote attacker who has no user account of the co…
2. An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 a
2. An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The ISP needs to distribute these addresses to three groups of customers as follows i. T…
2. An IT project team decided to use the following IT architecture to build the
2. An IT project team decided to use the following IT architecture to build the new system. But first they should transform the logical system models into physical. As a team memb…
2. An Online Movie Rental Company allows members to play or watch movies. Follow
2. An Online Movie Rental Company allows members to play or watch movies. Following are the use cases they have defined. • Register new customer • Member Sign in • Browse for Movi…
2. An enterprise level company wishes to set up a network to support several hun
2. An enterprise level company wishes to set up a network to support several hundred business users as well as manufacturing equipment in a new building. Describe what network dev…
2. An ideal pipeline will run a sequence of instructions with no delay. As usual
2. An ideal pipeline will run a sequence of instructions with no delay. As usual, suppose that each stage takes one clock cycle. That is, given instructions I1, · · · , Ik running…
2. An organization has an Internet connection and has been assigned the IP addre
2. An organization has an Internet connection and has been assigned the IP address 201.201.201.0/24. The router connecting the corporation to the Internet has been assigned an IP …
2. Analyze the Runtime Stack (40 points) The diagram below shows a snapshot of t
2. Analyze the Runtime Stack (40 points) The diagram below shows a snapshot of the run-time stack on an LC-3 system while the minMax function is running. There is a comment that i…
2. Another important skill for the software architect is the ability to choose a
2. Another important skill for the software architect is the ability to choose a technology or architect that is well-suited to the requirements of the application being built. Gi…
2. Another unproven conjecture in number theory is the following: Let f: N N be
2. Another unproven conjecture in number theory is the following: Let f: N N be dened by f(n)=n/2 n even 3n+1 n odd; then, for every n, there is an integer i such that fi(n) = 1. …
2. Answer A. The Java Runtime System forbid continuation. B. The method\'s runni
2. Answer A. The Java Runtime System forbid continuation. B. The method's running time has become exponential (or worse). C. The method's memory requires have become exponential (…
2. Answer the following questions. (S0 is always zero; i.e., it cannot be writte
2. Answer the following questions. (S0 is always zero; i.e., it cannot be written.) (a) After executing "add S5, S5, S6", what is S5? (b) What is the content of [100]? (c) After e…
2. Answer true or false? Explain your answer. Credit will not be given without a
2. Answer true or false? Explain your answer. Credit will not be given without a proper explanation a. Host A is sending Host B a large file over a TCP connection. Assume Host B h…
2. Apple co-founder Steve Wozniak has been quoted as saying: “With the cloud, yo
2. Apple co-founder Steve Wozniak has been quoted as saying: “With the cloud, you don’t own anything. You already signed it away” (regarding the terms of service with a cloud prov…
Subject
Web development and programming
Use Browse or pick another subject.