Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 328 / 3837

2. Create a function named “trim” that will trim all blanks IN FRONT and BEHIND
2. Create a function named “trim” that will trim all blanks IN FRONT and BEHIND a string. This function that will accept one parameter (string original) and will RETURN the new st…
2. Create a linked list called ShapeCollection to store the different shapes. 3.
2. Create a linked list called ShapeCollection to store the different shapes. 3. Program each of the area() functions to calculate and return the area for each shape.    4. Progra…
2. Create a matrix M that looks like the following: Using nested for loops and i
2. Create a matrix M that looks like the following: Using nested for loops and if statements, and use fprintf to show the matrix 8 11 14 17 ME 1 0 11 14 17 2 0 14 4 3. Write a scr…
2. Create a streaming banner thread that moves a simple message across a panel.
2.   Create a streaming banner thread that moves a simple message across a panel. The message should repeatedly enter at the right edge of the panel and exit from the left edge. D…
2. Create a version of your website that parallels our nature1 example of this c
2.           Create a version of your website that parallels our nature1 example of this chapter. That is, your site must have only a home page, but it must also have the rotating…
2. Create a website logon system. This system is designed to allow a user to cre
2. Create a website logon system. This system is designed to allow a user to create a logon for the first time and store the information as an object in an array. a. Create a test…
2. Create binary search tree (BST) that contains the first million prime numbers
2. Create binary search tree (BST) that contains the first million prime numbers. After you are reading in the data, output the maximum and average depth of the BST. Allow the use…
2. Create the seminar table Field Siure Data T text test text Emp city Emp salar
2. Create the seminar table Field Siure Data T text test text Emp city Emp salary 10 text Insen the following data into the seminar table which you have created Seminar table Sem …
2. Create three boolean variables isAtLeast8, isLetterDigit, and isAtLeast2Digit
2. Create three boolean variables isAtLeast8, isLetterDigit, and isAtLeast2Digits and Project: Check Password Problem Description assign the output of the corresponding methods to…
2. Create two tables called YourName_STORES and SALES. Use the data dictionary b
2.Create two tables called YourName_STORES and SALES. Use the data dictionary below to create these tables. TABLE attribute data type Null? Key YourName_STORES StoreCode char(5) N…
2. DATA MANIPULATION Suppose you are given 2 tables pertaining to Bing.com data:
2. DATA MANIPULATION Suppose you are given 2 tables pertaining to Bing.com data: a. Name: Impressions lic:led: Impression_Id:string, Query:string, Request_Time:DateTime Descriptio…
2. DATABASE PLEASE TYPE ANSWER Write the DQL for the following: All Employees, t
2. DATABASE PLEASE TYPE ANSWER Write the DQL for the following: All Employees, their titles, salaries, and the department they work for making over fifty thousand dollars. All dep…
2. Day of the Week In homework 2 you wrote functions that allowed you to compute
2. Day of the Week In homework 2 you wrote functions that allowed you to compute differenoes between dates These functions (as well as a new one) can be useful in other programs a…
2. Decipher \"the code\" snippet lines As done in class, review the code below,
2. Decipher "the code" snippet lines As done in class, review the code below, and based on what we've learned about Java: (20 points) standard naming conventions statement "types"…
2. Declare and implement a class named Pythagorean. The class will contain the f
2. Declare and implement a class named Pythagorean. The class will contain the following five methods: • getTriples(int n) prints all Pythagorean triples (a, b, c) such that a2 + …
2. Define a Java method named valueCounter) with the following header: public st
2. Define a Java method named valueCounter) with the following header: public static void valuecounter (int values) This method takes an array of integers as its argument and prin…
2. Define a class called Counter. An object of this class is used to count thing
2. Define a class called Counter. An object of this class is used to count things, so it records a count that is a nonnegative whole number. Include methods to set the counter to …
2. Define a class for rational numbers. A rational number is a number that can b
2. Define a class for rational numbers. A rational number is a number that can be represented as the quotient of two integers. For example, 1/2, 3/4, 64/2, and so forth are all ra…
2. Define a recursive function in the manner (defun permute (input-list) ...) wh
2. Define a recursive function in the manner (defun permute (input-list) ...) which outputs a list of all permutations of a (short 'input-list' , without duplications. If 'input-l…
2. Define a struct worker which has two properties: id and wage . id is in integ
2. Define a struct workerwhich has two properties: idand wage. id is in integertype, and wage is in double type. Create an array with 6 elementsusing worker in main(), and assign …
2. Define and explain the \'ribbon\'; \'tabs\'; \'groups\'; and \'buttons or com
2. Define and explain the 'ribbon'; 'tabs'; 'groups'; and 'buttons or command': 3. How/where would you identify the default font in MS Word? 4. Fonts are measured in 5. Swapping b…
2. Define, implement and test a Complex class, which has: (a) At least two const
2. Define, implement and test a Complex class, which has: (a) At least two constructors. (b) A destructor. (c) Several Methods with functionality as described below: . Returns rea…
2. Define, implement and test a Complex class, which has: (a) At least two const
2. Define, implement and test a Complex class, which has: (a) At least two constructors. (b) A destructor. (c) Several Methods with functionality as described below: . Returns rea…
2. Demand Paged, Virtual Memory (VM): For a CPU with 14 bit addresses, paged vir
2. Demand Paged, Virtual Memory (VM): For a CPU with 14 bit addresses, paged virtual memory is used, there are 4 frames of real memory, the displacement(offset) part of an address…
2. Describe Grace Hoppers contributions and key influences on mathematics in 2-3
2. Describe Grace Hoppers contributions and key influences on mathematics in 2-3 paragraphs - cite work - explain key terms possible references: Doc, T. (2016). Home. Retrieved fr…
2. Describe the list and what the grammar produces. Note that , ,
2. Describe the list and what the grammar produces. Note that <empty>, <number>, and <identifier> are terminals defined as follows: <empty> is an empty str…
2. Describe the list and what the grammar produces. Note that , ,
2. Describe the list and what the grammar produces. Note that <empty>, <number>, and <identifier> are terminals defined as follows: <empty> is an empty str…
2. Describe the relationship of the requirements phase, testing phase, and use c
2.   Describe the relationship of the requirements phase, testing phase, and use cases with respect to software engineering development and secure code. 3.   Develop a list of fiv…
2. Design a ER diagram and a relational schema for a messageboard. Facts 1. Mess
2. Design a ER diagram and a relational schema for a messageboard. Facts 1. Message board (or category) 2. Messages 3. Message replies 4. Topics 5. Topic replies 6. Topic watch 7.…
2. Design a design pattern for a two-factor authentication component for web-bas
2. Design a design pattern for a two-factor authentication component for web-based systems. Define the design pattern using the elements below of the design pattern description as…
2. Design and implement a Card and Deck class 3. Use these classes to write test
2. Design and implement a Card and Deck class 3. Use these classes to write tests which experimentally validatethe probabilities of drawing a flush(all the same suit). In c++ plea…
2. Determine Trajectory Information by Simple Numerical Integration Background A
2. Determine Trajectory Information by Simple Numerical Integration Background A ball thrown or shot from the ground at an initial speed and at a given angle above horizontal will…
2. Determine the average customer balance by representative. Show the resulting
2. Determine the average customer balance by representative. Show the resulting average along with the representative's full name as "last name, first name" in a single column, or…
2. Determine the average customer balance by representative. Show the resulting
2. Determine the average customer balance by representative. Show the resulting average along with the representative's full name as "last name, first name" in a single column, or…
2. Determining operand specifies: operands specify data sources and values used
2. Determining operand specifies: operands specify data sources and values used in performing instructional operations. The eight general purpose registers of the x86-64 processor…
2. Develop a fully commented bisection function. Within your function, ensure th
2. Develop a fully commented bisection function. Within your function, ensure that you are passing in an anonymous function. 3. Solve the roots problems to find all the roots betw…
2. Develop a simple class for a Student. Include class variables; StudentID (int
2. Develop a simple class for a Student. Include class variables; StudentID (int), FirstName, LastName, GPA (double), and Major. Extend your class for a Student to include classes…
2. Devise an algorithm (write down a pseudocode or clearly describe the steps of
2. Devise an algorithm (write down a pseudocode or clearly describe the steps of your algorithm) that will compute the distance between every pair of registered Facebook users. As…
2. Dijkstra\'s Link State Algorithm (for computing least cost paths) Consider th
2. Dijkstra's Link State Algorithm (for computing least cost paths) Consider the 6-node network shown below, with the given link costs. 5 5 8 3 8 7 5 3 Before doing this problem, …
2. Dining Philosophers Consider the solution below for the dining philosophers p
2. Dining Philosophers Consider the solution below for the dining philosophers problem: public class Philosopher extends Thread private int id; private Semaphore chopstick private…
2. Disgruntled employees can sometimes wreak havoc on a computer system because
2. Disgruntled employees can sometimes wreak havoc on a computer system because other users leave their passwords written in plain view in the space surrounding their workstations…
2. Display employee last name and manager’s last name for all employees. Use app
2. Display employee last name and manager’s last name for all employees. Use appropriate column headings in your result such as “EMPLOYEE” and “MANAGER”. (Manager’s EMP_NUM is ava…
2. Do you think that manufacturers of computers, tele- vision sets, cell phones,
2. Do you think that manufacturers of computers, tele- vision sets, cell phones, and other electronic products should be required to take their products back at the end of their u…
2. Does a destination address in an IP datagram ever refer to an intermediate ro
2.Does a destination address in an IP datagram ever refer to an intermediate router? Explain. 3.If one captures an IP datagram passing across a network in the middle of the Intern…
2. Does a faster computer make a better algorithm? e.g. How long would it take,
2. Does a faster computer make a better algorithm? e.g. How long would it take, if I can try 10000 edges per second, to brute-force a solution to minimum spanning tree? What if to…
2. Dojo\'s widget system works on the top of the standard HTML. Dojo developers
2. Dojo's widget system works on the top of the standard HTML. Dojo developers can add gracefully degradable functionality widgets to their existing page without worrying about We…
2. Download the Creating Projects in DrJava PDF (instructor\'s version) on how t
2. Download the Creating Projects in DrJava PDF (instructor's version) on how to create a oject folder that manages multiple java files stored in the same folder. The project fold…
2. Draw Charts In this lab, you will make a C program to read a data file and dr
2. Draw Charts In this lab, you will make a C program to read a data file and draw an xy chart for each data file based on the following guidelines: The filename is given as an op…
2. Draw a DFSA for identifiers that contain only letters and digits, where the i
2. Draw a DFSA for identifiers that contain only letters and digits, where the identifier must have at least one letter, but it need not be the first character. Hint: everything t…
2. During the first expedition to Mars, linguists discovered that the Martian la
2. During the first expedition to Mars, linguists discovered that the Martian language can be written with the familiar Roman alphabet, which has 21 consonants (b, c, d, f, g, h, …