Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 329 / 3837

2. Each part of this problem gives a design with an if structure and some assump
2. Each part of this problem gives a design with an if structure and some assumptions about how the variables are stored in an assembly language program. Give a fragment of assemb…
2. Edmund Halley (the astronomer famous for discovering Halley\'s comet) invente
2. Edmund Halley (the astronomer famous for discovering Halley's comet) invented a fast algorithm for computing the square root of a number, A. Halley's algorithm approximates A a…
2. Eight numbers come in the sequence as: 22, 33, 18, 88, 77, 61, 36, 82, and th
2. Eight numbers come in the sequence as: 22, 33, 18, 88, 77, 61, 36, 82, and the hash function is defined as: HashValue = number % (size of the table). If the numbers are stored …
2. Empirical Analysis of Algorithm using C or C++. (50 pts) Taskl: Study the tim
2. Empirical Analysis of Algorithm using C or C++. (50 pts) Taskl: Study the time complexity of QuickSort using different input size: 10, 100, 1000, 10000 and 100000 (the number o…
2. Enter, save and compile the following program to be called ex 2.c #include /*
2. Enter, save and compile the following program to be called ex 2.c #include /* enter your own name here/ EGN 3211 ex-2: integer, floating point and mixed arithmetic / main() ( r…
2. Estimating The World Population (5 points) The webcomic xkcd gives the follow
2. Estimating The World Population (5 points) The webcomic xkcd gives the following formula to approximate the world population for a given year (from 2000 onward): a. Obtain the …
2. Ethical Decision Making Assume that Charlie then tells Iris, “I have a friend
2. Ethical Decision Making Assume that Charlie then tells Iris, “I have a friend who runs a placement service and can find you exactly the right person for this position. Once you…
2. Evaluate the following instructions with the ”before” values and provide the
2. Evaluate the following instructions with the ”before” values and provide the requested “after” values: before after shl ax, 1 AX: A8B5h AX, CF, OF shr ax, 2 AX: A8B5h AX, CF, O…
2. Examine the difficulty of adding a proposed swap Rd, Rn instruction to the LE
2. Examine the difficulty of adding a proposed swap Rd, Rn instruction to the LEGv8 instruction set, which works as follows: Reg[Rd] = Reg[Rn]; Reg[Rn] = Reg[Rd]; (20 pts) a. Whic…
2. Exception Handling Design a class called Date. The class should store a date
2. Exception Handling Design a class called Date. The class should store a date in three integers: month, day, and year. Include the relevant get/set methods. There should be sepa…
2. Exercise problems (a) Find all real and complex roots of the following equati
2. Exercise problems (a) Find all real and complex roots of the following equation: b) Using polyval, make a smooth plot of the following polynomial function for x--10 to 10. Find…
2. Explain how workers might abuse yammer if it is not controlled by the organiz
2. Explain how workers might abuse yammer if it is not controlled by the organization? 5. with the adoption of microblogging, VoIP, and everything digital, rather than analog coul…
2. Explain the CIA triad. For each part of the triad, outline attacks on a datab
2. Explain the CIA triad. For each part of the triad, outline attacks on a database and possible protections. 3. Choose an application protocol that requires encryption. Describe …
2. Explain the difference between a combo box and a dialog box. 3. Give an examp
2. Explain the difference between a combo box and a dialog box. 3. Give an example of a common use of a dialog box. 4. Write a short snippet of code that creates a J Panel objectc…
2. Explain which of the interrupttypes_edge-triggered, level-sensitive, or messa
2. Explain which of the interrupttypes_edge-triggered, level-sensitive, or message switched interrupts-is best suited to the following applications An on-chip temperature sensor i…
2. Explain your view of the scope of an Information Systems Manager\'s roles and
2. Explain your view of the scope of an Information Systems Manager's roles and responsibilities with respect to addressing the elements associated with a Corporations Information…
2. Explain, in detail, the problem of buffer overflow. Be sure to explain: when
2. Explain, in detail, the problem of buffer overflow. Be sure to explain: when it occurs, how it occurs and what protections you can build into your code in order to avoid it. Ex…
2. Extend the class linkedListType by adding the following operations: a. Find a
2. Extend the class linkedListType by adding the following operations: a. Find and delete the node with the smallest info in the list. (Delete only the first occurrence and traver…
2. Extend the class linkedListType by adding the following operations: a. Find a
2. Extend the class linkedListType by adding the following operations: a. Find and delete the node with the smallest info in the list. (Delete only the first occurrence and traver…
2. Fear of conflict The only purpose of productive conflict is to produce the be
2. Fear of conflict The only purpose of productive conflict is to produce the best solution in the shortest period of time. The great teams discuss and resolve issues more quickly…
2. Find all solutions of the f (x) x2 sin(x) 0.5 using bisection and newton\'s m
2. Find all solutions of the f (x) x2 sin(x) 0.5 using bisection and newton's method Present the results for all steps along with error in each step. For error use either the brac…
2. Find the smallest and the 89th largest numbers from the list below (there are
2. Find the smallest and the 89th largest numbers from the list below (there are 200 numbers): a[200]={1.78091, -2.83548, 1.01073, 3.53668, -2.06947, -2.1656, -2.49212, -1.17734, …
2. Finish the code for the two incomplete methods below given the code for Node
2. Finish the code for the two incomplete methods below given the code for Node and DoublyLinkedList. Do not alter the code that is given. Simply finish removeFirstOccurrence meth…
2. FizzBuzz Submit js file with functioning code Write a program that uses conso
2. FizzBuzz Submit js file with functioning code Write a program that uses console.log to print all the numbers from 1 to 120, with two exceptions. For numbers divisible by 4, pri…
2. For each attribute given below, classify its type as nominal, ordinal, in- te
2. For each attribute given below, classify its type as nominal, ordinal, in- terval, or ratio. (a) Zipcode of a city (e.g., 48824 for East Lansing) (b) Month of the year, whose v…
2. For each following, assume the Before values when the given instruction is ex
2. For each following, assume the Before values when the given instruction is executed. Give the requested After values. Notes: MOVZX adds leading zeroes (0) to fill up the destin…
2. For each language below, decide whether it is regular or not, giving a reason
2. For each language below, decide whether it is regular or not, giving a reason for your a) (ryz e 0,1* is a nonempty palindrome (A palindrome is a string that b) aPb: p and p2 a…
2. For each method call in the table below, determine which of the methods on th
2. For each method call in the table below, determine which of the methods on the top table is actually called, or indicate that it is impossible because there is either no method…
2. For each of the following assets, assign a low, moderate or high impact level
2. For each of the following assets, assign a low, moderate or high impact level for the loss of confidentiality, availability and integrity, respectively. Justify your answer. a.…
2. For each of the following instructions, give, the effective address of the op
2. For each of the following instructions, give, the effective address of the operand (where is the final piece of data coming from), and the value of the operand (what is the val…
2. For each of the three different encoding schemes listed below, please specify
2. For each of the three different encoding schemes listed below, please specify each one of the different numbers that could be exactly represented, and characterize the numbers …
2. For the following problem statement, would you include an if/else statement o
2. For the following problem statement, would you include an if/else statement or a switch statemen? Explain your answer. Be sure to address both types of statements in your answe…
2. For two integers m and n, their GCD (Greatest Common Divisor) can be computed
2. For two integers m and n, their GCD (Greatest Common Divisor) can be computed by a recursive function. Write a recursive function gcd(m,n) to find their Greatest Common Divisor…
2. Give a necessary and sufficient condition for a decomposition of R into R1 an
2. Give a necessary and sufficient condition for a decomposition of R into R1 and R2 to be lossless join. Very briefly explain why the condition is necessary and sufficient. a. [1…
2. Given a date, it is possible to determine the day of the week for that date u
2. Given a date, it is possible to determine the day of the week for that date using the following algorithm (use integer division throughout): . Let y be the 4-digit year, m be a…
2. Given a linked list containing the following values: first 1520> n ull, which
2. Given a linked list containing the following values: first 1520> n ull, which of the following best describes what needs to happen when 10 is added to the list? a. The node …
2. Given the algorithm for inserting new nodes into an ordered linked list (or a
2. Given the algorithm for inserting new nodes into an ordered linked list (or a portion of the algorithm) in real code, be able to fill in the blanks bool MyLinkedList::Insert (L…
2. Given the algorithm for the functions of Push() and Pop() in a Stack class in
2. Given the algorithm for the functions of Push() and Pop() in a Stack class in real code, be able to fill in the blanks /1 Define a structure to be used as the stack item struct…
2. Given the alphabet G = { a, b}. Give the regular expressions for the followin
2.   Given the alphabet  G = { a, b}.  Give the regular expressions for the following languages: a)     all strings with no more that three a’s b)    all strings with the number o…
2. Given the following data declarations: .data Alpha BYTE 2Bh, 23h, 4Ah Beta DW
2. Given the following data declarations: .data Alpha BYTE 2Bh, 23h, 4Ah Beta DWORD 222h Delta DWORD 312h Iota DWORD 434h Zeta WORD 124h A. Write instructions that move Beta into …
2. Given the following grammar: S -> aB | b | cC B -> aB | bS C -> aaS | b | caB
2. Given the following grammar: S -> aB | b | cC B -> aB | bS C -> aaS | b | caB 1) Perform the pairwise disjointness test for each rule to show that this grammar allows …
2. Given the following universal table ProjNo ProiName EmpNo EmpName JobClass P1
2. Given the following universal table ProjNo ProiName EmpNo EmpName JobClass P15 P15 P15 P22 P22 HourlyRate Hours 97.50 110.00 Evergreen E101 John G. Evergreen E201 Anne K. Everg…
2. Given the length class interface below: class length public: length(); length
2. Given the length class interface below: class length public: length(); length (int f, int i); initialized Postconditin: a new length object is declared and void set Feet (int);…
2. Given two sorted lists , L1 and L2 , complete a following procedure in Java t
2. Given two sorted lists, L1 and L2, complete a following procedure in Java to compute: (a) L1 L2 = { x | x Î L1 and x Ï L2 } using only the basic list operators (next(), hasNext…
2. Given: p: I will try out for the school play q I will have a part in a play t
2. Given: p: I will try out for the school play q I will have a part in a play this semester. Translate the following into symbolic logic expressions (eg "pv q") to indicate the o…
2. Given: p: we have a quiz this week q: My quiz average will be 80% Translate t
2. Given: p: we have a quiz this week q: My quiz average will be 80% Translate the following into symbolic logic expressions. Place parentheses as necessary to indicate the order …
2. Grade Book tudents who have takezi four tests. The teacher uses the following
2. Grade Book tudents who have takezi four tests. The teacher uses the following sign a letter grade to a student, based on the average of his or her A teacher has five who gradin…
2. Graded Problem (Page limit: 1 sheet; 2 sides) An element of an array A[1 nl i
2. Graded Problem (Page limit: 1 sheet; 2 sides) An element of an array A[1 nl is called a majority element if more than half of A are equal to x. Your task is to find whether a g…
2. Graded Problem (Page limit: 1 sheet; 2 sides) An element r of an array A[1: n
2. Graded Problem (Page limit: 1 sheet; 2 sides) An element r of an array A[1: n] is called a majority element if more than half of A are equal to x. Your task is to find whether …
2. Graphs (11 points) (1) (3 points) How many strongly connected components are
2. Graphs (11 points) (1) (3 points) How many strongly connected components are in the three graphs below? List the vertices associated with each one. Reminder: for undirected gra…