Web development and programming
191828 questions • Page 331 / 3837
2. List the functional dependencies in the following table that concern invoicin
2. List the functional dependencies in the following table that concern invoicing (an application TAL Distributors is considering adding to its database), subject to the specified…
2. Local variables are stored on the 3. Global variables are stored on the 4. Th
2. Local variables are stored on the 3. Global variables are stored on the 4. The following registers are saved on the stack when jumping to ISR 5. All Interrupt Service Routines,…
2. Log into the codification database and perform a search on the following term
2. Log into the codification database and perform a search on the following terms and answer the related questions: a. Warranty expense i. How many results did you get? ii. Click …
2. MANAGING PROJECTS A. What are the objectives of project management and why is
2. MANAGING PROJECTS A. What are the objectives of project management and why is it so essential in developing information systems? B. What methods can be used for selecting and e…
2. Make a Craps Simulator. # Rules * Roll two dice o 7 or 11 on first throw, pla
2. Make a Craps Simulator. # Rules * Roll two dice o 7 or 11 on first throw, player wins o 2, 3, or 12 on first throw, player loses o 4, 5, 6, 8, 9, 10 - value becomes player's "p…
2. Make any corrections for the following codes if necessary import java.util.Ra
2. Make any corrections for the following codes if necessary import java.util.Random; class Shape void drawO t void eraseO class circle extends Shape void drawO f System.out.print…
2. Matrices In this exercise you will write several functions that operate on ma
2. Matrices In this exercise you will write several functions that operate on matrices or two-dimensional arrays. For this exercise, we will restrict our attention to square matri…
2. Maximum Increasing Subsequence Find the longest increasing sequence in a two-
2. Maximum Increasing Subsequence Find the longest increasing sequence in a two-dimensional grid of numbers. A sequence is simply a series of adjacent squares. Squares may not be …
2. Modify the Example 19.8 - new program. [20 points] A. Use confirm function to
2. Modify the Example 19.8 - new program. [20 points] A. Use confirm function to always ask if the user wants to continue before the program ends. B. If the user click OK button, …
2. Modify the code for the Speakers page so it uses a list view as shown above.
2. Modify the code for the Speakers page so it uses a list view as shown above. This time, the month, name, and lecture title for each speaker should all be in one h3 element. Whe…
2. Modify the function below to print out the value of x, fibonacci(x-1) and fib
2. Modify the function below to print out the value of x, fibonacci(x-1) and fibonacci(x-2) in every iteration of the function call: fun fibonacci (x:int) = if (x = 0 orelse x…
2. Modify the program what.s so that it takes two arguments. If the arguments ar
2. Modify the program what.s so that it takes two arguments. If the arguments are both the same then the answer should be the same as that of what.s that takes only one argument. …
2. Multiprogramming with Fixed Partitions: a process is loaded into a single par
2. Multiprogramming with Fixed Partitions: a process is loaded into a single partition of main memory Main memory consists of 64 units, divided into 3 fixed-size partitions of siz…
2. Name this program rpsls.c- The game of rock-paper-scissors was expanded so th
2. Name this program rpsls.c- The game of rock-paper-scissors was expanded so that it now includes rock-paper- scissors-lizard-spock. The expansion was created by Sam Kass and Kar…
2. Name this program split.c-The program takes two command line arguments, the n
2. Name this program split.c-The program takes two command line arguments, the name of an input file that contains a set of integers and an integer. If the input file does not exi…
2. Normalize each of the followingdatasets (i.e. remove the repeating fields and
2. Normalize each of the followingdatasets (i.e. remove the repeating fields and place into aseparate table with a foreign key). Rewrite the field namesunder an appropriate name f…
2. Now consider algorithms based on the divide &conquer; paradigm, all using the
2. Now consider algorithms based on the divide &conquer; paradigm, all using the template SMALLESTDIST(A1..n]) 11 n= return oo else if n 2 return D(A], A[2) else m |n/2] di SM…
2. Now recall each k-CNF formula has at most k literals per clause and that the
2. Now recall each k-CNF formula has at most k literals per clause and that the set k-SAT consists of those k-CNF formula that are satisable by some truth assignment to their vari…
2. Now that you have implementations of Bubble Sort and Insertion Sort, please d
2. Now that you have implementations of Bubble Sort and Insertion Sort, please do the following and report your results. (a) (10 points - Code in m-file, results) Use 'tic Iad 'to…
2. Now write a program named filereader.py that reads and displays the data in f
2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine and print the average age of the friends on file. Th…
2. Nowadays, international treaties are registered with the United Nations. so t
2. Nowadays, international treaties are registered with the United Nations. so the UN must store all those treaties, which are usually lengthy. Before printing a treaty, we would …
2. Often we are concerned mainly with how accurate a given numerical algorithm i
2. Often we are concerned mainly with how accurate a given numerical algorithm is, i.e. how small the error is for a given step size h. In some cases though, using a particular nu…
2. P (8 points) Prove that each of following problems is in P by sketching a pol
2. P (8 points) Prove that each of following problems is in P by sketching a polynomial time algorithm that solves it. Briefly justify that your algorithm runs in polynomial. (1) …
2. Pascal’s triangle is an infinite two-dimensional pattern of numbers whose fir
2. Pascal’s triangle is an infinite two-dimensional pattern of numbers whose first five lines are illustrated in Figure 10.16. The first line, line 0, contains just 1. All other l…
2. Payroll Class Write a Payroll class that uses the following arrays as fields:
2. Payroll Class Write a Payroll class that uses the following arrays as fields: .employeeId. An array of seven integers to hold employee identification numbers. The array should …
2. Payroll Classes Write a Payroll class that uses the following arrays as field
2. Payroll Classes Write a Payroll class that uses the following arrays as fields: employeeId . An array of seven integers to hold employee identification numbers. The array shoul…
2. Perform the following binary multiplications, assuming unsigned integers: B.
2. Perform the following binary multiplications, assuming unsigned integers: B. 10011 x 011 C. 11010 x 1011 3. Perform the following binary divisions, assuming unsigned integers: …
2. Perform the following operations on binary numbers. Show your work for full c
2. Perform the following operations on binary numbers. Show your work for full credit. (6 points) a. 11011010110 b. 100001-1011 3. Complete the following table. Use 12 bits for re…
2. Plastic optical fiber (POF) is a low-cost alternative to standard fiber optic
2. Plastic optical fiber (POF) is a low-cost alternative to standard fiber optic cable. The core is made of either Poly(methyl methacrylate) or Polystyrene and the cladding is usu…
2. Please help! :) Simple C++ Programming. Please make sure it compiles. Write a
2. Please help! :) Simple C++ Programming. Please make sure it compiles. Write a program to ask the user to enter a string. The string can be of any length and contain any ASCII c…
2. Please read the following program and describe the functionality of the progr
2. Please read the following program and describe the functionality of the program import java util Scanner public class Rolling Dice public static void main(Stringll args) int co…
2. Please use the following syntax for the arithmetic expressions that I want yo
2. Please use the following syntax for the arithmetic expressions that I want you to process: <expression> ::= <term> | <term> + <expression> | <term>…
2. Please write queries based on the following requirements using the tables and
2. Please write queries based on the following requirements using the tables and data in the class16setup.sql file. a. List stored information for all the orders placed between Au…
2. Primes [2 marks] A prim e p > 1 has no factors other than 1, so p%m 0 for all
2. Primes [2 marks] A prim e p > 1 has no factors other than 1, so p%m 0 for all m {2.3, p-1). Test all the integers greater than 1 that you can, and identify the primes (again…
2. Problem 2: Bit Twiddling Computers use a particular word size (measured in bi
2. Problem 2: Bit Twiddling Computers use a particular word size (measured in bits) for representing integers. In the mid-1970s have word sizes of 16 bits were common A. How many …
2. Problems With Pointers and New / Delete (TCOs 2, 4, 5, and 6) The following c
2. Problems With Pointers and New/Delete (TCOs 2, 4, 5, and 6) The following code creates a pointer to an array of ints and allocates space for five ints. It then loads the array …
2. Programming Assignment: Design 4 classes: MyController to control the executi
2. Programming Assignment: Design 4 classes: MyController to control the execution of the example, EampleFactory (a singleton) to create a Service object, . a Service class interf…
2. Project Description UChat is a chat application that allows one single chat s
2. Project Description UChat is a chat application that allows one single chat server (called UChatServer.py) serves multiple chat clients (called UChatClient.py)simultaneously. I…
2. Prompt the user for your each of theitems listed in question #1 and read them
2. Prompt the user for your each of theitems listed in question #1 and read them in 3. Display just your last name 4. Capitalize just the first letter ofyour last name…
2. Prompt the user to input a String. 3. Input a String. 4. Use revRec3 to rever
2. Prompt the user to input a String. 3. Input a String. 4. Use revRec3 to reverse the String input by the user and print it out on its own line. 5. Use the given Scanner (see the…
2. Promptthe user for your each of the items listed in question #1 and readthem
2. Promptthe user for your each of the items listed in question #1 and readthem in 3. Displayjust your last name 4. Capitalize just the first letter of your last name 5…
2. Proper Divisors A proper divisor is an integer that evenly divides a source i
2. Proper Divisors A proper divisor is an integer that evenly divides a source integer (i.e., the remainder is 0) and is strictly less than the source integer. For example, the pr…
2. Prove that ¬ (¬p (p ¬q)) p q by using a series of logical equivalence. 3. Con
2. Prove that ¬ (¬p (p ¬q)) p q by using a series of logical equivalence. 3. Construct a truth table for each of these compound propositions. Also state the number of rows of each…
2. Provide the output of the following code snippets exactly as it would appear
2. Provide the output of the following code snippets exactly as it would appear on the console. If there are multiple spaces, denote the number of spaces below your answer. (Assum…
2. Provide the subroutine for the specific output compare channel as shown in th
2. Provide the subroutine for the specific output compare channel as shown in the table above That means you have to provide four different subroutines. All four Output Compare Ch…
2. Question 3 from Algorithm Workbench: 3. Look at the following description of
2. Question 3 from Algorithm Workbench: 3. Look at the following description of a problem domain: The bank offers the following types of accounts to its customers: savings account…
2. Question : (TCO B) The technology director has decided that a host based appl
2. Question : (TCO B) The technology director has decided that a host based application architecture based on mainframes is best for the payroll application. As the network engine…
2. Queues The following Java class implements queues using \"circular\" arrays.
2. Queues The following Java class implements queues using "circular" arrays. Each queue maximum capacity given by the size of the array storing the queue items. public class ArrQ…
2. ROT13 is a cyclic shift cipher that substitutes each English letter with one
2. ROT13 is a cyclic shift cipher that substitutes each English letter with one that is 13 away in the alphabet. It is used today not for security, but as a simple obfuscation dev…
2. Read all the parts of this question 2. so you know what the parvou need to wr
2. Read all the parts of this question 2. so you know what the parvou need to wrt and make sure they all fit together to make a complete protYou only need to code for this program…
Subject
Web development and programming
Use Browse or pick another subject.