Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 333 / 3837

2. Summing up to PI () – 35 % This programming problem involves multithreading (
2. Summing up to PI () – 35 % This programming problem involves multithreading (Chapter 4) and uses synchronization mechanisms from Chapter 5. Write a multithreaded application ca…
2. Summing up to TT (50 pts.) Write a parallel program pie.c in Cor C++ (pie.cc)
2. Summing up to TT (50 pts.) Write a parallel program pie.c in Cor C++ (pie.cc) for Linux that computes an approximation of the number Tu using a series' with N+1 terms. The seri…
2. Suppose a disk has the following geometry. There are 512 bytes per sector, 72
2.      Suppose a disk has the following geometry.  There are 512 bytes per sector, 72 sectors per track, 16 tracks per cylinder, 900 user-accessible cylinders per disk, and it sp…
2. Suppose someone has defined for us a class called Random. For each of the fol
2. Suppose someone has defined for us a class called Random. For each of the following parts, write a single line of Java that does what is described by the sentence. (a) Declare …
2. Suppose that a digitized TV picture is to be transmitted from a source that u
2. Suppose that a digitized TV picture is to be transmitted from a source that uses a matrix of 480 X 525 picture elements (pixels), where each pixel can take on one of 128 intens…
2. Suppose that the company from problem 1 has a table describing employees of t
2. Suppose that the company from problem 1 has a table describing employees of the company which contains the following information: Employee last name Employee first name Employe…
2. Suppose that there are 12 resources available to three processes. At time 0,
2.   Suppose that there are 12 resources available to three processes. At time 0, the following data is collected. The table indicates the process, the maximum number of resources…
2. Suppose that two columns in two different tables have the same column name. W
2. Suppose that two columns in two different tables have the same column name. What convention is used to give each a unique name? 3. Explain the three different set of terms used…
2. Suppose that you are given an unsorted array A of length n, in which all valu
2. Suppose that you are given an unsorted array A of length n, in which all values are different re that A[i] A[i + 1] and Ali] Ali-1] ( f A. then it need only be less than the si…
2. Suppose that you have been asked to create an information system for a manufa
2. Suppose that you have been asked to create an information system for a manufac- turing plant that produces nuts and bolts of many shapes, sizes, and functions. What questions w…
2. Suppose two packets arrive to two different input ports of a router at exactl
2. Suppose two packets arrive to two different input ports of a router at exactly the same time. Also, assume there are no other packets anywhere in the router. a. Suppose the two…
2. Suppose we are given a \"chain\" of n nodes as shown below. Each node i is \"
2. Suppose we are given a "chain" of n nodes as shown below. Each node i is "neigh- bors" with the node to its left and the node to its right (if they exist). An inde- pendent set…
2. Suppose we are given a \"chain\" of n nodes as shown below. Each node i is \"
2. Suppose we are given a "chain" of n nodes as shown below. Each node i is "neigh- bors" with the node to its left and the node to its right (if they exist). An inde- pendent set…
2. Suppose we are given an array A[1..n] with the boundary conditions that A[1]
2. Suppose we are given an array A[1..n] with the boundary conditions that A[1] A[2] and A[n 1] A[n]. We say that an element A[x] is a local minimum if it is less than or equal to…
2. Suppose we are performing a binary search on a sorted array called numbers in
2. Suppose we are performing a binary search on a sorted array called numbers initialized as follows: // index 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 int[] numbers = {-5, -1, 0, 3, 9,…
2. Suppose we have a 1 MB file we would like to transmit across a network from n
2. Suppose we have a 1 MB file we would like to transmit across a network from node A to node D. Packets have a length of 500 kB (neglect header). The path from node A to node D p…
2. Suppose we have an ArrayList of n Integer objects, sorted in increasing order
2. Suppose we have an ArrayList of n Integer objects, sorted in increasing order. Consider the following algorithms for removing a particular Integer value from that ArrayList. It…
2. Suppose you are developing an RSA public key encryption scheme. You decide to
2. Suppose you are developing an RSA public key encryption scheme. You decide to use the primes p 11 and q 19, and the semiprime n q = 209 as the modulus for the encryption/decryp…
2. Suppose you are given a relation R with four attributes ABCD. For each of the
2. Suppose you are given a relation R with four attributes ABCD. For each of the following sets of FDs and super keys, do the following: a. Identify the best normal form that R sa…
2. Suppose you are given an unsorted array A1..], which contains all but one of
2. Suppose you are given an unsorted array A1..], which contains all but one of the integers in the range 0,... ,n (so exactly one of these elements is missing from A). The proble…
2. Suppose you are given an unsorted array A[1..n], which contains all but one o
2. Suppose you are given an unsorted array A[1..n], which contains all but one of the integers in the range 0,... ,n (so exactly one of these elements is missing from A) The probl…
2. Suppose you are writing software for a radio station that manages its playlis
2. Suppose you are writing software for a radio station that manages its playlist. The program will generate candidate playlists from record library automatically and station pers…
2. Suppose you have the following training set, and fit a logistic regression cl
2. Suppose you have the following training set, and fit a logistic regression classifier ho(z) = g@s + + 2x2) 0.5 1.5 2 1.5 0.5 Which of the following are true? Check all that app…
2. Suppose you were in charge of the Data Center at Dominican. Assume that the D
2. Suppose you were in charge of the Data Center at Dominican. Assume that the Data Center is in the basement of Lewis Hall and that all the servers (Blackboard, Email etc.) are i…
2. Table Creator Program Create a .cpp program named hw5-2.cpp that will create
2. Table Creator Program Create a .cpp program named hw5-2.cpp that will create a table as shown below where the user can specify by user input how many rows and columns to displa…
2. Take a look at the code you downloaded for today’s lab. Notice the lines that
2. Take a look at the code you downloaded for today’s lab. Notice the lines that begin with .def and .equ followed by some type of expression. These are known as pre-compiler dire…
2. The American Heart Association suggests that at most 30 percent of the calori
2. The American Heart Association suggests that at most 30 percent of the calories in our diet come from fat. Although food labels give the number of calories and amount of fat pe…
2. The Drive-Rite Insurance Company provides automobile insurance policies for d
2. The Drive-Rite Insurance Company provides automobile insurance policies for drivers. Design a single class diagram showing the class, the application program, the relationship …
2. The Drive-Rite Insurance Company provides automobile insurance policies for d
2. The Drive-Rite Insurance Company provides automobile insurance policies for drivers. Design a single class diagram showing the class, the application program, the relationship …
2. The Drive-Rite Insurance Company provides automobile insurance policies for d
2. The Drive-Rite Insurance Company provides automobile insurance policies for drivers. Design a single class diagram showing the class, the application program, the relationship …
2. The DriveRite Insurance Company provides automobile insurance policies for dr
2. The DriveRite Insurance Company provides automobile insurance policies for drivers. Design a single class diagram showing the class, the application program, the relationship b…
2. The Federal Information Security Modernization Act (FISMA): (Select one) A. D
2. The Federal Information Security Modernization Act (FISMA): (Select one) A. Defines national security systems. O B. Mandates a computer security program at all federal agencies…
2. The Impressionist painter Georges Seurat created paintings with an enormous n
2. The Impressionist painter Georges Seurat created paintings with an enormous number of dots of pure pigment, each of which was approximately 2.00 mm in diameter. The idea was to…
2. The Quick Print button prints a document using the default print settings. a.
2. The Quick Print button prints a document using the default print settings. a. True a. True b. False a. Résumé b. Spreadsheet c. Presentation d. Personalized form letter a. Stat…
2. The Showy Shiny Shoe Store sells different styles of shoes, such as sandals a
2.     The Showy Shiny Shoe Store sells different styles of shoes, such as sandals and walking shoes. Each style of shoe is offered in different colors, such as brown and black. A…
2. The StateTaxableWorker class inherits from the TaxableWorker class. This clas
2. The StateTaxableWorker class inherits from the TaxableWorker class. This class adds attributes for the state name and the state tax rate (ie. 0.05). An explicit value construct…
2. The aim of wrestling is to have two players snare each other in a described z
2. The aim of wrestling is to have two players snare each other in a described zone, each trying to move their foe into point-scoring holds and hurls or a match-winning fall. At t…
2. The algorithm for convert.py is: Input the temperature in Celsius degree Calc
2. The algorithm for convert.py is: Input the temperature in Celsius degree Calculate to Fahrenheit degree: Fahrenheit = (9/5)*Celsius + 32 Output Fahrenheit degree 3. Open IDLE S…
2. The character \'Y\'ly\' can be considered a vowel if a word ends with \'Yly\'
2. The character 'Y'ly' can be considered a vowel if a word ends with 'Yly', but a word is considered a consonant if it starts with 'Y'y. If a word starts and ends with 'Y'Py' it …
2. The ciphertext MBR OJFGA SWNTE CNK QJDIL NURW MBR XHMR was obtained by encryp
2. The ciphertext MBR OJFGA SWNTE CNK QJDIL NURW MBR XHMR was obtained by encrypting the plaintext THE QUICK BROWN FOX JUMPS OVER THE GATE using a Simple Substitution Cipher. (a) …
2. The database administrator will create individual user accounts to determine
2. The database administrator will create individual user accounts to determine who will have access to a database. T,F 3. Determining whether or not a particular user is who they…
2. The diagram below shows a relational schemaand its functional dependencies. L
2. The diagram below shows a relational schemaand its functional dependencies. Label each dependency as a full, partial or transitive dependency. Convert the relation to a set of …
2. The figure below shows a simplified flowcharrt for troubleshooting bad Wi-Fi
2. The figure below shows a simplified flowcharrt for troubleshooting bad Wi-Fi connec- tion. Use the flowchart to create a program that leads a person through the steps of fixing…
2. The figure shows the graphical model of a linear program. The large numbers o
2. The figure shows the graphical model of a linear program. The large numbers on the right (1,2, and 3) indicate the constraints The feasible region is shown in white, and the in…
2. The filde or structure array\" caa be given field,oftheirown, making tbe fiel
2. The filde or structure array" caa be given field,oftheirown, making tbe fielb th setm 3 Create aested structure array piane which bas Seild caed earth which planet earth.aas5.9…
2. The following code fragment computes the Kronecker product of two matrices -
2. The following code fragment computes the Kronecker product of two matrices - don't worry if you have never heard of Kronecker - this problem assumes no foreknowledge of this, a…
2. The following line of java code have the SQL injection vulnerability, where i
2. The following line of java code have the SQL injection vulnerability, where id is an input. String query = "select name from students where id = " + id + ";"; (a) Show an explo…
2. The following program has compilation and logic errors. It also has unconvent
2. The following program has compilation and logic errors. It also has unconventional names. Fix it! public class netIncome {    /**    * Class exercise to compute net income    *…
2. The following program tries to copy words from the address in register $a0 to
2. The following program tries to copy words from the address in register $a0 to the address in register $a1, counting the number of words copied in register $v0. The program stop…
2. The following program tries to copy words from the address inregister $a0 to
2. The following program tries to copy words from the address inregister $a0 to the address in register $a1, counting the number of words copied inregister $v0. The program stops …