Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 334 / 3837

2. The following questions are regarding fork() operation: (a.) When a parent pr
2. The following questions are regarding fork() operation: (a.) When a parent process creates a child process using the fork() operation, is there any part of memory shared betwee…
2. The following script uses a derived table to return the date and invoice tota
2. The following script uses a derived table to return the date and invoice total of the earliest invoice issued by each vendor. Write a script that generates the same result set …
2. The following table indicates the activity, and time duration of each task in
2. The following table indicates the activity, and time duration of each task in the development of a project: Activity Description Duration (Days) Immediate Predecessor A Require…
2. The following table shows the hourly wages, hours worked, and number of produ
2. The following table shows the hourly wages, hours worked, and number of products assembled for 6 workers in 1 week at a final product assembly line at Southeastern HiTechBuilde…
2. The following two dimensional array of characters is three rows by two column
2. The following two dimensional array of characters is three rows by two columns, and the first row is {W, N}: W        N A         S C         T Show how the array elements woul…
2. The game of Nim. Two players alternately take marbles from a pile. In each mo
2. The game of Nim. Two players alternately take marbles from a pile. In each move, a player chooses how many marbles to take. The player must take at least one, but at most half …
2. The infinite Maclaurin series to calculate the sine of an angle in radians is
2. The infinite Maclaurin series to calculate the sine of an angle in radians is: Write a function, named sine, to calculate the sine of an angle using the above Maclaurin series.…
2. The language L = {ss | s is a string of a\'s and b\'s} is not a context-free
2. The language L = {ss | s is a string of a's and b's} is not a context-free language. In order to prove that L is not context-free we need to show that for every integer n, ther…
2. The megnetoresistive sensor (MR) increases what capability in newer rigid dis
2. The megnetoresistive sensor (MR) increases what capability in newer rigid disks? A. Operating frequency B. Area C. Access times D. None of the above 3. Each sector in the disk …
2. The most costly errors made in a project are: Question options: a.Coding b.Do
2. The most costly errors made in a project are: Question options: a.Coding b.Documentation c.Requirements d. Design 3. Which of the following is not listed as professional behavi…
2. The official currency for the small island nation of Fabricatia is the yuat.
2. The official currency for the small island nation of Fabricatia is the yuat. Fabricatia is a somewhat isolated nation - perhaps you've never even heard of it! - and hence has a…
2. The president of a company, called you and asked you to meet with him. At the
2. The president of a company, called you and asked you to meet with him. At the meeting he told you that his organization needed to conduct a “systems analysis”, and asked you to…
2. The problem with the simple backtracking algorithm we derived in class is tha
2. The problem with the simple backtracking algorithm we derived in class is that it first gen- erates ALL strings of length n and then checks to see if they fit the criteria of S…
2. The processor in Q1 above is converted into a 10-stage pipeline. The slowest
2. The processor in Q1 above is converted into a 10-stage pipeline. The slowest of these 10 stages takes 250 ps, (including latch overheads). 1. What is the clock speed of this pr…
2. The same way we implemented automatic reference counting for the Person class
2. The same way we implemented automatic reference counting for the Person class, provide an automatic Student ID generator for the class student. The ID generator works exactly t…
2. The school office has asked you to create an application that grades the exam
2. The school office has asked you to create an application that grades the exam. The exam has 20 multiple-choice questions. Here are the correct answers: 9. D 13. B 5. C 1. C 6. …
2. The solution to the Towers of Hanoi problem with n disks requires 2n – 1 move
2.   The solution to the Towers of Hanoi problem with n disks requires 2n – 1 moves. If each move requires the same time m, the solution requires ______ time units. a. (2n - 1) * …
2. The table below summarizes three commonly used mathematical models of nonvert
2. The table below summarizes three commonly used mathematical models of nonvertical straight lines. Mode Equation Given Two-point form                   Y2 – Y1                  …
2. The “word” is assumed to beany series of nonblank characters; words may be se
2.     The “word” is assumed to beany series of nonblank characters; words may be separated by anynumber of white-space characters. Any number of words may appear ona line,   incl…
2. There is an Excel file named rocketstagedata.xls. a. Write a MATLAB program t
2. There is an Excel file named rocketstagedata.xls. a. Write a MATLAB program to read the data (numeric and text) from the excel spreadsheet. ? The columns of text represent the …
2. This attribute is our primary concern under the correctness-view of quality f
2. This attribute is our primary concern under the correctness-view of quality for most software systems: a. maintainability b. portability. c. reliability. d. safety. e. security…
2. This is in java. (50 points) Sorting Create 3 text files, one with the 50000
2. This is in java. (50 points) Sorting Create 3 text files, one with the 50000 integers 1 through 50000 in order, one with the 50000 integers 1 through 50000 in reverse order, an…
2. This problem asks you to write a generic method, and call it. Write a generic
2. This problem asks you to write a generic method, and call it. Write a generic method printBackwards which receives an array of any type and prints the array elements backwards …
2. This problem explores the use of a one-time pad version of the Vigenère ciphe
2. This problem explores the use of a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of random numbers between U and 26. For example, if the key …
2. This problem requires implementing four functions Given the following class d
2. This problem requires implementing four functions Given the following class definition, non-member non-friend function, and explanation: class Foo public: Foo) Foo (int x, int …
2. This question is about the Composite and Iterator patterns.(10 points) The di
2. This question is about the Composite and Iterator patterns.(10 points) The diagram on the left shows the composite pattern for a wizard's bag. Assume that the Wizard has severa…
2. This question practices the use of a list method. Assign to the variable grad
2. This question practices the use of a list method. Assign to the variable grades a list of 10 letter grades from among "A", "B", "CD and "F" For example, grades [A', 'F', 'C', '…
2. This question requires that you implement methods for a class that represents
2. This question requires that you implement methods for a class that represents a size field. You list. In this some are used. However, there is no that may question, both a head…
2. This question will provide some insight into network analysis using a subset
2. This question will provide some insight into network analysis using a subset of the Internet infrastructure from July 2006. You will use the R igraph package for this question.…
2. Three jobs are in the queue. The number of tickets each has and the number of
2. Three jobs are in the queue. The number of tickets each has and the number of seconds of processing time each requires are shown in Table 2. Assume that quanta of CPU time are …
2. Tic-Tac-Toe Validation: The input to this component is a 3x3 matrix represent
2. Tic-Tac-Toe Validation: The input to this component is a 3x3 matrix representing a tic-tac-toe board. The matrix will be filled with both O's and 1's. Here 0's represents circl…
2. To change the math function applied to a value field, you can: A. Right-click
2.  To change the math function applied to a value field, you can: A. Right-click the value cell and select the desired function from the Show Values As shortcut menu item. B. Rig…
2. To safeguard the privacy of medical information, the Federal Health Insurance
2. To safeguard the privacy of medical information, the Federal Health Insurance Portability and Accountability Act (HIPAA) requires certain measures to be take to ensure the priv…
2. True or false? If a statement is false, explain briefly why it is wrong: a).
2. True or false? If a statement is false, explain briefly why it is wrong: a). A user requests a Web page that consists of some text and 3 images. For this page, the client will …
2. True/False (1) Attribute grammars can capture some features in a language tha
2. True/False (1) Attribute grammars can capture some features in a language that BNF grammars cannot. (2)A binding does not take place in language design. (3) In an attribute gra…
2. Two football teams, C and F, play against each other and have their final sco
2. Two football teams, C and F, play against each other and have their final scores saved in variables scoreC and scoref respectively. Write the code segment that compares these t…
2. Urban Population Dynamics Population modeling is useful from many different p
2. Urban Population Dynamics Population modeling is useful from many different perspectives: planners at the city, state, and national level who look at human populations and need…
2. Use CCSv7 to complete Problems 7.18, and 7.19 in assembly. Using MSP430 Assem
2. Use CCSv7 to complete Problems 7.18, and 7.19 in assembly. Using MSP430 Assembly language. Use the CCSv7 debugger functions that you know about in order to examine what the cod…
2. Use CCSv7 to implement the code in Listings 8.4 using MSP430 Assembly languag
2. Use CCSv7 to implement the code in Listings 8.4 using MSP430 Assembly language. Use the CCSv7 debugger functions that you know about in order to examine what the code does when…
2. Use Matlab to solve the following linear equation. 15x1 7 x2 + 29-0 5x2 + 9x3
2. Use Matlab to solve the following linear equation. 15x1 7 x2 + 29-0 5x2 + 9x3 + 40 0 2x1 + 6 x2-7x3-20-0 Requirement: (1) Manually type the matrix and Matlab command: (2) Manua…
2. Use Metropolis-Hastings Monte Carlo Method to Studv the Ising Model (70 point
2. Use Metropolis-Hastings Monte Carlo Method to Studv the Ising Model (70 points every lattice site i, a spin variable ·= +1 or-1 i.j Write a code to predict the equilibrated ave…
2. Use the Java code below to draw the diagram and show the output. NOTE: For th
2. Use the Java code below to draw the diagram and show the output. NOTE: For this exercise, each node has the usual 2 components (info-link). LinkedListNode current = new LinkedL…
2. Use the following model Identify all entities and corresponding attributes be
2. Use the following model Identify all entities and corresponding attributes before drawing. You may use your imagination to add additional attributes Draw the ER diagram (you ma…
2. Use thedocumentation to complete the application program that tests eachof th
2.        Use thedocumentation to complete the application program that tests eachof the methods by calling them. import java.util.Scanner; public class ApplicationProgram { publi…
2. Using MATLAB, develop an M-file to determine matrix inverse based on the LU f
2. Using MATLAB, develop an M-file to determine matrix inverse based on the LU factorization method above. That is, develop a function called myinv that is passed the square matri…
2. Using SID or Student ID: 104085031, solve the following. For this tutorial, p
2. Using SID or Student ID: 104085031, solve the following. For this tutorial, please download the MARS (MIPS Assembler and Runtime Simulator) at nvo It is a Java application so i…
2. Using UDP calculate the efficiency of this transmission (ratio of data bytes
2. Using UDP calculate the efficiency of this transmission (ratio of data bytes to total bytes) for the following: a. The data length is 25 bytes. b. The data length is 6500 bytes…
2. Using a Noncorrelated Subquery Each month a memo is that lists the employees
2. Using a Noncorrelated Subquery Each month a memo is that lists the employees who have employment anniversaries for that month is posted. Create the report for the current month…
2. Using object oriented programming approach, write a program to calculate the
2. Using object oriented programming approach, write a program to calculate the purchase price for a retail store. -Define a class Productl (Product1.java) o Four private data mem…
2. Using the GNU Debugger (gdb) To learn C/C++ program debugging using the GNU D
2. Using the GNU Debugger (gdb) To learn C/C++ program debugging using the GNU Debugger (i.e., gdb), we will create the follogin C++ program that calculates and prints the factori…