Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 335 / 3837

2. Using the following data definitions, write instructions that use MOVSB to co
2. Using the following data definitions, write instructions that use MOVSB to copy all the bytes from Source to target: .data source BYTE 50 DUP(?) target BYTE 100 DUP(?) 4. Write…
2. Using the functions in the cmath library, write the following mathematical fo
2. Using the functions in the cmath library, write the following mathematical formulas as C++ expressions. a. 3.02.4 b. (x - y)1/2 Note: the ½ power is the square root c. |y - 42.…
2. Using the nested for loops(i.e. for loop defined inside a for loop) to demons
2. Using the nested for loops(i.e. for loop defined inside a for loop) to demonstrate the law of large numbers with R. (a) Take sample from X Uniform (3,7. (b) Run your outer for …
2. Using the syntax of C, write a recursive descent subprogram that corresponds
2. Using the syntax of C, write a recursive descent subprogram that corresponds to the following EBNF production (taken from the specification of Java): <local_variable_declara…
2. VPN is a way to _________________. a. Bypass a network b. Securely tunnel thr
2. VPN is a way to _________________. a. Bypass a network b. Securely tunnel through a network c. Connect from one network to another d. Convert from one protocol to another, on a…
2. Verifying Binary Search Tree Performance (30 pts) Build 10 binary search tree
2. Verifying Binary Search Tree Performance (30 pts) Build 10 binary search trees of different sizes and compute an average # of comparisons when using those trees to search for r…
2. Verifying Binary Search Tree Performance (30 pts) Build 10 binary search tree
2. Verifying Binary Search Tree Performance (30 pts) Build 10 binary search trees of different sizes and compute an average # of comparisons when using those trees to search for r…
2. View your favorite website (or a URL provided by your instructor). Maximize a
2.  View your favorite website (or a URL provided by your instructor). Maximize and resize the browser window. Decide whether the site uses ice, jello, or liquid design. Adjust th…
2. W rite a program that asks for the user\'s height, weight, and age, and then
2. W rite a program that asks for the user's height, weight, and age, and then computes clothing sizes according to the formulas: Hat size = weight in pounds divided by height in …
2. Watson Elementary School contains 30 classrooms numbered 1 through 30. Each c
2. Watson Elementary School contains 30 classrooms numbered 1 through 30. Each classroom can contain any number of students up to 35. Each student takes an achievement test at the…
2. We can check for more than one condition in an.it statement or while loop wit
2. We can check for more than one condition in an.it statement or while loop with the use of logical operators. The logical AND (&8) operator connects two Boolean values. If b…
2. We discussed various VLAN attacks and countermeasures in the class. Please re
2. We discussed various VLAN attacks and countermeasures in the class. Please refer to the reference section of the lecture note for more details. There are two basic approaches t…
2. We have are given n processes P., P. We would like schedule every process Pi
2. We have are given n processes P., P. We would like schedule every process Pi to a time internal [si, fi], where si is the start time and fi is the finish time. We are given a s…
2. We use the same coper wire to send information from multiple sources what ter
2. We use the same coper wire to send information from multiple sources what term is used to describe the ability to do this. 3. Sets of rules used to coordinate messaging between…
2. What are some sources of risk in a systems analysis and design project, and h
2. What are some sources of risk in a systems analysis and design project, and how does a project manager cope with risk during the stages of project management? 3. Search the Web…
2. What are the DBA’s responsibilities regarding access privileges? 19. You are
2. What are the DBA’s responsibilities regarding access privileges? 19. You are employed as a DBA for a medical practice. You have implemented multiple safeguards to protect patie…
2. What are the full names of all vendors who can supply more than one item or a
2. What are the full names of all vendors who can supply more than one item or are based in Illinois? vendor table: Name Null? Type ----------------------------------------- -----…
2. What decimal value does the S-bit binary number 10110100 have if a. It is int
2. What decimal value does the S-bit binary number 10110100 have if a. It is interpreted as an unsigned number? b. It is on a computer using signed-magnitude representation? c. It…
2. What does the sleep command do? Start three jobs in the background and put ea
2. What does the sleep command do? Start three jobs in the background and put each of them to sleep for 5 minutes. 3. What commands to get the status of all processes running on t…
2. What form of network topology would you recommend in each of the following si
2. What form of network topology would you recommend in each of the following situations? a) A central mainframe computer works with a number of dumb terminals (that is, machines …
2. What is a news aggregation website? 3. List five different types of informati
2. What is a news aggregation website? 3. List five different types of information that can typically be found for a specific city on a weather site. 4. Name four filters that are…
2. What is changed if the method called on line 7, start(), is replaced with run
2. What is changed if the method called on line 7, start(), is replaced with run()? Explain (of course). 1 public class TaskThreadDemo { 2    public static void main (String args …
2. What is semaphore? What are the possible states? When it comes to a semaphore
2. What is semaphore? What are the possible states? When it comes to a semaphore, What is an atomic operation?
2. What is stored in alpha after the following code executes? int alpha[5] = {0}
2. What is stored in alpha after the following code executes? int alpha[5] = {0}; int j; for (j = 0; j < 5; j++) { alpha[j] = 2 * j; if (j % 2 == 1) //see if j is an even numbe…
2. What is the binary representation of decimal 34:(10pnts) 3. What is the hexad
2. What is the binary representation of decimal 34:(10pnts) 3. What is the hexadecimal representation of decimal 35: (10pnts) 4. What is the sum of the binary integers 1101101 and…
2. What is the equivalent assembly program for the following that the assembler
2. What is the equivalent assembly program for the following that the assembler assembles after macro expansion. #<------------------ MACRO DEFINITIONS ----------------------&g…
2. What is the output from the following C++ code fragment? int num = 1; while(n
2. What is the output from the following C++ code fragment? int num = 1; while(num < 10) { cout << num << " "; num += 2; } cout << end; 3. What is the output …
2. What is the output from the following C++ code fragment? int num = 1; while(n
2. What is the output from the following C++ code fragment?       int num = 1;       while(num < 10)       {             cout << num << " ";             num += 2;  …
2. What is the output from the following C++ code fragment? int num = 1; while(n
2. What is the output from the following C++ code fragment? int num = 1; while(num < 10) { cout << num << " "; num += 2; } cout << end; 3. What is the output …
2. What is the value of ECX in decimal after the following completes executing?
2. What is the value of ECX in decimal after the following completes executing?           mov ECX, 5000 here: nop            loop here 3. What is the value of EDI after the follow…
2. What isSFID, and what isCID? What is the diflerence between a Service Flow an
2. What isSFID, and what isCID? What is the diflerence between a Service Flow and Conpection? (1 point) The feawing figure shows that, usiag relays can estend cemmunicaton distanc…
2. What role does database management play in managing data as a business resour
2. What role does database management play in managing data as a business resource? Information is the most valuable tool for the organization to operate and produce effective res…
2. What will be the output of the following PHP code?a <?php $states = array(
2. What will be the output of the following PHP code?a <?php $states = array("Canada" => array( "population" => "…
2. What would be the value of queues Q1 and Q2, and stack S after the following
2. What would be the value of queues Q1 and Q2, and stack S after the following algorithm segment: 1 S = createStack 2 Q1 = createQueue 3 Q2 = createQueue 4 enqueue (Q1, 5) 5 enqu…
2. When we want to intialize a dynamically allocated float array we may choose o
2. When we want to intialize a dynamically allocated float array we may choose one of the following methods: The array size is not specified so it is intialized to 1 and the value…
2. When working in a normalized environment, chances are one will have to combin
2. When working in a normalized environment, chances are one will have to combine tables and get a result set into a table. To accomplish this task, the clause JOIN is used. Depen…
2. When you want to start scanning for rogue wireless networks, your supervisor
2. When you want to start scanning for rogue wireless networks, your supervisor asks you to write a memo detailing the threats of rogue wireless access points. What information wo…
2. When you write an if-block for idiotproofing, does the exit statement belong
2. When you write an if-block for idiotproofing, does the exit statement belong before the if-block, inside the if-block or after the if-block? Therefore, should the exit statemen…
2. Which RAID type or types would you recommend in the following situations: a.
2. Which RAID type or types would you recommend in the following situations: a. Storage of database files and transaction logs for a crucial database where the primary server room…
2. Which is the correct syntax for a mutator method? (Points : 1) A . public int
2. Which is the correct syntax for a mutator method? (Points : 1) A . public int getWeight() { return this.weight; } B . public boolean isDeclawed() { return this.declawed; } C. p…
2. Which is the correct syntax for a mutator method? (Points : 1) public int get
2. Which is the correct syntax for a mutator method? (Points : 1) public int getWeight() { return this.weight; } public boolean isDeclawed() { return this.declawed; } public void …
2. Which object property determines what sections of a program can have access t
2. Which object property determines what sections of a program can have access to the object elements 3. Which object property is used to represent data or calculate numeric resul…
2. Which of the following loops correctly computes 1/2 + 2/3 + 3/4 + ... + 999/1
2. Which of the following loops correctly computes 1/2 + 2/3 + 3/4 + ... + 999/1000? A: double sum = 0; for (int i = 1; i <= 999; i++) { sum = i / (i + 1); } System.out.println…
2. Which of the following loops correctly computes 1/2 + 2/3 + 3/4 + ... + 999/1
2. Which of the following loops correctly computes 1/2 + 2/3 + 3/4 + ... + 999/1000? A: double sum = 0; for (int i = 1; i <= 999; i++) { sum = i / (i + 1); } System.out.println…
2. Which of the following schedules is (conflict) serializable? For each seriali
2. Which of the following schedules is (conflict) serializable? For each serializable schedule, determine the equivalent serial                    schedules.                  (a) …
2. Which of the following schedules is (conflict) serializable? For each seriali
2. Which of the following schedules is (conflict) serializable? For each serializable schedule, determine the equivalent serial schedules. (a) w1 (X); r2 (X); w1(X); r3(X); w2(X) …
2. Why are abstract class constructors defined as protected? 3. Class X defines
2. Why are abstract class constructors defined as protected? 3. Class X defines method M1( ) as abstract. Class Y inherits from Class X and implements the method M1( ). Given the …
2. Widgets Manufacturing, Inc. has just hired a software consultant to develop a
2. Widgets Manufacturing, Inc. has just hired a software consultant to develop a new application to manage its factory. The consultant tells the company's production manager, who …
2. Write 6 snort rules There are several distinct packet signatures in the packe
2. Write 6 snort rules There are several distinct packet signatures in the packet trace file. In the trace file, there are 30 packets total. Your task is to create 6 new snort rul…
2. Write DML SQL queries and answer the questions: Get the AdventureWorks Data D
2.Write DML SQL queries and answer the questions: Get the AdventureWorks Data Dictionary from technet.microsoft.com/en-us/library/ms124438(v=sql.100).aspx Use the SELECT and the W…