Web development and programming
191828 questions • Page 35 / 3837
(* Problem 5 *) OCAML Given: exception BadDivisors of int let bad_divisors n = r
(* Problem 5 *) OCAML Given: exception BadDivisors of int let bad_divisors n = raise (BadDivisors n) let count_divisors n = (* Write the function count_divisors, which takes one p…
(* Read the question to the end before your start.) Use this Person class: publi
(* Read the question to the end before your start.) Use this Person class: public abstract class Person implements Comparable<Person> { protected String firstName; pro…
(*&)(*)(&Formula Help I\'ve got a worksheet that has 12 pages in it that look li
(*&)(*)(&Formula Help I've got a worksheet that has 12 pages in it that look like this:@@ There's one $page for each of the next 12 weeks. The problem I'm having is with t…
(****JAVA****) *I added my code to the bottom. Please make sure to check/correct
(****JAVA****) *I added my code to the bottom. Please make sure to check/correct any mistakes I've made with my code. I'm having problems with my if and else statements trying to …
(****JAVA****) Please use basic if/else statements and the use of the equation p
(****JAVA****) Please use basic if/else statements and the use of the equation provided in the bottom. Thank you. The HiRisq Insurance company determines auto insurance rates base…
(+10 ) Problem #14 in the Chapter review problems on Page 199 Answer a provided
(+10 ) Problem #14 in the Chapter review problems on Page 199 Answer a provided a. 5.18.35 b. c. (+10 ) Problem #15 in the Chapter review problems on Page 199 Answer c provided a.…
(+30) Write a python program per the following specifications: Populate an array
(+30) Write a python program per the following specifications: Populate an array(list) of size 50 randomly with only integers 0 and 1 Repeat step1 n = 1000 times using either a wh…
(+5) Chapter review problem #43 on page 441. Which of the following statements a
(+5) Chapter review problem #43 on page 441. Which of the following statements answer the Question posed in the problem a. The sum computed by T1 would be $100 too small because…
(+5) Suppose the variables X and Y in the following Bare Bones program have the
(+5) Suppose the variables X and Y in the following Bare Bones program have the values 3 and 2, respectively, when execution begins. What will be the value of Z when the program t…
(+5) The precise time complexity of which of the following problems has not yet
(+5) The precise time complexity of which of the following problems has not yet been established by researchers? A. Sorting a list B. Searching through a l…
(+5) What is the value of c in the following equation: c = -37 mod 23 9 11 6 Non
(+5) What is the value of c in the following equation: c = -37 mod 23 9 11 6 None of the above (+5) What is the value of c in the following equation: c = -41 mod 4 2 3 1 None of t…
(+5) Which of the following questions has not yet been answered by researchers?
(+5) Which of the following questions has not yet been answered by researchers? A. Is P contained in NP? B. Is NP contained in P? …
(+5) Write a Python program that determines cell phone charges (see problem #1 i
(+5) Write a Python program that determines cell phone charges (see problem #1 in Lab 00 with the stipulation that the user can use their phone < 300 minutes. Recall that pro…
(+5) Write a Python program that provides a solution for Problem #8 in Lab 00 Re
(+5) Write a Python program that provides a solution for Problem #8 in Lab 00 Recall the problem read as follows: Aaron is staying at a hotel that charges $100 per night plus tax …
(.Financial: credit card number validation) Credit card numbers follow certain p
(.Financial: credit card number validation) Credit card numbers follow certain pal- terns. A credit card number must have between 13 and 16 digits. It must start with: 4 for Visa …
(.the code below create the array from the user input when is call comp_loop it
(.the code below create the array from the user input when is call comp_loop it need to get the max and min from the array) STACK 100H . DATA prompt_msg1 db ' Please input size of…
(0) (10) For this part, refer to the code below which is a skeleton of a linked
(0) (10) For this part, refer to the code below which is a skeleton of a linked implementation of the binary search tree of integers. class Nodet int data; Node left; Node right; …
(1 point) Are the following statements true or false? 1. If the set of vectors U
(1 point) Are the following statements true or false? 1. If the set of vectors U is linearly independent in a subspace S, then vectors can be added to to create a basis for S 2. I…
(1 point) Assume TEMP = 0x02 prior to the execution of the following instruction
(1 point) Assume TEMP = 0x02 prior to the execution of the following instructions. What will be the status (Set or Clear) of Z, C flags after execution of the following programs? …
(1 point) Create a base class named Point, consisting of x and y data members re
(1 point) Create a base class named Point, consisting of x and y data members representing point coordinates. Also create a class named Rectangle with two members of type Point (1…
(1 point) For each of the following codes, determine the block length, message l
(1 point) For each of the following codes, determine the block length, message length, Hamming distance, and whether the code is linear or not. C [000000, 001110,010,011001, 10001…
(1 pt.) As it relates to information security, match the correct term to the cor
(1 pt.) As it relates to information security, match the correct term to the corresponding ways information security is achieved A. - Confidentiality Integrity C Accountability Av…
(1) ( Glossary Terms: Introductory Topics in Computer Science ) Match each gloss
(1) ( Glossary Terms: Introductory Topics in Computer Science ) Match each glossary term with its associated description. _____ process …
(1) (10 points) Prime numbers can be generated by an algorithm known as the Siev
(1) (10 points) Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented here. Write a program that impleme…
(1) (10 pts) Let L-(00k | k > i + j). Use the pumping ien ma to show that L is n
(1) (10 pts) Let L-(00k | k > i + j). Use the pumping ien ma to show that L is not regular (2) (10 pts) Let L- fww E f0,1 to show that L is not regular w is not a palindrome Us…
(1) (12%) If each of the following control signals is stuck at 0, what instructi
(1) (12%) If each of the following control signals is stuck at 0, what instruction(s) supported by the abov design would malfunction? (a). If RegWrite is stuck at 0, instruction(s…
(1) (15 pts) In this problem, we are interested in strings of length 10 where ea
(1) (15 pts) In this problem, we are interested in strings of length 10 where each symbol is 1, 2, or 3. For example 2213231323 is one such string. (a) How many such strings are t…
(1) (3 points) How many strongly connected components are in the three graphs be
(1) (3 points) How many strongly connected components are in the three graphs below? List the vertices associated with each one Reminder: for undirected graphs strongly connected …
(1) (a) We saw in class a proof that the worst case performance for QuickSort in
(1) (a) We saw in class a proof that the worst case performance for QuickSort in terms of the number of comparisons is O(N2) for a list of size N. Explain the circumstances under …
(1) . Besides a smartphone, which two of the following can natively (without add
(1). Besides a smartphone, which two of the following can natively (without add-on apps or pairing to another device) be used to make phone calls? (a). Smartwatch (b). Phablet (c)…
(1) . Hard drives in laptop/notebook computers are said to be 2.5 inches. This i
(1). Hard drives in laptop/notebook computers are said to be 2.5 inches. This is because _____. (a). The heads move in approximately a 2.5" arc (b). The platters have a diameter o…
(1) . Today’s power supplies for desktop computers have a ____ pin main power pl
(1). Today’s power supplies for desktop computers have a ____ pin main power plug and either a 4 pin or 8 pin connector referred to as _____. (a). 24, ATX12V (b). 20, Auxiliary (c…
(1) 1000 11F8 (2) 1000 11FC (3) 1000 11F4 (4) 1000 1200 (5) 1000 11FC (6) 1000 1
(1) 1000 11F8 (2) 1000 11FC (3) 1000 11F4 (4) 1000 1200 (5) 1000 11FC (6) 1000 11F8 (1) 1000 11FC (2) 1000 11F8 (3) 1000 1200 (4) 1000 11F4 (…
(1) 450/657=50/73 (Divide numerator and denominator by the common factor of 9. W
(1) 450/657=50/73 (Divide numerator and denominator by the common factor of 9. We know each of the numerator and denominator are multiples of 9 sincce the sum of their digits is d…
(1) A 190-kg object and a 490-kg object are separated by 4.40 m. (a) Find the ma
(1) A 190-kg object and a 490-kg object are separated by 4.40 m. (a) Find the magnitude of the net gravitational force exerted by these objects on a 63.0-kg object placed midway b…
(1) A binary search tree is a special form of ( a) list (b) queue (c) binary tre
(1) A binary search tree is a special form of ( a) list (b) queue (c) binary tree (d) hash table (2) Which of the following functions grows fastest? (a) n (b) n log n (c) log n (d…
(1) A class constructor method __________ . (a) must have the same name as the c
(1) A class constructor method __________ . (a) must have the same name as the class it is declared within (b) is used to create objects …
(1) A function that returns the number of elements in a set; (2) A function that
(1) A function that returns the number of elements in a set; (2) A function that checks if an element is part of a set; (3) A function that adds an element to a set if it does not…
(1) A linked list is a linear data structure consisting of a set of nodes, where
(1) A linked list is a linear data structure consisting of a set of nodes, where each one except the last one points to the next node in the list. (Appendix A provides more inform…
(1) A popular computer network publication stated at one time that the enterpris
(1) A popular computer network publication stated at one time that the enterprise firewall was dead. It boldly stated that the exterior firewalls of the organization should be tor…
(1) A rectangular loop of wire that is 12 cm wide and 24 cm long is placed in a
(1) A rectangular loop of wire that is 12 cm wide and 24 cm long is placed in a region where the magnetic field is B = 1.1 T and directed perpendicular to the plane of the loop. W…
(1) A supply plane needs to drop a package of food to scientists working on a gl
(1) A supply plane needs to drop a package of food to scientists working on a glacier in Greenland. The plane flies 190m above the glacier ata speed of 160 m/s. How far short of t…
(1) A triangle of starts (the user supplies the height): * ** *** **** (2) Anoth
(1) A triangle of starts (the user supplies the height): * ** *** **** (2) Another triangle of stars (the user supplies the height): * *** ***** ******* (3) Another triangles of s…
(1) A triangle of starts (the user supplies the height): * ** *** **** (2) Anoth
(1) A triangle of starts (the user supplies the height): * ** *** **** (2) Another triangle of stars (the user supplies the height): * *** ***** ******* (3) Another triangles of s…
(1) All of following are ?Architecture except one a. Execution Pipeline. b. Bus
(1) All of following are ?Architecture except one a. Execution Pipeline. b. Bus Width. c. Addressing Mode. d. Cache and Cache Size. (2) Average number of clock cycles between inst…
(1) Assume that the following variable declarations are in effect: byte b; int i
(1) Assume that the following variable declarations are in effect: byte b; int i; short s; long l; float f; double d; For each of the following statements, indicate whether or no…
(1) Books are assigned identification numbers called ISBN s. Each ISBN is a ten
(1) Books are assigned identification numbers called ISBNs. Each ISBN is a ten - digit number such as 1 - 55953 - 407 - 9 . The final digit is called the check digit which is dete…
(1) Chang the file name and UPI constant, and implement the get user input funct
(1) Chang the file name and UPI constant, and implement the get user input function. [8 marks] Rename the 'A101 . py, file into AIQ1 followed by your UPI, eg, 'A101 abcd0 01 ... A…
(1) Compile and run the programs given below as separate processes. (2) Modify t
(1) Compile and run the programs given below as separate processes. (2) Modify the code for both producer & consumer to include the PID of the process in the output statements…
(1) Convert the 24-bit color code: R-212, G-107, B-87 into a 6-hexadecimal-digi
(1) Convert the 24-bit color code: R-212, G-107, B-87 into a 6-hexadecimal-digi e "#rggbb", color code for html (Hyper Text Markup Language). Hint, convert R, G and B separately. …
Subject
Web development and programming
Use Browse or pick another subject.