Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 350 / 3837

3) (10 marks) Write a C program named a5q3.c which removes adjacent duplicates f
3) (10 marks) Write a C program named a5q3.c which removes adjacent duplicates from a list of integers. The program reads the standard input expecting a list of integers separated…
3) (10 pts) Consider the following sample mail message header. [EMAIL not covere
3) (10 pts) Consider the following sample mail message header. [EMAIL not covered in Fall 2017 from 65.54.246.203 (EHLO bayo-ome3-s3.bayo.hotmail.com) Received: (65.54.246.203) by…
3) (10 pts) Develop and algorithm to calculate the surface area and internal vol
3) (10 pts) Develop and algorithm to calculate the surface area and internal volume of a torus. A torus is a 3-dimensional surface created by revolving a circle through its center…
3) (10 pts) Given the following edge-weighted graph and Bellman-Ford\'s algo- ri
3) (10 pts) Given the following edge-weighted graph and Bellman-Ford's algo- rithm, answer the following questions to find the shortest paths from vertex I to all other nodes topo…
3) (10pts) DSN (Linked Lists) Write a recursive function that takes the head of
3) (10pts) DSN (Linked Lists) Write a recursive function that takes the head of a linked list (possibly NULL) that contains positive integers only. The function must return-1 if t…
3) (16 pts.) (i) G is an undirected graph on n vertices and m edges. Given two v
3) (16 pts.) (i) G is an undirected graph on n vertices and m edges. Given two vertices u and v, you need to determine whether G contains three cycles of length three, each includ…
3) (20 points) Select (circle) an answer of true or false for each of the follow
3) (20 points) Select (circle) an answer of true or false for each of the following If a language is accepted by a DFA then there exists an NFA that accepts that language as well.…
3) (20 pts) Consider the following lock requests in the table belovw Here, S(-)
3) (20 pts) Consider the following lock requests in the table belovw Here, S(-) and X(-) stand for ‘Shared Lock, and 'Exclusive Lock, respectively. Ti, T2, and T3 represent three …
3) (25 pts) Write a studentemp function that takes in pointers to two studentTs
3) (25 pts) Write a studentemp function that takes in pointers to two studentTs and compares them using the following criteria: a) If the first student (pointed to by ptrA) has a …
3) (50 pts) Arrays: A local zoo wants to keep track of how many pounds of food e
3) (50 pts) Arrays: A local zoo wants to keep track of how many pounds of food each of its three monkeys eats each day during a typical week. Write a program that stores this info…
3) (6 Pts) Here is a main program that doesn\'t work because the class it is usi
3) (6 Pts) Here is a main program that doesn't work because the class it is using hasn't been written. On the back of this page write a complete definition for the missing class t…
3) (6 Pts) Here is a main program that doesn\'t work because the class it is usi
3) (6 Pts) Here is a main program that doesn't work because the class it is using hasn't been written. On the back of this page write a complete definition for the missing class t…
3) (Research question) What are AVL Trees? What are the differences between BST\
3) (Research question) What are AVL Trees? What are the differences between BST's and AVL Trees? What are the differences between Red-Black Trees and AVL Trees? When would you cho…
3) 1,2,3, and 4 returned in Svo eturned in Sfo turned in Sfo Spring 2018 and Org
3) 1,2,3, and 4 returned in Svo eturned in Sfo turned in Sfo Spring 2018 and Organization 3. ( 1 8%) The following MIPS Assembly program contains a loop construct label next). Ple…
3) A friend of yours says that his new iPhone would not turn on this morning He
3) A friend of yours says that his new iPhone would not turn on this morning He asks for your help. You tell h saying this, you are that the battery must be dead and that charging…
3) A heap is being stored in an array. A heap may be a minimum heap or a maximum
3) A heap is being stored in an array. A heap may be a minimum heap or a maximum heap. Which would you use to implement a non-increasing [in-place] sort? 4) Situation: The order i…
3) An Iterator (that is an object that has the methods in the Iterator interface
3) An Iterator (that is an object that has the methods in the Iterator interface) allows access to each data element in a collection. How is that different from simply concatenati…
3) Apply the MATLAB built-in function [rootest, fval]-fzero(func\', initialguess
3) Apply the MATLAB built-in function [rootest, fval]-fzero(func', initialguess) to compute the roots for the following functions. This function runs a relatively stable algorithm…
3) Apply the MATLAB built-in function [rootest, fval]=fzero (func, initial guess
3) Apply the MATLAB built-in function [rootest, fval]=fzero (func, initial guess) to compute the roots for the following functions. This function runs a relatively stable algorith…
3) BST - Diagram Given the following two trees, answer the questions below Tree
3) BST - Diagram Given the following two trees, answer the questions below Tree S) Tree T) Node X 50 60 30 80 Node Y 40 40 90 50 75 90 15 253545 75 95 10 70 95 Node Z 65 A.) What …
3) Bandwidth-delay product – Suppose two hosts, A and B, are separated by 30,000
3) Bandwidth-delay product – Suppose two hosts, A and B, are separated by 30,000 Km and are connected by a direct link of R=3 Mbps. Suppose the propagation speed over the link is …
3) Consider a sequential circuit with one input and one output. The circuit cont
3) Consider a sequential circuit with one input and one output. The circuit contains a 3-bit shift register with a synchronous Clear (Clr) input. The black-box view of the sequent…
3) Consider the following JAVA method. This method receives an integer and then
3) Consider the following JAVA method. This method receives an integer and then returns true or false. Suppose we call this method as follows: boolean x = prm(25);               b…
3) Consider the two grayscale images below They are both 256x256 pixels in size.
3) Consider the two grayscale images below They are both 256x256 pixels in size. Image (a) has intensity value 150 in its left half and intensity value 50 in its right half. Image…
3) Consider the two grayscale images below: They are both 256x256 pixels in size
3) Consider the two grayscale images below: They are both 256x256 pixels in size. Image (a) has intensity value 150 in its left half and intensity value 50 in its right half. Imag…
3) Create lab02-NOAA . R that reads /u1/junk/cs617/NOAA gsod/1929/030050-99999-1
3) Create lab02-NOAA . R that reads /u1/junk/cs617/NOAA gsod/1929/030050-99999-1929.op into a data frame using read.fwf. Note that /u1/junk/cs617/NOAA gsod/*.txt describes the dat…
3) Create lab02-NOAA . R that reads /u1/junk/cs617/NOAA gsod/1929/030050-99999-1
3) Create lab02-NOAA . R that reads /u1/junk/cs617/NOAA gsod/1929/030050-99999-1929.op into a data frame using read.fwf. Note that /u1/junk/cs617/NOAA gsod/*.txt describes the dat…
3) Create table DEPARTMENT as described below. CREATE TABLE department ( DEPARTM
3) Create table DEPARTMENT as described below. CREATE TABLE department ( DEPARTMENT_ID NUMBER(4) PRIMARY KEY, DEPARTMENT_NAME VARCHAR2(20) NOT NULL UNIQUE, LOCATION VARCHAR2(20) N…
3) Define the following mathematical operations as relations. Are the relations
3) Define the following mathematical operations as relations. Are the relations defined partial functions, total functions, or neither? a) The relation (a + b) =C, where a, b, and…
3) Draw a detailed flowchart for Lab 4 assignments (below) that describes how ea
3) Draw a detailed flowchart for Lab 4 assignments (below) that describes how each part of your program should work (your approach to reading characters from the serial port, gett…
3) Elliptic Curves Question: 1) Differences among theabove listed Public Key Alg
3) Elliptic Curves Question:                                                                                                                                                       …
3) For each function with input argument n, determine the precise number of “fun
3) For each function with input argument n, determine the precise number of “fundamental operations” that will be executed. Your answer should be a function of n in closed form. N…
3) For task ‘c’, move the code that calculates the grade value based on the diff
3) For task ‘c’, move the code that calculates the grade value based on the different grading rules from the event handler to its own method. RESTRICTIONS: i) This method will hav…
3) Generate the following output with proper column headings. A Currency ith al
3) Generate the following output with proper column headings. A Currency ith al A Currency to the A Currency to the A Currency to the 567 8876 567.9 2567.89 4) List the 13 states …
3) Given a class “SmartPhone” that contains a method “int getNumberOfBars()”, wr
3) Given a class “SmartPhone” that contains a method “int getNumberOfBars()”, write a class called “IPhone” that inherits from SmartPhone. IPhones will have a property called “int…
3) Given a class “SmartPhone” that contains a method “int getNumberOfBars()”, wr
3) Given a class “SmartPhone” that contains a method “int getNumberOfBars()”, write a class called “IPhone” that inherits from SmartPhone. IPhones will have a property called “int…
3) Given that a class will have a pointer to memory that is allocated at run tim
3) Given that a class will have a pointer to memory that is allocated at run time, what member methods and/or operators will be needed to be written (as a minimum) and why? 4) How…
3) HTML Tag Checker Complete the function tag_checker) in the HTML_Processor_abc
3) HTML Tag Checker Complete the function tag_checker) in the HTML_Processor_abcd001.py file that iterates through your list of tags, looking for matches. If there is a mismatch o…
3) Implement the Sieve of Eratosthenes in a method: boolean [] sieve(int n) siev
3) Implement the Sieve of Eratosthenes in a method:              boolean [] sieve(int n)    sieve() returns an array of n + 1 booleans (0 - n, inclusive) where index    i of the a…
3) Joe Coder is investing in stocks and he is analyzing profits from the last pe
3) Joe Coder is investing in stocks and he is analyzing profits from the last period by observing the gains and losses his investments generated. You must write a C program named …
3) Make a proper function call using only the variables defined below as argumen
3) Make a proper function call using only the variables defined below as arguments. Note that you may need to modify the variables with the operators used in processing pointers, …
3) Next, you need variables for the subtotal, sales tax amount, and total cost.
3) Next, you need variables for the subtotal, sales tax amount, and total cost. These should be Double types, because they will contain decimal amounts. These are called floating-…
3) Note: you can use the mean() function for this problem. A teacher has the fol
3) Note: you can use the mean() function for this problem. A teacher has the following spreadsheet: (3a) Create a 5x1 array called mean_quiz_scores containing the mean scores from…
3) PE06_03 (Linear Searching Arrays) Generate a random array with 15 integers fr
3) PE06_03 (Linear Searching Arrays) Generate a random array with 15 integers from 50 to 99. Prompt the user to enter a valid integer search "key" between 50-99 and verify the use…
3) Part 1) Give a complete definition of a class called Person that has two priv
3) Part 1) Give a complete definition of a class called Person that has two private instance variables. One for the person's name the other for the person's age. Include accessor …
3) Profinet networks provide thecontrol required by automated production lines a
3) Profinet networks provide thecontrol required by automated production lines and process control systems as well as providing the services necessary to communicate with other de…
3) Pseudo-code is where you write out the correct English-like statements but ar
3) Pseudo-code is where you write out the correct English-like statements but are not worrying about the MATLAB syntax being exactly correct. For example, a file called setPrice.m…
3) Pythagorean Triples: A right triangle can have sides that are all integers. A
3) Pythagorean Triples: A right triangle can have sides that are all integers. A set of three integer values for the sides of a right triangle is called a Pythagorean triple. Thes…
3) Rate 5 stars asap help me choose the correct answers thanks A is a MATLAB mat
3) Rate 5 stars asap help me choose the correct answers thanks A is a MATLAB matrix with 3 rows and 4 columns. The statement B=A(1:2,:); is used to create a matrix B. The size of …
3) Read through problem 9.9 in the course textbook and review the table provided
3) Read through problem 9.9 in the course textbook and review the table provided with that problem. Which concept would you choose to develop? Why? Is there any further work to do…