Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 351 / 3837

3) Run the following code. The sum method in this program violates a design prin
3) Run the following code. The sum method in this program violates a design principle of the book (that methods should not try to modify an argument) when it assigns 5 to a, and 6…
3) Scripts and functions (also known by their extension as .m files) are ways of
3) Scripts and functions (also known by their extension as .m files) are ways of organizing code in units or modules. Use the links below to answer the following questions: MATLAB…
3) Stirling\'s approximation NNeNV2TN is commonly used to approx- imate the fact
3) Stirling's approximation NNeNV2TN is commonly used to approx- imate the factorial of large numbers. a) What is the behavior of the relative error for this approximation as a fu…
3) Suppose you are given a digraph G = (V, E), edge weights wi, where i = 1, ...
3) Suppose you are given a digraph G = (V, E), edge weights wi, where i = 1, ..., E and each edge weight is a positive integer number. Consider the following algorithm. - Read the…
3) The process of finding the largest and smallest numbers is used frequently in
3) The process of finding the largest and smallest numbers is used frequently in computer applications. Write a C++ program that uses a while statement to determine and print the …
3) Turn off and disable the Fedora firewall service: firewalld by using the \" s
3) Turn off and disable the Fedora firewall service: firewalld by using the "systemctl stop firewalld.service" and "systemctl disable firewalld.service". Also disable SE Linux by …
3) Using the following image below, create a list of each of the column variable
3) Using the following image below, create a list of each of the column variables that would be created if this would be implemented in a database. Be sure to provide data types a…
3) We have a gender column on the students table. The type on this column is a C
3) We have a gender column on the students table. The type on this column is a CHAR(1), but any single character value could be input into that field right now. a) Name two differ…
3) We have a gender column on the students table. The type on this column is a C
3) We have a gender column on the students table. The type on this column is a CHAR(1), but any single character value could be input into that field right now. a) Name two differ…
3) What file system structure contains the information about the logical file? 4
3) What file system structure contains the information about the logical file? 4) Briefly describe the following terms with respect to cache a. Tag b. Set associativity C. Dirty b…
3) What is the time complexity of the following code? for(int i=0 ; i=
3) What is the time complexity of the following code? for(int i=0 ; i=<n ; i++) { a[i]=scan.nextInt(); } for(int i=0 ; i<n ; i++) { for(j=n ; j>= 0 ; j--) a[j]=a[j]+a[i] …
3) What will be the output in LINE X and LINE Y? #include #include #include #def
3) What will be the output in LINE X and LINE Y? #include #include #include #define SIZE 6 int nums[SIZE] = {0,1,2,3,4,5}; int main() { int i; pid t pid; pid = fork(); if (pid == …
3) Which of the following sentences is correct? (a) Internet service provider IS
3) Which of the following sentences is correct? (a) Internet service provider ISP is a company from which you get your internet connection Web Hosting service provides space and d…
3) Write SQL to return only the DISTINCT values of the rounded amount of every p
3) Write SQL to return only the DISTINCT values of the rounded amount of every payment in the PAYMENT table, after being multipled by a tax of 17.25% (the tax should be added to t…
3) Write a C++ program that calculates the average of measurements of Oak tree l
3) Write a C++ program that calculates the average of measurements of Oak tree leaves. The measurements are Follow the following requirements 1. Declare an array to hold the data …
3) Write a C++ program that outputs a table having four columns of temperature v
3) Write a C++ program that outputs a table having four columns of temperature values, ordered as follow: Celsius, Fahrenheit, Kelvin and Rankine. Use a while KELVIN CELSIUS FAHRE…
3) Write a JavaScript script that has subprograms nested three deep and in which
3) Write a JavaScript script that has subprograms nested three deep and in which each nested subprogram references variables defined in all of its enclosing subprograms. 4) Repeat…
3) Write a computer program that prompts the user for one number, n for the numb
3) Write a computer program that prompts the user for one number, n for the number of items in the array to sort, and create and sort 1000 arrays of this size timing the run to ge…
3) Write a program that indicates if a number input is a prime number or not. Th
3) Write a program that indicates if a number input is a prime number or not. The program should repeat this until the user enters 0 to exit. For example, the input of 17 should p…
3) Write a program that populates a java.util.Arraylist variable with 10 random
3) Write a program that populates a java.util.Arraylist variable with 10 random integers in [1, 20), asks the user to provide a value, and counts how many numbers are equal to the…
3) Write a program that presents the user a menu of four choices, \"Cirdle\",Isq
3) Write a program that presents the user a menu of four choices, "Cirdle",Isquare", "Rectangle", and "Exit" to calculate the area of one of these geometric objects. Once a choice…
3) Write a query to show the number of orders for each shipper. Your query shoul
3) Write a query to show the number of orders for each shipper. Your query should show shipper name and the count of orders with the shipper. 4) Write a query to show number of pr…
3) Write a shell script myFile which will output the total number of lines in th
3) Write a shell script myFile which will output the total number of lines in the file whose name will be given by the user. Also, it will read certain lines from the file and put…
3) Write a static method and a test program for a method called digitRange() tha
3) Write a static method and a test program for a method called digitRange() that takes an integer n as an argument and returns the largest difference between the individual digit…
3) Write context-free grammars for the following languages. a) 1 + 0, = {0, 1} c
3) Write context-free grammars for the following languages.    a) 1+0, = {0, 1} c) strings with either a’s and/or b’s only, or a’s and/or c’s only, in any order; strings may be of…
3) Write the overloaded operator > for a List class. A> B if A is longer than B.
3) Write the overloaded operator > for a List class. A> B if A is longer than B. You may choose to write thisfor eithre an array-based implementation or for a node-basedimpl…
3) You are given a 2D array as follows: 1 35 A=24 L7 9 2 Use MATLAB to find the
3) You are given a 2D array as follows: 1 35 A=24 L7 9 2 Use MATLAB to find the following (i.e., write an appropriate MATLAB statement for each): (a) What is the c (b) What is the…
3) You are tasked with implementing a NoSQL database for a Social Network websit
3) You are tasked with implementing a NoSQL database for a Social Network website. The website has a requirement to identify common friends/connections between given two members. …
3) [10 marks] Refer to following Figure 2.14 and Figure 16.3. This question is a
3) [10 marks] Refer to following Figure 2.14 and Figure 16.3. This question is about encapsulation, decapsulation, and protocols. Figure 2.14 illustrates that a TFTP Trivial File …
3) [5] True or False: i) --LREG= LNPDA (i.e., the set of languages accepted by n
3) [5] True or False: i) --LREG= LNPDA (i.e., the set of languages accepted by nondeterministic pushdown automata is the regular languages.) ii _Given an arbitrary context-free la…
3) [S pts] Newton\'s law of universal gravitation is given by Gm1m2 2 Where F: F
3) [S pts] Newton's law of universal gravitation is given by Gm1m2 2 Where F: Force of gravitational attraction G: universal gravitational constant 6.673 x 10-11 N m2/kg2 mi: mass…
3)(Java) The Binary search tree ADT is extended to include a b oolean method sim
3)(Java) The Binary search tree ADT is extended to include a boolean method similarTrees that receives references to two binary trees and determines whether the shapes of the tree…
3)In Fibonacci heaps, Prof. Bright suggests two rules: 1)allow k-children to be
3)In Fibonacci heaps, Prof. Bright suggests two rules: 1)allow k-children to be deleted at a node before requiring that a CASCADING-CUT occurs and 2)for every rank , instead of ju…
3, (20%) Consider the below RISC-V code snippet: Line I: lui 6, 0sDAOB Line 2: a
3, (20%) Consider the below RISC-V code snippet: Line I: lui 6, 0sDAOB Line 2: addi x6, x6,0x123 Line 3: sd x6, 0Xx0) Line 4: lb x6, 2(x0) Last name: First name: abc123: (1). (4%)…
3, (Chapter 4.4) In this exercise we examine in detail how an instruction is exe
3, (Chapter 4.4) In this exercise we examine in detail how an instruction is executed in a single-cycle datapath. Problems in this exercise refer to a clock cycle in which the pro…
3, 120 points) The class list shown below lements a list of integers using a dou
3, 120 points) The class list shown below lements a list of integers using a doubly linked list Bll the impl storage mechanism. Note that the keeps track of the number of nodes us…
3, A nucleotide sequence can be a long string made of characters A,I,G, and C. S
3, A nucleotide sequence can be a long string made of characters A,I,G, and C. Such strings can be made of tens of thousands of characters or even longer. An example is this: AGTT…
3, Do g problem. 3.64 For this exercise, we will t arguments aahine the code gen
3, Do g problem. 3.64 For this exercise, we will t arguments aahine the code generated by occ for and return values and a function prod typedet struet ( code generated by oce for …
3, Let x = [3 2 6 8]\' and y = [4 1 3 5]\"(NB. x and y should be column vectors)
3, Let x = [3 2 6 8]' and y = [4 1 3 5]"(NB. x and y should be column vectors). a. Add the sum of the elements in x to y b. Raise each element of x to the power specified by the c…
3, Solve forthe roots: x2 + 4-0 A math teacher needs to quiz students about solv
3, Solve forthe roots: x2 + 4-0 A math teacher needs to quiz students about solving the about cheating, so she wants to give each student a one with complex roots. In each case, t…
3, Using the following chart, write an if-esle-if statement that assigns.10,.15,
3, Using the following chart, write an if-esle-if statement that assigns.10,.15,or.20 to commission, depending on the value in sales. Sales Commission Rate -----------------------…
3, Using the following chart, write an if-esle-if statement that assigns.10,.15,
3, Using the following chart, write an if-esle-if statement that assigns.10,.15,or.20 to commission, depending on the value in sales. Sales Commission Rate -----------------------…
3, Variation on 9.4#5, #17] For the relation R represented by this directed grap
3, Variation on 9.4#5, #17] For the relation R represented by this directed graph. Write the matrix representing: (a) The relation R5 points] (b) The complement of R [5 points] (c…
3, where is the program code bumed (stored) itoin the 80517 c. Dymamic Random Ac
3, where is the program code bumed (stored) itoin the 80517 c. Dymamic Random Access Memory (DRAM) a. Random Access Memory (RAM) b. Flash Read-Only Memory (Flash ROM d. N/A 4. lf …
3, write a program called Dateconversion Java whose main method takes a date as
3, write a program called Dateconversion Java whose main method takes a date as an integer in the format MMDDYYYY from the user. The main will call a function input date conversio…
3,4 s. First, here\'s asimple implementation of the partitioning step. does two
3,4 s. First, here's asimple implementation of the partitioning step. does two scans of the amay and uses an additionalanray as temporary storage. template Kelaas T int partition …
3- ( Structure s ) Choose the best answer on the following questions: (I). Which
3- ( Structure s) Choose the best answer on the following questions: (I). Which of the following accesses a variable in structure b? A. b->var; B. b.var; C. *b-var; D. b>-va…
3- ( Structure s ) Choose the best answer on the following questions: (I). Which
3- ( Structure s) Choose the best answer on the following questions: (I). Which of the following accesses a variable in structure b? A. b->var; B. b.var; C. *b-var; D. b>-va…
3- ( Structure s) Choose the best answer on the following questions: (I). Which
3- ( Structure s) Choose the best answer on the following questions: (I). Which of the following accesses a variable in structure b? A. b->var; B. b.var; C. *b-var; D. b>-va…
3- (4 points) Answer the following questions based on the format of a TCP packet
3- (4 points) Answer the following questions based on the format of a TCP packet: a) How many bits are reserved for control information? b) How many bits is reserved for source ad…