Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 3511 / 3837

[18 Points ] Assume we are running code on a 6-bit machine using two\'s compleme
[18 Points ] Assume we are running code on a 6-bit machine using two's complement arithmetic for signed integers. Also assume that TMax is the maximum integer, TMin is the minimum…
[18 marks] (Inheritance) Design a class named Person and its two subclasses name
[18 marks] (Inheritance) Design a class named Person and its two subclasses named Student and Employee. A person has a name, an address (a String type), a phone number and an emai…
[1] A special category of private information that is becoming increasingly impo
[1] A special category of private information that is becoming increasingly important today is:       _________________________________________. [2] A security policy principle (c…
[1] Consider the following table: Shipment. Shipment(ShipmentId, ProductId, Quan
[1] Consider the following table: Shipment. Shipment(ShipmentId, ProductId, Quantity, SourceCity, DestinationCity, Distance) ShipmentId is an unique identifier for a shipment of a…
[1] Each policy for a classification of information should describe: ___________
[1] Each policy for a classification of information should describe:            _______________________________     _______________________________    ____________________________…
[1] Find the number of comparisons needed when we apply Selection Sort to sort 1
      [1] Find the number of comparisons needed when we apply Selection Sort to sort 100             distinct integers.       [2] Find the number of comparisons needed when we app…
[1] In this milestone, implement the bodies of the following methods within the
[1] In this milestone, implement the bodies of the following methods within the MineSweeper class. The following are methods that should be used: The algorithm for the main method…
[1] Java Program : Suppose that we have an array called list initialized as foll
[1] Java Program : Suppose that we have an array called list initialized as follows: (4 pts) int[] list = {-2, 8, 13, 22, 25, 25, 38, 42, 51, 103}; This would construct the follow…
[1] Suppose that we have an array called list initialized as follows: (3 pts) in
[1] Suppose that we have an array called list initialized as follows: (3 pts) int[] list = {-2, 8, 13, 22, 25, 25, 38, 42, 51, 103}; This would construct the following array:   [0…
[1] Utilizing the internet, locate three UNIQUE articles that answer the followi
[1] Utilizing the internet, locate three UNIQUE articles that answer the following questions. What does the technology do for the company? [2] List the title(s) and web link of th…
[1] What are the 9 essential tasks of system administrator? 1. 2. 3. 4. 5. 6. 7.
[1] What are the 9 essential tasks of system administrator? 1. 2. 3. 4. 5. 6. 7. 8. 9. [2] User Account: 1. Write a command that creates following user account with expiration dat…
[1] Write a program that converts a temperature from Fahrenheit to Celsius. The
[1] Write a program that converts a temperature from Fahrenheit to Celsius. The user inputs a temperature in degrees Fahrenheit, and the program prints out the temperature in degr…
[2 3 81 100 120 130 140 150 160 170] Draw a box trace of the function BinarySear
[2 3 81 100 120 130 140 150 160 170] Draw a box trace of the function BinarySearch, Shown below.The initial call is BinarySearch (A,0,9,81,Index), where the arrayA contain the val…
[2 pts] Compare the following two code segments. Do you think they are equivalen
[2 pts] Compare the following two code segments. Do you think they are equivalent in performance? Specify how you investigate this problem, and show the results of your experiment…
[20 points Collaborative Problem: As some of you know well, and others of you ma
[20 points Collaborative Problem: As some of you know well, and others of you may be interested to learn, a number of languages (including Chinese and Japanese) are written withou…
[20 points] An nx n magic square, where n is odd and between 1 and 99, is an arr
[20 points] An nx n magic square, where n is odd and between 1 and 99, is an arrangement of numbers 1, 2, 3, .., n in such a way that sum of rows, columns, and diagonals are all t…
[20 points] Given a set of n distinct numbers, we wish to find the k largest in
[20 points] Given a set of n distinct numbers, we wish to find the k largest in sorted order using a comparison-based algorithm. Give an algorithm that implements each of the foll…
[20 points] Write a fraction calculator program that adds, subtracts, multiplies
[20 points] Write a fraction calculator program that adds, subtracts, multiplies, and di vides fractions. Your program should check for the division by 0, have and use the fol- lo…
[20 points] Write and debug a MIPS program that performs the following operation
[20 points] Write and debug a MIPS program that performs the following operations: • Prompt for and input two integers “a” and “b” using syscalls • Display one of the following st…
[20 points] [SHORT QUESTIONS] a. [5 points] When an interrupt occurs, the CPU (h
[20 points] [SHORT QUESTIONS] a. [5 points] When an interrupt occurs, the CPU (hardware) must be able to perform several operations atomically (i.e., as an indivisible step of ope…
[20 pts] 3- Consider the following AVR assembly. Assume the data memory location
[20 pts] 3- Consider the following AVR assembly. Assume the data memory locations $0100 through S0107 initially have the following values in hexadecimal: Data Memory Address conte…
[21 marks] Consider a computer with a byte-addressable memory. A 40-bit memory a
[21 marks] Consider a computer with a byte-addressable memory. A 40-bit memory address is divided as follows for cache processing. First, the 8 low-order bits are chopped off to e…
[25%] Identifier names in a hypothetical language may contain letters (A - Z and
[25%] Identifier names in a hypothetical language may contain letters (A - Z and a - z), digits (0 - 9), and special symbols ($, _ , and #). Additionally, any acceptable identifie…
[2] Java : Please write a BankAccount class, which maintains a pair of account i
[2] Java : Please write a BankAccount class, which maintains a pair of account information (name, balance) of all the customers. You also need to build the main class such as Bank…
[2pts] Complete the following time sequence table describing the output Q of the
[2pts] Complete the following time sequence table describing the output Q of the JK flip-flop, at time t+1, with respect to its inputs, J and K, at time t. (Note that this table f…
[3 marks each] Each part of this problem gives a pseudo-code fragment with an if
[3 marks each] Each part of this problem gives a pseudo-code fragment with an if-structure, and some assumptions about its variables. Give an assembly code fragment that is equiva…
[3 pts] Let x = [x1 , x2, , xN] and y = [yi, y2, , yN] be two equal length vecto
[3 pts] Let x = [x1 , x2, , xN] and y = [yi, y2, , yN] be two equal length vectors. Write down the matlab statement that allows you to form the product vector z [xl'yl, x2*y2,... …
[30 marks] Use the linked list pictured below to answer the following questions:
[30 marks] Use the linked list pictured below to answer the following questions: 2000 1000 1600 istDat 1000 1600 17 NULL .inio .next list ptr2 a) Write a single line of code to te…
[30 points] You have been asked to evaluate server performance, so you decide to
[30 points] You have been asked to evaluate server performance, so you decide to run a benchmark program that finds out memory operations currently take 45% of execution time. You…
[32] Write a program which accepts a filename as a command-line argument [-32].
[32] Write a program which accepts a filename as a command-line argument [-32]. It should then ask for a password via stdin (but it should not visible when entered; use getpass fo…
[35 marks] a) The pointer based StackType class is to be extended with a method
[35 marks] a) The pointer based StackType class is to be extended with a method called Replaceltem that replaces each copy of an item by another item. A reference to the stack obj…
[35 points] In this problem, we study the popular card game Blackjack, also know
[35 points] In this problem, we study the popular card game Blackjack, also known as twenty- one. In our simplfied and modified version of the game, the dealer draws cards from an…
[35 pts] Function addMat takes in 2 square matrices (matA and matB) of size n x
[35 pts] Function addMat takes in 2 square matrices (matA and matB) of size n x n. Complete the addMat function with the following specifications d. i. Allocate annxn integer matr…
[3] [40 pts] Convert a four-bit binary number to decimal. (40 pts - 20 pts for f
[3] [40 pts] Convert a four-bit binary number to decimal. (40 pts - 20 pts for flowchart, 20 for code) Draw a flowchart and write an LC-3 assembly language program that reads a fo…
[4): Gemerate detoset A and show the fErst few volues Adata, A colors-generate A
[4): Gemerate detoset A and show the fErst few volues Adata, A colors-generate A() ut[4): array(L(-9.98626109-0.98620189 [ ,8599553 , .8599553 ], 8.22678625,.22878625 1.35911878. …
[40 points] Answer the following questions briefly: Identify and provide a brief
[40 points] Answer the following questions briefly: Identify and provide a brief description of at three ways in which computer networks contribute to the success of businesses. B…
[40] Implement a guessing game in MIPS, where you pick a number between 1 and 10
[40] Implement a guessing game in MIPS, where you pick a number between 1 and 100, and the computer tries to guess your number. After each guess, you should specify whether your s…
[40] Implement a guessing game in MIPS, where you pick a number between 1 and 10
[40] Implement a guessing game in MIPS, where you pick a number between 1 and 100, and the computer tries to guess your number. After each guess, you should specify whether your s…
[4] Please find all the candidate keys. [5] Choose a primary key for above table
[4] Please find all the candidate keys. [5] Choose a primary key for above table. [6] Find all the functional dependencies. And identify the dependency type (i.e. primary key, par…
[5 marks] One failing of an encryption system occurs if we never let the encrypt
[5 marks] One failing of an encryption system occurs if we never let the encrypted value of a letter be the same as the original, especially if a letter always encodes to the same…
[5 pts] Write the function studentGrades(gradeList) that takes a nested list wit
[5 pts] Write the function studentGrades(gradeList) that takes a nested list with the following structure: First list is always a descriptive header. -Subsequent lists hold all th…
[50 p.] Write a Java program (Lab06B_Q2_lastname.java) that inputs a file name f
[50 p.] Write a Java program (Lab06B_Q2_lastname.java) that inputs a file name from user, reads month names from the file and outputs how many days are in each month. Write a stat…
[5] The set cover problem is as follows: given a set of subsets S 1 ,...,S m of
[5] The set cover problem is as follows: given a set of subsets S1,...,Sm of the universal set U = {1, ..., n}, find the smallest subset of subsets T ? S such that ?ti ?T ti = U .…
[6 points] Write a C++ function to determine if two binary trees are identical w
[6 points] Write a C++ function to determine if two binary trees are identical when the ordering of the sub-trees for a node is ignored. For example, if a tree has root node with …
[6.7c] Given the timing diagram and description below: What is the time to compl
[6.7c] Given the timing diagram and description below: What is the time to complete an operation if the clock cycle time is 30 ns? [6.7b] The timing diagram below illustrates a sy…
[6.7e] Given the timing diagram and description below: What is the time to compl
[6.7e] Given the timing diagram and description below: What is the time to complete an operation if the clock cycle time is 10 ns? The timing diagram below illustrates a system in…
[70 points] Write an assembly program to compute the nth number in the Fibonacci
[70 points] Write an assembly program to compute the nth number in the Fibonacci series. The first and second Fibonacci numbers are 0 and 1, respectively. Every subsequent Fibonac…
[8 7. A canadian farmer has a field in which lives a herd of n tibetan yaks. The
[8 7. A canadian farmer has a field in which lives a herd of n tibetan yaks. The farmer, having drunk too much raksi1 starts believing that the yaks are gossiping about him. He th…
[8 points] A digital computer has a memory unit with 24 bits per word. The instr
[8 points] A digital computer has a memory unit with 24 bits per word. The instruction set consists of 135 different operations. All instructions have an operation code part (opco…
[85%) you will be writing six classes which implement a hierarchy of classes. Th
[85%) you will be writing six classes which implement a hierarchy of classes. The classes all have to do with motor vehicles I. A MotorVehicle has several attributes: make, model,…