Web development and programming
191828 questions • Page 3524 / 3837
____ 178. The selection of an algorithm and how it will be applied to an object’
____ 178. The selection of an algorithm and how it will be applied to an object’s attributes are ____ issues. a. programming c. testing b. coding d. implementation ____ 179. To st…
____ 21. Constructors have the same name as the ____. a. member methods c. class
____ 21. Constructors have the same name as the ____. a. member methods c. class b. data members d. package ____ 22. Which of the following is used to allocate memory for the inst…
____ 21. Which of the following statements has an error? a. int rent[4] = {250,
____ 21. Which of the following statements has an error? a. int rent[4] = {250, 375, 460, 600}; b. int rent[] = {250, 375, 460, 600}; c. int rent[4] = {250, 375}; d. int rent[4] =…
____ 26. What is wrong with the following GetName procedure? Sub GetName(ByVal s
____ 26. What is wrong with the following GetName procedure? Sub GetName(ByVal strName As String) strName = InputBox(“Enter your Name:”) End Sub a. The procedure is missing a Retu…
____ 45. Runlevel ____ shuts the system down. a. 0 c. 5 b. 1 d. 6 ____ 46. A(n)
____ 45. Runlevel ____ shuts the system down. a. 0 c. 5 b. 1 d. 6 ____ 46. A(n) ____ is a small application written specifically to be placed on the GNOME Panel. a. widget c. …
____ 64. Other names for operations defined in a class implementation section ar
____ 64. Other names for operations defined in a class implementation section are procedures, functions, services and methods. ____ 65. Every constructor must be declared with no …
____ 66. Windows Server 2003 uses which version of IIS? a. 3 c. 6 b. 5 d. 7 ____
____ 66. Windows Server 2003 uses which version of IIS? a. 3 c. 6 b. 5 d. 7 ____ 67. Which IIS feature allows the server to share Web-based files? a. WebDAV c. Kerberos b. Nam…
____ 83. In what section of the Apache configuration file would you alter the Do
____ 83. In what section of the Apache configuration file would you alter the DocumentRoot setting? a. Global Environment c. Virtual Hosts b. Main server configuration d. None o…
____ 86. After a value is returned from a called function, program control rever
____ 86. After a value is returned from a called function, program control reverts to the ____. a. compiler c. in-line function b. called function d. calling function ____ 87. The…
____ Enable the programmer to model objects that have attributes and behaviors o
____ Enable the programmer to model objects that have attributes and behaviors or operation. Generally, _____ calls are made in the reverse order of the corresponding constructor …
____ ICMP Match the following! A. Provides error detection/reporting and network
____ ICMP Match the following! A. Provides error detection/reporting and network management queries ____ DHCP ____ NAT B. Permits many hosts to share a few public IP addr…
____ feasibility assesses an information system\'s costs and benefits. a. Econom
____ feasibility assesses an information system's costs and benefits. a. Economic b. Technical c. Operational d. Scheduling ____ costs measure what an individual would miss by not…
____ is a form of software reuse in which new classes absorb the data and behavi
____ is a form of software reuse in which new classes absorb the data and behaviors of existing classes and embellish these classes with new capabilities. A function that is not d…
____ is the difference in electric potential between two points. It is measured
____ is the difference in electric potential between two points. It is measured in ______ (V). ________ is a measure of the flow of charged particles. It is measured in ______ (A)…
____ is the transfer of information systems development, operation, or maintenan
____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis. P…
____1. Which of the following statements is true ? a. Extensible Markup Language
____1. Which of the following statements is true? a. Extensible Markup Language (XML) is a natural way to express GUIs. b. XML is human- and computer-readable text and, in the con…
____7. The most common backup schedule is a daily on-site, incremental or differ
____7. The most common backup schedule is a daily on-site, incremental or differential backup, with a weekly off-site full backup. ____ 8. Remote journaling (RJ) is the transfer o…
____Decision include a structured aspect that benefits from information retrieva
____Decision include a structured aspect that benefits from information retrieval, analytical models, and information systems technology. a. Ad hoe b. Semi structured c. Unstructu…
_____ C# _____ Question is too long, so I created links to ask as seperate quest
_____C#_____ Question is too long, so I created links to ask as seperate questions https://www.chegg.com/homework-help/questions-and-answers/c-program-display-two-options-beginnin…
_____ The C Shell executes this script file locate in your home directory when y
_____ The C Shell executes this script file locate in your home directory when you exit your login session. a. .login b. logout c. .logout …
_____ The wildcard in a WHERE clause is useful when? A. An exact match is necess
_____ The wildcard in a WHERE clause is useful when? A. An exact match is necessary in a SELECT statement. B. An exact match is not possible in a CREATE statement. C. An exact mat…
_____ and _____ developed the TCP and IP protocols and are considered by some to
_____ and _____ developed the TCP and IP protocols and are considered by some to be the "Fathers of the internet". A. Al Gore / Bob Dole B. Bob Metcalfe /Leonard Kleinrock C. Clau…
_____ arguments are passed to a function. Select one: a. Actual b. Formal c. Ret
_____ arguments are passed to a function. Select one: a. Actual b. Formal c. Return d. Value-returning The random number generator in C++ is a built-in value-returning function na…
_____ feasibility assesses an information system\'s costs and benefits. a. Econo
_____ feasibility assesses an information system's costs and benefits. a. Economic c. Operational b. Technical d. Scheduling ____ costs measure what an individual would miss by no…
_____ refers to the combining of data and code into a single object. a) Data hid
_____ refers to the combining of data and code into a single object. a) Data hiding b) Abstraction c) Object d) Encapsulation Another term for an object of class is _____. a) acce…
_____ was the first commercially successful computer. a. ENIAC b. Colossus c. Z3
_____ was the first commercially successful computer. a. ENIAC b. Colossus c. Z3 d. UNIVAC _____ -generation computers became possible by the development of integrated circuits. a…
_____The UNIX command in the C shell that will display the list of history event
_____The UNIX command in the C shell that will display the list of history events or a command history. a. alias b. history c. printenv d…
_____The UNIX command that is a batch (non-interactive) editor. a. sed b. awk c.
_____The UNIX command that is a batch (non-interactive) editor. a. sed b. awk c. grep d. vi _____The UNIX command to display a files classi…
_____The UNIX command to reduce the size of one or more files. a. cc b. uncompre
_____The UNIX command to reduce the size of one or more files. a. cc b. uncompress c. compress d. cpio _____The UNIX command to display a calendar for …
______ A 32 bit immediate value cannot be placed is a register by a single instr
______ A 32 bit immediate value cannot be placed is a register by a single instruction. _________A32 bet value in memory cannot be loaded register by a single MIPS instruction. __…
______ Applications provide optimal information when they encompass support, mar
______ Applications provide optimal information when they encompass support, marketing, and sales. a. SCM b. CRM c. Supply chain d. all of the above Which type of security measure…
______ data model ______ descriptive attributes ______ primary key ______ logica
______ data model ______ descriptive attributes ______ primary key ______ logical data schema ______ total participate of E for relationship R ______ identifying relationship ____…
______ is a statistical function a. RATE b. DDB c. FORECAST d. RAND The function
______ is a statistical function a. RATE b. DDB c. FORECAST d. RAND The function IRR: a. approximates the internal rate of return for a series of cash flows b. returns an error c.…
______ loops are especially useful when dealing with two-dimensional arrays beca
______ loops are especially useful when dealing with two-dimensional arrays because they allow the programmer to designate and cycle through each element easily. a) Nested b) Sing…
______ model provides guidance on developing attack models. Software testing mod
______ model provides guidance on developing attack models. Software testing model Business continuity model Microsoft's STRIDE model Attack trees Which of the following is consid…
_______ Feasibility concerns a project\'s financial risk. Technical Economic Org
_______ Feasibility concerns a project's financial risk. Technical Economic Organizational Behavioral Time IT architecture focuses only on the technical aspects of information res…
_______ is a finance funtion. a. ABS b. DDB c. VARP d. NPER When creating a data
_______ is a finance funtion. a. ABS b. DDB c. VARP d. NPER When creating a database, Excel will: a. duplicate the values in the first entry for each entry b. automatically format…
_______ is a group of networks and routers under the authority of a single admin
_______ is a group of networks and routers under the authority of a single administration. An autonomous system An area A domain A region Routing inside an autonomous system is re…
_______ provides the basic attributes and behaviors of a windowa title bar: a ti
_______ provides the basic attributes and behaviors of a windowa title bar: a title bar at the top of the window, and buttons to minimize, maximize and close the window. Select on…
________ added lo assertions in Badboy actually test for specific content on a p
________ added lo assertions in Badboy actually test for specific content on a page and provide either a pass or fail for the test. In order to use JFrecChart within a JSP applica…
________ attempts to evaluate a string representing any javascript literals or v
________ attempts to evaluate a string representing any javascript literals or variables, converting it to a number. a) eval b) parseFloat c) parseInt d) None Which is not an attr…
________ display information at the top of every page, and appear only when you
________ display information at the top of every page, and appear only when you print the form by default. a. Page headers b. Form footers c. Form headers d. Page footers The____s…
________ integrity can prevent the deletion of a record if the record has a prim
________ integrity can prevent the deletion of a record if the record has a primary key that matches foreign keys in another table. a. Referential …
________ is a reference type. A class type An interface type An array type A pri
________ is a reference type. A class type An interface type An array type A primitive type 2, An interface can extend any number of interfaces using the extends keyword. true fal…
________ is a type of model that is used to find a good enough solution, or the
________ is a type of model that is used to find a good enough solution, or the best solution among alternatives, using experimentation. Explain why you chose your word to this …
_________ Can be used as pointers. Punctuation marks Array names C++ string obje
_________ Can be used as pointers. Punctuation marks Array names C++ string objects Class objects C++ requires that a copy constructor's parameter be a(n) _. reference to an objec…
_________. At the processor technology level, the main disadvantage of using an
_________. At the processor technology level, the main disadvantage of using an ASIP over an SPP is its speed. _________. In an ASIP, breaking the control unit FSM into multi-cycl…
__________ multiplexing is a good choice for connecting a number of lower-speed
__________ multiplexing is a good choice for connecting a number of lower-speed devices that do not transmit data on a continuous basis to a Synchronous time division Statistical …
__________(1) Any moving particle in an external magnetic field experiences a ma
__________(1) Any moving particle in an external magnetic field experiences a magnetic force. __________(2) A current carrying straight conductor always experiences a force in an …
___________ Select the correct syntax to declare an array named DecFinalgrades w
___________ Select the correct syntax to declare an array named DecFinalgrades with 31 Decimal elements. Dim DecFinalgrades (30) as Decimal Dim DecFinalgrades (29) as Decimal Dim …
Subject
Web development and programming
Use Browse or pick another subject.