Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 3528 / 3837

a) Alice, Bob, and Carol go to a Chinese restaurant at a busy time of the day. T
a) Alice, Bob, and Carol go to a Chinese restaurant at a busy time of the day. The waiter apologetically explains that the restaurant can provide only two pairs of chopsticks (for…
a) All conventional strings terminate with semicolon (;) b) All inputs to comput
a) All conventional strings terminate with semicolon (;) b) All inputs to computer system are dealt in the form of memory reference c) Address pointer can be declared as double va…
a) An internet service provider has three different subscription packages for it
a) An internet service provider has three different subscription packages for its customers: Package A: For $9.95 per month, 10 hours of access are provided. Additional hours are …
a) Assume a given computer x executes three different programs A, B& C in the sa
a)     Assume a given computer x executes three different programs A, B& C in the same amount of time. Is MIPS be the same? If theanswer is yes, is MIPS always the same for a …
a) Assume for a particular code and computer system, the cache hit ratio (fracti
a) Assume for a particular code and computer system, the cache hit ratio (fraction of memory references satisfied by cache) is .80, time required to access a word in cache is 15 n…
a) Assume that the class \"DictionaryEntry\" is defined as follows: class Dictio
a) Assume that the class "DictionaryEntry" is defined as follows: class DictionaryEntry { string word; string definition; public: DictionaryEntry (string word, string definition);…
a) Assume you are using ‘vi’ and are in insert mode. Describe what you need to d
a) Assume you are using ‘vi’ and are in insert mode. Describe what you need to do to save the changes you’ve made and quit the editor (assuming that the file has been saved previo…
a) Based on what the Federal Information Processing Standard 199 (FIPS-199) requ
a) Based on what the Federal Information Processing Standard 199 (FIPS-199) requires information owners to classify information and information systems? Provide a detailed answer.…
a) Based on what the Federal Information Processing Standard 199 (FIPS-199) requ
a) Based on what the Federal Information Processing Standard 199 (FIPS-199) requires information owners to classify information and information systems? Provide a detailed answer.…
a) Based on what the Federal Information Processing Standard 199 (FIPS-199) requ
a)    Based on what the Federal Information Processing Standard 199 (FIPS-199) requires information owners to classify information and information systems? Provide a detailed answ…
a) Bill suggested that he can implement a queue ADT using a priority queue and a
a) Bill suggested that he can implement a queue ADT using a priority queue and a constant amount of additional space. Recall that a queue supports enqueue and dequeue operations, …
a) Bresenham’salogorithm b) Midpointalgorithm c) Both (a) and(b) d) None of thea
a) Bresenham’salogorithm b) Midpointalgorithm c) Both (a) and(b) d) None of theabove Question # 3: A circle drawn on the screenappears to be elliptical a) Screen has arectangular …
a) Briefly explain how low coupling and high cohesion enables modular design. b)
a) Briefly explain how low coupling and high cohesion enables modular design. b) In the class we discussed three basic approaches in Integration testing: Top down, bottom up and s…
a) By using MySQL queries , JOIN the following tables to return UNIFIED_TABLE b)
a) By using MySQL queries, JOIN the following tables to return UNIFIED_TABLE b) Create a view named PURCHASE_INFO that has the same content as the return from UNIFIED_TABLE ****An…
a) Calculate the magnitude of the electric field, which is uniform, between the
a) Calculate the magnitude of the electric field, which is uniform, between the two plates, E b) and the force acting on the charged ink drop by the field, F, and its acceleration…
a) Calculate the number of times the following loop executes for i-1 to 2n for j
a) Calculate the number of times the following loop executes for i-1 to 2n for j to 2n-1 do something without branching nextj next i (3 marks) b) Assuming that n is the input size…
a) Compute and display the nth number in the Fibonacci sequence. You must use a
a) Compute and display the nth number in the Fibonacci sequence. You must use a for loop in this solution. (The Fibonacci sequence is explained below.) b) Compute and display the …
a) Compute the Cyclomatic complexity of the method. Full path coverage testing r
a) Compute the Cyclomatic complexity of the method. Full path coverage testing requires that every possible path through the code be tested at least once. For the code fragment be…
a) Compute the Gini index for the overall collection of the training examples. b
a) Compute the Gini index for the overall collection of the training examples. b) Compute the Gini index for the Customer ID attribute. c) Compute the Gini index for the Gender at…
a) Computer programs can carry out operations on numbers called floating point n
a) Computer programs can carry out operations on numbers called floating point numbers. These numbers are similar to real numbers used in Mathematics. The numbers used in mathemat…
a) Computer programs can carry out operations on numbers called floating point n
a) Computer programs can carry out operations on numbers called floating point numbers. These numbers are similar to real numbers used in Mathematics. The numbers used in mathemat…
a) Computer programs can carry out operations on numbers called floating point n
a) Computer programs can carry out operations on numbers called floating point numbers. These numbers are similar to real numbers used in Mathematics. The numbers used in mathemat…
a) Consider a network in which packets are delivered reliable across each link.
a) Consider a network in which packets are delivered reliable across each link. That is, for each pair of adjacent nodes A - B, the datalink layer has an ARQ protocol (such as sto…
a) Consider a network in which packets are delivered reliable across each link.
a) Consider a network in which packets are delivered reliable across each link. That is, for each pair of adjacent nodes A - B, the datalink layer has an ARQ protocol (such as sto…
a) Consider a processor implemented as a six stage pipeline. Suppose that the pi
a) Consider a processor implemented as a six stage pipeline. Suppose that the pipeline is initially empty, what is the number of cycles required to perform a sequence of 40 instru…
a) Consider a relation R=(A,B,C,D) with the following instance: A B C D 1 1 2 3
a) Consider a relation R=(A,B,C,D) with the following instance: A B C D 1 1 2 3 1 2 2 3 1 3 2 3 2 4 5 6 3 6 7 8       Which of the following function dependencies are satisfied? W…
a) Consider a test and diagnostic system, for truck engines to be used in a mech
a) Consider a test and diagnostic system, for truck engines to be used in a mechanical workshop. It must: monitor digital and analogue inputs from the truck, » generate complicate…
a) Consider the coins 1, 5, 10, 25 and an integer x. We want to find the least n
a) Consider the coins 1, 5, 10, 25 and an integer x. We want to find the least number of coins of the type above whose sum is x. For example for x = 67, the solution 25, 25, 10, 5…
a) Consider the following file called coords.txt: x1 y1 x2 y2 0.0 0.0 0.4 1.0 0.
a) Consider the following file called coords.txt: x1 y1 x2 y2 0.0 0.0 0.4 1.0 0.5 0.1 -0.25 0.9 0.75 0.4 -2.5 2.2 1.0 1.3 -1.0 4.2 Each field in this file is separated by a tab an…
a) Consider the following narrative and answer the question that follows; A bank
a) Consider the following narrative and answer the question that follows; A bank has a system in which there are 14 tellers, with the tellers mandated as follows: Two of the telle…
a) Consider the following relational database where the primary keys are underli
a) Consider the following relational database where the primary keys are underlined: person(person name, street, city) // records about all people works(person name, company name,…
a) Consider the parity bit protocol with the p\'s, q\'s, and the additional r bi
a) Consider the parity bit protocol with the p's, q's, and the additional r bit. What is the hamming distance of this protocol? Briefly explain why b) Assume we have a CRC protoco…
a) Consider the problem of testing whether a turing machine M on an input w ever
a) Consider the problem of testing whether a turing machine M on an input w ever attempts to move its head left when its head is on the left-most tape cell. Formulate this problem…
a) Construct a 4-bit up/down counter that uses a Gray-code counting sequence b)
a) Construct a 4-bit up/down counter that uses a Gray-code counting sequence b) Repeat Problem 6-9 by comparing the numbers of changing inputs and outputs on the Gray-code counter…
a) Construct a class definition that can be used to represent an employee of a c
a) Construct a class definition that can be used to represent an employee of a company. Each employee is defined by: Integer ID number. A string with the name and family name (use…
a) Convert the following 2 numbers to binary, octal and hex. 2.875, 0.1796875 Wh
a) Convert the following 2 numbers to binary, octal and hex.    2.875, 0.1796875 When done, convert the following to a float representation by the definition in class. In other wo…
a) Create a Class: Book Description: This class represents a book that will be p
a) Create a Class: Book Description: This class represents a book that will be processed by the application. Instance variables: private int numPages; private String author; priva…
a) Create a class ReadingMaterial. b) Create a subclass of ReadingMaterial calle
a) Create a class ReadingMaterial. b) Create a subclass of ReadingMaterial called Newspaper - should call superclass constructors. c) Create a subclass of ReadingMaterial called M…
a) Create a class Student that has a constructor that prints “Hello, I am a stud
a) Create a class Student that has a constructor that prints “Hello, I am a student”. b) In the class Student put a destructor that prints “Good bye, Student out”. c) Create a cla…
a) Create a class named Numbers whose Main( ) method holds two integer variables
a) Create a class named Numbers whose Main( ) method holds two integer variables. Assign values to the variables. Within the class, create two methods, Sum( ) and Difference( ), t…
a) Create a matching table on the database server for each of the relations. In
a) Create a matching table on the database server for each of the relations. In each case, consider which data type makes sense for which column. Remember the specification and th…
a) Create a program that will ask the user for a positive integer and then will
a) Create a program that will ask the user for a positive integer and then will use a for loop to display the positive integers in ascending order starting at 1 ending at the give…
a) Create a recurrence relation T(n) describing the time taken by the countBST a
a) Create a recurrence relation T(n) describing the time taken by the countBST algorithm called on a BST with n nodes. The structure of the BST is unknown. Assume for the recursiv…
a) Create a trigger called membership_balance_updates that will capture any upda
a) Create a trigger called membership_balance_updates that will capture any updates made to the balance column in membership. The trigger should only capture those transactions in…
a) Create a trigger called membership_balance_updates that will capture any upda
a) Create a trigger called membership_balance_updates that will capture any updates made to the balance column in membership. The trigger should only capture those transactions in…
a) Create a truth table according to these specifications: There are 4 input bit
a) Create a truth table according to these specifications: There are 4 input bits, x3, x2, x1, x0, and 3 output bits, s2, s1, s0. The 3-bit output is the largest number of consecu…
a) Create class Movie (i) Data member: title (string), year (int), rate (float)
a) Create class Movie (i) Data member: title (string), year (int), rate (float) (ii) Public member functions: a. void set_movie(…) which sets the title and year of the movie objec…
a) Create matrix B wich has 5 rows and 5 columns using magic function. Write b)
a) Create matrix B wich has 5 rows and 5 columns using magic function. Write b) Write a single MATLAB statement to assign the elements of the last column to c) With the aid of fin…
a) Create the symbol table for the program. You may not need to use all rows. Yo
a) Create the symbol table for the program. You may not need to use all rows. You can add more rows if needed. Symbol Address b) Load this program and run it in PennSim. What is t…
a) DB Log in RAM captures commit and flushed to disk DB log b) Commit issued c)
a) DB Log in RAM captures commit and flushed to disk DB log b) Commit issued c) Application: Update SQL d) DB Log in RAM flushed to DB LOG on disk e Retrieve Table able blocks fro…