Web development and programming
191828 questions • Page 3536 / 3837
a. Explain how using the conditional GET method and web caching can improve the
a. Explain how using the conditional GET method and web caching can improve the response time for HTTP requests. b. To emphasize the importance of web caching, consider the follow…
a. Explain why interrupts have overheads. c. If interrupts introduce a 50ns over
a. Explain why interrupts have overheads. c. If interrupts introduce a 50ns overhead and the interrupt handler itself takes 250ns to execute, and you are again printing 250 charac…
a. Extend the definition of the class newString as follows: i. Overload the oper
a. Extend the definition of the class newString as follows: i. Overload the operators + and += to perform the string concatenation operations. ii. Add the functi…
a. Fill in the units? (4 pts) 10 seconds (answer given) 10 seconds 210 Bytes 230
a. Fill in the units? (4 pts) 10 seconds (answer given) 10 seconds 210 Bytes 230 Bytes 10 Hz ms b. Period or frequency (1 pt) How many positive edges of a 1 MHz clock will occur i…
a. Find the 32-bit and 64-bit 2’s complement, 1’s complement and sign-magnitude
a. Find the 32-bit and 64-bit 2’s complement, 1’s complement and sign-magnitude representations of the decimal value: 32767. b. Find the 32-bit and 64-bit 2’s complement, 1’s comp…
a. Find theaverage and standard deviation of the round-trip delays at each ofthe
a. Find theaverage and standard deviation of the round-trip delays at each ofthe three hours. b. Find the number ofrouters in the path at each of the three hours. Did the p…
a. First, solve the following problem using pen and paper. That is, predict the
a. First, solve the following problem using pen and paper. That is, predict the results and write them down on paper. You may find it helpful to use Excel. Scan your work in PDF f…
a. For small pages, how many different level 2 page tables are possible? Do not
a. For small pages, how many different level 2 page tables are possible? Do not provide the actual numeric answer, provide the formula. b. In an L2 table, how many small pages can…
a. Function main_teleport calls the function fc_input, receiving and sending par
a. Function main_teleport calls the function fc_input, receiving and sending parameter to this function if needed. b. Function fc_input asks for user to type how many passengers a…
a. Given one 2-dimensional array (5X3) and one 1-dimensional array(3X1), calcula
a. Given one 2-dimensional array (5X3) and one 1-dimensional array(3X1), calculate a third array (5X1) using: Cij =sum(Aik*Bkj) This is matrixmultiplication. Written out l…
a. Given the IntListElement class below write a sequence of statements (a progra
a. Given the IntListElement class below write a sequence of statements (a program fragment) that would create a variable of type IntListElement named listA that refers to a list w…
a. Haskell is a strict functional language b. Haskell is a pure functional langu
a. Haskell is a strict functional language b. Haskell is a pure functional language c. Haskell is a non-strict functional languag…
a. How did Pine Valley Furniture go about developing its information systems? Wh
a. How did Pine Valley Furniture go about developing its information systems? Why do you think the company chose this option? What other options were available? b. One option avai…
a. How does the way computer engineers think about computer architecture and imp
a. How does the way computer engineers think about computer architecture and implementation relate to pianos? Specifically, how are the concepts of architecture and implementation…
a. How long does it take computer A to receive acknowledgement for a packet? Ass
a.How long does it take computer A to receive acknowledgement for a packet? Assume the speed of light for signal propagation and neglect computer B processing time. b.How long doe…
a. How many byte are allocated for each of the arrays? _____ char num_days[9]; _
a. How many byte are allocated for each of the arrays? _____ char num_days[9]; _____ signed int num_months[13]; _____ unsigned int my_dates[100] = {5, 56, 7, 9}; _____ char my_str…
a. How many students were enrolled in section 2714 during semester I-2008? b. Ho
a. How many students were enrolled in section 2714 during semester I-2008? b. How many students were enrolled in ISM 3113 during semester I-2008? STUDENT (StudentiD, StudentName) …
a. How many students were enrolled in section 2714 during semester I-2008? b. Ho
a. How many students were enrolled in section 2714 during semester I-2008? b. How many students were enrolled in ISM 3113 during semester I-2008? STUDENT (StudentiD, StudentName) …
a. Identify and list all functional dependencies (both partial dependencies and
a. Identify and list all functional dependencies (both partial dependencies and transitive dependencies) and provide your justifications or assumptions for the dependencies (15 po…
a. If you wanted to explicitly include a double-quotation-mark in your string wh
a. If you wanted to explicitly include a double-quotation-mark in your string what would you have to type? For example how would you output: I said "hello" fool! b. what is the va…
a. Imagine that you have been asked to propose a strategy for tracking competito
a. Imagine that you have been asked to propose a strategy for tracking competitors in an orienteering race across Dartmoor. What location determining approach would be most approp…
a. Implement MC5 ExoProtect Employees’ Computers Database depicted by the relati
a. Implement MC5 ExoProtect Employees’ Computers Database depicted by the relational schema that you created in Database Project Part 2. i. Write CREATE TABLE statements to create…
a. Implement a function create_permutation (n) that creates and returns a list c
a. Implement a function create_permutation (n) that creates and returns a list containing a random permutation of the numbers: 0, 1, 2, ..., (n-1) For example, one call to create_…
a. In Programming Exercise 1 Chapter 1, we defined a class romanType to implemen
a. In Programming Exercise 1 Chapter 1, we defined a class romanType to implement Roman numerals in a program. In that exercise, we also implemented a function, romanToDecimal, to…
a. In an _____ scan, the optimizer determines it is efficient to use the index s
a. In an _____ scan, the optimizer determines it is efficient to use the index structure to retrieve multiple rows required by the query. b. A Bitmap index is composed of several …
a. In chapter 4 you created a Die class that you can use to instantiate objects
a. In chapter 4 you created a Die class that you can use to instantiate objects that hold one of six randomly selected values. Modify this class so its value field is protected in…
a. In java, Array entries are auto-initialized to 0.0 when creating an array of
a. In java, Array entries are auto-initialized to 0.0 when creating an array of type double [ b· A. j ava file can contain the definition of more than one static method, but each …
a. In the constructor of a class, you use the _____________________ keyword to r
a. In the constructor of a class, you use the _____________________ keyword to refer to the instance variables. b. When using a try/catch block around a call to Integer.parseInt t…
a. In the game search tree of Figure 2, indicate what nodes will be pruned using
a. In the game search tree of Figure 2, indicate what nodes will be pruned using alpha-beta search, and what the estimated utility values are for the rest of the nodes. Assume tha…
a. Include a member function named gcd() in the Fractions class constructed for
a. Include a member function named gcd() in the Fractions class constructed for Exercise 5a that reduces a fraction to its lowest common terms, such as reducing the fraction 2/4 t…
a. Let G = (V, E) be an undirected graph. Using the definition of a matroid, sho
a. Let G = (V, E) be an undirected graph. Using the definition of a matroid, show that (E,l) is a matroid, where A ?l if and only if A is an acyclic subset of E.
a. Let’s change the name of E: to be Local Disk E:. In the upper right pane, rig
a. Let’s change the name of E: to be Local Disk E:. In the upper right pane, right click on the new E: drive listing. Select Properties. In the General tab of the properties windo…
a. List edward\'s total sales amount in different states (query result: ename, s
a. List edward's total sales amount in different states (query result: ename, state, total_sales) b. List each of the employees and the total number of employees directly managed …
a. Make a hierarchical directory structure under /root that consists of one dire
a. Make a hierarchical directory structure under /root that consists of one directory containing three subdirectories. b. Copy two files into each of the subdirectories. c. Create…
a. Many file and disk management tools are available for users of personal compu
a. Many file and disk management tools are available for users of personal computers. Visit a computer store, read a computer magazine, or access a vendor’s website and choose two…
a. Modify the C program ex.9 so that it simulates the Unix pipe command: ls | gr
a. Modify the C program ex.9 so that it simulates the Unix pipe command: ls | grep .c | tail -4 b.. Implement following programs to exhibit UNIX Process Control: …
a. Modify the insertion sort function to count the number of moves needed to ord
a. Modify the insertion sort function to count the number of moves needed to order an array of 100 unique random numbers in the range from 0 to 999 (see Chapter 4 for a discussion…
a. Modify the insertion sort function to count the number of moves needed to ord
a. Modify the insertion sort function to count the number of moves needed to order an array of 100 unique random numbers in the range from 0 to 999 (see Chapter 4 for a discussion…
a. Modify the main method to read a list of numbers from a file. b. Insert code
a. Modify the main method to read a list of numbers from a file. b. Insert code to print the elapsed time in milliseconds after the calls to each sum method. c. Run the p…
a. Name your program hw14b.c b. Use the same input file as for hw14a.in, except
a. Name your program hw14b.c b. Use the same input file as for hw14a.in, except remove the ages. In this way, we are just sorting an array of strings. Call this input file hw14b.i…
a. Name.java i. Define a complete Java class named Name that represents a person
a. Name.java i. Define a complete Java class named Name that represents a person’s name. This class should contain 3 instance…
a. Now modify the loop again so that it no longer stops rolling the first time y
a. Now modify the loop again so that it no longer stops rolling the first time you get an initial roll of 2, but instead stops the first time any initial roll is matched in …
a. Prompt and read the value of n from the user. This value must be 1. Use a whi
a. Prompt and read the value of n from the user. This value must be 1. Use a while loop to repeatedly prompt and re-read this value from the user if a value entered is invalid. b.…
a. Prompt the user for a number n. b. Use nested for loops to define a square ma
a. Prompt the user for a number n. b. Use nested for loops to define a square matrix m such that m(row, col) = row + col- 1. For example, if n = 3, m = 1 2 3 2 3 4 3 4 5 c. Call t…
a. Put 0s in the middle four bits of an eight bit pattern w/odisturbing the othe
a. Put 0s in the middle four bits of an eight bit pattern w/odisturbing the other bits. b. Complement a pattern of eight bits. c. Complement the most significant bit of an eight b…
a. Race conditions are a common problem in operating system protection mechanism
a. Race conditions are a common problem in operating system protection mechanisms. An easy example involves a Time-of-check to Time of Use (TOCTOU) race based on Unix symbolic lin…
a. Radio station JAVA wants a class to keep track of recordings it plays. Create
a. Radio station JAVA wants a class to keep track of recordings it plays. Create a class named Recording that contains fields to hold methods for setting and getting a Recording's…
a. Researchers, in general, share their work only with colleagues and funders, a
a. Researchers, in general, share their work only with colleagues and funders, and the research outcomes are typically not aimed at the public. Why does this kind of exclusivity o…
a. Routing (i.e., determination of routes) is the function of the Network layer
a. Routing (i.e., determination of routes) is the function of the Network layer , 64-QAM modems are more prone to noise than 16-QAM modems. c. Attenuation of light signal in an op…
a. Safe Delete: When you use the “rm” command in Linux, it will delete the speci
a. Safe Delete: When you use the “rm” command in Linux, it will delete the specified files, with no chance for recovering them back later. Write a script (called srm) that will sa…
Subject
Web development and programming
Use Browse or pick another subject.