Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 357 / 3837

3. Create a view named BOOK_INVENTORY. It consists of the branch number, and the
3. Create a view named BOOK_INVENTORY. It consists of the branch number, and the total number of books on hand for each branch. Use UNITS as the name for the count of books on han…
3. Create a view named order_item_products that returns columns from the Orders,
3. Create a view named order_item_products that returns columns from the Orders, Order_Items, and Products tables. This view should return these columns from the Orders table: ord…
3. Create another Java class called Customer within the same project Programming
3. Create another Java class called Customer within the same project ProgrammingAssignment3 and include the main method. Part A: Include the following Java classes to the above cr…
3. Create another Java class called StudentMain within the same project Lab7A wh
3. Create another Java class called StudentMain within the same project Lab7A which includes the main method. a. Include another class called Student in the same Java file. This c…
3. Critical Permission Defining a critical permission risk ensures that risk ana
3. Critical Permission Defining a critical permission risk ensures that risk analysis identifies any employee who has been assigned a potentially risky permission. These permissio…
3. Currently, the program described in this chapter is to have setuid-to-root pr
3.      Currently, the program described in this chapter is to have setuid-to-root privileges. Someone observed that it could be equally well implemented as a server in which case…
3. DATABASE PLEASE TYPE ANSWER Write the DML for the following: Updating a depar
3. DATABASE PLEASE TYPE ANSWER Write the DML for the following: Updating a department manager. Inserting a new employee, their salary, title, and department association. Insert a …
3. Define a procedure \"Add\" that takes parameters and returns the sum of them
3. Define a procedure "Add" that takes parameters and returns the sum of them [5 points] > (Add 40 60) 100 4. Define a procedure called "Square" that will compute the square am…
3. Define a sorting algorithm to be parsimonious i it never compares the same pa
3. Define a sorting algorithm to be parsimonious i it never compares the same pair of input values twice. (Assume that all the values being sorted are distinct.) For example, it w…
3. Define a sorting algorithm to be parsimonious if it never compares the same p
3. Define a sorting algorithm to be parsimonious if it never compares the same pair of input values twice. (Assume that all the values being sorted are distinct.) For example, it …
3. Describe the effects of a corrupted data block for a given file for: (a) cont
3. Describe the effects of a corrupted data block for a given file for: (a) contiguous (b) linked (c) indexed (or table based) 4. Consider a file whose size varies between 4 KB an…
3. Design Problem. Imagine you are the network architect/administrator for a nat
3. Design Problem. Imagine you are the network architect/administrator for a nationwide enterprise network that consists of 200 routers placed in offices in every major city. The …
3. Design an incident response plan for your home computer if there is a fire ex
3. Design an incident response plan for your home computer if there is a fire exploring actions taken before, during and after the incident During and incident After and incident …
3. Design/analysis-based questions. Suggested time to spend on these questions:
3. Design/analysis-based questions. Suggested time to spend on these questions: 45-50 minutes. [20+20-40pts (a) Consider a slightly different design for the Lottery scheduler than…
3. Determine the number of comparisons (as a function of n and m) that are perfo
3. Determine the number of comparisons (as a function of n and m) that are performed in merging two ordered files a and b of sizes n and m, respectively, by the merge method prese…
3. Develop a list of five security-related issues to be put into a requirements
3.   Develop a list of five security-related issues to be put into a requirements document as part of a secure coding initiative. 4.   Choose two requirements from the previous qu…
3. Develop an algorithm to be able to do the word search. Write the algorithm in
3. Develop an algorithm to be able to do the word search. Write the algorithm in pseudocode. The word search starts with an nxn square of letters (n rows and n columns stored in a…
3. Develop the complete model, clearly showing the decision variables, objective
3. Develop the complete model, clearly showing the decision variables, objective function, and all constraints very clearly (assume the reader doesn't know much) roblem 1: Wendy l…
3. Disadvantages. In Amanda\'s proposal to switch NCSU from a semester system to
3. Disadvantages. In Amanda's proposal to switch NCSU from a semester system to trimester calendar, she appealed to undergraduate students by making the following arguments: • The…
3. Distributed denial-of-service A popular attack tool among novice hackers prev
3. Distributed denial-of-service A popular attack tool among novice hackers previously has been the Low Orbit Ion Cannon (LOIC), which features a user-friendly GUI as well as an o…
3. Divide and Conquer (6 points) Let A[0..n -1| be an array of n numbers. A numb
3. Divide and Conquer (6 points) Let A[0..n -1| be an array of n numbers. A number in A is a majority element if A contains this number at least Ln/2 + 1 times. So for example, th…
3. Dog Age Calculator You know how old your dog is in human years, but what abou
3. Dog Age Calculator You know how old your dog is in human years, but what about dog years? Calculate it! Write a function named calculateDogAge that: takes 1 argument: your pupp…
3. Draw a chart: A movie theater only keeps a percentage of the revenue earned f
3. Draw a chart: A movie theater only keeps a percentage of the revenue earned from ticket sales. The remainder goes to the distributor. Design a program that calculates a theater…
3. Due to E. W. Dijkstra] Consider decimal numerals containing only the digits 1
3. Due to E. W. Dijkstra] Consider decimal numerals containing only the digits 1-3. A numeral is considered "good" if no two adjacent non-empty substrings of it are equal; otherwi…
3. During the test results are recorded phase, test cases are run and verified b
3. During the test results are recorded phase, test cases are run and verified before True or False: Select true or false for the following questions: 11. Structural software test…
3. Evaluate pointer expressions (40 points) The table below lists a set of C var
3. Evaluate pointer expressions (40 points) The table below lists a set of C variables, their address, and their values. For each expression below, show what it evaluates to . Ass…
3. Evaluate pointer expressions (40 points) The table below lists a set of C var
3. Evaluate pointer expressions (40 points) The table below lists a set of C variables, their address, and their values. For each expression below, show what it evaluates to . Ass…
3. Every C++ program is made up of a: A)Main function B)Main section C)local sec
3. Every C++ program is made up of a: A)Main function B)Main section C)local section D)global section 4. Local declarations are: A)visible to the function in a program B)Invisible…
3. Examine the difficulty of adding a proposed ss Rd, Rn, #immediate (Store sum)
3. Examine the difficulty of adding a proposed ss Rd, Rn, #immediate (Store sum) instruction to the LEGv8 instruction set, which works as follows: Mem[Reg[Rd]]=Reg[Rn]+immediate; …
3. Exercise 3.14 of the textbook A card game program keeps a deck of cards in an
3. Exercise 3.14 of the textbook A card game program keeps a deck of cards in an array. Give an algorithm to "unshuffle" the deck so that all the cards of a suit are grouped toget…
3. Expectation (10 points) Consider the binary tree below. Observe that it has a
3. Expectation (10 points) Consider the binary tree below. Observe that it has a weight for each edge. Let the weighted path length of a path in the tree be the sum of its edge we…
3. Explain how IEEE 802.1Q virtual LANs are organized. What modification is made
3. Explain how IEEE 802.1Q virtual LANs are organized. What modification is made in the frame format? 5. Briefly explain what is the purpose of the Routing Information Protocol (R…
3. Explain the use of System.exit(0); tseelia tophonPoe to ein clos? cu J ~ ?.ey
3. Explain the use of System.exit(0); tseelia tophonPoe to ein clos? cu J ~ ?.eyo. ,n sloniaB ort Answer 14. a. What method is used to create an input dialog box? b. What method i…
3. Extend the class LinkedListclass by adding the following operations: a. Find
3. Extend the class LinkedListclass by adding the following operations: a. Find and delete the node with the smallest info in the list. (Delete only the first occurrence. Traverse…
3. Fattening. Given a black and white 1 bit image (pixels are either 0 or 1) of
3. Fattening. Given a black and white 1 bit image (pixels are either 0 or 1) of size wxh (e.g. 6x5), give an algorithm that fattens the drawing by setting to 1 all pixels who have…
3. Fill in the blanks 50 100 Amortized Analysis is used for algorithms where an
3. Fill in the blanks 50 100 Amortized Analysis is used for algorithms where an occasional operation is very slow, but most of the other operations are faster In Amortized Analysi…
3. Fill in the blanks: Amortized Analysis is used for algorithms where an occasi
3. Fill in the blanks: Amortized Analysis is used for algorithms where an occasional operation is very slow, but most of the other operations are faster. In Amortized Analysis, we…
3. Fixed-point numbers a) [10 marks] A fixed-point binary number system has \'m\
3. Fixed-point numbers a) [10 marks] A fixed-point binary number system has 'm' whole bits and 'n' fractional bits. What is the range of numbers represented, assuming an unsigned …
3. For a Linear Feedback Shift Register (LFSR) of length L, a. What is maximum p
3. For a Linear Feedback Shift Register (LFSR) of length L, a. What is maximum period of the LFSR output sequence? b. hat is required to obtain a sequence of maximal length? c. Wh…
3. For a given array, please computing the product and sum of all the elements i
3. For a given array, please computing the product and sum of all the elements in the array and print the results. For example, for the array list [34] (1,2,3,4), the product-1*2*…
3. For each of the following lines of variable declarations, identify it as vali
3. For each of the following lines of variable declarations, identify it as valid or describe what makes the line invalid. Line 1: n = 12; Line 2: char letter = ; Line 3: int one …
3. For each of the following lists below, what should the value for s, e, and i
3. For each of the following lists below, what should the value for s, e, and i be in list(range(s , e , i ) ) to give the corresponding list if you type it at the shell : a. [-7,…
3. For each of the next two examples, write a RECURSIVE PYTHON program. Pass the
3. For each of the next two examples, write a RECURSIVE PYTHON program. Pass the designated value for n to your program and run the program. Submit a screen shot of the code in th…
3. For the following array of test scores, [99,58,87,78,100,100,91,93,78,66] Fin
3. For the following array of test scores, [99,58,87,78,100,100,91,93,78,66] Find the mean, standard deviation, minimum value, maximum value, and total number of scores using MATL…
3. For the following problem, write the code that should go in each box next to
3. For the following problem, write the code that should go in each box next to the box leter below (3 points each Universal Motors makes cars. They compute the purchase price of …
3. Fraudulent Accounts A large online social networking company has recently dis
3. Fraudulent Accounts A large online social networking company has recently discovered that it may have a problem with a number of accounts that are spreading false information t…
3. Function One: spliceString Specification The first function you will write sh
3. Function One: spliceString Specification The first function you will write should be called 'splicestring'. Your function should take three (3) arguments. The first argument is…
3. GIVen a table structure as folloOWs. Courses Student ID PK Couse ID PK Sessio
3. GIVen a table structure as folloOWs. Courses Student ID PK Couse ID PK Sessions CPKFK Corse ID CPKFK Semester Year Grade (a) (15 points) Please show the SQL statement that find…
3. Give a big- O estimate for the number of operations, where an operation is a
3. Give a big-O estimate for the number of operations, where an operation is a comparison or a multiplication, used in this segment of an algorithm (ignoring comparisons used to t…
3. Given 10 teams, design a tournament schedule by OO where each team play the o
3. Given 10 teams, design a tournament schedule by OO where each team play the other 2 times. Each team can only play one game per day. The maximum number of games per day is 4, d…