Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 3578 / 3837

code with octave plz We have seen in class that the relative error in the soluti
code with octave plz We have seen in class that the relative error in the solution of a linear system due to perturbations E in the matrix A and delta b in the right hand side b c…
code: #include #include #define ROWS 3 #define COLS 3 void
code: #include <stdio.h> #include <stdlib.h> #define ROWS 3 #define COLS 3 void display(double[ROWS][COLS]); int main(){ double mat[ROWS][COLS] = { {1./2, 1, 0}, {0, 2…
code: #include #include #define MAX_IN_LENGTH 241 #define OU
code: #include<stdio.h> #include <stdlib.h> #define MAX_IN_LENGTH 241 #define OUT_LENGTH 60 FILE *in; FILE *out; double compare_DNA(char [], char [], char s[], int ); …
code: #include # define N_DIGITS 4 # define MAX_QUERIES 12 void genera
code: #include<stdlib.h> # define N_DIGITS 4 # define MAX_QUERIES 12 void generate_answer(int[]); void compare(int[],int[],int *,int *); int main() {int guess[ N_DIGITS],ans…
code: /***************************************************************** * Progr
code: /***************************************************************** * Program: palindrome.c * * Purpose: implements a recursive function for determining *   if a string is a …
code: //************************************************************************
code:   //************************************************************************** // Program: Charge Account Numbers // // Purpose: This program checks whether a number entered…
code: //************************************************************************
code:   //************************************************************************** // Program: Charge Account Numbers // // Purpose: This program checks whether a number entered…
code: MAIN /*import com.binarytree.BinarySearchTree;*/ public class Main { publi
code: MAIN /*import com.binarytree.BinarySearchTree;*/ public class Main { public static void main(String[] args) { BinarySearchTree tree = new BinarySearchTree(); tree.insert(5);…
code? the following 9. What are the contents of the list 1 QueusO for x in ange(
code? the following 9. What are the contents of the list 1 QueusO for x in ange(10) while uhile q g enquou C.popO i ppenaa daquu) (a) to, 8, 7. 6. 5, 4, 3, 2, 1,0 (b) to, 1, 2. 3,…
codeblocks, c code, using only stdio.h and string.h Question 1: Write a function
codeblocks, c code, using only stdio.h and string.h Question 1: Write a function hydroxide that returns 1 for true if its string argument ends in the substring OH. Question 2: Wri…
codewarrior hcs12 The array sample contains 7 8-bit signed numbers as shown belo
codewarrior hcs12 The array sample contains 7 8-bit signed numbers as shown below. Write a program which computes the sum of negative numbers, the sum of positive numbers, and the…
coding Ruby 1. The following codeblock has an error in it. Fix it so it prints \
coding Ruby 1. The following codeblock has an error in it. Fix it so it prints "The answer to the ultimate question of life, the universe, and everything is 42" on the screen. put…
coding in c: not sure what sequential tape reading is or how to do it. Please ru
coding in c: not sure what sequential tape reading is or how to do it. Please run the following program. Use sequential tape reading analogy, please draw sequntial tape values and…
coding in java need help 1)Assume that a class called Student exists, and that i
coding in java need help 1)Assume that a class called Student exists, and that its constructor takes a String student name and a double grade point average as arguments. Write a J…
codingbat Given a non-empty array containing an even number of elements, return
codingbat Given a non-empty array containing an even number of elements, return a new array consisting of the elements from the first half of the given array. For example, if the …
coin-row problem: there is a row of n coins whose values are some positive inter
coin-row problem: there is a row of n coins whose values are some positive intergers c1, c2, c3, not neccessarily distinct, the goal is to pick up the maximum a let F(n) be the ma…
collect information about recent threats and attacks incident of each of the fol
collect information about recent threats and attacks incident of each of the following Virus – Worm – Trojan horse – Distributed denial of service – Rootkit – Spam – Phishing coll…
collections framework Create a class named DataDemo. This class will have a main
collections framework Create a class named DataDemo. This class will have a main method. You will create only one file, which will contain the DataDemo class. You are to read in t…
collision resolution. In this exercise you will implement a hash table that uses
collision resolution. In this exercise you will implement a hash table that uses separate chaining for collision resolution. The hash table will contain key-data pairs. You can as…
com sci intro course question code: https://docs.google.com/document/d/1ZSH_3Mhb
com sci intro course question code: https://docs.google.com/document/d/1ZSH_3MhbOT0WRypmZKD7f49C8GVpBelNqQGJaBlshPg/edit?usp=sharing Create two classes Node and PointList which wi…
com/webapp/blackboard/content/listContentjspicourse id 260384 1&content.id-.1417
com/webapp/blackboard/content/listContentjspicourse id 260384 1&content.id-.14175795 18mode reset Attached Files Lab4Template bt (479 B) This assignment includes an "outline" …
combine UDP client and UDP server C program into one multithreaded P2P (peer-to-
combine UDP client and UDP server C program into one multithreaded P2P (peer-to-peer) application C program which is a client and a server at the same time. The program shall star…
command for your work or school setting. Tun off your monitor if necessary Indep
command for your work or school setting. Tun off your monitor if necessary Independent Challenge 2 You are the new manager of Katharine Anne's Garden Supplies, a business that sup…
command in linux Operation systems 1. What are two different ways to determine t
command in linux Operation systems 1. What are two different ways to determine the ownership of the /etc/passwd file? (2 pts) 2. Create a file in your home directory named myfile.…
comment about good thing about the anwer of this discussion and try to improve t
comment about good thing about the anwer of this discussion and try to improve the answer of this discussion in short sentence (the comment and improvement should be around 5 to 8…
comment on the contents of the attached file DQ4-1 OO Sources Sponsors Domain Ex
comment on the contents of the attached file DQ4-1 OO Sources Sponsors Domain Experts Stakeholders Users Legacy Applications Documents Requirements Gathering An ongoing Activity E…
comment the code a) Write a code that performs Z X Y. You need to call a subrout
comment the code a) Write a code that performs Z X Y. You need to call a subroutine called TIMES that computes Z Use registers to pass X and Y. Make sure that part a) works before…
comments for the following code: main.cpp: #include \"functions.h\" #include
comments for the following code: main.cpp: #include "functions.h" #include <iostream> #include <iomanip> #include <cstdlib> using namespace std; int main() {    …
commets pls, #include \"ArrayBag.h\" #include \"SetFunctions.h\" #include
commets pls, #include "ArrayBag.h" #include "SetFunctions.h" #include <string> using namespace std; int main() {       ifstream inFile("setInput.txt"); if (inFile.fail()) //…
common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key e
common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature given this sc…
common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key e
common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature Scenario: Net…
common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key e
common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature scenario: Bac…
common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key e
common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature Confidential …
communication system Q&A HELP !!! Please help me show the all answers and show h
communication system Q&A HELP !!! Please help me show the all answers and show how to get the answers for the all steps, thank you so much !!! Thank you Version 1 Total 40 mar…
comp sci 1000 level https://docs.google.com/document/d/1f9TGqV-a-q2ibu13niV-Pxpz
comp sci 1000 level https://docs.google.com/document/d/1f9TGqV-a-q2ibu13niV-PxpzfCBESA49TD7Yy6z2sAA/edit?usp=sharing I'm not sure if I should seperate #1 & #2 or not. If so, p…
comp sci intro course question code: https://www.dropbox.com/sh/oyyicwn4xgx3m26/
comp sci intro course question code: https://www.dropbox.com/sh/oyyicwn4xgx3m26/AACeqjFTcBEP585x301Li-vta?dl=0 Implement the RadioButton class as a subclass of GUIelement. a.This …
comp sci intro course question https://www.dropbox.com/sh/oyyicwn4xgx3m26/AACeqj
comp sci intro course question https://www.dropbox.com/sh/oyyicwn4xgx3m26/AACeqjFTcBEP585x301Li-vta?dl=0 Implement the Text Box class which will provide both input boxes into whic…
comp sci intro course question https://www.dropbox.com/sh/oyyicwn4xgx3m26/AACeqj
comp sci intro course question https://www.dropbox.com/sh/oyyicwn4xgx3m26/AACeqjFTcBEP585x301Li-vta?dl=0 Implement the Text Box class which will provide both input boxes into whic…
company has a number of employees. The attributes of EMPLOYEE include Employee I
company has a number of employees. The attributes of EMPLOYEE include Employee ID (identifier), Name, Address, and Birthdate. The company also has several projects. Attributes of …
company has taken a contract for landscaping a plot of land. The job would requi
company has taken a contract for landscaping a plot of land. The job would require workers, supervisors, excavators, tractors and a variety of trees, bushes, and shrubs beside sto…
company id VARCHAR(2) foreign-language id INT (11) ]volunteerT t snumber VARCHAR
company id VARCHAR(2) foreign-language id INT (11) ]volunteerT t snumber VARCHAR(6) last_name VARCHAR(30) barracks VARCHAR(15) VARCHAR( 15) Olang_Tame VARONR(15) Indexes first,nam…
company\'s Linux password policy states that passwords must be 15 characters lon
company's Linux password policy states that passwords must be 15 characters long, have special symbols, not be found in the dictionary, never be reused, and expire every 30 days. …
compare Docker and Virtual Machine (their roles in OS, and services provided); d
compare Docker and Virtual Machine (their roles in OS, and services provided); discuss the implementation and performance of Docker; explain software container (in context with Do…
compare and contrast the 5 algorithm design approaches (divide and conquer, dyna
compare and contrast the 5 algorithm design approaches (divide and conquer, dynamic programming, greedy approach, backtracking, and branch and bound) and must explain each algorit…
compare the memory efficiency of five different styles of instruction sets for t
compare the memory efficiency of five different styles of instruction sets for the code sequence below. The architecture styles are: i. A zero-address machine is a stack-based mac…
compare the performance of simple binary search trees versus AVL trees by readin
compare the performance of simple binary search trees versus AVL trees by reading in a corpus of text, storing the word and phrases therein into a search tree, and then performing…
compile Undo Cut Copy Paste-1. Find.. .11 Close Provided as input is labels, an
compile Undo Cut Copy Paste-1. Find.. .11 Close Provided as input is labels, an Arraylist of strang variables. Return the last string alphabetically in labels xithout using a loop…
compleate this code using this binary number 0001 0011 0101 0101 -- fsm2.vhd ---
compleate this code using this binary number 0001 0011 0101 0101 -- fsm2.vhd ----------------------------------------------------- library ieee ; use ieee.std_logic_1164.all; enti…
complete PiggyBank\'s implementation (PiggyBank.cpp) based on the given class de
complete PiggyBank's implementation (PiggyBank.cpp) based on the given class defintion (PiggyBank.h). *****************************************************************************…
complete a Case Study on work- cell design case study on automated cell includin
complete a Case Study on work- cell design case study on automated cell including robotic, gripper ,technology , sensors , safety supporting work cell hardware , cell control arch…