Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 360 / 3837

3. Select one or more of the following statements that are true about branch pre
3. Select one or more of the following statements that are true about branch prediction and speculative execution. Branch prediction and speculative execution are mutually exclusi…
3. Select the correct answer(s) below. Select all the errors in the following Ja
3. Select the correct answer(s) below. Select all the errors in the following Java program: 1 public class Question public static void main(String[] args); This is a comment *This…
3. Show the final data structure that results from the following program. Also s
3. Show the final data structure that results from the following program. Also show the answers returned by the two FIND operations below. Use a disjoint-set forest with union by …
3. Show what is printed by the following program: #include #include
3. Show what is printed by the following program: #include <iostream> #include <string> using namespace std; int main() {    string first = “Lincoln”;    string last =…
3. Simple C++ Coding I have this code: #include #include usi
3. Simple C++ Coding I have this code: #include <iostream> #include <string>       using namespace std; // Declaring the structure struct MarksCard{    string name;   …
3. Simulate the action of the algorithm for checking delimiters for each of the
3. Simulate the action of the algorithm for checking delimiters for each of the following strings by showing the contents of the stack at each point. Do not write code. a. {[A+B]-…
3. Sorting Implement a generic Stack linked list data structure for integers tha
3. Sorting Implement a generic Stack linked list data structure for integers that supports these function:s a. i. InsertionSort(), which runs an insertion sort algorithm on the st…
3. Stolen or compromised devices can also be used to access your private data. E
3. Stolen or compromised devices can also be used to access your private data. Even if that data has been deleted. Search the Web for information about software used to recover de…
3. String Manipulation Working with text is a major task in a variety of compute
3. String Manipulation Working with text is a major task in a variety of computer science problems. Reading from files, data streams, or the user requires examination and potentia…
3. String Search Input one line of sentence, and a string. Then: a) Write a func
3. String Search Input one line of sentence, and a string. Then: a) Write a function to extract all words from that sentence into a global 2-dimensional char arrays and their star…
3. Structures In order to explain how a structure works, let\'s look at an examp
3. Structures In order to explain how a structure works, let's look at an example. A loan usually has several components in it. For simplicity, we assume for now that no name or p…
3. Submarine Buoyancy Program The goal is to use Matlab to design a submarine th
3. Submarine Buoyancy Program The goal is to use Matlab to design a submarine that can rise or sink as fast as possible. The submarine can be made of any metal . The submarine can…
3. Suggest a code scheme that will identify each Working Shoes customer. Working
3. Suggest a code scheme that will identify each Working Shoes customer. Working Shoes is a multistate shoe store that offers an extensive selection of casual and dress shoes desi…
3. Suppose a RAID level-4 system has 4 data disks and a parity disk. The data di
3.      Suppose a RAID level-4 system has 4 data disks and a parity disk.  The data disks are labeled D0, D1, D2, and D 3 and suppose D1 fails.  Reading the first blocks from the …
3. Suppose a disk drive in your system has a rotation speed of 7,200 rpm. and se
3. Suppose a disk drive in your system has a rotation speed of 7,200 rpm. and seek times of 0.68 ms track-to-track, or 21 ms full ‘stroke’ (inner edge to outer edge). (a) What is …
3. Suppose a disk drive in your system has a rotation speed of 7,200 rpm. and se
3. Suppose a disk drive in your system has a rotation speed of 7,200 rpm. and seek times of 0.68 ms track-to-track, or 21 ms full ‘stroke’ (inner edge to outer edge). (a) What is …
3. Suppose a set-associative cache consisting of 1024 4-word blocks is construct
3. Suppose a set-associative cache consisting of 1024 4-word blocks is constructed. A word is 4-bytes. Let n be the associativity. A word of data is word-aligned in memory and eac…
3. Suppose a user would like to output the name \"Sarah\" to the screen, and the
3. Suppose a user would like to output the name "Sarah" to the screen, and they have written the following code in an attempt to do so: #include iostream» using namespace std; int…
3. Suppose that a class named Bicycle contains a private nonstatic integer named
3. Suppose that a class named Bicycle contains a private nonstatic integer named height, a public nonstatic string named model, and a public static integer named wheels. Which of …
3. Suppose that a class named Bicycle contains a private nonstatic integer named
3. Suppose that a class named Bicycle contains a private nonstatic integer named height, a public nonstatic String named model, and a public static integer named wheels. Which of …
3. Suppose that algorithm A (for some problem) takes 2n/2 basic computer steps f
3. Suppose that algorithm A (for some problem) takes 2n/2 basic computer steps for an input of size n. (a) Suppose you run algorithm A on a computer whose processor can complete 1…
3. Suppose that we hash 5 items into a table with 5 slots using a random hash fu
3. Suppose that we hash 5 items into a table with 5 slots using a random hash function that maps every item to each slot with the same probability, independent of the other items.…
3. Suppose that you have declared a numeric array named values that has 13 eleme
3. Suppose that you have declared a numeric array named values that has 13 elements. Which of the following must be true? a. values[0] is smaller than values[1] b. values[2] is st…
3. Suppose the logic blocks in a processor have the following latencies.. Data a
3. Suppose the logic blocks in a processor have the following latencies.. Data access Register write 350ps 150ps 175ps 500ps 200ps a) In a single cycle, non-pipelined processor, w…
3. Suppose the main memory access time of 200 cycles including all the miss hand
3. Suppose the main memory access time of 200 cycles including all the miss handling, the primary cache has 2 cycles access time and the miss rate per instruction of primary cache…
3. Suppose there is exactly one packet switch (or router) between a sending host
3. Suppose there is exactly one packet switch (or router) between a sending host and a receiving host. The transmission rates between the sending host and the switch and between t…
3. Suppose we execute the Chomsky-normal-form conversion algorithm of Section 7.
3. Suppose we execute the Chomsky-normal-form conversion algorithm of Section 7.1.5 (p.272). Let A BC0DE be one of the productions of the given grammar, which has already been fre…
3. Suppose within your web browser you click on a link to obtain a Web page. The
3. Suppose within your web browser you click on a link to obtain a Web page. The Web page associated with the link is an HTML file of very small size, but containing references to…
3. Suppose you are given an array of n integers. Assume that n 2 2. Your goal is
3. Suppose you are given an array of n integers. Assume that n 2 2. Your goal is to find largest and second largest elements of the array. Consider the following algorithm: If A[1…
3. System analysts use interactive methods for gathering information requirement
3. System analysts use interactive methods for gathering information requirements. Compare and contrast these methods. Explain what each one is and how they are used. Besides inte…
3. Take the same software implemented in a specifi c environment, and, with thre
3. Take the same software implemented in a specifi c environment, and, with three of your classmates, independently measure the Function Points of this software. Next, compute the…
3. Test Score Evaluation Create a procedure named CalcGrade that receives an int
3. Test Score Evaluation Create a procedure named CalcGrade that receives an integer value between 0 and 100, and returns a single capital letter in the AL register. Preserve all …
3. The Flight of a Ball: If we assume negligible air friction and the curvature
3. The Flight of a Ball: If we assume negligible air friction and the curvature of the Earth, a ball that is thrown into air from any point on the Earth's surface will follow a pa…
3. The GAO Report, Information Security Risk Assessment, identified three method
3. The GAO Report, Information Security Risk Assessment, identified three methods of conducting and documenting the assessment. These three methods were discussed in class. Using …
3. The IS Corporate Steering Committee is a group of managers and staff represen
3. The IS Corporate Steering Committee is a group of managers and staff representing various organizational units that establishes IT priorities and ensures that the IS department…
3. The IS Corporate Steering Committee is a group of managers and staff represen
3. The IS Corporate Steering Committee is a group of managers and staff representing various organizational units that establishes IT priorities and ensures that the IS department…
3. The Leibniz method of approximating the value of pi uses the following mathem
3. The Leibniz method of approximating the value of pi uses the following mathematical series: 1/3 Final Exam.md 6/11/2018 Each additional term can be represented as (-1)(n) 1/ (2…
3. The National Do Not Call Registry is primarily enforced by which two entities
3. The National Do Not Call Registry is primarily enforced by which two entities through their regulation of two different federal laws relating to telemarketing? A. Department of…
3. The Rule of 72 is used to make a quick estimate of the time required for pric
3. The Rule of 72 is used to make a quick estimate of the time required for prices to double due to inflation. If the inflation rate is r percent, then the Rule of 72 esti- mates …
3. The SIR model is used by epidemiologists to calculate the theoretical number
3. The SIR model is used by epidemiologists to calculate the theoretical number of Susceptible, Infected and Recovered individuals in a host population during a pandemic. It can b…
3. The Simple Substitution Cipher is a major improvement on the Caesar Cipher. (
3. The Simple Substitution Cipher is a major improvement on the Caesar Cipher. (a) in what different ways is it an improvement? If a Simple Substitution Cipher is used (with an un…
3. The United States federal personal income tax is calculated based on filing s
3. The United States federal personal income tax is calculated based on filing status and taxable income. There are four filing statuses: single filers, married filing jointly or …
3. The explosion of information-driven self-serve options in the consumer world
3. The explosion of information-driven self-serve options in the consumer world is evident at the gas station where customers pay, pump gas, and purchase a car wash without ever s…
3. The following 11-bit Hamming-coded (single-bit correction) string was receive
3. The following 11-bit Hamming-coded (single-bit correction) string was received. Which bit is in error, if any? 10101101110 4. Construct an 11-bit Hamming code for the character…
3. The following Table (next page) is commonly used in the fields of Strength of
3. The following Table (next page) is commonly used in the fields of Strength of Materials, Steel Structures, and Mechanical Design. The blue highlighted part of the table is alre…
3. The following diagram shows a training set with four negative points (green c
3. The following diagram shows a training set with four negative points (green circles) and four positive points (purple squares) (46) (6,6) (44) (6,4) It has no useful linear sep…
3. The following graph represents a portion of the subway system of a city. The
3. The following graph represents a portion of the subway system of a city. The vertices on the graph correspond to subway stations, and the edges correspond to the rails. Your jo…
3. The following implementation is an attempt to solve the problem for one produ
3. The following implementation is an attempt to solve the problem for one producer and multiple consumers as shown in Problem 2. Problem 2: Producer   Thread: void   *producer(vo…
3. The following program is a list of instructions for the Basic Computer in hex
3. The following program is a list of instructions for the Basic Computer in hexadecimal code. The computer executes the instructions starting from address 100. Show the Symbolic …
3. The insatiable demand for everything wireless, video, and Web-enabled everywh
3. The insatiable demand for everything wireless, video, and Web-enabled everywhere will be the driving force behind developments in telecommunications, networking, and computing …