Web development and programming
191828 questions • Page 361 / 3837
3. The pressure of a gas changes as the volume and temperature of the gas vary.
3. The pressure of a gas changes as the volume and temperature of the gas vary. Write a program that uses the Van der Waals equation of state for a gas, (P + (a*n^2) / V^2) * (V -…
3. The price of stocks is sometimes given to the nearest eighth of a dollar; for
3. The price of stocks is sometimes given to the nearest eighth of a dollar; for example, 297/8 or 891/2. Write a program that computes the value of the user's holding of one stoc…
3. The processor for which you are designing your application as L1i and L1d vir
3. The processor for which you are designing your application as L1i and L1d virtual caches. a. What type of data does each cache hold? [2 points] b. Describe in detail the activi…
3. The syntax of the Klingon language is quite simple, yet only Klingons can spe
3. The syntax of the Klingon language is quite simple, yet only Klingons can speak it without making mistakes. The alphabet of the language is {o,r,z,&}, where & stands fo…
3. The table below represents the same scenario as part 2 using a write-back cac
3. The table below represents the same scenario as part 2 using a write-back cache Dirty VTag Y 01 Mem[01000] Data Indexv 001 010 011 100 101 110 Y 10Mem[10010] Y 11 Mem[11110] Y …
3. Think of a phase diagram and the points representing valid symbols for a PSK
3. Think of a phase diagram and the points representing valid symbols for a PSK scheme (see figure 2.29). a) How can a receiver decide which symbol was originally sent when a rece…
3. This is data from R. Weintraub (1962), “The Birth Rate and Economic Developme
3. This is data from R. Weintraub (1962), “The Birth Rate and Economic Development: An Empirical Study”, Econometrica, Vol. 40, #4, pp 812-817. The data set contains birth rates, …
3. This problem is concerned with the range queries on a binary search tree T wh
3. This problem is concerned with the range queries on a binary search tree T whose keys are real numbers. Let h denote the height of T. The range query is a generalization of the…
3. This question is about how many slots per node are needed to have a deadlock
3. This question is about how many slots per node are needed to have a deadlock controller for rings that handles trac along shortest paths. (a) Describe a deadlock controller fo…
3. Tic-Tac-Toe You are to implement the classic Tic-Tac-Toe game. Your implement
3. Tic-Tac-Toe You are to implement the classic Tic-Tac-Toe game. Your implementation should consist of the following functions: // Prints the Game Board with all pieces void prin…
3. To find a unit vector in the direction of the line that connects two points,
3. To find a unit vector in the direction of the line that connects two points, you must find the vector between the two points and divide each element of that vector by the magni…
3. To see how different ISA decisions will impact the machine design, consider d
3. To see how different ISA decisions will impact the machine design, consider designing an accumulator machine with the following specifications 224 words of memory [words are 32…
3. Today’s operating systems include a variety of features. They support a graph
3. Today’s operating systems include a variety of features. They support a graphical user interface, monitor performance, and administer security. Most operating systems also incl…
3. Training set > learn model is also called................ apply model >> test
3. Training set > learn model is also called................ apply model >> test set is also called a. deduction - induction b. induction - dedduction c. learning - valid…
3. Tresure Hunt (GUI application). Your program should display a grid of buttons
3. Tresure Hunt (GUI application). Your program should display a grid of buttons that represent an area to be searched for treasure. Specications: (a) The grid should be 12 rows 1…
3. Tresure Hunt (GUI application). Your program should display a grid of buttons
3. Tresure Hunt (GUI application). Your program should display a grid of buttons that represent an area to be searched for treasure. Specications: (a) The grid should be 12 rows 1…
3. Tricky Arithmetics 1. In Java, write the following method: public static int
3. Tricky Arithmetics 1. In Java, write the following method: public static int decToBin(int decimal) The method accepts a decimal integer and returns its binary equivalent. (You …
3. Use indexOf0 and substr0 or substring0 to divide your name into two strings-f
3. Use indexOf0 and substr0 or substring0 to divide your name into two strings-firstname and lastname We're going to use some basic built-in string functions to manipulate a strin…
3. Use the following graph for the questions on this page: If possible, list two
3. Use the following graph for the questions on this page: If possible, list two valid topological orderings of the nodes in the graph above. If there is only one valid topologica…
3. Use the methodology described in this chapter to describe the challenges and
3. Use the methodology described in this chapter to describe the challenges and criteria for solutions that should be used in developing an integration strategy for the following …
3. Using Matlab a. b. c. d. Create the 7x7 matrix B1, all elements of it shall b
3. Using Matlab a. b. c. d. Create the 7x7 matrix B1, all elements of it shall be O's. Create the 9x9 matrix B2, all elements of it shall be 3's. Create the 5x5 matrix B3, with 1'…
3. Using Visual C++ and your OpenGL configured environment, write an application
3. Using Visual C++ and your OpenGL configured environment, write an application that provides 3 windows for listing help commands, object inventory and a map for a simple game of…
3. Using a for-loop, identify how close two words are by incorporating a for-loo
3. Using a for-loop, identify how close two words are by incorporating a for-loop using the following algorithm: 1. First determine whether or not the two words are the same lengt…
3. Using just case analysis and recursion, define a function, called knil, that
3. Using just case analysis and recursion, define a function, called knil, that links a value of type T onto the *end* of a ListeT>. For example: knil(1, list: 3, 2]) should re…
3. Using the database instance below and for each query to the right, give: a re
3. Using the database instance below and for each query to the right, give: a relational algebra expression a) List the names of students whose phone number is 555- 1234. b) Find …
3. Using the graph in Figure 1, answer the following questions related to Dijkst
3. Using the graph in Figure 1, answer the following questions related to Dijkstra algorithm. Note that you need to find the shortest path tree with root at node A, but you need t…
3. Using the graphs in Figure 1, answer the following questions (a) Is the graph
3. Using the graphs in Figure 1, answer the following questions (a) Is the graph in Figure 1c a directed acyclic graph (DAG)? Why or why not? Be very precise. [6 points Is the dig…
3. Vectors A and B are applied at the origin. A-3/ +j B = i + 4j what is the ang
3. Vectors A and B are applied at the origin. A-3/ +j B = i + 4j what is the angle, , between A and B? Report your answer to the nearest tenth of a degree. a. Design a function su…
3. Vehicle Model You are developing a vehicle simulator, which describes the kin
3. Vehicle Model You are developing a vehicle simulator, which describes the kinematic motion of a front-steered, two-wheel drive vehicle. The vehicle you are simulating is visual…
3. Visit the following Internet resources and describe what you find, e.g., who
3. Visit the following Internet resources and describe what you find, e.g., who sponsors the site, what information does it provide, what is its relevance to computer system secur…
3. We want to require users to enter a password to access our new application bu
3. We want to require users to enter a password to access our new application but we haven't decided the format of the password. For each of the following format options, assume t…
3. We will construct a public class Dog, with instance variables name (a String)
3. We will construct a public class Dog, with instance variables name (a String), breed (a String), and age (an int). (5) (a) Declare the instance variables. Use good programming …
3. What are the two input values for each of the Adders and the ALU? a. Top left
3. What are the two input values for each of the Adders and the ALU? a. Top left ADD (PC+4) b. Top right ADD (Shift left 2 + PC) c. ALU instruction [25-0 shift Shift, Jump address…
3. What are the values of sum1 and sum2 if the operands in the expressions are e
3. What are the values of sum1 and sum2 if the operands in the expressions are evaluated left to right ? Must include explanation int fun(int *k){ *k += 10; return 5 * (*k); } voi…
3. What is a busy waiting? What is an alternative to busy waiting ?(2 points) 4.
3. What is a busy waiting? What is an alternative to busy waiting ?(2 points) 4. What is the distinction between the critical section and the critical data?(2 points)5. Describe …
3. What is displayed on the console when running the following program? public c
3. What is displayed on the console when running the following program? public class Test public static void main(String[] args) { try f System.out.println("Welcome to Java"); int…
3. What is meant by the phrase “Cannot Test 100% of Everything”? 4. What is reve
3. What is meant by the phrase “Cannot Test 100% of Everything”? 4. What is reverse engineering? How can it be used to build a new system? 5. What is the purpose of business speci…
3. What is the output of the following code? int count; int num = 2; for (count
3. What is the output of the following code? int count; int num = 2; for (count = 1; count < 2; count++) { num = num + 3; System.out.print(num + " "); } System.out.prin…
3. What is the output of the following statements? a. if(\'b\' < \'a\') cout
3. What is the output of the following statements? a. if('b' < 'a') cout << "b is less than a"; cout << "the end" << endl; b. if(10 < 2 * 5) cout << …
3. What is the output of the program below, state if there will be an exception?
3. What is the output of the program below, state if there will be an exception? If so, state what type is it, and show how to handle it. class Class1 { public static void main(St…
3. What is the primary key of this table? How can we designate it? Field Name Da
3. What is the primary key of this table? How can we designate it? Field Name Data Type Field Size Req’d Allow Zero Length Index Description Order_ID Number Long Integer Decimal P…
3. When a program might generate an exception, you ________________. a. must wri
3. When a program might generate an exception, you ________________. a. must write statements to handle it b. must write a class to handle it c. can choose to handle it or not d. …
3. When asked to create a program to nd the volume of any cone, given its radius
3. When asked to create a program to nd the volume of any cone, given its radius and height, a programmer created this program to implement the formula V = 1/3 r2 h. It compiles, …
3. When moving the empty tile up from S to S in Figure 1, please show the Permut
3. When moving the empty tile up from S to S in Figure 1, please show the Permutation Inversion relationships for tiles xi, x2, x3, and x4, before and after the empty tile movemen…
3. When you define a class in C++, and do not provide any constructor, then the
3. When you define a class in C++, and do not provide any constructor, then the default constructor will be used. Please type in the following code, add necessary header files, co…
3. Which of the following is a small piece of data (a text file) sent from a web
3. Which of the following is a small piece of data (a text file) sent from a website and stored on the user's computer by the user's web browser while the user is browsing? Spywar…
3. Which of the following statements about Access Points and Wireless LAN Router
3. Which of the following statements about Access Points and Wireless LAN Routers are true? a. Access Points provide port-based control, firewall management, and Dynamic Host Conf…
3. Which register in a CPU always contain an address and what address is contain
3. Which register in a CPU always contain an address and what address is contained in this register? 4. How many I/O ports are there and how are they labeled on an 8051 IC? 5. How…
3. Word Counter Write a function that accepts a pointer to a C-string as an argu
3. Word Counter Write a function that accepts a pointer to a C-string as an argument and returns the number of words contained in the string. For instance, if the string argument …
3. Work on the following problem. Name it as P3.py You should be able to run it
3. Work on the following problem. Name it as P3.py You should be able to run it as python P3.py 1 2.5 5, which will generate 3 curves on the same figure. (Hint, use the hold() fun…
Subject
Web development and programming
Use Browse or pick another subject.