Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 371 / 3837

4 pts Write a method named printReverse that will accept a single (String parame
4 pts Write a method named printReverse that will accept a single (String parameter and prints the String in reverse order For example, the following method call: rintReverse( Hel…
4 pts a. relationship between a subclass and the superclass from which it was de
4 pts a. relationship between a subclass and the superclass from which it was derived c the ability of the same code to be used with objects of different types. producing differen…
4 pts ea. 1. Given the code below, what is the output? intll arr (5,3,8,2) 2 int
4 pts ea. 1. Given the code below, what is the output? intll arr (5,3,8,2) 2 int i arr.length 1 3 while(i 1) System.out-print(arrti) A. 5382 B. runtime exception C. 283 D. 2835 2.…
4 pts) 2. Assuming an Instruction cache rate for a program is 2%, and a Data cac
4 pts) 2. Assuming an Instruction cache rate for a program is 2%, and a Data cache miss rate is 5%. If a miss is 100 cycles for all processor has a CPI of 2 without any memory sta…
4 questions in Python 1. Write a program that keeps asking the user for new valu
4 questions in Python 1. Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should NOT be added to the list). The…
4 x 4 Key Pad Interfacing Exercise (ATM Machine Design) Write a C18 Program to c
4 x 4 Key Pad Interfacing Exercise (ATM Machine Design) Write a C18 Program to check if the 4 digits entered by the user correspond to the expected secret pin code. Assume that th…
4# 5 # This program computes the maximum magnitude for the elements of array A 6
4# 5 # This program computes the maximum magnitude for the elements of array A 6 # and stores the value of the element with maximum magnitude at the label maxmag: 7 8 9 ·data 10 #…
4# 5 # This program computes the maximum magnitude for the elements of array A E
4# 5 # This program computes the maximum magnitude for the elements of array A E # and stores the value of the element with maximum magnitude at the label maxmag: 7 8 9 .data 10 #…
4) (10 pts) The quad-core multiprocessor shown in Figure 2 uses directory-based
4) (10 pts) The quad-core multiprocessor shown in Figure 2 uses directory-based cache coherence implemented in the shared L2 cache. Each processor has an L1 write-back private cac…
4) (10 pts) The quad-core multiprocessor shown in Figure 2 uses directory-based
4) (10 pts) The quad-core multiprocessor shown in Figure 2 uses directory-based cache coherence implemented in the shared L2 cache. Each processor has an L1 write-back private cac…
4) (20 marks) Write a C program named a5q4.c which reads standard input and repo
4) (20 marks) Write a C program named a5q4.c which reads standard input and reports at the end the counts and frequencies of all letters and the space character. The program must …
4) (20 marks) Write a C program named a5q4.c which reads standard input and repo
4) (20 marks) Write a C program named a5q4.c which reads standard input and reports at the end the counts and frequencies of all letters and the space character. The program must …
4) (2pts) Your company is working on a ridesharing service that matches multiple
4) (2pts) Your company is working on a ridesharing service that matches multiple users together for short rides to their locations. It does this by trying every possible assignmen…
4) 5 processes cooperate to complete a task, as shown in the following figure to
4) 5 processes cooperate to complete a task, as shown in the following figure to 0 to describe the execution of the 5 processes, so that the in the figure can be guaranteed. (10 p…
4) A binary tree class uses the BSTNode class for its nodes and has one field
4) A binary tree class uses the BSTNode<T> class for its nodes and has one field:               private BSTNode<T> root; Write a method for this class which returns th…
4) A capacitor is constructed of two concentric conducting cylindrical sheels. T
4) A capacitor is constructed of two concentric conducting cylindrical sheels. The radius of the inner cylindrical shell is 2.36 x 10-3 m, and that of the outer shell is 2.49 x 10…
4) A rocket with initial mass mo 150 burns fuel at the rate q1. The burn time b-
4) A rocket with initial mass mo 150 burns fuel at the rate q1. The burn time b-45, the exhaust velocity of the burned fuel u-9000, the rocket's height at burnout Y 1633.72086, th…
4) Assuming all necessary packages are imported, fill in the blanks of following
4) Assuming all necessary packages are imported, fill in the blanks of following event driven program where the program allows user to move a Circle left or right by clicking two …
4) Box A, of mass m, slides without friction over the icy hill of height h=8.50
4) Box A, of mass m, slides without friction over the icy hill of height h=8.50 m, shown in the figure. Once at the top of the hill, it experiences an elastic collision with a box…
4) Complete the script to accomplish the following tasks using Perl built-in fun
4) Complete the script to accomplish the following tasks using Perl built-in functions: (10 pts.) %friends = ( Gary Lucy an ->"Dallas". => "Exeter". "Reading", Samantha>"…
4) Consider the following graph. Fiction Book Sales 120,000.00 $100,000.00 580,0
4) Consider the following graph. Fiction Book Sales 120,000.00 $100,000.00 580,000.00 Young Adut $60 000.00 ClassicsS Mysteny Romance ScHFI& Fantasy $40,000.00 $20,000.00 $0.0…
4) Consider the two-factor ANOVA concrete data available in a separate file (ada
4) Consider the two-factor ANOVA concrete data available in a separate file (adapted from Kuehl's nice Design of Experiments text). The first factor, called Aggregate has levels o…
4) Consider this code that creates some Location objects with coordinates x-10 a
4) Consider this code that creates some Location objects with coordinates x-10 and y 20 Location a, b, c; a = new Location( 10,20) b = new Location( 10,20); After this code execut…
4) Create the following class. You will NOT need setters and getters for this. T
4) Create the following class. You will NOT need setters and getters for this. There will however be 1 constructor as indicated. class BallGame string homeTeam string awayTeam; in…
4) Determine the number of character comprasions that will bemade by the brute f
4) Determine the number of character comprasions that will bemade by the brute force algorithm in searching for the patternGANDHI in the text THERE_IS_MORE_TO_LIFE_THAN_INCREASING…
4) E5.9 A compass needle points a given number of degrees away from North, measu
4) E5.9 A compass needle points a given number of degrees away from North, measured clockwise. Write a program that reads the angle and prints out the nearest compass direction; o…
4) For task ‘d’, move the code that converts the grade value to a letter grade f
4) For task ‘d’, move the code that converts the grade value to a letter grade from the event handle to its own method. RESTRICTIONS: i) This method will have, at least, one param…
4) For the RC circuit shown, find: a) the current when the switch is first close
4) For the RC circuit shown, find: a) the current when the switch is first closed ; b) the final charge stored on the capacitor and c) the time constant for the circuit. For the R…
4) If you changed the kernel so it didn\'t generate SIGCHLD signals, how would t
4) If you changed the kernel so it didn't generate SIGCHLD signals, how would the behavior of userspace programs change? 10) What system calls are used to list all the files in a …
4) Implement the Secant method algorithm asa MATLAB function using the pseudocod
4) Implement the Secant method algorithm asa MATLAB function using the pseudocode provided below The inputs to the function should be the initial guessesxi and x-1(xi and xim1), t…
4) In this problem, you will investigate a more efficient way to implement spati
4) In this problem, you will investigate a more efficient way to implement spatial filtering when all the filter coefficients have the same value. The motivation comes from the ob…
4) Last week, you wrote the C++ program to calculate the 50 T roots of the quadr
4) Last week, you wrote the C++ program to calculate the 50 T roots of the quadratic equation ax'+bx+c-0 using thoe formula: x1.2- 2a But, if 4ac >b then the value under the sq…
4) Let R be a relation on the set [1,2,3,., 8,9,10). aRb is in the relation if a
4) Let R be a relation on the set [1,2,3,., 8,9,10). aRb is in the relation if a and b are distinct integers and there is a common divisor that is not 1 shared between a and b. 2R…
4) Let rand (n) be a library function that evaluates to a random integer in Z ea
4) Let rand (n) be a library function that evaluates to a random integer in Z each time it is called (like Java's Random.nextInt (n)). Write a method called createRandomFunction (…
4) Match the correct definition of deadlock conditions. Each resource is either
4) Match the correct definition of deadlock conditions. Each resource is either currently assigned to exactly one process or is available. Processes currently holding resources th…
4) Modify the “stack.c” program we looked at in class (available on D2L) such th
4) Modify the “stack.c” program we looked at in class (available on D2L) such that the variable “top” is a pointer to the “contents” array rather than a regular variable. The poin…
4) Of these cipher suites, which one or two would you consider the most secure (
4) Of these cipher suites, which one or two would you consider the most secure (and hence, the most desired?) Why? (Write at least a paragraph) Wireshark . Packet 42.google - AES …
4) PE 05b_04 (Roll Two Dice) Write a function that generates a random number sim
4) PE 05b_04 (Roll Two Dice) Write a function that generates a random number simulating the roll of two six-sided dice. The function should take no arguments and return a random n…
4) Represent the object as OBJECT IDENTIFIERs starting from the root for the thr
4) Represent the object as OBJECT IDENTIFIERs starting from the root for the three network components in figure 4.2 a) hub in figure 4.2(a) in hybrid format b) hub in figure 4.2(b…
4) Short questions: The access time of memory is ............... the time requir
4) Short questions: The access time of memory is ............... the time required for performing any single CPU operation. A) Longer than B) Shorter than C) Negligible than D) Sa…
4) Short questions: The access time of memory is ............... the time requir
4) Short questions: The access time of memory is ............... the time required for performing any single CPU operation. A) Longer than B) Shorter than C) Negligible than D) Sa…
4) Show the output produced by the following: A: int x = 2, y=2; if( x++>2 || ++
4) Show the output produced by the following: A: int x = 2, y=2; if( x++>2 || ++y < 3) cout << x-y ; else cout << -- y ; A:This code segment will display a value…
4) Take the cameraman image (standard test image of MATLAB). a) Determine the sa
4) Take the cameraman image (standard test image of MATLAB). a) Determine the sample entropy of this image b) Get a Huffman coder (from internet). Apply to cameraman image, and de…
4) The factorial of a nonnegative integer n is written n! (pronounced \"n factor
4) The factorial of a nonnegative integer n is written n! (pronounced "n factorial") andis defined as follows: n! = n * (n-1) * (n-2) * ... * 10! = 1 and 1! = 1 by definition. For…
4) The idea behind inheritance is to allow one to inherit some and from a previo
4) The idea behind inheritance is to allow one to inherit some and from a previously defined . In this way, the new can have a smaller definition while still containing all of the…
4) Use 5) For each X = 0xAC and Y-0x8F a truth table to prove or disprove: ab+ a
4) Use 5) For each X = 0xAC and Y-0x8F a truth table to prove or disprove: ab+ a5+ ac (a+6 +c (a+b) (a+a a) Convert X and Y to 8-bit binary values b) Compute binary sum of results…
4) Using the floating point format described in problem 5.19 of your text, conve
4) Using the floating point format described in problem 5.19 of your text, convert 1025.125 base 10 to the floating point representation. 5.19 Convert the following binary and hex…
4) We are interested in two implementations of a machine, one with and one witho
4) We are interested in two implementations of a machine, one with and one without special floating-point hardware. Consider a program P with the following mix of operations: Inst…
4) We introduced the idea of I/O bound and CPU bound processes, and suggested th
4) We introduced the idea of I/O bound and CPU bound processes, and suggested that the scheduler should maintain a good process mix.   In a multiprogramming/multitasking OS what s…
4) Which of the following is true about stacks, queues and priority queues? a. F
4) Which of the following is true about stacks, queues and priority queues? a. For a stack, if you push 5 elements, perform pop 4 times, push 3 new elements, the very first elemen…