Web development and programming
191828 questions • Page 372 / 3837
4) Write a Bash shell script named “shiftCase.sh” that a. Convert the supplied s
4) Write a Bash shell script named “shiftCase.sh” that a. Convert the supplied string arguments to all uppercase or all lowercase depending on the supplied flag b. If the flag is …
4) Write a Java program to compute the truth table for this \"optimal\" Boolean
4) Write a Java program to compute the truth table for this "optimal" Boolean polynomial. For each row of the truth table, the main program should call an int function LCircuit, h…
4) Write a SQL query to find information (created date, type of object and name
4) Write a SQL query to find information (created date, type of object and name of object) about objects in your database. You need only objects whose type is FUNCTION in your que…
4) Write a computer program that prompts the user for one number, n for the numb
4) Write a computer program that prompts the user for one number, n for the number of items in the array to sort, and create and sort 1000 arrays of this size timing the run to ge…
4) Write a function that takes the values of a two-card blackjack hands as input
4) Write a function that takes the values of a two-card blackjack hands as input, and returns the point total of the hand. The value of the cards '2' through '9' is equal to their…
4) Write a program that inputs three integers from the keyboard and prints the s
4) Write a program that inputs three integers from the keyboard and prints the sum, average, product, smallest and largest of these numbers.Test Data: (i) Please enter Integer 1 :…
4) Write a recursive method isBackwards that has two String parameters and retur
4) Write a recursive method isBackwards that has two String parameters and returns true if the two Strings have the same sequence of characters but in the opposite order (ignoring…
4) Write code to finish all the functions listed in project1.asm. In project1.as
4) Write code to finish all the functions listed in project1.asm. In project1.asm, an array A of 11 integers are given at the beginning (make sure do not change these integers): 4…
4) ·Wha t is an AVL Tree? How do vL tree SiVe 5) What is a recursive function? u
4) ·Wha t is an AVL Tree? How do vL tree SiVe 5) What is a recursive function? using a op yheh reaeslets Programs (Total: 50 Marks) Write a C++ Program to demonstrate Queue operat…
4). Using the worksheet Data attached file, write a sub that will do the folowin
4). Using the worksheet Data attached file, write a sub that will do the folowing: an anchor cell b). locate the cell where the word Bins is located c). declare a dynamic array (n…
4). Using the worksheet Data in the attached file, write a sub that will do the
4). Using the worksheet Data in the attached file, write a sub that will do the following a). use cell A3 as an anchor cell b). locate the cell where the word Bins is located C). …
4)Read the first 50 lines of input and then write them out in reverse order. Rea
4)Read the first 50 lines of input and then write them out in reverse order. Read the next 50 lines and then write them out in reverse order. Do this until there are no more lines…
4)Write PL/SQL or T-SQL procedures to accomplish the following tasks: a. Obtain
4)Write PL/SQL or T-SQL procedures to accomplish the following tasks: a. Obtain the first name and last name of the author whose number currently is stored in I_AUTHOR_NUM. Place …
4)Write a C program that declares three double1-D arrays of size n=10, namely A[
4)Write a C program that declares three double1-D arrays of size n=10, namely A[n], B[n], and C[n]. Further, the program reads real numbers from keyboard to fill arrays A and B. T…
4)Write, but do not execute, the commands to grant the following privileges: a.
4)Write, but do not execute, the commands to grant the following privileges: a. User Rodriquez must be able to retrieve data from the BOOK table. b. Users Gomez and Liston must be…
4)[findTheMinimum .c ] In your main program, ask the user for 3 numbers. If they
4)[findTheMinimum.c] In your main program, ask the user for 3 numbers. If they are all -1, your loop will end. Otherwise pass those 3 numbers to a function, calculateMin, which wi…
4+ sentences each with examples. 1) Describe the different kinds of \'big data\'
4+ sentences each with examples. 1) Describe the different kinds of 'big data' collected by the organizations described in this case. What did they hope to accomplish by doing so?…
4, (20 pts) Give a (n)-time algorithm LIST-SPLIT that splits a doubly-linked lis
4, (20 pts) Give a (n)-time algorithm LIST-SPLIT that splits a doubly-linked list L at a given node x. The algorithm should return the head of the resulting list that con- tains t…
4, An n × n matrix that is filled with the numbers 1, 2, 3, ,n2 is a magic squar
4, An n × n matrix that is filled with the numbers 1, 2, 3, ,n2 is a magic square if the sum of the elements in each row, in each column, and in the two diagonals is the same valu…
4, Question: Match the TCP/IP model layer to the description. Note that a layer
4, Question: Match the TCP/IP model layer to the description. Note that a layer can be used more than once. a Application b. Transport c. Internet d, Network access _____HTTP …
4, You are to use the algorithm for Winograd\'s Method given on Handout #5 to mu
4, You are to use the algorithm for Winograd's Method given on Handout #5 to multiply the following two matrices: 3 1-21 3 5 ×11-1 2-3 a. Give the contents of the the CF and RF ar…
4, a Java) method that receives two parallel arrays containing names of scores.
4, a Java) method that receives two parallel arrays containing names of scores. local variables students and test to It prints rite Mary.The method header is given. Be sure to dec…
4,Describe a situation where you would give the user a set of items with radio b
4,Describe a situation where you would give the user a set of items with radio buttons; then, describe one where check boxes are more appropriate. 5,Explain the difference between…
4- (6 points) Fill in the blanks: a) __________ is based on travelling datagrams
4- (6 points) Fill in the blanks: a) __________ is based on travelling datagrams through internetworks one hop at a time. The entire route is unknown at the beginning of the journ…
4- Answer the following questions about the diagram below: a. What is this diagr
4- Answer the following questions about the diagram below: a. What is this diagram called? b. Name the Classes in this diagram. c. What does the X mean at the end of the pipeline …
4- Answer the following questions about the diagram below: a. What is this diagr
4- Answer the following questions about the diagram below: a. What is this diagram called? b. Name the Classes in this diagram. C. What does the X mean at the end of the pipeline …
4- Compare/contrast the way we prove theorems in math (formalized informal reaso
4- Compare/contrast the way we prove theorems in math (formalized informal reasoning) versus proving theorems in a formal deductive system such as Hilbert’s. 5- Proofs in the Hilb…
4- For each of the following outputs, write a code segment using either a for or
4- For each of the following outputs, write a code segment using either a for or a while loop that would produce it (you may need to use a nested loop). The code segment must outp…
4- Print the array in reverse . Your program (via a function) should create a ne
4- Print the array in reverse . Your program (via a function) should create a new copy of the array, except that the elements should be in reverse. The function should return a po…
4- write a query that displays the employee’s last namewith the first latter cap
4- write a query that displays the employee’s last namewith the first latter capitalized and all other letters lowercase,and the length of the names, for all employees whose name …
4-1. The logic rung of Figure 10-2 is an example of a: 4-1 a) data compare instr
4-1. The logic rung of Figure 10-2 is an example of a: 4-1 a) data compare instruction. b) data move instruction. c) timer instruction. d) counter instruction…
4-1. What is EC, and what different approaches to competing in cyberspace do com
4-1. What is EC, and what different approaches to competing in cyberspace do companies use? 4-2. What are the primary forms of e-government? Provide examples for each. 4-3…
4-13f. Here is part 4-13 part d, modify the code to produce parts b (separate he
4-13f. Here is part 4-13 part d, modify the code to produce parts b (separate header file student4-13.h for the structure definition, see fields in code to see data fields) and pa…
4-1: They have asked you to design a controller that does the following: If the
4-1: They have asked you to design a controller that does the following: If the nozzle handle switch is depressed and the pump pressure sensor indicates low pressure, then allow g…
4-2 For each of the following statements, what is the amount of storage space re
4-2 For each of the following statements, what is the amount of storage space reserved (in bytes)? Also indicate the initialized data. Verify your answers using your assembler. (a…
4-2 Please do the coding in C language! 4.2 Remember our famous homework#1 progr
4-2 Please do the coding in C language! 4.2 Remember our famous homework#1 program? This program draws a box 20 characters in width and 10 characters in height, using a for horizo…
4-2 The following module is an example of a combination of blocking and nonblock
4-2 The following module is an example of a combination of blocking and nonblocking assignments. module blocking_nonblocking_mixed; reg a, b, c, d, e; // blocking assignments init…
4-2. The following is an example of mixed use of blocking and nonblocking assign
4-2. The following is an example of mixed use of blocking and nonblocking assignments: an example of mixed uae of blocking and nonblocking aa aignmenta module blocking-nonblocking…
4-4. Create a program that will use pointers to determine the average (to 1 deci
4-4. Create a program that will use pointers to determine the average (to 1 decimal place) of a series of grades entered into an array. You can assume a maximum of 15 students a…
4-5. Suppose the program fragment below is input to the assembler . EQU , $050 L
4-5. Suppose the program fragment below is input to the assembler . EQU , $050 LDAK SYM1 ADA LAB2 MUL# SYM3 ; location 1 LOOP: CMA LAB4 JGE LOOP HLT ; location 2 . EQU SYM1,1234 •…
4-8 Assume that the registers are initialized to EAX = 12345D, EBX = 9528D ECX =
4-8 Assume that the registers are initialized to EAX = 12345D, EBX = 9528D ECX = -1275D, EDX = -3001D What is the destination operand value (in hex) after executin…
4-P2 Modify the following Example to accept a string and display the binary equi
4-P2 Modify the following Example to accept a string and display the binary equivalent of the input string. As in the example, the user should be queried about program termination…
4-P5 Using only the assembly language instructions discussed so far, write a pro
4-P5 Using only the assembly language instructions discussed so far, write a program to accept a number in hexadecimal form and display the decimal equivalent of the number. A typ…
4-Which statements placed at //INSERT HERE will cause the following code to comp
4-Which statements placed at //INSERT HERE will cause the following code to complie and print the number 1.5 /I INSERT HERE System.out.printin(x/y) A) ntx- 3 int y B) yte x-300 do…
4-bit shift left reg, Digital Logic Design Consider a 4-bit shift-left register
4-bit shift left reg, Digital Logic Design Consider a 4-bit shift-left register and the driving signal Xin shown below, where Xin=0 prior to t0 and after t7. QO-3 are Os prior to …
4-bit shift left reg, Digital Logic Design Consider a 4-bit shift-left register
4-bit shift left reg, Digital Logic Design Consider a 4-bit shift-left register and the driving signal Xin shown below, where Xin=0 prior to t0 and after t7. QO-3 are Os prior to …
4. (1 pt) In our flu virus simulation, the update function takes the current mat
4. (1 pt) In our flu virus simulation, the update function takes the current matrixrepresenting the health states of the population and computes and returns a new matrix of the he…
4. (10 points The birthday problem is as follows: given a group of n people in a
4. (10 points The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have the same birthday? It is possible to d…
4. (10 points) A co-worker proposes the following protocol: Each plaintext block
4. (10 points) A co-worker proposes the following protocol: Each plaintext block of 128 bits is encrypted with AES, and then XORed with the previous block of ciphertext. For the f…
4. (10 points) Below is a simple test program for testing a copy function #inclu
4. (10 points) Below is a simple test program for testing a copy function #include stdio . h> #include #include char copier (char* src) char* tmpmalloc (strlen (sr)+1); strncpy…
Subject
Web development and programming
Use Browse or pick another subject.