Web development and programming
191828 questions • Page 375 / 3837
4. Assume that perfect branch prediction is used that there are no delay slots,
4. Assume that perfect branch prediction is used that there are no delay slots, and that the pipeline has full forwarding support. Also assume that many instructions of this loo…
4. Assume that the node of a linked list is in the usual info-link form with the
4. Assume that the node of a linked list is in the usual info-link form with the info of type int. (list and ptr are pointers of type nodeType.) The following code creates a linke…
4. Assume that the operating system loads: - the floating point exceptions handl
4. Assume that the operating system loads: - the floating point exceptions handling software routine starting at the memory address F080000hex - the illegal op-code exception hand…
4. Assume we have an n x n matrix A (n at least 2). In linear algebra the invers
4. Assume we have an n x n matrix A (n at least 2). In linear algebra the inverse of this matrix can be found by completing the following steps. Determine for each element in A it…
4. Assume you are given the following collection of twelve baskets, each of whic
4. Assume you are given the following collection of twelve baskets, each of which containing three of the six items 1 through 6: {1, 2, 3} {2, 3, 4} {3, 4, 5} {4, 5, 6} {1, 3, 5} …
4. Assume you are given the following collection of twelve baskets, each of whic
4. Assume you are given the following collection of twelve baskets, each of which containing three of the six items 1 through 6: {1, 2, 3} {2, 3, 4} {3, 4, 5} {4, 5, 6} {1, 3, 5} …
4. Basic While Loop O solutions submitted (max: Unlimited) The test suite assign
4. Basic While Loop O solutions submitted (max: Unlimited) The test suite assigns a random number to the variable Number. Write a script that uses a while loop to repeatedly divid…
4. Below is a tree representation of an XML document. The tree has 10 nodes, whi
4. Below is a tree representation of an XML document. The tree has 10 nodes, which we have been numbered 1 through 10. Two of these are text nodes: one containing "Some Text" (lab…
4. Below is a tree representation of an XML document. The tree has 10 nodes, whi
4. Below is a tree representation of an XML document. The tree has 10 nodes, which we have been numbered 1 through 10. Two of these are text nodes: one containing "Some Text" (lab…
4. Build a 2K x 4-bit RAM using any number of 1K x 4-bit RAMs below. The block y
4. Build a 2K x 4-bit RAM using any number of 1K x 4-bit RAMs below. The block you use to represent 2K x 4-bit RAM should have a 11-bit wide address input, a 4-bit wide data input…
4. C++ Write a Client function that merges two instances of the Sorted List ADT
4. C++ Write a Client function that merges two instances of the Sorted List ADT using the following specification. MergeLists(SortedType list1, Sortedtype list2, SortedType& r…
4. C++ Write a Client function that merges two instances of the Sorted List ADT
4. C++ Write a Client function that merges two instances of the Sorted List ADT using the following specification. MergeLists(SortedType list1, Sortedtype list2, SortedType& r…
4. Cache performance The base CPI of a system, excluding memory stalls, is C Loa
4. Cache performance The base CPI of a system, excluding memory stalls, is C Loads and stores collectively constitute LS% of all instructions Accessing the L1 data cache takes K c…
4. Challenge: Another assembler (called NASM) permits the PUSH instruction to li
4. Challenge: Another assembler (called NASM) permits the PUSH instruction to list multiple specific registers. Why might this approach be better than the PUSHAD instruction in MA…
4. Collaborative: We define the Escape Problem as follows. We are given a direct
4. Collaborative: We define the Escape Problem as follows. We are given a directed graph G V, E) (picture a network of roads.) A certain collection of vertices X C V are designate…
4. Collaborative: We define the Escape Problem as follows. We are given a direct
4. Collaborative: We define the Escape Problem as follows. We are given a directed graph G V, E) (picture a network of roads.) A certain collection of vertices X C V are designate…
4. Consider Microprogram store shown in image below a. Why is the PC being place
4. Consider Microprogram store shown in image below a. Why is the PC being placed into the MAR at address 0000000? b. What does the statement at address 0000001 have to do with ex…
4. Consider a 2-d Matrix (square) of size N x N a column Write an iterative (loo
4. Consider a 2-d Matrix (square) of size N x N a column Write an iterative (loop) code segment (algorithm) to compute the sum of the values in each column (one sum per column). A…
4. Consider a CPU that implements two parallel fetch-execute pipelines for super
4. Consider a CPU that implements two parallel fetch-execute pipelines for superscalar processing. Show the performance improvement over scalar pipeline processing and no-pipe…
4. Consider a review website with the following schema, where underlined values
4. Consider a review website with the following schema, where underlined values indicate the primary key. Provide SELECT statements corresponding to the questions below. Businesse…
4. Consider a review website with the following schema, where underlined values
4. Consider a review website with the following schema, where underlined values indicate the primary key. Provide SELECT statements corresponding to the questions below. Businesse…
4. Consider a review website with the following schema, where underlined values
4. Consider a review website with the following schema, where underlined values indicate the primary key. Provide SELECT statements corresponding to the questions below Businesses…
4. Consider an aluminum calorimeter (m = 0.50 kg) with 4.00 kg of water. Both th
4. Consider an aluminum calorimeter (m = 0.50 kg) with 4.00 kg of water. Both the water and the calorimeter begin at a temperature of 45.0 C. An unknown amount of ice (@0 C ) is a…
4. Consider the Algorithm ARRAYFIND, given below, which searches an array A for
4. Consider the Algorithm ARRAYFIND, given below, which searches an array A for an element x Input: An element x and an n-element array, AO,.., n-1]. (Indices start from 0) Output…
4. Consider the SR protocol studied in class with transmit and receive windows W
4. Consider the SR protocol studied in class with transmit and receive windows Wt = 3 and Wr = 3 and sequence numbers 0, 1, 2, 3, 4. (a) Will this instance of the protocol reliabl…
4. Consider the following Hypothetical Computer 15 0 3 4 Address Opcode Instruct
4. Consider the following Hypothetical Computer 15 0 3 4 Address Opcode Instruction Format 15 LSB(0) MSB(15) Integer Format Magnitude Address Contents 7D0I 7D15 001 002 7D22 003 8…
4. Consider the following algorithm, given some input vector x of length n. tota
4. Consider the following algorithm, given some input vector x of length n. total = 30; while n> 0 if x(n) > 0 total - total + x(n) else total = total - x(n) n- n-2; end end…
4. Consider the following code block: spring-holidays [.Nowruz,;. Purin,,, penta
4. Consider the following code block: spring-holidays [.Nowruz,;. Purin,,, pentacost. ;,Chinese New Year'); = for k 1:length(spring-holidays) disp(spring holidays (k) NowrU2 Purim…
4. Consider the following declaration int alpha[3];. Which of the following inpu
4. Consider the following declaration int alpha[3];. Which of the following input statements correctly inputs values into alpha? cin>>alpha >>alpha >>alpha; cin&…
4. Consider the following declaration int alpha[3];. Which of the following inpu
4. Consider the following declaration int alpha[3];. Which of the following input statements correctly inputs values into alpha? cin>>alpha >>alpha >>alpha; cin&…
4. Consider the following description of a system: A company makes shipping prod
4. Consider the following description of a system: A company makes shipping products: envelopes and boxes. The companies products each have a model number, a product name, a whole…
4. Consider the following functions defined recursively a. void Mysteryl (int N)
4. Consider the following functions defined recursively a. void Mysteryl (int N) ( if (N1) System.out print (N) else f Answer System.out print (N) Myateryl (N-1) Myateryl (N-1)1 b…
4. Consider the following list of numbers 5, 12, 25, 32, 38, 46, 58, 62, 85, 9,
4. Consider the following list of numbers 5, 12, 25, 32, 38, 46, 58, 62, 85, 9, 97, 105, 110 For each value below, assume you are using binary search to try to find whether the it…
4. Consider the following list of numbers 5, 12, 25, 32, 38, 46, 58, 62, 85, 90
4. Consider the following list of numbers 5, 12, 25, 32, 38, 46, 58, 62, 85, 90 97, 105, 110 For each value below, assume you are using binary search to try to find whether the it…
4. Consider the following method, between, which is intended to return true if x
4. Consider the following method, between, which is intended to return true if x is between lower and upper, inclusive, and false otherwise. //precondition: lower <= upper //po…
4. Consider the following program, written in JavaScript-like syntax: // main pr
4. Consider the following program, written in JavaScript-like syntax: // main program var x, y, z function sub1() { var a, y, z; . . . } function sub2() { var a, b, z; . . . } fun…
4. Consider the following two different algorithms to raise an integer x to a po
4. Consider the following two different algorithms to raise an integer x to a power of n: 1) long pow2(long x, int n) { if( n == 0 ) return 1; if( n == 1 ) return x; if( isEven( n…
4. Consider the issues related to funds employee’s server data by using workstat
4. Consider the issues related to funds employee’s server data by using workstation and mobile devices within an Institute of Mindfulness. How will the system meet its duty to rec…
4. Consider the network shown below. Suppose AS3 and AS2 are running OSPF for th
4. Consider the network shown below. Suppose AS3 and AS2 are running OSPF for their intra-AS routing iBGP are used for the inter-AS routing protocol. Initially suppose there is no…
4. Consider the network shown below. Suppose AS3 and AS2 are running OSPF for th
4. Consider the network shown below. Suppose AS3 and AS2 are running OSPF for their intra-AS routing protocol. Suppose AS1 and AS4 are running RIP for their intra-AS routing proto…
4. Consider transferring a very big file of L bytes from Host A to Host B. Assum
4. Consider transferring a very big file of L bytes from Host A to Host B. Assume a MSS (Maximum Segment Size) of 1460 bytes. a) What is the maximum value of L such that TCP seque…
4. Construct a test document that shows the test cases to be used for a particul
4. Construct a test document that shows the test cases to be used for a particular program that uses if (This is similar to earthquake.py from lab 2 or 3) temp-int(input("Enter th…
4. Convert the following switch statement into an if/else if statement. switch (
4. Convert the following switch statement into an if/else if statement. switch (choice) t case 1: charges months40; break; case 2: case 3 case 4: charges months 20; break; case 5:…
4. Converting distance values (25 pts) Write a program that converts distance va
4. Converting distance values (25 pts) Write a program that converts distance values. The program should give the user three options: convert a whole number of inches to feet and …
4. Corresponding to Exercise 1 on page 203: • One friend claims that a dual-core
4. Corresponding to Exercise 1 on page 203: • One friend claims that a dual-core system runs at twice the speed as a single-core system; the second friend disagrees by saying that…
4. Create a fourth program called circles.c. In this program define a structure
4. Create a fourth program called circles.c. In this program define a structure called circle A circle is defined by its coordinates (integers x, y) and its radius (float r). Your…
4. Create a function called main. This function should create and initialize a l
4. Create a function called main. This function should create and initialize a list with the following strings: "hulk","spiderman","batman","superman","thor","ironman","captainame…
4. Create a function named addBid(). The purpose of this function is to add a bi
4. Create a function named addBid(). The purpose of this function is to add a bid to the start of the bids, bidders, and bidTime arrays. Add the following commands: a. Using the u…
4. Create an alphabetical list of all criminals, including criminal ID, name, vi
4. Create an alphabetical list of all criminals, including criminal ID, name, violent offender status, parole status, and any known aliases. 5. A table named Prob_Contact contains…
4. Create short names for the terms below based on the naming conventions rules.
4. Create short names for the terms below based on the naming conventions rules. • Undergraduate • Class 5. Identify what is wrong with each of the table names below. …
Subject
Web development and programming
Use Browse or pick another subject.