Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 377 / 3837

4. I want to uncompress and unarchive the file: hello.tar.bz2 What command would
4. I want to uncompress and unarchive the file: hello.tar.bz2 What command would do this? bunzip hello.tar.bz2 gunzip hello.tar.bz2 tar xzf hello.tar.bz2 tar xjf hello.tar.bz2 5. …
4. I want to uncompress and unarchive the file: hello.tar.bz2 What command would
4. I want to uncompress and unarchive the file: hello.tar.bz2 What command would do this? bunzip hello.tar.bz2 gunzip hello.tar.bz2 tar xzf hello.tar.bz2 tar xjf hello.tar.bz2 5. …
4. IP Addresses and Subnets (10 pt. 5 bonus pt) (show all the details/work) a. W
4. IP Addresses and Subnets (10 pt. 5 bonus pt) (show all the details/work) a. What is the 32-bit binary equivalent of the IP address 223.1.3.28 pt) b. Consider a subnet with pref…
4. IWrite out and Submit] The first electronic word processor, the Wang 1200, co
4. IWrite out and Submit] The first electronic word processor, the Wang 1200, could let the user edit one line of text at a time before that text was printed or stored on a casset…
4. If the design requirements of a network exceed the limits of a single LAN the
4. If the design requirements of a network exceed the limits of a single LAN then what device can be used to connect 2 different LANs to meet the overall networking needs? 5. Rece…
4. If we assume uniform hashing, with 100 buckets and 2 keys? ng, what is the pr
4. If we assume uniform hashing, with 100 buckets and 2 keys? ng, what is the probability that a collision wi the (b) 1-10 (c) 1 5. If n initially refers to the head of a non-empt…
4. Implement a randomized version of quicksort that uses the in-place par tionin
4. Implement a randomized version of quicksort that uses the in-place par tioning algorithm described in Sect. 3.6. 5. The goal of this step is to create a class of Integer object…
4. Implement the Bird class using BlueJ. The Bird class has the following fields
4. Implement the Bird class using BlueJ. The Bird class has the following fields: name (String): Stores the name of the bird size (double): Stores the size of the bird flying spee…
4. In a microcomputer the address of memory locations are binary numbers that id
4. In a microcomputer the address of memory locations are binary numbers that identify each memory circuit where a byte is stored. The number of bits that make up an address will …
4. In a microcomputer the address of memory locations are binary numbers that id
4. In a microcomputer the address of memory locations are binary numbers that identify each memory circuit where a byte is stored. The number of bits that make up an address will …
4. In mathematics GCD or Greatest Common Divisor of two or more integers is the
4. In mathematics GCD or Greatest Common Divisor of two or more integers is the largest positive integer that divides both the number without leaving any remainder. Example: GCD o…
4. In mathematics, a rational number is defined as a quotient of two where the d
4. In mathematics, a rational number is defined as a quotient of two where the denominator is not equal to example, 1/ 6/1. and are all rational numbers as are fracti numerator an…
4. In our ALU, we designed an Adder for addition operation. But, we didn\'t desi
4. In our ALU, we designed an Adder for addition operation. But, we didn't design a new Subtractor logic for subtraction operation. How is the subtraction operation is handled in …
4. In spring 2007, the oldest patient in the pathology department of Beth Israel
4. In spring 2007, the oldest patient in the pathology department of Beth Israel Deaconess Medical Center in Boston was a 68-million-year-old Tyrannosaurus rex. For the first time…
4. In the web_client.c program (included in the ZIP), there\'s a call to gethost
4. In the web_client.c program (included in the ZIP), there's a call to gethostbyname, which takes a string and returns a pointer to a struct hostent. Here's a code segment to ill…
4. In work-conserving scheduling a processor is never kept idle if there are one
4. In work-conserving scheduling a processor is never kept idle if there are one or more ready processes on the system. Can a non-work-conserving schedule be the optimal schedule …
4. Indicate whethereach of the following statements is true or false: a. Every c
4. Indicate whethereach of the following statements is true or false: a. Every complete tree is a heap. b. For a given sets of values, there can be only one heap thatcontains thos…
4. Inheritance. Abstract Classes and Interfaces (a) You are asked to write a ser
4. Inheritance. Abstract Classes and Interfaces (a) You are asked to write a series of classes for storing document information for an i. Define an abstract Document class to stor…
4. Input the following database terms (shown below) in the Database Term field 5
4. Input the following database terms (shown below) in the Database Term field 5. Input the term definitions in the Database Definition field. (See example below.) (Most of these …
4. Inter-Domain Routing-BGP (14 marks) a. (6 marks) (Refer to the Figure below)
4. Inter-Domain Routing-BGP (14 marks) a. (6 marks) (Refer to the Figure below) Consider the network shown below. Here a customer (represented by AS100) is connected to two provid…
4. Is the following tree a full binary tree or complete binary tree? 5. Is the f
4. Is the following tree a full binary tree or complete binary tree? 5. Is the following tree a full binary tree or complete binary tree? 2 6. Consider the following binary tree -…
4. JUnit / Input partitionin g Black box testing [32 points] In the EEE dropbox
4. JUnit / Input partitionin g Black box testing [32 points] In the EEE dropbox for Homework 2 (in "INF115-HW-10-31j/CourseFiles") is a Java Jar file called TriangleType.jar. Down…
4. JavaScript JavaScript is a scripting language that has closures, unnamed func
4. JavaScript JavaScript is a scripting language that has closures, unnamed functions, and little to do with Java. (a) The following JavaScript program prints ”43 46 12.” var a = …
4. Joint Probability Distribution Based on weather data from the morning of a da
4. Joint Probability Distribution Based on weather data from the morning of a day, a prediction of the weather in the afternoon can be made. The following variables with probabili…
4. Let A and B be two sorted arrays, each array consists of n real numbers in as
4. Let A and B be two sorted arrays, each array consists of n real numbers in ascending order. Give an algorithm, running in O(log n) time, to compute the median of the elements f…
4. Let A be an array of n distinct numbers. Two elements of A are inverted if i
4. Let A be an array of n distinct numbers. Two elements of A are inverted if i but Au] > A. For example, in the array 12,3,1 the elements 3 and 1 are inverted. (a) (5 pts) Lis…
4. Let T be a rooted tree such that all the leaves have the same depth d, and al
4. Let T be a rooted tree such that all the leaves have the same depth d, and all the internal nodes have exactly b children, and let r be the root of T. Consider T as a graph, an…
4. List all the customer representatives and their corresponding customers. Incl
4. List all the customer representatives and their corresponding customers. Include the representative last name and the customer name, order by the rep's last name in descending …
4. List three methods of passing an argument into a function and two methods of
4. List three methods of passing an argument into a function and two methods of returning values. (2 points cach). i Scie 5. (5 points) Write a for loop to obtain the sum of 23, 2…
4. Magic Squares One interesting application of two-dimensional arrays is magic
4. Magic Squares One interesting application of two-dimensional arrays is magic squares. A magic square is asquare matrix in which the sum of every row, every column, and both dia…
4. Modify the program shell.cpp so that the fiboncacci sequence is used instead
4. Modify the program shell.cpp so that the fiboncacci sequence is used instead of the sequence defined by h = 3*h+1. You should generate the necessary fiboncacci numbers using th…
4. NP-completeness. Let X be a finite set and F a family of subsets of X such th
4. NP-completeness. Let X be a finite set and F a family of subsets of X such that every element of X appears in at least one subset in F. We say that a subset C of F is a set cov…
4. Name this program rpsls.c – The game of rock-paper-scissors was expanded so t
4. Name this program rpsls.c – The game of rock-paper-scissors was expanded so that it now includes rockpaper-scissors-lizard-spock. The expansion was created by Sam Kass and Kare…
4. Name this program rpsls.c – The game of rock-paper-scissors was expanded so t
4. Name this program rpsls.c – The game of rock-paper-scissors was expanded so that it now includes rockpaper-scissors-lizard-spock. The expansion was created by Sam Kass and Kare…
4. Normalization (20 pts) Patient! Patient Visit Doctor | Doctor | Checkin | Che
4. Normalization (20 pts) Patient! Patient Visit Doctor | Doctor | Checkin | Checkout! TF Treatment Unit Price Date ID 100156-ro-8290-0927 Name Number Name Lee 10/1/2016 10/1/2016…
4. Note: A pair is a simple struct with two data members, one of type T and one
4. Note: A pair is a simple struct with two data members, one of type T and one of type T2. A set and a map are organized as binary search trees; an unordered set and an unordered…
4. Object Oriented Programming: Implement a new method for the LinkedList class
4. Object Oriented Programming: Implement a new method for the LinkedList class (lab 6). This method performs a swapping of the head and the tail nodes in a list where it has more…
4. Of #3, in class Interview above, how many are there any static fields? are de
4. Of #3, in class Interview above, how many are there any static fields? are defined? Among them, 5. Of #3 above. How its visibility, return type, parameters). are defined? Descr…
4. Of the choices below, which network service might be the most utilized by loc
4. Of the choices below, which network service might be the most utilized by local clients on a client/server network? (choose all that apply) System logging service File service …
4. On what line number(s) are arrays declared? 7. For every function you identif
4. On what line number(s) are arrays declared? 7. For every function you identified in #4 above: a. Is the function ever called? b. What are the function’s arguments? c. What valu…
4. Over 500 million tweets are sent per day. Assume that the number of tweets pe
4. Over 500 million tweets are sent per day. Assume that the number of tweets per hour follows a Poisson distribution and that Bob receives on average 7 tweets during his lunch ho…
4. PROGRAM: Modify the FriendlyAdd sample program to do a \"FriendlySubtract\".
4. PROGRAM: Modify the FriendlyAdd sample program to do a "FriendlySubtract". Assemble and run it. Then paste the output as your answer. Here is the FriendlyAdd program, and PLEAS…
4. Packet Transmission on LAN Below is a small LAN that includes wired and wirel
4. Packet Transmission on LAN Below is a small LAN that includes wired and wireless computers attached to an Ethernet backbone. Please give all of the MAC addresses (abbreviated a…
4. Packet Transmission on LAN Below is a small LAN that includes wired and wirel
4. Packet Transmission on LAN Below is a small LAN that includes wired and wireless computers attached to an Ethernet backbone. Please give all of the MAC addresses (abbreviated a…
4. Packet Transmission on LAN Below is a small LAN that includes wired and wirel
4. Packet Transmission on LAN Below is a small LAN that includes wired and wireless computers attached to an Ethernet backbone. Please give all of the MAC addresses (abbreviated a…
4. Persistent versus non-persistent TCP connections (10 pts.). Suppose within yo
4. Persistent versus non-persistent TCP connections (10 pts.). Suppose within your Web browser you click on a link to obtain a Web page. Suppose the IP address for the associated …
4. Please explain & solve the following problems step by step to receive a good
4. Please explain & solve the following problems step by step to receive a good rating! Thanks! Assuming that the clock frequency of the microcontroller f = 10 MHz. The main p…
4. Priority queue You have been asked to test the effectiveness of the following
4. Priority queue You have been asked to test the effectiveness of the following different scheduling algorithms for different types of queuing applications. First-In-First-out (F…
4. Problem Solving Write a function ProblemFourA() that reverses a string. Use a
4. Problem Solving Write a function ProblemFourA() that reverses a string. Use an appropriate data structure, implemented by yourself but not publicly available to the client call…
4. Programming Exercise 11 in Chapter 8 (I wrote it below) explains how to add l
4. Programming Exercise 11 in Chapter 8 (I wrote it below) explains how to add large integers using arrays. However, in that exercise, the program could add only integers of, at m…