Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 390 / 3837

5. Extra Credit. A coding system, called Cody, is made of 5 letters only, A, B,
5. Extra Credit. A coding system, called Cody, is made of 5 letters only, A, B, C, D. E. The letters A andE are called vowels, while the letters B, C and D are called consonants A…
5. Falling Distance When an object is falling because of gravity, the following
5. Falling Distance When an object is falling because of gravity, the following formula can be used to determine the distance the object falls in a specific time period: 2gt The v…
5. Fast searching in sorted array. Given an array of integers A sorted in ascend
5. Fast searching in sorted array. Given an array of integers A sorted in ascending order and an integer B, describe a fast algorithm that finds if B is in A, where n is the lengt…
5. File distribution (20 pt.) Consider distributing a file of F = 15 Gbits to N
5. File distribution (20 pt.) Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of us = 30 Mbps, and each peer has a download rate of di = 2 M…
5. First, write down a list of your daily activities that you typically do on a
5. First,   write   down   a   list   of   your   daily   activities   that   you   typically   do   on   a   weekday.   For   instance,   get   out   of   bed,   take   a   showe…
5. For each employee, list the employee ID, number of projects, and the total pe
5. For each employee, list the employee ID, number of projects, and the total percentage of time for the current projects to which she is assigned. Include employees not assigned …
5. From a user point of view the following code snippets give the same results.
5. From a user point of view the following code snippets give the same results. What are the names given to the two different methods and which C++ standards, historically, introd…
5. Generics: (16 points] Consider the following classes public class AnimalHouse
5. Generics: (16 points] Consider the following classes public class AnimalHouse public class Animalf private E animal; public void setAnimal(E x) f animal - x; public class Cat e…
5. Give a list of all the managers(fname, lname and dept). [Hint: Self Join] 6.
5. Give a list of all the managers(fname, lname and dept). [Hint: Self Join] 6. Give a list of all employees(fname, lname and eid) who have their RetirementAccounts in Stocks. 7. …
5. Given the AVL tree shown in Figure 1: a. Give one value to insert into the AV
5. Given the AVL tree shown in Figure 1: a. Give one value to insert into the AVL tree which will cause a double rotation. b. Specify at which two nodes the tree will be rotated a…
5. Given the following information describe as much as information you can gathe
5. Given the following information describe as much as information you can gather from this picture and explain how does this computer find out the IP address of www.google.com? :…
5. Given the grammar G with productions S AS | b, A SA | b (a) Produce all strin
5. Given the grammar G with productions S AS | b, A SA | b (a) Produce all strings in L(G) of length less than or equal to 3. (b) Show that this grammar is ambiguous. (c) Is this …
5. Given the variable declarations below: byte myByte; int myInt; long myLong; c
5. Given the variable declarations below: byte myByte; int myInt; long myLong; char myChar; float myFloat; double myDouble; Which one of the following assignments would need an ex…
5. Here are some problems on NP-completeness and intractability. (a) The decisio
5. Here are some problems on NP-completeness and intractability. (a) The decision version of the INTERVAL SCHEDULING problem is the following INTERVAL SCEDULING DECISION (ISD) Inp…
5. Here is a flow chart of some algorithm. Please write an Arduino code which wi
5. Here is a flow chart of some algorithm. Please write an Arduino code which will accomplish the same. (5 points) You'll have to define your own variables even though that "sligh…
5. Here\'s a short program, echo.c, that prompts the user to enter a string from
5. Here's a short program, echo.c, that prompts the user to enter a string from the standard input and then echos the string back to the standard output: #include <stdio.h> …
5. Hotel Occupancy A hotel\'s occupancy rate is calculated as follows Occupancy
5. Hotel Occupancy A hotel's occupancy rate is calculated as follows Occupancy rate number of rooms occupied ÷ total number of rooms Write a program that calculates the occupancy …
5. IP/Datagram Forwarding (20 pt.) (show all the details/work for all questions-
5. IP/Datagram Forwarding (20 pt.) (show all the details/work for all questions-a.b.c) a. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses (of…
5. IP/Datagram Forwarding (20 pt.) (show all the details/work for all questions-
5. IP/Datagram Forwarding (20 pt.) (show all the details/work for all questions-a.b.c) a. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses (of…
5. Identify wired and wireless communication technologies and discuss the busine
5. Identify wired and wireless communication technologies and discuss the business considerations in determining the applications of network management standards and technologies …
5. If your professor asks you what is the most frequent type of crime in Chicago
5. If your professor asks you what is the most frequent type of crime in Chicago, what would be your answer?J KIDNAPPING LIQUOR LAW VIOLATION MOTOR VEHICLE THEFT NARCOTICS NON CRI…
5. Implement the following method. You may use the LinkedStack class and the Sta
5. Implement the following method. You may use the LinkedStack class and the Stack operations of push, pop, peek, isEmpty, and size. The parameter, exp, is a String that contains …
5. In CP/M, what is the limit (if there is one) to: (a) the size of a file name?
5. In CP/M, what is the limit (if there is one) to: (a) the size of a file name?    (b) the maximum number of files on a disk? (c) the maximum size of a file?    (d) for those lim…
5. In reviewing the hardware components of computers from Chapter 1, the CPU nat
5. In reviewing the hardware components of computers from Chapter 1, the CPU nates the movement of data from one place to another. Thus, each location (word or byte) is given a sp…
5. In the ADO0804, INTR is an tion in the ADC0804? For an ADOos04 chip, find the
5. In the ADO0804, INTR is an tion in the ADC0804? For an ADOos04 chip, find the step size for each ofthe following v (a) vref 2 128 v (b) Vref 2 IV (c) vref2 -1.9 v 7. In the ADC…
5. In the statement q = *ptr_m; Which statement below is the most accurate? A. T
5. In the statement q = *ptr_m;       Which statement below is the most accurate?       A. The address of the pointer ptr_m is being assigned to the variable q. B. The value of th…
5. In this exercise, we will explore the control unit for a cache controller for
5. In this exercise, we will explore the control unit for a cache controller for a processor with a write buffer. Use the finite state machine found slide 129 as a starting point …
5. In your AFS file space, do the following: -PASTE A SCREEN SHOT OF THESE WORK
5. In your AFS file space, do the following: -PASTE A SCREEN SHOT OF THESE WORK TO THIS FILE! a. (2pts)Change the permissions on your home directory and the IT101 directory (see i…
5. Insertion sort can be improved by using binary search to find the next insert
5. Insertion sort can be improved by using binary search to find the next insertion point. However, this does not change the overall complexity of the algorithm. Why? 6. The stand…
5. Java Concepts (a) Explain what a controller class is and what a model class i
5. Java Concepts (a) Explain what a controller class is and what a model class is. Give a specic example. (b) Understand and explain a simple UML class diagram. (c) Name a contain…
5. Joe and Sam are using Public Key encryption. Joe’s public and private keys ar
5. Joe and Sam are using Public Key encryption. Joe’s public and private keys are named Joe-Pub and Joe-Priv. Sam’s public and private keys are named Sam-Pub and Sam-Priv. a) (5 p…
5. Learning Switch Below is an Ethernet switch connecting Classic Ethernet segme
5. Learning Switch Below is an Ethernet switch connecting Classic Ethernet segments 1, 2 and 3 of a small LAN. The column "Event of first table lists packets that are sent on the …
5. Let S be the standard basis for R5. Let B {bi, b2, b3,b4P5} be the ordered ba
5. Let S be the standard basis for R5. Let B {bi, b2, b3,b4P5} be the ordered basis with bi = (2, 1,1,-2,-2) b2 = (0,-2, 4, 5,-4) by = (1,-4, 5, 5,-4) b4 = (5,-4, 2, 3, 1) bs = (4…
5. Line Numbers (This assignment could be done as a modification of the program
5. Line Numbers (This assignment could be done as a modification of the program inProgramming Challenge 2.) Write a program that asks the user for the name of a file. Theprogram s…
5. List the customers who have ordered product bearing product code ‘23109-HB’.
5. List the customers who have ordered product bearing product code ‘23109-HB’. Display first names, last names of customers, invoice numbers and product codes. 6. Display Vendor …
5. Memory-Bandwidth Wall [15 marks] When a cache is used temporally, it acts as
5. Memory-Bandwidth Wall [15 marks] When a cache is used temporally, it acts as a bandwidth amplifier. Specifically, the effective operand bandwidth reaching the pipeline is the a…
5. Method generateSecretCode() Instantiate and instance of Java API class Random
5.Method generateSecretCode() Instantiate and instance of Java API class Random Loop until four of the eight colors have been randomly selected to be the secret code with no dupli…
5. Midland University, like most metropolitan universities, faces a chronic shor
5. Midland University, like most metropolitan universities, faces a chronic shortage of parking spaces on campus. Each stakeholder group in the typical university community (these…
5. Mr. Wannabe of Eco Friendly Design has just found out that their main competi
5. Mr. Wannabe of Eco Friendly Design has just found out that their main competitor, Friendly Ecosystem Design, has moved in next door on the wall adjacent to the patio. He was th…
5. Negate the following statements. 5 points cach (a) The function f(r) has a co
5. Negate the following statements. 5 points cach (a) The function f(r) has a constant derivative and it is linear. (b) If n is even, then is an integer. (c) The number z is even …
5. Now do (but don\'t submit yet) the following additional problems about DFAs:
5. Now do (but don't submit yet) the following additional problems about DFAs: start 4 Figure 1 Additional Problem 5-01 Answer all of the following questions for the DFA shown in …
5. Now, take your SQL statement from #3 above (the one that is not rounded) and
5. Now, take your SQL statement from #3 above (the one that is not rounded) and instead of using the string LIKE ‘%REP%’   use the string LIKE '%SA_REP%' in order to attempt to li…
5. On the standard Touch Tone telepone dial, the digits are mapped onto the alph
5. On the standard Touch Tone telepone dial, the digits are mapped onto the alphabet ( minimaze the lettersQ and Z) as shown in the diagram below: 1, ABC2, DEF3, GHI4, JKL5, MNO6,…
5. On the web view each of the following web sites. Write a short summary of you
5. On the web view each of the following web sites. Write a short summary of your understanding of each. rumkin.com program to test several types of coding. Rate each one on stren…
5. Once upon a time in a kingdom far away, the king hoarded food and the people
5. Once upon a time in a kingdom far away, the king hoarded food and the people starved. His adviser recommended that the food stores be help the people, but the king refused. One…
5. One of the purposes of a(n) is to emit an electromagnetic signal into air or
5. One of the purposes of a(n) is to emit an electromagnetic signal into air or space. a antenna b. modulator c. filter d. mixer A transmitter generates a 15 dBm signal and is con…
5. Password Verifier Imagine you are developing a software package for Amazon.co
5. Password Verifier Imagine you are developing a software package for Amazon.com that requires users to enter their own passwords. Your software requires that users’ passwords me…
5. Please fill the Binary contents of memory address and hex contents of memory
5. Please fill the Binary contents of memory address and hex contents of memory address in the following table: Program Hex MemoryInstruction Address 200 201 202 203 Hex Contents …
5. Professor McGonagall has provided the young wizard Ron with three magical bat
5. Professor McGonagall has provided the young wizard Ron with three magical batteries whose sizes are 42,27,and 16 morts, respectively. (A mort is a unit of wizard energy). The 2…
5. Programmers refer to hidden implementation details as existing in a ____. A)
5. Programmers refer to hidden implementation details as existing in a ____. A) white box B) white hole C) black box D) black hole 26. When a main() method needs to use another me…