Web development and programming
191828 questions • Page 393 / 3837
5. Write a function called convert_temp. Here is the function\'s prototype: void
5. Write a function called convert_temp. Here is the function's prototype: void convert_temp(int, char, int *, char *); In other words, convert_temp is passed 4 parameters: an int…
5. Write a function euclid2(x,y) that computes the squared Euclidean distance be
5. Write a function euclid2(x,y) that computes the squared Euclidean distance between two vectors of similar shape: d(Vector x, Vector y)=Sigma i=1 to N(xi-yi)^2 where N is the le…
5. Write a function named deleteG that accepts one character pointer as a parame
5. Write a function named deleteG that accepts one character pointer as a parameter and returns no value. The parameter is a C string. This function must remove all of the upper a…
5. Write a function with the following prototype: /* Determine whether arguments
5. Write a function with the following prototype: /* Determine whether arguments can be subtracted without overflow/ int tsub_ok(int x, int y); This function should return 1 if th…
5. Write a function, contains(x,y), which determines if x appears anywhere withi
5. Write a function, contains(x,y), which determines if x appears anywhere within y. If they are of the same size, then x and y must be equivalent. Otherwise, x may start at any p…
5. Write a function, ionah, that takes a single number as input and prints out t
5. Write a function, ionah, that takes a single number as input and prints out the solution to the inverted disk problem for that many disks. This is the problem of moving a stack…
5. Write a game that plays many rounds of rock-paper-scissors. The user and comp
5. Write a game that plays many rounds of rock-paper-scissors. The user and computer will each choose between three items: rock (defeats scissors, but loses to paper), paper (defe…
5. Write a program that reads in a line of text and replaces all four-letter wor
5. Write a program that reads in a line of text and replaces all four-letter words with the word “love”. For example, the input string I hate you, you dodo! Programming Projects 5…
5. Write a query that displays the longest stay of any guest at the hotel chain.
5. Write a query that displays the longest stay of any guest at the hotel chain. The length of a guests stay is the end date of the stay minus the start date of the stay plus one.…
5. Write a recursive function sumTreeNodeHelper that sums the elements of a bina
5. Write a recursive function sumTreeNodeHelper that sums the elements of a binary search tree starting with the smallest element and adding elements in order up to the largest el…
5. Write a recursive function sumTreeNodeHelper that sums the elements of a bina
5. Write a recursive function sumTreeNodeHelper that sums the elements of a binary search tree starting with the smallest element and adding elements in order up to the largest el…
5. Write a second Python program to determine Fibonacci numbers. This program sh
5. Write a second Python program to determine Fibonacci numbers. This program should include a recursive function to that finds the Fibonacci number of a given argument Fibonacci …
5. Write a single instruction using 16-bit operands that clears the high 8 bits
5. Write a single instruction using 16-bit operands that clears the high 8 bits of AX and does not change the low 8 bits. 6. Write a single instruction using 16-bit operands that …
5. Write a statement that causes the current thread to pause for at least 5 seco
5. Write a statement that causes the current thread to pause for at least 5 seconds. 6. Given a class named MonitorThread that extends the Thread class, write code to cre…
5. Write a while loop that will repeatedly request whole numbers from the user.
5. Write a while loop that will repeatedly request whole numbers from the user. When the user enters 0, a report should be printed saying how many numbers were entered and their s…
5. Write a whole program that does the following: The program should create 8-le
5. Write a whole program that does the following: The program should create 8-letter passwords, made up of 8 random letters, until the user is satisfied Specifically, it should do…
5. Write an INSERT statement that adds these rows to the Invoice_Line_Items tabl
5. Write an INSERT statement that adds these rows to the Invoice_Line_Items table: (All in MySQL) invoice_sequence: 1 2 Account_number: 160 527 line_item_amount: $180.23 $254.35 l…
5. Write an algorithm that, given a bank account balance, classifies and prints
5. Write an algorithm that, given a bank account balance, classifies and prints the account status as “overdrawn” if the balance is negative, “empty” if the balance is zero, and “…
5. Write code that executes the following SELECT statement: SELECT Title, Year F
5. Write code that executes the following SELECT statement: SELECT Title, Year FROM Movies WHERE DIRECTOR = 37 ORDER BY Year DESC You may assume that a connection to the databas…
5. Write out True/False next to each statement (10 points): A. Simpson\'s Rule h
5. Write out True/False next to each statement (10 points): A. Simpson's Rule has more truncation error than Trapezoidal Rule Fals B. Double precision numbers exhibit more round o…
5. Write the declaration for which, a pointer to a constant char. 6. Declare a c
5. Write the declaration for which, a pointer to a constant char. 6. Declare a constant object of the class Student. Assume that the default constructor for the class will supply …
5. You are at a party attended by n people (not including yourself), and you sus
5. You are at a party attended by n people (not including yourself), and you suspect that there might be a celebrity present. A celebrity is someone known by everyone, but does no…
5. You are given a String variable aStr that contains a String. Write a segment
5. You are given a String variable aStr that contains a String. Write a segment of Java code that will count the number of times a lowercase letter 'e' appears in aStr, and will p…
5. You can use a 32-bit processor to install the Hyper-V role as long as it supp
5. You can use a 32-bit processor to install the Hyper-V role as long as it supports virtualization extensions. True or False? 6. Which networking protocol is installed by defaul…
5. You have a Main method that calls the following method: Where should the Cold
5. You have a Main method that calls the following method: Where should the ColdCallFileFormatException be caught if thrown? A. By the Open method's catch (FormatException e) bloc…
5. You have been promoted to Director of Technical Support Services. One of the
5. You have been promoted to Director of Technical Support Services. One of the goals you have identified for your department is to ensure that all employees have effective interp…
5. You want to automate grading the multiple choice part of an exam, and the ans
5. You want to automate grading the multiple choice part of an exam, and the answers are in a file. Open the open file test3_Answers.txt, using the file handle inFile. Populate an…
5. Your army consists of a line of N giants, each with a certain height. You mus
5. Your army consists of a line of N giants, each with a certain height. You must designate precisely L S N of them to be leaders. Leaders must be spaced out across the line; spec…
5. [10 marks] Assume that fifteen 800-bps terminals, a number of 400-bps termina
5. [10 marks] Assume that fifteen 800-bps terminals, a number of 400-bps terminals, and thirty 200- bps terminals are to be time-multiplexed in a character-interleaved format over…
5. [12 marks] Banks have long been targets for criminals and now with the prolif
5. [12 marks] Banks have long been targets for criminals and now with the proliferation of online banking it has become even more difficult for banks to protect their assets. Most…
5. [15 marks] An n-bit register can hold 2^n distinct bit patterns. As such, it
5. [15 marks] An n-bit register can hold 2^n distinct bit patterns. As such, it can only be used to address a memory whose number of addressable units (typically, bytes) is less t…
5. [15 points] For each of the function header blocks below, give an appropriate
5. [15 points] For each of the function header blocks below, give an appropriate prototype and implementation. a) [6 points] In this question you may assume that implementations a…
5. [15] Consider the following code: public void printNumbers(int start, int end
5. [15] Consider the following code: public void printNumbers(int start, int end) { for (int i = start; i < end; ++i) System.out.println(i); } public void printNumbersThreaded(…
5. [2 points Lists of lists! In Python, you can test whether a variable referenc
5. [2 points Lists of lists! In Python, you can test whether a variable references a list or not using the isinstance function. Here's an example >>> isinstance(a, list) …
5. [20 points] Write a function with the following signature: int sort_by_name (
5. [20 points] Write a function with the following signature: int sort_by_name (const char *filename); The file specified by filename contains the binary representation of an arra…
5. [30 pts, 5 pts eachl Suppose you add registers to the 16-bit prefix adder as
5. [30 pts, 5 pts eachl Suppose you add registers to the 16-bit prefix adder as shown in the figure below (registers indicated by blue rectangles) (a) What is the minimum cycle ti…
5. [40 points] Use the following UML diagram and the partially completed code fo
5. [40 points] Use the following UML diagram and the partially completed code for the class Bottle. Complete the code. a. [10 points] Add the properties. b. [10 points] Impl…
5. [40 points] Write a C program with a subroutine that called MoviePassMember t
5. [40 points] Write a C program with a subroutine that called MoviePassMember that checks if the person is a member or not. If he/she is a member, the price is $4 for all ages. I…
5. [6pts] Following is the output of running \"traceroute facebook.com\" command
5. [6pts] Following is the output of running "traceroute facebook.com" command on moat.cis.uab.edu tracereute to facebook.com (173.252.110.27), 30 hops max, 60 byte packets 1138 2…
5. [8 points] If, initially, the ColdFire registers contain: d0-0x3456E8CA. dl-0
5. [8 points] If, initially, the ColdFire registers contain: d0-0x3456E8CA. dl-0x88008ABB, a0 = 0x8FFB3CD I , what will be the contents of these registers following the instructio…
5. [Graph Representation] Consider the following undirected graph G. 2 0 5 (i) D
5. [Graph Representation] Consider the following undirected graph G. 2 0 5 (i) Draw the adjacency-lists representation and the adjacency matrix representation of G. 8 Marks] (ii) …
5. [after §7.9-moderatel Fraction Handler : a) Write a Fraction class that imple
5. [after §7.9-moderatel Fraction Handler : a) Write a Fraction class that implements these methods add-This method receives a Fraction parameter and adds the parameter fraction t…
5. a) List and then briefly explain the four (4) main criteria for assessing the
5. a) List and then briefly explain the four (4) main criteria for assessing the success of a project (8 pts) b) As a project manager you will frequently receive several different…
5. a) The Tor (The Onion Router) browser was described as a particular implement
5. a) The Tor (The Onion Router) browser was described as a particular implementation of onion routing. Explain why the onion router prevents any intermediate node from nkkowing t…
5. a). Does the Raspberry Pie use RISC architecture or CISC architecture? (you m
5. a). Does the Raspberry Pie use RISC architecture or CISC architecture? (you may need to google this one). Select one: a. Neither b. Both c. RISC d. CISC b). The CPU executes an…
5. a. Write a class definition for an Order class for a nightclub that contains
5. a. Write a class definition for an Order class for a nightclub that contains a table number, a server’s name, and the number of patrons at the table. Include a private static d…
5. a. Write a line of code that asks the user the meaning of life, only accepts
5. a. Write a line of code that asks the user the meaning of life, only accepts numeric input, and saves the answer in variable D1 b. Write a line of code that asks the user how t…
5. mostFrequentLetters(s) 13 pts] Write the function mostFrequentLetters(s), tha
5. mostFrequentLetters(s) 13 pts] Write the function mostFrequentLetters(s), that takes a string s, and ignoring case (so "A" and "a" are treated the same),returns a lowercase str…
5. points Look at the folowing statements. char strti -237.83 value. double valu
5. points Look at the folowing statements. char strti -237.83 value. double value: to a double and stores the resultin Write a statement tatoomwertste stingin 5 points Look at the…
5. which of the following is true regarding table views? A. datasheet views show
5. which of the following is true regarding table views? A. datasheet views shows a detailed view of the table design you can add edit and delete records using design view B. chan…
Subject
Web development and programming
Use Browse or pick another subject.