Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 409 / 3837

7. Given the E-R diagram shown below, give a database schema (ie. list of relati
7. Given the E-R diagram shown below, give a database schema (ie. list of relations) for it. The keys of each entity are shown in quotes, Research Assistant is a weak entity. Proj…
7. Given the Player class below: public class Player { public int strength; publ
7. Given the Player class below: public class Player { public int strength; public int defense; public boolean magic; } implement a method public boolean winsAgainst(Player other)…
7. Given the class declaration class Point { public: Point (int=0, int=0); // in
7. Given the class declaration class Point { public: Point (int=0, int=0); // initializes xCoord and yCoord void setPoint (int, int); // assigns values to xCoord and yCoord int ge…
7. Given the code below, answer the questions. class TestQuestion I Line 1 II in
7. Given the code below, answer the questions. class TestQuestion I Line 1 II ine 2 ILine 3 II Line 4 I Line s II Line 6 string nane; int number public: TestQuestion) TestQuestion…
7. Given the function definition void Twist (int a, int& b) int ci c a2; a -a 3;
7. Given the function definition void Twist (int a, int& b) int ci c a2; a -a 3; b-c+ a What is the output of the following code fragment that invokes Twist? (All variables ar…
7. Here\'s a C program. Please document where indicated. In particular, explain
7. Here's a C program. Please document where indicated. In particular, explain how each pointer expression (e.g., p[i] is a pointer expression, as is *ptr++) works. #include <s…
7. In biological systems it is very common to deal with networks, especially in
7. In biological systems it is very common to deal with networks, especially in neuroscience, where neurons represent the vertices and axons represent the edges of a network. The …
7. In multiversion concurrency control based on timestamp ordering, r1x returns
7. In multiversion concurrency control based on timestamp ordering, r1x returns the most recent version of X among all with C. write-TS(X) > TS(1). d. read TS(X) > TS(1). 8.…
7. In the Link State algorithm, each node broadcasts information to all other no
7. In the Link State algorithm, each node broadcasts information to all other nodes, but it tells them only the costs of its directly connected links. a. True b. False 8. In the B…
7. In the Link State algorithm, each node broadcasts information to all other no
7. In the Link State algorithm, each node broadcasts information to all other nodes, but it tells them only the costs of its directly connected links. a. True b. False 8. In the B…
7. In the space below, complete the definition of add-between, which takes a lis
7. In the space below, complete the definition of add-between, which takes a list ls and an expression x, and inserts x between every two elements of ls. Consider the following ca…
7. In this program below, before the first PUSH is performed, the stack pointer
7. In this program below, before the first PUSH is performed, the stack pointer (ESP) has the value ESP=1000 00F6. What is the final value of ESP after the last POP is performed? …
7. Is there a difference between an individual element of an array and a scalar
7. Is there a difference between an individual element of an array and a scalar variable of the same type? If so, what is the difference? can you tell whether a particul (a) a nam…
7. It is well known that banking transaction require authentication. Every authe
7. It is well known that banking transaction require authentication. Every authentication requires some computations. Suppose it is observed that for these computations, the requi…
7. Jack Ostrich, a notorious pirate, has come across a single-file convoy of mer
7. Jack Ostrich, a notorious pirate, has come across a single-file convoy of merchant ships that he would like to plunder. Some of these ships, however, are well defended, and the…
7. Let f be the following function, written in an imaginary language: void f(int
7. Let f be the following function, written in an imaginary language: void f(int j, int k) { j++; i--; k = i + 2; } Assume that i is global to this function and that a is an array…
7. Linear probing a. is used to insert values into a doubly linked list. b. is a
7. Linear probing a. is used to insert values into a doubly linked list. b. is a method of resolving collisions which uses chaining in a hash table. c. searches linearly thru the …
7. Modify the EchoServer.java code to enable the server to serve each connection
7. Modify the EchoServer.java code to enable the server to serve each connection in a separate thread. That is, make the server multi-threaded. 8. Allow the multi-threaded server …
7. Modify your authentication process to implement the notion of a session. More
7. Modify your authentication process to implement the notion of a session. More explicitly, you should be able to create a session upon successful login and destroy the session a…
7. Open the Temperature Solution (Temperature Solution.sln) file contained in th
7. Open the Temperature Solution (Temperature Solution.sln) file contained in the ClearlyVB2012Chap12Temperature Solution folder. The Calculate button’s Click event procedure shou…
7. Outsourcing in TIBO a. Issues i. No Governance and CEO lack of interest ii. N
7. Outsourcing in TIBO a. Issues i. No Governance and CEO lack of interest ii. No Testing iii. The Service Level Agreement is weak 1. Response Time is slow 2. System not Available…
7. Part One: Define a class for complex numbers. A complex number is a number of
7. Part One: Define a class for complex numbers. A complex number is a number of the form a+b+i For our purposes, a and b are numbers of type double, and i is a number that repres…
7. Permutation Matrices (10 pts) You are given the matrix G Perform the followin
7. Permutation Matrices (10 pts) You are given the matrix G Perform the following matrix multiplications a b] 1 0 101 ?? 0 1 a t 10cd (d) The following matrix is not a permutation…
7. Person and Customer Classes Design a class named Person with fields for holdi
7. Person and Customer Classes Design a class named Person with fields for holding a person’s name, address, and telephone number. Write one or more constructors and the appropria…
7. PersonData and CustomerData classes Design a class named PersonData with the
7. PersonData and CustomerData classes Design a class  named PersonData with the following member variables : lastName firstName address city state zip phone Write the appropriate…
7. Programming problem (conditional branch) (25pts) Assume initialization and st
7. Programming problem (conditional branch) (25pts) Assume initialization and start code are provided. Use conditional branch to complete the code in loop for following program. P…
7. Refer to the following code: private int[] arr; //precondition: arr.length >
7. Refer to the following code: private int[] arr; //precondition: arr.length > 0 public void mystery() {      int s1 = 0;      int s2 = 0;      for (int k = 0; k < arr.leng…
7. SimpleVector Modification Modify the SimpleVector class template, presented i
7. SimpleVector Modification Modify the SimpleVector class template, presented in this chapter, to include the member functions push_back and pop_back. These functions should emul…
7. SimpleVector Modification Modify the SimpleVector class template, presented i
7. SimpleVector Modification Modify the SimpleVector class template, presented in this chapter, to include the member functions push_back and pop_back. These functions should emul…
7. Simulate a coin flip experiment in MATLAB: In this problem we wll use MATIAB
7. Simulate a coin flip experiment in MATLAB: In this problem we wll use MATIAB to simulate an experiment with 60 coin flips. Let us denote 1 as Head and s Tail. Let the probabili…
7. Sofia also wants to reduce the clutter in the mobile version of the home page
7. Sofia also wants to reduce the clutter in the mobile version of the home page. Hide the following elements for mobile users: the aside and the spotlight section element. elemen…
7. Subqueries in FROM and SELECT: nested SELECT statement will in SELECT and FRO
7. Subqueries in FROM and SELECT: nested SELECT statement will in SELECT and FROM clause SELECT A, A A FROM R1.R.R WHERE condition; Subquery in FROM clause will generate a table: …
7. Suppose A1=2, B3 = 4 , what is the value in A9 if typed a. = B3*2/A1/2 + (B3/
7. Suppose A1=2, B3 = 4 , what is the value in A9 if typed a.   = B3*2/A1/2 + (B3/A1/A1) + A1^2                   (^ is for exponentiation operator) b. = = IF(B3 < A1, "greater…
7. Suppose Python function div(n) returns a list containing all the divisors of
7. Suppose Python function div(n) returns a list containing all the divisors of integer n. For instance, div(6) returns [1, 2, 3, 6]. Write a Python function, call it prime(n), th…
7. Suppose that the equal_listsfunction (page 49 of Sebesta) is called with the
7. Suppose that the equal_listsfunction (page 49 of Sebesta) is called with the lists ((A(B))(C)) and ((A(B))(C)) as the arguments. How many calls of equal_lists will be performed…
7. Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps
7. Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps when transmitting, but each user only transmits 40 percent of the time. 7.a. (5 pts.) When circuit …
7. Suppose we implement the IntArrayBag class using two partially-filled, \"para
7. Suppose we implement the IntArrayBag class using two partially-filled, "parallel arrays" instead of a single (partially-filled) array. The first array, data, holds the values o…
7. Suppose you have a set of N project managers and 2N software engineers. Each
7. Suppose you have a set of N project managers and 2N software engineers. Each project manager is only willing to work with certain software engineers. The software engineers hav…
7. T or F? All positive IEEE Standard 754 denormalized numbers are strictly less
7. T or F? All positive IEEE Standard 754 denormalized numbers are strictly less than the smallest positive normalized number. 8. ____________________ Use n to write an expression…
7. Take the first smaller subnet from problem #6, and subnet it further so that
7. Take the first smaller subnet from problem #6, and subnet it further so that you have four subnets of 8 IP addresses each. Find the following: the new subnet mask, how many new…
7. Textbook, exercise 2.3 (page #67): Questions: #4. (25 points) Consider the fo
7. Textbook, exercise 2.3 (page #67): Questions: #4. (25 points) Consider the following algorithm. Algorithm Mystery (n) Input: A nonnegative integer n fori 1 to n do return S a. …
7. The code below implements the Time ADT, without using a class. It produces th
7. The code below implements the Time ADT, without using a class. It produces the following output: 8:30:59PM has passed 8:0:0AM 11:59:59PM 0:0:0AM 8:0:0AM (1) Create a class call…
7. The diagram below represents an associative memory as described in the text.
7. The diagram below represents an associative memory as described in the text. What stable state will the system reach if it is initiated with the top and bottom neurons excited …
7. The figure below shows a small Ethernet LAN. Answer the following questions.
7. The figure below shows a small Ethernet LAN. Answer the following questions. (a) What kind of network topology is used? (b) Assume stations are connected through a switch and i…
7. The figure below shows a small Ethernet LAN. Answer the following questions.
7. The figure below shows a small Ethernet LAN. Answer the following questions. (a) What kind of network topology is used? (b) Assume stations are connected through a switch and i…
7. The following String class declares an operator function == , which compares
7. The following String class declares an operator function ==, which compares two Strings to see if they are equal. A keyword is missing in the space underlined. class String { p…
7. The following memory addresses which represent a linked list of characters in
7. The following memory addresses which represent a linked list of characters in the word ship, and the value of the corresponding head pointer is 22 hex. Change as few pointer va…
7. The latest scores from the Japanese Baseball League are in the table with sch
7. The latest scores from the Japanese Baseball League are in the table with schema Scores(Team, Opponent, RunsFor, RunsAgainst) The data in this table is as follows: Team Opponen…
7. The second byte of an instruction in the immediate addressing mode is A a lab
7. The second byte of an instruction in the immediate addressing mode is A a label B an opcode C an address value D. a data value 8. The addressing mode for the instruction ADD A,…
7. The second byte of an instruction in the immediate addressing mode is A a lab
7. The second byte of an instruction in the immediate addressing mode is A a label B an opcode C an address value D a data value 8 The addressing mode for the instruction ADD A, R…