Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 43 / 3837

(4) 4. A requesting host queries the DNS to learn the IP addross ost cached, whi
(4) 4. A requesting host queries the DNS to learn the IP addross ost cached, which local name server's of a destination h Assuming the root DNS has the address of the intermediate…
(4) Based on Problem P13.10 Write a program that reads a list of strings (a stri
(4) Based on Problem P13.10 Write a program that reads a list of strings (a string per line) from the file data4.txt and inserts them into a binary search tree. You can use the im…
(4) Sales force.com: cloud software services go mainstream (due feb 27th ) page
(4) Sales force.com: cloud software services go mainstream (due feb 27th ) page 152 1 what are the advantages and disadvantages of the cloud computing model? 2what are some of the…
(4) While Loops Create a java program that asks one user for a number(integer) b
(4) While Loops Create a java program that asks one user for a number(integer) between 0-100 (inclusive). If they do not give a number between that keep asking until they do. Then…
(4)For M2 give the sequence of configurations it goes through when started on th
(4)For M2 give the sequence of configurations it goes through when started on the following input: (for the sake of brevity you can just show the configurations before or after a …
(4.0) The following diagram has routers A, B, C, D (4.0) and E; E is the “border
(4.0) The following diagram has routers A, B, C, D (4.0) and E; E is the “border router” connecting the site to the Internet. All router-to-router connections are via Ethernet-LAN…
(4.16) (Finding the factors of an integer ) Write a program thatreads an integer
(4.16) (Finding the factors of an integer ) Write a program thatreads an integer and displays all its smallestfactors.For example, if the input integer is 120 , theoutput should b…
(40 points) Assuming TCP Reno is the protocol experiencing the behavior shown in
(40 points) Assuming TCP Reno is the protocol experiencing the behavior shown in Figure 3.58 on P.296 in the 5th edition textbook (or 306 in the 4th edition textbook), answer the …
(40 points) Credit card numbers follow certain patterns. A credit card number mu
(40 points) Credit card numbers follow certain patterns. A credit card number must have between 13 and 16 digits. The number must start with the following: 4 for Visa cards 5 for …
(40 points) Implement a binary search tree class capable of storing integers. Th
(40 points) Implement a binary search tree class capable of storing integers. There are two points of ambiguity: In the case where an inserted value is already present in the tree…
(40 points) In the game Angry Dogs, you launch dogs at cars that are arranged in
(40 points) In the game Angry Dogs, you launch dogs at cars that are arranged in a line. You get one point for every car within 100 feet where the dog lands. Suppose that you are …
(40 points) Q2. Consider the following relations: Student(sid: integer, sname: s
(40 points) Q2. Consider the following relations: Student(sid: integer, sname: string, major: string, level: string, age: integer) Class(name: string, meets at: string, room: stri…
(40 pts) Write a function named ubitname _ get_LU () that takes (as input) any s
(40 pts) Write a function named ubitname _ get_LU () that takes (as input) any size square matrix and returns (as output s ) the matrices L and U from its LU decomposition in the …
(40pts) Write a MATLAB program that will calculate the least squares line fit y-
(40pts) Write a MATLAB program that will calculate the least squares line fit y-a+bx to a given set of data points (x, y). Your program should consist of the following function an…
(45%) Scheduling and duration of a project. In exam 1 in week 5, you have questi
(45%) Scheduling and duration of a project. In exam 1 in week 5, you have question 1 as follows: Suppose a project consists of 3 tasks each of 3 weeks long as follows. 1 2 3 4 5 W…
(4pts) Given a function of your own choice, find any of its fixed points and sho
(4pts) Given a function of your own choice, find any of its fixed points and show how to numerically compute the fixed point using a code. * You can choose Java, C/C++, Matlab or …
(5 Points) Write C functions to convert a 2\'s complement binary number to decim
(5 Points) Write C functions to convert a 2's complement binary number to decimal and vice versa. I will test the code using function calls similar to below Test for different siz…
(5 marks) Create a VB.NET Windows Form Application that does the following: (1)
(5 marks) Create a VB.NET Windows Form Application that does the following: (1) Display two textboxes and a button. The user is expected to input a student’s A-number into the fir…
(5 points each) Write the necessary lines of code to call the following methods
(5 points each) Write the necessary lines of code to call the following methods that are part of the School object and store any results based on their signatures. 4. a. Schoolfin…
(5 points) All of the method calls in 4b - e are currently non-static. If the me
(5 points) All of the method calls in 4b - e are currently non-static. If the methods were changed to be static, you would need to change one word in each method call Which word w…
(5 points) Given an object named diamond, constructed elsewhere, call the getter
(5 points) Given an object named diamond, constructed elsewhere, call the getter method to get the value of the instance variable diagonal and store it in a new int variable calle…
(5 points) Let T be a binary tree with n nodes. It is realized with an implement
(5 points) Let T be a binary tree with n nodes. It is realized with an implementation of the Binary Tree ADT that has O(1) running time for all methods except positions() and elem…
(5 points) Let T be a binary tree with n nodes. It is realized with an implement
(5 points) Let T be a binary tree with n nodes. It is realized with an implementation of the Binary Tree ADT that has O(1) running time for all methods except positions() and elem…
(5 points) Write a subroutine named ShiftMultiplication that multiplies any unsi
(5 points) Write a subroutine named ShiftMultiplication that multiplies any unsigned 32-bit integer by EAX: Use only shifts and addition instructions Pass the integer to the subro…
(5 points) You have two classes named DummyClass and DummyClassRunner. The codes
(5 points) You have two classes named DummyClass and DummyClassRunner. The codes for these two classes are provided below. //DummyClass.java public class DummyClass { double x, y;…
(5 points) from https://developer.arm.com/technologies/big-little “Arm big.LITTL
(5 points) from https://developer.arm.com/technologies/big-little “Arm big.LITTLE technology is a heterogeneous processing architecture which uses two types of processor. ”LITTLE”…
(5 pts for S70/fbonus for 470)Professor Dogenes has n suposedly dentical integra
(5 pts for S70/fbonus for 470)Professor Dogenes has n suposedly dentical integrated-circuit chips that in principle are capable of testing each other. The professor's test jig acc…
(5 pts – 1 pt/number) Given the following sequence of numbers: 8, 0, -68, 3, 13,
(5 pts – 1 pt/number) Given the following sequence of numbers: 8, 0, -68, 3, 13, 10. If the numbers are inserted into a BST in the sequence provided, then what would the tree look…
(5 pts) 3. Consider the following code. What does it do? put adequate meaningful
(5 pts) 3.         Consider the following code. What does it do? put adequate meaningful comments on each line. For comments don’t explain the code, rather say its overall functio…
(5 pts) Print a game menu for Yahtzee with the following options: 1. Print game
(5 pts) Print a game menu for Yahtzee with the following options:             1. Print game rules             2. Start a game of Yahtzee             3. Exit (2) (5 pts) Get a menu…
(5) At what times is the ACCELERATION zer0 A.) Only at t = 0:0; 8:0 seconds. B.)
(5) At what times is the ACCELERATION zer0 A.) Only at t = 0:0; 8:0 seconds. B.) Only at t = 2:0 seconds. C.) Only at t = 6:0 seconds. D.) Only at t = 2:0; 6:0 seconds. E.) Only a…
(5) Trouble with the terrorist watch-list database ( pg 187) 1. what concepts in
(5) Trouble with the terrorist watch-list database ( pg 187) 1. what concepts in this chapter are illustrated in this case ? 2. why was the consolidated terror watch list created?…
(5) ____________is usually accessed in computer systems by putting the desired a
(5) ____________is usually accessed in computer systems by putting the desired address in a special register. a. Input registers (IR). b. Data register (DR). c. Memory. (6) The ad…
(50 Points) In this assignment you have been given a very simple framework that
(50 Points) In this assignment you have been given a very simple framework that pits an army of Clones against an army of Robots. It is your job to create Clone and Robot classes …
(50 marks) A string in C++ is simply an array of characters with the null charac
(50 marks) A string in C++ is simply an array of characters with the null character() used to mark the end of the string. C++ provides a set of string handling function in <str…
(50 points) Assume the contents of memory are shown below. All values are in hex
(50 points) Assume the contents of memory are shown below. All values are in hexadecimal The table shows four bytes per line; the given address is the starting address of each lin…
(50 points) Suppose a new standard, the IDDD-643 standard, is developed for stor
(50 points) Suppose a new standard, the IDDD-643 standard, is developed for storing numbers in a string of 16 bits. The first bit is used for the sign of the number (0 if positive…
(50 points) Write a program that reads in a line of text and computes the freque
(50 points) Write a program that reads in a line of text and computes the frequency of the words in the text. Assume that the input contains words separated by white spaces, comma…
(50 pt., 10 pt. each) For each of the following relations, determine whether the
(50 pt., 10 pt. each) For each of the following relations, determine whether the relation is: . Reflexive. Anti-reflexive. . Symmetric Anti-symmetric. Transitive. Justify your ans…
(6 )Google vs Microsoft due pg 229 1.define and compare the business strategies
(6 )Google vs Microsoft due pg 229 1.define and compare the business strategies and business models of Google and Microsoft. 2.has the internet taken over the pc desktop as the ce…
(6 POINTS) What value is assigned to SATURATION by the two if-else if statements
(6 POINTS) What value is assigned to SATURATION by the two if-else if statements when X = 1.5, respectively? (1) if (X > 0.0) (2) if (X > 2.0) SATURATION = 0.0; SATURATION =…
(6 marks) Consider the network configuration shown below. The customer network i
(6 marks) Consider the network configuration shown below. The customer network is allocated the address space 140.2.0.0/16. The Border Router A of the customer network advertises …
(6 pts total) Design First (3 pts), Then Write Code (3 pts)!!! To help you pract
(6 pts total) Design First (3 pts), Then Write Code (3 pts)!!! To help you practice functions for Assignment #4, you will write a short program that asks the user to enter a strin…
(6 pts) Consider two different implementations of the same instruction set archi
(6 pts) Consider two different implementations of the same instruction set architecture. The instructions can be divided into four classes according to their CPI (class A, B, C, a…
(6 pts) Network protocols use a layered approach; two of these include the layer
(6 pts) Network protocols use a layered approach; two of these include the layers used by IP and the ISO OSI reference model. The information below is missing a layer. Application…
(6 pts) Provide each result for the following C language expressions. Numbers li
(6 pts) Provide each result for the following C language expressions. Numbers listed without a decimal point are considered integer values and ones with a decimal point are consid…
(6 pts.] Fixed point laration for x-12x1/3 + 12-0 Two obvious candidates for fix
(6 pts.] Fixed point laration for x-12x1/3 + 12-0 Two obvious candidates for fixed-point iteration functions are iCx)-12x3-12 and 92(x)-( (a) First, plot f(x)x-212 for 0x30. Verif…
(6) Display all the contacts records. marks] If the fifth option of the menu, ie
(6) Display all the contacts records. marks] If the fifth option of the menu, ie., 'Display all contacts, is selected, the program should print out all the contact records in the …
(6) Show the number of tasks volunteered by caretakers in descendant order with
(6) Show the number of tasks volunteered by caretakers in descendant order with the names of the caretakers in the following format. This counts all commitments, rescinded, carrie…
(6) Which data structure is used by the compiler to implement function calls? (a
(6) Which data structure is used by the compiler to implement function calls? (a) vector (b) stack (c) two dimensional array (d) list (7) Which of the following statements about s…