Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 44 / 3837

(6.0) For each IPv4 network prefix given (with length), Identify which of the su
(6.0) For each IPv4 network prefix given (with length), Identify which of the subsequent IPv4 addresses are part of the same subnet. (a) 10.0.130.0/23: 10.0.130.23, 10.0.129.1, 10…
(60 points): A Shape class is given. The Shape class has one data member: type (
(60 points): A Shape class is given. The Shape class has one data member: type (String), which is used to store the type of shape (Rectangle, Right triangle, Square, Circle, etc.)…
(60-141) Lab Exercises #1 (Due at the end of the lab period July 4th or July 9th
(60-141) Lab Exercises #1 (Due at the end of the lab period July 4th or July 9th, 2018) Objectives: Working with iterative and recursive functions Pre-requisite(s): Read and revie…
(6pts) Let us compare between different root-finding methods. You should answer
(6pts) Let us compare between different root-finding methods. You should answer the questions as clear as possible. Show concrete examples is helpful if your explanation is not pr…
(7 > 9) && (6 !=5) A. True or B. False (4 = 0) A. True or B. False What is the c
(7 > 9) && (6 !=5) A. True or B. False (4 = 0) A. True or B. False What is the correct output from the following segment? int A(6), B(1); if (A > B) {A = A*B + 2; B+…
(7 marks) Create a void method called my_reverse with the following signature: p
(7 marks) Create a void method called my_reverse with the following signature: public static void my_reverse(int[] arr, int start, int end) Your method should reverse the elements…
(7 programs in total ) write a c program to Count the number of Vowels and b) Co
(7 programs in total ) write a c program to Count the number of Vowels and b) Consonants occurring in a passage entered by the user irrespective of the case. [Note: You may leave …
(7 pts) Question S: Classes with Inheritance and the Diamond Problem in this pro
(7 pts) Question S: Classes with Inheritance and the Diamond Problem in this problem, different kinds of bats forage for food. Objects in class A are fruiteaters and will eat frui…
(7 pts) Question S: Classes with Inheritance and the Diamond Problem in this pro
(7 pts) Question S: Classes with Inheritance and the Diamond Problem in this problem, different kinds of bats forage for food. Objects in class A are fruiteaters and will eat frui…
(7) (4 points) Considering the following C program void fun1(void) int a, b, c;
(7) (4 points) Considering the following C program void fun1(void) int a, b, c; /*definition 1 void fun2(void) ( int a,c; /*definition 2*/ void fun3 (void) ( int a; /*definition 3…
(7. 5pts) Computational problem solving: Proving correctness/incorrectness Is th
(7. 5pts) Computational problem solving: Proving correctness/incorrectness Is the algorithm below correct or incorrect? Prove it ! It is supposed to count the number of all identi…
(70p] Part II-Implementation-HTML Forms and PHP processing 1. [20p] Use HTML to
(70p] Part II-Implementation-HTML Forms and PHP processing 1. [20p] Use HTML to create a contact form where a user would fill the personal information with the option of saving it…
(7pts) We wish to assign a CIDR block of 1024 addresses (including all 0’s and a
(7pts) We wish to assign a CIDR block of 1024 addresses (including all 0’s and all 1’s), starting at 128.211.192.0. What is the maximum address in this block? [Hint: figure out ho…
(8 Points) Describe the SMURF attack and the SYN flooding attack. SMURF attack •
(8 Points) Describe the SMURF attack and the SYN flooding attack. SMURF attack • The attacker sends a lot of PING packets on the broadcast IP address, and sets the source IP addre…
(8 Points)Instruction Execution Cycle Define the general categories of functions
(8 Points)Instruction Execution Cycle Define the general categories of functions. In the "Definition" column of the table belovw, indicate the definition letter (i.e., "a," "b," "…
(8 points) A data set has 30 different variables containing statistics on 797 ba
(8 points) A data set has 30 different variables containing statistics on 797 baseball players for Atlanta, Baltimore, and Boston in November 2004. Several of the statistics are i…
(8 points) Complete the code for the following replaceinFile function. Its purpo
(8 points) Complete the code for the following replaceinFile function. Its purpose is to copy new file. It uses the find function and replace function from the string library 1. a…
(8 points) In this question, we are going to write a Scheme program that calcula
(8 points) In this question, we are going to write a Scheme program that calculates word counts. The input is a list of words and the output should be counts for words that appear…
(8 points) In this question, we are going to write a Scheme program that calcula
(8 points) In this question, we are going to write a Scheme program that calculates word counts. The input is a list of words and the output should be counts for words that appear…
(8 points) write and test a matlab function requiring reading from a file. See h
(8 points) write and test a matlab function requiring reading from a file. See here about the Mean Center of the US Population https:llen Wikipedia.org/wiki/Mean center of the Uni…
(8 pts) Consider the following C codes to compute the gcd of two integers. /// c
(8 pts) Consider the following C codes to compute the gcd of two integers. /// code 1 #include <stdio.h> int gcd(int a, int b) { while (a != b) { if (a > b) a = a - b; el…
(8%) Consider Program 11-2C on pages 435 and 436 Look at these lines of code fro
(8%) Consider Program 11-2C on pages 435 and 436 Look at these lines of code from this program T0CON=0x0; TMR0H=0x35; TMR0L=0x00; T1CON=0x88; TMR1H=0x35; TMR1L=0x00; Suppose XTAL …
(9 Questions) *What do you believe is on the horizon for patient portals and per
(9 Questions) *What do you believe is on the horizon for patient portals and personal health records? For example, after reading the article by Baird and Nowak (2014), do you beli…
(9 points IPSEC, phase 1, main mode, symmetric key option is illustrated below w
(9 points IPSEC, phase 1, main mode, symmetric key option is illustrated below where K h (IC, RC, gab mod p, RA, RB, KAB), and AB is a symmetric key shared by Alice and Bob. IC, C…
(9) (Modified Monty Hall Problem) You are a contestant in a game show. A single
(9) (Modified Monty Hall Problem) You are a contestant in a game show. A single (1) prize is behind one of 4 closed Doors (A-D). .You choose a Door, call it "Door A." We do not kn…
(9) Declare appropriate variables and use If then Else statements to write VB co
(9) Declare appropriate variables and use If then Else statements to write VB code to determine amount of tip to be given to a waiter in a restaurant. The user inputs total bill i…
(9) Facebook’s dilemma (pg 337-339) 1. What concepts in this chapter are illustr
(9) Facebook’s dilemma (pg 337-339) 1. What concepts in this chapter are illustrated in this case? 2. What is the role of e-commerce and web 2.0 technologies in face books Widespr…
(90 pts) Implementation: Problem Statement You will write a program to play blac
(90 pts) Implementation: Problem Statement You will write a program to play blackjack using C++ classes. Blackjack is a card game that has a dealer and 1 or more players who are t…
(A Vehicle Identification Number (VIN) is a unique code (e.g.: 1G6AF5SX6D0125409
(A Vehicle Identification Number (VIN) is a unique code (e.g.: 1G6AF5SX6D0125409) used by the automotive industry to identify individual vehicles. Since 1981, each on-road vehicle…
(A Warning in C )(C4047) How can i fix it? like the title, I am write a function
(A Warning in C )(C4047) How can i fix it? like the title, I am write a function code which is to determines if the character in a file call "input.dat" file is an alpha or digit …
(A one-way function is an efficiently computable function f from a domain A to a
(A one-way function is an efficiently computable function f from a domain A to a codomain B, f : A B, such that for every efficient (possibly probabilistic) algorithm Adv taking a…
(A prime number, p, is called a Sophie Germain Prime if both p and 2p+1 are prim
(A prime number, p, is called a Sophie Germain Prime if both p and 2p+1 are primes. The first few Sophie Germain Primes are 2, 3, 5, 11, 23, 29, 41, 53, 83, 89, 113, 131, etc. It …
(A) A company wants to transmit data over thetelephone, but is concerned that it
(A)   A company wants to transmit data over thetelephone, but is concerned that its phones may be tapped. It hasasked you to write a program that will encrypt the data so that itm…
(A) Assume that a function has been called and the $ra is now0x00404010. The PC
(A) Assume that a function has been called and the $ra is now0x00404010. The PC is currently 0x00402000. What is the address of the jal instruction that called the function? (B) A…
(A) Create a program in Clojure that displays a collection of twelve strings in
(A) Create a program in Clojure that displays a collection of twelve strings in a random order. Each time the program is run, the ordering of the strings in the displayed sequence…
(A) Declare the variable town as a reference to a String object and initialize i
(A) Declare the variable town as a reference to a String object and initialize it to "Anytown, USA". (B) write an assignment statement that invokes the length method of the string…
(A) Define the propositions p=“You obey the speed limit” and q=“You are going to
(A) Define the propositions p=“You obey the speed limit” and q=“You are going to a wedding”. Write the following sentences as compound propositions using p and q: 1. Failing to ob…
(A) Find the magnetic flux through a circular loop 4.8 c m in diameter oriented
(A) Find the magnetic flux through a circular loop 4.8cm in diameter oriented with the loop normal at 46? to a uniform 50mT magnetic field. (B) A conducting loop of area 210cm2 an…
(A) In MATLAB, write a function dayName that consumes a parameter, day , contain
(A)   In MATLAB, write a function dayName that consumes a parameter, day, containing the numerical value of a day in the month of March 2014. For example: dayName(8) should return…
(A) Talk about the Von Neumann architecture (model), define it and mention its p
(A) Talk about the Von Neumann architecture (model), define it and mention its properties, etc. (B) Talk about the difference between hardwired and Micro programmed control that a…
(A) The Memory class: Create a public class called Memory which represents the m
(A) The Memory class: Create a public class called Memory which represents the memory unit in our computer simulator and that contains: o A private attribute called contents of an…
(A) Write a Java class, called LetterGradeConverter, encapsulating the concept o
(A) Write a Java class, called LetterGradeConverter, encapsulating the concept of converting integer grades to letter grades (A, B, C, D, or F), assuming grades are composed of a …
(A) Write the function \"sumAll\" that has three parameters: $a0 holding an addr
(A) Write the function "sumAll" that has three parameters: $a0 holding an address in data memory,  $a1 holding the total number of words to sum and $a2 holding the location of the…
(A). Lori first coded recursive binarySearch() as follows. Where did she go wron
(A). Lori first coded recursive binarySearch() as follows. Where did she go wrong? public static int binarySearch ( int[] coll, int target ) { int first = 0, last = target.length,…
(ABF, BCF, CDF, CEF, CFG) ABF rightarrow CDEG AB rightarrow C, C rightarrow A, B
(ABF, BCF, CDF, CEF, CFG) ABF rightarrow CDEG AB rightarrow C, C rightarrow A, BC rightarrow D, D rightarrow EG, BE rightarrow C, CG rightarrow B, CE rightarrow G The following is…
(ANSWER USING PYTHON 3.6) Write a function named file_stats that takes one strin
(ANSWER USING PYTHON 3.6) Write a function named file_stats that takes one string parameter (in_file) that is the name of an existing text file. The function file_stats should cal…
(ARM Instructions & Arithmetic) An 32-bit ARM processor performs binary arithmet
(ARM Instructions & Arithmetic) An 32-bit ARM processor performs binary arithmetic on signed half-word (i.e. 16-bit) operands using the 2’s complement scheme (i.e. with the le…
(ARP and Switch Self-Learning) The following network has 9 hosts (A-F) and 4 swi
(ARP and Switch Self-Learning) The following network has 9 hosts (A-F) and 4 switches (S1-S4) marked with link numbers. Suppose that host A and D have completed DHCP and so they b…
(ARRAYS) Soccer team roster (C) (#include ) This program will store ros
(ARRAYS) Soccer team roster (C) (#include <stdio.h>) This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a…
(ASSEMBLY LANGUAGE) Use the MARS (MIPS) assembler, or equivalent, to develop a p
(ASSEMBLY LANGUAGE) Use the MARS (MIPS) assembler, or equivalent, to develop a program that will do the following: 1.Write a program that calculates the summation of a number usin…