Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 68 / 3837

(Write a Python program) Write a recursive function flatten. The function accept
(Write a Python program) Write a recursive function flatten. The function accepts a deeply nested list xs and transforms it into a single-level list. You do not know how deeply th…
(Write a program, and show the output too ) C programming We will write function
(Write a program, and show the output too) C programming We will write functions in three file : 1. deposit.c void deposit ( float *bal, float amount ) { *bal = *bal + amount; } 2…
(Write a program, and show the output too ) C programming Write functions in thr
(Write a program, and show the output too) C programming Write functions in three file : 1. deposit.c void deposit ( float *bal, float amount ) { *bal = *bal + amount; } 2. withdr…
(Write a program, and show the output too ) C programming You will be writing a
(Write a program, and show the output too) C programming You will be writing a simple Bee application. The application will display question 1, wait for the user to type a respons…
(Write a program, and show the output too) C programming #include #inc
(Write a program, and show the output too) C programming #include <stdio.h> #include <string.h> #include <stdlib.h> int main ( ) { // card is an array with 24 ce…
(Write in C) Write a program to read a file of numbers into an array, sort them
(Write in C) Write a program to read a file of numbers into an array, sort them and then print them out along with a few statistics. 1. The program should print "Assignment 7 " wi…
(Write the Lingo Algorithm that will solve this model) OilCo produces oil at two
(Write the Lingo Algorithm that will solve this model) OilCo produces oil at two wells. Well 1 can produce as many as 150,000 barrels per day, and well 2 can produce as many as 20…
(Write the algorithm and the code) Design a program that promps the user to inte
(Write the algorithm and the code) Design a program that promps the user to inter a positive integer. Use a for loop to calculate and display the factorial value of that number. I…
(Write the algorithm and the code) Design a program that promps the user to inte
(Write the algorithm and the code) Design a program that promps the user to inter a positive integer. Use a for loop to calculate and display the factorial value of that number. D…
(Write the code in C, not C++) Write a simple shell (command interpreter), which
(Write the code in C, not C++) Write a simple shell (command interpreter), which reads commands from the standard input and executes them. Here are the features that must be inclu…
(Write/read data) Write a program to create a file named Exercise12_15.txt if it
(Write/read data) Write a program to create a file named Exercise12_15.txt if it does not exist. Write 100 integers created randomly into the file using text I/O. Integers are sep…
(Writing to a file). A damped sine wave is a sinusoidal function whose amplitude
(Writing to a file). A damped sine wave is a sinusoidal function whose amplitude approaches zero as time increases. Y(t)= e^-t (sin(2pit)) Write a program that will generate a dat…
(Yes, it correct that b is used for slope here. There is a reason I\'ll be happy
(Yes, it correct that b is used for slope here. There is a reason I'll be happy to explain, but you can program it without worrying about it.) By the way, this is another of those…
(Yes/No): Will the following code jump to the label named Target? mov ax, 8109h
(Yes/No): Will the following code jump to the label named Target? mov ax, 8109h cmp ax, 26h jg Target (Yes/No): Will the following code jump to the label named Target? mov ax, -30…
(You may assume that lg n divides n such that n/ lg n is an integer.) You are gi
(You may assume that lg n divides n such that n/ lg n is an integer.) You are given an array A[1..n] of n keys appearing in an arbitrary order. We would like to find the n/ lg n l…
([TripNumber], [DateKey], [LocationKey], [DriverKey], [TripMilage], [TripChange]
([TripNumber], [DateKey], [LocationKey], [DriverKey], [TripMilage], [TripChange]) SELECT            [TripNumber] = CAST([number] AS nVarchar(50)),            [DateKey] = [DWServic…
(\"Around the block party planning\") Consider a row of n houses represented as
("Around the block party planning") Consider a row of n houses represented as an array: A[1….n], where the phrase "next door neighbor" having its natural meaning. Each resident is…
(a) (4 marks) Complete the subsequent Python code that does the following, in th
(a) (4 marks) Complete the subsequent Python code that does the following, in this order: 1. (1 mark) Use NLTK to split the text into sentences. 2. (1 mark) Use NLTK to split each…
(a) (4 points) Implement a queue using a singly-linked list. The ENQUEUE and DEQ
(a) (4 points) Implement a queue using a singly-linked list. The ENQUEUE and DEQUEUE should take O(1) (i.e., constant) time. (b) (4 points) Implement a stack using a singly-linked…
(a) 3-Way Max Subarray Sum: In Lecture 2 we saw Divide-and-Conquer algorithm for
(a) 3-Way Max Subarray Sum: In Lecture 2 we saw Divide-and-Conquer algorithm for the Max Subarray Sum problem based on the insight that, for an input array A of length n, the best…
(a) A bag contains n white socks and n black socks. You take socks out of the ba
(a) A bag contains n white socks and n black socks. You take socks out of the bag one at a time until you have two socks of the same color (a matching pair). How many socks do you…
(a) A cache has the following parameters: b, block size given in numbers of word
(a) A cache has the following parameters: b, block size given in numbers of words; S, number of sets; N, number of ways; and A, number of physical address bits. Provide an express…
(a) A ciphertext has been generated with an affine cipher, which is defined as f
(a) A ciphertext has been generated with an affine cipher, which is defined as follows: C = (a × P + b) mod 26 where C = ciphertext, P = plaintext, a & b are the key Adversary…
(a) A computer uses 1 0 bits to store integers with 1 bit for a sign. It stores
(a) A computer uses 1 0 bits to store integers with 1 bit for a sign. It stores an approximation of real numbers in 10 bits . The first bit o f the first five is the sign of the m…
(a) A light ray could experience total internal reflection while travelling from
(a) A light ray could experience total internal reflection while travelling from a rarer medium to a denser medium. True or false? (b) In an optical fiber, the cladding has to be …
(a) A palindrome is a string whose reversal is identical to the string. How many
(a) A palindrome is a string whose reversal is identical to the string. How many bit strings of length n are palindromes? (b) In how many ways can a photographer at a wedding arra…
(a) A router RI receives traffic from two Local Area Networks LAN 1 and LAN 2, a
(a) A router RI receives traffic from two Local Area Networks LAN 1 and LAN 2, and forwards traffic on a link at 8 Mbits/sec towards a router R2. Router R2 receives also traffic f…
(a) A router RI receives traffic from two Local Area Networks LAN 1 and LAN 2, a
(a) A router RI receives traffic from two Local Area Networks LAN 1 and LAN 2, and forwards traffic on a link at 8 Mbits/sec towards a router R2. Router R2 receives also traffic f…
(a) A valid binomial min heap A contains n items. A further n items are held in
(a) A valid binomial min heap A contains n items. A further n items are held in arbitrary order in array B[]. They are to be inserted into the binomial heap A. Describe in English…
(a) According to a well-known legend, the game of chess was invented many centur
(a) According to a well-known legend, the game of chess was invented many centuries ago in northwestern India by a certain sage. When he took his invention to his king, the king l…
(a) An XML document with correct syntax is said to be ‘well formed’. What syntax
(a) An XML document with correct syntax is said to be ‘well formed’. What syntax rules do XML documents need to comply with? [5 marks] (b) The term AJAX is an acronym for Asynchro…
(a) An object is placed in front of a convex mirror. Draw a convex mirror (radiu
(a) An object is placed in front of a convex mirror. Draw a convex mirror (radius of curvature = 16 cm) to scale, and place an object 26 cm in front of it. Make the object height …
(a) As we have seen, the Internet layer of TCP/IP has two protocols – IPv4 and I
(a) As we have seen, the Internet layer of TCP/IP has two protocols – IPv4 and IPv6. The transport layer provides two main protocols TCP and UDP (along with some special-purpose, …
(a) Assume a Sliding Window with Go-Back N ARQ is being used on a transmission l
(a) Assume a Sliding Window with Go-Back N ARQ is being used on a transmission link with a 3-bit sequence number. The transmitter has previously sent frames with sequence numbers …
(a) Both arrays and records can be used to store aggregates of data elements. Ex
(a) Both arrays and records can be used to store aggregates of data elements. Explain why accessing a field of a record is usually more efficient than accessing an element of an a…
(a) Briefly differentiate between HTTP persistent and non-persistent connections
(a) Briefly differentiate between HTTP persistent and non-persistent connections RTT2 Web Server RTT1 RTTHTTP RTTo Local DNS cache Client b) Suppose within your Web browser you cl…
(a) Briefly, describe the following terms with respect to software design. (i) S
(a) Briefly, describe the following terms with respect to software design. (i) Structured/Modular Programming (ii) Top-Down Design & Bottom-up implementation (iii) Flow Chart …
(a) C/C++/Java and Perl share similar syntax for an if-then-else statement. Howe
(a) C/C++/Java and Perl share similar syntax for an if-then-else statement. However, C/C++/Java allows the then- and else-clauses to be either a single statement or a compound sta…
(a) Callasequence X [1.. n ] oscillating if X [ i ]< X [ i +1]foralleven i ,and
(a) CallasequenceX[1..n]oscillatingifX[i]&lt;X[i+1]foralleveni,andX[i]&gt;X[i+1] for all odd i. Give a simple recursive definition for the function los(A), which gives the length …
(a) Character Class Character.java represents a character in our battle game. Th
(a) Character Class Character.java represents a character in our battle game. The monster and the player will both be instances of the Character class, each with their own attribu…
(a) Compute the size of the cache shown below. (b) Compute the total number of b
(a) Compute the size of the cache shown below. (b) Compute the total number of bits required to implement this cache for the Intrinsity FastMATH embedded fast microprocessor (this…
(a) Consider a binary min-heap. We have a method that print the keys as encounte
(a) Consider a binary min-heap. We have a method that print the keys as encountered in a preorder traversal. Is the output sorted? Justify your answer. Attempt the same question f…
(a) Consider a plaintext space M = {M1, M2, M3, M4}, with corresponding cipherte
(a) Consider a plaintext space M = {M1, M2, M3, M4}, with corresponding ciphertext space C = {C1, C2, C3, C4}. Suppose that each plaintext and each ciphertext is equally likely, i…
(a) Consider storing a heap as a linked binary tree with pointers. Give pseudoco
(a) Consider storing a heap as a linked binary tree with pointers. Give pseudocode on how you would store a heap node, and which modifications you need to make to the heap routine…
(a) Consider the Colebrook equation for the friction factor in a fully developed
(a) Consider the Colebrook equation for the friction factor in a fully developed pipe flow 1 VI EID 2.51 where f is the Darcy friction factor, e/D is the relative roughness of the…
(a) Consider the following Binary Search tree Write down the (i) in-order traver
(a) Consider the following Binary Search tree Write down the (i) in-order traversal 2 (ii) preorder traversal (ii) postorder traversal Do you notice an interesting property of the…
(a) Consider the following program: from tkinter import from tkinter import mess
(a) Consider the following program: from tkinter import from tkinter import message box as tkmessageBox class GUI (object): def __init__self, parent): self.parent = parent self.pa…
(a) Consider the following relations: Employee (e-id, e-name, address, phone), s
(a) Consider the following relations: Employee(e-id, e-name, address, phone), sorted on e-id Manager(e-id, e-name, department), sorted on e-id How many block transfers is required…
(a) Consider the following three tasks, which use the shared variables x and z,
(a) Consider the following three tasks, which use the shared variables x and z, guarded by the semaphores Sx and Sz, respectively. Assume that the tasks are numbered in order of d…
(a) Consider the table shown below describing data obtained after executing a pr
(a) Consider the table shown below describing data obtained after executing a program P on two different processors. i. One fallacy/pitfall is to consider that the CPU with the hi…