Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 69 / 3837

(a) Construct an example where an entire window of TCP packets are lost when the
(a) Construct an example where an entire window of TCP packets are lost when the window size reaches 2 during the first slow start. Show how TCP responds to the losses at the pack…
(a) Convert 0.11 into base-2 and store the result in a 10-bit word of the follow
(a) Convert 0.11 into base-2 and store the result in a 10-bit word of the following format: (b) Convert the stored number back into base-10, and calculate the true percent relativ…
(a) Create a class, called NewsPaperSubscriber, which has two instance variables
(a) Create a class, called NewsPaperSubscriber, which has two instance variables for a subscriber’s street address and the subscription rate. Include a constructor that receives o…
(a) Create a procedural C++ program called datatype_sizes.cc that will output th
(a) Create a procedural C++ program called datatype_sizes.cc that will output the sizes in bytes of the datatypes long int, float, double and float *. Make your program simple and…
(a) Declare suitable C datatypes to represent each of the following sets of info
(a) Declare suitable C datatypes to represent each of the following sets of informa- tion (as you would do in a header file): (i) A company, described by: • A 3-letter code. • The…
(a) Defne a global two-integer array, for storing prime numbers. Defne a global
(a) Defne a global two-integer array, for storing prime numbers. Defne a global variable that stores the index of the next cell available in the array (initiallyzero). (b) Change …
(a) Describe an efficient algorithm for finding all common elements in two sorte
(a) Describe an efficient algorithm for finding all common elements in two sorted lists of numbers. For example, for the lists 2, 5, 5, 5 and 2, 2, 3, 5, 5, 7, the output should b…
(a) Describe briefly the packetizing services provided by network-layer of the T
(a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe briefly the multiplexing services provided by the network-layer of the…
(a) Describe the language (in words defined by the regular expression 1(0|1) * 0
(a) Describe the language (in words defined by the regular expression 1(0|1) * 010 * 1. (b) A palindrome is a string of characters that reads the same forward and backwards. For e…
(a) Describe what superscalar processors arc and how they can increase instructi
(a) Describe what superscalar processors arc and how they can increase instruction level parallelism. (b) Explain the policy of 'out-of-order issue and out-of-order completion' an…
(a) Design and implement a Java program that performs an inorder traversal of a
(a) Design and implement a Java program that performs an inorder traversal of a binary tree without using recursion. The program must have time complexity O(n), where n is the num…
(a) Design and implement in pseudocode an algorithm that gets as input a list of
(a) Design and implement in pseudocode an algorithm that gets as input a list of k integers N1, . . . , Nk as well as a special value SUM. Your algorithm must locate a pair of val…
(a) Develop a flowchart and then write a menu-driven C++ program to solve the fo
(a) Develop a flowchart and then write a menu-driven C++ program to solve the following problem. Upon execution of the program, the menu will be displayed, properly centered as sh…
(a) Develop a greedy algorithm for the multiple-choice knapsack problem. For ful
(a) Develop a greedy algorithm for the multiple-choice knapsack problem. For full credit, you should first (i) describe the decision faced at each iteration of your algorithm and …
(a) Draw a class diagram representing the classes declared below (b) Declare the
(a) Draw a class diagram representing the classes declared below (b) Declare these classes in a file entitled "BinaryOperators.h", inserting appropriate pre-compilation directives…
(a) Draw a message sequence chart that illustrates how TCP and UDP transmit thre
(a) Draw a message sequence chart that illustrates how TCP and UDP transmit three data segments. Assume that the size of each segment sent is 1500 bytes irrespective of the protoc…
(a) Exercise: Discuss the concept of \"by value\" and \"by reference\" for primi
(a) Exercise: Discuss the concept of "by value" and "by reference" for primitive and composite data types. Illustrate each concept with an example in Java. (a) Exercise: Consider …
(a) Experimenting with DHCP:What is DHCP? How to view DHCP? (Hint, you may obtai
(a) Experimenting with DHCP:What is DHCP? How to view DHCP? (Hint, you may obtain informationfrom either Wireless LAN. Share with us what you find, and themeaning of the informati…
(a) Explain possible drawbacks of using the following hashing method: m = 32, h(
(a) Explain possible drawbacks of using the following hashing method: m = 32, h(k) = (kA) mod m, where A is a large integer. All keys in U are integers whose last digit (in decima…
(a) Explain the benefits of the virtual memory technique. (b) Explain the concep
(a) Explain the benefits of the virtual memory technique. (b) Explain the concept of locality of reference. (c) Consider a (RISC) machine that uses 4KB pages and 4-byte instructio…
(a) Explain the circumstances in which a Java developer might use I. The Composi
(a) Explain the circumstances in which a Java developer might use I. The Composite Design Pattern II. The Singleton Design Pattern III. The Adapter Design Pattern (b) The Java cod…
(a) Explain the following query in English (based on the company database) SELEC
(a) Explain the following query in English (based on the company database) SELECT FNAME, LNAME, SSN FROM EMPLOYEE WHERE NOT EXISTS (SELECT * FROM WORKS_ON B WHERE (B.PNO IN (SELEC…
(a) Explain the importance of input/output (I/O) management in the context of op
(a) Explain the importance of input/output (I/O) management in the context of operating systems. List some techniques that are used to improve the speed and efficiency of I/O oper…
(a) Explain the similarities and differences between Monte Carlo algorithms and
(a) Explain the similarities and differences between Monte Carlo algorithms and Las Vegas algo- rithms. (2 marks) (b) SupposethataMonteCarloalgorithmAforadecisionproblemXisyes-bia…
(a) Explain what page the table (PT) and the translation lookaside buffer (TLB)
(a) Explain what page the table (PT) and the translation lookaside buffer (TLB) are and how they are used in a paging system. (b) Assume that accessing and searching the TLB takes…
(a) Explain why insertion sort (as coded in the slides from lecture) is also fas
(a) Explain why insertion sort (as coded in the slides from lecture) is also faster than its worst-case asymptotic running time would suggest. What is it running time in this case…
(a) FileIO In the FileIO class add a public static method named writeCharacter.
(a) FileIO In the FileIO class add a public static method named writeCharacter. This method takes as input a Character to write, and a String which is the filename to write to. Wi…
(a) Find a recurrence relation for the number of pairs of rabbits on the island
(a)Find a recurrence relation for the number of pairs of rabbits on the island n months after one newborn pair is left on the island. (b) What are the initial conditions for the r…
(a) Find an article in an IEEE or ACM journal (or any other Peer Review Journal)
(a) Find an article in an IEEE or ACM journal (or any other Peer Review Journal) about safes, vaults, and accessories. (b) The successful operation of any alarm system depends on …
(a) Find an inverse of a modulo m for the following pair of relatively prime int
(a) Find an inverse of a modulo m for the following pair of relatively prime integers, a=2, m=17. Show each step as you follow the method given in Rosen 7th edition page 276 examp…
(a) Find the names of branches with average branch balance above 700. (b.) Find
(a) Find the names of branches with average branch balance above 700. (b.) Find all customers who have a loan, an account, or both (c) Find the average account balance at the “Per…
(a) For a binary source with probabilities p(0)=0.9, p(1)=0.1, design a Huffman
(a) For a binary source with probabilities p(0)=0.9, p(1)=0.1, design a Huffman code for the source obtained by blocking m bits together, m=1,2 and 3. Plot the average lengths ver…
(a) For each case, determine whether ? change is positive, negative or zero. Plo
(a) For each case, determine whether ?change is positive, negative or zero. Plot 1 1---Select---positivenegativezero Plot 2 2---Select---positivenegativezero ?? Plot 3 3---Select-…
(a) Formally define the decision problems Vertex Cover and Independent Set, expl
(a) Formally define the decision problems Vertex Cover and Independent Set, explaining all tech- nical terms. (b) Fix a positive integer k. Give a polynomial-time algorithm A for …
(a) Fortran originally had three kinds of GoTo statements. One was the unconditi
(a) Fortran originally had three kinds of GoTo statements. One was the unconditional GOTO, which jumped to a specified statement number. Another was the assigned GOTo, which we ex…
(a) Generate a 13 times 13 matrix in MATLAB using A = hilb(13). (b) Generate a v
(a) Generate a 13 times 13 matrix in MATLAB using A = hilb(13). (b) Generate a vector x = [1: 13]. (c) Generate a vector b, where b = Ax. (d) Using only these values of b and A, p…
(a) Give a dynamicprogramming solution to the 0-1 knapsack problem that runs in
(a) Give a dynamicprogramming solution to the 0-1 knapsack problem that runs in O(nW)time, where n is the number of items and W is the maximum weight ofitems that the thief can pu…
(a) Give a randomized algorithm and estimate its expected time. (b) Give a deter
(a) Give a randomized algorithm and estimate its expected time. (b) Give a deterministic algorithm. Argue about its correctness using the method of conditional expectations. Hint:…
(a) Give an example for each of the following Python language constructs: i. Exp
(a) Give an example for each of the following Python language constructs: i. Expression ii. Assignment Statement iii. Conditional Expression (b) What is the value of the following…
(a) Given a binary array, implement in Java an algorithm to sort it in linear ru
(a) Given a binary array, implement in Java an algorithm to sort it in linear running time complexity and constant space complexity. Example: Input: [1,0,1,0,0,0,1,0,1,0,0,1] Outp…
(a) Given an unsorted array A[1...n] of distinct integers numbers and is given a
(a) Given an unsorted array A[1...n] of distinct integers numbers and is given a nonnegative integer number, k, k < n. You need to find an element from A such that its rank is …
(a) Given the following declarations, write a single function to print out every
(a) Given the following declarations, write a single function to print out every third value in the list, starting with the first element. That is, the function should print the 1…
(a) Given the following list of numbers: 3, 1, 4, 1, 5, 9, 2, 6, 5, 3, 5 trace t
(a) Given the following list of numbers: 3, 1, 4, 1, 5, 9, 2, 6, 5, 3, 5 trace the execution for quicksort with median-of-three partitioning and a cutoff of 3. (b) The processing …
(a) Given the following solution for the critical section problem for two proces
(a) Given the following solution for the critical section problem for two processes (the code shown is for processes Pi), show why it does not satisfy the mutual exclusion require…
(a) How many bits are in a Java byte? (b) How many bytes are in a Java short? ©
(a) How many bits are in a Java byte? (b) How many bytes are in a Java short? © How many bytes are in a Java int? (d) How many bytes are in a Java float? (e) How many bytes are in…
(a) How many spanning trees does C_n have for n = 3, 4, 5, ? (b) Use the recurre
(a) How many spanning trees does C_n have for n = 3, 4, 5, ? (b) Use the recurrence relation t(G) = t(G - e) +t(G/e) to count the number of spanning trees of Remember to keep mult…
(a) If a term paper consisted 42 pages. each containing 40lines of 100 symbols e
(a) If a term paper consisted 42 pages. each containing 40lines of 100 symbols each (counting each space as a symbol), was tobe encoded using UNICODE, how many bytes of storage sp…
(a) If the following switch statement were implemented using a jump table, how m
(a) If the following switch statement were implemented using a jump table, how many elements would the table contain? Would it make sense to use a jump table to implement this swi…
(a) If the generator is BC, what is the implication (i) We will be unable to stu
(a) If the generator is BC, what is the implication       (i) We will be unable to study the impact of B or C.       (ii) We will be unable to study the impact of BC.       (iii) …
(a) Implement (in Java) the RadixSort algorithm to sort in increasing order an a
(a) Implement (in Java) the RadixSort algorithm to sort in increasing order an array of integer keys. (c) How many edges does a graph have if its degree sequence is 5, 2, 2, 2, 2,…