Web development and programming
191828 questions • Page 74 / 3837
(c++) data.txt contains: \"JerryJones 400 MiraMartin -55.02 HarryTuna 302.6 Ralp
(c++) data.txt contains: "JerryJones 400 MiraMartin -55.02 HarryTuna 302.6 RalphRobotics 402.2 KFC Abc Catapillar 300.10 Kaiser 1322.12 Dell 721.80 RelaysCo 159.0 Goupon 385. Gimi…
(c++) make your own to simulate how an elevator handles and keeps track of reque
(c++) make your own to simulate how an elevator handles and keeps track of requests made by users. Here is how an elevator works: A user pushes either the up or down button to req…
(c++)Redo exercise 3-9a, where a character array s is assigned to other characte
(c++)Redo exercise 3-9a, where a character array s is assigned to other character arrays in uppercase su and lowercase sl, going through the s array character by character. Change…
(c++)Write a function that takes a linked list of integers and rearranges the no
(c++)Write a function that takes a linked list of integers and rearranges the nodes so that the integers stored are sorter into the order smallest to largest, with the smallest in…
(c++}Computer Science Department is evaluating 5 professors to see which profess
(c++}Computer Science Department is evaluating 5 professors to see which professor has the highest rating according to student input. You will create a ProfessorRating class consi…
(c.) What is an assembler language and what are the advantages of using one in c
(c.) What is an assembler language and what are the advantages of using one in comparison to machine code? (6 marks) (d.)The Little Man model of a computer system uses a single-di…
(case project 7-1) DO NOT ANSWER 7-1 IT IS JUST A REFERENCE You want to transfer
(case project 7-1) DO NOT ANSWER 7-1 IT IS JUST A REFERENCE You want to transfer a document from one computer to another, and you want the document to be encrypted. The destinatio…
(chapter 4.1) Consider the following instruction: Instruction: Add Rd, Rs, Rt In
(chapter 4.1) Consider the following instruction: Instruction: Add Rd, Rs, Rt Interpretation: Reg[Rd] = Reg[Rs] + Reg[Rt] a. What are the values of control signals generated by th…
(characters and c-strings input/output). Write a program to perform the followin
(characters and c-strings input/output). Write a program to perform the following: 1.Read a character from the input and then print it out (using cin.get(ch) and cout.put (ch )) 2…
(code below) Change the base class and derived class definitions to include the
(code below) Change the base class and derived class definitions to include the default constructor and an initializing constructor. The parameterized constructors need to initial…
(code blocks C programming) Write a program that determines whether a quadratic
(code blocks C programming) Write a program that determines whether a quadratic equation has one real root, two real roots, or imaginary roots. Then, if the roots are real, displa…
(coding in java) Given keys as {17, 49, 21, 46, 50, 80, 57, 81, 11, 71} and thei
(coding in java) Given keys as {17, 49, 21, 46, 50, 80, 57, 81, 11, 71} and their associated values as {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} respectively. Show the contents of the hash t…
(computer networks) Consider a simple network that is composed of two computers
(computer networks) Consider a simple network that is composed of two computers (A & B) and a router X in the middle. Computer A is connected to router X by a link that is 10 …
(conversion between celsuis and fahrenheit, write a header file that contains th
(conversion between celsuis and fahrenheit, write a header file that contains the folowing two fonctions. /* Convert from celsuis to fahrenheit */ double celsiusToFahrenheit(doubl…
(correct answer gets all credit) C++ finding how many occurreces each value has
(correct answer gets all credit) C++ finding how many occurreces each value has in an array program will compute a frequency distribution using a structure array program will dyna…
(create a dataset) file with 1000 lines. each line in the file consists of a fac
(create a dataset) file with 1000 lines. each line in the file consists of a faculty member's first name, last name, rank, and salary. the faculty member's first name and last nam…
(d) (10 points) Please show an SQL statement to find, for each department, the e
(d) (10 points) Please show an SQL statement to find, for each department, the employee has the largest start date. The result set should look like the following. the latest start…
(d) Modify LAB04ex2. m so that it solves (LA.7) using Euler\'s method with N 100
(d) Modify LAB04ex2. m so that it solves (LA.7) using Euler's method with N 1000 in the interval 0 S t S 50 (use the file euler. In from LAB 3 to implement Euler's method; do not …
(d) Tiling boards (i) Find a recurrence relation and initial conditions for the
(d) Tiling boards (i) Find a recurrence relation and initial conditions for the number of ways to completely cover a 2 x n checkerboard with 1 x 2 dominoes. For example, if 3, one…
(data structures and other objects using c++) Write a function that compares two
(data structures and other objects using c++) Write a function that compares two stacks for quality. The function takes two stacks as parameters and returns true if they are ident…
(define (val T) (car T) ) (define (left T) (car (cdr T)) ) (define (right T) (ca
(define (val T) (car T) ) (define (left T) (car (cdr T)) ) (define (right T) (car (cdr (cdr T))) ) Consider an implementation of binary trees with Scheme lists, as in the…
(discrete mathematics for a computer programming course) Let p and q be the prop
(discrete mathematics for a computer programming course) Let p and q be the propositions. p: we are going to make a cheaper phones q: we are going to lose business. Translate the …
(discrete mathematics for a computer programming course) Let p, q and r be the p
(discrete mathematics for a computer programming course) Let p, q and r be the propositions p: you get a recommendation on the end of the year, q: you work hard. r: you get promot…
(e) Consider a function transpose that the rows and columns of a Picture object
(e) Consider a function transpose that the rows and columns of a Picture object passed to it as a parameter. The function must create picture with rows taken from columns of the p…
(e) Consider the following encryption scheme to provide confidentiality. A and B
(e) Consider the following encryption scheme to provide confidentiality. A and B have previously exchanged a secret key K for an encryption scheme E which works with 4-bit blocks.…
(e) Consider two processes time-sharing a CPU. Assume that each of these process
(e) Consider two processes time-sharing a CPU. Assume that each of these processes executes exactly n instructions during a CPU quantum. Assume that the processes consist of 10n i…
(e) Suppose two different compilers, compiler A and compiler B, are used to comp
(e) Suppose two different compilers, compiler A and compiler B, are used to compile a program P thereby generating two versions, PA and PB, of program P. The table below shows the…
(e)What is the screen output of the following fragment of C code! int x=20 , y-3
(e)What is the screen output of the following fragment of C code! int x=20 , y-3 , z=5 , w-17 ; printf("x has a value of %d ",w) ; (f)What is the screen output of the following fr…
(f) Suppose you have written code to calculate the Fourier transform of a signal
(f) Suppose you have written code to calculate the Fourier transform of a signal. You have an array freq of 128 frequencies and an array FT of the corresponding Fourier components…
(fix this line oriented Java programming code) import java.until.Scanner; public
(fix this line oriented Java programming code) import java.until.Scanner; public class LineOriented{ public static void main(String[] args) { Scanner in=new Scanner(System.in); St…
(fix this line oriented Java programming code) import java.until.Scanner; public
(fix this line oriented Java programming code) import java.until.Scanner; public class LineOriented{ public static void main(String[] args) { Scanner in=new Scanner(System.in); St…
(for c++) Write a program that reads students’ names followed by their test scor
(for c++)Write a program that reads students’ names followed by their test scores. The program should output each student’s name followed by the test scores and the relevant grade…
(for example, 1 and 3 are adjacent in G 2 , because the distance between them in
(for example, 1 and 3 are adjacent in G2, because the distance between them in G is 2. 1 and 4 are not adjacent in G2, because the distance between them in G is 3) Design an effic…
(for the following quistion, i need the java code which contains JOption pleas)
(for the following quistion, i need the java code which contains JOption pleas) (Credit limit calculator) develop a java application that determines whether any of several departm…
(forgot to add this in) 1. Quizzes(2) 15%each 2.Homework 10% 3.Lab experiaments(
(forgot to add this in) 1. Quizzes(2) 15%each 2.Homework 10% 3.Lab experiaments(paper optional)(group project) 10% 4. Midterm Examination 25% 5. Final Examination 25% This program…
(frequency.py) Write a program that reads in the contents of a text file and dis
(frequency.py) Write a program that reads in the contents of a text file and displays a histogram of the frequency that words appear in the text. Requirements: - Prompt the user t…
(function($) { $.fn.blackjack = function(options) { var o = $.extend({ \"dealerN
(function($) { $.fn.blackjack = function(options) { var o = $.extend({ "dealerName": "Dealer", "playerName": "Player", "bet": 5 …
(g) If there is an NFA with s states which accepts a language L, then we can con
(g) If there is an NFA with s states which accepts a language L, then we can construct a DFA which accepts the same language and has: (circle the smallest correct answer a) s stat…
(gdb) disas phase_4 Dump of assembler code for function phase_4: 0x08048dfb
(gdb) disas phase_4 Dump of assembler code for function phase_4: 0x08048dfb <phase_4+0>: push %ebp 0x08048dfc <phase_4+1>: mov %esp,%ebp 0x08048dfe <phase_4+3>: …
(gdb) disas phase_6 Dump of assembler code for function phase_6: 0x08048c2a
(gdb) disas phase_6 Dump of assembler code for function phase_6: 0x08048c2a <phase_6+0>: push %ebp 0x08048c2b <phase_6+1>: mov %esp,%ebp 0x08048c2d <phase_6+3>: …
(gdb) disas phase_f Dump of assembler code for function phase_f: 0x080487d0
(gdb) disas phase_f Dump of assembler code for function phase_f: 0x080487d0 <phase_f+0>: push %ebp 0x080487d1 <phase_f+1>: mov %esp,%ebp 0x080487d3 <phase_f+3>: …
(h) Enter a Unix command to verify that this file has exactly four lines. Your c
(h) Enter a Unix command to verify that this file has exactly four lines. Your command should print a single integer (to the monitor) that is the number of lines in this file foll…
(hint: use the function real and imag! also i is imaginary #) You are to write a
(hint: use the function real and imag! also i is imaginary #) You are to write a script called ekl25homeworklb that will prompt the user for three numbers which are the coefficien…
(https: //en.wikipedia.org/wiki/Drake_equation), the number of such civilization
(https: //en.wikipedia.org/wiki/Drake_equation), the number of such civilizations, N, is equal to the product of a number of terms. For this assignment, we will use the following …
(i don\'t know how to use sort array and search array...) Purpose: Demonstrate t
(i don't know how to use sort array and search array...) Purpose: Demonstrate the ability to create and execute a JAVA program that utilizes string manipulation to solve a daily l…
(i) Code in SML a function removeFirst \'a\'a list -\'a list that removes from t
(i) Code in SML a function removeFirst 'a'a list -'a list that removes from the given list the first occurrence of the given value (if it occurs there at all), but keeps all later…
(i) In any programming language except Fortran, C, Java, or Lisp,write a program
(i) In any programming language except Fortran, C, Java, or Lisp,write a program like this, in which a function keeps track of thenumber of times it is called and prints that coun…
(i) Suppose you have an array of n elements containing only two distinct keys, t
(i) Suppose you have an array of n elements containing only two distinct keys, true and false . Give an O ( n ) algorithm to rearrange the list so that all false elements precede …
(i) f(n) nlogn (ii) f(n) 3n +2n + 1 Q2-20 pts) Consider a scenario wherein 100,0
(i) f(n) nlogn (ii) f(n) 3n +2n + 1 Q2-20 pts) Consider a scenario wherein 100,000 objects (each of size: 40 bytes) need to be stored in a List. (a) Determine the memory (in bytes…
(i) write efficient Java code using Hashset or HashMap to solve and estimate the
(i) write efficient Java code using Hashset or HashMap to solve and estimate the run-time complexity (ii) if you used an array/arraylist/linkedlist instead of a Hash structure, wh…
Subject
Web development and programming
Use Browse or pick another subject.