Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 3518 / 3837

\" C programming\" Create a program called dataExercise.c that declares the foll
" C programming" Create a program called dataExercise.c that declares the following variables and displays their values: 1) Declare a character variable with value 'a', and displa…
\" Capability Maturity Model is necessary for eachorganization to develop softwa
"Capability Maturity Model is necessary for eachorganization to develop software project. Justify your answer withstrong argument".(software engineering) 4- 'Discuss how Machine-A…
\" I can getthis to work with everything except making a number with more than o
" I can getthis to work with everything except making a number with more than one '.' invalid. What am I doing wrong? Help please. [#include <iostream> #include <iomanip&…
\" In Chapter 2, you created a program for the Greenville Idol competition that
" In Chapter 2, you created a program for the Greenville Idol competition that promts users for the number of contrestants entered in last years competition and in this years comp…
\" Re 1:16 PM 84% Question 11 Use \"Save As\" everytime you save a file only the
" Re 1:16 PM 84% Question 11 Use "Save As" everytime you save a file only the first time you save a file. After that you must use "Save - never use "Save As" - always use "Save" t…
\" The c program will implement the Caesar Cipher. Your program should take a co
" The c program will implement the Caesar Cipher. Your program should take a command line argument, which will be the offset, while the input through standard in will be the part …
\" The code must be written in Loop and Libarary Methods \" There is a \"fun\" c
" The code must be written in Loop and Libarary Methods " There is a "fun" children's game where one child thinks of a "common phrase", then the second child repeatedly makes gues…
\" We often want to solve problems that are expressible in terms of a traversal
" We often want to solve problems that are expressible in terms of a traversal or search over a graph. One of the goals of a graph traversal is to find all nodes reachable from a …
\" a. Let’s start with something easy, we will find all files that end with .txt
" a.     Let’s start with something easy, we will find all files that end with .txt in your home directory (~). Issue the command find ~ -name “*.txt”. Recall that ~ (tilde) repre…
\"### [4 points] \'volume-changes() **(d** Write the volume_changes) function th
"### [4 points] 'volume-changes() **(d** Write the volume_changes) function that computes the number of times successive values change. Arguments: - data_points: A vector of numer…
\"10.3 The value/reference tradeoff The reference model of variables is arguably
"10.3 The value/reference tradeoff The reference model of variables is arguably more elegant than the value model, particularly for object-oriented languages, but generally requir…
\"6.32 Algebra: solve quadratic equations) The two roots of a quadratic equation
"6.32 Algebra: solve quadratic equations) The two roots of a quadratic equation ax2 + bx + x = 0 can be obtained using the following formula: and r2 = 2a 2a Write a function with …
\"A formula or sheet you want to move or copy contains the name \"...\", which a
"A formula or sheet you want to move or copy contains the name "...", which already exists on the destination worksheet." I receive this message when I make a copy of a sheet in m…
\"A physical compute system that executes various platform and application softw
"A physical compute system that executes various platform and application software" definition for: 5. A) Compute system B) Server C) Host D) All of the above 6. "The collection o…
\"A problem has been detected and windows has been shut down to prevent damage t
"A problem has been detected and windows has been shut down to prevent damage to your computer. If this is the first time you're seen this stop error screen, restart your computer…
\"After deploying a large number of wireless laptop computers on the network, Ta
"After deploying a large number of wireless laptop computers on the network, Taylor, the IT director at Contoso, Ltd. decides to use DHCP to enable the laptop users to move from o…
\"An instructor has given a multiple choice exam to a class of students. The exa
"An instructor has given a multiple choice exam to a class of students. The exam consists of 20 multiple-choice questions, each of which has 4 choices for the answer (a, b, c, or …
\"Analyzing the Round Robin Scheduling\" as seen Operating Systems - A Modern Pe
"Analyzing the Round Robin Scheduling" as seen Operating Systems - A Modern Perspective, 3rd Edition, by Gary Nutt. In this exercise, you will study the effect of severl parameter…
\"Android, iOS and windows are currently the three predominant names in the deve
"Android, iOS and windows are currently the three predominant names in the developing names in the developing of mobile app". companies often struggle to determine and decide what…
\"Around here, we keep half the people ignorant so they aren\'t prejudiced, and
"Around here, we keep half the people ignorant so they aren't prejudiced, and half the people prejudiced so they aren't ignorant."    -- Dr. Jay Shulman, c.1980 First, consider th…
\"Attributes and Methods\" Please respond to the following: Imagine you are a pa
"Attributes and Methods" Please respond to the following: Imagine you are a part of a team that is tasked with writing a mobile app that will allow users to store information for …
\"Barriers vs. Opportunities\" Please respond to the following: Identify two pro
"Barriers vs. Opportunities" Please respond to the following: Identify two projects from prior work experience or educational experience that could have benefited from using Agile…
\"Buffer Overflow\" Please respond to the following: Explain one (1) of the chal
"Buffer Overflow" Please respond to the following: Explain one (1) of the challenges that a hacker faces when attempting to cause a segmentation fault by overflowing a buffer. Fur…
\"Business Impact Analysis (BIA), Business Continuity\" Please respond to the fo
"Business Impact Analysis (BIA), Business Continuity" Please respond to the following: Briefly describe the main purpose of Business Impact Analysis (BIA), Business Continuity Pla…
\"C ++ In this assignment, you are to write a ROT13 (for \"rotate 13\") decoder
"C ++ In this assignment, you are to write a ROT13 (for "rotate 13") decoder to translate a secret message from its encoded state to something readable. In a ROT13                …
\"COUT is done twice\" I\'m done programming the first part for my Mad Lib progr
"COUT is done twice" I'm done programming the first part for my Mad Lib program, but when I run testBed to check my program, I keep getting as if there was two COUTs together when…
\"CS270 Data Structures\" Object-Oriented Design (OOD) and C++ (Textbook: Malik,
"CS270 Data Structures" Object-Oriented Design (OOD) and C++ (Textbook: Malik, D.S. (2009). Data Structures Using C++ 2nd edition. Boston, MA: Course Technology (Cengage Learning)…
\"Camel Case\" is a way of writing a phrase without the use of spaces, but which
"Camel Case" is a way of writing a phrase without the use of spaces, but which allows its individual words to be read separately. Most of the phrase is rendered in lowercase, but …
\"Change Adaptation\" Please respond to the following: Imagine you work as an IT
"Change Adaptation" Please respond to the following: Imagine you work as an IT professional for a midsized company. Describe a change (i.e., a change of process, system, technique…
\"Clear Entries\" button does not work, please help fix the Java codes. The butt
"Clear Entries" button does not work, please help fix the Java codes. The button is supposed to clear the entries that are being entered. Source codes are written below.   Note: T…
\"Closing Out the Project\" Please respond to the following: As a project manage
"Closing Out the Project" Please respond to the following: As a project manager, you’ll find yourself in many unique situations, different organizations, and possibly even differe…
\"Computer Forensics Process\" Please respond to the following: The computer for
"Computer Forensics Process" Please respond to the following: The computer forensics investigative process includes five steps: Identification, Preservation, Collection, Examinati…
\"Computer Forensics Process\" Please respond to the following: The computer for
"Computer Forensics Process" Please respond to the following: The computer forensics investigative process includes five steps: Identification, Preservation, Collection, Examinati…
\"Consider an omega network that connects p processors. Define a function f that
"Consider an omega network that connects p processors. Define a function f that maps p = [0, 1, …, p-1] onto a permutation P’ of P (that is, P’[i] = f(P[i]) and P’[i] P for all 0 …
\"Console/File Input and Output\" text file For this assignment, you will build
"Console/File Input and Output" text file For this assignment, you will build on "starter" code to create a Java™ program that prompts the user for input, accepts user input, and …
\"Conversations often shift focus to earlier topics. Modify the therapist progra
"Conversations often shift focus to earlier topics. Modify the therapist program to support this capability. Add each patient input to a history list. Then, ocassionally choose an…
\"Conversations often shift focus to earlier topics. Modify the therapist progra
"Conversations often shift focus to earlier topics. Modify the therapist program to support this capability. Add each patient input to a history list. Then, ocassionally choose an…
\"Create a class Rectangle with attributes length and width, each of which defau
"Create a class Rectangle with attributes length and width, each of which defaults to 1. Provide methods that calculate the rectangle's perimeter and area. It has set and get meth…
\"Create a launch movie from the given file. Change the marker during different
"Create a launch movie from the given file. Change the marker during different portions of the launch." So it'd be, say purple during the first 0.15 seconds, then blue during segm…
\"Create a procedure that accepts product ID as a parameter and returns the pric
"Create a procedure that accepts product ID as a parameter and returns the price from ProductTable table. Add exception handling to catch if product ID is not in the table." Using…
\"Create a pseudocode program that asks the user to enter an integer number from
"Create a pseudocode program that asks the user to enter an integer number from 1 to 20, and then calls a function to compute the factorial of this number. A factorial is the prod…
\"Create a simple transaction log (using the format shown in Table 10.14) to rep
"Create a simple transaction log (using the format shown in Table 10.14) to represent the actions of the transactions in Problems 6a and 6b." (This is the question I need answered…
\"Create a system to simulate vehicles at an intersection. Assume that there is
"Create a system to simulate vehicles at an intersection. Assume that there is one lane going in each of four directions, with stoplights facing each direction. Vary the arrival a…
\"Create a system to simulate vehicles at an intersection. Assume that there is
"Create a system to simulate vehicles at an intersection. Assume that there is one lane going in each of four directions, with stoplights facing each direction. Vary the arrival a…
\"Create an implementation of a binary tree using the recursive approach introdu
"Create an implementation of a binary tree using the recursive approach introduced in the chapter. In this approach, each node is a binary tree. Thus a binary tree contains a refe…
\"Create the logic for a program that continuously prompts a user for a numeric
"Create the logic for a program that continuously prompts a user for a numeric value until the user enters 0. The application passes the value in turn to a method that squares the…
\"Create the logic for a program that continuously prompts a user for a numeric
"Create the logic for a program that continuously prompts a user for a numeric value until the user enters 0. The application passes the value in turn to a method that squares the…
\"Data Center Management\" Please respond to each of the following bulleted item
"Data Center Management" Please respond to each of the following bulleted items: Imagine you are an IT security specialist of a large organization which is opening a new data cent…
\"Data Center Management\" Please respond to the following: Imagine you are an I
"Data Center Management" Please respond to the following: Imagine you are an IT security specialist of a large organization which is opening a new data center. Recommend a minimum…
\"Data Classification and Data Handling\" Please respond to the following: Asses
"Data Classification and Data Handling" Please respond to the following: Assess the main policy elements governing data classification and data handling in organizations to ensure…