Web development and programming
191828 questions • Page 3530 / 3837
a) Given plaintext \"LOVE\" , if we know the encryption algorithem is Affine Cip
a) Given plaintext "LOVE" , if we know the encryption algorithem is Affine Cipher and we know the key (a,b) = (7,9), please generate the ciphertext. b) Based on the Affine Cipher …
a) Group the following functions under appropriate headings, assuming that they
a) Group the following functions under appropriate headings, assuming that they are to form the basis for a menu-driven word-processing system - the headings you choose will becom…
a) Hand-trace the following program and determine and write down what is the out
a) Hand-trace the following program and determine and write down what is the output of the code. b) Run the code and compare the program output to your hand-traced …
a) Here is a line of code: sum= a+b write a complete C function named fun that h
a) Here is a line of code: sum= a+b write a complete C function named fun that has a and b as parameters and returns their calculated sum via the return statement.Assume all the v…
a) How many bits of an IPv4 address are required to define 16 subnets? How many
a) How many bits of an IPv4 address are required to define 16 subnets? How many bits of the IPv4 address are required to define 12 subnets? b) Assume that you have been assigned t…
a) How many bytes are in a gigabyte? how many bits? b) In what component of a de
a) How many bytes are in a gigabyte? how many bits? b) In what component of a desktop computer is most of the computation done? c) About how fast can the component you mentioned i…
a) How many cycles does it take to access the main memory if a cache miss has oc
a) How many cycles does it take to access the main memory if a cache miss has occurred (miss penalty) b) Estimate the MCPI of the benchmark for both processors Hint : You need to …
a) How many milliseconds (ms) are in 1 second? b) How many microseconds (us) are
a) How many milliseconds (ms) are in 1 second? b) How many microseconds (us) are in 1 second? c) How many nanoseconds (ns) are in 1 millisecond? d) How many microseconds are in 1 …
a) I need to write a program that asks the user for a positive nonzero integer v
a) I need to write a program that asks the user for a positive nonzero integer value. The program should use a loop to calculate the product of all the integers from 1 up to the n…
a) If you have a file called ‘saved_data.txt’ with many lines of data, each line
a) If you have a file called ‘saved_data.txt’ with many lines of data, each line having values separated by a ‘$’ character, how would you obtain the 7th value/field of each line …
a) Iif we implement Mergesort on a linked list, it is obvious that dividing the
a) Iif we implement Mergesort on a linked list, it is obvious that dividing the list in two parts cannot be accomplished by a simple assignment as with arrays (int middle (first+ …
a) Implement the STOOGESORT algorith to sort an array of integers using C or C++
a) Implement the STOOGESORT algorith to sort an array of integers using C or C++. Your program should be able to read inputs from a file called “data.txt” where the first value o…
a) Implement the fastest possible algorithm to insert a new entry into a sorted
a) Implement the fastest possible algorithm to insert a new entry into a sorted (in ascending order) array of strings. Duplicates are NOT allowed - throw an IllegalArgumentExcepti…
a) Implement the following three external functions: int fillArray(rational arr[
a) Implement the following three external functions: int fillArray(rational arr[], int size); // The user decides n, the number of rational numbers he wants to enter into the arra…
a) Impliment the Strategy pattern to distribute the capital() method among sever
a) Impliment the Strategy pattern to distribute the capital() method among several classes, each implementing the method (also receiving the context object).Draw the UML class dia…
a) In Figure 4-18 , explain why Rule 1 brings more security than Rule 2. b) Expl
a) In Figure 4-18, explain why Rule 1 brings more security than Rule 2. b) Explain why the last rule in an ACL should deny anything not previously approved by earlier rules. c) Wh…
a) In a header file, create an Account class that a bank might use to represent
a) In a header file, create an Account class that a bank might use to represent customers' bank accounts. b) Include a private data member called balance (of type int) to represen…
a) In order to debug an embedded application or to understand an embedded applic
a) In order to debug an embedded application or to understand an embedded application developed by someone else, it is often necessary to understand how data memory is modified by…
a) In the Coin changing problem, we have to give change for n rupees using the l
a) In the Coin changing problem, we have to give change for n rupees using the least number of coins of a given set of denominations. It is clear that we cannot give change for an…
a) In the following Unix directory structure let the current directory be, loc.
a) In the following Unix directory structure let the current directory be, loc. Present a Ur command to go to the directory bin If the current directory is etc, present command to…
a) In the main function, define an integer array with five entries and assign va
a) In the main function, define an integer array with five entries and assign values to the entries. Display the entries in the order in which they occur within the array. b) Pass…
a) In the worst case, how many comparisons does the insertion sort algorithm use
a) In the worst case, how many comparisons does the insertion sort algorithm use to sort n items? Please explain your reasoning, and please do NOT use big-O notation. b) Using ans…
a) In this programming assignment, you will design in pseudo code and implement
a) In this programming assignment, you will design in pseudo code and implement in Java two recursive versions of Tetranacci calculators and experimentally compare their runtime p…
a) Inheritance based stack implementation The Stack is implemented by extending
a) Inheritance based stack implementation The Stack is implemented by extending Java Collection Framework (JCF) class ArrayList: public class Stack<E> extends ArrayList<E…
a) Let string s be defined as: s = \'Welcome to Python Programming\' Write Pytho
a) Let string s be defined as: s = 'Welcome to Python Programming' Write Python Boolean expressions that correspond to these propositions: a) The slice consisting of the 12th and …
a) Let the alphabet 2 0,1). Write a regular expression for each of the following
a) Let the alphabet 2 0,1). Write a regular expression for each of the following. In this question, you may not use the extended notation (only union, concatenation, and Kleene st…
a) Let us suppose that we have a regular 5 stage pipeline (with the associated f
a) Let us suppose that we have a regular 5 stage pipeline (with the associated forwarding units). Let us assume that branch decision hardware and jump happens in the second stage.…
a) Look at the following method header: public static void showValue The followi
a) Look at the following method header: public static void showValue The following code has a call to the showValue method. Fin the error. int x =8; showValue(int); //Error! b…
a) MOV EAX, 100H IMUL AX b) DIV BYTE PTR[BP] c) DIV ECX d) MOV EBX, 1000H e) DIV
a) MOV EAX, 100H IMUL AX b) DIV BYTE PTR[BP] c) DIV ECX d) MOV EBX, 1000H e) DIV len Registers EAX CD6789AB EBX 00000020 ECX 00000010 EDX 0000000F ESP 0000006B EBP 00000000 ESI 00…
a) Make a 4x13 2D array ofstrings. b) Each card will be representedby a string “
a) Make a 4x13 2D array ofstrings. b) Each card will be representedby a string “Suit-Rank”, for example:“Clubs-2”, “Diamonds-Jack”,“Hearts-Ace”, “Spades-10” etc. c) …
a) Makea 4x13 2D array of strings. b) Eachcard will be represented by a string “
a) Makea 4x13 2D array of strings. b) Eachcard will be represented by a string “Suit-Rank”, forexample: “Clubs-2”, “Diamonds-Jack”,“Hearts-Ace”, “Spades-10” etc. c) …
a) Method Celsius returns the Celsius equivalent of a Fahrenheit temperature, us
a) Method Celsius returns the Celsius equivalent of a Fahrenheit temperature, using the calculation: b) Method Fahrenheit returns the Fahrenheit equivalent of a Celsius temperatur…
a) Note that hosts 198.0.0.5 and 128.0.0.5 have the same physical (MAC) address.
a) Note that hosts 198.0.0.5 and 128.0.0.5 have the same physical (MAC) address. Will this cause any problems? Argue why yes or why no. b) Assume that host 198.0.0.7 sends a TCP m…
a) Over the past decade, banks and investment firms have offered many services t
a) Over the past decade, banks and investment firms have offered many services that would be impossible without Information Systems (ISs). Use your current / former work place, if…
a) PART I: Create an abstract Java class named “ Student ” in a package named “
a) PART I: Create an abstract Java class named “Student” in a package named “STUDENTS”. This class has 4 attributes: (1)student ID: protected, an integer of 10 digits (2)student n…
a) Perform the following boolean operations on the given bit patterns i. not 111
a) Perform the following boolean operations on the given bit patterns i. not 11100010 ii. 11100010 or 00001110 iii. 11100010 and 00001110 b) What are the subnet masks for the foll…
a) Please use the following insertProcedure method to answer the question. Defin
a) Please use the following insertProcedure method to answer the question. Define the control flow graph. You need to define the set of edges (E) that defines your graph, the init…
a) Prompt the user and accept user input for the following information: q Employ
a) Prompt the user and accept user input for the following information: q Employee Name q The number of days the user spent on a business trip. q The total amount spent on me…
a) Read the elass Person to store the name a person we discuss in the class (sou
a) Read the elass Person to store the name a person we discuss in the class (source is Person.java attached in the assignment). As we can see that the methods we included merely s…
a) Regarding the diagram above, which of the following statements are true? Assu
a) Regarding the diagram above, which of the following statements are true? Assume that the circuit is not at resonance. (For each statement select True or False). 1) The current …
a) Retrieve the names of all employees who work in department number 5. b) Retri
a) Retrieve the names of all employees who work in department number 5. b) Retrieve the supervisor SSNs of all employees who work for the ‘Finance’ department. c) For every projec…
a) Retrieve the names of all employees who work in department number 5. b) Retri
a) Retrieve the names of all employees who work in department number 5. b) Retrieve the supervisor SSNs of all employees who work for the ‘Finance’ department. c) For every projec…
a) Retrieve the names of all employees who work in department number 5. b) Retri
a) Retrieve the names of all employees who work in department number 5. b) Retrieve the supervisor SSNs of all employees who work for the ‘Finance’ department. c) For every projec…
a) Scheduling. IT is trying to write a scheduler for two identical machines. The
a) Scheduling. IT is trying to write a scheduler for two identical machines. They know that there are n jobs and that the ith job takes ti seconds, regardless of which machine it …
a) Show how to declare a tag named complex for a structure with two members, rea
a) Show how to declare a tag namedcomplex for a structure with two members,real andimaginary, of type double. b) Use the complex tag to declarevariables named c1,c2 and c3. c) Wri…
a) Show that DES decryption is, in fact, the inverse of DES encryption. b) The 3
a) Show that DES decryption is, in fact, the inverse of DES encryption. b) The 32-bit swap after the sixteenth iteration of the DES algorithm is needed to make the encryption proc…
a) So far, we have mostly discussed TCP\'s congestion control and AIMD in the co
a) So far, we have mostly discussed TCP's congestion control and AIMD in the context of single-packet losses. This question examines how very long-lived TCP flows sending large am…
a) So far, we have mostly discussed TCP\'s congestion control and AIMD in the co
a) So far, we have mostly discussed TCP's congestion control and AIMD in the context of single-packet losses. This question examines how very long-lived TCP flows sending large am…
a) Specify all the data types (including classes) used in the program, giving on
a) Specify all the data types (including classes) used in the program, giving one of the values used for each type. b) List all the loop constructs used in the program and give th…
a) Spell Write a class Spell. A Spell has the following private attributes: • A
a) Spell Write a class Spell. A Spell has the following private attributes: • A String name • A double minimum damage • A double maximum damage • A double chance of success for th…
Subject
Web development and programming
Use Browse or pick another subject.