Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 3537 / 3837

a. Sammy’s Seashore Supplies rents beach equipment such as kayaks, canoes, beach
a. Sammy’s Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrellas to tourists. In Chapters 3 and 4, you created a Rental class for the company…
a. Search the Java Web site at http://java.sun.com for information on how to use
a. Search the Java Web site at http://java.sun.com for information on how to use a JTextArea, its constructors, and its setText() andappend() methods. Write an application that al…
a. Search the Java Web site for information on how to use a JTextArea. Write an
a. Search the Java Web site for information on how to use a JTextArea. Write an application for the WebBuy Company that allows a user to compose the three parts of a complete e-ma…
a. Section 1: The pseudo code of the bubble sort algorithm i. The input is a lis
a. Section 1: The pseudo code of the bubble sort algorithm i. The input is a list of unsorted integers (A) ii. The return is a list of sorted integers (B) b. Section 2: The pseudo…
a. Setthe first name only. b. Setthe last name only. c. Store and set the middle
a.       Setthe first name only. b.       Setthe last name only. c.       Store and set the middle name. d.       Checkwhether a given first name is the first name of thisperson. …
a. Show the Java code (just the loops – complete Java methods are not necessary)
a. Show the Java code (just the loops – complete Java methods are not necessary): Write a loop that reads 10 strings (assume you have a scanner object named "in" to read strings f…
a. Some of the characteristics of a book are the title, author(S), publisher, IS
a. Some of the characteristics of a book are the title, author(S), publisher, ISBN, price, and year of publication. Design a class bookType that defines the book as an ADT i. Each…
a. Some of the characteristics of a book are the title, author(S), publisher, IS
a. Some of the characteristics of a book are the title, author(S), publisher, ISBN, price, and year of publication. Design a class bookType that defines the book as an ADT i. Each…
a. Some of the characteristics of a book are the title, author(s), publisher, IS
a. Some of the characteristics of a book are the title, author(s), publisher, ISBN, price, and year of publication. Design a class bookType that defines the book as an ADT. i. Eac…
a. Some of the characteristics of a book are the title, author(s), publisher, IS
a. Some of the characteristics of a book are the title, author(s), publisher, ISBN, price, and year of publication. Design a class bookType that defines the book as an ADT. i. Eac…
a. Some people argue that a hacker who defaces a Web page of a government entity
a. Some people argue that a hacker who defaces a Web page of a government entity such as the White House, Congress, or Parliament should receive harsher punishment than a hacker w…
a. Step1: Identify the potential classes in this problem domain by listing all t
a. Step1: Identify the potential classes in this problem domain by listing all the nouns in above problem domain b. Step2: Refine the list to include only the necessary noun on th…
a. Submit this homework electronically. Name your program hw14a.c b. Don’t do wh
a. Submit this homework electronically. Name your program hw14a.c b. Don’t do what the problem states. We’ll do something different. c. Let the input file, hw14a.in, contain: Boom…
a. Suppose A, B, and C are normalized 32-bit IEEE 754 floating point variables w
a. Suppose A, B, and C are normalized 32-bit IEEE 754 floating point variables with A having a real value of 1.1001x^60 and B having a real value of 1.01x^20. After the high level…
a. Suppose A[0···n1] just contains the numbers1,0,1. Design an algorithm that so
a. Suppose A[0···n1] just contains the numbers1,0,1. Design an algorithm that sorts the elements of A in-place in O(n) time. That is, your algorithm shouldn’t use another array. T…
a. Suppose that a stop-and-wait protocol was used on a channel has a 10 millisec
a. Suppose that a stop-and-wait protocol was used on a channel has a 10 millisecond propagation delay and sender frames sizes of 50 milliseconds. The receiver must fully receive t…
a. Suppose the program counter, PC, has the value 0x12345678. What is the value
a. Suppose the program counter, PC, has the value 0x12345678. What is the value of PC after executing the following jump instruction? j 0x10 Note: The meaning of "0x10" here is th…
a. The Palmertown Elementary School has 30 classrooms. The children in the schoo
a. The Palmertown Elementary School has 30 classrooms. The children in the school donate used books to sell at an annual fundraising book fair. Write a program that accepts each t…
a. The Rochester Bank maintains customer bank records in a random access file. W
a. The Rochester Bank maintains customer bank records in a random access file. Write an application that creates 10,000 blank records and then allows the user to enter customer ac…
a. The Rochester Bank maintains customer records in a random access file. Write
a. The Rochester Bank maintains customer records in a random access file. Write an application that creates 10,000 blank records and then allows the user to enter customer account…
a. The Talk-A-Lot Cell Phone Company provides phone services for its customers.
a. The Talk-A-Lot Cell Phone Company provides phone services for its customers. Create an abstract class named PhoneCall that includes a String field for a phone number and a doub…
a. The Talk-A-Lot Cell Phone Company provides phone services for its customers.
a. The Talk-A-Lot Cell Phone Company provides phone services for its customers. Create an abstract class named PhoneCall that includes a String field for a phone number and a doub…
a. The arp command: arp -s InetAddr EtherAddr allows you to manually add an entr
a. The arp command: arp -s InetAddr EtherAddr allows you to manually add an entry to the ARP cache that resolves the IP addressInetAddr to the physical address EtherAddr. What wou…
a. The following function returns the position of the FIRST occurrence of C-stri
a. The following function returns the position of the FIRST occurrence of C-string str2 in C-string str1. Complete the function using array access, i.e. str1[i], but no pointer ac…
a. The magnetic flux through a closed surface surrounding only the south pole of
a. The magnetic flux through a closed surface surrounding only the south pole of a bar magnet is always greater than zero. b. The magnetic flux through a fixed circular loop is ma…
a. The main program must besmaller than 10 lines long (not including comments)…t
a.      The main program must besmaller than 10 lines long (not including comments)…thismeans you need to use functions b.     Make sure to display a welcomemessage describing the…
a. The mean of a list of numbers is its arithmetic average. The median of a list
a. The mean of a list of numbers is its arithmetic average. The median of a list is its middle value when the values are placed in order. For example, if a list contains 1, 4, 7, …
a. The mean of a list of numbers is its arithmetic average. The median of a list
a. The mean of a list of numbers is its arithmetic average. The median of a list is its middle value when the values are placed in order. For example, if a list contains 1, 4, 7, …
a. Trace the operation of insertion sort algorithm when sorting the array A[7] (
a. Trace the operation of insertion sort algorithm when sorting the array A[7] (5, 6. 2, 7.9, 4, 3). Please fill the table to show the changes of the array A after each iteration.…
a. Translate the program into C b. Perform a box trace of the recursive function
a. Translate the program into C b. Perform a box trace of the recursive function (getValue (3, 13, 5) and displayOctal (100) respectively) Perform a stack trace for the recursive …
a. True In general a computer with one level of cache is expected to operall two
a. True In general a computer with one level of cache is expected to operall two levels of cache. a. True Tasiu 8. b. False 9 control unit is used in x86 processors. c. DMA d. DRA…
a. Tuples Complete the code to test if the tuple my_object = (4, 3, 2, 1) is Ite
a. Tuples Complete the code to test if the tuple my_object = (4, 3, 2, 1) is Iterable. Be sure to use a for loop at the end to iterate through all the items in the tuple. b. Dicti…
a. Use Newton\'s Divided Difference formula to construct the interpolating polyn
a. Use Newton's Divided Difference formula to construct the interpolating polynomial of degree four fo the unequally spaced points given in the following table. I need a MATLAB co…
a. Use the base class name, the dot operator, and the method name. b. The derive
   a. Use the base class name, the dot operator, and the method name. b. The derived class version is not allowed to access the base class version. c. Copy the base class code int…
a. Using c++, Write a class Scandinavian_flag that can construct the flags of De
a. Using c++, Write a class Scandinavian_flag that can construct the flags of Denmark, Finland, and Norway, and a main which creates each flag like this: Scandinavian_flag Denmark…
a. Visit http://www.cplusplus.com/reference/clibrary/. Under Reference tab on th
a. Visit http://www.cplusplus.com/reference/clibrary/. Under Reference tab on the left side, There are 5 libraries on the list: C library, Containers, Input/output, Multi-threadin…
a. Watson Elementary School contains 30 classrooms numbered 1 through 30. Each c
a. Watson Elementary School contains 30 classrooms numbered 1 through 30. Each classroom can contain any number of students up to 35. Each student takes an achievement test at the…
a. We would like for the distance traveled to be a floating point value. Discuss
a. We would like for the distance traveled to be a floating point value. Discuss any issues involved in making sure that a C program will compute the correct value using the formu…
a. What are the differences among sequential access, direct access, and random a
a. What are the differences among sequential access, direct access, and random access? b. Discuss memory hierarchy pyramid. c. Discuss the organization and structure of cache memo…
a. What does “getcwd()” return (a float, an integer, string, array)? Show how to
a. What does “getcwd()” return (a float, an integer, string, array)?         Show how to call it with a parameter named “d”, and what is the type of “d”?     b. 1. When a program …
a. What is API? How does API facilitate programmers and system architects? b. Wh
a. What is API? How does API facilitate programmers and system architects? b. What is image metadata? Give three examples of image metadata. c. Define fetch and Execute Cycles (I.…
a. What is CPT? What does it mean if we have high CPT? b. Given two machines A a
a. What is CPT? What does it mean if we have high CPT? b. Given two machines A and B. They have performance of 35 MIPS (millions instructions per second) and 15 MIPS for certain b…
a. What is a hidden terminal problem? What is the solution to address the proble
a. What is a hidden terminal problem? What is the solution to address the problem? Why is the hidden terminal problem so common in wireless network but not in wired network? In wi…
a. What is a hidden terminal problem? What is the solution to address the proble
a. What is a hidden terminal problem? What is the solution to address the problem? Why is the hidden terminal problem so common in wireless network but not in wired network? b. Su…
a. What is a hidden terminal problem? What is the solution to address the proble
a. What is a hidden terminal problem? What is the solution to address the problem? Why is the hidden terminal problem so common in wireless network but not in wired network? b. Su…
a. What is a hidden terminal problem? What is the solution to address the proble
a. What is a hidden terminal problem? What is the solution to address the problem? Why is the hidden terminal problem so common in wireless network but not in wired network? b. Su…
a. What is func in this function? Provide description and how func would be ente
a. What is func in this function? Provide description and how func would be entered. b. What is es? Provide definition. How can you calculate an es if you want n number of signifi…
a. What is the range of unsigned integer numbers that can be represented with 4
a. What is the range of unsigned integer numbers that can be represented with 4 bits 8 bits 32 bits n bits b. What is the range of numbers in signed magnitude format that can be r…
a. What is the source port for TCP, and what protocol type is using TCP fot tran
a. What is the source port for TCP, and what protocol type is using TCP fot transport? b. What is the destination port, and what does the port number indicate c. what is the ackno…
a. What is the total address space that can be covered by that mode? b. What wou
a.    What is the total address space that can be covered by that mode? b.   What would be the maximum size of an integer array, if the compiler would use this instruction? 2.   T…