Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 3539 / 3837

a. Your MPI program crashes and prints the following error message. What caused
a. Your MPI program crashes and prints the following error message. What caused this crash? [2 pts] et15:82421 kAn error occurred in MPI Send et15:8242]reported by process [413571…
a. [ 5 points] Write the MIPS assembly code equivalent to the following HLL code
a.       [ 5 points] Write the MIPS assembly code equivalent to the following HLL code. Assume the variables A, B, and C are in $8, $9 and $10 respectively, and the variable ALLEQ…
a. [3 points] Derive a simple formula for the execution time of a program on a c
a.      [3 points] Derive a simple formula for the execution time of a program on a computer based on the properties of the program, compiler and the CPU. Consider two machines M1…
a. [5 marks] List the controlsignals that are required in the parallel interface
a.      [5 marks] List the controlsignals that are required in the parallel interface between an82C55A and an external printer device that is connected to portA. b.     [3 marks] …
a. b. u i ho pre e put circle waiting 1024 (10%) A multiprogramming operating sy
a. b. u i ho pre e put circle waiting 1024 (10%) A multiprogramming operating system uses paging. The available memory is 4096KB, and each frame is 4KB. The program A needs 359KB.…
a. button1 would be displayed at the top of the window with button 2 beneath it.
   a. button1 would be displayed at the top of the window with button 2 beneath it. b. only button 1 would be displayed at the top of the window. c. only button 2 would be display…
a. constructor/destructor b. empty() –check if the list isempty c. insertAtPos()
a. constructor/destructor b. empty() –check if the list isempty                  c. insertAtPos() – insert at a particular position d. deletePos() – delete the node at particularp…
a. create a JApplet that asks a user to enter a password into a JTextField and t
a. create a JApplet that asks a user to enter a password into a JTextField and then to press Enter. Compare the password to 'Rosebud"; if it matches exctly, display "Access Grante…
a. f = f + g + h + i + j + 2; b. f = g - (f + 5); a) For the C statements above,
a. f = f + g + h + i + j + 2; b. f = g - (f + 5); a) For the C statements above, what is the corresponding MIPSassembly code? Use a minimal number of MIPS assemblyinstructions. b)…
a. for sorting a bridge hand? which method is best heapsort, Merge exchange, or
a. for sorting a bridge hand? which method is best heapsort, Merge exchange, or comparison? b. For sorting a large class grades? which method is best,Heapsort, Merge exchange, or …
a. if the digit is an odd-number position, simply return the digit, of the digit
a. if the digit is an odd-number position, simply return the digit, of the digit is in an even-number position, double it. b. If the result is a single digit, return it; otherwise…
a. one is a standard letter, the other is a number b. the first is A, the second
a. one is a standard letter, the other is a number b. the first is A, the second is a c. one is standard ASCII, the other is extended ASCII d. one is 4-bit, the other is 8-bit 18·…
a. run demo1() which illustrates these points. Now add one more print my_iterato
a.  run demo1() which illustrates these points. Now add one more print my_iterator.next() at the end of demo1() and run it again. You should see a StopIteration exception. b.  Com…
a. tile write contenta b. Esie create contentag 38. The riieut ontent function a
a. tile write contenta b. Esie create contentag 38. The riieut ontent function array, reads the cons of aest tie that soes eachs individh e n indened a. Eile b. get riteo 39, When…
a. use the Euclidean algorithm to calculate d (Step 4, of Bob\'s RSA key choise
  a. use the Euclidean algorithm to calculate d (Step 4, of Bob's RSA key choise algorithm from below)   b. encode the text T = 8 using the public key (n,e)   c. decode your answe…
a. void function2( void) { int a, b, result = 0; cin >> a >>b; cout
a.     void function2( void)    {        int a, b, result = 0;        cin >> a >>b;        cout << a+b <<endl;        result = a+b;        return result;  …
a. what type of source port is used in the this communication? B. what is the de
a. what type of source port is used in the this communication? B. what is the destination port used for the sommunication? c. What is the length of the UDP header? Expression. r 0…
a. which commmand has been used to generate the above outputs? b. what is the ip
a. which commmand has been used to generate the above outputs? b. what is the ip adderss of the computer? c. what is the ip adderss that this computer is located ? d. what is the …
a. why is the pairwise comparison used in the Analytic Hierarcvhy Process(AHP) a
a. why is the pairwise comparison used in the Analytic Hierarcvhy Process(AHP) a good idea? explain briefly b. Consider the following requirement "the web page shall be user frien…
a. write a program to process a collection of daily high temperatures. your prog
a. write a program to process a collection of daily high temperatures. your program should count and print the number of hot days (high temperature 85 or higher), the number of pl…
a. “Testing can only show the presence of errors in a program. It cannot demonst
a. “Testing can only show the presence of errors in a program. It cannot demonstrate that there are no remaining faults” Based on the statement above, explain why testing can only…
a. “Testing can only show the presence of errors in a program. It cannot demonst
a. “Testing can only show the presence of errors in a program. It cannot demonstrate that there are no remaining faults” Based on the statement above, explain why testing can only…
a. “The chair of the department has requested a current list of all student majo
a. “The chair of the department has requested a current list of all student majors in ascending order by major and then name that are currently in the database. The example output…
a.) Before execution of \"jal AVG\", what are the contents of St0, St1, and $t2.
a.) Before execution of "jal AVG", what are the contents of St0, St1, and $t2. b.) Before execution of "sra SvO,Sv0,1", what are the contents of SvO, $t3, & Sra? c.) After pro…
a.) Create the Class Diagram for the Base Class – Player In other words. Design
a.) Create the Class Diagram for the Base Class – Player In other words. Design a class named Player that holds a player number and name for a sports team participant. Include met…
a.) Describe the high level steps involved for decryption using a Feistel cipher
a.) Describe the high level steps involved for decryption using a Feistel cipher. b.) Modify the pseudo code provided below that describe encryption using a Feistel network to do …
a.) Given that a procedure A calls procedure B in Intel 64-bit architecture, for
a.) Given that a procedure A calls procedure B in Intel 64-bit architecture, for each task below involved in the call and execution of procedure B, indicate whether the task is pe…
a.) Let x be an 8-bit variable (of type char). The following exercises test your
a.) Let x be an 8-bit variable (of type char). The following exercises test your knowledge of bit masking. For the following, write a single line of C code that represents the giv…
a.) Let x be an 8-bit variable (of type char). The following exercises test your
a.) Let x be an 8-bit variable (of type char). The following exercises test your knowledge of bit masking. For the following, write a single line of C code that represents the giv…
a.) Structure inventory containing character array partName[ 30 ], integer partn
a.) Structure inventory containing character array partName[ 30 ], integer partnumber, floating point price, integer stock and integer reoder. b.) Union data containing char c, sh…
a.) Suppose our bill denominations were 1, 4, 7, 13, 28, 52, 91, 365 and we have
a.) Suppose our bill denominations were 1, 4, 7, 13, 28, 52, 91, 365 and we have a greedy algorithm that repeatedly takes the largest bill value and adds it so long as it doesn't …
a.) What must be changed to in the pipelined datapath to add this instruction to
a.) What must be changed to in the pipelined datapath to add this instruction to the MIPS ISA? b.) Which new control signals must be added to your pipeline from a? c.) Does suppor…
a.) Write a stored procedure to display the average fee that the dogs with dogNa
a.) Write a stored procedure to display the average fee that the dogs with dogName X were charged. X is to be an input parameter to the stored procedure. It is expected that your …
a.)For this program specification, I only want you to outline the code . No repe
a.)For this program specification, I only want you to outline the code.  No repeating the question in a English-class-style flowery paragraph of lame. No C++. These are the outlin…
a.4 This is Microcomputer maintenance 1. Two methods for recovering from a forge
a.4 This is Microcomputer maintenance 1. Two methods for recovering from a forgetten BIOS passwords are a. Flashing the ROM BIOS b. Shorting the CMOS with a jumper   c. Pressing F…
a.Build a regular expression that captures any number in the following formats:
a.Build a regular expression that captures any number in the following formats: 3.1452926 6 -212.45 126 1.9e10 For simplicity, assume only a nonnegative integer may appear after ‘…
a.Create a BirdSighting class for the Birmingham Birdwatcher’s Club that include
a.Create a BirdSighting class for the Birmingham Birdwatcher’s Club that includes data fields for a bird species sighted, the number seen, and the day of the year. For example, Ap…
a.Create a class named CarRental that contains fields that hold a renter’s name,
a.Create a class named CarRental that contains fields that hold a renter’s name, zip code, size of the car rented, daily rental fee, length of rental in days, and total rental fee…
a.Create a class named Circle with fields named radius, diameter, and area. Incl
a.Create a class named Circle with fields named radius, diameter, and area. Include a constructor that sets the radius to 1 and calculates the other two values. Also include metho…
a.Create a class named Employee. Data members include the Employee’s ID number,
a.Create a class named Employee. Data members include the Employee’s ID number, first and last names, and hourly pay rate. Member functions include overloaded insertion and extrac…
a.Create a class named Order that performs order processing of a single item. Th
a.Create a class named Order that performs order processing of a single item. The class has the following five fields: •Customer name •Customer number •Quantity ordered •Unit pric…
a.Create a class named Pay that includes five double variables that hold hours w
a.Create a class named Pay that includes five double variables that hold hours worked, rate of pay per hour, withholding rate, gross pay, and net pay. Create three overloaded comp…
a.Create a program named FriendList that declares an array of eight Friend objec
a.Create a program named FriendList that declares an array of eight Friend objects and prompts the user to enter data about the friends. Display the Friend objects in alphabetical…
a.Design a class named Circle with fields named radius, area and diameter. Inclu
a.Design a class named Circle with fields named radius, area and diameter. Include a constructor that sets the radius to 1. Include get methods for each field, but include a set m…
a.How do one’s complement and two’s complement differ as representations of nega
a.How do one’s complement and two’s complement differ as representations of negative numbers in binary? b.Write a regular expression that describes all negative numbers represente…
a.Identify ONE (1) analytic question that seem possible/feasible b.Justify the r
a.Identify ONE (1) analytic question that seem possible/feasible b.Justify the reason(s) why the analytic question seem suitable for the dataset c.Identify ONE (1) learning algori…
a.Name your file recursive_power.py . b.Ask for the user to enter a base number,
a.Name your file recursive_power.py. b.Ask for the user to enter a base number, and an exponent (the power to raise the base to). Ensure that the exponent is a non-negative intege…
a.Name your program hw13b.c b.The function proto-type will look like: char *lcsu
a.Name your program hw13b.c b.The function proto-type will look like: char *lcsuffix(char str1[], char str2[]); where str1[] and str2[] are the two input strings, and the returned…
a.Pick one of the following conditions that have not been chosen by someone else
a.Pick one of the following conditions that have not been chosen by someone else, and write the code that would perform the condition. b.Write a condition that will return the val…
a.Seperate this into 3 parts- class specification, class member functions defini
a.Seperate this into 3 parts- class specification, class member functions definition and test file. b.create a member function- multiplication for complex are defined as (a+bi) * …