Programming question and answers for July 02, 2023
- Q A student is eligible to apply for graduation in a semester if thestudent has completed 120 or more credits and currently registeredin the senior project class. Your job is to...
- Q What in your opinion is the best place to locate a firewall bycomparing firewall locations on a network by considering thatmultiple firewalls could be beneficial or an obstacle withreferences?
- Q PLEASE DO NOT ATTEMPT MY QUESTION WITH ANY SHORT ANSWER ORMEDIOCORE ANSWER. I AM A UNIVERSITY STUDENT AND I NEED TOUNDERSTAND IT BEYOND THE SURFACE INFORMATION.IMPACT OF HEALTHCARE TECHNOLOGY ON...
- Q Using a Java.2. Write a Java program calculate_fare.java to take the inputfor number of miles, and the class of journey (1,2, or 3, forfirst, second, and third class respectively), for...
- Q Language C++!In part 2, you will be focusing on allowing one of the fourtransactions listed below to be completed by the user on one of hisaccounts: checking or savings. You...
- Q 1.Why is communication valubale to business environment ??2.You are a junior manager in a store. Senior management hasgiven you the following personal memo and ask you to turn it into...
- Q Briefly explain an NTFS Standard Permission and what it is usedfor. How are those different from FAT permissions? Are NTFSpermissions necessary?
- Q In this question, you are investigating a private sector casethat involves a possible termination of an employee of a largecommercial organisation. You have been given access to the employeecomputer on...
- Q In distributed software development there are temporal,geographical and sociocultural distances. Which of the followingstatements are trueDSD allows convenient access to remote skilled work forcesDSD reduces the need for coordination thus...
- Q Recall that in MergeSort algorithm, we used a linear-timesubroutine called Merge which merges two sorted lists into a singlesorted list. Now suppose there are k sorted lists and there are...
- Q An array A of n distinct numbers are said to be unimodal ifthere exists an index k, 1 ≤ k ≤ n, such that A[1] < A[2] < ·· ·...
- Q 1. Explain the following behaviour by two employees and whetherit is appropriate. Sam comes from a country where it is acceptableto wink at others.Sam has done this as a habit...
- Q Step1 - Define two classes, Whole and part. Use a strong \"has a\"relationship with the two classes.           Constructor Functions           Define a default constructor for the Part class.                       Default just prints out \"In default...
- Q The LabFor this assignment, you need access to a computer runningWindows 7, Windows 10 or a current operating system. Create afolder that contains two subfolders and five files of differenttypes....
- Q In C# Create a windows application which accepts the monthnumber and displays the month name in a label.  Use a nested if... else statement to determine the monthname.For months not in...
- Q C LANGUAGE ONLYWrite a C program to count the total number of duplicate elements in an array.Enter the number of elements to be stored in the array: 3Input 3 elements...
- Q Show how to augment the ordinary Binary Search Tree (BST) datastructure so that it supports an efficient procedure which, oninput (x, k) where x is the root of a BST...
- Q 2. Implement a decoder for the encoding scheme used in the firstproblem. The decoder will reverse whatever operation was performedon the string, meaning each character will be rotated 3 to...
- Q DNS is a service thatis predominant in networking for resolution. It is now arequirement of the Microsoft OS, but before in the NT 4.0 world, itwas an add-on and not...
- Q Consider the context-free grammar G = ( {S}, {a, b}, S, P) whereP = { S -> aaSb | aab }.Construct a NPDA M that such that L(M) = L(G).I...
- Q Here is my java code. It works and has the correct output, but Ineed to add a file and I am not sure how. I cannot use theFileNotFoundException. Please help!import...
- Q Write a C function str_to_float() that takes a numeric string asinput and converts it to a floatingpoint number. The function should return the floating point numberby reference. If theconversion is...
- Q PYTHON-- create a method that prints items from a stackin a top to bottom order
- Q Create a Class with Data Fields and Methods in Java. Provide aJava coding solution for the following:1. Name the class SalonServices2. Add private data fields: a. salonServiceDescription – Thisfield is...
- Q Question 3.Describe memory types used in the MIPS assembly.Explain registers used in the MIPS assembly.Differentiate between assembly source code and machinecode.Write a note on MIPS instruction formats.
- Q Was it ever one of your job duties to provide analysis withregard to Strategic Information Systems? How would you alter yourreport in lieu of what you have learned now? If...
- Q Lab 11 C++Download the attached program and run it - as is. It will promptfor a Fibonacci number then calculate the result using a recursivealgorithm. Enter a number less then...
- Q Step 1: Create a new Java project calledLab5.5.Step 2: Now create a new class calledaDLLNode.class aDLLNode {aDLLNode prev; Â Â char data; Â Â aDLLNode next;aDLLNode(char mydata) { // Constructordata = mydata;next = null;...
- Q Consider each situation in turn and for each say whetherhashing, encryption or both would be applicable, and brieflyoutline how it would be used.A user logs in to an online shop.A...
- Q Challenge 4 – Random Integer in Range Write a function to returna random integer between a minimum value and maximum value.var ival = IntRandomRange(, );
- Q Discuss how you determine the metric for the default path ofyour computer. What information do you need? Where do you find thisinformation and does a regular user have the authority...
- Q This C++ assignment asks to write a function that determines ifa C-string begins with a specified prefix. It should have thefollowing signature: bool starts(char *str, char *prefix) It should return...
- Q The number –11.375 (decimal) represented as a 32-bitfloating-point binary number according to the IEEE 754 standardis
- Q Starting with the Fourier transform pairx ( t ) = u ( t + 1 )   -   u ( t- 1 )     ⇔   X ( Ω ) = 2sin ( Ω ) / Ωand...
- Q Write a program that simulates a vending machine. The machineholds six snack items labeled them 1 through 6. The program shouldinitially display a menu of items along with their prices:Vending...
- Q Consider a discrete-time periodic signalx [ n ]   =   cos ( 0 . 7 πn )(1) Determine the fundamental period of x[n].(2) Suppose x[n] is obtained by sampling the continuous-timesignal  x ( t)   =   cos   (...
- Q A student registers for several courses and completes themduring their academic session. Design a detailed state transitiondiagram for obtaining a degree starting from course registration tocompletion. Include all possible states...
- Q Scenario: You are a network administrator in a medium-sizedcompany. The owner has heard of using RIP and OSPF on the routersand that it will help your network. He isn't very...
- Q I am stuck on this problem and I am not sure what the solutionis. In CWrite item.h and item.c.In item.h, typedef a struct (of type t_item) which contains thefollowing information:...
- Q ExcelIn Sell/Hold Column, use Logical function to determinewhichstockshould sell or hold.For stock in either Financials orCommunication Sector, have negative Correlation, listed in HongKongStock Exchange and beta between 0.04 and 0.09,stock...
- Q Create a view named customer_addresses that shows the shippingand billing addresses for each customer. This view should returnthese columns from the Customers table: customer_id, email_address,last_name and first_name. This view should...
- Q Write a Python program which generates a random number between 0and 24 inclusive and that print out:• the double of the random number if the random number isgreater than 12,•...
- Q What recommendations can cyber security practitioners adopt inorder to introduce a few immediate steps to bring about meaningfulchange?
- Q Create a family tree with a 3D vector in C++. Then, determinethe worst, average and best time complexities of the program.
- Q Use the class definition below to answer the followingquestions. [Total 8 Marks]public class TrafficLight {String stopLight = \"red\";String waitLight;String goLight;public void setStopLight(String colour) {stopLight = colour; }public String getGreenLight() {return...
- Q why the OSI model is important?and compare between TCP/IP and OSI model?
- Q \"With regards to simulation and uncertainty: Discuss possibleapplications of the use of simulation in higher education. As youlead the discussion, I would like your examples to be as specificas possible...
- Q Using Java preferably with EclipseTask:Write a program that creates a class Apple and a tester to makesure the Apple class is crisp and delicious.Instructions:First create a class called AppleThe class...
- Q For each of the following write the line(s) of code that:Declares and initializes (creates) an ArrayList thatholds String objectsAdds to your ArrayList the words \"Too\" and\"Fun\"Verifies that your ArrayList now...
- Q In class we learned that, if terms added in a series continuallydecrease in size, the terms will eventually be too small to bestored by MATLAB. When a number is too...
- Q /*Â Â Â Â Here is an example of a conditional inJavaScript*/var numberOfParticipants = 5;var maxNumberOfParticipants = 10;if (numberOfParticipants < maxNumberOfParticipants){Â Â Â Â console.log(\"You can add anotherparticipant now\");}else{Â Â Â Â console.log(\"Sorry, you have reached themax number of participants and cannot...
- Q Argue the ethical dilemma raised by data brokers, based on anethical theory of your choice.
- Q in C++For this program, you are going to implement a stack using anarray and dynamic memory allocation.A stack is a special type of data structure that takes in values(in our...
- Q what is the role of education technology in classroom/education? (please include references/ links below from articles,research etc. where did you get your answer)pls answer in bulleted type with explanation each...
- Q 1. Bob wants to use DES to make a secured communication withAlice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKImethod to distribute the DES key to...
- Q In python of Jupiter notebookWrite a python function called trng that takesthree numbers x, y, and z, and specifies if those can form atriangle (i.e., returns the word triangle if...
- Q Write a program in C to perform the following:Generates an array of 10 double random values between 1.0 and100.0 – assume these are prices for 10 items that a storesellsGenerates...
- Q Youhave been hired as a consultant to a Mobile Development Firm.The organization would like your top three ideas for new mobileapplications that would generate revenue for business. The threeapplications must...
- Q Posting together because they are related.Python1. Create a program to count the number of occurrences of eachletter of the alphabet in a text file, and print out the total foreach...
- Q Research and include thefollowing:Security Risk Mitigation Plan:Select and document security policies and controls.Create password policies.Document administrator roles and responsibilities.Document user roles and responsibilities.Determine an authentication strategy.Determine an intrusion detection and...
- Q *Need in C language also need full documentation/explanationof each line*Thank you!Write a program that records high-score data from a simulatedFIFA soccer game available online. The program will ask the user...
- Q modify the code below to create a GUI program that accepts aString from the user in a TextField and reports whether or notthere are repeated characters in it. Thus your...
- Q Research and include thefollowing:Security Risk Mitigation Plan:Develop education plan for employees on security protocols andappropriate use.Provide risk response.AvoidanceTransferenceMitigationAcceptanceAddress change Management/Version Control.Outline acceptable use of organizational assets and data.Present employee policies...
- Q Please edit the code with linked lists in C++Please provide your BookData.txt file as wellBookRecord.cpp file#include \"BookRecord.h\"#include <stdio.h>#include <string.h>#include <iostream>#include <fstream>using namespace std;BookRecord::BookRecord() {Â Â strcpy_s(m_sName, \"\");Â Â m_lStockNum = 0;Â Â m_iClassification...
- Q A developer identifies the following triggers on theExpense_c object:DeleteExpense,applyDefaultstoexpensevalidateexpenseupdate;The triggers process before delete, before insert, andbefore update events respectively. Which two techniques should thedeveloper implement to ensure trigger best practice...
- Q Develop the code for this sort algorithm:ShakershakerSort is a variation of the bubbleSort where we alternatelygo up and then down switching out-of-order pairs until done.In it have code that counts...
- Q What should the range be for each of the following for the mostsignificant association rules:Support, Confidence, Lift and Conviction?
- Q 1.What process is used to ensure that evidence is kept secureand it's integrity is maintained from collection todestruction?2.Blank image is an exact copy without the addition of anycompression or metadata.3.What...
- Q ifsomeone has a dataset and they want to build a neural network, howwould someone be able to progam that in python for a machinelearning project
- Q Describe Hunter's Algorithm for building decision trees. Build adecision out of the following (\"training\") dataset. The goal is todetermine if a person is a defaulted borrower given values for thefirst...
- Q Can someone please convert this java code to C code?import java.util.LinkedList;import java.util.List;public class Phase1 {/* Translates the MAL instruction to 1-3 TAL instructions* and returns the TAL instructions in a...
- Q Need to HAVE a web page that uses a loop to allow a teacher toenter the following information for all students in a class:student's name, mt  grade, f  grade, hW grade,attendance grade.program...
- Q Write a Java program to do the following: Ask the user to enter10 first names (one word - no hyphen or apostrophe) using thekeyboard.1) Display the list of names one...
- Q Hello!*Need in C language also need full documentation/explanationof each line*Designing and implementing an Array of Structures - CourseGradeWrite a program that uses a structure to store the followingdata:Member Name DescriptionName...
- Q Which of the following statements about RFID is/are not true?(MULTIPLE ANSWERS)A. Can be used in inventory managementB. Tolltag is an RFID transmitterC. Sending device requires power to be applied in...
Get Answers to Unlimited Questions
Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!
Membership Benefits:
- Unlimited Question Access with detailed Answers
- Zin AI - 3 Million Words
- 10 Dall-E 3 Images
- 20 Plot Generations
- Conversation with Dialogue Memory
- No Ads, Ever!
- Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!