Programming question and answers for July 07, 2023
- Q please provide clarity1. What is the purpose behind EtherChannel negotiationprotocols?2. What is the difference between LACP and PAgP in terms ofthe number of interfaces that may be bundled into a...
- Q Step 1: Edit SumMinMaxArgs.javaDownload the SumMinMaxArgs.java file, and open it in jGrasp (ora text editor of your choice). This program takes a number ofcommand line arguments, parses them as ints,...
- Q #include <stdio.h>int main(void) {float funds = 1.0, cost = 0.1;int candies = 0;while(cost <= funds) {candies += 1;funds -= cost;cost += 0.1;}printf(\"%d candies with $%.2f left over.\n\",candies,funds);return 0;}When you compile...
- Q The challenge of rolling out television service is a process tobe achieved using a number of steps. Answer the four parts belowabout television service rollouts..Part 1: What are the required...
- Q As in previous labs, please write the Java code for eachof the following exercises in BlueJ. For each exercise, write acomment before the code stating the exercise number.Make sure you...
- Q In C, create a program that displays the minimum and maximumvalues stored in a data file \"datafile.txt\". Use the followingfunction prototype:Â Â void minmaxarray(float value, float*min, float *max);
- Q USE C PROGRAMMING, call all functions in main, and use a 2 by 32d array to test, thanks.get_location_of_min This function takes amatrix as a 2-D array of integers with NUM_COLS...
- Q A Campus level (LAN) network is to be redesigned to meet thebusiness and technical goals of an university.1- Discuss the basic steps of an implementation strategy toapply various networking technologies...
- Q Modify the linked list code from class to work with strings.Insert the following food items into the list and display the list.The items are: bread, noodles, milk, bananas, eggs. Insert...
- Q compare and contrast AdBlock for Chrome and AdBlock forIE(Clearly discuss the results Outline any limitations of thesystems and include a Conclusion)
- Q You will need to provide screenshots of each number and eachtask. Example: Number 8 in VM One should have 20 screenshots, onefor each command. Once completed merge all shots into...
- Q Secure VPN Configuration and Management & Wireless NetworkDefenseGive me two pages of easy about the topic.
- Q Using the singly linked list code as a base, create a class thatimplements a doubly linked list. A doubly linked list has aPrevious link so you can move backwards in...
- Q Two players play a game where they start with a row of n pilesof varied amounts of money. The players take turns and in each turna player can pocket either...
- Q Create the following functions for an array in C++. Testwith size 10, 10,000 and 100,000. Time each sort.Merge sortInsertion SortSelection Sort       Bubble SortQuick SortPLEASE DO IT IN C++
- Q Find out the control words for the followingMicrooperations. Also, specify the functions beingcarried out by each of these Microoperations.(i) R2â†clc(R2+R4+1)(ii) -R3+R5(iii) Output↠shr(R7-R2-1)(iv) R1â†Input(v) R3â†R4’+1(vi) R6â†R2-R1+1(vii) R5â†0(viii) R3â†R2, Câ†1(ix) R1â†Input-R4-1(x)...
- Q var selectedColor =document.getElementById(\"colorChoice\").value;var selectedStyle = document.getElementById(\"style\").value;var selectedSize = document.getElementById(\"size\").value;var orderMessage = \"Your order is: Color = \" +selectedColor+ \"; Style = \" + selectedStyle+ \"; Size = \" + selectedSize+\"\n\";if...
- Q Write a program using python that loops over each file in aspecified directory and checks the size of each file.You shouldcreate 2-tuple with the filename and size, should append the2-tuple...
- Q reate a C# program.-Create 5 variables as decimals: Count, pricce, subtotal, tax, andtotal-Use a do while loop. If the price is not -1, the loopcontinues.Show count number (ie: Item 1,...
- Q class ArrayStringStack{ String stack[]; int top; public arrayStringStack(int size) { stack = new String[size]; top = -1; } //Assume that your answers to 3.1-3.3 will be inserted here,...
- Q In RVW complete the following Sensor Challenges: Hand in yourcode for each challenge (you can paste into one document)Try – it Forward until Touch Move the robot to theobstacle.  Once the...
- Q Consider the following propositional formula:(((A ^ B) -> C) ^ ((A ^ C) -> D)) -> ((A ^ B) ->D)Perform the following tasks for this formula:Convert this formula into CNF...
- Q In C++Create a program that uses Selection Sort andInsertion Sort for the National Football League list of currentplayers. It's going to be a big list(over 1000 names). Pleaseidentify, in comments,...
- Q Your boss came to you and asked about Group Policies. Hedoesn't understand how Group Policies work, or the reason to havethem to begin with. Discuss what you would say to...
- Q C programming4. Exploring Pointers and Use of Arrays [15 pts]In a shell environment, programs are often executed using commandlines arguments. For example:g++ -o cm03_la01 cm03_la01.c.In C such program can be...
- Q Describe in depth the role in which organizational risktolerance plays in relation to systems under assessment.
- Q Complete the following methods in java:Consult the rest of the methods of BigInteger from its APIdocumentation as needed to solve the following problems.public static List<BigInteger> fibonacciSum(BigIntegern)The unique breakdown into Fibonacci...
- Q •Write a JAVA program to check a given password strength from auser's input.•Create a method to check the number of characters. It must bemore than 8.•Create a method to check...
- Q In this case study, your task is to study different searchalgorithms to solve the N-Queens Problem which has been presentedin class. We will focus on the incremental formulation in which...
- Q I'm new in MATLAB and I have to write a code in MATLABwhich converts a number from one base to another without usingbase2base, etc
- Q Suppose a computer using direct mapped cache has 224bytes of byte-addressable main memory, and a cache of 128 blocks,where each cache block contains 8 bytes. For fully associativecache, to which...
- Q write C# console app No arraysCredit card validation Problem. A credit card number must bebetween 13 and 16 digits. It must start with: –4 for visa cards –5for mater cards...
- Q Identify when to use architecture representation diagrams andcommunication flows. Define and illustrate when decomposing ofarchitecture would be used. Provide an example of architecture riskassessment and threat modeling.
- Q Create a program RandomFile.java that generates files with random numbers/characters.You arerequired to write the following three methods in the classRandomFile:​publicstatic void randomBinaryFile(StringfileName,int length)​publicstatic void randomNumberFile(StringfileName,intlength)​publicstatic void randomCharFile(StringfileName,int length)The parameter “fileNameâ€specifies...
- Q Identify and describe what threat agents should be avoided inpreparation for an assessment. How do we effectively screen outirrelevant threats and attacks in this preparation?
- Q Source code with comments explaining your code in C#Program 2: Buh-RING IT! For this assignment, you’re going tosimulate a text-based Role-Playing Game (RPG). Design (pseudocode)and implement (source) for a program...
- Q IN JAVAWrite a program that uses a two-dimensional array to store thehighest and lowest temperatures for each month of the year. Promptthe user for 12 months of highest and lowest.  Write...
- Q Python Question:Johnny has some difficulty memorizing the small prime numbers.So, his computer science teacher has asked him to play with thefollowing puzzle game frequently. The puzzle is a 3x3 boardconsisting...
- Q Given the differential equationx′=(x+3.5)(x+1.5)3x2(x−1)x′=(x+3.5)(x+1.5)3x2(x−1).plotting the slope field using MATLAB.Is anybody can tell me every step with this? How to get thisdifferential equation slope field by MATLAB? I need each step.Thanks!
- Q Build a Dynamic Programming algorithm in Python for thefollowing problem.Given two sequences of vowels, find the length of longestsubsequence present in both of them.NOTE: A subsequence is a sequence that...
- Q Question 3 - Suppose that TCP's current estimated values for theround-trip time (estimated RTT) and deviation in the RTT (DevRTT)are 300 msec and 35 msec, respectively. Suppose that the next...
- Q Please Write C++ PROGRAM :That will write a program that initially prompts the user for afile name. If the file is not found, an error message is output,and the program...
- Q Write a program in a script file that creates m × n matrix withelements that have the following values. The value of each elementin the last row is the number...
- Q assigsment-Write a program to simulate a bank transaction. Thereare two bank accounts: checking and savings. First, ask for theinitial balances of the bank accounts; reject negative balances.Then ask for the...
- Q Create a file named Good1nano Good1Type Welcome in the file and save it.What command gives you a long listing of your filenamesin the current directory, including permissions attached to eachfile.What...
- Q Search for followings CVEs and list in order of CVSS anddescribe the vulnerabilities and how to address thesevulnerabilities.CVEExplanation with CVSS Score.How you will address this vulnerability?CVE-2017-11882CVE-2017-17215CVE-2019-2725CVE-2017-0143CVE-2014-8361
- Q Suppose nodes A and B are each behind their own NAT firewall(9.7 Network Address Translation).A ──── NAT_A ──── Internet ──── NAT_B ──── BA and B attempt to connect to one...
- Q You have been tasked with reconfiguring the network for yourcompany, which has grown considerably over the past year. You haveused only static routing in the past, but you do not...
- Q 1. Describe wireless networking standards2. Describe the process of authentication3. Describe wireless hacking and tools used by hackersand security professionals4. Explain that configuring an AP varies depending onthe embedded OS.5....
- Q WordLadder JAVA Program questionstoneAtoneaLoneCloneclonScOonscoNnsconEsconeYMoneyWord ladders were invented by Lewis Carroll in 1878, theauthor of Alice in Wonderland. A ladder is a sequence of words thatstarts at the starting word, ends...
- Q A person writes a project with unit conversion functions,although she doesn’t use all of them. The conversions would beuseful in a library. Create the library and modify the main.c touse...
- Q 3.2 Comparing and contrasting components of an operatingsystemFile systems and featuresFeaturesFile managementServicesProcessesDriversUtilitiesInterfaces
- Q 2.7 Explaining basic networking conceptsBasics of network communicationDevice addressesBasic protocols2.8 Scenario to install, configure and secure a basicwireless networkBest Practices3.1 Explaining the purpose of operating systemsThe interface between applications and...
- Q You are writing a program that encrypts or decrypts messagesusing a simple substitution cipher. Your program will use twoconstant strings. One will represent the code for encryption: goingfrom the original...
- Q PLEASE WRITE IN PYTHON A sequence of integers is said to beFibonacci-like if each element of the sequence (except the firsttwo elements) is the sum of the previous two integers...
- Q You are a personal financial advisor and you frequently need totell individuals how many years it will take them to reach theirretirement goals given their returns on their various accounts....
- Q C++Classes & ObjectsCreate a class named Student that has three private member:string firstName string lastName int studentIDWrite the required mutator and accessor methods/functions(get/set methods) to display or modify the objects.In...
- Q 3.6 Contrasting and explaining general application conceptsand usesSingle-platform softwareCross-platform softwareLicensingSoftware installation best practices4.1 Comparing and contrasting programming languagecategoriesInterpretedCompiled programming languagesQuery languagesAssembly language
- Q write a program in CWrite a function that is passed an array of characterscontaining letter grades of A, B, C, D, and F, and returns thetotal number of occurrences of...
- Q Two coding challenges this week!Part 1: Estimate the value of e.e is defined as  as n goes to infinity. So the largerthe value of n, the closer you should get to...
- Q wirte a program in javaPart IÂ Â Â Â Internet ServiceProviderAn Internet service provider has three different subscriptionpackages for its customers:Package A: For $9.95 per month 10 hours of access are provided.Additional hoursare...
- Q Write a full project report: Fruit Detection System Using NeuralNetworking. (following this procedure -AbstractIntroduction, Methodology, Dataset, CNN-TensorFlow, ExperimentalResult, Conclusion, Future Work, Reference)N.B. If you don't finish the answer here fully,...
- Q PythonClean up the codeRecall that once a subclass inherits from a parentclass, it automatically has access to all of the parents' methods.Sometimes, the subclass needs to do extra things within...
- Q Java ProgramSuppose a student was taking 5 different courses last semester.Write a program that(a) asks the student to input his/her name, student ID, marksfor these 5 courses,(b) calculate the average,(c)...
- Q Write a solution to return the count of the number of nodes in abinary tree. Your method will be passed one parameter, a copy of apointer to the root node...
- Q JAVA programCreate a class called ArrayOutside of the class, import the Scanner libraryOutside of main declare two static final variables and integerfor number of days in the week and a...
- Q Try to make it as simple as you can. Please provide the answerswith some examples as fast as you can.11-Which of the following doall domains in the sameforest have in...
- Q .After an RODC gets stolen along with a few other computers,Shania, the system administrator, resets the computer accounts ofthe stolen computers that were cached on the RODC. She accomplishesthis task...
- Q Problem 1. Suppose we have 4 memory modulesinstead of 8 in Figures 4.6 and 4.7. Draw the memory modules withthe addresses they contain using:a) High-order Interleaving andb) Low-order interleaving.
- Q What is the auxiliary space and space complexity for a dynamicprogramming algorithm with time complexity of O(n^2)? Justify.
- Q What does each line in the code?? Pleaseunsigned Long timer1;unsigned Long button_dbnc_tmr = 0;const int User_Button = 2;const int USER_LED_Pin = 13;bool allow_change = 0;int counter = 0;int state;void read_state_from_memory(void);void...
- Q Based on what you have picked up, learned professionally,developed through your studies, or any research you might need todo, discuss the network connectivity challenges that internationalcompanies have over regional or...
- Q what is the difference between reverse_tcp and a reverse_ord_tcppayload?
- Q Please write a basic function using Python. Pleasecomment all steps. Thank you!Experimentally determined molecular structures are stored inthe Protein Data Bank. Protein Data Bank format is a standard forfiles containing...
- Q Q1- Write code in C language(Atmel atmega32 avrmicrocontroller)(a)-Switches are connected to Port C and Port B and LED’s withPORTD. Write a code to read input fromPortB and C and perform...
Get Answers to Unlimited Questions
Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!
Membership Benefits:
- Unlimited Question Access with detailed Answers
- Zin AI - 3 Million Words
- 10 Dall-E 3 Images
- 20 Plot Generations
- Conversation with Dialogue Memory
- No Ads, Ever!
- Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!