Top Selling Computer science Questions

In this exercise, you modify the application from Exercise 4. Use Windows to make a copy of the Planets Solution folder. Rename the copy Planets Solution-Function. Open the Planets Solution (Planets... In this exercise, you modify the application from Exercise 4. Use Windows to make a copy of the Planets Solution folder. Rename the copy Planets Solution-Sub. Open the Planets Solution (Planets... Write a method called split that rearranges the elements of a list so that all of the negative values appear before all of the nonnegatives. For example, suppose a variable list stores the values [8,... Figure 12-27 shows two typical executions of a program that displays a large V on the screen after the user enters a height. Write a program that passes the following values to a recursive method... In previous chapters, you have created a number of programs for Yummy Catering. Now, create an interactive GUI program that allows the user to enter the number of guests for an event into a text... Problems in this exercise assume that the logic blocks used to implement a processors datapath have the following latencies: Register read is the time needed after the rising clock edge for the new... Consider the addition of a multiplier to the CPU shown in Figure 4.21. This addition will add 300 ps to the latency of the ALU, but will reduce the number of instructions by 5% (because there will no... Consider a system with the transfer function Equation 2-84 Y(z) G() = 2(3) = 2 (2-1) U (a) Find three different state-variable models of this system. (b) Verify the transfer function of each state... Consider the system of Problem 2.10-2. A similarity transformation on these equations yields d w(k+ 1) = y (k) = C(k) 22 w(k)+ Bu(k) d (a) Find d, and d. (b) Find a similarity transformation that... Show that if d(n) is O( f (n)), then ad(n) is O( f (n)), for any constant a > 0. Assume we need to create codewords that can automatically correct a one-bit error. What should the number of redundant bits (r) be, given the number of bits in the dataword (k)? Remember that the... Modify, compile, and test the client program in Table 25.13 and the server program in Table 25.12 to do the following: The client program needs to read the request string from a file and store the... Use the fact database and patron collection created in the text for use with MongoDB. Write a query to retrieve the _id, display name and age of students that have checked out a book in the cloud... Create a new user account. The account name should be a combination of your first initial and your last name. You have a number of trucks with which to deliver a set of packages. Each package starts at some location on a grid map, and has a destination somewhere else. Each truck is directly controlled by... There are 12 inches in a foot and 3 feet in a yard. Create a class named InchConversion. Its main() method accepts a value in inches from a user at the keyboard, and in turn passes the entered value... Write an application that displays the factorial for every integer value from 1 to 10. A factorial of a number is the product of that number multiplied by each positive integer lower than it. For... a. Create a class named Purchase. Each Purchase contains an invoice number, amount of sale, and amount of sales tax. Include set methods for the invoice number and sale amount. Within the set()... Write, compile, and test a class that displays the pattern shown in Figure 1-26. Save the class as Triangle.java. TTT TTTTTTI T T TIT In this exercise, you will complete the Restaurant Tip application from Chapter 2s Focus on the Concepts lesson. The applications Planning Chart is shown in Figure 3-34. a. Use either a flowchart or... Simplify each of the following Boolean equations. Sketch a reasonably simple combinational circuit implementing the simplified equation. (a) (b) (c) Y = ABC+BC +BC Y = (A+B+C)D+AD+B Listing 20.7, DirectorySize.java, gives a recursive method for finding a directory size. Rewrite this method without using recursion. Your program should use a queue to store the subdirectories under... A multimap is data structure that allows for multiple values to be associated with the same key. It has a put(k, v) method, which inserts an item with key k and value v even if there is already an... Draw a structured flowchart or write pseudocode that describes the process of guessing a number between 1 and 100. After each guess, the player is told that the guess is too high or too low. The... Design a flowchart or pseudocode for a program that accepts two numbers from a user and displays one of the following messages: First is larger , Second is larger , Numbers are equal . Design the logic for a program that outputs every number from 1 through 15. A two-dimensional array declared as num myArray[6][7] has _____ columns. a. 5 b. 6 c. 7 d. 8 a. Create the logic for a program that calculates and displays the amount of money you would have if you invested $5000 at 2 percent simple interest for one year. Create a separate method to do the... Design a class named Computer that holds the make, model, and amount of memory of a computer. Include methods to set the values for each data field, and include a method that displays all the values... Complete the following tasks: a. Design a class named BaseballGame that has fields for two team names and a final score for each team. Include methods to set and get the values for each data field.... Complete the following tasks: a. Create a class named Order that performs order processing of a single item. The class has four fields: customer name, customer number, quantity ordered, and unit... Write an application that lets you determine the integer value returned by the InputEvent method getModifiers() when you click your left, right, orif you have onemiddle mouse button on a JFrame. Save... Consider the following pseudocode, assuming nested subroutines and static scope: (a) What does this program print? (b) Show the frames on the stack when A has just been called. For each frame, show... In the postfix expression evaluation example, the two most recent operands are popped when an operator is encountered so that the subexpression can be evaluated. The first operand popped is treated... Create a graphical application that provides a button for push and pop from a stack, a text field to accept a string as input for push, and a text area to display the contents of the stack after each... Consider the boolean expression((x > 10) || (x < 100)). Why is this expression probably not what the programmer intended? Describe the activities performed by the project manager during project planning. What is information systems analysis and design? Draw a use case diagram based on the level-0 diagram in Figure 7-23. How does your use case diagram for Figure 7-23 differ from the one in Figure 7-26, which is also about registering for classes? To... A generic method _________________. a. Must have a type parameter that represents a reference type b. Must return a generic parameter c. Must have an empty body that is created at runtime d. Can have... What characteristics distinguish the various elements of a memory hierarchy? Problems in this exercise refer to the following sequence of instructions, and assume that it is executed on a five-stage pipelined datapath: add $s3, $s1, $s0 lw $s2, 4($s3) lw $s1, 0($s4) or $s2,... Amplitude-modulated (AM) radios use an oscillator operating at \(455 \mathrm{kHz}\) to demodulate the received signal. This frequency is called the intermediate frequency or IM. Your task is to... Convert 5ED4 into a binary number. What makes base 16 (hexadecimal) an attractive numbering system for representing values in computers? The presentation of data is becoming more and more important in todays Internet. Some people argue that the TCP/IP protocol suite needs to add a new layer to take care of the presentation of data. If... A simple parity-check bit, which is normally added at the end of the word (changing a 7-bit ASCII character to a byte), cannot detect even numbers of errors. For example, two, four, six, or eight... What is the maximum size of the data field for a 3-slot Bluetooth frame at basic rate? Explain your answer. Suppose the length of a 10Base5 cable is 2500 m. If the speed of propagation in a thick coaxial cable is 200,000,000 m/s, how long does it take for a bit to travel from the beginning to the end of... In an 802.11 network, station A sends one data frame (not fragmented) to station B. What would be the value of the D field (in microseconds) that needs to be set for the NAV period in each of the... Assume that our network never corrupts, loses, or duplicates packets. We are only concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM to... Answer the following questions related to the FSMs for the Go-back-N protocol with m = 6 bits. Assume the window size is 63. (Figure 23.27): Assume the HTTP client in the previous problem sends a request of 100 bytes. The server responds with a segment of 1200 bytes. Show the contents of the two segments exchanged between the client and... In TCP, assume a client has 100 bytes to send. The client creates 10 bytes at a time in each 10 ms and delivers them to the transport layer. The server acknowledges each segment immediately or if a... Based on the following query: SELECT P_CODE, P_DESCRIPT, P_QOH, P_PRICE, V_CODE FROM PRODUCT WHERE P_QOH < P_MIN AND P_MIN = P_REORDER AND P_REORDER = 50; ORDER BY P_QOH; Use the recommendations... Use the JustLee Books database to perform the following activity: There are three major classifications for employees who dont work for the Information Systems Department of JustLee Books: account... Which of the following functions can be used to display the character string FLORIDA in the query results whenever FL is entered in the State field? a. SUBSTR b. NVL2 c. REPLACE d. TRUNC e. None of... Which of the following SQL statements determines how many total customers were referred by other customers? a. SELECT customer#, SUM (referred) FROM customers GROUP BY customer#; b. SELECT COUNT... Consider an antenna transmitting a power of 5 W at 900 MHz. Calculate the received power at a distance of 2 km if propagation is taking place in free space. Consider the example in this chapter in which we enter and add two numbers. Suppose we had stored the first input entry in mailbox location 00. Would the program have produced the same result? What... Consider a periodic signal x(t) with fundamental period T 0 =1 and a period x 1 (t) = 0.5t[u(t) u(t 1)]. (a) Consider the derivative g(t) = dx(t)/dt. Indicate if g(t) is periodic and if so give its... Trace the operation of A search applied to the problem of getting to Bucharest from Lugoj using the straight-line distance heuristic. That is, show the sequence of nodes that the algorithm will... Are reflex actions (such as flinching from a hot stove) rational? Are they intelligent? Suppose that in a Bayesian network containing an unobserved variable Y, all the variables in the Markov blanket MB(Y) have been observed. a. Prove that removing the node Y from the network will not... Consider the family of generalized tic-tac-toe games, defined as follows. Each particular game is specified by a set S of squares and a collection W of winning positions. Each winning position is a... In each case, determine the problem and fix the errors. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugOne1.java will become... Write an application that prompts a user for two integers and displays every integer between them. Display a message if there are no integers between the entered values. Make sure the program works... Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig Latin version removes all consonants from the beginning of the word and... Write a program that inserts parentheses, a space, and a dash into a string of 10 user-entered numbers to format it as a phone number. For example, 5153458912 becomes (515) 345-8912. If the user does... a. The mean of a list of numbers is its arithmetic average. The median of a list is its middle value when the values are placed in order. For example, if an ordered list contains 1, 2, 3, 4, 5, 6,... Create a class named Poem that contains fields for the name of the poem and the number of lines in it. Include a constructor that requires values for both fields. Also include get methods to retrieve... a. Write an application that displays a JFrame containing the opening sentence or two from your favorite book. Save the file as JBookQuote.java. b. Add a button to the frame in the JBookQuote... Create a Windows Forms application. Use the following names for the project and solution, respectively: Moonbucks Project and Moonbucks Solution. Save the application in the VB2017\Chap02 folder.... Write a server for a client. The client sends the weight and height for a person to the server (see Figure 31.18a). The server computes BMI (Body Mass Index) and sends back to the client a string... In a side-scrolling video game, a character moves through an environment from, say, left-to-right, while encountering obstacles, attackers, and prizes. The goal is to avoid or destroy the obstacles,... Professor Amongus has shown that a decision problem L is polynomial-time reducible to an NP-complete problem M. Moreover, after 80 pages of dense mathematics, he has also just proven that L can be... Draw a structured flowchart or write structured pseudocode describing how to buy a new shirt. Include at least two decisions and two loops. Design a flowchart or pseudocode for a program that accepts three numbers from a user and displays a message if the sum of any two numbers equals the third. Your downloadable files for Chapter 5 include a file named DEBUG05-04.jpg that contains a flowchart with syntax and/or logical errors. Examine the flowchart and then find and correct all the bugs. Search the web to discover the ten most common user-selected passwords, and store them in an array. Design a program that prompts a user for a password, and continue to prompt the user until the user... Executive Training School offers typing classes. Each final exam evaluates a students typing speed and the number of typing errors made. Develop the logic for a program that produces a summary table... Create the logic for a program that continuously prompts a user for a numeric value until the user enters 0. The application passes the value in turn to the following methods: A method that displays... Identify three objects that might belong to each of the following classes: a. Author b. RaceHorse c. Country d. RetailPurchase Complete the following tasks: a. Design a class named Circle with fields named radius, area, and diameter. Include a constructor that sets the radius to 1. Include get methods for each field, but... Define a utility class for displaying values of type double. Call the class DoubleOut. Include all the methods from the class DollarFormat in Listing 6.14, all the methods from the class OutputFormat... Modify the Student class in Listing 8.2 so that it implements the comparable interface. Define the compareTo method to order Student objects based on the value in studentNumber. In a main method... Create an application using the following names for the solution and project, respectively: Chopkins Solution and Chopkins Project. Save the application in the VB2015\Chap03 folder. Change the form... Jim Watanabe looked around his new office. He couldnt believe that he was the assistant director of information technology at Petrie Electronics, his favorite consumer electronics retail store. He... Consider a database that consists of the following relations. SUPPLIER(Sno, Sname) PART(Pno, Pname) PROJECT(Jno, Jname) SUPPLY(Sno, Pno, Jno) The database records information about suppliers, parts,... a. Sunshine Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrellas to tourists. Write a program that displays Sunshines motto, which is Sunshine Seashore makes it... Extend the implementation of the AST for Arithlang to include an AST node for the negation expression Exp. The following program has careless errors on several lines. Find and correct the errors and show the output where requested. #include int main () { } int* ptr: int* temp; int x; ptr = new int; *ptr =... Evaluate the function \(f(x, y)=\frac{2}{3} e^{-x / 2} \cos (y-1)\) for \(x=-0.23, y=2.7\) by: a. Using the subs command. b. Conversion into a MATLAB function. Consider the following instruction mix: 1. What fraction of all instructions use data memory? 2. What fraction of all instructions use instruction memory? 3. What fraction of all instructions use the... A signal e(t) is sampled by the ideal sampler as specified by . (a) List the conditions under which e(t) can be completely recovered from e*(t) , that is, the conditions under which no loss of... The state diagram in Figure P2.51 describes a system with states A, B, and C. The system is initialized in State A. The state transition notation x/yz indicates that an input x causes a transition in... Assume that we would like to expand the MIPS register file to 128 registers and expand the instruction set to contain four times as many instructions. 1. How this would this affect the size of each... The PredatoryCreditCard class provides a processMonth( ) method that models the completion of a monthly cycle. Modify the class so that once a customer has made ten calls to charge during a month,... Give an example of a worst-case sequence with n elements for insertion-sort, and show that insertion-sort runs in (n 2 ) time on such a sequence. Compare and contrast byte-oriented and bit-oriented protocols. In an 802.11, give the value of the address 1 field in each of the following situations (left bit defines To DS and right bit defines From DS). a. 00 b. 01 c. 10 d. 11
Showing 900 - 1000 of 5000