Question Answers
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
AI Flashcards
FREE
Search
Search
Sign In
Register
study help categories
/
Computer science
Top Selling Computer science Questions
State whether each of the following is true or false. If false, explain why: a) In general, a nodes size should be defined explicitly. b) A nodes position should be defined relative to its parent...
Determine whether each statement is true or false. If false, explain why. a) Values of primitive types may be stored directly in a collection. b) A Set can contain duplicate values. c) A Map can...
Fill in the blanks in each of the following statements: a. A self- class is used to form dynamic data structures that can grow and shrink at execution time. b. A(n) is a constrained version of a...
For each of the following computations in Java, determine whether the result is exact, an overflow, or a roundoff error. a. 2.0 1.1 b. 1.0E6 * 1.0E6 c. 65536 * 65536 d. 1_000_000L * 1_000_000L
Credit card companies typically assign a special digit, called a check digit, to the end of each customers credit card number. The check digit allows companies to verify that the credit card number...
An air conditioning unit in a car is being controlled by a microprocessor and a number of sensors. a) Describe the main differences between control and monitoring of a process. b) Describe how the...
Open the VB2015\Chap08\Shipping Solution\Shipping Solution (Shipping Solution.sln) file. The interface provides a text box for entering a shipping code, which should consist of two numbers followed...
The owner of a shop observes that on average 18 customers per hour arrive, and there are typically 8 customers in the shop. What is the average length of time each customer spends in the shop?
Compare the way Ada 95 provides polymorphism with that of C++, in terms of programming convenience.
What programming paradigm that nearly all recently designed languages support is not supported by Go?
Prove that every real number with a terminating binary representation (finite number of digits to the right of the binary point) also has a terminating decimal representation (finite number of digits...
In this exercise, you modify the Norbert Pool & Spa Depot application from Exercise 9. Use Windows to make a copy of the Norbert Solution-Introductory folder. Rename the copy Norbert...
When a device interrupt occurs, how does the processor determine which device issued the interrupt?
Calculate the expected time for the following activities. Optimistic Most Likely Pessimistic Expected Time Activity Time Time Time A 3 7 11 13 D 16 E 4 18 F 11 G 4 H. 4 4 12 7 9 O23 5122N M13 24
A complex number is a number in the form a + bi, where a and b are real numbers and i is 2-1. The numbers a and b are known as the real part and imaginary part of the complex number, respectively....
Define the Circle2D class that contains: Two double data fields named x and y that specify the center of the circle with getter methods. A data field radius with a getter method. A no-arg...
Define the Triangle2D class that contains: Three points named p1, p2, and p3 of the type MyPoint with getter and setter methods. MyPoint is defined in Programming Exercise 10.4. A no-arg...
Now that the No Customer Escapes project team has been formed and a plan has been developed for distributing project information, Jim can begin working on the projects scope statement, workbook, and...
Rewrite the Course class in Listing 10.6 to add a clone method to perform a deep copy on the students field. Listing 10.6 - Course.java public class Course i private String courseNane: private string...
The 24-point card game is to pick any four cards from 52 cards, as shown in Figure 20.19. Note the Jokers are excluded. Each card represents a number. An Ace, King, Queen, and Jack represent 1, 13,...
Rewrite Listing 21.9 to read the text from a text file. The text file is passed as a command-line argument. Words are delimited by whitespace characters, punctuation marks (,;.:?), quotation marks...
Write a program that finds all prime numbers up to 10,000,000,000. There are approximately 455,052,511 such prime numbers. Your program should meet the following requirements: Your program should...
Write a program that animates the selection-sort algorithm. Create an array that consists of 20 distinct numbers from 1 to 20 in a random order. The array elements are displayed in a histogram, as...
Consider the three DFDs in Figure 7-25. List three errors (rule violations) on these DFDs. E1 DF1 DF9 DF8 DF1 P1.1 P1.4.1 P1 DS1 DF11 P1.3 DF7 Level 0 DF3 DF2 DF3 Level 1 DF6 P1.2 Level 2 P1.4.2 DF10...
Discuss the similarities and differences between an ontology and a database schema.
What aggregation feature is missing from the EER model? How can the EER model be further enhanced to support it?
Discuss the main differences between the notation for EER schema diagrams and UML class diagrams by comparing how common concepts are represented in each.
Develop a GUI application that displays Unicode characters, as shown in Figure 36.13. The user specifies a Unicode in the text field and presses the Enter key to display a sequence of Unicode...
List the various cases where use of a NULL value would be appropriate.
What is the relationship between a type and its subtype in a type hierarchy? What is the constraint that is enforced on extents corresponding to types in the type hierarchy?
Discuss the various type constructors. How are they used to create complex object structures?
Discuss the different ways for looping over a query result in PHP.
Discuss the main functions for accessing a database in PEAR DB, and how each is used.
Rewrite Listing 16.13, ImageAudioAnimation.java, to use the resource bundle to retrieve image and audio files. (Hint: When a new country is selected, set an appropriate locale for it. Have your...
What are PHP auto-global variables? Give some examples of PHP autoglobal arrays, and discuss how each is typically used.
What is the impedance mismatch problem? Which of the three programming approaches minimizes this problem?
How do regular inheritance, multiple inheritance, and selective inheritance differ?
Easter Sunday is the first Sunday after the first full moon of spring. To compute the date, you can use this algorithm, invented by the mathematician Carl Friedrich Gauss in 1800: 1. Let y be the...
What are the differences between the use of tags in XML versus HTML?
What is the difference between attributes and elements in XML? List some of the important attributes used to specify elements in XML schema.
Draw a flowchart for the algorithm in Exercise E3.14. Data from Exercise E3.14. Draw a flowchart for the algorithm in Exercise E3.13. Data from Exercise E3.13. Draw a flowchart for the algorithm in...
Projectile flight. Suppose a cannonball is propelled straight into the air with a starting velocity v 0 . Any calculus book will state that the position of the ball after t seconds where g = 9.81 m/s...
Write a program that prints a paycheck. Ask the program user for the name of the employee, the hourly rate, and the number of hours worked. If the number of hours exceeds 40, the employee is paid...
Discuss the naming conventions used for ER schema diagrams.
Add a % (remainder) operator to the expression calculator of Section 15.6.3. package collections; import java.util.Scanner; import java.util.Stack; public class ExpressionCalculator { public static...
In the Sequence interface of Worked Example 9.2, add static methods that yield Sequence instances: static Sequence multiplesOf(int n) static Sequence powersOf(int n) For example, Sequence.powersOf(2)...
Resonant circuits are used to select a signal (e.g., a radio station or TV channel) from among other competing signals. Resonant circuits are characterized by the frequency response shown in the...
The figure below shows a frequently used electric circuit called a voltage divider. The input to the circuit is the voltage vi. The output is the voltage vo. The output of a voltage divider is...
Load the records of Exercise 16.31 into expandable hash files based on extendible hashing. Show the structure of the directory at each step, and the global and local depths. Use the hash function...
Describe the mismatch between processor and disk technologies.
The next program is an example of poor programming practice. It is based on an actual program that was used to control the display of a moving object. The main consideration at that time was speeding...
The editor of a movie is finalising the music score. They will send the final version of the score to the movie producer by email attachment. a) Describe how sampling is used to record the music...
A computer operating system (OS) uses paging for memory management. In paging: Main memory is divided into equal-size blocks, called page frames Each process that is executed is divided into blocks...
For each of the following examples, determine whether this is an embedded system, explaining why or why not. a. Are programs that understand physics and/or hardware embedded? For example, one that...
Interview a sample of project managers. Divide your sample into two small subsamples: one for managers of information systems projects and one for managers of other types of projects. Ask each...
Identify someone who manages an information systems project in an organization. Describe to him or her each of the skills and activities listed in Table 3-1. Determine which items he or she is...
Describe the advantages of a client/server architecture.
Figure 4-14 introduces the concept of affinity clustering. Suppose that through affinity clustering it was found that three business functions provided the bulk of the use of five data entities. What...
For the project you described in Problem and Exercise 3-43, assume that the worst has happened. A key team member has dropped out of the project and has been assigned to another project in another...
Look again at the activities outlined in Problem and Exercise 3-40. Assume that your team is in its first week of the project and has discovered that each of the activity duration estimates is wrong....
Use the outline for the BPP provided in Figure 5-9 to present the system specifications for the information system you chose for Problem and Exercise 5-35. Problem and Exercise 5-35. Consider your...
One of the most difficult aspects of using the single location approach to installation is choosing an appropriate location. What factors should be considered in picking a pilot site?
Change the discount rate for Problem and Exercise 5-35 to 10 percent and redo the analysis. Problem and Exercise 5-35. Consider your use of a PC at either home or work and list tangible benefits from...
Change the recurring costs in Problem and Exercise 5-35 to $40,000 and redo the analysis. Problem and Exercise 5-35. Consider your use of a PC at either home or work and list tangible benefits from...
Change the time horizon in Problem and Exercise 5-35 to three years and redo the analysis. Problem and Exercise 5-35. Consider your use of a PC at either home or work and list tangible benefits from...
Discuss catalog management in distributed databases.
Consider the situation you addressed in Problem and Exercise 5-35. Create numeric cost estimates for each of the costs you listed. Calculate the net present value and return on investment. Include a...
Change the discount rate for Problem and Exercise 5-43 to 12 percent and redo the analysis. Problem and Exercise 5-43 Change the time horizon in Problem and Exercise 5-35 to three years and redo the...
Change the recurring costs in Problem and Exercise 5-43 to $40,000 and redo the analysis. Problem and Exercise 5-43 Change the time horizon in Problem and Exercise 5-35 to three years and redo the...
For the system you chose for Problem and Exercise 5-35, complete section 1.0, A, Project Overview, of the BPP Report. How important is it that this initial section of the BPP Report is done well?...
Visit the website for an IT magazine and find an article that discusses business cases. Summarize the article and what you learned from it.
For the system you chose for Problem and Exercise 5-35, complete section 2.0, A, Alternatives, of the BPP Report. Without conducting a full-blown feasibility analysis, what is your gut feeling as to...
For the system you chose for Problem and Exercise 5-35, complete section 3.0, AF, Feasibility Analysis, of the BPP Report. How does this feasibility analysis compare with your gut feeling from the...
Draw a project triangle that shows the relationship among project cost, scope, and time.
List three characteristics each of traditional and web-based development.
Many financial tools are developed using Microsoft Excel. Identify three applications built using Excel, and describe how they are used in an organization.
For the system you chose for Problem and Exercise 5-35, complete section 4.0, AC, Management Issues, of the BPP Report. Why might people sometimes feel that these additional steps in the project plan...
Prepare a plan, similar to Figure 6-2, for an interview with your academic advisor to determine which courses you should take to develop the skills you need to be hired as a programmer/analyst....
How does cloud computing support Web 2.0 applications?
Which symbol is not used in a context diagram?
When might it be appropriate to violate the no crossed lines guideline in DFDs?
Describe several projects you are involved in or plan to undertake, whether they are related to your education or to your professional or personal life (e.g., purchasing a new vehicle, learning a new...
Figure 6-2 shows part of a guide for an interview. How might an interview guide differ when a group interview is to be conducted? Figure 6-2 Interview Outline Interviewee: Interviewer: Name of person...
Effective interviewing is not something that you can learn from just reading about it. You must first do some interviewing, preferably a lot of it, because interviewing skills improve only with...
Draw an activity diagram for the following case. Maximum Software develops and supplies software products to individuals and businesses. As part of its operations, Maximum provides a 1-800 telephone...
Draw a use case diagram for the following situation (state any assumptions you believe you have to make in order to develop a complete diagram). Then convert the use case diagram into a sequence...
What has been the impact of the Internet on system architecture?
What is client/server architecture?
What are the three functions that every business information system must carry out, irrespective of system architecture?
What are three emerging trends in user interface design?
What is output security?
What are the seven habits of successful interface designers?
Why is a transparent interface desirable?
Draw a use case diagram for the situation described in Problem and Exercise 7-39, page 210. Problem and Exercise 7-39 Starting with a context diagram, draw as many nested DFDs as you consider...
Draw a use case diagram for the situation described in Problem and Exercise 7-42. Problem and Exercise 7-42 Develop a context diagram and a level-0 diagram for the contracting system described in the...
Draw a use case diagram for the situation described in Problem and Exercise 7-40. Problem and Exercise 7-40 Starting with a context diagram, draw as many nested DFDs as you consider necessary to...
What is SaaS?
List two reasons offshoring may be risky.
Why would a company choose in-house software development?
In a relatively small company that sells thin, electronic keypads and switches, the rules for selling products specify that sales representatives are assigned to unique regions of the country. Sales...
Showing 4800 - 4900
of 5000
First
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50