• Q : Write an algorithm using pseudo code....
    Data Structure & Algorithms :

    Given a string of numbers, identify all of the substrings that form numbers that are divisible by 3. For example, applying the algorithm on the string 37540 should produce the following substrings (no

  • Q : What is the average number of key comparisons....
    Basic Computer Science :

    What is the average number of key comparisons needed to find the maximum and the second maximum keys of n given keys?

  • Q : Hash-based indexing can be applied are discussed....
    Basic Computer Science :

    In this paper three fundamental text retrieval tasks where hash-based indexing can be applied are discussed that are: (i) grouping, (ii) similarity search and (iii) classification. Which task(s) is mo

  • Q : Input a list and a subprogram to output the result....
    Basic Computer Science :

    Input a list of positive numbers(terminated by 0) into an array. Find the mean(average) of the numbers in the array, and output the reslt. Use a subprogram to input the numbers, a function to find the

  • Q : Capture information that has been buried....
    Basic Computer Science :

    Using data mining, it is possible to capture information that has been buried which can be manipulated and cross indexed which could be a valuable information gathering technique for entities like law

  • Q : A major difference between a conventional decision....
    Basic Computer Science :

    A major difference between a conventional decision support system and an ES is that the former can explain a "how" question whereas the latter can also explain a "why" question

  • Q : An arriving packet at building b has the destination ip....
    Computer Networking :

    An arriving packet at Building B has the destination IP address 128.171.180.13. Row 86 has the destination value 128.171.160.0. The mask is 255.255.224.0. Does this row match the destination

  • Q : Number of departments at which the employee works in....
    Basic Computer Science :

    Emp(eid, ename, age, salary) Works(eid, did, pct_time) Dept(did, dname, budget, managerid) 1.3) For each employee, print the name of the employee and the number of departments at which the employee wo

  • Q : A perfect integer is a positive integer that is equal to sum....
    Basic Computer Science :

    A perfect integer is a positive integer that is equal to the sum of all of its proper divisors. A proper divisor of an integer n is an integer between 1 (inclusive) and n (exclusive) that divides

  • Q : A perfect integer is a positive integer that is equal to sum....
    Basic Computer Science :

    A perfect integer is a positive integer that is equal to the sum of all of its proper divisors. A proper divisor of an integer n is an integer between 1 (inclusive) and n (exclusive) that divides

  • Q : Show that a residue check with the modulus....
    Basic Computer Science :

    Show that a residue check with the modulus A = 2^a - 1 can detect all errors in a group of a - 1 (or fewer) adjacent bits. Such errors are called burst errors of length a-1

  • Q : You have been hired as the records manager....
    Basic Computer Science :

    You have been hired as the records manager for Happy Health Medical Clinic, a medium-sized, general practice about to start up business. Whereas this medical facility hopes to have everything computer

  • Q : Design a nested menus interface for a check-in....
    Basic Computer Science :

    Manu Nara owns several first-class hotels worldwide, including properties in Manhattan, Bombay, and even some in suburbia. He wants to make sure that the human/computer interface is appropriate to eac

  • Q : Give an algorithm that ?nds xbest such that distbest....
    Data Structure & Algorithms :

    In a little town there are n houses on the main street. This street runs along the x-axis and the coordinates of the houses are x1; x2; .. ; xn.

  • Q : Suppose a cs curriculum consists of n courses all of them....
    Basic Computer Science :

    Suppose a CS curriculum consists of n courses, all of them mandatory. The prerequisite graph G has a node for each course, and an edge from course v to course w if and only if v is a prerequisite

  • Q : Suppose a foreign website sells drugs that are not approved....
    Basic Computer Science :

    Suppose a foreign website sells drugs that are not approved by regulatory agencies for sale to citizens of another country. Do you think that website has a duty to be familiar with drug laws throughou

  • Q : Information security consists of procedures....
    Basic Computer Science :

    Information Security consists of procedures and measures taken to protect each component of the information systems involved in producing information.

  • Q : Using the internet as a source....
    Basic Computer Science :

    Using the internet as a source, compile a list of three known vulnerabilities for SQL Server on Windows operating systems and three vulnerabilities for Oracle on Unix.

  • Q : Have you seen the new icloud what are your toughts....
    Basic Computer Science :

    Have you seen the new icloud what are your toughts? Maybe that's the way to have all the storage on demand, accessible really easily from anywhere?

  • Q : How grassroots computing changes the way software....
    Software Engineering :

    How grassroots computing changes the way software is designed, developed, tested, and maintained in a typical organization. What are the advantages and disadvantages of grassroots computing?

  • Q : Web services to building information systems....
    Basic Computer Science :

    Discuss in scholarly detail contributions of component-based development and Web services to building information systems. Describe in about 250 words and Please mention the source of references?

  • Q : Steps in the information systems acquisition process....
    Basic Computer Science :

    Discuss in scholarly detail the steps in the information systems acquisition process in comparison with business process restructuring.Describe in about 250 words and Please mention the source of refe

  • Q : Business reprocess engineering is a special case....
    Basic Computer Science :

    Some people may say that Business Reprocess Engineering (BPR) is a special case of a strategic information system, whereas, others may say the opposite is true. Discuss this statement in scholarly det

  • Q : Describe the sequences of signals that occur....
    Basic Computer Science :

    Describe the sequences of signals that occur on the address bus, control bus, and the data bus when a simple microcomputer fetches an instruction.

  • Q : Write the definition of a class telephone....
    Computer Networking :

    Write the definition of a class Telephone . The class has no constructors, one instance variable of type String called number , and one static variable of type int called quantity.

©TutorsGlobe All rights reserved 2022-2023.