• Q : Write a program of string handling function....
    Computer Engineering :

    Write your own string handling function that takes in two character arrays as arguments and returns (with the return statement) a character array composed of concatenating the two strings arguments

  • Q : Wap that shows a square frame filled with 100 buttons....
    Computer Engineering :

    Write a program that shows a square frame filled with 100 buttons labeled 1 to 100. Nothing needs to happen when you press any of the buttons.Make sure you print out one 100 buttons on your frame.

  • Q : What do you understand from encapsulation....
    Computer Engineering :

    Question 1: What do you understand from encapsulation and how it is incorporated in the code? Question 2: What do you understand from information hiding and how it is incorporated in the code?

  • Q : What is an encryption trapdoor....
    Computer Engineering :

    What is an encryption trapdoor. Is it possible? Is it legal? Is it Ethical? What would you do, should, in your line of duty, discover one?

  • Q : What is a file system portion....
    Computer Engineering :

    Question 1: What is a file system Portion? Question 2: What is the relationship between a portion and a file? Question 3: Why are large portions desired from the file allocation method?

  • Q : Write an application that creates a hashset of 10 integers....
    Computer Engineering :

    Write an application that creates a HashSet of 10 integers. Write a method named removeDuplicates that takes a second HashSet of integers as its argument and ensures that this second set does not co

  • Q : Discuss why javascript is used design to enhance page....
    Computer Engineering :

    Question 1; If businesses used DSS, GDSS, and ESS more widely, would they make better decisions? Why or why not? Question 2: Discuss how using JavaScript in your design will enhance your page, and why

  • Q : Describe indexed allocation with variable-length portions....
    Computer Engineering :

    Question 1: Describe Indexed Allocation with Variable-length Portions. Question 2: What information is maintained in the FAT for Indexed Allocation with Variable-length Portions?

  • Q : Describe indexed allocation with block portions....
    Computer Engineering :

    Question: Describe Indexed Allocation with Block Portions.Question: What information is maintained in the FAT for Indexed Allocation with Block Portions?

  • Q : Describe contiguous file allocation....
    Computer Engineering :

    Question 1: Describe Contiguous File Allocation. Question 2: What are the two disadvantages of contiguous allocation? Question 3: What information is maintained in the FAT for contiguous allocation?

  • Q : What is the relationship between a portion and a file....
    Computer Engineering :

    What is a file system Portion? What is the relationship between a portion and a file? Why are large portions desired from the file allocation method?

  • Q : Describe file descriptors....
    Computer Engineering :

    Question 1: Describe File Descriptors. Question 2: Describe the purpose of the File Allocation Table. Question 3: Describe the purpose of the Unallocated Block List.

  • Q : Write a program for small flight reservation system....
    Computer Engineering :

    Write a program for small Flight Reservation System with following Details. Show Menu with Following options 1 Flight Reservation 2 Boarding pass 3 Exit Menu

  • Q : Describe risk avoidance....
    Computer Engineering :

    Question 1: Describe risk avoidance .please name and briefly explain three common methods of risk avoidance Question 2: Describe management, operational and technical controls ,and explain when each

  • Q : How to create a map with mappoint and excel....
    Computer Engineering :

    Question 1: How to Create a map with MapPoint and Excel? Question 2: Create a view that will list the name of the contact person at each publisher and the person's phone number. Do not include the p

  • Q : How does encryption protect intellectual property....
    Computer Engineering :

    What is intellectual property? Is it afforded the same protection in every country ?what laws currently protect intellectual property in U.S and Europe ?

  • Q : What must an attacker do for a sniffer attack to succeed....
    Computer Engineering :

    What must an attacker do for a sniffer attack to succeed?what protocols are vulnerable to such attacks what counter measures should you place on your networked infrastructure to mitigate such attack

  • Q : Describe some useful applications for n-dimensional arrays....
    Computer Engineering :

    What are at least 2 ways to prevent out of bounds errors when reading input into C-strings? Discuss some useful applications for n-dimensional arrays, such as graphical 3-D or biotechnology applicati

  • Q : Discuss the importance of studying social graphs....
    Computer Engineering :

    Discuss the importance of studying Social Graphs and how can they be used to better understand and process social relationships.

  • Q : What are the privacy issues with data mining....
    Computer Engineering :

    Question 1: What are the privacy issues with data mining? Do you think they are substantial? Question 2: Suppose you wanted to implement a control unit for a computer that you are designing. Would y

  • Q : Create the time table via sql....
    Computer Engineering :

    Create the TIME table via SQL. The Sale_Day primary key column values should be all dates from your first sale date through and including your last sale date from your SALES table.

  • Q : Describe the term encryption....
    Computer Engineering :

    Describe how a long number (encryption key) can be shared between sender and receiver without using any source that is obvious to outsiders and without directly sending the number from sender and re

  • Q : Write a program that displays a 10 by10 square matrix....
    Computer Engineering :

    Write a program that displays a 10-by-10 square matrix. Each element in the matrix is 0 or 1. randomly generated. Display each number centered in a text field. Use TextField's setText method to set

  • Q : Draw real examples of uml diagrams....
    Computer Engineering :

    Question 1: Draw (or neatly hand sketch)real examples of UML diagrams for the following: a)A controller stereotype class b) A component with uses and provides interfaces

  • Q : Develop digit recognition system using neural network....
    Computer Engineering :

    Question 1: Develop a handwritten digit recognition system using neural network and the MNIST database. Question 2: How do you test a program that you did not write and accomplish it?

©TutorsGlobe All rights reserved 2022-2023.