Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Write a test program that prompts the user to enter two strings and tells them whether the two strings are anagrams or not.
Write a program that reads ten array elements. The reading of elements should be performed in an iterative manner.
How to add variables to an array list and also how to change them. How to search for and get rid of the second repeated char if there is one.
Create two arrays of type int[]. Both arrays should be the same size, and the size should be given by a constant in the program so that you can change it easily
What is a control statement, and where in a JAVA program using swing objects do you place these statements?
Create instances of each criterion class that the user expresses interest in using instead of using the class' constructor.
Write a Bash Shell script to prompt the user for just a series of letters. If the user does NOT enter a series of uppercase or lowercase letter.
create array of 52 Card objects, assigning a different value to each Card, and display each Card. Save the application as FullDeck.java.
Write a program that simulates car racing. The car moves from left to right. Captured output for each program (use to capture the output).
Consider an array of 6 elements (keys should be your student ID). Look at your solution and see how many comparison operations your performed?
How likely is the threat source to be successful and why? If the threat source is successful, what is the extent of the damage caused?
Provide responses to the following problems. A deterrent control attempts to discourage security violations before they occur.
Language models, like GPT-2, make it possible for computers to write sentences, essays and maybe even novels.
What are some other examples of social media-based activism that you have seen in current events? How are people using social media to advocate for change?
Explain the 3 major components of a web application and explain the concept of SQL injection and state 5 examples of commands that could be used by the attacker
Create a program that will ask the user for the number of miles they need to travel. The program will then convert those miles to kilometers.
You learned about the fundamentals of spreadsheets and the practical. How could you use a spreadsheet in your daily life to simplify a task or solve a problem?
Write the INSERT statements to put at least 3 rows in each of the tables. You make up the data. This goes in the same SQL script that creates the tables.
Explain the SQL commands, UNION, INTERSECT, and EXCEPT/MINUS. Include concepts such as union-compatibility, syntax alternatives such as IN and NOT IN.
Support your opinion with at least 3 reasons and follow up with how SQL meets (or doesn't meet) the criteria to be considered a language.
Using MySQL create the database based upon your relational schema. Enter two records into each of the relations that you have created in your MySQL database.
Both developers and testers do the system testing. The developer generally performs unit testing. Do you think DevOps is compatible with TDD?
Write a macro in VBA to approximate the value of the function f(x)=tan(x) at some nonzero point x in radians.
Discuss the possible repercussions or implications both negative and positive of the critical event to the Philippine Society.
How has the cost of connectivity changed over time (on a per MB or per GB basis)? Are you worried about any ill-health effects from 5G?