• Q : What package is the string class located in....
    Computer Engineering :

    What is the maximum expected error-free date rate, for a telephone line with bandwidth 3kHz, noise standard deviation of .2V over the frequency band(0 to 3 kHz), and average signal voltage of 20V?

  • Q : Write a program to find the squares of even numbers....
    Computer Engineering :

    Question: Part 1-Using the nested for loops, find the factorials of even numbers between 12 - 2 Part 2-Find the squares of even numbers between – 18 to +18 : Design your square function. Part 3-

  • Q : Explain equality via mathematical induction....
    Computer Engineering :

    Part 1-Prove the Follow Equality via Mathematical Induction: n/(n+1) < (n+1)/(n+2) Part 2- Explain why (A x B) x (C x D) and A x (B x C) x D are not the same.

  • Q : Describe a problem of theta notation....
    Computer Engineering :

    Question -Express the function (n^3/1000)-100n^2-100n+3 in terms of theta notation. Satisfy by giving full justification rather than just the answer. (Algorithm and analysis)

  • Q : Write a program that asks user for an alphabeticcharacters....
    Computer Engineering :

    rite a C++ program that asks the user for an alphabetic character. The character can be either lowercase or uppercase. Please describe the coding of the C++ program that asks the user for an alphabeti

  • Q : Describe what requirements drove the it system....
    Computer Engineering :

    Question 1: Discuss an IT system that has transformed the way organizations in at least one field carry out work. Note what requirements drove the system to be developed and what requirements are like

  • Q : Describe about the scripting language perl....
    Computer Engineering :

    Question 1: Print to the terminal the location of the executable file for Perl, a scripting language. Question 2: Find all files that have the string "nano" in their filename.

  • Q : Write a program to create a class called employee....
    Computer Engineering :

    Create a class called Employee that includes three pieces of information as data members: • First name (type string) • Last name (type string) • Monthly salary (type int)

  • Q : Wraie a program to create a class complexnumber....
    Computer Engineering :

    Create a class ComplexNumber that includes two data members: • Double realPart • Double imaginaryPart

  • Q : How to create a class called date....
    Computer Engineering :

    Create a class called Date that includes three pieces of information as data members: • Month (type int), • Day (type int) and • Year (type int).

  • Q : What is a process....
    Computer Engineering :

     A process : a) Is a common word used to describe almost any orderly arrangement of ideas or constructs? b)Is work performed on, or in response to, incoming data flows or conditions?c)Is only per

  • Q : What are system requirements....
    Computer Engineering :

    System requirements are also called: a) Requirements discoveries.b) Problem analysis requirements.c) Business requirements.d) Preliminary requirements.

  • Q : What is case....
    Computer Engineering :

    CASE stands for:a) Computer assisted software environment. b)  Computerized architectural systems engineering. c) Computer aided systems engineering. d)Computerized administrative

  • Q : How to design the classes for a banking program....
    Computer Engineering :

    Design the classes for a banking program that simulates the operation of your local bank. It should have the following collection of classes.

  • Q : Describe insertion sort....
    Computer Engineering :

    Consider insertion sort. Suppose that the input array A has 1% probability to be monotonically decreasing. Show that, in this case, the average-case complexity of insertion sort is O(n^2).

  • Q : How to add a description to a use case in visio 2010....
    Computer Engineering :

    Create a procedure named Extended_Sub that subtracts two binary integers of arbitrary size. The storage size of the two integers must be the same, and their size must be a multiple of 32 bits. 

  • Q : How to add subscript buttons to the quick access toolbar....
    Computer Engineering :

    Question: How can we add a superscript and subscript buttons to the Quick Access Toolbar? Question:  Why can't we do this in Excel as we used to and as we can still in Word?

  • Q : Describe vbscript conditional decisions....
    Computer Engineering :

     Discuss the control structures used by VBScript to making conditional decisions and repeat blocks of code. Give examples of code using these decision-making and loop structures.

  • Q : What is ethernet mac addresses....
    Computer Engineering :

    Problem: Which of the following are valid Ethernet MAC addresses?  Select all that apply. 1. 192.168.0.1 2. C8f7338cf528 3. FFFFFFFFFFFF 4. 0800

  • Q : Explain erm model for school information system....
    Computer Engineering :

    If we want to connect two Ethernet LANs with 10-Mbps data rates, how many T-1 lines do we need? Do we need multiplexers or inverse multiplexers? Show the configuration

  • Q : How to refresh pivot table on protected sheet....
    Computer Engineering :

    Question 1: How to refresh Pivot table on protected sheet? Question 2: How does dynamic programming make an inefficient recursive algorithm more efficient?

  • Q : How to write a pgm out to a text file....
    Computer Engineering :

    Write a C++ program that writes a PGM out to a text file. Make your image 40 columns by 20 rows. Set the maxval to 255. Let each pixel be 4 more than the previous pixel; let each row be 10 more than t

  • Q : Describe difference between link and end-to-end encryption....
    Computer Engineering :

    Question 1: What is the difference between link and end-to-end encryption? Question 2: List ways in which secret keys can be distributed to two communicating parties.

  • Q : Explain two general approaches to attacking a cipher....
    Computer Engineering :

    Question 1: What are the two general approaches to attacking a cipher? Question 2: Why is the middle portion of 3DES a decryption rather than an encryption?

  • Q : Describe the ecb mode....
    Computer Engineering :

    With the ECB mode, if there is an error in a block of the transmitted cipher text, only the corresporrding plaintext block is affected. However, in the CBC mode, this error propagates.

©TutorsGlobe All rights reserved 2022-2023.