• Q : Describe the bubble sort data structure....
    Computer Engineering :

    Question 1: Write a program to test the dynamic page in php language with test cases Question 2: Describe the bubble sort data structure.

  • Q : Can you write an array to an objectoutputstream....
    Computer Engineering :

    Question 1: Is it true that any instance of java.io.Serializable can be successfully serialized? Question 2: Are the static variables in an object serialized? How do you mark an instance variable not

  • Q : What is the method for writing an object....
    Computer Engineering :

    What types of objects can be stored using the ObjectOutputStream? What is the method for writing an object? What is the method for reading an object? What is the return type of the method that reads

  • Q : Write a program to convert a percentage to a decimal....
    Computer Engineering :

    Convert a percentage to a decimal. For instance, if the user enters 125% into a text box, then the output should be 1.25.

  • Q : Describe what is lu factorization....
    Computer Engineering :

    Question 1: Use Scilab to find the determinant, and rank of A=[1 2 3; 1 0 1; 1 2 0] . Question 2: Use Scilab to find an LU factorization of the matrix A in 1.

  • Q : Wap for two matrix parameters and prints their product....
    Computer Engineering :

    Write a non-member function that receives two Matrix parameters and prints their product. The function must check to see if the matrices are compatible for multiplications.

  • Q : Difference between literal and c-style string....
    Computer Engineering :

    Question 1: What are the difference between the two string types, Literal and C-style string? Question 2: How do these differences affect the way you interact with variables of each type?

  • Q : What are principles information system class....
    Computer Engineering :

    Question 1: Write a java program to display an equilateral triangle of angle 60 degress Question 2: Can we get help with CIS / principles information system class?

  • Q : Why is location of facility important to physical security....
    Computer Engineering :

    Question 1: Why is the location of your facility important to your physical security design? Question 2: How can you use the natural environment to help protect your organization?

  • Q : Contrast and compare logical and physical database design....
    Computer Engineering :

    Question 1: Describe what a relational database is and why relational databases are needed. Question 2: Describe the process of normalization and why it is needed. Question 3: Contrast and compare log

  • Q : Why is nrz recording used on a disk memory system....
    Computer Engineering :

    Question 1: Why is NRZ recording used on a disk memory system? Question 2: Critique SQL as a user-friendly query language.

  • Q : Describe effect on the microprocessor at 0 level....
    Computer Engineering :

    Question 1: Describe effect on the microprocessor and DMA controller when the HOLD and HLDA pins are at their logic 0 levels.

  • Q : Why is string final in java....
    Computer Engineering :

    Question 1: Why is String final in Java? Question 2: List various careers for individuals with a practical knowledge of JavaScript. Question 3: What are the knowledge requirements for the career posit

  • Q : Compare two different approaches to agile development....
    Computer Engineering :

    Compare two different approaches to agile development, e.g., eXtreme Programming vs. Scrum. How are they alike and how are they different?

  • Q : Describe scripting language....
    Computer Engineering :

    Select the scripting language that you would use to build highly interactive business Web applications. Support your selection.

  • Q : Compare object-oriented and imperative languages....
    Computer Engineering :

    Question 1: Compare and contrast object-oriented languages (Java, C++, C#, etc.) to imperative languages (C, Pascal, etc.) in terms of: Programmabilitym, Maintainability, Performance, Development too

  • Q : Discuss the major features of optical disk memory system....
    Computer Engineering :

    Question 1: Discuss the major features of optical disk memory system. Question 2: Discuss basic DMA operation and in particular the 8237 DMA controller.

  • Q : Identify 3 factors for determining competitive value of it....
    Computer Engineering :

    Question 1: Identify three factors to consider in determining the competitive value of information technology. Justify the selected factors. Question 2: Of the factors selected, determine if each f

  • Q : How can encryption be used to ensure message integrity....
    Computer Engineering :

    Question 1: Give an example of an application that might require a table or array with five levels of OCCURS clauses. Question 2: How can encryption be used to ensure message integrity?

  • Q : What is a ragged array in java....
    Computer Engineering :

    Question 1: What is a ragged array in Java? What are some pros and cons of ragged arrays, and when would you use them? Question 2: What is the difference between a regular use case diagram and a ful

  • Q : Why is all the info on the topology map required....
    Computer Engineering :

    Question 1: Why is all the info on the topology map required? Question 2: Write a c++ code to read and compare two text files if they have the same content.

  • Q : Define the term algorithm....
    Computer Engineering :

    Question 1: What is ALU? Question 2: Define the term algorithm. Question 3: When looking at modules, define the terms coupling and cohesion. List 3 levels of coupling and 3 levels of cohesion. Brief

  • Q : Write the pseudocode that declares three baseballgame....
    Computer Engineering :

    Design a class named BaseballGame that has fields for two team names and a final score for each team. Include methods to set and get the values for each data field. Create the class diagram and writ

  • Q : Describe the term risk management....
    Computer Engineering :

    Question 1: Which term below defines the identification and assessment of levels of risk within an organization? A) Risk assessment B) Risk management C) Risk analysis D) Risk identification.

  • Q : Write a function of overloding function....
    Computer Engineering :

    Write a C++ program that overloads a function named LinearSearch that searches an array of data of either integer data type, float, or double for a specific data.

©TutorsGlobe All rights reserved 2022-2023.