• Q : When should we use user-defined methods....
    Computer Engineering :

    Some classes are predefined, and their methods are designed to perform specific commonly encountered tasks. When should we use user-defined methods? When should we use predefined methods?

  • Q : Explain white and black box testing....
    Computer Engineering :

    Some of the SDLC processes are iterative or incremental, meaning that the software-intensive system is built in stages. Question- How does the iterative/incremental SDLC processes affect the execution

  • Q : Describe vba code using newton raphson method....
    Computer Engineering :

    Consider the following theorem: "if x and y is odd integers, then x+y is even". Give a proof by contradiction of this theorem. Question- Write a VBA code using Newton - Raphson method to find roots of

  • Q : Write relational algebra queries for employee....
    Computer Engineering :

    Write relational algebra queries for each of the following:Get a list of all the different destination cities where the employess have taken trips.

  • Q : Write a program to get the case inventory for each brand....
    Computer Engineering :

    Write a program to A .Get the case inventory for each brand for the start of the week. B .Process all weekly sales and purchase records for each brand.

  • Q : Write a program for a class called car....
    Computer Engineering :

    Create a class named Car with fields that hold a vehicle ID number, make, model, color, and value for a Car object. Include appropriate properties for each field.

  • Q : Describe the function of main method....
    Computer Engineering :

    Create a class named Area. Include three overloaded methods that compute the area of a rectangle when two dimensions are passed to it. One method takes two integers as parameters, one takes two double

  • Q : Write a function that lists sale amounts in an array....
    Computer Engineering :

    Write a function that lists 5 sale amounts in an array then loop through the sale amounts adding the individual sale amounts in order to determine the total sales amount. Display this total sales amou

  • Q : Explain pentium representation of floating point....
    Computer Engineering :

    Explain with diagram the Pentium representation of floating point short format Suppose that a computer prefetches 20 instructions in advance. However, on the average, four of these are conditional bra

  • Q : Describe about flowchart with the hepl of example....
    Computer Engineering :

    write a C++ program to solve the following problem. Upon execution of the program, your name will be displayed on the screen, properly centered.

  • Q : List different marker specifiers and the markers producer....
    Computer Engineering :

    Part 1- List 2 different line style specifiers, and the line style that they produce (e.g., ‘-’ is the default solid line). Part 2- List 2 different color style specifiers and the color th

  • Q : List 2 different marker specifiers and the markers produce....
    Computer Engineering :

    Part 1- List 2 different line style specifiers, and the line style that they produce (e.g., ‘-’ is the default solid line). Part 2- List 2 different color style specifiers and the color th

  • Q : Describe a program using loop....
    Computer Engineering :

    Write code that does the following opens a file name NumberList.txt, uses a loop to write the numbers 1 through 100 to the file, and the closes the file.

  • Q : Write a program that adds all positive number....
    Computer Engineering :

    There is a need for program that adds all positive number and place them in sumPositive and sum of negative numbers and place them in sumNegative . At the end program should prints the values in sumPo

  • Q : How to decrypt the ciphertext....
    Computer Engineering :

    Using the two keys (memory words) cryptographic and network security, encrypt the following message: "Be at the third pillar from the left outside the lyceum theatre tonight at seven. If you are distr

  • Q : Write a program called dialogboxes....
    Computer Engineering :

    Question- Write a program called DialogBoxes.java. Declare two String variables firstName and lastName. Use the method showInputDialog with the text “Enter your first name” and input your

  • Q : Explain the algorithm....
    Computer Engineering :

    Give an algorithm to check if 3 numbers in an array add to a given sum in theta(n^2*log(n)) time: i, j, and k do not have to be distinct.

  • Q : Wap to swap the lower 4 bits with the upper 4 bit of byte....
    Computer Engineering :

    Write a program to swap the lower 4 bits with the upper 4 bit of every byte in an array and save the results in a new array. The initial array is to be stored in program memory and not be modified.

  • Q : Wap that stores information about vehicles in an object....
    Computer Engineering :

    Create a program that stores information about vehicles in an object. The properties to be stored should include Make, Model, Year, and Color.

  • Q : How expressions are converted into postfixes expressions....
    Computer Engineering :

    Evaluate the following postfixes expressions. Show the stack as each operand and operator is processed.  2 3 * 4 +

  • Q : What is hamming code....
    Computer Engineering :

    Devise a 7-bit odd-parity Hamming code for the digit 5 and 8. That is to say you are required to construct Hamming code for information (in binary) 0000101 and 0001000, respectively.

  • Q : Describe the principles of ethics....
    Computer Engineering :

    Please justify your answer with principles of ethics, not just your own opinions. Now suppose that to try out your virus, you inform a friend, attempt to pass the virus to her, and succeed.

  • Q : Wap to determine tip amount that is added to a restaurant....
    Computer Engineering :

    Write a program that can be used to determine the tip amount that should be added to a restaurant charge. Allow the user to input the total, before taxes and the tip percentage (15% or 20%).

  • Q : What is forwarding constitutes copyright infringement....
    Computer Engineering :

    It is common practice for recipients of email messages to sometimes forward those messages to others. Question- Does such forwarding constitutes copyright infringement?

  • Q : Evaluate the postscript expression....
    Computer Engineering :

    Question 1- Evaluate the postscript expression 1 2 - 5 3 + *  Question 2- An idea similar to postfix notation is to write +ab instead of usual a + b. Show that two stacks can be used to convert 3

©TutorsGlobe All rights reserved 2022-2023.