• Q : Describe about the scripting language perl....
    Computer Engineering :

    Question 1: Print to the terminal the location of the executable file for Perl, a scripting language. Question 2: Find all files that have the string "nano" in their filename.

  • Q : Write a program to create a class called employee....
    Computer Engineering :

    Create a class called Employee that includes three pieces of information as data members: • First name (type string) • Last name (type string) • Monthly salary (type int)

  • Q : Wraie a program to create a class complexnumber....
    Computer Engineering :

    Create a class ComplexNumber that includes two data members: • Double realPart • Double imaginaryPart

  • Q : How to create a class called date....
    Computer Engineering :

    Create a class called Date that includes three pieces of information as data members: • Month (type int), • Day (type int) and • Year (type int).

  • Q : What is a process....
    Computer Engineering :

     A process : a) Is a common word used to describe almost any orderly arrangement of ideas or constructs? b)Is work performed on, or in response to, incoming data flows or conditions?c)Is only per

  • Q : What are system requirements....
    Computer Engineering :

    System requirements are also called: a) Requirements discoveries.b) Problem analysis requirements.c) Business requirements.d) Preliminary requirements.

  • Q : What is case....
    Computer Engineering :

    CASE stands for:a) Computer assisted software environment. b)  Computerized architectural systems engineering. c) Computer aided systems engineering. d)Computerized administrative

  • Q : How to design the classes for a banking program....
    Computer Engineering :

    Design the classes for a banking program that simulates the operation of your local bank. It should have the following collection of classes.

  • Q : Describe insertion sort....
    Computer Engineering :

    Consider insertion sort. Suppose that the input array A has 1% probability to be monotonically decreasing. Show that, in this case, the average-case complexity of insertion sort is O(n^2).

  • Q : How to add a description to a use case in visio 2010....
    Computer Engineering :

    Create a procedure named Extended_Sub that subtracts two binary integers of arbitrary size. The storage size of the two integers must be the same, and their size must be a multiple of 32 bits. 

  • Q : How to add subscript buttons to the quick access toolbar....
    Computer Engineering :

    Question: How can we add a superscript and subscript buttons to the Quick Access Toolbar? Question:  Why can't we do this in Excel as we used to and as we can still in Word?

  • Q : Describe vbscript conditional decisions....
    Computer Engineering :

     Discuss the control structures used by VBScript to making conditional decisions and repeat blocks of code. Give examples of code using these decision-making and loop structures.

  • Q : What is ethernet mac addresses....
    Computer Engineering :

    Problem: Which of the following are valid Ethernet MAC addresses?  Select all that apply. 1. 192.168.0.1 2. C8f7338cf528 3. FFFFFFFFFFFF 4. 0800

  • Q : Explain erm model for school information system....
    Computer Engineering :

    If we want to connect two Ethernet LANs with 10-Mbps data rates, how many T-1 lines do we need? Do we need multiplexers or inverse multiplexers? Show the configuration

  • Q : How to refresh pivot table on protected sheet....
    Computer Engineering :

    Question 1: How to refresh Pivot table on protected sheet? Question 2: How does dynamic programming make an inefficient recursive algorithm more efficient?

  • Q : How to write a pgm out to a text file....
    Computer Engineering :

    Write a C++ program that writes a PGM out to a text file. Make your image 40 columns by 20 rows. Set the maxval to 255. Let each pixel be 4 more than the previous pixel; let each row be 10 more than t

  • Q : Describe difference between link and end-to-end encryption....
    Computer Engineering :

    Question 1: What is the difference between link and end-to-end encryption? Question 2: List ways in which secret keys can be distributed to two communicating parties.

  • Q : Explain two general approaches to attacking a cipher....
    Computer Engineering :

    Question 1: What are the two general approaches to attacking a cipher? Question 2: Why is the middle portion of 3DES a decryption rather than an encryption?

  • Q : Describe the ecb mode....
    Computer Engineering :

    With the ECB mode, if there is an error in a block of the transmitted cipher text, only the corresporrding plaintext block is affected. However, in the CBC mode, this error propagates.

  • Q : Describe about pipelines....
    Computer Engineering :

    iven a pipeline, A, of five stages, where each stage takes time t, produce a new pipeline, B, by dividing the third stage into two stages such that each stage takes time t/2. How long will it take for

  • Q : Print a simple loan payment table for 12 months....
    Computer Engineering :

    Print a simple loan payment table for 12 months showing two columns: the month number and the remaining balance at the end of the month after payment. The initial loan will be $1000 and the payment wi

  • Q : Explain how to create the package....
    Computer Engineering :

    Question 1: Create a package cs2302. The class files Point.java and Line.java must be in the package. Question 2: Create the package cs2302 testing. The test file Tests.java must be in the package.

  • Q : Create an f stream to a binary file....
    Computer Engineering :

    Create an fstream to a binary file that you can both write to and read from. Write 5 objects of your class to your binary file. Then see if you can read them all back in order and print them to the sc

  • Q : Write a program in c that lets a user manipulate bits....
    Computer Engineering :

    Write a program in C that lets a user manipulate bits individually in a 4-byte variable. The program should begin with all bits having a value of zero. The program should enter a loop where it prints

  • Q : Describe how the k-mapping is done....
    Computer Engineering :

    Design a circuit with output f and inputs x1, x0, y1, and y0. Let X=x1x0 and Y=y1y0 represent two 2-digit binary numbers. The output f should be 1 if the numbers represented by X and Y by X and Y are

©TutorsGlobe All rights reserved 2022-2023.