• Q : How to add subscript buttons to the quick access toolbar....
    Computer Engineering :

    Question: How can we add a superscript and subscript buttons to the Quick Access Toolbar? Question:  Why can't we do this in Excel as we used to and as we can still in Word?

  • Q : Describe vbscript conditional decisions....
    Computer Engineering :

     Discuss the control structures used by VBScript to making conditional decisions and repeat blocks of code. Give examples of code using these decision-making and loop structures.

  • Q : What is ethernet mac addresses....
    Computer Engineering :

    Problem: Which of the following are valid Ethernet MAC addresses?  Select all that apply. 1. 192.168.0.1 2. C8f7338cf528 3. FFFFFFFFFFFF 4. 0800

  • Q : Explain erm model for school information system....
    Computer Engineering :

    If we want to connect two Ethernet LANs with 10-Mbps data rates, how many T-1 lines do we need? Do we need multiplexers or inverse multiplexers? Show the configuration

  • Q : How to refresh pivot table on protected sheet....
    Computer Engineering :

    Question 1: How to refresh Pivot table on protected sheet? Question 2: How does dynamic programming make an inefficient recursive algorithm more efficient?

  • Q : How to write a pgm out to a text file....
    Computer Engineering :

    Write a C++ program that writes a PGM out to a text file. Make your image 40 columns by 20 rows. Set the maxval to 255. Let each pixel be 4 more than the previous pixel; let each row be 10 more than t

  • Q : Describe difference between link and end-to-end encryption....
    Computer Engineering :

    Question 1: What is the difference between link and end-to-end encryption? Question 2: List ways in which secret keys can be distributed to two communicating parties.

  • Q : Explain two general approaches to attacking a cipher....
    Computer Engineering :

    Question 1: What are the two general approaches to attacking a cipher? Question 2: Why is the middle portion of 3DES a decryption rather than an encryption?

  • Q : Describe the ecb mode....
    Computer Engineering :

    With the ECB mode, if there is an error in a block of the transmitted cipher text, only the corresporrding plaintext block is affected. However, in the CBC mode, this error propagates.

  • Q : Describe about pipelines....
    Computer Engineering :

    iven a pipeline, A, of five stages, where each stage takes time t, produce a new pipeline, B, by dividing the third stage into two stages such that each stage takes time t/2. How long will it take for

  • Q : Print a simple loan payment table for 12 months....
    Computer Engineering :

    Print a simple loan payment table for 12 months showing two columns: the month number and the remaining balance at the end of the month after payment. The initial loan will be $1000 and the payment wi

  • Q : Explain how to create the package....
    Computer Engineering :

    Question 1: Create a package cs2302. The class files Point.java and Line.java must be in the package. Question 2: Create the package cs2302 testing. The test file Tests.java must be in the package.

  • Q : Create an f stream to a binary file....
    Computer Engineering :

    Create an fstream to a binary file that you can both write to and read from. Write 5 objects of your class to your binary file. Then see if you can read them all back in order and print them to the sc

  • Q : Write a program in c that lets a user manipulate bits....
    Computer Engineering :

    Write a program in C that lets a user manipulate bits individually in a 4-byte variable. The program should begin with all bits having a value of zero. The program should enter a loop where it prints

  • Q : Describe how the k-mapping is done....
    Computer Engineering :

    Design a circuit with output f and inputs x1, x0, y1, and y0. Let X=x1x0 and Y=y1y0 represent two 2-digit binary numbers. The output f should be 1 if the numbers represented by X and Y by X and Y are

  • Q : How to add a cgi interface to the cipher....
    Computer Engineering :

    Question 1: Implement both encryption AND decryption of the Viennese cipher with 26 English letters and 1 space character "_" in its tableau. You may use any major programming languages. Question 2: A

  • Q : Write a program that generates all prime numbers....
    Computer Engineering :

    Write a program that generates all prime numbers between 2 and 1000, using the Sieve of Eratosthenes method. You can find many articles that describe the method for finding primes in this manner on th

  • Q : Write an algorithm that will prompt a user for three numbers....
    Computer Engineering :

    Design an algorithm and accompanying pseudo code that will prompt a user for three numbers, accept that input, and sort it into ascending sequence, and then output the values to the screen.  

  • Q : Explain the advantage of one data structure over the other....
    Computer Engineering :

    Question 1: Calculate the memory requirements of the two data structures. Question 2: Hence explain the advantage of one data structure over the other.

  • Q : Write a program of linked-list which has an integer field....
    Computer Engineering :

     A program is maintaining two data structures (a) A linked-list which has an integer field and (b) An array of integers. The same numbers appear in ascending order in both data structures.

  • Q : Write a recursive definition for integer division....
    Computer Engineering :

     Write a recursive definition for integer division. Then write a recursive method for division that accepts two integers and returns their integer quotient.

  • Q : What is genetic algorithm....
    Computer Engineering :

    Draw the hierarchy chart and design the logic for a program that calculates service charges for Hazel’s Housecleaning service. The program contains housekeeping detail loop, and end-of-job modul

  • Q : Describe characteristic of programming languages....
    Computer Engineering :

    One characteristic of programming languages that varies widely from language to language is how parameters are passed. Among ALGOL, Pascal, Ada, C, C++, Java, and C#, no two languages pass parameters

  • Q : How to create a function to change a formula....
    Computer Engineering :

     Can anyone explain if it's possible to create a function to change a formula with the following idea. for example: You have a complex formula and want to change the "= formula" by "=(formula)" s

  • Q : Write a class in java computing onlinestudent....
    Computer Engineering :

    Question 1: What layer does mac, ssh, or 802.5, work at? like is it the internet layer or network interface layer of the tcp/ip model not the osi layers?

©TutorsGlobe All rights reserved 2022-2023.