Which of the following uses the parameter entity? a. DTD file O b. XML file c. jQuery d. XSL file
Q: Write a CSS rule that changes the appearance of all headings at level one (h1) in your page to the f...
A: The heading uses an Arial font face: ---The font-family property specifies the font for an element. ...
Q: What are the four basic data types in C, and how many bytes do they usually use? How can you increas...
A: The four basic data types in C are : int char float double
Q: Use a paper-and-pencil approach to compute the following division in binary. i. Dividend = 1110, Div...
A: First convert decimal to binary. Now perform a binary split using a divider and a dividend.
Q: What is the perceptron (Algorithm 5) optimizing (i.e., what is the objective function that is optimi...
A: The answer is given below.
Q: Construct a tree the diagram to show the elements of the sample space S
A:
Q: What is the abbreviation for the American Standard Code for Information Interchange in Computer Scie...
A: Introduction: This question is about the abbreviation for the American Standard Code for Information...
Q: Take the two numbers from the user and try to multiply both of them using lambda function in python.
A: Required:- Take the two numbers from the user and try to multiply both of them using the lambda func...
Q: What does the topology of a network imply? It is necessary to identify and describe distinct network...
A: Introduction: Topology in networking refers to the configuration of a computer network. Topology can...
Q: Breadth first search and best-first search.
A: Introduction Breadth-First Search is a kind of algorithm that basically demonstrates a tree that con...
Q: Q3. If the algorithm leads to wrong outputs, then this is definitely caused by invalid inputs. O Tru...
A: An algorithm is a step-by-step process of solving a problem.
Q: Alice and Bob use the ElGamal scheme with a common prime q= 131 and a primitive root a = 6. Let Bob’...
A: The answer is
Q: construct a circuit for the logic F = AC+BD
A: Solution:-
Q: films for a given film category. Example: getFilmCount('Action') Put the screenshot of the i...
A: Function: delimiter // CREATE PROCEDURE getFilmCount (IN catName CHAR(10), OUT filmCount INT) BEGIN ...
Q: Explain any ten(10) React Native APIs in a few words.
A: React Native: It is a JavaScript framework for writing natively for mobile applications. It is used...
Q: Before the checkout customer can remove any item from the cart at any time.
A: The code for the above-given question is given below:
Q: Explain built-in editor MATLAB with a interface
A: Create apps with graphical user interfaces in MATLAB Graphical user interfaces (GUIs), also known ...
Q: Enlist LINUX's fundamental components? Computer science
A: Introduction: Enlist LINUX's fundamental components? There are three sections to the Linux operating...
Q: Take a list of String from the user and sort that in list in alphanumerically ascending order. The S...
A: Required:- Take a list of String from the user and sort that in the list in alphanumerically ascendi...
Q: What is a memory dump precisely, and how does it work? Computer science
A: Memory dump : Memory dump is the process of capturing all content in RAM and writing it to a hard dr...
Q: create a view named major_ customer. it comsists of the customer num, name, balance, credit_limit an...
A: CREATE A VIEW : To create a view, use the create view command, which includes the wordsCREATE VIEW, ...
Q: In the following AVL tree, at which one of the nodes, the tree need to be balanced? 4 5 7 1 16 15 O ...
A: Let's see the solution
Q: What exactly is a database administrator? What are his responsibilities?
A: DBA (Database Administrator): A database administrator (DBA) is a professional administrator of comp...
Q: xyz f(x,y,z) 000 1 001 010 011 1 100 101 1 110 111 1 (a) Write corresponding minterm expansion. (b) ...
A: We must know what is Minterms and Maxterms. Minterms:- Any Minterms is a product of all the literal...
Q: The transport layer on the Internet is in charge of allowing data to be transported from one network...
A: Introduction: The transport layer is the fourth layer of network connections in the OSI model.
Q: The term "reduced" refers to a computer that operates with a limited set of instructions. What does ...
A: The term "reduced" in that phrase was intended to describe the fact that the amount of work any sing...
Q: If the size of each 4-bit memory component is 4 x n cells
A: The answer is
Q: 21. Given below is the digital data, write a MATLAB program to display the number of high bits prese...
A: Required:- 21. Given below is the digital data, write a MATLAB program to display the number of high...
Q: Discuss the three methods for enhancing quality assurance.
A: Three techniques that help in the improvement of the QA are as follows:
Q: In a huge organization, how does one go about obtaining approval for a network configuration change?
A: Introduction: When applying for a service provider shift in a large organization or company, you may...
Q: Q9. Calculating the Big-O of algorithms is a process that helps to compare the performance of algori...
A: Big O algorithm is a numerical documentation that portrays the restricting way of behaving of a capa...
Q: What are the benefits of using DNS as a distributed database?
A: The reason for Domain Name Service (DNS) is implemented as distributed database: Internet uses IP ...
Q: Draw a sequence diagram to represent the scenario of "using vending machine to purchase drinks". Fou...
A: Solution -
Q: In embedded systems, what exactly is it about virtual memory that makes it so difficult to use?
A: Virtual memory is a common technique used in a computer's operating system (OS). Virtual memory uses...
Q: Write a C++ program to create a file with variable length records.The records in the file are of two...
A: Here I have code for you in C++ were you can differentiate given code into employee base and student...
Q: Can someone explain the answer behind this? A necessary condition for an integer to be divisible...
A: Let's see the solution
Q: computer science - Discuss the reasons for globalisation and the use of global information systems,...
A: Introduction: The reasons for globalisation and the use of global information networks, including e-...
Q: What is the definition of computer programming? What factors should be taken into account when selec...
A: Computer programming is a means to give guidance to machines about what to do next. This is known as...
Q: Write a sample code for The CSS Universal Selector
A: What are universal selectors: CSS universal selectors can be used to pick any element in an HTML doc...
Q: What are the differences between the ARM and Core i3 architectures?
A: Core i3 Core i3 has integrated graphics. Core i3 supports 64-bit architecture. It supports virtuali...
Q: Exercise to be Graded Your task is to create a GPA Calculator. Start by creating a Python script cal...
A: The Code is given below.
Q: How can you tell if an application has an effect on a device's output? Is it possible to keep the op...
A: Introduction: You may check this by utilising troubleshooting, or if you run antivirus, you should a...
Q: In embedded systems, what exactly is it about virtual memory that makes it so difficult to implement...
A: Introduction: In embedded systems, virtual memory is not employed. Memory management technology that...
Q: A regular polygon has n number of sides with each side of length s. The area of a regular polygon is...
A: The program is written in C++. Please check the source code and flowchart in the following steps.
Q: Explain how the 8279 programmable keyboard/display interface IC works.
A: 8279 programmable keyboard/display controller: The device is launched by Intel to associate the CPU ...
Q: Two endpoints are connected by a single link of rate R = 56kbps and the propagation speed along the ...
A: Answer: a) R = bandwidth bandwidth = 56kbps propagation speed = 2 * 10^8 m/s packet size = 120bits p...
Q: What exactly is a router's "Data Plane"? What is its intended purpose?
A: Introduction: To learn about the "Data Plane."
Q: Write a C program that computes and displays the area and the perimeter of the rectangle from the le...
A: Program: #include<stdio.h>int main() { float length,width,radius; //Reading length till ...
Q: Computer science Explain extended physical addressing in a few words.
A: Here is the explanation about extended physical addressing.
Q: (short answer is ok) Why is encryption still the first line of defence against data loss? Computer...
A: Introduction: Encoding is the process of transforming data into a particular language that hides the...
Q: What are two of the most important computer achievements?
A: Introduction: The first was the invention of the vacuum tube in 1904 by John Ambrose Fleming. It ope...
Step by step
Solved in 2 steps
- Which of the following is not an XML function? a. Transport information b. Structure C. Store O d. StyleUse HTML , JAVASCRIPT AND CSS WITH OUTPUT SEND Create a Application that allows the user to customize the web page. Your design must include CSS. The application should consists of three files as follows a. Ask the user to login and read form the database to determine the authentication. If the user is not known, the second file is loaded asking the user to fill up the form to store personal data b. Write a Java script to check the user is known user c. Use cookies for storing the user details and display the user name when the user moves on the next page.Assignment Create a well-formed valid XML file that contains this information. The information does not have to be correct only your name needs to be correct, you can make up all other information. Then, create the proper XSLT file to load that XML data and display it. When displaying it, make sure you're using: • Different font colors • Tables • header tags ( ...) • Images where the image name is read from the XML file The information you must include: • Name • My Picture (this is an image file name. For example: loay.jpg, or myphoto.jpg • Address o Street number o City o State o Zipcode • Movies I like o Title o Release Date
- Which of the following statements best describe the METHOD of GET / PUT used in a form? i. GET method transfers parameters in a transparent way and can be seen on URL. ii. GET method is suitable for transferring image files and/or document files. iii. PUT method can be used to transfer files of any types and sizes. iv. PUT method uses HTTP header and so it can be a bit more secure for transferring data. O A. i and iv O B. ii and ii O C. i and ii O D. ii and ivWhich of the following is a valid datatype?a. CHAR3b. VARCHAR4(3)c. NUMd. NUMBERCreate user Peter, Brian and Cindy, create group Family and Friend. Add user Peter and Brian to the Family group, add Cindy to the Friend group. Set up password for all three users. Log in as Peter, create a file “Peter-file1”, set up permission to allow Brian to read and modify the file, but not Cindy. Verify your set up to see Peter and Brian can read and modify the file, but not Cindy. Take screenshot of your configuration.
- Which of the following sends the focus to the txtName control?a. Focus.txtNameb. txtName.SendFocus() c. txtName.SetFocus()d. txtName.Focus()Navigate to your home directory. Create a directory named Module15 . Navigate to that directory. Create a colon-delimited payroll.dat file with this structure EmpID:LastName:FirstName:Salary Insert five employee records into the file . The 3rd line must be: 100A:Smith:Thomas:56000. The remaining ones can be with data of your choice. Use sed to display Thomas Smith's data by Thomas' EmpID. Use sed to display the 4th and 5th records only. Use awk to display all records with a Salary greater-then $50,000. Use sed to delete Thomas' data. Use awk to create a report showing the employee's first name and their salary. Create a heading report entitled "Employee Salary Report." Logout. in fedora 37 ex[plain each step/code used and take screenshotsWhich of the following will select all <p> tags of class bb Select one: a. .bb b. bb c. #bb d. p.bb
- Which of the following is the standard extension used for a script file?a. .sptb. .srtc. .scriptd. .sql-student name can contain only alphabet and spaces -student id or course id can contain only numbers -login in can contain only alphabet Form 2 A client-server application for students registration system A) Client side: (HTML, CSS) Write the code for the register.html . The student or the registrar use the client register.html. The student uses enters his login and password in register.html to choose the courses for the next semester. If the course is opened then the students can add it. The students can register up to 18 credit hours. The registrar (login = root, and password = 123) uses register.html to add student, add course, remove a student, and remove a course. See the following run: Server Side: Write the code of the server side register.php page such that. 1) The register.php checks using the regular expressions in PHP if the login is valid or not. A valid login must be exactly 7 characters and starts with a letter and followed by any one or more of the characters, S, 0-9,…Computer Science Import data from anywhere by using Web Scraper and save data in a .csv file. By using google meet/Zoom/any media, record you’re your entire process with your voice. Preserve the recorded file, .csv file in the same folder where you have preserved the excel file for other questions. Rename the recorded file name with your ID and question number. Don’t forget to upload the .csv file. File name should be Your_ID_Question_number.csv.