Alley
University M

Wall

alley has no post on his/her wall yet

Documents

Objects and Constructors - Essay - Computer Science

OBJECTS AND CONSTRUCTORS ======================== String s1; // Step 1: declare a String variable. s1 = new String(); // Step 2: assign it a value: a new empty string. Stri...
alley
0
Software Engineering
Engineering

Lists - Essay - Computer Science

We can store a list of ints as an array, but there are disadvantages to this representation. First, arrays have a fixed length that can’t be changed. If we want to add items to a list, but the ar...
alley
0
Software Engineering
Engineering

Inheritence - Essay - Computer Science

In Lab 3, you modified several methods in the SList class so that a "tail" reference could keep track of the end of the list, thereby speeding up the insertEnd() method.
alley
0
Software Engineering
Engineering

Primitive Types - Essay - Computer Science

=============== Not all variables are references to objects. Some variables are primitive types, which store values like "3", "7.2", "h", and "false". They are: byte: A 8-bit integer in the ra...
alley
0
Software Engineering
Engineering

Priority Queues - Essay - Computer Science

A priority queue, like a dictionary, contains _entries_ that each consist of a key and an associated value. However, whereas a dictionary is used when we want to be able to look up arbitrary keys,...
alley
0
Software Engineering
Engineering

Public and Private Keywords - Essay - Computer Science

Thus far, we’ve usually declared fields and methods using the "public" keyword. However, we can also declare a field or method "private". A private method or field is invisible and inaccessible to...
alley
0
Software Engineering
Engineering

Rooted Trees - Essay - Computer Science

A _tree_ consists of a set of nodes and a set of edges that connect pairs of nodes. A tree has the property that there is exactly one path (no more, no less) between any two nodes of the tree. A...
alley
0
Software Engineering
Engineering

Heaps and Stack - Essay - Computer Science

Java stores stuff in two separate pools of memory: the stack and the heap. The _heap_ stores all objects, including all arrays, and all class variables (i.e. those declared "static"). The _stack_...
alley
0
Software Engineering
Engineering

Equals() in JAVA - Essay - Computer Science

Every class has an equals() method. If you don’t define one explictly, then "r1.equals(r2)" returns the same boolean value as "r1 == r2", where r1 and r2 are references. However, many classes red...
alley
0
Software Engineering
Engineering

Encapsulation - Essay - Computer Science

A _module_ is a set of methods that work together as a whole to perform some task or set of related tasks. A module is _encapsulated_ if its implementation is completely hidden, and it can be acce...
alley
2
Software Engineering
Engineering
Load more

Videos

Alley hasn't uploaded any video yet

Blog posts

Alley hasn't written any article yet

Questions

3

Answers

Write a recurrence function

At a party with _n_ people, everyone shakes hands once with everybody else. Let _H(n)_be the total number of handshakes among the _n_ guests. Write a recurrence for _H(n)_.
alley
22/10/2015

3

Answers

What are First-Generation Cellular Network Standards?

First-Generation Cellular Networks used different Standards. Please name them
alley
30/07/2013

5

Answers

"What are the new physical and MAC layer features and Techniques?"

The Physical layer or also known as MAC layer have different features. Please state details
alley
30/07/2013

5

Answers

What is meant by Privatization?

Government often privatizes some institutions to obtain better results. Please explain the concept of privatization with respect to business development.
alley
29/07/2013

2

Answers

Explain some of the features of Multi-Domestic Strategy.

In order to manage marketing of an organization domestically a strategy called Multi-Domestic Strategy is used. Please explain the main functions performed by this strategy.
alley
29/07/2013

5

Answers

Explain Page Procedure in Bluetooth.

Bluetooth is a commonly used network to transfer files. Please state page procedure in Bluetooth.
alley
29/07/2013

5

Answers

What are the CPU specs of iPhone?

To buy a phone one needs to see its specs. Please tell what the CPU specs of iPhone are.
alley
29/07/2013

2

Answers

How many upgrade paths are developed for GSM?

There are different upgrades paths are developed for GSM. Please name them
alley
29/07/2013

1

Answers

How Redox Potential is measured?

Soil fertility can be known by measuring Redox potential. Please explain the technique used for measuring the redox potential of the soil.
alley
29/07/2013

2

Answers

The routing protocol DSDV is based on which algorithm?

To run every protocol there is an algorithm running behind it. Please tell what algorithm is running behind DSDV protocol.
alley
29/07/2013
Load more

Friends

kechristian
ricky.o