Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Describe the term linked list. Explain how you perform addition and removal in the linked list.
Explain the features and characteristics of X.21 interface in detail.
Describe the working of Go-back-N and Selective Repeat ARQ mechanisms with appropriate diagrams.
Describe RS 232 and EIA 530 interfaces used for Serial communication.
What do you mean by Framing Error in asynchronous transmission? Explain it with suitable example.
Describe in detail Organization and management of the Biochemical databases.
Write down the Quick Sort algorithm for MIMD machine and describe.
Write down an algorithm for the addition of n numbers on the Perfect Shuffle network. Illustrate its accuracy with an illustration.
Describe different forms of memory interleaving. List out all the merits and demerits of such schemes?
Write down the stages of migration from the corporate data model to the architected environment.
Explain why is metadata essential for using, for building and for administrating the data warehouse?
Describe at least four advantages of granularity of data in the warehouse design.
What do you mean by IP addressing scheme for computers? Explain in detail.
Write down the different topologies in network design. Describe each of them in detail.
Define the term Software Re-engineering? Describe the steps comprised in re-engineering a software system.
The blood bank wants to computerize its operations. The bank issues blood to patients and hospitals. If a hospital requests for blood the request is instantly serviced.
Define the term coupling and cohesion. Describe the various types of coupling and cohesion in the modular design?
Describe the merits and demerits of using a Water-fall model for the software development?
Describe the fragmentation transparency, replication transparency and location transparency in the distributed databases.
Describe the difference between the logical and physical data independence.
Explain the RSA algorithm which is used for encryption.
Explain the link state routing algorithm. Describe the working by using an appropriate illustration.
Explain why keying is needed in the data communication over networks? By using suitable diagrams compare the different features of the Frequency Shift Keying (FSK) with Phase Shift Keying (PSK).
Explain how does symmetric key cryptography distinct from the asymmetric key cryptography? As well write merits of former over the latter.
Describe the concept of transaction atomicity. Where the transaction atomicity is applicable in OS?