Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Using RSA algorithm, encrypt and decrypt message “BE” with key pairs(3,15) and (5,15).
Describe at least four advantages of granularity of data in the warehouse design.
Mask: 255.255.255.192e. Determine the maximum number of subnets in class A / B using following masks? 255.255.192.0
What do you meant by switched virtual circuit? What do you understand by Permanent virtual circuit?
With a neat and well labelled diagram describe the relationship of IEEE Project to OSI model?
Describe Token Bus and Token Ring networks in detail.
Illustrate out in detail about telecommunication network topologies? What do you understand by the term SPC? Illustrate the two (2) approaches to organize SPC.
Sketch the block diagram of Data Communication Network and describe each block. Write comprehensive notes on the Data Communication Circuits.
Describe the Walkthroughs and Inspections as the Software Review methods.
Illustrate Transparent and Non-Transparent fragmentation in Internet. Make a distinction between datagram and virtual circuit switching.
Illustrate the aim of requirements analysis and specification phase of the software development? Describe different activities undertaken throughout this phase.
Distinguish between the software reengineering and reverse engineering.
Explain the Scan Line Seed fill algorithm to produce solid area on the screen.
Describe in brief the Z-Buffer method for hidden surface removal. Show how depths are computed for a planar Polygon Ax + By + Cz + D = 0 whose left edge has a slope m.
Illustrate the network configuration of circuit switching and packet switching with appropriate diagrams.
Illustrate the main difference between Gouraud shading with Phong shading techniques?
Write down the SQL DDL definition for the above schema.
Find out the names of sailors who have reserved the similar color boats as the sailor named ‘John’.
Describe the various levels of abstractions in the database management system.
What do you mean by Border Gateway Protocol (BGP)? Describe the functioning of BGP.
Throughout the communication, how different layers of OSI model exchange information to establish the connection? Explain with the help of an appropriate diagram.
What do you mean by Cryptography? Describe Public and Private Keys to be employed for the Cryptography method.
How synchronization is accomplished in Distributed Operating System by using Mutex?
What do you mean by compaction? How is it employed to decrease external fragmentation in the memory management?
Illustrate the role of Interrupt Handlers in the device management.