Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Write down three application examples of spatiotemporal data mining. Identify and explain the main challenges in spatiotemporal data mining.
What do you mean by Software Requirements Specification? In brief describe the characteristics of the good SRS.
What do you mean by software prototype? Recognize three reasons for developing a prototype throughout software development. Recognize when a prototype requires to be developed.
State at least five merits of object-oriented design methods.
Illustrate the criteria to select keys in the RSA algorithm? How encryption and decryption is done in the RSA algorithm. Describe with the help of illustration.
Illustrate the services given by the Point-to-Point protocols? Describe the framing in such protocols.
What do you mean by SNMP? Describe the management components of the SNMP?
What do you mean by SCAN algorithm for the disk scheduling?
Describe the defect classes and the defect repository. Describe with help of an example between white box and black box testing strategies.
What are various Software Quality metrics? Describe?
Illustrate the difference between Multiprogramming and Multitasking operating system?
Describe three views of Celsius Tech architecture case study.
List and explain the three types of logical channels provided by L2CAP.
Write a detail note on several variations of the CSMA strategy. Write a detailed note in traffic routing in wireless networks.
Describe the concepts of Horizontal Fragmentation and Vertical Fragmentation.
Explain how does SQL implement the entity integrity and referential integrity constraints of the relational data model? Describe with an illustration.
Illustrate the difference between the procedural and non-procedural DMLs?
Describe the characteristic aspects of RISC and CISC processor. State the conditions in which RISC and CISC processors are preferable.
What do you mean by cache coherence? How can the problem are solved with a snoopy cache controller?
Write down the actions taken by recovery manager during check pointing. Describe the architecture of distributed databases.
Compare and contrast the DMA based data transfer with program control data transfer.
Two new elements ‘1’ and ‘7’ are inserted in the heap in that order. Describe the level-order traversal of the heap after the insertion of such elements?
What do you mean by lock? Expalin the types of locks used in concurrency control.
Describe the purpose of Boyce-Codd normal form and describe how BCNF differs from and is stronger than 3NF. Demonstrate your answer with suitable example.
Distinguish between the operational systems and Data warehouse. As well describe how these are employed for information.