Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Illustrate the meaning of Denial of Service attack? Describe in detail.
Describe the features of COCOMO model. Write down the expression to compute effort (person months) and development time (in months) in the fundamental COCOMO model.
Illustrate any six programming guidelines to be followed in the software coding.
Write down some of the applications of top-down and bottom-up design strategies.
Describe the role of prototyping in the software development. Provide an illustration.
Illustrate the Characteristics or features of the Queue System and describe M/M/1 Queue model.
Describe in detail various multiple accessing methods used in the computer networks.
Compare and contrast the TCP/IP protocol with the ISO-OSI protocol.
Describe the different approaches for implementing the mutual exclusion in a distributed environment.
Explain the First fit, best fit and the worst fit allocation algorithms. Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order),
Consider the given system snapshot by using data structures in the Banker’s algorithm, with resources A, B, C and D and process P0 to P4:
Illustrate the meaning of transaction? Illustrate the desirable properties of the transactions?
Describe multi-valued dependencies and as well explain 4NF with suitable illustration.
Describe the concept of conflict serializability. State conflicting instructions and non-conflicting instructions.
What do you mean by the term data redundancy? Illustrate the demerits of having redundancy in a database?
Describe Redundancy or overlap of data with respect to the global data warehouse and its supporting local data warehouses.
Illustrate the meaning of the term snapshot? Explain in brief the fundamental components of a data warehouse snapshot.
Distinguish between the terms Data Warehouse and Data Mart.
Compare and contrast the Z- Buffer algorithm and Depth sort algorithm for back face culling.
Write down the Bresenhem’s circle drawing algorithm. Why co-ordinates of just one eighth of the total pixels lying on the circumference of a circle are calculated?
Provide four illustrations each for Input and output devices which are used in the Computer Graphics.
Describe the main methods for recovery from non-catastrophic transaction failure.
Describe the schemes for defining the logical structure of a directory.
Describe the Trivial Functional dependencies with illustration.
Describe the entity integrity and referential integrity constraints. Why each is considered significant?