Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Illustrate out the data access protocol based upon the compatibility matrix.
What is the authentication subsystem in the UNIX system environment? What command will resolve if access control list (ACLs) is currently running in system?
Write down the data anomalies in 1NF and 3NF. Write down the advantages of normalized ER-Model.
Explain the hardware, software and network architectural design of the infrastructure used to build the cloud computing infrastructures. Use the Microsoft Visio to make the architectural diagrams.
Write down the difference between substitution cipher and transposition cipher.
What is the differentiation between analogue signal and digital signal? What is the differentiation between information system and strategic information system?
What is the function of regular expression and automata in the development of NLP system? Explain it in detail.
Write down the applications of Earley algorithm. Explain them in detail.
Describe various types of network topologies in detail. Explain in detail Information Intergrity.
Distinguish between computer networks and distributed systems.
A company wants to produce a grayscale display with pixels so small that a human will be not able to see the individual pixels under normal viewing conditions.
Suppose now that all of the objects are perfect reflectors (in addition to having ambient, diffuse and specular reflection).
In image compression we utilize three different methods to compress pixel data:
Describe how straight lines can be employed to draw the Bezier cubic curves.
Explain the A-buffer polygon scan conversion algorithm by using 44 sub-pixels in all pixels.
Illustrate an algorithm (other than thresholding) that will convert a grayscale image (8 bits per pixel) to a bi-level black and white image (1 bit per pixel), with similar number of pixels, while r
Describe why homogeneous coordinates are employed for handling the geometric transformations.
Compare and contrast the ray tracing and z-buffer algorithms.
Derive the conditions essential to make sure that two cubic Bezier curves join with C1-continuity.
Explain an algorithm for transforming a grayscale image to a bi-level (black and white) image while retaining as good a quality as possible.
Explain an algorithm which transforms a grayscale image into a black and white image by using half toning. Suppose that the black and white image has eight times the resolution of the grayscale imag
Explain the modifications needed to your algorithm in part (3) to make it draw the outline of a circle centered at arbitrary non-integer coordinates and of non-integer radius.
Describe each method; describe the manner in which it helps us to compress the image, and explain how the method is implemented in the baseline JPEG compression method.
Describe the merits and demerits of using nearest-neighbor interpolation compared with bilinear interpolation.
Explain how Douglas and Pucker's algorithm can be used to eliminate superfluous points. You might use the algorithm from part first.