Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Differentiate between initial investigation and feasibility study. In what manner are they associated to one other?
Write down the difference between a partition and a Volume?
Describe whether there are any benefits of using a multitasking operating system, as opposed to the serial processing one.
What are the important features of Windows NT? Describe Windows NT Services architecture in detail.
What do you mean by the term Storage Capacity? How we measure the storage capacity of a computer system?
Define the term File. Describe the various types of operations which can be performing on files with the help of appropriate illustrations.
Describe the process of input-output processing with the help of appropriate illustrations.
What do you mean by semantic nets? How the expert systems are different from the knowledge-based systems?
Explain Trojan horses in detail. Describe its impact on working of computer applications.
Write a brief note on Internet Control Message Protocol.
What is the requirement of domain name system? What services do port no. 80 and 21 indicate?
Describe the functioning of File transfer Protocol. Describe the functioning of Telenet protocol.
Illustrate out with proper instances how to identify an Alternate data stream on NTFS system.
Write down the example of point to point protocol. What do you mean by socket address?
Recognize and illustrate out the constraints and dangers of live forensics. Recognize types of evidence data and sort it by their lifetime.
Explain the TCP packet header along with 3-way connection.
Why is strong consistency of file systems problematic in wireless and mobile environment? What are the alternatives? How to conventional file systems respond to disconnected systems?
Write down the IP routing principles? How routers maintain and update route to no. of destinations?
Name some of simplifications which were introduced in IPv6. How is hop-by-hop segmentation of IPv6 packets avoided?
Illustrate out the different generations in mobile communication. Illustrate out the main kinds of Multiple Access methods.
How is Rlogin used for management of servers? What are the different ICMP messages?
What is maximum and minimum size of TCP header? Why is UDP check sum required?
Define Remote Login. What do you understand by mask request and reply? Describe ARP with packer format.
What is the objectives of Proxy Server? And explain how does it work? Describe the various Routing Algorithms.
Explain the drawbacks to the economic rights under Copyright Act 1997. Illustrate out the moral rights which are protected under the Copyright Act 1997.