Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Define the term File. Describe the various types of operations which can be performing on files with the help of appropriate illustrations.
Describe the process of input-output processing with the help of appropriate illustrations.
What do you mean by semantic nets? How the expert systems are different from the knowledge-based systems?
Explain Trojan horses in detail. Describe its impact on working of computer applications.
Write a brief note on Internet Control Message Protocol.
What is the requirement of domain name system? What services do port no. 80 and 21 indicate?
Describe the functioning of File transfer Protocol. Describe the functioning of Telenet protocol.
Illustrate out with proper instances how to identify an Alternate data stream on NTFS system.
Write down the example of point to point protocol. What do you mean by socket address?
Recognize and illustrate out the constraints and dangers of live forensics. Recognize types of evidence data and sort it by their lifetime.
Explain the TCP packet header along with 3-way connection.
Why is strong consistency of file systems problematic in wireless and mobile environment? What are the alternatives? How to conventional file systems respond to disconnected systems?
Write down the IP routing principles? How routers maintain and update route to no. of destinations?
Name some of simplifications which were introduced in IPv6. How is hop-by-hop segmentation of IPv6 packets avoided?
Illustrate out the different generations in mobile communication. Illustrate out the main kinds of Multiple Access methods.
How is Rlogin used for management of servers? What are the different ICMP messages?
What is maximum and minimum size of TCP header? Why is UDP check sum required?
Define Remote Login. What do you understand by mask request and reply? Describe ARP with packer format.
What is the objectives of Proxy Server? And explain how does it work? Describe the various Routing Algorithms.
Explain the drawbacks to the economic rights under Copyright Act 1997. Illustrate out the moral rights which are protected under the Copyright Act 1997.
What do you mean by subnet masks? Explain with full description. Which IP address is called Loop back Address?
List out the name of three types of COCOMO model proposed by Boehm?
What do you mean by cyclonic complexity? How to measure it?
Explain the objectives of quality assurance plan? What is the objectives of testing? Explain it in detail.
Write a detailed note on risk management and the requirement of analysis of quality system.