Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Demonstrate the operation of Heap sort on array A = [5, 13, 2, 25, 7, 17, 20, 8, 4]. What is the running time of heap sort on an array A of length n that is already sorted in increasing order? What
How are relationships between tables expressed in relational database?
Convert the following regular expression into NFA using Thompson’s construction.
What are the security strategies you can create for your web application? In what way you can secure your network against virus and Hoax Virus Warnings?
Explain the basic goals of privacy. Also explain the function of patent in network management.
The basic security goals are confidentiality, Integrity and availability (CIA). Explain the issues and problems in achieving these goals.
Discuss the approach of City of Sunnyvale’s IT director to ‘move the city into the future’ and how ‘Super’ rules guided IT infrastructure investments.
How many different memory locations can this CPU access by using base or offset addressing mode, if a 14-bit general purpose register serves as the base and can be loaded with any value?
Describe the Locard’s Exchange Principle. Support your answer with example. Sometimes it’s best not to perform hard-disk acquisition. Provide two circumstances where it’s best not
Name and explain the four essential elements of machine instruction. Provide any four common examples of mnemonics.
What do you understand by Primary Key and Foreign Key? Describe with example. What is Normalization? Why it is essential?
Give two merits and one demerits of CD-ROM compared with traditional magnetic disks. Make a distinction between “Scheduling” and “Setup Time”.
Describe four services of the operating systems. Make a distinction among the short term, medium term and long term scheduling that are provided by multi-tasking operating systems.
What are the differentiations between a write-allocate and no-write-allocate policy in a cache? With the aid of a fully labelled diagram, make a distinction between direct and associative mapping in c
Describe the meaning of Instruction Set Architecture. With the use of an example, describe how pipelining in microprocessors enhances the throughput of instruction execution.
Provide the four major functions of operating system. Distributed network architecture is whereby services are distributed and implemented among many computers. Give two merits and two demerits of t
Name the two most widespread types of software and briefly explain each one. The CPU comprises three chief units. Name the three units and describe the purpose of each unit.
Compare and contrast the BCD format to the floating point format in terms of: precision and performance in calculations.
Create database schema for the tables given below using the CREATE TABLE command.
List the First Name, Last Name and telephone number of all employees who were appointed in the year 1995. List all details of employee who is not managed by any employee.
PGP stands for: Private Good Privacy, Public Good Privacy, Process Good Privacy or Pretty Good Privacy.
The most significant step in implementing a security strategy is: Computer, Security Awareness, Cost or People.
Draw Entity-Relationship model for the relational schema given in Appendix. Show all the entities, relationships names, relationship, and attributes and also underline the primary key for each and e
Write the SQL code that will create ALL the tables as given in the appendix. Your answer should not contain the primary key and foreign key constraint declaration.
What is the publishing language for World Wide Web. What are the three basic foundation tags for the HTML document.