Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
A program which simulates human reasoning. Expert System, Information System, Special System or Professional System.
The example of email client tool which can be used to manage email messages is called as: Microsoft Word, Internet Explorer, Microsoft Outlook or Microsoft Access.
The internet uses which kind of clientserver architecture: Centralised, Distributed or Decentralised.
Distortion in a signal is known as: Phase, Frequency, Fluctuation or Noise.
Free space management, storage allocation and disk scheduling fall under which of the following OS function: Process Management, Memory Management, Secondary Storage Management or Device Management.
Which reader can be used to read information from credit card? Barcode Reader, EPOS, Magnetic Stripe Reader or Magnetic Ink Character Reader.
One method to speed up the computer system is to increase: The ROM capacity, The RAM capacity or The Hard Disk capacity.
The combination of I-Time and E-Time is known as: Life Cycle, Program Cycle or Processing Cycle.
Clone computers are computers whereby: They are publicly distinguishable from other computers, The parts assembled are from different manufacturer or The parts assembled are from same manufacturer.
What is the relationship between a field, a record, and the structure of a database? What is control panel? Describe the most important utilities provided by control panel for computer management and
Suppose that for each query, you could create up to two index structures to make the query faster. What index structures would you create, and how would this change the evaluation plans and running
What are the main differences between primary key and foreign key? Describe it in detail with the help of appropriate examples. Define logical database model. What are its types? Describe it in detail
What are the major reasons for selecting MIP compared to DHCP or SIP for large scale architectures? Explain the triangular routing problem in MIP mechanism.
Draw 1st level DFD (Data Flow Diagram) and ERD (Entity Relationship Diagram) diagrams for network based course registration system for any university?
Describe the term “Deadlock”. Also explain Deadlock Detection and Deadlock Recovery with the help of different examples.
Explain the implementation process of Access Control List (ACL) in a network environment? Elaborate step by step.
What is the purpose of using a functional model? Give suitable example of functional model. Draw and describe a DFD for ATM Machine? Also describe the basic notations of DFD?
Define and describe data modelling, function modelling and behaviour modelling in detail? Describe the various notations used in DFD? Develop the DFD for library management system?
Define and describe software engineering? How software engineering is different from conventional engineering?
Prove that fractional knapsack problem has the greedy-choice property.
Demonstrate the operation of Heap sort on array A = [5, 13, 2, 25, 7, 17, 20, 8, 4]. What is the running time of heap sort on an array A of length n that is already sorted in increasing order? What
How are relationships between tables expressed in relational database?
Convert the following regular expression into NFA using Thompson’s construction.
What are the security strategies you can create for your web application? In what way you can secure your network against virus and Hoax Virus Warnings?
Explain the basic goals of privacy. Also explain the function of patent in network management.