Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
List out the major steps involved in the execution of instruction. Define Terms : Multitasking, multiprocessing and multiprogramming with examples. What role do I/O devices play list example I/O devic
Describe DDA circle drawing algorithm in detail. Describe Random scan display and Raster scan display. Describe Bresenham's line drawing algorithm. Using Bresenham's algorithm draw line from (1, 1) to
Describe centralized and client server database architectures. Describe transaction server system in detail. Compare and contrast speedup and scaleup.
Explain elements and notation use to build an activity diagram in UML. Draw a communication diagram for 'schedule a seminar' in hypothetical college system for seminarmanagement. Make appropriate ass
Draw and describe the basic Linux file system organization. Draw and describe the basic Linux Kernel components. Describe the following with respect to Linux OS.
Compare and contrast a peer-to-peer network architecture to Client-Server architecture. Support your answer with proper diagrams and examples.
Why is the phase of Lexical analysis important? Why is input buffering important in Lexical Analysis? Describe all the phases of compilers in detail.
What are the differentiations between archive and backup? What do you understand by the term input device? Give an example.
What are alpha and beta testing? What are various debugging strategies? What is a graph matrix? How do we extend it for use in testing? Explain loop testing? Describe different classes of loops.
What are specialised process models? Describe Aspect Oriented Software development. Explain the framework activities involved in concurrent development model.
What are the objectives of MPEG-4 standard? With the help of abstract model, explain the audio encoding using MPEG standard.
What are the different issues related to disk performance? Describe any one disk scheduling algorithm with appropriate example. What are the advantages and disadvantages of C-SCAN scheduling algorithm
What features of assembly language makes it mandatory to design a two pass assembler? Describe with appropriate example. Draw a neat flowchart for macroprocessor to handle nested macro definitions.
As the intern software developer for the retail bank, you have been tasked with developing use cases to support the ATM service.
Describe Virtual Reality chair used in VR-Applications. What is the use of DEF and USE in VRML? Are there any disadvantages of using DEF and USE for reuse?
Explain about the evolution of operating systems from mainframe batch systems to mainframe time sharing systems.
Explain the Multics operating system project which was under taken at MIT in the year 1960. Identify any impacts and influences Multics has had on modern day trends in developing secure and trusted
Describe how jacketing could minimize some of the issues of User Level threads. Make a distinction between the controls problems of deadlock and starvation.
Describe index sequential search with example. Write a non recursive algorithm for binary search and analyze its complexity. Write pseudo C code for bubble sort and calculate its time complexity.
Implementing Group Policies in a Windows environment simplify largely the tasks of Systems Administrators. In this context, describe the use of Group Policies and explain four tasks that can be atta
What is the meaning of the term “Fully Qualified Domain Name”? Write down the name of any three technologies which comprise a complete IDA solution.
Explain Query Processor and Storage manager components of DBMS. Describe advantages and disadvantages of DBMS approach.
Using the Active Directory Domains and Trusts console, it is probable to make a variety of different types of trusts between domains and forests. Make a distinction between the “Realm Trust&rd
What are the two primary techniques of implementing security? Briefly describe each one. Give the three elements which determine a user’s access and which define the permissions they have to obj
Make a distinction between “Deadlock Prevention” and “Deadlock Avoidance”. Give detailed description about how recovery from deadlocks can be made possible.