Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
The basic security goals are confidentiality, Integrity and availability (CIA). Explain the issues and problems in achieving these goals.
Discuss the approach of City of Sunnyvale’s IT director to ‘move the city into the future’ and how ‘Super’ rules guided IT infrastructure investments.
How many different memory locations can this CPU access by using base or offset addressing mode, if a 14-bit general purpose register serves as the base and can be loaded with any value?
Describe the Locard’s Exchange Principle. Support your answer with example. Sometimes it’s best not to perform hard-disk acquisition. Provide two circumstances where it’s best not
Name and explain the four essential elements of machine instruction. Provide any four common examples of mnemonics.
What do you understand by Primary Key and Foreign Key? Describe with example. What is Normalization? Why it is essential?
Give two merits and one demerits of CD-ROM compared with traditional magnetic disks. Make a distinction between “Scheduling” and “Setup Time”.
Describe four services of the operating systems. Make a distinction among the short term, medium term and long term scheduling that are provided by multi-tasking operating systems.
What are the differentiations between a write-allocate and no-write-allocate policy in a cache? With the aid of a fully labelled diagram, make a distinction between direct and associative mapping in c
Describe the meaning of Instruction Set Architecture. With the use of an example, describe how pipelining in microprocessors enhances the throughput of instruction execution.
Provide the four major functions of operating system. Distributed network architecture is whereby services are distributed and implemented among many computers. Give two merits and two demerits of t
Name the two most widespread types of software and briefly explain each one. The CPU comprises three chief units. Name the three units and describe the purpose of each unit.
Compare and contrast the BCD format to the floating point format in terms of: precision and performance in calculations.
Create database schema for the tables given below using the CREATE TABLE command.
List the First Name, Last Name and telephone number of all employees who were appointed in the year 1995. List all details of employee who is not managed by any employee.
PGP stands for: Private Good Privacy, Public Good Privacy, Process Good Privacy or Pretty Good Privacy.
The most significant step in implementing a security strategy is: Computer, Security Awareness, Cost or People.
Draw Entity-Relationship model for the relational schema given in Appendix. Show all the entities, relationships names, relationship, and attributes and also underline the primary key for each and e
Write the SQL code that will create ALL the tables as given in the appendix. Your answer should not contain the primary key and foreign key constraint declaration.
What is the publishing language for World Wide Web. What are the three basic foundation tags for the HTML document.
Illustrate out the functions of modulator and source encoder in digital communications system. By using suitable examples, make a distinction between the simplex and half duplex mode of communication.
PSTN is what kind of network? Circuit switched network, Public switched network, Packet switched network or Private switched network.
The three major categories of computer networks are: LAN, WAN, TAN, LAN, PAN, WAN, Ring, Bus, Star or None of the above.
Which of the following is non-impact printer that prints by spraying ink on the paper: Dot matrix printer, Line printer, Laser printer or Ink jet printer.
Which of the following is not true about virtual memory: It provides the basis for multi process operation, It supports that multiple programs are running concurrently and It is a physical memory.