• Q : Message passing and shared memory....
    Operating System :

    Make a distinction between “Message passing” and “Shared memory”.  Use diagrams to demonstrate your answer. Explain what a virtual machine is and give some merits and deme

  • Q : Get and post methods in form submission....
    Basic Computer Science :

    What are the differences between GET and POST methods in form submission?  Briefly explain in which case it is more appropriate to use either the GET or the POST method?

  • Q : Explaining activity diagram and state machine diagram....
    Software Engineering :

    Compare Activity diagram and State machine diagram. What is the need of activity diagram? Explain use of fork and join in activity diagram with an example system.

  • Q : Role of different behavioural diagrams in uml 2.0....
    Software Engineering :

    Which are the different behavioural diagrams in UML 2.0? Describe role of each diagram in brief. Describe the benefits of using UML.

  • Q : Explaining congestion control and working of udp and tcp....
    Computer Networking :

    Describe the working of UDP. Describe the working of TCP. Draw the header format of TCP. Write a brief note on “Congestion control”.

  • Q : Explaining bridges-switches-connectors and repeaters....
    Computer Networking :

    Give short details of the components mention, Bridges, Switches, connectors, Repeaters. What is switching? Describe message switching and packet switching techniques.

  • Q : Differentiating lack of capacity-denial-of-service attack....
    Computer Networking :

    How can web site differentiate between lack of capacity and denial-of-service attack? For instance, web sites often experience tremendous increase in volume of traffic right after the advertisement

  • Q : Host-based ids and network hosed ids....
    Operating System :

    Supposing, that as a network engineer, you are supposed to execute a firewall, how would you go on to select the right firewall for organisation? Illustrate the differentiations between Host-based IDS

  • Q : Effective way to run world wide web service....
    Computer Networking :

    The effective way to run World Wide Web (WWW) service is not by. Disabling automatic directory listings, Placing standard WWW computer outside firewall in the DMZ, Implementing encryption or Relying o

  • Q : Transmission control protocol....
    Operating System :

    In order for User A to send User B an e-mail message that only User B can read, User A must encrypt the e-mail with which of the following keys?

  • Q : Intrusion detection systems-distributed denial of service....
    Operating System :

    Make a distinction between Distributed Denial of Service (DDoS) and Denial of Service (DoS). What do you understand by the term Intrusion Detection Systems?

  • Q : Comparison of windows and linux nos....
    Operating System :

    Considering the comparison of Windows and Linux NOS, comment on Virus Vulnerability and Security Issues. Name five types of Internet Protocols function at the Network layer of OSI Model.

  • Q : Hard disk interfaces on modern computers....
    Basic Computer Science :

    Name three dissimilar hard disk interfaces which are common on the modern computers. State any three reasons, together with merits, why partition is extremely important.

  • Q : Significance of touch command....
    Operating System :

    Write down any two reasons why Linux Operating System is better than one of its competitors. What is the significance of the “touch” command? Give one of its demerits.

  • Q : Implementing microsoft secure software development lifecycle....
    Software Engineering :

    The objective of this research paper is to describe the benefits of implementing MicrosoftSecure Software Development Lifecycle. Software Developers perform security measures during software develop

  • Q : Developing data centric application using sql statements....
    Database Management System :

    Objective of this project is to develop complete data centric application. Representing the requirements into logical design using Entity Relationship (ER) or/and Enhanced Entity Relationship (EER) mo

  • Q : How is-it infrastructure supposrt overall business strategy....
    Basic Computer Science :

    Select a large, multinational organisation that has succeeded in effectively aligning its business and IS/IT strategies, so creating a competitive advantage in its industry. Identify how IS/IT infrast

  • Q : Depth sorting technique of visible surface detection....
    Basic Computer Science :

    Illustrate the three conditions associated with the depth sorting technique of visible surface detection where no reordering would be necessary.

  • Q : Steps of bresenham line drawing algorithm....
    Basic Computer Science :

    By using an appropriate example, illustrate the main steps of Bresenham line drawing algorithm? Describe two possible optimizations which might be performed to the DDA algorithm.

  • Q : Stream media application....
    Basic Computer Science :

    Define the term ‘Multimedia database’. What are its major strength and weaknesses? What is ‘stream media application’? List two major drawbacks of these types of application.

  • Q : Data encryption standard-symmetric encryption....
    Computer Network Security :

    Which Data Encryption Standard (DES) operating modes can be employed for large messages without the worry that an error early in the encryption or decryption process will spoil results during the co

  • Q : Security configuration and analysis tool....
    Computer Network Security :

    Briefly describe how the Security Configuration and Analysis Tool (SCAT) snap-in in MMC (Microsoft Management Console) can be employed for securing a computer.

  • Q : Difficulties-risks using public infrastructure in business....
    Computer Network Security :

    Assess probable difficulties and risks associated with using public infrastructure like the Internet as part of a business solution.

  • Q : Concept of single sign on....
    Computer Network Security :

    What are the two most important threat faced by the security industry? Describe the privacy issues related to use of Biometrics. Describe the concept of Single Sign on (SSO). Mention merits and demeri

  • Q : Dual homed bastion host configuration....
    Computer Network Security :

    Sketch a possible dual-homed Bastion Host configuration? How is it dissimilar from a single-homed Bastion Host? Illustrate five different types of computer viruses. Determine the most dangerous type a

©TutorsGlobe All rights reserved 2022-2023.