• Q : Issues in achieving confidentiality-integrity-availability....
    Computer Network Security :

    The basic security goals are confidentiality, Integrity and availability (CIA). Explain the issues and problems in achieving these goals.

  • Q : Case study of city of sunnyvale....
    Basic Computer Science :

    Discuss the approach of City of Sunnyvale’s  IT director to ‘move the city into the future’ and how ‘Super’ rules guided IT infrastructure investments.

  • Q : 14-bit general purpose registers....
    Basic Computer Science :

    How many different memory locations can this CPU access by using base or offset addressing mode, if a 14-bit general purpose register serves as the base and can be loaded with any value?

  • Q : Locard-s exchange principle....
    Basic Computer Science :

    Describe the Locard’s Exchange Principle. Support your answer with example. Sometimes it’s best not to perform hard-disk acquisition. Provide two circumstances where it’s best not

  • Q : Essential elements of machine instruction....
    Basic Computer Science :

    Name and explain the four essential elements of machine instruction. Provide any four common examples of mnemonics.

  • Q : Explaining primary key and foreign key-normalization....
    Database Management System :

    What do you understand by Primary Key and Foreign Key? Describe with example. What is Normalization? Why it is essential?

  • Q : Distinction between scheduling and setup time....
    Basic Computer Science :

    Give two merits and one demerits of CD-ROM compared with traditional magnetic disks. Make a distinction between “Scheduling” and “Setup Time”.

  • Q : Four services of operating systems....
    Operating System :

    Describe four services of the operating systems. Make a distinction among the short term, medium term and long term scheduling that are provided by multi-tasking operating systems.

  • Q : Direct and associative mapping in cache memory....
    Operating System :

    What are the differentiations between a write-allocate and no-write-allocate policy in a cache? With the aid of a fully labelled diagram, make a distinction between direct and associative mapping in c

  • Q : Meaning of instruction set architecture....
    Operating System :

    Describe the meaning of Instruction Set Architecture. With the use of an example, describe how pipelining in microprocessors enhances the throughput of instruction execution.

  • Q : Major functions of operating system....
    Operating System :

    Provide the four major functions of operating system. Distributed network architecture is whereby services are distributed and implemented among many computers. Give two merits and two demerits of t

  • Q : Most widespread types of software....
    Basic Computer Science :

    Name the two most widespread types of software and briefly explain each one. The CPU comprises three chief units. Name the three units and describe the purpose of each unit.

  • Q : Comparing bcd format to the floating point format....
    Basic Computer Science :

    Compare and contrast the BCD format to the floating point format in terms of: precision and performance in calculations.

  • Q : Creating database schema using create table command....
    Database Management System :

    Create database schema for the tables given below using the CREATE TABLE command.

  • Q : Expressing the queries in sql....
    Database Management System :

    List the First Name, Last Name and telephone number of all employees who were appointed in the year 1995. List all details of employee who is not managed by any employee.

  • Q : Explaining nat - pgp - ids - dss....
    Computer Networking :

    PGP stands for: Private Good Privacy, Public Good Privacy, Process Good Privacy or Pretty Good Privacy.

  • Q : Significant step in implementing a security strategy....
    Basic Computer Science :

    The most significant step in implementing a security strategy is: Computer, Security Awareness, Cost or People.

  • Q : Drawing entity relationship model for relational schema....
    Database Management System :

    Draw Entity-Relationship model for the relational schema given in Appendix. Show all the entities, relationships names, relationship, and attributes and also underline the primary key for each and e

  • Q : Writing sql codes....
    Database Management System :

    Write the SQL code that will create ALL the tables as given in the appendix. Your answer should not contain the primary key and foreign key constraint declaration.

  • Q : Basic foundation tags for the html document - world wide web....
    Computer Networking :

    What is the publishing language for World Wide Web. What are the three basic foundation tags for the HTML document.

  • Q : Simplex and half duplex mode of communication....
    Computer Networking :

    Illustrate out the functions of modulator and source encoder in digital communications system. By using suitable examples, make a distinction between the simplex and half duplex mode of communication.

  • Q : Explaining pstn - ftp - tcp-ip-url....
    Computer Networking :

    PSTN is what kind of network? Circuit switched network, Public switched network, Packet switched network or Private switched network.

  • Q : Major categories of computer networks....
    Basic Computer Science :

    The three major categories of computer networks are: LAN, WAN, TAN, LAN, PAN, WAN, Ring, Bus, Star or None of the above.

  • Q : Explaining dot matrix printer and laser printer....
    Basic Computer Science :

    Which of the following is non-impact printer that prints by spraying ink on the paper: Dot matrix printer, Line printer, Laser printer or Ink jet printer.

  • Q : Explaining sram-ram-rom-virtual memory....
    Basic Computer Science :

    Which of the following is not true about virtual memory: It provides the basis for multi process operation, It supports that multiple programs are running concurrently and It is a physical memory.

©TutorsGlobe All rights reserved 2022-2023.