Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Make a distinction between “Message passing” and “Shared memory”. Use diagrams to demonstrate your answer. Explain what a virtual machine is and give some merits and deme
What are the differences between GET and POST methods in form submission? Briefly explain in which case it is more appropriate to use either the GET or the POST method?
Compare Activity diagram and State machine diagram. What is the need of activity diagram? Explain use of fork and join in activity diagram with an example system.
Which are the different behavioural diagrams in UML 2.0? Describe role of each diagram in brief. Describe the benefits of using UML.
Describe the working of UDP. Describe the working of TCP. Draw the header format of TCP. Write a brief note on “Congestion control”.
Give short details of the components mention, Bridges, Switches, connectors, Repeaters. What is switching? Describe message switching and packet switching techniques.
How can web site differentiate between lack of capacity and denial-of-service attack? For instance, web sites often experience tremendous increase in volume of traffic right after the advertisement
Supposing, that as a network engineer, you are supposed to execute a firewall, how would you go on to select the right firewall for organisation? Illustrate the differentiations between Host-based IDS
The effective way to run World Wide Web (WWW) service is not by. Disabling automatic directory listings, Placing standard WWW computer outside firewall in the DMZ, Implementing encryption or Relying o
In order for User A to send User B an e-mail message that only User B can read, User A must encrypt the e-mail with which of the following keys?
Make a distinction between Distributed Denial of Service (DDoS) and Denial of Service (DoS). What do you understand by the term Intrusion Detection Systems?
Considering the comparison of Windows and Linux NOS, comment on Virus Vulnerability and Security Issues. Name five types of Internet Protocols function at the Network layer of OSI Model.
Name three dissimilar hard disk interfaces which are common on the modern computers. State any three reasons, together with merits, why partition is extremely important.
Write down any two reasons why Linux Operating System is better than one of its competitors. What is the significance of the “touch” command? Give one of its demerits.
The objective of this research paper is to describe the benefits of implementing MicrosoftSecure Software Development Lifecycle. Software Developers perform security measures during software develop
Objective of this project is to develop complete data centric application. Representing the requirements into logical design using Entity Relationship (ER) or/and Enhanced Entity Relationship (EER) mo
Select a large, multinational organisation that has succeeded in effectively aligning its business and IS/IT strategies, so creating a competitive advantage in its industry. Identify how IS/IT infrast
Illustrate the three conditions associated with the depth sorting technique of visible surface detection where no reordering would be necessary.
By using an appropriate example, illustrate the main steps of Bresenham line drawing algorithm? Describe two possible optimizations which might be performed to the DDA algorithm.
Define the term ‘Multimedia database’. What are its major strength and weaknesses? What is ‘stream media application’? List two major drawbacks of these types of application.
Which Data Encryption Standard (DES) operating modes can be employed for large messages without the worry that an error early in the encryption or decryption process will spoil results during the co
Briefly describe how the Security Configuration and Analysis Tool (SCAT) snap-in in MMC (Microsoft Management Console) can be employed for securing a computer.
Assess probable difficulties and risks associated with using public infrastructure like the Internet as part of a business solution.
What are the two most important threat faced by the security industry? Describe the privacy issues related to use of Biometrics. Describe the concept of Single Sign on (SSO). Mention merits and demeri
Sketch a possible dual-homed Bastion Host configuration? How is it dissimilar from a single-homed Bastion Host? Illustrate five different types of computer viruses. Determine the most dangerous type a