Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
What are the different components of windows O.S ? Describe in brief. Distinguish between DOS and Windows O.S.
Describe EIGHT golden rules of interface design. Give appropriate examples to justify your answer. Describe how GOMS and the keystroke-level model support the interaction design process.
Draw and describe RGB and CMYK Color models. How compression is achieved in images. What are the major steps in JPEG image compression?
Distinguish between Single Attribute and Multivalued Attribute.
What do you understand by Decomposition of Relation Scheme? Distinguish between Weak Entity and Strong Entity with appropriate example.
State rules to convert E-R diagram into tables. Explain different File Organisations and describe Heap File Organisation in detail.
State three manners how to remove Themes from an application. Mention the two main benefits of developing a Multitier Web Applications. Compare and contrast Web.Config and Machine.Config files as used
Which protocol is employed to communicate between web server and web client? Provide merits and demerits of using frames.
Explain the implications of HTTP being the stateless protocol referring to each of the above-mentione techniques.
Describe how silly window syndrome & clark’s solution are complement each other. What is jitter? Describe any two solutions of jitter.
Outline two advantages of using PERT and CPM for a Project manager. State one major drawback of using these network techniques in network analysis. Write down three distinguishing features between PER
Describe the different types of resolutions used in DNS. Where in the protocol stack RTP is placed? Explain the working of RTP.
Discuss three applications of operations research in order to improve decision making process. Discuss briefly any two basic components of a queueing system.
Explain the use of control characters used in TELNET for controlling the server. Describe any two types of method proposed for connection relase in transport layer.
List and describe the syntax of time related system calls. Which are the actions taken by kernel while unmounting a file system?
What are block and character device switch tables? Which system call is used to create the device file?
What do you mean by callout table? What is its usage? What is inode reference count? What do you mean by inode reference count= 0 and inode reference count > 0?
What are the various approaches for component based development?
Give three examples of typical primitive vector objects. State two examples of typical primitive vector operations. State two advantages of using vector graphics when designing logos.
Describe intent and applicability of Singleton Design Pattern. What are the participants of Adaptor Design Pattern?
Briefly describe “Baracudda” framework. What are the features of “Cacoon” framework. Write down the advantages of components?
Explain with an appropriate diagram the logical structures of Active Directory components. Explain in detail the FAP (File Access Permissions) for a file using the chmod command.
You have been posted as a System administrator for the Help Desk division of a legal firm situated in Ebene (Head Office). The firm has several branch offices spread over the island.
Why is routing in multihop ad-hoc network is complicated? Describe the architecture of WAP with diagram.
Write down the advantages and disadvantages of Mobile TCP. What are the various identifiers associated with mobile stations in GSM? Why these identifiers are required?