Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Which Network protocols does J2ME supports for establishing connection? What do you mean by Cluster and MIDlet. What is gossip protocol?
Explain how master secret is created from pre-master secret in SSL. Describe the processes of generating digital signature using RSA.
Describe key generation and management using RSA. Describe how PGP provides authentication as well as confidentiality?
Define deadlock? How deadlock can be managed? Describe the problems why DBMS bypass OS buffer manager and manage the disk & main memory.
Explain the steps involved in generation of CA. Write down at least one serializable and one Non serializable schedule for the transaction.
Write an algorithm for Simple Hill Climbing and describe its working with an illustration.
Describe in detail regarding the design principles of International Data Encryption Algorithm.
What is data mining? Describe the features and benefits of data mining in detail.
List all the advantages of optical media over magnetic media. Write a concise note on Media classes and Transform classes. Describe Video compression methods in details.
Describe about incremental process models and describe their benefits and drawbacks.
Write the process for thick line by using BRESENHM’s algorithm. Write concise notes on Two Dimensional Viewing and Clipping. Describe about Hidden Surface Algorithm.
Define the term data structure. Describe various kinds of data structures with illustrations.
Define the term IT. Explain different IT trends and their advantages to the organizations.
Describe about Cohen Sutherland Algorithm with appropriate example.
Write down Kruskal algorithm. Apply Kruskal algorithm to find out minimum spanning tree of the given graph.
What do you mean by ALOHA? Differentiate between ALOHA and slotted ALOHA.
In what manner the Clean room Software Engineering different from Conventional and Object Oriented Software Engineering.
Explain the Concept of Conventional File Processing with and illustration in detail. Illustrate the pros and cons of it.
What do you mean by scheduling? Describe about Round robin scheduling algorithm with appropriate example.
Describe Linear and Non-Linear data structures with appropriate examples.
Describe the structure and operation of IAS computer in detail.
Define the terms computers and information technology. Describe the role of computer in the Information technology.
List all the drivers of e-Commerce and merits of e-Commerce. Make a distinction conventional commerce from e-Commerce. What are the characteristics that explain any business model?
What is the function of Spanning Tree Protocol in a switched LAN? To provide the mechanism for network monitoring in switched environments. or To prevent routing loops in networks with redundant paths
What is route poisoning? It sends back protocol received from the router as a poison pill, which stops the regular updates. or It is information received from a router that can not be sent back to the