Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
What do you understand by the term Articles of Association? State its contents. What do you understand by the term Departmental Accounts? Describe their merits.
The shop management system was written in COBOL. Identify some benefits and drawbacks of COBOL.
Which command displays RIP routing updates?show ip route, debug ip rip, show protocols or debug ip route.
Describe the components of CPU and their functions. Describe the capabilities of spreadsheet software and its use in solving the managerial problems.
Which command would delete contents of NVRAM on the router? delete NVRAM, delete startup-config, erase NVRAM or erase start.
Which of the following commands sets secret password to Cisco? enable secret password Cisco, enable secret cisco, enable secret Cisco or enable password Cisco.
What is the address range of the Class B network address in binary?110xxxxx, 0xxxxxxx, 10xxxxxx or 01xxxxxx.
The DoD model (also called the TCP/IP stack) has four layers. Which layer of DoD model is equivalent to Network layer of OSI model?
Which command is used to upgrade the IOS on Cisco router? copy tftp run, copy tftp start, config net or copy tftp flash.
What PPP protocol provides dynamic addressing, authentication, and multilink?
Which protocol does DHCP use at Transport layer? IP, TCP, UDP or ARP.
What are the two main types of access control lists (ACLs)? Standard, IEEE, Extended or Specialized.
Give three reasons why a computer system would require having some sorts of external storage device.
Analyze and assess any potential malicious attacks and threats that might be carried out against network.
Describe the function of input controls. Identify four types of input control and describe the function of each. Provide the example of data integrity error which can occur if each of these types of i
Collecting personal information and effectively posing as another individual is termed as the crime of: spooling, identity theft, spoofing or hacking.
An operating system runs multiple applications simultaneously called as: Multitasking, Multiprogramming or Programming.
A system where processing should be completed within certain time constraints suitable for the system Real time systems or Time sharing systems.
Viruses which aim at a boot sector of hard drive are infecting a very crucial component of the boot process: File infection virus, Boot virus, Network virus or E-mail virus.
Define the term computer? Explain and differentiate Hardware, Software and Programming concepts.
Define the term Information System? Describe about the established Information Systems and Networks in developing country.
What are the different facilities and components of operating system? Give the comparison between professional and home edition of windows.
What do you mean by binary Adder? Describe about 4-bit binary adder with a neat diagram.
Describe the difference between single linked list and double linked list. Describe about different operations performed on double linked list.
How do you inform regarding the installation of computer to employees?