• Q : Situation where integrity is important than confidentiality....
    Computer Network Security :

    This question concerns main security goals (confidentiality, integrity, availability). Explain a situation in which the goal of integrity is important, but there is not a need for confidentiality.

  • Q : Modernizing the file processing system....
    Database Management System :

    Discuss four major threats to database security. For each threat you identify, state at least one solution to that threat.

  • Q : Metropolitan city church management....
    Database Management System :

    Discuss the characteristics of an organization for which a data warehouse would be suitable. Aside from huge amounts of money, what resources does an organization need to support a data warehouse or

  • Q : Explaining working directory path expression....
    Basic Computer Science :

    "/home/gz" is my personal directory, and my working directory is "/home/gz/Documents" now. Which of the following directory path expression is valid and points to my working directory?

  • Q : File management and its tasks....
    Basic Computer Science :

    File management is one feature of an operating system. Describe five various tasks a USER can perform via commands (or other ways) that relate to disk files.

  • Q : Bus configurations found in pc....
    Computer Networking :

    Identify the two main bus configurations normally found in a PC. Describe why one has a limiting factor that affects the overall performance of the computer.

  • Q : Explaining offset directive in inline assembly code....
    Basic Computer Science :

    The OFFSET directive can’t be used in inline assembly code in Visual C++. Variables could be defined using BYTE and WORD in inline assembly code in Visual C++.

  • Q : Er diagram for shopping malls in different locations....
    Database Management System :

    Draw the ER diagram for the following situation:Real Estate Investment Company owns many shopping malls in different locations across the country.

  • Q : Ways in which businesses use internet services and protocols....
    Computer Networking :

    Explain three ways in which businesses use Internet services and protocols. (Such as, what is VoIP and how is it used?). Describe the differences among LANS, WANS, CANS, and MANS.

  • Q : Creating erd and 3nf table designs for reservation system....
    Database Management System :

    Identify entities and their relationships. Then create the ERD for a reservation system.Create 3NF table designs for a system.

  • Q : Downward-horizontal and upward communication....
    Basic Computer Science :

    Using illustration describe downward, horizontal and upward communication. Explain the major components of computer. Demonstrate your answer by block diagram.

  • Q : Physical extraction and logical extraction....
    Computer Graphics :

    Make a distinction between physical extraction and logical extraction. Write down the name of three types of data analysis. Describe the term file carving.

  • Q : Explaining critical path and length of the critical path....
    Computer Networking :

    You have the project with following tasks: Task A takes 40 hours and could start after project starts. Task B takes 25 hours and must happen after the project starts. Task C should happen after Task

  • Q : Explaining the role of metadata in data acquisition process....
    Database Management System :

    As a data acquisition specialist, what types of metadata can help you? Select one of the data acquisition processes and explain the role of metadata in that process.

  • Q : Method uses clock to generate one-time passwords....
    Computer Networking :

    Propose one method which uses a clock to generate one-time passwords. Describe your method with sufficient details.

  • Q : Onshore and offshore banking....
    Computer Networking :

    Distinguish between a rollover and a revolver loan and give a description of the syndicated loan in Eurocurrency market? Can onshore and offshore banking co exist?

  • Q : Frequency hopping and direct sequence modulation....
    Computer Networking :

    Write down the three advantages of using optical fiber. Make dissimilarity between “Frequency Hopping” and “Direct Sequence Modulation”

  • Q : Packet-level and application-level firewall....
    Computer Networking :

    Describe four issues which are usually addressed in the Needs Analysis phase in building-block approach to network design. Sketch a typical hybrid star-bus topology paying attention how the clients an

  • Q : Suitability and properties of isdn and adsl....
    Computer Networking :

    Compare the suitability and properties of ISDN and ADSL for this link. Can they be used for communicating multimedia data? Give reasons. Why is it essential for routers to exchange their routing inf

  • Q : Typical hybrid star-bus network topology....
    Computer Networking :

    Draw a diagram of typical hybrid star-bus network topology. Explain a good Network Management System (NMS) Environment and describe the factors which make it good.

  • Q : Layers of osi model-key elements of protocol....
    Computer Networking :

    List out the layers of the OSI model and briefly explain the function of each layer. List all the three key elements of protocol. Give a brief description of each of these key elements.

  • Q : Function of mail access protocol....
    Computer Networking :

    What is the function of Mail Access Protocol? Explain briefly the two download modes of POP3. Write down the name of various layers of OSI-7 model.

  • Q : Differentiating hash tables with random access tables....
    Data Structure & Algorithms :

    Compare and contrast hash tables with random access tables, when used as the dictionary data structure. Compare and contrast a binary search tree with the sorted array when used as the dictionary data

  • Q : Functionality of a router and topology....
    Computer Networking :

    Explain, with the assist of a diagram, a Star topology of the network of your choice. Elaborate on the employ of a MAN and give an example of one. Describe the functionality of a router.

  • Q : Explaining von neumann architecture....
    Basic Computer Science :

    Explain Von Neumann architecture and describe why it is important. Describe what a system bus is and why it is needed.

©TutorsGlobe All rights reserved 2022-2023.