Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
State rules to convert E-R diagram into tables. Explain different File Organisations and describe Heap File Organisation in detail.
State three manners how to remove Themes from an application. Mention the two main benefits of developing a Multitier Web Applications. Compare and contrast Web.Config and Machine.Config files as used
Which protocol is employed to communicate between web server and web client? Provide merits and demerits of using frames.
Explain the implications of HTTP being the stateless protocol referring to each of the above-mentione techniques.
Describe how silly window syndrome & clark’s solution are complement each other. What is jitter? Describe any two solutions of jitter.
Outline two advantages of using PERT and CPM for a Project manager. State one major drawback of using these network techniques in network analysis. Write down three distinguishing features between PER
Describe the different types of resolutions used in DNS. Where in the protocol stack RTP is placed? Explain the working of RTP.
Discuss three applications of operations research in order to improve decision making process. Discuss briefly any two basic components of a queueing system.
Explain the use of control characters used in TELNET for controlling the server. Describe any two types of method proposed for connection relase in transport layer.
List and describe the syntax of time related system calls. Which are the actions taken by kernel while unmounting a file system?
What are block and character device switch tables? Which system call is used to create the device file?
What do you mean by callout table? What is its usage? What is inode reference count? What do you mean by inode reference count= 0 and inode reference count > 0?
What are the various approaches for component based development?
Give three examples of typical primitive vector objects. State two examples of typical primitive vector operations. State two advantages of using vector graphics when designing logos.
Describe intent and applicability of Singleton Design Pattern. What are the participants of Adaptor Design Pattern?
Briefly describe “Baracudda” framework. What are the features of “Cacoon” framework. Write down the advantages of components?
Explain with an appropriate diagram the logical structures of Active Directory components. Explain in detail the FAP (File Access Permissions) for a file using the chmod command.
You have been posted as a System administrator for the Help Desk division of a legal firm situated in Ebene (Head Office). The firm has several branch offices spread over the island.
Why is routing in multihop ad-hoc network is complicated? Describe the architecture of WAP with diagram.
Write down the advantages and disadvantages of Mobile TCP. What are the various identifiers associated with mobile stations in GSM? Why these identifiers are required?
Which Network protocols does J2ME supports for establishing connection? What do you mean by Cluster and MIDlet. What is gossip protocol?
Explain how master secret is created from pre-master secret in SSL. Describe the processes of generating digital signature using RSA.
Describe key generation and management using RSA. Describe how PGP provides authentication as well as confidentiality?
Define deadlock? How deadlock can be managed? Describe the problems why DBMS bypass OS buffer manager and manage the disk & main memory.
Explain the steps involved in generation of CA. Write down at least one serializable and one Non serializable schedule for the transaction.