Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Illustrate the five main security services. What is passive attack? Give an instance of passive attack? What four types of active attacks and illustrate their respective attacks to which security serv
Explain briefly the differentiation between congestion control and flow control in relation to a connection-oriented protocol such as TCP.
Write down the name of three popular electronic mail access protocols. What do you understand by the term DNS? Why does DNS employ a distributed approach as opposed to a single server?
Describe what you understand by Nyquist Capacity Theorem? Assume we wish to transmit at the rate of 64 kbps over a 4 kHz noisy but error-free channel. What is minimum SNR in dB required to achieve t
Implement the expression true as a binary tree, which does the following: Build the expression tree from a given String containing a fully-parenthesized arithmetic expression, for example "(((3.2 *
Convert 11001010 to the second power to hex. Convert 82 to the 16th power to decimal. Convert 82 to the 10th power to hex.
Give the efficient algorithm for the following problem:Given airports a and b, and time t, determine the sequence of flights which allows one to arrive at the earliest possible time in b when depart
Consider a system in which it is desired to separate policy and mechanism for the scheduling of kernel threads. Suggest a means of achieving this goal.
With a neat sketch, explain the Simon Model of Decision Making. Why a feasibility analysis needs to be carried out a part of System Development Life Cycle (SDLC)?
Explain various stages of the Hebb’s training algorithm. Design a 2-input AND function using Hebb’s rule.
A product barcode doesn’t contain product price. Explain the steps that take place for the price to be obtained. Describe how, in a supermarket, the product price is obtained at the checkout w
Explain virtual memory. Describe direct mapping and associative memory with diagram.
Write down the difference between synchronous and asynchronous buses.
Describe the internal and external commands in DOS. Explain all the available tools in MS Word?
What are the main limitations of primary storage of computer system?
Write down the difference between data verification and data validation.
Write comparison between Floyd’s and Dijkstra’s algorithms. Write a program to create Binary Search Tree.
What do you mean by memory management? What are the deadlocks –system models? Also classify dead states.
Write down the difference between candidate key and super key. What is data abstraction? Describe the various level of data abstraction.
Demonstrate with the help of a diagram the function or architecture of a Mashup. A Mashup server is more or less comparable to routers with link encryption, therefore raises the risk of man-in-the-mi
Explain Apache architecture using the suitable diagram. Describe the purpose of third-party modules for use with Apache. Describe the different components which can be found inside a configuration fil
Describe what you understand by the term IEEE 802.11? What is the differentiation between client jamming and base station jamming?
Wireless Access points have been recognized to have various security vulnerabilities which can lead to breach of Secured wired networks. IEEE 802.11 standards have identified numerous key points for
Explain the differentiation between WPA and WPA2. What are RTS and CTS frames and hence, describe how it works.
brief summary of specific notation, mathematical concepts, terminology, or other information important to understanding the discussion that follows