• Q : Bus configurations found in pc....
    Computer Networking :

    Identify the two main bus configurations normally found in a PC. Describe why one has a limiting factor that affects the overall performance of the computer.

  • Q : Explaining offset directive in inline assembly code....
    Basic Computer Science :

    The OFFSET directive can’t be used in inline assembly code in Visual C++. Variables could be defined using BYTE and WORD in inline assembly code in Visual C++.

  • Q : Er diagram for shopping malls in different locations....
    Database Management System :

    Draw the ER diagram for the following situation:Real Estate Investment Company owns many shopping malls in different locations across the country.

  • Q : Ways in which businesses use internet services and protocols....
    Computer Networking :

    Explain three ways in which businesses use Internet services and protocols. (Such as, what is VoIP and how is it used?). Describe the differences among LANS, WANS, CANS, and MANS.

  • Q : Creating erd and 3nf table designs for reservation system....
    Database Management System :

    Identify entities and their relationships. Then create the ERD for a reservation system.Create 3NF table designs for a system.

  • Q : Downward-horizontal and upward communication....
    Basic Computer Science :

    Using illustration describe downward, horizontal and upward communication. Explain the major components of computer. Demonstrate your answer by block diagram.

  • Q : Physical extraction and logical extraction....
    Computer Graphics :

    Make a distinction between physical extraction and logical extraction. Write down the name of three types of data analysis. Describe the term file carving.

  • Q : Explaining critical path and length of the critical path....
    Computer Networking :

    You have the project with following tasks: Task A takes 40 hours and could start after project starts. Task B takes 25 hours and must happen after the project starts. Task C should happen after Task

  • Q : Explaining the role of metadata in data acquisition process....
    Database Management System :

    As a data acquisition specialist, what types of metadata can help you? Select one of the data acquisition processes and explain the role of metadata in that process.

  • Q : Method uses clock to generate one-time passwords....
    Computer Networking :

    Propose one method which uses a clock to generate one-time passwords. Describe your method with sufficient details.

  • Q : Onshore and offshore banking....
    Computer Networking :

    Distinguish between a rollover and a revolver loan and give a description of the syndicated loan in Eurocurrency market? Can onshore and offshore banking co exist?

  • Q : Frequency hopping and direct sequence modulation....
    Computer Networking :

    Write down the three advantages of using optical fiber. Make dissimilarity between “Frequency Hopping” and “Direct Sequence Modulation”

  • Q : Packet-level and application-level firewall....
    Computer Networking :

    Describe four issues which are usually addressed in the Needs Analysis phase in building-block approach to network design. Sketch a typical hybrid star-bus topology paying attention how the clients an

  • Q : Suitability and properties of isdn and adsl....
    Computer Networking :

    Compare the suitability and properties of ISDN and ADSL for this link. Can they be used for communicating multimedia data? Give reasons. Why is it essential for routers to exchange their routing inf

  • Q : Typical hybrid star-bus network topology....
    Computer Networking :

    Draw a diagram of typical hybrid star-bus network topology. Explain a good Network Management System (NMS) Environment and describe the factors which make it good.

  • Q : Layers of osi model-key elements of protocol....
    Computer Networking :

    List out the layers of the OSI model and briefly explain the function of each layer. List all the three key elements of protocol. Give a brief description of each of these key elements.

  • Q : Function of mail access protocol....
    Computer Networking :

    What is the function of Mail Access Protocol? Explain briefly the two download modes of POP3. Write down the name of various layers of OSI-7 model.

  • Q : Differentiating hash tables with random access tables....
    Data Structure & Algorithms :

    Compare and contrast hash tables with random access tables, when used as the dictionary data structure. Compare and contrast a binary search tree with the sorted array when used as the dictionary data

  • Q : Functionality of a router and topology....
    Computer Networking :

    Explain, with the assist of a diagram, a Star topology of the network of your choice. Elaborate on the employ of a MAN and give an example of one. Describe the functionality of a router.

  • Q : Explaining von neumann architecture....
    Basic Computer Science :

    Explain Von Neumann architecture and describe why it is important. Describe what a system bus is and why it is needed.

  • Q : Security services-passive attack....
    Computer Network Security :

    Illustrate the five main security services. What is passive attack? Give an instance of passive attack? What four types of active attacks and illustrate their respective attacks to which security serv

  • Q : Congestion control and flow control....
    Computer Networking :

    Explain briefly the differentiation between congestion control and flow control in relation to a connection-oriented protocol such as TCP.

  • Q : Popular electronic mail access protocols....
    Computer Networking :

    Write down the name of three popular electronic mail access protocols. What do you understand by the term DNS? Why does DNS employ a distributed approach as opposed to a single server?

  • Q : Nyquist capacity theorem....
    Basic Computer Science :

    Describe what you understand by Nyquist Capacity Theorem? Assume we wish to transmit at the rate of 64 kbps over a 4 kHz noisy but error-free channel. What is minimum SNR in dB required to achieve t

  • Q : Implementing the expression as a binary tree....
    Data Structure & Algorithms :

    Implement the expression true as a binary tree, which does the following: Build the expression tree from a given String containing a fully-parenthesized arithmetic expression, for example "(((3.2 *

©TutorsGlobe All rights reserved 2022-2023.