Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
What are the various precautions one should take for making the use of Internet safer and secure? Explain on the implications of user habits.
What do you mean by the term computer virus? List the kinds of viruses. Elaborate on the role of antivirus in preventing the virus attack.
Network security is a main concern for every business of all sizes. Propose what you should, or should not, be doing in a networking environment.
Vulnerabilities are the flaws in computer software which make weaknesses in the overall security of the computer or network and permit an attacker to decrease a system's information assurance. Could
What do you mean by the term blog? What are the benefits of having a blog?
What are the differences among Data, Information and Knowledge? Consider that a Departmental Store requires keeping data about its customers and the transactions made by such customers.
There are various ways of connecting to Internet like Wi-Fi, Leased Line and so on. Categorize the suitability of each kind of Internet connection for the corresponding type of tasks.
What are the various kinds of information in an organization? How is information distinct from knowledge? A Bank stores account holder information and account information of its customers.
What do you mean by the term computer system? Describe functions of CPU in a Computer System.
Explain the characteristic features of various kinds of Web documents and the parameters by which the Web documents can be computed.
Recognize the components of computer network and explain their functions.
Describe the steps in making graphs or charts in MS-Excel. Write down a detailed note on the PowerPoint mentioning its significant features.
System Development Life Cycle Method is a step-by-step, structured process for the development of a system. Elaborate.
Define Meta resources and other variable terms like portals, vortals and hortals. Describe the methodology for building up Meta resources.
Describe how three-tier architecture tries to overcome the limitations of two-tier architecture. Explain different kinds of middle ware products.
Describe the criteria of evaluation of an information retrieval system with illustrations.
Describe how the communication protocols are useful in the process of communication.
Describe the following term with the help of suitable example/diagram, if necessary. CPU, Main Memory, Input/output device, TCP/IP, Computer Virus, Internete-mail and Networking.
The questions in this exam are based on the Baxter Aviation scenario that you used for the first exam. Please read the following narrative carefully, as many of the rules have changed!
What are hardware and software requirements to set up Intranet? Are there any better alternatives to Intranet. Justify your answer.
Construct the DFA (Deterministic Finite Automata) accepting following Set: {w ∈ {a,b}*: w has the even number of a’s and odd number of b’s}. Construct Turing Machine for the following
Compare any 4 software development life cycle paradigms with each other. Point out at least one application for each of the paradigms which are appropriate to developed using that paradigm.
Write the client and server program in C language using UDP, where client program interact with Server as given below: Client begins by sending a request to send a string of 8 characters or series o
Explain the following: DNS, Name Resolution, Subnet Masking and Urgent Pointer. How does TCP handle flow control problem? Describe it with the help of the diagram showing status of sliding window at
Describe with illustration how Internet Layer and network Interface layer of TCP reference model function.Describe the followings in terms of TCP reference model with examples. Reliable connection&nda