Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
With a block diagram describe the functional control scheme for the TSC-TCR type static var generator.
What is the purpose of JUMP function? Write down the advantages of JUMP Instruction? Write down the advantages of matrix functions.
Describe the procedural steps involved in Drill press operation. Sketch the Ladder diagram for drill press control.
Illustrate the meaning of Firewall? Describe various types of firewalls in short.
Write the concept of Tracking and explain Delay-Lock-Tracking.
Describe about add-and-divide frequency synthesizer. Draw a block diagram to produce 8000 frequency separated by 100 Hz spacing.
Write down the steps to model the executable release. Demonstrate with a UML diagram.
Describe how optimization in achieved in mobile IP. Describe tunnelling and encapsulation in mobile IP.
What do you mean by binding time in compilation? Describe the significance of binding time.
Distinguish two-pass and single pass translation scheme in an assembler.
What are the four types of handover available in GSM? What do you understand by TETRA? Explain in detail.
Describe in brief the broadly used language processor development tool-the lexical analyzer generator LEX.
Explain any four characteristics of the top down approaches to algorithmic design.
Design parallel priority interrupt hardware for a system through eight interrupt sources.
What do you mean by the shared secret key? Also write down the algorithm with suitable example. Describe EIGamal Public key cryptosystem in detail.
What do you mean by micro-instruction? With appropriate block diagram, describe the working of a micro programmed sequencer.
Illustrate the implications of Moore’s Law in the growth of computer technology?
What do you mean by weak collision property of a hash function?
Describe the Miller-Rabin Algorithm with suitable example. User A and B exchange key by using Diffie-Hellman algorithm. Suppose α=5 q=11 XA=2 XB=3. Determine the value of YA, YB and k.
Describe the tunneling operation in the mobile IP. Draw the relevant diagram.
What is the function of session key in public key schemes? What is the purpose of the State array?
Convert “MEET ME” by using Hill cipher with the key matrix. Write short notes on:Chinese Remainder theorem.
Describe the importance of power management in the wireless systems.
Explain Euler’s totient function or phi function and their applications in detail.
Explain the impact of reflection, diffraction and scattering methods on the propagation of radio waves in the mobile communication system.