Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What is an E-mail? Describe components of E-mail. What is Computer System? Describe different components of Computer. What is requirement of memory in computer system? Describe the memory hierarchy.
Draw DFDs up to 3rd level for Assignment Marks Recording System. Draw ERD for Assignment Marks Recording System. Make essential assumptions.
Describe principle of duality. Determine dual of Boolean expression of the output of logic circuit. Explain Demorgan’s Law? Describe use of Demorgan’s law with an example.
Explain the use of pipelining in a processor? Describe with the help of an example. Draw the diagram and describe a four stage instruction pipeline. Explain the use of pipelining in a processor? Des
Make a presentation on computer basics that must include the following details: Hardware components, Different types of software, Type of application software, Features of Operating System and Feature
Describe the concept of client-server architecture. How is it different than File sharing Architecture? Describe various types of client-server architectures.
Register AX,BX,CX,DX contain 1111h,2222h,3333h,4444h, what are the contents of each register after this sequence of instructions PUSH AX, PUSH CX, PUSH BX, POP DX, POP AX, POP BX.
Develop SRS for Grade Card Generation System. Utilize IEEE format. How would you check correctness of a DFD? What are Do?s and Don?ts while drawing the DFD. Use examples or illustrations.Draw ERD for
Consider un-pipelined computation system. The computation in a combinational logic takes 400 ps to complete and storing the result to register takes 20ps. What is the throughput of the system? What
Design a 4-to-1 multiplexer using AND, OR, and NOT gates. construct a truth table for this multiplexer using a maximum of a 2-bit combinations.
Encryption is only useful if there is a matching reversible operation called decryption. In a Feistel cipher, the F-function or round function need not be reversible. Show that F-function of DES is
Alice and Bob are sending a message m to each other (a) Give one method to achieve confidentiality for m. (b) Give one method to achieve integrity but NOT confidentiality for m.
How could you carry out a floating point comparison? You must include two examples, one in C-shell and one in Bourne shell. Describe the getopts command and write the sample shell script which uses ge
The equation of a simple stereo system is z = f T / d. In this question assume that f T = 1 which means that z = 1 / d. Compute FirstErrorZ (5 pixels), FirstErrorZ (10 pixels), and the ratio of the
SailDublin Ferry provides ferries to mainland Britain, Europe and America. Having observed the success of Irish ferries and Stennaline online booking system it has has decided to build an online sy
A binary tree is full if all of its nodes have either zero or two children. Let Bn denote the number of full binary trees with n nodes.Draw all full binary trees with 3, 5, and 7 nodes and determine t
Prepare a report which contains your specification of the computers required for the lab. Discuss motherboard architecture; processor architecture; compare the processors functions; cost benefits a
Describe in detail the consistency model of the distributed file system (GFS or AFS). Present the consistency model selected and how it was achieved through design.
You have to analyzed and discussed case studies and issues on key ethical issues in information technology. Now build your own framework for a code of ethics.
Make a Money data structure which is made up of amount and currency.
Surface Flattening using Discrete Harmonic Map, Morphing, and Texture Mapping.Solve discrete harmonic mapping of a given surface patch (suppose the surface is genus-0 and with one boundary).
Create a SPARC assembly language program that extracts a bit-field from the contents of register %l0. The position of the rightmost bit of the field is indicated in register %l1, and the number of b
Write a function which has an int parameter n, makes an integer mask having the bit 1 at the nth place from the rightmost bit, and returns the mask.
Use the IRIS dataset that comes with Weka to compare classification performance of the following algorithms. Naive Bayes Simple, Multi Layer Perceptron and J48 (C4.5, decision tree induction).
This assignment concentrates on requirements engineering. The perspective to this assignment is the development of a system which helps lecturers with the marking of assignments. Students submit suc