Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Examine the contemporary options that are available to keep data centers and computing devices from overheating.
Discuss the manner in which Google Glass and its related technologies may be used by organizations in the coming years.
Examine the common tools that hackers use to hack into memory of computing devices. Detail two real-life examples of such tools in action.
Do you think the bank uses the same Frame Relay network to connect its branches as it uses to connect to its credit card processing center?
How are Pentium chips manufactured? Discuss how registers are used in CPU design.
Use the function call system ("cls") or system (clear") so that the screan is clear on the begining of the program.
Some computers need to have large numbers of RS-232 lines (e.g. servers or Internet providers). For this reason, plug-in cards with multiple RS-232 .
Explain the concept of "mental model" and say how this concept relates to Card, Moran and Newell's "Model Human Processor".
Go back 15 years from today to discover what operating system advances were taking place.
Why is one not sufficient Intrusion detection systems, or IDSs, have become an important component in the Security Officer's toolbox.
White et al. (2007) discuss a number of ways that database systems experts can help computer game designers.
Based on the Shacham et al. (2007) article, what are the advantages of using optical (photonic) communications in future chip multiprocessors (CMP)?
Explain how the components are related to each other. For example, does the component you are describing depend on another to operate?
Based on the Greiner article why is the static HTML page becoming progressively less relevant as we progress to an interactive web world?
Research the internet for information on the topic and provide a 1/2 page to one page brief essay explaining.
Using the layers of the OSI model as a reference, explain and diagram how repeaters, hubs, bridges, switches, routers, and gateways function.
Applications of Microprocessor Based Systems. Investigate 3 typical applications of microprocessor based systems.
Explain the steps that an operating system goes through when the CPU receives an interrupt.
Timer alerts processor for a status scan of I/O device every 20 ms. I/O device interface has two 8-bit ports: status and data output.
Assume a stack-oriented processor that includes the stack operations PUSH and POP.
Explain how VB .NET uses a database. Briefly summarize the components of a database and the characteristics of a DBMS.
What can be done to make the data in these multimedia files more manageable, queryable, reportable and analyzable?
Discuss the role of each of the following server types on a LAN and the type of software licensing with which the software should be purchased.
What is a privileged instruction and why are they necessary? When can a privileged instruction be executed? Give an example of such an instruction.
Occasionally after upgrading firmware, the antennas in your wireless network need to be adjusted.