Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What is meant by the shared secret key? Describe the IPsec authentication header format.
Write in detail about different tools for editing audio. Write in detail about RTF format and TIFF file format.
Describe the organization and architecture of the 8255 IC with the use of functional block diagram. Illustrate the different modes of the operation of 8255 and its control word.
What do you understand by software interrupt and hardware interrupt? Illustrate out the differentiation between segmented register and General purpose register.
Illustrate PAM modulation and demodulation with the use of neat diagram. With the use of neat diagram describe TDM and FDM multiplexing.
Compare Ratio detector and Foster Seely discriminator. Illustrate out the term cross talk? How will you eliminate crosstalk?
Provide the application of the MUX-DEMUX combination. Write down the main drawbacks of the dynamic RAM compared to static RAM?
Describe the algorithm for addition and subtraction of floating point numbers in detail.
Design the flowchart for four-segment instruction pipeline.
Explain the benefits of generative process planning.
State few commercial modelling types of software and also describe some of its major applications
Describe how are plugins designed for web applications?
Discuss about creation of the charts in MS-Excel. Write down the commands to display records in the Foxpro & discuss with their options.
Write down the components of Spreadsheet. Write down the steps which insert a new column and new row in Spreadsheet.
Differentiate between the System maintenance and enhancement.
Describe the differences between the White-box and Black-box testing.
There are two ways of the debugging program software: bottom-up and top-down. Explain how do they vary?
Describe the addressing modes of 8085 with some of the examples. Explain the programming model of 8085 µp with neat diagram.
What makes up a system performance definition? Describe the steps to make the definition.
Describe the merits being offered by the data dictionary in documentation area.
For what purpose would one use an interview instead of the data collection methods? Describe.
Where are brain storming and Delphi methods employed? Describe.
Differentiate between the initial investigation and feasibility study. In what manner are they related?
Describe the primary features of open systems. In what way is a system entropic?
Describe the working of the synchronous and Asynchronous Counter with the help of state diagram.