• Q : Values of a two-card blackjack hands....
    Computer Engineering :

    Write down a C program function which takes the values of a two-card blackjack hands as input, and returns the point total of the hand.

  • Q : Formulate a plan for a regional drive-in restaurant chain....
    Computer Engineering :

    Based on the examples in the text, if you were asked to formulate a plan for a regional drive-in restaurant chain's efforts to use information technology to attract customers, what would be the best

  • Q : Internet faces a potential risk of attack....
    Computer Engineering :

    Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack.

  • Q : Find an article or website about website security....
    Computer Engineering :

    By using various Internet sources, find an article or website regarding website security. Show your personal content mastery by preparing a 600-800 word paper which gives analysis on the usefulness,

  • Q : Cell reference and an absolute cell reference....
    Computer Engineering :

    Illustrate the difference between a relative cell reference and an absolute cell reference? When would you make a reference absolute? Give an illustration of when you would use an absolute cell refer

  • Q : Computer-based information systems....
    Computer Engineering :

    Define the word computer-based information systems. In your definition, describe three types of information systems, the audience or level of management served by each, and how the systems benefit th

  • Q : Describe how this storage space works....
    Computer Engineering :

    Explain how this storage space works, where it is located in the computer and how the speed compares with other kinds of storage such as the RAM or hard drive.

  • Q : Participating on social networking sites....
    Computer Engineering :

    What do you mean by social networking? Define at least two of the privacy issues related to participating on social networking sites? For each issue, explain a real example of how this might happen.

  • Q : Potential consequences for a company....
    Computer Engineering :

    What are the potential consequences for a company which has data that is not secure? Do some research and explain some significant database security breaches which have occurred in the last 10 years

  • Q : Potential consequences for a company....
    Computer Engineering :

    What are the potential consequences for a company which has data that is not secure? Do some research and explain some significant database security breaches which have occurred in the last 10 years

  • Q : Compare cloud computing with grid computing....
    Computer Engineering :

    Locate information regarding cloud computing and compare cloud computing with grid computing. In what ways are they similar? How do they distinct?

  • Q : Advantages of flash memory over hard disk storage....
    Computer Engineering :

    What are the merits of flash memory over hard disk storage? What are the merits of hard disk over flash memory storage? What are the merits of both hard disk and flash memory storage over RAM?

  • Q : Important to maximize the efficiency of the input-output....
    Computer Engineering :

    To use a computer for multimedia (video and sound), it is significant to maximize the efficiency of the I/O. Suppose that the blocks of a movie are stored consecutively on a DVD-ROM.

  • Q : Common methods of system interaction....
    Computer Engineering :

    For the three common methods of system interaction --command language, menus, and objects-- recall a software package which you have used recently and list what you liked and disliked regarding the

  • Q : Types of ethical issues and information security issues....
    Computer Engineering :

    What kinds of ethical issues and information security issues are common in the organizations?

  • Q : Mutually suspicious parties authentication....
    Computer Engineering :

    Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol must be usable the first time these parties try to authenticate each other.

  • Q : Develop a risk-management policy....
    Computer Engineering :

    Your job is to made a risk-management policy which addresses the two security breaches and how to mitigate these risks.

  • Q : Constraints in a linear programming model....
    Computer Engineering :

    Under what conditions is the objective function more significant than the constraints in a linear programming model? Under what circumstances are the constraints more important than the objective fu

  • Q : Program that declares three arrays....
    Computer Engineering :

    Write down a program which declares three arrays: one to hold the names of five products, the second to hold the prices of each of the products and the third to hold the quantity of each of the prod

  • Q : Program calculates and displays the number of miles....
    Computer Engineering :

    Design a program which computes and displays the number of miles per hour over the speed limit that a speeding driver was doing. The program must ask for the speed limit and the driver's speed. Valid

  • Q : Design a program that asks for the number of fat grams....
    Computer Engineering :

    Design a program which asks for the number of fat grams and calories in a food item. Validate the input as follows:

  • Q : Amount of income generated from ticket sales....
    Computer Engineering :

    Design a program which asks for the number of tickets sold in each and every section and then displays the amount of income produced from ticket sales.

  • Q : Design a payroll program....
    Computer Engineering :

    Design a payroll program which prompts the user to enter an emplooyee's hourly pay rate and the number pf hours worked.

  • Q : Object-oriented model for a new registration system....
    Computer Engineering :

    The administration has asked you, as IT manager, to prepare an object-oriented model for a new registration system.

  • Q : Develop an object-oriented model for a new bookstore....
    Computer Engineering :

    The bookstore wants you to make an object-oriented model for a new bookstore information management system.

©TutorsGlobe All rights reserved 2022-2023.