Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Draw the fuzzy membership function to explain cold, warm and hot water.
Illustrate the meaning of the hidden and exposed terminals? What happens in the case of such terminals if Aloha, reservation Aloha, slotted Aloha or MACA is employed?
List all the entities of mobile IP and explain data transfer from mobile node to a fixed node and vice-versa. Why and where encapsulation is required?
Describe in brief the functionalities of the Link Manager Protocol (LMP) and service discovery protocol (SDP)
In brief describe the role of CFG in Natural Language Processing. Give an appropriate illustration to describe the concept.
Illustrate the meaning of Alpha-Beta pruning? On what factor the effectiveness of the Alpha-Beta procedure based on?
What can Artificial intelligence systems not do yet? List out any four tasks?
Write down the Floyd Warshall algorithm to resolve the all pairs shortest paths problem on a directed graph.
What do you mean by the term backtracking? Find out a solution to 4-Queens problem by using backtracking strategy. Draw the solution space by using essential bounding function.
Write Counting Sort algorithm. Describe the operation of counting sort on the given array: A = {7, 1, 3, 1, 2, 4, 5, 7, 2, 4, 3}
Why do we employ asymptotic notations in the study of algorithms? In brief explain the generally used asymptotic notations.
Determine the state table for the NFA with state diagram shown below.
Illustrate the difference between a spanning tree and a minimum spanning tree. Apply Prim’s algorithm on the given graph to find out minimum spanning tree.
State the DeMorgan’s laws. Prove it by using the truth table.
Define the term Hamilton path. Find out if the given graph consists of a Hamilton circuit.
With a neat diagram, describe the working of Priority of Interrupt hardware circuit by using Priority encoder. State its merits over Daisy Chaining Method.
What do you mean by the term Macro assembler? Give the similarity and dissimilarity features of the macro and subroutine.
Illustrate the merits of byte addressing over word addressing and what are their demerits?
Illustrate out the different types of security policies. What do you understand by the web security requirements?
Illustrate out the recommended practices of XP. Write down the Benefits and Roles of DSDM? Discuss and illustrate out briefly the tools of open source toolkit.
Discuss and critically illustrate out the steps which are involved in effective cost management. Write down the Characteristics of the term private cloud.
Convert the given binary numbers to 8 bit binary numbers and evaluate by using the 2's complement method. Leave your answers in the binary form.
Describe in detail the Internet addressing and Domain Naming scheme.
Write down the difference between HTML and DHTML. Write down the difference between FTP and HTTP.
Compare the network model and Hierarchical Model for database.