Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Write down the importance of cell loss priority? Write down the advantages of ATM.
Describe all the layers of ATM model in detail? How ATM model is different from OSI model?
Explain how routing is done in ATM networks in detail? Explain how multiplexing is done in ATM networks in detail?
What are the major differences between an access network and a transport network?
When bit stuffing is employed, is it possible for the loss, insertion or modification of a single bit to cause an error not detected by the checksum?
Differentiate between WINNT and WINNT32. What do you mean by SIDs? Explain in detail.
What is the relationship of data warehousing with data integrity? Write down the disadvantages of computerization?
Write brief note on Intelligent Multimedia Systems. Describe the various data models for multimedia and hypermedia information.
What are the virtual reality operating systems? Explain it in detail.What do you mean by orientation tracking in multimedia systems.
Write a detailed note on digital video compression. Also describe MPEG motion video compression. How is it different from JPEG?
Describe the compression technique used in multimedia.
What are neural networks? Compare the feed forward and feed backward strategies used in such kind of networks.
How do rules in prolog differ from general production system rules? Describe the difference between forward and backward chaining and under what conditions each would be best to use for a given set
How is procedural knowledge different from declarative knowledge? Explain the two quantifiers used in predicate calculus and give one example of each.
Consider the sequence of events in Table below. Construct a PERT chart, determining the following (justifying any assumptions made in computing the critical path):
List all five main features of the ‘prototyping’. Illustrate the DSDM life-cycle with an appropriate diagram.
In brief illustrate what are Byte-Level logical operations and Bit-Level logical operations. Determine three ways how to reduce cost in embedded systems.
Name the 3 major approaches to dealing with possible threats, when planning with partially instantiated operators. Describe what is “back-jumping” and “dependency-directed backtracki
Illustrate the term Microprocessor? What is the basic difference between a Microprocessor and CPU?
Specify the control signal and the direction of the data-flow on the data bus in a memory-write operation.
List out all the interrupt signals of the 8085 microprocessor?
Describe the programming model of 8085 µP with the help of appropriate diagram.
List all the four categories of 8085 microprocessor instructions that manipulate the data.
In brief describe the maximum mode configuration of 8086 microprocessor.
What is the basic difference between minimum and maximum modes of the 8086? How are such modes chosen?