• Q : Describe requirement analysis phase....
    Computer Engineering :

    You have made it through the Problem Analysis phase and now beginning  Requirement Analysis phase. During the first meeting on the business requiremen

  • Q : What is the difference between contention and polling....
    Computer Engineering :

    What is the difference between contention and polling? Please list in terms of advantages and disadvantages? What is BFS and DFS.

  • Q : Define at least five different types of storage devices....
    Computer Engineering :

    Using the Internet, list and define at least five different types of storage devices from the most reliable to the least reliable. Include in your search cost and availability of the storage devices

  • Q : Write a program to convert miles to kilometers....
    Computer Engineering :

    Question 1- Write a ‘C' program to convert miles to kilometers. (Recall that 1 mile = 1.6 km). Also draw its flowchart. Question 2- Write a class that will be used by a program driver to enter

  • Q : Describe database table normalization....
    Computer Engineering :

    Discuss how each of the following software engineering techniques, technologies, and methodologies deal with the challenges of complexity and change Part 1- Model-view-controller architecture (MVC)

  • Q : Describe model view controller architecture....
    Computer Engineering :

    Question- Briefly discuss how each of the following software engineering techniques, technologies, and methodologies deal with the challenges of complexity and change. Part 1- Model View Controller

  • Q : Write a program that tests your esp....
    Computer Engineering :

    Write a program that tests your ESP (extrasensory perception). The program should randomly select the name of a color from the following list of words: Red, Green, Blue, Orange, Yellow

  • Q : What is minimum required frequency of continuous time system....
    Computer Engineering :

    Question- A continuous time system, described by y(t) = 10 Cos (2*pi*500*t) + 2 Sin (2pi*250*t) Part 1- What is the minimum required sampling frequency?  Part 2- Write the mathematical expressio

  • Q : Describe udp and tcp ip protocol....
    Computer Engineering :

    Question 1- Which utility would you use to test the internal configuration of TCP/IP on a computer? Hint: It is typically a reserved address. Question 2- Describe UDP and TCP/IP protocol.

  • Q : Describe hexadecimal format for a number....
    Computer Engineering :

    Write the values in $t0 for each code line in the 8-digit hexadecimal format (fill in 0s properly to make an 8-digits hexadecimal presentation).

  • Q : Write a driver program to test the functionality of classes....
    Computer Engineering :

    Write a driver program to test the functionality of created classes. The driver program should create a Hospital object and a number of patients using dynamic memory allocation.

  • Q : Describe when the system get deadlock-free....
    Computer Engineering :

    Consider a system consisting of 4 resources of the same type that are shared by 3 processes, each of which needs at most two recourses. Show that the system is deadlock-free.

  • Q : Write an algorithm to produce minheap....
    Computer Engineering :

    Question 1- Write an algorithm to produce minheap. Show how you can sort your array using minheap with decreasing order. Question 2- Describe binary search tree algorithm.

  • Q : Draw the scheme node representation of a list....
    Computer Engineering :

    Question: Part 1- Draw the Scheme node representation of list2. What are the values of the following Scheme expressions? Part 2- (cons ‘e ( cdr ( car lst2)))

  • Q : Describe circular doubly-linked list....
    Computer Engineering :

    Write java code to implement a deque with a header as a circular doubly-linked list. Include code for Nodes. Include all relevent methods.

  • Q : Design a eighat bit array multiplier....
    Computer Engineering :

    Design a 8-bit array multiplier. Make sure also that your design has an asynchronous reset. (Include VHDL code, Test Bench and logic schematic).

  • Q : Write an application that allows you to enter any first name....
    Computer Engineering :

    Write an application that allows you to enter any first name and displays all the ID numbers and last names for any records stored in the employee file with the given first name. Display an appropri

  • Q : Describe full adder with circuit diagram....
    Computer Engineering :

    Question 1- Deisgn a 4 bit 2's complement subtractor circuit. It has four inputs (A,B,D,D3[2..0]). And two outputs which are F and G. Question 2- Describe full adder with circuit diagram.

  • Q : What are the two main types intrusion detection systems....
    Computer Engineering :

    Network Intrusion Detection Systems: Question 1- What are the two main types (classes) of intrusion detection systems (IDS's)? Question 2- Describe how they work.

  • Q : Describe main entities or objects of the business function....
    Computer Engineering :

    Describe the main entities or objects of the business function / operation. Specify the attribute that would be the primary key for each entity, and provide a rationale for why you selected such an

  • Q : Explain the key manner in which the business function....
    Computer Engineering :

    Explain the key manner in which the business function / operation and the business rules associated with that business function / operation support the relationships mentioned above. Also, explain t

  • Q : Describe what is recurrence tree....
    Computer Engineering :

    Given the recurrence T(n) = 3T(2n/3) + n, and T(1) = 1, draw a recurrence tree to estimate an upper bound for T(n).

  • Q : Draw hierarchy chart and design for housecleaning service....
    Computer Engineering :

    Draw the hierarchy chart and design the logic for a program that calculates service charges for Hazel's Housecleaning service. The program contains housekeeping detail loop, and end-of-job modules.

  • Q : What are personal and organizational issues of it....
    Computer Engineering :

    What are personal,legal ethical and organizational issues of informational Issues of information systems.

  • Q : Define three users of a public key cryptosystem....
    Computer Engineering :

    Question 1- List and briefly define three users of a public key cryptosystem. Question 2- What is the difference between a private key and a secret key?

©TutorsGlobe All rights reserved 2022-2023.