• Q : Write a program to store characters in array....
    Computer Engineering :

    Write a program that sends 1000 characters of data stored in an array from the DB-12 board to the PC every minute via the SCI1 port. Use RTI interrupts to keep time.

  • Q : Describe rsa algorithm....
    Computer Engineering :

    Part a-Suppose the primes p and q used in the RSA algorithm are consecutive primes. How would you factor n = pq?

  • Q : Describe the purpose and value to using formulas in report....
    Computer Engineering :

    Describe the purpose and value to using formulas and functions in reports? (We are using SAP Crystal Reports 2013 for creating reports.)

  • Q : What is data abstraction....
    Computer Engineering :

    Question 1- What is database "mining" and why is it so important to do it with efficiency? Question 2- What is Data Abstraction?

  • Q : Design counter with a count sequence based on your id number....
    Computer Engineering :

    Design a counter with a count sequence based on your ID number as follows: write down your student ID, append two 9's and then append your ID with each digit incremented modulo 10.

  • Q : Describe similarity between constructors and destructors....
    Computer Engineering :

    Which of the following is not a similarity between constructors and destructors? a. Both can be called automatically. b. Both have the same name as the class. c. Both have no return type. d. Both can

  • Q : What happens to every default constructor....
    Computer Engineering :

    Every default constructor . a. is automatically created b. sets a default value for every field in a class c. requires no parameters d. is the only constructor that is explicitly written in a cl

  • Q : What automatically created method is called....
    Computer Engineering :

    When you instantiate an object, the automatically created method that is called is a(n) . a. creator b. initiator  c. architect d. constructor

  • Q : Write a class called number to reverse an unsigned integer....
    Computer Engineering :

    Write a class called number to reverse an unsigned integer.For example,5678 should be written as 8765 Write the program by using only while statement and rewrite by using only for statement and rewr

  • Q : Describe overflow and underflow of the integers....
    Computer Engineering :

    Assume A=216 and B=255 are unsigned 8-bit decimal integers. Calculate A - B. Is there overflow, underflow, or neither? Why?

  • Q : Write a function that accepts a string command....
    Computer Engineering :

    Write a function that accepts a string (command plus parameters) and returns the following: a) Command  b) Number of parameters c) Parameters

  • Q : Write a program that tests your esp....
    Computer Engineering :

    Write a program that tests your ESP (extrasensory perception). The program should randomly select the name of a color from the following list of words: Red, Green, Orange, Yellow

  • Q : Write a program in pseudocode for largest number....
    Computer Engineering :

    Write a program in pseudocode that will read in five positive integers (one at a time) and print out the largest and smallest number of the five numbers. The program should read the numbers one at a

  • Q : Describe about increment operator....
    Computer Engineering :

    What will the following code display?  int number = 6; number++; cout << number << endl;

  • Q : Write a program for floating point number....
    Computer Engineering :

    Question- Write a fragment of code to: Part 1- Input a floating point number.  Part 2- Use if statements to print an error if it above 100 or below 0.

  • Q : Draw the circuit using the smallest mux....
    Computer Engineering :

    Question 1- Design and draw a circuit implementing this system using 2-input XOR gates. Question 2- Design and draw the circuit using a decoder with AND, OR, NOT gates. Implement your design using a

  • Q : Describe newton method to solve the problem....
    Computer Engineering :

    Use Newton's Method by hand to find the only real root the function f(x)= x3+4x2+7 correct to 3 decimal points. Use the fzero function in MATLAB to verify your answer.

  • Q : Describe the term pgp....
    Computer Engineering :

    Suppose you had a time machine and you could go back to January 1, 1991, and talk to Phil Zimmerman. At this time Phil was planning to release PGP, but PGP was not yet readyfor public consumption.

  • Q : How do you feel about spyware....
    Computer Engineering :

    How do you feel about spyware? Do you think this is a fundamentally unfair business practice, or do you think it's the consumer's responsibility to researach software using resources like SpyChecke

  • Q : Why should you never specify a bitmap file....
    Computer Engineering :

    Question 1- What text type selection reproduces text exactly as it is typed, preserving all white spaces and blank lines? Question 2- Explain the difference between a "404 Not Found" error and an "acc

  • Q : Difference between weak encryption and strong encryption....
    Computer Engineering :

    Question 1- What is the difference between weak encryption and strong encryption? Why does the dividing line between them change over time? Question 2- Which two file extensions tell a Web browser

  • Q : What is a certificate authority....
    Computer Engineering :

    Question 1- Explain how the web of trust works to solve the problem of key authentication. Question 2- What is a certificate authority (CA)? Explain why a system of CAs is better than the web of tr

  • Q : How hash codes are used to protect passwords....
    Computer Engineering :

    Question 1- Explain how hash codes are used to protect passwords and passphrases. Question 2- Explain how a man-in-the-middle attack works. Is it possbile to set up a man-in-the-middle attack witho

  • Q : Explain difference between private and public key encryption....
    Computer Engineering :

    Question 1- What types of companies are likely to ignore industry guidelines when an industry is self-regulating? Question 2- Explain the difference between private-key and public key encryption. I

  • Q : What is one-click shopping....
    Computer Engineering :

    What three things should you look for when you examine a site certificate? What is one-click shopping? Where is personal information stored for one-click shopping.

©TutorsGlobe All rights reserved 2022-2023.