• Q : Explain erm model for school information system....
    Computer Engineering :

    If we want to connect two Ethernet LANs with 10-Mbps data rates, how many T-1 lines do we need? Do we need multiplexers or inverse multiplexers? Show the configuration

  • Q : How to refresh pivot table on protected sheet....
    Computer Engineering :

    Question 1: How to refresh Pivot table on protected sheet? Question 2: How does dynamic programming make an inefficient recursive algorithm more efficient?

  • Q : How to write a pgm out to a text file....
    Computer Engineering :

    Write a C++ program that writes a PGM out to a text file. Make your image 40 columns by 20 rows. Set the maxval to 255. Let each pixel be 4 more than the previous pixel; let each row be 10 more than t

  • Q : Describe difference between link and end-to-end encryption....
    Computer Engineering :

    Question 1: What is the difference between link and end-to-end encryption? Question 2: List ways in which secret keys can be distributed to two communicating parties.

  • Q : Explain two general approaches to attacking a cipher....
    Computer Engineering :

    Question 1: What are the two general approaches to attacking a cipher? Question 2: Why is the middle portion of 3DES a decryption rather than an encryption?

  • Q : Describe the ecb mode....
    Computer Engineering :

    With the ECB mode, if there is an error in a block of the transmitted cipher text, only the corresporrding plaintext block is affected. However, in the CBC mode, this error propagates.

  • Q : Describe about pipelines....
    Computer Engineering :

    iven a pipeline, A, of five stages, where each stage takes time t, produce a new pipeline, B, by dividing the third stage into two stages such that each stage takes time t/2. How long will it take for

  • Q : Print a simple loan payment table for 12 months....
    Computer Engineering :

    Print a simple loan payment table for 12 months showing two columns: the month number and the remaining balance at the end of the month after payment. The initial loan will be $1000 and the payment wi

  • Q : Explain how to create the package....
    Computer Engineering :

    Question 1: Create a package cs2302. The class files Point.java and Line.java must be in the package. Question 2: Create the package cs2302 testing. The test file Tests.java must be in the package.

  • Q : Create an f stream to a binary file....
    Computer Engineering :

    Create an fstream to a binary file that you can both write to and read from. Write 5 objects of your class to your binary file. Then see if you can read them all back in order and print them to the sc

  • Q : Write a program in c that lets a user manipulate bits....
    Computer Engineering :

    Write a program in C that lets a user manipulate bits individually in a 4-byte variable. The program should begin with all bits having a value of zero. The program should enter a loop where it prints

  • Q : Describe how the k-mapping is done....
    Computer Engineering :

    Design a circuit with output f and inputs x1, x0, y1, and y0. Let X=x1x0 and Y=y1y0 represent two 2-digit binary numbers. The output f should be 1 if the numbers represented by X and Y by X and Y are

  • Q : How to add a cgi interface to the cipher....
    Computer Engineering :

    Question 1: Implement both encryption AND decryption of the Viennese cipher with 26 English letters and 1 space character "_" in its tableau. You may use any major programming languages. Question 2: A

  • Q : Write a program that generates all prime numbers....
    Computer Engineering :

    Write a program that generates all prime numbers between 2 and 1000, using the Sieve of Eratosthenes method. You can find many articles that describe the method for finding primes in this manner on th

  • Q : Write an algorithm that will prompt a user for three numbers....
    Computer Engineering :

    Design an algorithm and accompanying pseudo code that will prompt a user for three numbers, accept that input, and sort it into ascending sequence, and then output the values to the screen.  

  • Q : Explain the advantage of one data structure over the other....
    Computer Engineering :

    Question 1: Calculate the memory requirements of the two data structures. Question 2: Hence explain the advantage of one data structure over the other.

  • Q : Write a program of linked-list which has an integer field....
    Computer Engineering :

     A program is maintaining two data structures (a) A linked-list which has an integer field and (b) An array of integers. The same numbers appear in ascending order in both data structures.

  • Q : Write a recursive definition for integer division....
    Computer Engineering :

     Write a recursive definition for integer division. Then write a recursive method for division that accepts two integers and returns their integer quotient.

  • Q : What is genetic algorithm....
    Computer Engineering :

    Draw the hierarchy chart and design the logic for a program that calculates service charges for Hazel’s Housecleaning service. The program contains housekeeping detail loop, and end-of-job modul

  • Q : Describe characteristic of programming languages....
    Computer Engineering :

    One characteristic of programming languages that varies widely from language to language is how parameters are passed. Among ALGOL, Pascal, Ada, C, C++, Java, and C#, no two languages pass parameters

  • Q : How to create a function to change a formula....
    Computer Engineering :

     Can anyone explain if it's possible to create a function to change a formula with the following idea. for example: You have a complex formula and want to change the "= formula" by "=(formula)" s

  • Q : Write a class in java computing onlinestudent....
    Computer Engineering :

    Question 1: What layer does mac, ssh, or 802.5, work at? like is it the internet layer or network interface layer of the tcp/ip model not the osi layers?

  • Q : Describe encoding and decoding....
    Computer Engineering :

    What would be the encoding of this instruction: nor $t3, $s5, $t1? Write your answer as an 8-hexdigit integer, e.g., 0x12345678, and for full credit explain how your answer was obtained.

  • Q : Define a function pyramidvolume with double parameters....
    Computer Engineering :

    Define a function PyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base.

  • Q : Describe the two state process model and its limitations....
    Computer Engineering :

    Question 1: Describe the two state process model and its limitations. Question 2: Describe the 5 state process model. Why is it advantageous to have multiple queues for blocked states? Why do we nee

©TutorsGlobe All rights reserved 2022-2023.