• Q : Give an example of a direct mapped cache scheme....
    Computer Engineering :

    Give an example of a direct mapped cache scheme, where there is a 2^32 word main memory which is divided in blocks of 2^6 words each block.

  • Q : What are the major steps in the execution of instruction....
    Computer Engineering :

    What are the major steps in the execution of instruction? Explain the data path and its associated control, signals for each major steps of instruction execution.

  • Q : Difference between a full client and client less vpn access....
    Computer Engineering :

    Question 1: What type of firewall would you use to protect your organizations perimeter? Question 2: Which type of firewall is better suited to protect against spoof attacks?

  • Q : How many operation can be represented in 6 bits opcode field....
    Computer Engineering :

    Consider 6 bits are used for the opcode field. a) how many different operations can be represented? b) how does mips instruction set provide additional operations in addition to that can be repsented

  • Q : Define the term nic repeater....
    Computer Engineering :

    Define each of the following network communication devices. NIC Repeater, Hub Switch, Bridge, Gateway, Router, Firewall.

  • Q : Write a program of string handling function....
    Computer Engineering :

    Write your own string handling function that takes in two character arrays as arguments and returns (with the return statement) a character array composed of concatenating the two strings arguments

  • Q : Wap that shows a square frame filled with 100 buttons....
    Computer Engineering :

    Write a program that shows a square frame filled with 100 buttons labeled 1 to 100. Nothing needs to happen when you press any of the buttons.Make sure you print out one 100 buttons on your frame.

  • Q : What do you understand from encapsulation....
    Computer Engineering :

    Question 1: What do you understand from encapsulation and how it is incorporated in the code? Question 2: What do you understand from information hiding and how it is incorporated in the code?

  • Q : What is an encryption trapdoor....
    Computer Engineering :

    What is an encryption trapdoor. Is it possible? Is it legal? Is it Ethical? What would you do, should, in your line of duty, discover one?

  • Q : What is a file system portion....
    Computer Engineering :

    Question 1: What is a file system Portion? Question 2: What is the relationship between a portion and a file? Question 3: Why are large portions desired from the file allocation method?

  • Q : Write an application that creates a hashset of 10 integers....
    Computer Engineering :

    Write an application that creates a HashSet of 10 integers. Write a method named removeDuplicates that takes a second HashSet of integers as its argument and ensures that this second set does not co

  • Q : Discuss why javascript is used design to enhance page....
    Computer Engineering :

    Question 1; If businesses used DSS, GDSS, and ESS more widely, would they make better decisions? Why or why not? Question 2: Discuss how using JavaScript in your design will enhance your page, and why

  • Q : Describe indexed allocation with variable-length portions....
    Computer Engineering :

    Question 1: Describe Indexed Allocation with Variable-length Portions. Question 2: What information is maintained in the FAT for Indexed Allocation with Variable-length Portions?

  • Q : Describe indexed allocation with block portions....
    Computer Engineering :

    Question: Describe Indexed Allocation with Block Portions.Question: What information is maintained in the FAT for Indexed Allocation with Block Portions?

  • Q : Describe contiguous file allocation....
    Computer Engineering :

    Question 1: Describe Contiguous File Allocation. Question 2: What are the two disadvantages of contiguous allocation? Question 3: What information is maintained in the FAT for contiguous allocation?

  • Q : What is the relationship between a portion and a file....
    Computer Engineering :

    What is a file system Portion? What is the relationship between a portion and a file? Why are large portions desired from the file allocation method?

  • Q : Describe file descriptors....
    Computer Engineering :

    Question 1: Describe File Descriptors. Question 2: Describe the purpose of the File Allocation Table. Question 3: Describe the purpose of the Unallocated Block List.

  • Q : Write a program for small flight reservation system....
    Computer Engineering :

    Write a program for small Flight Reservation System with following Details. Show Menu with Following options 1 Flight Reservation 2 Boarding pass 3 Exit Menu

  • Q : Describe risk avoidance....
    Computer Engineering :

    Question 1: Describe risk avoidance .please name and briefly explain three common methods of risk avoidance Question 2: Describe management, operational and technical controls ,and explain when each

  • Q : How to create a map with mappoint and excel....
    Computer Engineering :

    Question 1: How to Create a map with MapPoint and Excel? Question 2: Create a view that will list the name of the contact person at each publisher and the person's phone number. Do not include the p

  • Q : How does encryption protect intellectual property....
    Computer Engineering :

    What is intellectual property? Is it afforded the same protection in every country ?what laws currently protect intellectual property in U.S and Europe ?

  • Q : What must an attacker do for a sniffer attack to succeed....
    Computer Engineering :

    What must an attacker do for a sniffer attack to succeed?what protocols are vulnerable to such attacks what counter measures should you place on your networked infrastructure to mitigate such attack

  • Q : Describe some useful applications for n-dimensional arrays....
    Computer Engineering :

    What are at least 2 ways to prevent out of bounds errors when reading input into C-strings? Discuss some useful applications for n-dimensional arrays, such as graphical 3-D or biotechnology applicati

  • Q : Discuss the importance of studying social graphs....
    Computer Engineering :

    Discuss the importance of studying Social Graphs and how can they be used to better understand and process social relationships.

  • Q : What are the privacy issues with data mining....
    Computer Engineering :

    Question 1: What are the privacy issues with data mining? Do you think they are substantial? Question 2: Suppose you wanted to implement a control unit for a computer that you are designing. Would y

©TutorsGlobe All rights reserved 2022-2023.