Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Indicate which project you would recommend based on NPV alone, then IRR alone, and then overall which project is best for the company to pursue.
Conduct some preliminary research to identify an example of the technology use in a specific industrial domain from those provided above.
Some viruses begin with Trojan indicating that they are a Trojan Horse. What things do you suspect about the top five viruses just based on their names?
Create a new app with Core Data. You will be storing pizza details, name, size (small or large) and price in a suitable table then displaying on another screen.
List the customer last name and the total order amount during the first half of 2030, sorted by the total order amount descending.
Is the tool selected used for active or passive reconnaissance? Why do security professionals need to be aware of how these 4 tools are used?
The box office has an address and a phone number. The Internet has a URL address. Draw the entities and represent the mutually exclusive relationship.
Given John likes movies {M1, M2, M3, M4} and Jim likes the movies {M1, M3, M5}. What is the Dice's coefficient representing the similarity between these two?
Write down the set of eigenvectors and eigenvalues. Comment on your result and are they consistent with what you learnt in class?
Describe the changes Europe experienced during the Renaissance in relationship to trade and navigation and how those advances led to voyages to America.
Discuss ways in which you think Desktop as a Service might be beneficial. Discuss ways in which your organization might use Internet of Things technologies.
How can you determine which type of query to use? What are the differences between Boolean retrieval, wildcard queries, and phrase queries?
What if you remove the random-surfer component? Will it converge faster? Slower? Not at all? Feel free to implement these and see what happens.
The IEEE-CS jointly adopted a code of ethics for software engineers. Why are ethics important in the engineering profession?
Why would you want to be able to sort and filter your data? When could conditional formatting help you to understand your data better?
Describe some of the most common forms of digital crime. What gaps exist in our understanding of digital crime? What can be done to address these gaps?
ABC is newly founded company that provides data analytics solution. List each type of hardware component needed, their specific purpose and required quantities.
How personal information will be kept safe and secure from unauthorised access, modification or disclosure, misuse, and loss.
In your educated opinion, pick 4 of them that can be considered as nice designs, and find 1 which has a bad or ambiguous design.
Colour is a key component in data visualisation. List key factors when utilising colours to represent the quantitative data.
Create an application that displays text from a file in an editable window. The user interface should have a menu to open a file and save a file.
How many 1-digit multiplications did you perform? How many 1-digit multiplications would regular elementary school multiplication use?
Why a recursive computation of the nth Fibonacci number has exponential complexity but a recursive implementation of n! Does not.
Write a RAM program to read n = 5 positive integers and print them. What is the uniform cost time and space complexity of your RAM program in terms on n?
Write pseudocode for a simple algorithm for addition of two n-digit numbers (one of them could be < n digits with 0's appended to left) in base-10, as follows.