Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
question a name and explian the four essential elements of a machine instructionb provide any four common examples of mnemonicsc the level of
problem 1a give three reasons why connecting peripherals directly to the system bus are not a good practiceb name five categories in which the
a prototype a macro known ap which takes 4 integer parameters n number of terms a first term l last term and sum sum of n terms provided thatsum
a give eight properties for each of static ram sram and dram dynamic ram and provide the low-level structure of each type of memoryb assume a system
a explian two limitations of dead-box analysisb describe why memory analysis is difficultc with reference to the shadow walker rootkit explain what
problema forensic methodology consists of three phases briefly explian these three phasesb sometimes its best not to perform hard-disk
a when a forensic examiner arrives at a crime scene the first task done is referred to as incident response summarize the different incident
problem a what do you meant by a file systemb mention the five categories of data for a basic file system reference model what is the use of such a
problem a distinguish between how ntfs and fat store time describe your answerb unix epoch starts as from january 1 1970 000000 gmt provide that
a name five important activities involved in a digital forensic investigationb briefly describe the three types of data that a forensic examiner
aim this assignment is intended to assess your skills in understanding and interpreting a moderately complex problem designing a solution to the
a explain the following terms information system and information technologyb describe the main components of a computer illustrate your answer by a
question 1we need to write z specifications to record the information about passengers on board an aircraft here you are required to produce the
coding forwhat is the probability that a card drawn from a pack of 52 cards will be a diamond or a king
1the volume of a pyramid is taken from the formula v 13 x area of base x altitude given the dimensions of a pyramid calculate the
what inputcombinations may those hazard take place and how can they be eliminated f1 ab3939 a3939c bc3939d3939 f2 ab a3939c3939d
mobile computing1what is wireless protocol requirements and also explain in brief medium access control protocol2illustrate fdma and tdma
fundamentals of it1explain the impact of information technology on governments and educational organizations2explain application and system
wml amp wml script1how to call a wml script from a wml page2write a brief note on wml script operators and expressions3write brief notes on wml
distributed system1what is a message passing system discuss the desirable features of a message passing system2discuss the implementation of rpc
it management1describe how the it infrastructure is designed2explain briefly the audit planning phase in it audit3explain localized and distributed
fundamentals of it1how do you insert a symbol in a word document2explain absolute cell addressing3discuss custom list4explain applications of
fundamentals of computers1describe the importance of video in multimedia what are some of the tips to keep in mind while making video for the
computer organization amp architecture1what do you mean by digital computer explain the block diagram of a digital computer2what do you mean by
system software1explain language processing explain its activities in detail2discuss briefly about assembler directives also explain about macro