Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
give explanation about the use of ssl to secure the networkssl stands for secure sockets layer is a protocol developed through netscape for
how many methods used to control traffic flowing into and out of the network by firewallfirewalls utilize one or more of three ways to control
describe briefly how firewalls prevent network a firewall is only a program or hardware device which filters the information coming via the internet
what is the functionality of remote loginremote login gives similar functionality of telnet along with the added functionality of not involving a
what is interference of light explain the nessicity of coharent source for obtaining sustain interference
what is software interrupt a software interrupt is initiated by implementing an instruction software interrupt is a special call
what is a microinstructioneach word in control memory having within it a microinstruction the microinstruction specifies one or more
explain auto increment and auto decrement mode the register is incremented or decremented after or before its value is used to access memory
what is instruction cyclea program residing in the memory unit of the computer having of a sequence of instructions the program is implemented in
explain the difference between a subroutine amp macroit is inefficient to have to write code for standard routines for instance reading a
what is software and hardware interruptthe software interrupts are program instructions these instructions are inserted at desired location in a
what is micro operationa micro operation is an elementary operation performed with the data kept in registers 1 register transfer microoperation
explain the significance of different fields of an instructionan instruction is a command given to a computer to perform a particular operation on
explain about flip-flops flip-flops are also called bistable multivibrator a flip-flop is capable of storing 1 bit of binary data it has
what is fish bone diagram or explain ishikawa diagram fish bone diagram is also known as ishikawa diagram or cause and effect diagramit is known as
what is monkey testing the monkey testing is the process of testing here and there for judging the application trying to observe the accessing
determine the quivalence partitioningthe division of domain data into dissimilar equivalence data classes is performed using equivalence partitioning
what do you do if you have given functionality that wasnt listed in the requirements- if the functionality isnt essential to the purpose of the
when should you stop testingit is quite complex to determine as many modern software applications are so complex and run in like an interdependent
differentiate between exception and validation testing- validation testing is done to test the software in conformance to the needs specified it aims
differentiate between qa and testing- quality assurance is more a stop thing ensuring quality in the company and thus the product rather than just
external interrupt interrupt signal came from input-output devices connected external to processor these interrupts depend on external conditions
address symbol table is generated by the a memory management software b assembler c match logic of associative memory d generated by
zero address instruction format is used for a risc architecture b cisc architecture c von-neuman architecture d
stack overflow causes a hardware interrupt b external interrupt c internal interrupt d software interruptstack overflow occurs