Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
describe in proper details about osi model explain the functions and protocols and services of each
describe in details about applications of computer
define in details about computer networks discuss a variety of types of networks topologies in computer network also discuss a variety of costs and
questiona explain the issue associated with vertices when the scan line scan line polygon fill algorithm is being appliedb explain the logic of
questiona by making use of an example explain the cohen-sutherland line clipping algorithmb compare and contrast between the cmy and rgb colour
questiona what do you understand by the following terms related to lcdsreflective lcds backlit lcds b by using an example explain the main steps of
a statistical encoding algorithm is being considered for the transmission of a large number of long text files over a public network part of the file
questiona suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth w 42 mhz in each
questiona differentiate between lsquogross settlement and lsquomultilateral net settlement providing suitable examples where necessary to support
question 1a differentiate between symmetric and asymmetric encryption systemb describe how a digital signature is createdc explain briefly what ssl
questiona explain what you understand by the term brute force attack giving an example of such an attackb briefly outline the concept of caesar
questiona what do you meant by the term lsquolan how is a lan different from a wanb explain three types of cables which are commonly used with lansc
questiona outline the concept of the real time gross settlement rtgs system in mauritius and name the three main system components of the macssb
questiona i describe the entire process of credit card processing identifying the different steps and parties involvedii what are the roles of the
questiona differentiate between the following key terms used in any e-banking security systemi authorisation vs authentication ii data integrity
question a how do you relate the subsequent terms in the context of an information system data information and decision-makingb why do you think
questiona describe the importance of backups and the use of antivirus softwareb with the help of an example illustration explain the term
question 1a in the context of an information system distinguish and relate among the terms data information and decision-makingb describe at
question 1lsquothere is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data
question 1describe the following terms in your own words a internet b www c intranet
questiona the cpio utility has three operating modes what are theyb the characters of the permission string are broken up into three groups of
questiona briefly describe how the file system is organized in unixb what is the importance of the touch command give one of its disadvantagec
questiona what is a linux shellb prepare the commands for the following tasks i change the working directory ii show the working directory iii
question a give three examples of vulnerable services which are among the overwhelming majority of successful attacksb name the five outside
questiona one of the most important duties of a system administrator is to protect the information that is stored on network servers in the same