Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
question 1a define artificial intelligenceb briefly describe the categories for the definition of artificial intelligencec identify the four basic
question 1a how are ipv4 addresses transformed into ipv6 addresses using ipv4 compatible addressesb name some of the simplifications that were
questiona in css each element in a document is considered to be in an invisible box give three ways how to make the box visibleb i explain the
questiona list the seven layers of the iso-osi model and briefly describe the role of each layerb describe the functions of the following
questiona how is an intranet different from an internetb state the main differences between a router and a switchc explain the function of a modemd
question there are generally five factors that will influence how you respond to computer security incidents-the effect the incident has on your
questiona national regulations require the availability of the following services for all ip to pstn pstn to ip and ip to ip calls name any three
questiona what are the problems with ipv4 on todays internet and how does ipv6 solve these problemsb describe at least three ways in which ipv6 is
which of the following commands will display the current print jobs on a printer named office printer
questiona hashing and salting is commonly used as password storage techniques for most applications describe how hashing and salting enable secure
questiona compare and contrast phishing and pharming attacksb nowadays web defacement may not always be visuali explain web defacementii what is the
questiona discuss why it is considered more secure to use the set secure electronic transaction for e-commerce instead of using sslb describe how the
questiona consider the following authentication optionsa using passwordb using pin and fingerprintwhich option a or b provides stronger security and
questiona which pki public key infrastructure model is typically favored by business organizationb give one possible use of the extensions field of
questiona describe the two possible configurations for 3desb what is the main disadvantage of 3desc why are most modern symmetric algorithm block
questiona i describe phishing attacksii distinguish between phishing and spear phishing attacksb describe two instances where an attacker sniffing on
questiona briefly describe three security requirements of an agentb list four threats that may be caused by malicious hosts to mobile agentsc
questiona briefly describe thedirect coordination model and themeeting oriented coordination modelb what does jade stands forc name the three special
questiona concerning agents that reduce workload there are four agents developed using a learning approach among which is the news filtering agent
questiona name two properties of an agentb list the three characteristics used to classify agents according to the nwana taxonomyc agent environments
questiona define what is a software agentb an intelligent agent is known to exhibit several characteristics or properties that distinguish it from
question1 discuss on the characteristics of agents2 belief desire and intention architecture is the most popular agent architecture procedural
question1 using a flowchart and appropriate annotations describe the execution path of an agent in jade2 write down code snippets for the following
question1 the speech act theory is used as the model for communication among computational agents locution illocution and perlocution are the 3
question1 contract net protocol is the best known and most widely used cooperation protocolexplain how contract net worksdiscuss the benefits and