counts the consonants in a string.

The network cable corresponds to which layer of the OSI

P?Q, Q?¬P, P<->R, R?¬Q use truth table to see if consisent

Write a c++ function that counts the consonants in a string.

The network cable corresponds to which layer of the OSI model?

The movement from one slide to another slide is known as

What is the osi model? And what are their different types?

Make a flowchart and pseudocode for a selection sort greedy technique.

How do I implement reading from files by using C language?

Discuss the differences between a weak relationship and a strong relationship.

How to add the email validation using only one SQL query?

What are some of the different techniques for documenting data flows?

2.Explain any two features that can add intelligence to a hub

Define: 1) Machine language: 3) The TPA: 4) The I/O devices:

Describe the properties and methods of the Command Object in detail.

Transcribed Image Text: Define: Simple Path, Rooted tree,
Augmented matrix
??????

Which of the following is the limitation of an IPv4 packets?

Fill in the blanks: Q. Expansion of NID in networking is_____________.

What causes a virus to propagate over a company’s computer network?

Explanation and examples of the software structure review procedure are provided.

What is an augmented pattern vector and why is it used.

1.Discuss FOUR (4) advantages of honeypots compared to other security solutions.

Identify two different types of ports that a keyboard may utilize.

Write a logical shift instruction that divides EAX’s contents by 16

The completion of one full pattern is called a  Cycle why?

Explanation and examples of the software structure review procedure are provided.

What technique do you use to show an enumerator’s string value?

The packets of data that is transported by IP is called

Short questions: Q. 5 kbps is equals to how many Bps?

1. Why is scope creep so common in information system design?

Transcribed Image Text: Which memory management technique is best,
and why?

What exactly is the difference between “data mining” and “OLAP” technology?

What are three issues that are causing problems for web-based applications?

What is Software Testing Life Cycle (STLC)? What are its pahses?

The ISO standard for computer Graphics is Graphics Kernel System why?

What are the potential benefits of autonomous computing in the cloud?

Implement the given SOP using NAND Gate AB + B’CD+ A’C

A 16-bit signed integer variable is created by which data directive?

Which Property Is Used To Align The Text Of A Document?

The way multiprocessor systems interact may be used to classify them.

What are the three fundamental features of an object oriented language?

Why is a class in computer forensics important to your career?

DATA MINING 2. Mention all kinds of attribute in a data!

A routing protocol’s reliability and priority are rated by  measurement _______.

Explain what is meant microsoft one drive in cloud storage ?

How to use a computer and the parts of a computer

Define the term “subtypes” in the context of the supertypes notation.

Write a Java Program to Call One Constructor from another.(Urgent need)

Explain cloud computing and the advantages of using it in detail.

A(n) ________________array is a kind of array that utilises two indices.

Name the physical layers over which Modbus protocol can be implemented

List the advantages and disadvantages of connectionless protocols vs connection-based protocols.

What are the various methods of incorporating audio into PowerPoint slides?

How to select a proper data structure for solving any problem

NuBus bus types are used by the Apple Macintosh computer?  explain?

Computer Science: What are the common tasks performed during data cleansing.

Describe the impact the CPU has on the computer’s overall speed.

Fill in the blank question: Q. SMPS is known as Switched__________.

Discuss the similarities and differences between a blog and a vlog

Create a c++ programming flowchart that prints / displays 5 consonants.

In an assignment statement, the equal sign is known as the_________.

(ROM, RAM) chips store programs used to start the boot process.

what is MS word and list all his 10 features  ?

Write code to store information about a student record. C language

Short questions: Q. 528 kbps is equals to how many Bps?

A CPU understands instructions that are written only in what language?

What is an Interface class? Explain with an example. [7 marks]

Transport  OSI layer handles logical address to logical name resolution explain?

True or false : The time-sharing operating system is non preemptive.

Why information gathering is the MOST important phase in ethical hacking?

Transcribed Image Text: ?LCM of 24,15,36
3*5
360
2*2*2*3*3*5
999720
2*2*2*3

Laser printers uses a combination of laser-beam & electro photographic techniques.how?

What are the DBAS responsibilities with regard to the data dictionary?

Declare a char variable and print it’s address in output. C++.

A single dimensional array might be treated as a 2-dimensional array.

Explain and define what is meant by virtual memory briefly ?

What is a telecommunications network protocol, and how does it work?

Computer Engineering: Describe Area in an OSPF autonomous system (OSPF AS).

A telecommunications network is composed of a number of different components.

What are the disadvantages of using CDMA for a cellular network?

In what ways does IPSec help to achieve its security objectives.

Briefly discuss measures necessary to avoid these causes of project failure.

What is the purpose of data mining in the first place.

Database management: Why some experts are against the practice of denormalization.

Describe six potential benefits of achieving a widely accepted SQL standard.

What role does WiFi play in the expansion of computer poliferation?

Write a program on Banking system by using GUI in java

Give examples of how to use the words document and field

Short questions: Q. 876 Bytes are equals to how many Bits?

The packets of data that is transported by IP is called

In software design, what is the relationship between cohesion and coupling?

Explain the role of  data dictionary in database management and maintenance?

Using block diagrams explain how two functions communicate with each other

What exactly is a process? Describe how operating systems describe processes.

What classes do you use to read data from a file?

Oval slot part of the diskette should never be touched? why?

Is there a fundamental difference between procedural/imperative and declarative/functional programming paradigms?

why it is important to convert high-level language into low-level language?

In analog computer  Input is never converted to digital form explain?

Which step in the data science process is the most important?

State the difference between computer organization and architecture, Define and explain?

What Exactly Is E-Sourcing Models—External Information Systems—and How Do They Work?

What are some of the most common software cost estimating techniques?

What exactly is a process? Describe how operating systems describe processes.

Descriptions of the benefits and disadvantages of the various thread implementations

Draw Activity Diagram for using QR Code in university library system

Is machine learning no longer based on algorithms and data structures?

What is the difference between widespread computing and regular desktop computing?

What distinguishes the runtime stack from the stack abstract data type?

What causes a virus to propagate over a company’s computer network?

What should companies do in the event of a security breach?

What would a computer’s noun classes, properties, and methods look like?

What is Regression Testing? What is the need for regression testing?

Explain pass by value and pass by reference with an example

What are the advantages of utilizing ICT in education and business?

Data definitions are not permitted in macros, whether true or false.

In an assignment statement, the equal sign is known as the_________.

Which Property Is Used To Align The Text Of A Document?

What is the System.Data namespace class and what does it do?

What is a Data Access Object, often known as a DAO?

How does ICT affect your everyday life as a student ?

What are the differences between strongly-typed and loosely-typed data type implementations?

Fill in the blanks: Q. Expansion of HPFS in OS is_____________.

investigate and evaluate software purchase options, including conventional and web-based solutions

What two Windows applications use the RDP protocol and port 33899

How compiler is built for languages like C/C++. Explain in detail.

Short questions: Q. 765 Nibbles are equals to how many Bytes?

Fill in the blanks: Q. Expansion of TDR in networking is_____________.

Computers that use RAM as their main memory have what advantages?

Transcribed Image Text: 2. Draw logic diagram of 11-bit binary subtractor

Different approaches to define intelligent search in relation to artificial intelligence

what values of t is it reasonable to use this function

What is a magic number that identifies a Java class file?

What additional web tools do you use to aid project collaboration?

Why would a malfunction cause the current instruction to be reset?

Computer Science: Give description of Head-of-Line (HOL) blocking and its occurrence.

1)Explain the use of I/O modules as part of computer organization

Correct errors Transcribed Image Text: int array[] = {1. 2, 3}:

What exactly is a process? Describe how operating systems describe processes.

Why is an odd number times an odd number always odd?

What exactly is meant by scalability in the context of computers?

Define Data node. How does name node tackle data node failures?

What are the functions and advantages of a temperature monitoring system?

What is the difference between the three kinds of user testing?

What is the location of the PictureBox tool in the Toolbox?

Which INT 10h function returns the video mode currently in use?

Among satellite, cable Internet, and DSL, which technology experiences more latency?

In computer networks, what is the importance of an IP address?

What are the advantages of utilizing ICT in education and business?

Light is captured by a digital camera on a light-sensitive Sensor.

Could you kindly clarify the distinction between hard and symbolic links?

the main objectives of information security should be listed and explained

1.   In C++,  Displaying the elements of array using while loop?

Fill in the blanks: Q. Expansion of DIMM in storage is_____________.

Discuss procedural vs. OO Programming languages. What is Python programming language?

Define Packet sniffer and how to find data information using it.

What exactly are the distinctions between a process and a programme?

Ability to describe and work on simple database using database software.

Fill in the blanks: Q. Expansion of ERD in DBMS is_____________.

Briefly compare Strong AI vs. Weak AI  with your own sentences.

The brain of the computer is referred to as the __________________.

What are the different characteristics of natural language in computers ?

A type of artificial intelligence enables computers to learn from observation.

Which Windows application should you use to uninstall an expansion card?

What steps are involved in ensuring the integrity of the data?

Line coding is done at the data link layer.True or False.

What protocol does PPP use to identify the Network layer protocol?

What exactly is a process? Describe how operating systems describe processes.

what will happen if you run the program with an error?

Transcribed Image Text: write the
code for peterson number in java

Fixed computer disk error occurs due to incorrect CMOS settings explain?

Explain the Differentiate between for and for…in, In relation to JavaScript

Describe the procedure for granting keyboard access to a text box.

Transcribed Image Text: Problem 2:
Vectonize these codes
result=0;
Elength(vec)
result=resuLE+vec{i);

What are some of the issues that 5G cellular networks raise?

Define Boundary Value Analysis (BVA). List the methods present under it.

Fill in the blanks: Q. Expansion of VAN in networking is_____________.

What exactly are the distinctions between computer organization and computer design?

Fill in the blanks: Q. Expansion of IIS in networking is_____________.

If a program is not responding, how can you stop it?

List types of internal and external sources used in a DSS.

Represent the following numbers in base-2 representation: (43268) 10 (3201) 4

What can cause an exception to be thrown by an application?

How do groups and roles in computer security access control differ?

What is the distinction between a class and a class instance?

Short questions: Q. 112 Bits are equals to how many Bytes?

Is There Anything That Can T Be Replaced By Style Sheets?

The data elements in the structures are also known as what?

When a function is called, what parameters are sent to it?

Mesh topology covers security, robust and eliminating the traffic factor? why?

When would it be acceptable to introduce brouter into your network?

Solve the recurrence relation by substitution: T(n) = T(n-1) + 2^n

Define OOSE ( Object Oriented Software Engineering) in your own wording.

Program any one function in c++ whose return type is bool.

How does a symbol differ from a string in ruby language?

What is the significance of information security management in today’s world?

Identify and briefly explain a few of global information system issues.

Explain capacity analysis react when many processes are running concurrently ?

write oop program using inline fucntion that summing negative number ?

OSI & SNMPv2 supports deletion of objects. A) True B) False

What is the output of the statements below?
x=3
while x

Briefly outline TinyOS and its goals as an embedded operating system.

Which is better intel processor or arm and which one choose?

What are two reasons to uninstall software you no longer use?

Analyze the advantages of agile development versus traditional formalised development methods.

Transcribed Image Text: 1-Type of functions in c++ are-
–?Explain one

How will the cloud computing trend affect its members’ collaborative efforts?

1.     How to insert and print array elements in C++ ?

Explain why access control is an essential element of InfoSec management

What is the difference between a database and a data warehouse?

Describe situations where you will be able to use linked lists

Computer science: What is branch prediction? What is it used for?

Distinguish between reading and writing memory. Distinguish between ROM and RAM.

In the Java programming language System of administration that is simple

Which letters make up SQL’s acronym, and what does it do?

The __________ points to the first node in a linked list.

Given f(x) = 2×2+3x+1 and g(x) = 3x?2.Compute (a) (f?g)(x) =

Fill in the blanks: Q. Expansion of BPI in os is_____________.

Design a two-input Decoder (Truth Table, Boolean Expression, and Logic circuit).

Transcribed Image Text: 2. Write a program to print even/odd numbers

Describe the many testing methodologies utilized in the software engineering industry.

Data division is the third division of a COBOL program. Why?

What is the significance of information security management in today’s world?

Explain briefly what defragmentation accomplishes for files that are connected together.

______ represent real-world associations between entities. Entities Attribute Relationships Primary Key

Describe the four software packages? How are they to be utilized?

How to add the email validation using only one SQL query?

Explain how IT/MIS tools assist with baseline scheduling and network analysis

What is considered to be the failure rate curve for software?

write a brief comment about subscription websites and provide an example?

What should companies do in the event of a security breach?

Briefly discuss measures necessary to avoid these causes of project failure.

The Eclipse SDK includes the Eclipse Java development tools. True False

The two types of slack space are ________ slack and _________slack

An organization’s security policy may be implemented using these ten steps:

Consider the following Grammar: A-> ABd|Aa|a B-> Be|b Remove left recursion.

Write only the steps on how to insert Maps in Weebly.

List The RC6 algorithm features and how it works in steps

Explain the use of mark-up languages, web browsers, and web servers.

Write the name of five high level programing languages? Own words

{a | a > 4} How would I solve this problem?

Distinguish at least 5 differences between Binary Search and Merge Sort.

What exactly is the osi model? And what are their classifications?

The brain of the computer is referred to as the __________________.

Collections that store one or more key-value pairs are called ________.

in 80886 microprocessor  What are the functions of Execution units EU?

Distinguish between the benefits and drawbacks of the current network environment

LO4: Explain the concepts of user interface, User Experience and Usability.

List Out Differences Between Pass By Reference And Pass By Value?

What regulates, integrates, and manages a computer system’s separate hardware components?

Write the equivalent pointer expression for the given array element PARR[x][y][z]?

Transcribed Image Text: How much capacity does a T1 line have?

With____________software, pen-based computers can convert handwritten text into editable, typed text.

Which three factors are taken into account while selecting hardware selections?

Telephone networks are fundamentally the same as computer networks. True False

At what point in computing’s history was security the most important?

Do we need both DNS addressing schemes? Why are there two?

Write C++ program, using function, to find this series s=1+4-18+96-…n ?

Discuss five features of Bitlocker currently present in Windows Server 2016

Google Docs is a type of cloud computing.

True or False

Transcribed Image Text: 3. Draw logic diagram of a 3×2-bt multiplier

The value of 4044 base five in base ten is _______

Define random access method and list two protocols in this category?

Write a logical shift instruction that divides EAX’s contents by 16

Discuss the historical development of the field of human computer interaction.

What characteristics does a derived class have with its base class?

Write a python code for the following turtle graphics image. Attached

Software Architecture Discuss in brief about the various phases of ATAM.

Explain the difference between a unified cache and a Harvard cache.

Give an explanation of the eight most important computer architecture concepts.

The use of software engineering concepts is essential in software development.

When would a system ever need to page its page table?

Why AOP and OOP Mix Strategy you will adopt? Describe Benefits

What does “critical thinking” imply? This is true in software engineering.

Describe memory cards and their uses. List types of memory cards.

CN 252. The structure or format of data is called __________.

Which Property Is Used To Set The Width Of An Image?

A(n) ________________array is a kind of array that utilises two indices.

Integrated circuits major development led to the production of microcomputers explain?

Baud is a unit representing the no bits of discrete. Explain?

Ability to describe and work on simple database using database software.

What problems have been discovered in the router layer 2 protocol?

python what are the layout structures used in the tkinter library

Why is Voice over Internet Protocol (VoIP) relevant for business use?

Under what circumstances does statelessness pose a problem for database processing?

What Is The Difference Between Emulation, Native Virtualization, And Para Virtualization?

Fill in the blanks: Q. Expansion of XGA in Graphics is_____________.

What networking strategies do you suggest for mobile and wireless workers?

Transcribed Image Text: . The assembler stores the object code in

Create a simple python parser for APA references, provide Python codes.

What networking strategies do you suggest for mobile and wireless workers?

The SAR instruction is suitable for signed integers True or False?

@cse Cluster Analysis and Algorithm Explain how to select DBSCAN parameters.

Computer Engineering: Describe Area in an OSPF autonomous system (OSPF AS).

How does the tools work to assess vulnerabilities on the network?

Short questions: Q. 777 Bytes are equals to how many Bits?

Which Property Is Used To Set The Color Of A Text?

What are the many image formats that a PictureBox control supports?

Give at least 3 versions of Ms Windows and differentiate them.

What kind of operands may be used with the FADD instruction?

Fill in the blanks: Q. Expansion of DWM in OS is_____________.

Short questions: Q. 96 Bits are equals to how many Bytes?

Trap Flag is set by the user. Select one: True False

Describe the difference between the while loop and the do-while loop.

Lossy Compression Retains the exact image throughout the compression? False True

Describe in Java and C# the concept of a definite assignment..

Name the two forms data can take in terms of communication

None H. ______data structure can be used to test a palindrome.

What kind of control is used to show a calculation’s result?

List the four steps of the Linux boot and startup process.

The___________key can be used to delete the last character you typed.

What is the distinction between a class and a class instance?

(True/False): A segment selector refers to a segment descriptor table entry.

Why is an understanding of Boolean algebra important to computer scientists?

In OSI model, Transport layer provides error-free delivery of data explain?

What are the main components of a computer and its examples

Write a program that administers and grades a hexadecimal addition quiz.

List three groups of contributors to make a security plan successful.

Give the flowgraph of the approach used with Dijkstra’s selector statement.

T/F Run-Length encoding is used to compress data in bit arrays.

What is mean by ‘deep processing’ write and describe two examples.

In Rust language print the given statement below- “Programming is FUN”.

Explain

•        Vision

•        Definition

During SDLC with any simple example.

Describe situations where you will be able to use linked lists

Define the term Network Scanning and Assessment and use specific details

How come acknowledgments are included in 802.11 but not wired Ethernet?

Which data type should be used to store the street name?

(True/False): A segment selector refers to a segment descriptor table entry.

Identify the advantages and disadvantages of the traditional systems development press.

What is a perceptron. Explain the structure of a neural net.

Multiple records can have the same primary key. True or False?

What protocol device was the key to the robustness of DARPAnet?

Differentiate the following:- Function and stored procedure Managed and Unmanaged code

Discuss various OS design methods and how they have been implemented.

Fill in the blanks: Q. Expansion of P2P in os is_____________.

When it comes to ADO.NET, what exactly are Transactions and Concurrency?

Write a C++  program using Windows API to copy a file

How to format student Id number as; S2018164701,S2018164702……S2018164701 in Microsoft Access

Where can I share music, pictures, and videos on the web?

a)  Compare and contrast the issues involved in verification and validation

create a change log for an events management and production company.

Briefly describe the distinctions between short-term, medium-term, and long-term scheduling options.

3. How genetic algorithm finds a solution. Illustrate with an example.

None Transcribed Image Text: If ACB: Then A B=A
Ture
False

Explain the Systems Development Lifecycle (SDLC) only for the analysis phase.

Using five different criteria, compare private key versus public key encryption.

What is a Data Access Object, often known as a DAO?

Fill in the blanks: Q. Expansion of MTA in networking is_____________.

What is the distinction between a class and a class instance?

Find any errors in the following function declarations: void sun(void, void);

Among satellite, cable Internet, and DSL, which technology experiences more latency?

Define Packet sniffer and how to find data information using it.

Describe the flags of EFLAGS register in 32 bits 80X86 processors

what is the between the Internet and the World Wide Web?

In IP routing path to destination is determined by the __________.

In what situation do traditional files work well for storing data?

Computer science: What are the current key trends in data warehousing

Analyze the advantages of agile development versus traditional formalised development methods.

Describe the steps necessary to prepare a brand-new computer for usage.

in terms of cyber security, how has technology affected human behavior?

Briefly define the terms substitution and permutation its role in DES.

Why is data encryption so essential to your business or organization?

What are the functions and advantages of a temperature monitoring system?

What keyword is used in order to give a reference parameter?

Which Property Is Used To Set The Color Of A Text?

((xy)’+xy’)’ evaluates to waht the correct answer a.y b.x c.0 d.1

scratch pad is a set of general purpose internal registers? explain?

Briefly, explain the concepts of dynamic binding in Object-Oriented Programming (OOP)

Which Windows application should you use to uninstall an expansion card?

What are the three advantages of incremental development over waterfall development?

What is a telecommunications network protocol, and how does it work?

Digital devices often use the__________ number system to represent numeric data.

Q. 6. List all MacOs versions with its year of release.

Multiple records can have the same primary key. True or False?

How does the Linux kernel handle a system call. Explain !

Find out resources needed for each task in an IT project?

If f(n) belongs to ?( g(n)) then it belongs to O(g(n))

How do WANs become built? Provide an example of a WAN.

What exactly are the distinctions between computer organization and computer design?

What is the sum of rotational delay and seek time called?

What kind of main and cache memory should you look for?

Declare a char variable and print it’s address in output. C++.

What does IOPS measures and what factors does it depend on?

What improvements to computer operations were brought about by resident monitors?

Fill in the blanks: Q. Expansion of NAP in networking is_____________.

Identify any ten-risks connected with the management of information technology initiatives.

What is the connection between healthcare, information technology, and network troubleshooting?

What are the concerns related to the security provided by DES?

Why do interrupt-driven operating systems perform better than non-interrupted operating systems?

___________ are storage expansion cards that many mobile devices can accept

Describe the two opposing viewpoints on kernel design in operating systems.

What exactly is the difference between “data mining” and “OLAP” technology?

What are memory representations and what are their properties, with examples?

None Transcribed Image Text: what are the advantages of
parameter statements

Write a program in C language to convert newtons to pounds

Explan what is meant by system change over in computers ?

Transcribed Image Text: Most current motherboards continue to
provide several
slots

List the three most important responsibilities of a multitasking operating system.

Briefly explain the roulette wheel scheme’s major shortcoming in genetic algorithms.

Fill in the blanks: Q. Expansion of HPFS in OS is_____________.

How linear programming can be used to determine optimal financial decisions?

What is the significance of clustering (k-means) with and without normalization?

What are the five most vulnerable aspects of a database’s security?

Describe and explain the primary objectives of artificial intelligence (AI) systems.

Digitizer is a device that changes information into digital form? Explain?

What are some of the different techniques for documenting data flows?

The distinctions between first-generation computers and second-generation computers are as follows:

What is the two best operating systems to use and why?

In an assignment statement, the equal sign is known as the_________.

Transcribed Image Text: Describe the algorithm
for cooking your
favourite food.

Which data type should be used to store the street name?

• Model your proposed architecture with four views of software architecture.

What program or software can do a simulation for slotted ALOHA?

Why is data encryption so essential to your business or organization?

What is a telecommunications network protocol, and how does it work?

What networking strategies do you suggest for mobile and wireless workers?

A(n) ________________array is a kind of array that utilises two indices.

Database management: Why some experts are against the practice of denormalization.

create the IPO, Level 0, and Level 1 diagram for doorbell

If a program is not responding, how can you stop it?

Program to find two’s complement of a binary number in C++

Give 5 examples of Binary Tree with your own given solutions.

Descriptions of the benefits and disadvantages of the various thread implementations

Programmed instructions to the computer is known as Code explain why?

Explanation and examples of the software structure review procedure are provided.

An operator may be __________ to work with a specific class.

What are two reasons to uninstall software you no longer use?

Plotter accuracy is measured in terms of repeatability and resolution why?

What exactly is a process? Describe how operating systems describe processes.

Define random access method and list two protocols in this category?

Why do interrupt-driven operating systems perform better than non-interrupted operating systems?

find the Algorithms and Flowcharts : To Converting feet into centimeters

Question ) Define Cache memory and explain its advantage and disadvantage

Sub:- Design and Analysis Algorithm Compare backtracking and branch and bound

Which Property Is Used To Set The Height Of An Image?

Explan what is meant by system change over in computers ?

What is the purpose of data mining in the first place.

Talk about Cloud Computing by referencing the use of open innovation.

Give code to join two lists in kotlin. Use addAll() technique

Why is it helpful to run AV software in Safe Mode?

Is reinforcement learning a special case of supervised learning? Briefly discuss.

Why AOP and OOP Mix Strategy you will adopt? Describe Benefits

Describe the ideas and techniques used in data and process modeling.

can you define  and explan with example  the operating environment ?

How to get find index of word in a javacript string.

In OSI model, Transport layer provides error-free delivery of data explain?

With regard to printer output, how was the word spool derived?

Which encoding method uses alternating positive and negative values for 1s?

What component is used to connect interface controls to a dataset?

What is considered to be the failure rate curve for software?

What are the costs of putting in a database system possible?

Transcribed Image Text: IC
is a programmable parallel 1/O device interface.

Why do reporting systems increase the risk of semantic security problems?

Bit length can be defined in terms of Bit duration explain?

When would a system ever need to page its page table?

What is Load balancer? Why do we require a Load balancer?

What is the Criteria for choosing off-the-shelf software in real world.

How does agile methodology compare to the conventional system development lifecycle?

What exactly are the distinctions between a process and a programme?

The packets of data that is transported by IP is called

What is Artifical Intelligence? Explain its importance and usage areas .

Short questions: Q. 10000 Bytes are equals to how many Bits?

9. An element of the WWW protocol is:Java, Javascript, xml, html

Write a program in groovy language to print something on console.

The first IBM PC did not have any disk drive why?

Convert the following decimal numbers to binary: 11 65 100 255

Short questions: Q. 43728 Bits are equals to how many Bytes?

Which of the following functions from Z to Z are one-to-one?

Identify and briefly describe the process of developing web-based software applications.

Hadoop Define structured , semi structured and unstructured data with Example

What are the four libraries that Windows 7 creates by default?

When would it be acceptable to introduce brouter into your network?

What causes a virus to propagate over a company’s computer network?

Fill in the blanks: Q. Expansion of SVGA in graphics is_____________.

Create a class Circle to compute area and circumference using Java

Talk about Cloud Computing by referencing the use of open innovation.

What type of technology is used by battery packs for notebooks?

Write code to print the multiplication table of a given integer.

Control unit part interprets program instructions and initiate control operations. Why?

Discuss some best practices in the area of usage and configuration?

Write 10 Business use cases that are implemented in Microsoft Azure?

Acquire a comprehensive knowledge of social networking blogs and cloud computing.

Mesh topology covers security, robust and eliminating the traffic factor? why?

Describe the two opposing viewpoints on kernel design in operating systems.

Explain what it means for an instruction set to be orthogonal.

How does a microoperation differ from a regular assembly language instruction?

Bit length can be defined in terms of Bit duration explain?

What are the advantages of utilizing ICT in education and business?

investigate and evaluate software purchase options, including conventional and web-based solutions

Data division is the third division of a COBOL program. Why?

Why is it helpful to run AV software in Safe Mode?

Describe the concept of Inheritance and provide an example in python.

NuBus bus types are used by the Apple Macintosh computer?  explain?

Describe what the Internet of Things is and how it works.

Fill in the blank question: Q. VGA stands for ___________ Array.

What is the purpose of data mining in the first place.

What is the difference between Modbus ASCII and RTU transmission modes.

List weaknesses in passwords and how to improve upon their strength.

Solve the recurrence: T(n) = T(n/2) + 4n T(1) = 1

Which Property Is Used To Change The Face Of A Font?

HW: Find Z{-n u(-n))} Transcribed Image Text: HW: Find Z{-n u(-n)}

Analyze the advantages of agile development versus traditional formalised development methods.

In Windows 7, which window is utilized to uninstall an application?

What steps are involved in ensuring the integrity of the data?

What is file handling what is its need? Explain in detail

Data mining: Describe the core idea underlying in data base analytics.

When is it OK to use conventional files for data storage?

What’s the logic circuit of this logical statement? A’C’ + A’B

Identify any ten-risks connected with the management of information technology initiatives.

In java What are the advantages of packages, explain in points.

What exactly is the difference between “data mining” and “OLAP” technology?

What issues does excessive demand forecasting create within a supply chain?

What is the distinction between a class and a class instance?

Explain the difference between directives and declarations in the following paragraph.

How do WANs become built? Provide an example of a WAN.

Describe the data’s basic features and components for successful data exchange.

How the flowchart helps you to understand and improve the process.?

In a function call, you can’t have keyword and non-keyword parameters.

Affine transformations map finite points to finite points

True or false?

Give views of a system on the structured analysis workshop ?

What is a website and what is the importance of website?

How do GROUP BY and HAVING clauses work with aggregate functions?

Explain the Systems Development Lifecycle (SDLC) only for the analysis phase.

Python program to get the length of list using length method

13/ 1’s complement of 1010101 is  0101010 Select one: True False

What is the connection between healthcare, information technology, and network troubleshooting?

IEEE defines two sublayers at layer 2,discuss the purpose of each.

Different approaches to define intelligent search in relation to artificial intelligence

Fill in the blanks: Q. Expansion of WUXGA in graphics is_____________.

Briefly outline TinyOS and its goals as an embedded operating system.

Write a program to print the current date in pascal  language

A) Convert the following numbers to their binary equivalent: FAB16 5628

Describe the flags of EFLAGS register in 32 bits 80X86 processors

What is the primary difference between key-value stores and document stores?

What could be the function of a motherboard SATA-style power connector?

i.Explain the three persistence protocols that can be used with CSMA.

Briefly outline TinyOS and its goals as an embedded operating system.

The completion of one full pattern is called a  Cycle why?

What part may multimedia capabilities play in 21st century learning modalities?

Define the term “subtypes” in the context of the supertypes notation.

What are the fundamental principles governing the design of source documents?

Which sort of data transmission requires a direct line of sight?

Describe the processes involved in Advanced Techniques Using MS Word: hyperlink

1983  was Apple Macintosh II microcomputer introduced in the market? Explain?

Can you please explain or tell me what is an adverb?

In object-oriented programming, what is encapsulation and why is it important?

Explain Characteristics of Just in Time System in detail with examples.

Where do you do the duck cover and hold position?
_________________________________________________

Do Comparison between R and Python as computational environment for analytics.

Define Register Variables. What Are The Advantages Of Using Register Variables?

In Windows 7, which window is utilized to uninstall an application?

Transcribed Image Text: 4-A Runction icaspecinlcese ofa.
?let A-f1.2.3.4,, 8-£1,2,3, 4,87

A(n) ________________array is a kind of array that utilises two indices.

3G is a newer cellular standard than 4G. True or false?

What distinguishes the runtime stack from the stack abstract data type?

Scrambling encoding provides synchronization without increasing the number of bits. Explain?

Find the standard form 0.000 000 000 000 000 000 000395

Transcribed Image Text: write the
code for neon number in java

4. Elaborate briefly three main analytic functionalities of business intelligence systems.

Write  a JavaScript program to print the formated date in dd/mm/yyyy

What is the significance of kernel mode for an operating system?

The __________ function returns the periodic payment amount for a loan.

Explain why electronic transfers with credit card numbers can be unsafe.

Analyze and compare a number of different back-end compiler architecture options.

Where might you find hexadecimal notation in use? Provide some examples.

Write a Java program to print all lowercase consonants in output.

The _______ is the physical path over which a message travels.

Explain capacity analysis react when many processes are running concurrently ?

Write a program to print prime number in C plus plus

Describe the flags of EFLAGS register in 32 bits 80X86 processors

Describe the I/O cost differences between volatile, nonvolatile, and stable storage.

Which is better between  MAC-algorithm and Digital Signature for message integrity.Explain.

Inheritance in classes – what is it and how does it

What is a stack in data structure? What are its applications?

Mesh topology covers security, robust and eliminating the traffic factor? why?

None Transcribed Image Text: Suppose that A cB: Then A OB=

The differences between digital computers and analog computers are discussed here.

Lossy Compression Retains the exact image throughout the compression? False True

Write a python program to convert binary code to gray code.

Which data type should be used to store the street name?

What is the osi model? And what are their different types?

describe how Pure Aloha utilizes several access protocols while avoiding plagiarism

Windows seven disables de-fragmentation on what type of hard drive ?

What are the DBAS responsibilities with regard to the data dictionary?

Basic requirements for  new hardware and software in a computer system?

Give at least 2 advantage and 2 disadvantage of Computer Network.

A computer program consists of Algorithms written in computer’s language why?

Describe the client/server architecture and the components that make it up.

What are the features and advantages of field programmable gate arrays.

encoder from 10 to 4 in vhdl with test bench code

Transcribed Image Text: What does the following declaration mean?
int (*ptr)[10];

Explain about memory leak in C++? Why should it be addressed?

Missing slot covers on a computer can cause over heat explain?

Print the given pattern in Java without loops. JAVA JAVAJAVA JAVAJAVAJAVA

(p ? q) ? (p ? ?r) Construct a truth table

__________ are spaces that appear at the beginning of a string

If a program is not responding, how can you stop it?

What exactly is a process? Describe how operating systems describe processes.

What are the functions and advantages of a temperature monitoring system?

Describe the enhanced security features of IPv6 as compared to IPv4.

Business Intelligence and Analytics Tools should be identified and briefly discussed.

What distinguishes the runtime stack from the stack abstract data type?

Short questions: Q. 654 Nibbles are equals to how many Bytes?

Data division is the third division of a COBOL program. Why?

Refer to the section on ensuring continuous connection between different systems.

What are the four libraries that Windows 7 creates by default?

Which sort of wireless communication requires a direct line of sight?

In your opinion,is a movie like War Games still relevant today?

Build a simple knowledge graph from Barack Obama’s speeches using python.

Compare FOUR (4) features that differentiate Go-Back-N ARQ and Selective-Repeat ARQ.

The ____ member function writes “raw” binary data to a file

What is the significance of our modified version of Church-Turing Thesis?

Give an overview of object-oriented analysis by explaining prototypes in usage.

To split EAX’s contents by 16, write a logical shift instruction.

Is there a hierarchy of importance for non-functional requirements? Explain why.?…?

What is the difference between medical data and de-identified medical data?

Find the standard form 0.000 000 000 000 000 000 000395g

Give reason why web server can be termed as end system.

Explain
•      Development
•        Maintenance

During SDLC with any simple example.

Q)create a project on the railway ticketing system using C# language?

Write a program that print numbers between 10-20 in assembly language

Fill in the blanks: Q. Expansion of MTP in networking is_____________.

Solve asap. Using Python Generate an identity matrix of order 5.

What is the number of address lines in the 8086 microprocessor?

Pyton.Write a function absolute(x) that prints the absolute value of x

Computer Science: Explain why data in the warehouse cannot be updated.

1)Present an overview of the principle types of semiconductor main memory

Multiple records can have the same primary key. True or False?

. What are the advantages of rapid application development in short.

A repository for data, usually covering specific topic is Databank why?

When you cut or copy information it gets place in the___________

The five main parts of a computer system are as follows:

In OSI model, Transport layer provides error-free delivery of data explain?

The external JavaScript file must contain the