What are the three steps to take when dealing with missing field values in a database?
Which of the following is a “Domination Law”? Group of answer choices p?(p?q)?pp?(p?q)?p p?F0?F0p?F0?F0 p?p?pp?p?p p?T0?p
Is there a minimum permissions need to be in the current directory and display its contents?
What is computer system?? What are the various components of the computer system?? What are microprocessors??
Database: Provide a detailed explanation of the trigger using an example (explain it in 2 pages)
What factors should you take into account when adapting a Process Model to a software project?
FORMAT A: /S DOS command will format a floppy disk and transfer the system files explain?
Consider and discuss the statement “Tablet is a computer ” giving clear arguments and justification “For”
Design a MOD- 6 synchronous up binary counter using S-R flipflop and draw it’s timing diagram.
In what ways do UML diagrams vary from one another? Explain each in a few words.
What is the significance of enforcing rules via the use of password security and access control?
Why would you want to use a return statement in a void function, you may wonder.
Thanking the customer can go a long way to enhancing the customer experience. True or False
allow just a portion of a file to be resent are session layer check points? Why?
Check all common letters in two input strings I need a python program for given statement
Explain how many fields questions should be asked on a single request for information form ?
If the computer is switched off, what part of it retains data for a long time?
Transcribed Image Text: 1. Write a C++ program to display all negative elements in an array.
None Transcribed Image Text: Fiber optic cable is an example of
..media
optical O
wire
wireless
Transcribed Image Text: Q2) Write a program to display the multiplication table by using while statement.
What should you allow and what should you ban when it comes to firewall security? Why?
Database: Provide a detailed explanation of the trigger using an example (explain it in 2 pages)
one-dimensional array: Write C++ program the needed code to find the largest element of array intArray.
_____________ is the process of analyzing and designing a system from an object-oriented point of view.
Can we state the main objective of software engineering in a nutshell? Just what is it?
A branch instruction changes the flow of information by changing the PC.True or False with explanation.
Give an example of how the Computer Security Terminology affects security levels and what that means.
Write a C++ program to find the sum of first 50 natural numbers without using loops.
Number of Map tasks is equal to number of key-value input records
Select one:
True
False
Discuss the four possible alternatives a project organisation can adopt in deciding how to address/mitigate risk.
Improve your knowledge about social networking blogs, in addition to cloud computing and other related topics.
Explain the different Design models that we use to perform the analysis process of software development.
3a) Explain the semantics of the if else statement. Use flowcharts and examples. Elaborate and explain.
Explain the three-tiers of Internet Service Providers with their functions and provide two examples of each.
Transcribed Image Text: What is the symbol that marks the beginning of a one line comment?
Assume that each alphanumeric ASCII character is represented by 7 bits, decipher the following code: 100101011011111010001101110
What are the distinctions between computers from the fourth generation and computers from the fifth generation?
124. Abuse messaging systems to send unsolicited is a) phishing b) spam c) malware d) firewall
How can you explain in detail the main components of hacking and how they are classified?
Distinguish between computer programming and algorithms in computer science and outline vivid examples NB: avoid plagiarism
What are some instances of “illegal” software applications? What are five instances of “legal” software applications?
162. Each loop in spiral model represents a a. communication b. phase c. project d. deployment
Solve the following recurrence: Transcribed Image Text: n=0,
T(n}
27 (? – 1) + 1 ?>0
asap Transcribed Image Text: javascript program to find the time in millisecond from 1 jan 197e
In Windows programs, default check boxes are prevalent. What is the difference between true and false?
Explain Request for proposal and its usage in gathering information about the hardware and system software.
Create a statement that shows the value of the letterGrade char variable in a message box.
Which method is used to guarantee that legacy systems continue to evolve in their current form?
List down the elements of the following sets: {x ? ? : -2 ? x <7} Convert the numeral to a numeral in base 10. 693 16 693 16 = _ 10 a) What exactly is data warehousing? b) Describe the THREE different forms of data warehouse design. the connecting devices between local area network and wide area network such as Internet are ? Describe the difference between a request for proposal (RFP) and a request for quote (RFQ) (RFQ) DO NOT COPY FROM OTHER WEBSITES Q. Compare the conditional statements in Python and Shell script. What are the conditions under which a DML action on a basic view is not permitted? 2. Write an if statement that assigns 1 to x if y is greater than 0. When memory is ____, it means that the memory is reserved by some entity for use Which code should you change to show the highest count and student with a high count? List the most common situations in which goto is used, as well as the structured alternatives. Which industry, in your view, used multimedia the most? Identify TWO advantages of using multi-media resources. Write a C++ program that compute the area of a circle with a diameter of 10 List any 3 programming languages with their functionality that are used for the internet application development. Name a few system privileges the owner of a database must have (and not standard users!) What to you is a GOOD PowerPoint presentation? What to you is a BAD PowerPoint presentation? Explain what the back button does and how it connects to the back stack of information. Please provide an explanation of what the Java Virtual Machine is and how it works. thanks The maximum payload of a TCP segment is 65,515 bytes. Why such a strange number was chosen What is an expert system, and how does a data warehouse assist in the creation of one? Give a short explanation of each component of a standard operating system kernel and list each one. Give some instances of relations (tables) that may have more than one candidate key in their structure. When a company has to inform residents or customers of a data breach, what should they do? Fill the gap: A computer that requests an ASP page from a Web server is called a_________computer. Design a 5 bit decrementer which can take any value from register and decrease it by 1 When it comes to TCP and UDP, what’s the difference? Differentiate between these procedures in four ways. What is the use of break keyword. Transcribed Image Text: What is the use of break keyword. What hardware component is needed to set up BitLocker Encryption so that you can authenticate the computer? What is the process of correcting errors in Programming? a. Coding b. error c. Syntax d. Debugging What is the most relevant approach available to database designers to impact database efficiency in particular applications? What exactly is routing? Describe the fundamental components of a router and the routing process in detail. Transcribed Image Text: 3b. Express the following Boolean function F in its standard form F=x’y+xyz (1.5 mark) PHP language- Prompt the user to enter two strings and in output print the lexicographically smaller string. ASSEMBLY You can reuse the same local variable name within different procedures in your program. True False WHAT IS SYSTEM CALL? EXPALIN RELATION BETWEEN SYSTEM CALL AND API? GIVE AN EXAMPLE OF SYSTEM CALL When implementing IT security for a conventional on-premises data center vs cloud computing, what are the distinctions? Which of the following reduces degree of multi-programming? Long-term scheduler Short-term scheduler Mid-term scheduler All of these Q.2.7 Briefly discuss any four user-initiated actions that can be taken using a graphical user interface (GUI). Which component on a high-end gaming PC is most likely to consume the most amount of power? Which of the following reduces degree of multi-programming? Long-term scheduler Short-term scheduler Mid-term scheduler All of these List the steps to recycle the connection to an ISP when using a cable modem and router Write a program in perl language to call a subroutine which simply prints a strings of greetings. 38. _________ can impair a signal. a. Attenuation b. Distortion c. Noise d. All of the above Provide a brief summary of Wireshark. Identify the importance of and rationale for selecting the Wireshark tool. What is immediately created and presented in the Designer when you start a new Visual C# project? What information does the banker’s algorithm need to know a priori in order to avoid a deadlock? In order to construct more complicated regular expressions from smaller ones, what are the three fundamental operations? Graph ? has 7 vertices and 21 edges, sum of the degrees of all its vertices is Identify one system the will fit on each of the system development models I need answer plss Cache memory is used to store frequently accessed data. Here are some of its characteristics and examples. Transcribed Image Text: 2. Explain why 8 bits including a sign bit cannot represent -129 (negative 129). Dependencies within data analysis calculations can cause “biased” results. What name is given to such data dependencies? What member functions aren’t passed down via inheritance? If so, then which ones are you referring to? Given 11100111 find all binary strings of the same length that have a gamming distance of 4. Is it possible that Data Structures and Algorithms are becoming outdated in the age of Machine Learning? Please solve Quickly Transcribed Image Text: what is the MATLAB code that calculates * the BMI ?????? DO NOT COPY FROM OTHER WEBSITES Q. Briefly describe what the TCP/IP protocol does for the Internet? When a Java applet is shown, the browser calls the to translate the bytecode into machine language. Write a program in C# Sharp to count a total number of duplicate elements in an array. Using C++ or Java implement the search algorithm above using it’s best suitable data structure thus stack The code to traverse a twodimensional array using the Do…Loop statement requires two loops. True or False? Transcribed Image Text: Explain three types of RAID and discus what is the best from your opinion In what ways are replication in centralised databases and replication in parallel/distributed databases distinguished from one another? Provide a thorough explanation of the major security management concepts and the underlying principles of security management. I need steps of At least 1 server (service) running on a Windows platform in VM VirtulBox. The five distinct phases of the systems development life cycle are highly structured. What is their origin? for Loop is which type of Iteration? a. exit b. None of these c. Indefinite d. Definite 260. For communication, operating system moves a. processes b. packets c. programs d. both a and b Give some instances of relations (tables) that may have more than one candidate key in their structure. In a sequential access file, the text A(n) is an example of text that has been saved. Using the security system development lifecycle secSDLC, identify secSDLC phases and describe common steps for each phase. Which is better to destroy sensitive data on a hard drive, a low-level format, drill, or degausser? Use C++ coding Write a program to print multiplication table of any number using do while loop. Which port type produces the highest quality output, a composite out port or an S-Video out port? Transcribed Image Text: How many clauses are present in most of the predicates? 0 1 2. 03 Interactive computer of system puts the user into direct conversation with the computer through a keyboard? Why? Java Strings module- Take input two strings from user and print the lexicographically smaller string in output. Transcribed Image Text: Which two of the following are private IP addresses? 12.0.0.1 168.172.19.39 172.16.14.36 192.168.24.43 170.20.0.0 None Transcribed Image Text: 4. What is public key cryptography? Please do it correctly. Subject: Information Security. In what ways does the cloud computing revolution have ramifications? Do you have Collaboration on your person? 38. _________ can impair a signal. a. Attenuation b. Distortion c. Noise d. All of the above What is the nature of software programmes and how can their information be distinguished from one another? Create a simple C++ Trainee Information Program that can show and delete the information of the trainees. Provide a thorough explanation of the major security management concepts and the underlying principles of security management. Short Answers type questions: Q. What is The Short form of gh Level Language in Computer Science? Do you think computer studies have great impact in our own current situation like dealing with pandemic? Discuss at least three cloud service best practices that businesses may employ to keep their data safe. Explanation of Virtua __________.l-8086 Mode is the process of matching a method call with the proper method. What are the differences between real-time operating systems and non-real-time operating systems in terms of operating systems? When working with a distributed database system, talk about the many data request scenarios that may arise. Imagine that a file block is located at disk block 581132. What does this information tells you? Convert to binary form (a) 8AD5917, (b) B27D.A9C16. Convert/Replace each hexadecimal digit number by its 4-bit representation (python) What is the data type returned from the input method (default type): int float boolean string Discuss in full detail a) User Requirements b) System Requirements c) Functional Requirements d) Non Functional Requirements Generation manipulation and display of pictures with aid of a computer is dealt with Computer graphics why? Short Answers type questions: Q. What is The Short form of Instructions per second in Computer Science? A memory that does not change its contents without external causes is known as Static memory why? Short Answers type questions: Q. What is The Short form of Scalable Vector Graphics in Computer Graphics? 112. Loading and executing a program is called? a. time sharing b. process c. node d. cluster To determine what it is, the total number of different operator and operand occurrences measurements are used. If a program includes user-defined functions, why is it necessary to provide function prototypes in the program? How cultural perspective could impact the security decisions of an administrator setting up SharePoint ® Server 2013? As the data packet moves from the lower to the upper layers then headers are added explain? 41. Process synchronization of programs is done by a. input b. output c. operating system d. memory An IC 74LSO4 is belong to low power TTL logic family. Select one: O True O False 10 ___________ is an example of working hold device. A. Files B. Hacksaw C. C-clamps D. Mallet What is the concept of data fragmentation? What does it imply to say the data is fragmented? Can’t we utilise a Parent Class object in the Child Class and enjoy all of its features? Assume that a function throws an exception. What are the three functions that the function can perform? Figures in the book marked with an&sign morph into multimedia screentours, animations, and videos. True or false? Examine the differences between an internal cloud-based database management system and an external cloud-based database management system. Research cloud data backup best practices. Elaborate on one practice that makes the most sense to you. RAM or primary storage is often deemed as being non-volatile storage. Do you agree with this statement? Write a function which output all the prime numbers between 2 and a given positive integer ‘n’. Give a scenario/situation where data preprocessing is used? Discuss its impact on the situation. Subject- Predictive analytics How does C++ tell the difference between an overloaded prefix and postfix ++ or ?? operator function? What is the output of the given ruby code? boolean_1 = 77<78 puts(boolean_1) Nil True False Error Transcribed Image Text: Give two ways in which the list-processing capabilities of Scheme and Prolog are similar. Short Answers type questions: Q. What is The Short form of Bytes per second in Computer Science? How is the era of AI different from 50 years ago in terms of big data sets? What kind of utility application is meant to automatically save duplicate copies of your hard disk content? Write a program in perl language to call a subroutine which simply prints a strings of greetings. What are the issues with corporate networking? Describe the issues and the solutions to some of them. Describe the fundamental technique of segmentation. What distinguishes it from paging? What is the definition of compaction? Transcribed Image Text: QUESTION 1 Constructors are automatically inherited when we extend a class. O True False We send data over the socket by writing bytes to the Select one: a. InputStream b. OutputStream. What is the notion of overflow and underflow, and what are the causes of overflow and underflow? Which scheduling method, Preemptive or Non-Preemptive, needs the CPU to expend the most time and effort? Why? When a company has to inform residents or customers of a data breach, what should they do? Explain the primary distinctions between communication networks that use circuit switching and those that use packet switching. write a program in assembly language in emu 8086 that take input from user and do multiplication Examples are given in support of the claim that many-to-many connections cannot occur in a relational database. Transcribed Image Text: Which of the following operator cannot be overloaded? Select one: a.- b.+ C.:: d./ Prepare presentation on topic “Intellectual Property rights” kindly give me content with Headings so i make ppt Write program to print the given sentence is C langauge. “Learning how to print in C” . The DoDAF’s six step process is iterative.Justify this statement by explaining any three steps of this process…..ASAP the factors that need to be considered for successful strategic alignment of an organisation and project management Write C++ program to read 5 strings from user and print them by concatenation to one string. Short Answers type questions: Q. What is The Short form of Solid State Drive in Computer Science? Which JavaScript method is used to match a string against a regular expression? test Match Verify Check Transcribed Image Text: Q2:- write c++ program to read 4 floating ? number and find sum number What exactly is the purpose of shell scripts? Examples of variables, structures, and functions should be provided. What is the proper term for a user interface control that is linked to a data source? Transcribed Image Text: Most of the application layer protocols have standard port numbers O True O False Computer Science: The length of a word determines the number of bits necessary in a memory address. Java Transcribed Image Text: An exception thrown by a method is just an instantiated object. True False Illumination rendering What is the difference between ambient, diffuse and specular light components in the Phong model? Solve the problem below use De morgan’s Theorem (with solution) 1. ((a’ + bc)d’ + e )’ Explain the concept of a network database system, which is a database management system based on ownership. Following API’s are not Part of India Stack: a. eSign b. Digi Locker c. UPI d. WetSign Determine the 8-bit values in each register after the execution of the following sequence of microoperations. R1 Four page replacement methods should be named and described. Compare and contrast them in a critical manner? Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. Transcribed Image Text: Description : Q1: Distinguish between Short jump and Long Jump of 8051 Micro Controller. Queries is used to discover new added network node. A) Broadcast B) Anycast C) Multicast D) Unicast Which of the following is the first step in the software development life cycle: design or development? Transcribed Image Text: To calculate the average of a group of numbers, use the AVG True False Why are entity integrity and referential integrity important in a database? Give an example of each integrity? A file is a text file that contains data that has been encoded using a technique like What should you do if an inkjet printer prints with missing dots or lines on the page? How do you keep a user from changing the contents of a text box while it’s running? Discuss in detail the need for the following concept in relation to cyber security: Adversary behavioral identification Discuss the mathematical foundations such as mathematical logic, number theory, graph theory, type theory, and category theory What are the differences between the ways digital natives learn and the way digital immigrant teachers teach? Transcribed Image Text: Python Program to print all numbers in a range divisible by a given number. SUBJECT:SOFTWARE ENGINEERING Q1. What is the relationship between requirement analysis design and design modeling? Explain in details. write program in c++ to print even numbers between internal N and M by using for loop Explain why a 3-layer neural network having a hidden layer can solve the deficiencies of the perceptron. T/F: Binary Search can correctly determine whether an element is in an array if it is unsorted. Visualisation and storage of data Explain how each BI component may be used with a distributed warehouse. Some of the threats to data security include the following. Followed by a discussion of potential countermeasures. Data can be ________. a. analog b. digital c. (a) or (b) d. none of the above Is it true that data structures and algorithms are becoming obsolete in the age of Machine Learning? Write a program that takes ten integers from the input and displays them inversely in the output. ____ is the idea of passing on details (like data and behaviors) from one class to another. Write a C++ application to accept a number from a user. Find the reciprocal of the number Four page replacement methods should be named and described. Compare and contrast them in a critical manner? What exactly is routing? Describe the fundamental components of a router and the routing process in detail. What is a computer and what are the components of a computer system, along with an explanation? Convert the following frrom infix to postfix and prefix notation (A + B) / (C+D) – (D*E) What is the name of the instructions that the DBMS uses to perform operations on its data? What are the most important concerns to keep in mind while thinking about data backup and restoration? Write out the first 100 binary digits, first 50 octal digits and the first 50 hexadecimal digits. Give an example of why an index is only helpful if the attribute values are diverse enough? Which of the following is the valid variable name? a. $varb b. varc c. for d. 4abc What does the word “scalability” mean in the context of computers, and what precisely does it imply? Write a C++ program to find the sum of all 2 digit even numbers and print it. count a number of 1’s in an orbitrary list of numbers . In a scheme language, please In special case, the time complexity of inserting/deleting elements at the end of dynamic array is __________ The network benefits from the flexibility, agility, and implementation speed provided by virtual network functions in software. Here complete the query to displays the unique values of the column: SELECT ________ dept_name FROM instructor; What does the word “scalability” mean in the context of computers, and what precisely does it imply? A file is a text file that contains data that has been encoded using a technique like Write down all of the b. Text processing instructions, along with relevant examples from your personal experience. how many two character codez can be formed from one digits 7,8, or 9 followed by one 11. Which one is the Low Level Language: a) Assembly b) Visual Basic c) Java d) C++ Briefly explain any two types of inheritance that are supported by Java as an Object-Oriented Programming language. Give a brief description of TinyOS, the purpose of which is to be an embedded operating system. Help me writing the following program. Write a python program to get file creation and modification date. What are outliers? Write an algorithm, draw a flowchart and write a C++ program to find outliers. Here complete the query to displays the unique values of the column: SELECT ________ dept_name FROM instructor; What benefits will you gain from studying assembly language in terms of your grasp of operating systems? Rust Write a program to check whether a number is even or odd take number as 45 I need a written program with input of 3 integers and the output being the highest value. Transcribed Image Text: . List and explain the problems that arises while testing and maintaining O0 software. None Transcribed Image Text: Write a program to display current time and date of your system Java Explain the primary distinctions between communication networks that use circuit switching and those that use packet switching. Support the following statement: “DSDM is a user-centered system with two critical responsibilities on the user’s end.” Who should determine and prioritize the critical applications? How is this done? How frequently is it done? Mention all protocols and explain If we need set up file in 1000 pc fastly without effort The file pointers for the three streams that are opened automatically when program execution begins are named______________________________________ What do you mean by binding? Give examples of some of the bindings and their binding times. Computer Science: Provide an overview of assigning of people and resources to each activity in the WBS. Transcribed Image Text: 29. System requirements describe in details how the system do its operations* True False 28. Cryptography technique is used in ________. a. Polling b. Job Scheduling c. Protection d. File Management When a notebook internal device fails, what three options can you use to deal with the problem? Write a program in java to check whether a number is oddor even using bitwise operator only. Computer Science: Discuss about the two key types of security policies and procedures established inSarbanes Oxley audit. Reduce the following grammar G to chomsky normal form. G: S? aAD A? aB/bA? B?b b? d. List the steps to recycle the connection to an ISP when using a cable modem and router Provide a thorough explanation of the major security management concepts and the underlying principles of security management. What three indicators in Task Manager can be used to find which program has a memory leak? In order for a programme to make use of a file, it must go through three stages. Find the sum of the following series S=10+20+30+…+N Note: design the interface and write properties visual basic HTTPS combines with SSL to enable secure communication between a client and a server. Explain its operation. 4.1 Explain how semaphores can be used by a server to limit the number of concurrent connections. A pure virtual function is a virtual function that causes its class to be abstract Cpp True/False Find any errors in the following function definition: void fun (int, x) { return; } // fun Transcribed Image Text: Find a regular expression for L = {ab”w: n2 3, w e {a, b}*}. Create an equivilent DFA for the given NFA Transcribed Image Text: a,b a b qo q1 q2 What is physical security, precisely, and why is it so important in today’s society, you may wonder. The Diffie-Hellman algorithm is a method of sharing a secret session key in the field of cryptography. How will you know the type of picture or graphic image that you are going to use? When a notebook internal device fails, what three options can you use to deal with the problem? Transcribed Image Text: METAR FOR: RPLL 060600Z VRB02KT 9999 SCT023 OVC100 30/24 Q1006 RERA NOSIG RMK A2971 write a program to output the square of odd integers between 1 and 50 using FOR/NEXT statement What methods can you use to tell the difference between fabricated and authentic material on the internet? Draw the structure of bus system that runs through different processor registers and conducts data between them. Write a program in java To pass null argument with method overloading with string and object type Transcribed Image Text: A star algorithm is a local search algorithm. Select one: O True O False 1.Convert to binary form (a) 8AD5917, (b) B27D.A9C16. 2.Convert/Replace each hexadecimal digit number by its 4-bit representation Write a C++ program to Close Handle of a file run the program and screenshot the output Transcribed Image Text: List out five important features of UNIX Operating System and explain them in short. Does every process have the same mapping of virtual memory addresses to physical addresses? Explain your answer. Imagine that a file block is located at disk block 581132. What does this information tell you? With bank fraud what are the security vulnerabilities that are exploited and how to prevent been exploited? Compare and contrast the features and functionalities of three ERP software packages offered by the ERP vendors. What are the issues with company-wide networking? Describe the issues and possible solutions to some of them. C++ write a program to print the addition of two number and these number taken from user Do you believe that Google makes people stupid? Cite at least three examples to support your assertion. The five distinct phases of the systems development life cycle are highly structured. What is their origin? 117. A consumable resource is one that can be a. Access b. Count c. Created d. Control – Show Instruction Pipeline architecture and evaluate the pipelined and non- pipelined architecture. Use diagrams to explain. When comparing a high-level language to machine language, what does it mean to have a one-to-many relationship? 2 – The World Wide Web is the same thing as the Internet (capital “I”). True False What are the techniques of data security that comes under software based security method? Discuss in detail. What exactly is it that the fundamental ideas of software engineering do not take into account? explain? A hybrid computer uses a Modem to convert digital signals from a computer into analog signals. Explain? Provide the considerations for developing a system interface that is concerned with the beginning of information presentation. Is it true that data structures and algorithms are becoming obsolete in the age of Machine Learning? Transcribed Image Text: What are the two forms of ILP and what are the distinctions between them? Explain what other options can a business have if they are unable to afford any Cyber insurance? None Transcribed Image Text: Rust program Write a program to print odd number between 1 to 100. A(n) is a unique form of class member that enables an object to store and retrieve data. In a database, related fields are grouped to (A) File (B) Bank (C) Menu (D) Data record Short Answers type questions: Q. What is The Short form of Digital Audio Tape in Computer Science? A computer program is created by converting an existing solution. What is the name of the process? Correct and detailed answer will be Upvoted else downvoted Write a C++ Program To Create Empty Class Transcribed Image Text: A tuple may contain objects from user-defined types. Select one: O True O False In order to temporarily shut down the computer, what options does the user have to choose from? Discuss the services provided by operating systems and the three interfaces via which they provide these functions. Short Answers type questions: Q. What is the Short form of Digital Versatile Disk in Computer Science? 323. A program is an active entity. a. True b. False c. May be d. Can’t say Which instruction is executed immediately after the BRA instruction? A. BEQ. B. TST. C. CLRA. D. WAI. In a positional numbering system, the____________ separates digits representing whole number quantities from digits representing fractional quantities. 19. Asynchronous Transfer Mode is ______________technology. a. Narrow band b. Packet switching c. Circuit switching d. None What can auditing and accountability do to enhance an IT infrastructure’s overall architecture? If possible, provide examples. Which of the following is not a digital-to-analog conversion? a. ASK b. PSK c. FSK d. AM What methods can you use to tell the difference between fabricated and authentic material on the internet? Which of the following is not a digital-to-analog conversion? a. ASK b. PSK c. FSK d. AM Write C++ program to print numbers which are multiple of 8 in the range 1 to 100. 1. Draw the programming model of 8086 Microprocessor Note: Please do not write any things only draw. When opposed to custom software development, what are the main advantages of the application system reuse approach? Experiment with all of the many data request situations that may occur in a distributed database system. ________ uses 1550-mm single mode fiber. a. 10GBase-S b. 10GBase-L c. 10GBase-E d. none of the above Consider the function of software quality assurance in software development and create/produce a brief talk about it. q7) Which of the following is a Data structure? a. Stack b. boolean c. integer d. Char How can an IT professional tell when a UML diagram is correct and not just visually pleasing Which technique do you consider the most effective in gathering user requirements? Demonstrate your justification in detail. What are the functions of each of this infographics. Process infographics. Geographic infographics. Comparison infographics. erarchical infographics. Q4- Define software testing and is testing can only detect the presence of errors, not their absence? 6. Briefly discuss the extent to which insiders or “frenemies” may pose security challenges to the organization. Write a pseudocode that will request the user to input his/her name, then displays his/her name afterwards. Different approaches to security management, as well as the ideas that underlie them, should be thoroughly examined. Explain how the operating system might transition from User to Kernel Mode based on your own assertions. Short Answers type questions: Q. What is the short form of Function as a Service in cloud? Create a simple chat using sockets in C# just need the code, no need for any explaination Can you explain in 350-500 words why NLP (Natural Language Processing) is useful in evaluating financial news? Would you utilize today’s internet as a resource to help usher in a new age of innovation? 3. Write a JavaScript program to get the largest even number from a given array of integers. Transcribed Image Text: Write the HTML and associated JS to write the contents of a HTML element. Is it possible to list some of the most important factors that contribute to effective cyber defense? Do you believe that Google makes people stupid? Cite at least five examples to support your assertion. The term used to define all input and output devices in a computer system is Hardware explain? Which port type produces the highest quality output, a composite out port or an S-Video out port? Different kinds of operating systems may be distinguished by providing various operating system services on a computer. The Fifth (5th) Generation of Computers are regarded as ‘Thinking Computer’ Explain this statement with suitable example/s Transcribed Image Text: Find a grammar that generates language L = {a”bm,m > n,n > 0 }
What is a distribution channel and why is it important to installing a Windows Desktop Operating System?
Short Answers type questions: Q. What is The Short form of Common Command Set in Computer Science?
the value of factor(P/F,i,10) can be found by getting the factor values for(P/F,i,4) and(P/f,i,6)and adding it to
Since computers can’t be progr ammed in natural human language, algorithms must be written in a(n) ________language.
Which of the following elements of U(14) doesn’t generate U(14)? 11, 3, 5, all of the above?
Is the concept of algorithms, complexity, and data structures still relevant in the era of Machine Learning?
Which of the following malware requires a user action to be move from one computer to another?
If you try to add a double, a short, and a byte, you will get a (n)
When using a Label control, what property can you utilise to change the appearance of the text?
State the Difference between Context diagram and diagram 0. Which symbol is not used in Context diagram?
Transcribed Image Text: 21
Fully describe the anatomy of a Hard Disk Drive (H.D.D)
Enter your answer
c) Write a Java program to print the string shown below using the string “Java” only. “JavaJavaJavaJava”
If you try to add a double, a short, and a byte, you will get a (n)
338. An interface that is implemented while using threads. a. java.lang.Run b. java.lang.Runnable c. java.lang.Thread d. java.lang.Threads
Do mobile devices and portable computers differ in any way? Give an example to demonstrate your point.
Discuss the software acquisition strategy that you would recommend for a hospital; and provide justification for it.
Give a brief description of TinyOS, the purpose of which is to be an embedded operating system.
Php Write a program to take user input and check whether that number is palindrome or not.
Is it possible to list some of the most important factors that contribute to effective cyber defense?
which the following tag responsible for displaying the HTML page. *
p
html
head
body
title
style
Briefly outline the purpose five symbols used in flowcharts designing with respect to software design and modelling.
250. Secure system concerned with protecting the system against a. User b. Security c. Interruption d. Damage
Describe the techniques of session hijacking. In what way can you fend off an assault like that?
When designers attempt to extract interactive system requirements from novice and expert users, numerous problems may arise.
What methods can you use to tell the difference between fabricated and authentic material on the internet?
Short Answers type questions: Q. What is The Short form of Digital Visual Interface in Computer Science?
What approach would an organization propose and defend if it has to share the Secret key securely?
Does the order in which parameters are given important when calling a function that takes multiple arguments?
Short answer type questions: Q. What is the short form of Visual Display Unit in Computer Science?
In what ways are the POP and IMAP email accessing protocols different from one another in operation?
Give a Finite Automaton of the language, over alphabet {a, b}, of strings that end with b.
Multiprocessor systems make shared memory access feasible. These sorts of processes are uncommon in clusters and grids.
What exactly is it that the fundamental ideas of software engineering do not take into account? explain?
Provide the considerations for developing a system interface that is concerned with the beginning of information presentation.
From the perspective of the software manufacturer what are the advantages and disadvantages of frequent software upgrade
Transcribed Image Text: Decode given numbers with the help of decoder logic gates.
?. 375
b. F-?(1,3,4,6)
Draw Use Case Diagrams for using QR Code in university library system and explain them in scenarios
What is immediately created and presented in the Designer when you start a new Visual C# project?
Discuss the services provided by operating systems and the three interfaces via which they provide these functions.
What benefits will you gain from studying assembly language in terms of your grasp of operating systems?
Is it still important to have strong data security in the digital age? Give a brief explanation
Your task is to use for loops to display only odd natural numbers from 1 to 99
Transcribed Image Text: Convert the following to decimal, 8. 204 × 10°
820400.0
0.00008204
82040.00
0.000008204
8204000
What is the “Northbound Interface (NBI)” of a Software-Defined Networking (SDN) Controller? How it can be used?
What is the name of the Intel technology that enables a CPU to simultaneously manage two threads?
How long is the sub-key that is used in each round of DES? 32 56 48 64
Monitor design ensures that only one process can be active at a time within the monitor why?
PLEASE HELP! Transcribed Image Text: Transform the following CNF expression into DNF expression:
¬ (X+Y) (¬X+Y+Z) (¬Y+¬Z)
Which of the following commands will allow you to set your Telnet password on a Cisco router?
Cache memory is used to store frequently accessed data. Here are some of its characteristics and examples.
Briefly differentiate between Elaboration activity of Requirement Engineering and Analysis Modeling activity of software development life cycle.
Each TextField has a text property that’s returned by its textProperty method as a(n) ———— (package———– javafx.beans.property).
What are IP classes and how can you identify the IP class of given an IP address?
Describe the order of magnitude of each of the following functions using Big-O notation: 5Nlog2N + 3N2
Give examples of physical education activities in your experience. Which of these do you like best? Why?
Write a python program that takes input two integers a and b and print b-a in output.
How to convert a string to a character array in kotlin. Please write a program for. That.
For the subnet mask bits /24, what is the number of /25 subnets? a.1 b.2 c.4 d.8
In at least 60 words What are the steps to link to a document on your computer?
What member functions aren’t passed down via inheritance? If so, then which ones are you referring to?
What is the role of a query optimizer in the selection of an optimal set of indexes.
Write a java program to Apply the Binary Search method to find a target using Recursive method.
Classify the following sentence as True or False: Reichenbach’s causation definition solves the problem of Alternative Explanations.
Give any example which describes the software crises due to design.Exemplify the developer myths with suitable scenario
Briefly explain any two types of inheritance that are supported by Java as an Object-Oriented Programming language.
Do SSL and TSL vary in any way, shape, or form? Is there a difference? Please explain.
The value of a comma expression is the value of the first expression. a. True b. False
Which series of documents defines, explains, and regulates the implementation and arrangement of the TCP/IP protocol suite?
Short Answers type questions: Q. What is the short form of Platform as a Service in cloud?
What steps are involved in determining if a method call is being made to the right method?
The property is the only one that is needed for the basic Linked List class to function.
A(n) _______ is a special constructor, called whenever a new object is initialized with another object’s data.
Is it possible to list some of the most important factors that contribute to effective cyber defense?
A stakeholder is anyone who will purchase the completed software system under development. 1. True 2. False
None Transcribed Image Text: the present continuous can used with a
planned future arrangement
true
False O
What is the name of the memory cache that is on the same die as the processor?
1. What is ATIS? 2. What are the content of Voice-ATIS Broadcasts? 3. Differentiate ATIS and METAR.
Transcribed Image Text: (b) Using Boolean Algebra, reduce the following term:
Z = (BC + A(BC +C))(4eC)
A(n)____________system is a set of hardware, software, data, people, and procedures that work together to produce information.
how to run a code on ms visual studio and how to connect sql to your asp.net?
________ uses short-wave 850-nm multimode fiber. a. 10GBase-S b. 10GBase-L c. 10GBase-E d. none of the above
Write a multiple assignment statement that assigns 20 to the variables sum, total, number1 and number 2.
Differentiate with your own understanding the scientific, decimal and engineering notation and give example in every notation.
When the motherboard USB port does not work, what task can you perform to resolve this issue?
Define a recursive function that will add the sum of of the numbers in a finite sequence.
What is the purpose of a link editor? How is it different from a dynamic link library?
In a few words, what does software engineering aim to achieve? What do you mean by that?
Explain how the operating system might transition from User to Kernel Mode based on your own assertions.
None Transcribed Image Text: 19.CALL [BX] is :
a. Near call
b. Far call
c. Indirect call
What are two reasons to tie cables up and out of the way inside a computer case?
Transcribed Image Text: will be set whenever there is a carry from lower nibble to higher nibble.
Design the CRC cards for an inventory system for a car dealership, using brainstorming, filtering, and scenarios
The physical layer translates logical communication requests from the data link layer into hardware specific operations. why?
is the smallest operational unit that competes for system resources, and it is responsible for the job
What is the most relevant approach available to database designers to impact database efficiency in particular applications?
The Fifth (5th) Generation of Computers are regarded as ‘Thinking Computer’ Explain this statement with suitable example/s
The maximum payload of a TCP segment is 65,515 bytes. Why such a strange number was chosen
Transcribed Image Text: Help
Hadoop Programming
Explain in detail about the ways of packaging pig programs.? “
Construct parsing table for given grammar and determine whether given grammar is CLR or Not S->AA A->aA/b
Explain why intrusion detection and prevention (ID&P) is such an important component of network protection and cybersecurity.
In Java- Write a program to take input a string and find its lenghth using loops only.
Analysis of micro-instruction format to allocate 36 bits for each component with the primary function is required
A file is a text file that contains data that has been encoded using a technique like
Develop an understanding of key tools and processes that will be employed throughout the system development process.
.What is sandwich integration testing? Name the factors used for handling practical approach to adopt sandwich testing.???
What exactly is routing? Describe the fundamental components of a router and the routing process in detail.
What is the term of the Intel solution that allows a CPU to simultaneously take multiple threads?
Consider how cooperation could be affected if the cloud computing trend had any impact on the workplace.
In the context of Hamming Error correction, what is a check bit and what is its significance?
Is it still important to have strong data security in the digital age? Give a brief explanation
Discuss at least three cloud service best practices that businesses may employ to keep their data safe.
When comparing a high-level language to machine language, what does it mean to have a one-to-many relationship?
What is an expert system, and how does a data warehouse assist in the creation of one?
A stand-alone system which produces one page of printed output at a time is Page printer explain?
In detail, describe how SQLiteOpenHelper and SQLiteCursor are used for CRUD (create, read, update, and delete) activities.
In what way has Facebook caused you to stop using it because of a serious privacy issue?
Give examples of four different types of networking software. Which educational and scientific purposes do they serve?
* * * * * * * * * * * * * * * In kotlin
A(n)___________can be used to convert f printed documents, such as a drawing or photograph, into digital form.
Explain why direct memory access (DMA) is regarded as a cost-effective approach for I/O is being performed.
Transcribed Image Text: ?The
–instruction copies data from one location to another
camper
copy O
mov
inc
Experiment with all of the many data request situations that may occur in a distributed database system.
What is the history of the internet of things and what are some of its current uses?
A datum that indicates some important state in the content of input or output is Sentinel why?
i need the answer quickly Transcribed Image Text: Reports for hush function example
in C++
e 3:28
JAVA Write a program take an charcter from user and print the ascii value of that character
CryptoGraph And Network Security Draw the IP security authentication header and describe the functions of each field.
Image Processing Why use the CYMK color model instead of the RGB color model for blow ups?
What is the output of the given ruby code? boolean_1 = 77<78 puts(boolean_1) Nil True False Error write a recursive method to schedule compatible activities that result in the maximum usage of the room. Which is greater between 0 and minimum of double data type. Give answer with proof. In java Short Answers type questions: Q. What is The Short form of Optical Character Reader in Computer Science? Which log in Event Viewer would you use to find out about attempted logins to a computer? q19) Summarize the Man In The Middle attack and also give one real world example of it. Are there programming languages that do not implement templates or generics? Write an article of this subject Vibrant ecosystem of third parties would be critical for achieving broad adoption of an eclipse. True False What command can tell you if two computers on the same network have the same computer name? When implementing IT security for a conventional on-premises data center vs cloud computing, what are the distinctions? When a Java applet is shown, the browser calls the to translate the bytecode into machine language. Experiment with all of the many data request situations that may occur in a distributed database system. Write a program in JavaScript to find intersection of two arrays and you have to print that Transcribed Image Text: How many 2-to-4 line decoders are required to design one 4-to-16 line decoder? Os Transcribed Image Text: 7. Assuming that EAX=00000010H, EBX=00000100H, and DS=1000H, what happens if XTAL instruction is executed? How can I verify if a USB port on a laptop computer supports the USB 3.0 standard? Write a program in C language to show how to take input a string and print it. Explain the definition of Software Engineering What are the three components of the paradigm of software engineering Which of the following algorithms is NOT a divide and conquer algorithm: 1.selection sort algorithm 2.quicksort 3.mergesort A DIMM that contains memory chips in two memory banks on the module is said to be___________. python write a program to find a random number between the range and range taken from user Linux: The command to mount all filesystems specified in /etc/fstab excluding those with the noauto option is… Give correct solution else will downvote Define Data node. How does name node tackle data node failures? A distributed network configuration in which all data/information pass through a central computer is star network explain? What is the use of break keyword. Transcribed Image Text: What is the use of break keyword. Transcribed Image Text: List all integers between-100 and 100 that .are congruent to -1 modulo 25 ?????? What is the difference between Process and Threads, and which is more profitable? Please include a justification! 120. A _____ is anything that can cause harm. a) vulnerability b) phishing c) threat d) spoof Which goals does authentication serve? Compare and contrast the advantages and disadvantages of various forms of authentication. Write a program in perl to get the system time and date and print that on console What are two reasons to tie cables up and out of the way inside a computer case? Write a program to implement insertion sort and also test this using an unsorted array in java The.NET Framework has a class called that includes a number of methods for conducting sophisticated mathematical calculations. What is the path and filename of the Windows paging file that is used for virtual memory? Here complete the query to displays the unique values of the column: SELECT ________ dept_name FROM instructor; When does a user need to enter a password into the UAC box in order to continue? Are memes in online platform created a more harmonious or a more divided society? Justify your answer to get the targeted results, either blocks, deletions, or authorizations are carried out for the material. fingerprint Using the concept of Elliptic Curve Cryptography, find the value of 2G given that G is (2,7) Design a digital lock that unlock a briefcase which is protected by code 010, using Moore machine Discuss TWO modes of operation that allows the operating system to protect itself and other system components. Compare the uses of writing a self-contained script in MATLAB versus definition of a custom function file. Transcribed Image Text: : The server can be categorized as Network item mainframe item Personal computer item Question 1 a)Perform 18 + 42 using 2’s Complement method. b)Perform -20 -5 using 2’s complement method. (100 N3+N and 10 N) has a Big-Oh of N. Choose one: Is it true or false? Repeater function in the …………………. layer. a. Physical b. Data link c. Network d. None of these ___________ensures that only authorized parties can view the information. a. Confidentiality b. Availability c. Integrity d. Authorization When a notebook internal device fails, what three options can you use to deal with the problem? 57. Window 98 was an improved version of Windows a. 95 b. XP c. 2007 d. 2000 The read position advances forwards, towards the end of the file, as things are read from it. What benefits will you gain from studying assembly language in terms of your grasp of operating systems? If you wish to read data from a text file, what kind of object should you make? This appears at the beginning of a method definition. a. semicolon b. parentheses c. body d. header Provide a thorough explanation of the major security management concepts and the underlying principles of security management. Can’t we utilise a Parent Class object in the Child Class and enjoy all of its features? The Fifth (5th) Generation of Computers are regarded as ‘Thinking Computer’ Explain this statement with suitable example/s Short Answers type questions: Q. What is The Short form of Network Management System in Computer Science? Write a python program to print a string 10 times. String = this is a python program Describe the many components that make up an information system. Where does one fit into this system? Transcribed Image Text: Enter the Single Precision Floating Point (SPEP) in hexadecimal for the decimal value -14.5. 51. Ctrl, shift and alt are called _________ keys. a) adjustment b) function c) modifier d) alphanumeric Transcribed Image Text: What is the minimum and maximum height of a binary tree with 10 nodes? Transcribed Image Text: How can i count the number of lines in a script file using php List and briefly explain three different kinds of reports (outputs) that may be generated by a system. How fast should you record normal music and what sample rate and bit rate should you use? If a program includes user-defined functions, why is it necessary to provide function prototypes in the program? Explain why intrusion detection and prevention (ID&P) is such an important component of network protection and cybersecurity. Convert the following base 10 number to IEEE floating point. Show your work. -63 * 2 -11 C++ Write an expression to access the last character of a string class object str (not C-string) With an example and graphic, explain the difference between client/server and peer-to-peer architecture. To put it simply What are the three methods of traversing a binary tree? What is the difference between these methods? Write a SQL query to find the highest salary from the table Salaries (E_ID, E_Name, E_Post, Salary). Transcribed Image Text: b- What is the minimum sampling frequency in hertz for the following signal x(t)=sin(4041t). 19. A group of related fields, is known as a. file b. tuple c. records d. schema Short answer type questions: Q. What is The short form of Video Graphics Array in Computer Science? Explain why you would prefer an interactive communication model to linear communication model in group context exchanges. HTTP, SMTP, and POP3 utilize TCP instead of UDP as the underlying protocol for the transport layer. Computer Science: Discuss about the two key types of security policies and procedures established inSarbanes Oxley audit. What are the issues with company-wide networking? Describe the issues and possible solutions to some of them. Transcribed Image Text: scoded Toansmission. Give the comparison of error Rates in Caded and noded ToaAn simission. 1) Take input two numbers from user and print them in ascending order in output. Language- PHP Transcribed Image Text: 5. Write a C++ program to count frequency of number x in an array. In what way has Facebook caused you to stop using it because of a serious privacy issue? Transcribed Image Text: 1 Ruby Programming Language 2 Print “ruby is best language” using loop 15 times Q#4. Write JAVA Program to print following output. 3 3 6 9 15 24 39 NOTE:SUBJECT:JAVA PROGRAMMIMG What are the hardware mechanisms to help the operating system ensure correct operation of the computer system. Q.No. 4: Explain Data Mining and types of information obtainable from data mining? kindly details explantion please Simplify AB + B ( A + C ) + A ( A + C ) Answer= In order to temporarily shut down the computer, what options does the user have to choose from? make an animation of delivery boy who is moving, add some sound effects and colors using c++ Write a C++ program to check whether the triangle is equilateral, isosceles or scalene triangle.(using c++ only) Number of ways you can arrange the top 5 items out of 10 items on a menu. The process of using the older objects and components to build new applications is termed as ?. Software development questions Transcribed Image Text: The symbol to represent package visibility is the O- O # A confusion matrix based on one particular cut-off probability can determine the entire ROC curve. True False Short Answers type questions: Q. What is The Short form of Low Level Language in Computer Science? w.J write the s Transcribed Image Text: write the code for Fascinating number in java 2. 5. Q- Why coding conventions are important? Compare the coding conventions of JAVA. Subject: Software Design and Architecture What do yo? think are the challenges in the implementation 0f the K-12 in the Philippines c?rriculum? Explain Software Configuration Management and Its need. The answer must include following details: Different configuration management concepts A(n) is a unique form of class member that enables an object to store and retrieve data. A table ___________ pulls data from one or more database tables and passes it to your program Transcribed Image Text: What is the non-IT manager’s responsibility for IT infrastructure and information systems in general?” Rewrite the following expressions in java code ? = ????? where a and b are real number E-commerce sales are affected by green computing. What is green computing, and how does it affect them? When it comes to TCP and UDP, what’s the difference? Differentiate between these procedures in four ways. Explain the following by using an example: 1. Events and current status; 2. Interface and dialogic interaction what are the different methodologies that an organization can adopt to implement a new system? explain each. how can you convey to pupils two (2) potential advantages of utilizing social media for educational purposes? Do you believe our capacity for abstyract thought is influenced by our language skills? justify your answer Explain why intrusion detection and prevention (ID&P) is such an important component of network protection and cybersecurity. Create class name ForLoopActivity and write a program to produce number pattern decreasing 9,7,5,3,1 using for loops Induction Decision Trees are prone to Overfitting. Describe any three ways to avoid or resolve this problem. Why isn’t the “store-and-forward network” method used in general communications these days? Also, explain how it works. When opposed to custom software development, what are the main advantages of the application system reuse approach? State True or False and also give explanation. Spark is succeeding MapReduce in the Big Data world In a Phased Conversion one module of the new information system is activates at a time. why? Transcribed Image Text: 4) Draw the symbols and write the truth table of all the logic gates. Which cat command is used to create empty files? i. cp ii. cat iii. touch iv. create Write SQL query to find total number of students in table : Class11( RollNo., Name, Section, Marks) Write a program in perl to get the system time and date and print that on console Transcribed Image Text: Evaluate the following postfix expression using stack. 823+ – 382/+* 2+6 A BI – Transcribed Image Text: Please Prove whether it is True or False. There are finitely many finite languages. Why is data security a concern? After that, talk about how to deal with threats like this. 5 Ways Tech startups can benefit from Open Innovation Partnerships with established companies in the “tech space”. What exactly is the purpose of shell scripts? Examples of variables, structures, and functions should be provided. The limited software installed on the client devices makes the security high in the .. . architecture. You’ve launched a thread, but want to know when it actually starts running. coorect pls in py Web1.0, Web 2.0, Web 3.0 Compare and Contast the implications of varied online platforms, sites and contents. Design a digital lock that unlock a briefcase which is protected by code 010, using Moore machine Transcribed Image Text: In a function call, the actual parameters are separated by commas semicolons colons spaces Short Answers type questions: Q. What is The Short form of Network Management System in Computer Science? Transcribed Image Text: C++ I program to check whether leap year or not take year from user What is the history of the internet of things and what are some of its current uses? Find any errors in the following function definition: void fun (int, x) { return; } // fun Transcribed Image Text: Java program to print the following given pattern Pattern: 5432* 543*1 54*21 5*321 *4321 By the help of a labelled diagram describe the three (3) steps involved during a man-inthe-middle attack. Explain why direct memory access (DMA) is regarded as a cost-effective approach for I/O is being performed. Transcribed Image Text: “Generality versus Efficiency” is one of the fundamental problems of Al. Discuss it briefly. Transcribed Image Text: What is an expression that has a Boolean value? Predicate Postdicate O Precondition Postcondition This refers to the accuracy and trustworthiness of information. a. Confidentiality b. Integrity c. Security d. Availability Draw the structure of bus system that runs through different processor registers and conducts data between them. What is the name of the instructions that the DBMS uses to perform operations on its data? Explanation of Virtua __________.l-8086 Mode is the process of matching a method call with the proper method. Using a recursion tree and iterative substitution. Transcribed Image Text: Tm) 3 2T (?/2) + lg n Network _____________ refers to the way in which the computers and other network devices are linked together An input device which can read characters directly from an ordinary piece of paper is OCR why? Cmdlets are lightweight commands used in the__________________ Shell environment. a. Korn b. Bash c. Power d. C What tools are used in forensic investigations to review what occurred on a targeted system or device? Transcribed Image Text: (A)Find the following: 1- (110)10+ (0111)2.by using BCD numbers. 3- (3E91)16-(1F93)16by using BCD numbers. What are the current trends (best practices) in artificial intelligence and machine learning aimed at preserving privacy? Write a program to demonstrate Point-to Point communication between 2 processes using MPI synchronous send and receive Transcribed Image Text: (2) „Ehäi Vlink attribute used for set the color of visible link True False Discuss why HCI has ‘borrowed’ from other disciplines AND illustrate with examples from at least two disciplines Why don’t we allow an LP to have < or > constraints? Why <= or >= constraints?
Q. Write an OpenGL program (in C++) which uses supersampling to implement antialiasing for drawing a triangle.
Explain the many kinds of software testing processes that are used in the field of software engineering.
What’s the difference between a mainframe and laptop operating system? How are they comparable to one another?
If you wish to read data from a text file, what kind of object should you make?
A (n)_________is any computer that provides services and connections to other computers on a network.a.Hostb.Clientc.FTPsite d.Subject directory
sequential file organizations is most efficient for a file with a high degree of file activity why?
how can you convey to pupils two (2) potential advantages of utilizing social media for educational purposes?
Transcribed Image Text: In Nonpreemptive decision mode a running process can be interrupted.
Select one:
a.TRUE
b.FALSE
What happens if you don’t enforce referential integrity in your database? What errors are likely to occur?
How viewstate is different from postback? Support your answer with the help of asp.net page life cycle.
361. ____________ is one or more physically contiguous pages. a. Slab b. Cache c. Object d. Allocator
Plotter output device is used for translating information from a computer into pictorial form on paper. Why?
The joining of two or more tables is frequently required while executing database queries. That’s what happened.
What are the most important concerns to keep in mind while thinking about data backup and restoration?
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is used in Wireless LANs.
Select one:
True
False
Support the following statement: “DSDM is a user-centered system with two critical responsibilities on the user’s end.”
If you try to add a double, a short, and a byte, you will get a (n)
Why do you think most real-world sorting (i.e., C++ Sort) implementations use some form of quick sort?
Write an example instruction that will subtract the value contained in data location X to register R.
Is it true that data structures and algorithms are becoming obsolete in the age of Machine Learning?
TASK: Prepare a wireframe for the home page of International Islamic university
attendance management system (student view).
Identify and with practical examples give the different types of languages that are available in the DBMS?
Fill in the blank: A(n)________specifies how a class member can be accessed by code outside the class.
Make an application that save information. That information will be further used in activity for necessary action.
PHP language- Prompt the user to enter two strings and in output print the lexicographically larger string.
Write a recursive function that sorts an array using selection sort algorithm ** in C++ please. Thanks
Short answer type questions: Q. What is The Short form of Power Supply Unit in computer science?
Why UDP is not a suitable option for Email application? Explain the working of SMPT in detail.
A file is a text file that contains data that has been encoded using a technique like
6. Which transmission mode should be used to send information from a single point to another point?
Transcribed Image Text: 3. What is the binary equivalent of the largest number on the Thumbwheel Switch?
Perform a configuration of SSH in Cisco Packet Tracer. Note : Share all screenshot while performing this
What is the name of the instructions that the DBMS uses to perform operations on its data?
What are the advantages of Remote Procedure Call (RPC) over socket programming. List at least three advantages.
Which is better to destroy sensitive data on a hard drive, a low-level format, drill, or degausser?
Is it true that data structures and algorithms are becoming obsolete in the age of Machine Learning?
The property is the only one that is needed for the basic Linked List class to function.
write the answer step by step Write a note on D Latch. Differentiate between Latches and flip-flops
What exactly does the phrase “critical consideration” imply? This is true in the area of software engineering.
Binary search can only be performed on a/an ………… Sorted array/list Random array/list Any array/list Disordered array/list
What is a computer and what are the components of a computer system, along with an explanation?
Give a brief description of TinyOS, the purpose of which is to be an embedded operating system.
4. Windows is the most popular product of a. sun system b. microsoft c. hewlett d. ANSI
What is the word used to describe a software application that is out of date or obsolete?
List the steps to recycle the connection to an ISP when using a cable modem and router
Which is better to destroy sensitive data on a hard drive, a low-level format, drill, or degausser?
Identify the Venn diagram that illustrate the relationship between A ? B and B ? C .
What exactly is a business rule, and what does it serve in the context of data modelling?
Please answer the following question in detail, experts. What are the many architectural types in software engineering?
When opposed to custom software development, what are the main advantages of the application system reuse approach?
A strongly-typed data type implementation supports strongly-typed data, whereas a loosely-typed data type implementation supports loosely-typed data.
If a computer uses microprogrammed control, the microprogram determines the instruction set for the machine.True or false.
make a code related to debugging in python and take a picture also send it to me
Why isit important to minimizeflooding of control packets in Adhoc Networks and how MPR achieves it? (
Describe a situation in which smart cards are necessary for authentication but magnetic stripe cards are insufficient.
5d. Which of the following is the bitwise operator? i) . ii) * iii) :: iv) ~
Why don’t we allow an LP to have < or > constraints? Why <= or >= constraints?
Write a Matlab program to compute the following sum ?1/i 2 , for i=1, 2, …, 10.
Consider how cooperation could be affected if the cloud computing trend had any impact on the workplace.
Write a function: int square(int x) which returns the value of square of the number. In C++.
Ethernet implements the Frame Check Sequence (FCS) using a technique called Cylic Redundancy Check (CRC).True or False.
Is it possible to list some of the most important factors that contribute to effective cyber defense?
What member functions aren’t passed down via inheritance? If so, then which ones are you referring to?
Short Answers type questions: Q. What is The Short form of Industry Standard Architecture in Computer Science?
What is the nature of software programmes and how can their information be distinguished from one another?
Transcribed Image Text: Write aigorithm to accept salary of a person for 4 months and calculate
average.
Cache memory is used to store frequently accessed data. Here are some of its characteristics and examples.
29. Banker’s algorithm deals with a. deadlock prevention b. deadlock avoidance c. deadlock recovery d. mutual exclusion
Which scheduling method, Preemptive or Non-Preemptive, needs the CPU to expend the most time and effort? Why?
True or False odd integers and even integers as a Union is equal to a null set
When a Java applet is shown, the browser calls the to translate the bytecode into machine language.
Explain how the idea of least privilege is applied differently in the operating systems UNIX/Linux and Windows.
When used with I/O devices, the term intelligent implies feature to support offline and online tasks explain?
What is Greedy Algorithm in data Structure , explain and also provide example of the same ?
What effect does the sudo iptables –policy INPUT DROP command have on the access to computing resources?
True or False To store items in a ListBox, you add them to the control’s Text property.
Dear experts not management question Cse related qn Develop an unambiguous grammar that describe the( if statement)..
Cache memory is used to store frequently accessed data. Here are some of its characteristics and examples.
It is possible that there is a relationship between cohesion and coupling principles and effective software design.
A SATA-style voltage regulator on a motherboard might have had a purpose, but what could it be?
Transcribed Image Text: The value of the two-byte two’s complement value OXFF72 is:
-28
-84
-128
-142
Find the Sum of the Digits of the Number Recursively Write a python program for this statement.
4. Defne Use case diagram and its elements. Draw use case diagram for the class attendance system.
Write a program in F95 language to declare any random string with any length and print it.
Write an example instruction that will subtract the value contained in data location X to register R.
@ Give Answer in table format Give unsigned compare conditions between two variables i.,e (i – j)?
Write a grep command that will match all words in a file that have exactly one ‘a’.
What is Vulnerability Assessment, define the term and use specific details and examples to illustrate its meaning?
Cache memory is used to store frequently accessed data. Here are some of its characteristics and examples.
When you are developing a database, there are different stages involved. Explain any four of these stages.
The process used to set up a programs once the system is operational is Boot strap explain?
terminal is required when more than one person uses a central computer at the same time why?
Suppose you have given a project about Hostel management system. write case study on hostel management system.
What exactly is it that the fundamental ideas of software engineering do not take into account? explain?
In order to clear the hard disk, I need to make a copy of OS and Office.
The physical layer translates logical communication requests from the data link layer into hardware specific operations. why?
The keyboard that you are using to type the answer communicates with your computer via which bus?
Inform readers about the many types of data-hiding methods that provide unique challenges for law enforcement agencies.
What is Stack Pointer in 8051 MC? Explain the operation Describe the instructions that affect Stack Pointer
Cache memory is used to store frequently accessed data. Here are some of its characteristics and examples.
Design a calculator with division, multiplication and addition operations by using input and message boxes visual basic
Short Answers type questions: Q. What is The Short form of Liquid Emitting Diode in Computer Science?
What is “std::length_error”? Use this in any C++ code where must use your reg# as length_ error??
Find a Greibach normal form grammar equivalent to the following CFG. S? ASB/AB A?a B ? b.
Which of the following is C++ equivalent for scanf()? a) cin b) cout c) print d) input
Microprocessor Transcribed Image Text: B- Explain the following instructions:
(i) TEST (ii) NEG
(iii) CMP
(iv) DAA
Place where large amounts of data are stored outside central processing unit is called backing store explain?
Define a network that consists of a wireless network and a line network connected by a bus
What is data independence, and why is it missing in file systems, and how does it work?
In what ways are replication in centralised databases and replication in parallel/distributed databases distinct from one another?
Is the message box that occurs after using CreateWindow shown before or after the application’s main window?
An intra-company network that is similar to the internet. What will be the best match for you?
What steps have been taken to make computer security into the contemporary form we see today? Explain.
Transcribed Image Text: 4. Is artificial intelligence (Al) included in the Church thesis? Argue for your answer.
Describe three interesting new applications that are becoming possible as the internet of things continues to develop.
.What is sandwich integration testing? Name the factors used for handling practical approach to adopt sandwich testing.???
Why is it that information system design is so prone to scope creep in the first place?
RAD stands for : Relative Application Development Rapid Application Development Rapid Application Document None of the mentioned
Key Web site performance measures include response time, transaction success rate, and system availability. True or False?
Short Answers type questions: Q. What is The Short form of Video Lan Client in Computer Science?
Define the circumstances of the problem would be a logical first step in troubleshooting a PC explain?
In this program you have to take 2 string from user and then concate them in c++
Write a Python program to add two positive integers without using the ‘+’ operator. nt: Use bitwise.
Compare and contrast a context diagram with a diagram 0. Context diagram does not utilize which symbol?
What type of network device may be used to setup and manage physical and virtual networking devices?
How do you round the number 7.25, to the nearest integer? Math.rnd(7.25) round (7.25) rnd (7.25) Math.round(7.25)
Help me write a program in Java to check if a matrix is a sparse or not.
Explain briefly layers architecture style? Distributed Computing question Note : Please Answer in text form Not pics
Write a one line program to remove spaces from string without using loop in elixir programming language.
Describe the techniques of session hijacking. In what way can you fend off an assault like that?
What are the types of password attacks? What can a systems administrator do to protect against them?
Functions- Write a C++ function that takes an integer argument, say n, and prints hello n times.
What are some typical CLI troubleshooting commands that may be used to diagnose and resolve network issues?
None Transcribed Image Text: Rust program
Write a program to print odd number
between 1 to 100.
a decimal number is given convert it into (1) binary (2) hexadecimal (3) octal in oak language
Course: Computer Aided Manufacturing How to describe coding structure of MICLASS system, KK-3 and DCLASS coding system?
Transcribed Image Text: 2. po.) What is the largest number that can be represented using 5 bits?
When a Java applet is shown, the browser calls the to translate the bytecode into machine language.
CONSTRUCT THE TRUTH TABLE OF THE FOLLOWING PROPOSITIONS. 1. (~p ? q) ? ~ (r ? s)
Explain the definition of Software Engineering What are the three components of the paradigm of software engineering
solve (Web development) Transcribed Image Text: is not
HTML block level element.
an