Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question 1:
(a) What do you meant by an expert system?
(b) Describe benefits of the EDI.
(c) Describe what you understand by: (i) File Infectors (ii) Boot Sector Viruses (iii) Macro Viruses
(d) Mention steps in reducing infection risks for your PC.
(e) Mention two problems spam create for a computer user.
(f) Show the different phases of the Information System Life Cycle.
Question 2:
(a) Differentiate between system software and application software.
(b) List types of RAM
(c) List types of ROM
(d) Describe the difference between Cache Memory and Virtual Memory.
(e) Describe how data is organised on a magnetic disk and a magnetic tape.
(f) Differentiate between Ink Line printers and Jet printers.
(g) What are pointing devices? List and describe two pointing devices
1. Create the following ADTs. (a) Write the constructor function makestk, predicate function emptystk and mutator functions pushstk and popstk: i. makestk returns a new stack
The desired daily output for an assembly line is 360 units. This assembly line will operate 450 minutes per day. The following table have information on this product's task times a
Weight Training Calculations -Artificial intelligence: Because we have more weights in our network than in perceptrons, first we have to introduce the notation: wij to denote t
Which 802 standard provides for a collision free protocol? 802.5 standard gives for a collision free protocol.
Multiple Layers of Intranet Security Security requirements vary from organisation to organisation. They also vary on the content that the organisations intend to place on their
How to use ActiveX Control in .Net ? ActiveX control is a special type of COM component that handles a User Interface. Using ActiveX Control in your .Net Project is even simple
How do you achieve workflow automation in e-business environment? In order to run easily, organizations often standardize processes across the organization and encourage user
Processing elements (PEs) : Every processing element consists of ALU, local memory and its registers for storage of distributed data. This PEs has been interconnected via an inte
What is a Turing Machine? Turing machine is a simple mathematical model of a computer. TM has unlimited an unrestricted memory and is a much more accurate model of a general
Which method uses the greatest number of layers in the OSI model? Gateway utilizes the greatest number of layers into the OSI model.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd