Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question 1:
(a) What do you meant by an expert system?
(b) Describe benefits of the EDI.
(c) Describe what you understand by: (i) File Infectors (ii) Boot Sector Viruses (iii) Macro Viruses
(d) Mention steps in reducing infection risks for your PC.
(e) Mention two problems spam create for a computer user.
(f) Show the different phases of the Information System Life Cycle.
Question 2:
(a) Differentiate between system software and application software.
(b) List types of RAM
(c) List types of ROM
(d) Describe the difference between Cache Memory and Virtual Memory.
(e) Describe how data is organised on a magnetic disk and a magnetic tape.
(f) Differentiate between Ink Line printers and Jet printers.
(g) What are pointing devices? List and describe two pointing devices
In the view of the M364 module team, HCI has been superseded by ID. This is because HCI traditionally concentrated upon desktop computers with single users, whereas ID includes the
What are condition code flags? The processor keeps track of information about the results of several operations for use by subsequent conditional branch instructions. This is a
Electronic typewriter : An electronic typewriter has a 'memory' or 'electronic brain' which enables it to recall the whole document at a time and type it automatically at the pres
Bitmaps commonly use one bitmap for each single distinct value. Number of bitmaps used can be decreased by opting for a dissimilar type of encoding. Space can be optimized but when
How to pass data from list to report? ABAP/4 gives three ways of passing data: ---Passing data automatically using system fields ---Using statements in the program to tak
a. List the ACID properties. Describe the usefulness of each. b. During its implementation, a transaction passes by several states, until it finally commits or aborts. List all
A digital signature is encrypting information
What are the different between hypertext hypermedia? Hypertext is fundamentally the same like regular text; this can be stored, read or searched and edited along with a signifi
COMMUNICATIONS TECHNOLOGY: The development of communications technology is, in a sense, a symbol of man's effort to communicate rapidly over great distances. Communications te
Q. Develop a Menu driven program with following menu: 1. Gray code 2. BCD 3. Excess-3 code 4. Exit I/P must be a valid Binary number. Fractional numbers are all
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd