Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1:

A bank customer has two numbers related with his or her ATM card.

a) Name such two numbers.

b) Explain the internal processes that grant authority for the machine to proceed with transactions by using this card.

c) Explain the phases that an email message goes via from the moment the sender presses the SEND button until the time that the recipient reads the message AT A LATER DATE.

d) Name a specific configuration for a LAN and draw a labeled diagram.

e) Name two system programs and illustrate the purpose of each.

f) Illustrate four benefits of using a numeric code for a product instead of using its real name.

g) Describe what is meant by systems life cycle.

h) Name four tasks which a professional business programmer undertakes in his normal course of duty.

i) Spreadsheet programs give a large number of standard functions.

Define function. Name such a function and explain a particular illustration of its use.

Question 2:

You wish to make a database holding details of all your family and friends so that you could use it to extract details like name, address, telephone number, birthday and relationship to you.

·         a) Describe how you would first make the structure for this database.

·         b) Define accurately the terms RECORD and FIELD, giving a single instance of each taken from this application.

·         c) In table format, list six items of data that would be required for this application, giving, for each, an illustration AND its data-type.

·         d) You wish to send a greetings card to chosen people listed in the file. Describe how you could print a list of all people, with their birth dates, who have birthdays in February.

·         e) Describe why date of birth, instead of age, is normally held in a database.

 Question 3:

Choose a currently available commercial word-processing package. Describe, IN GENERAL TERMS, how each of the given features is accomplished. Avoid answers like “press F4”.

·         a) The user chooses the spelling checker. Explain all the options which are then open to the user. Describe and give two illustrations where the spelling checker cannot be able to detect an error.

·         b) Explain carefully how a block of text can be moved from one part of a document and placed in the other position of the same document.

·         c) Define the terms SUBSCRIPT and SUPERSCRIPT. Give a specific illustration of the use for each.

 Question 4:

a) Differentiate clearly between the terms VALIDATION and VERIFICATION.

b) Describe why automatic validation is performed when data is FIRST entered into a computer.

c) Below is CORRECT data held in a college file for a specific student. 

Name John Brown 
Student number 12343 
Date of birth 23/12/1983 
Fees due 123.45

Write down similar data for the other student however with an error in each item, which the COMPUTER would be able to detect as being INCORRECT. Make sure the errors are of different types. In each case, describe why the program would be able to detect the error.

Question 5:

a) Differentiate between RAM and ROM.

b) Draw a diagram showing the fundamental configuration of a computer with input, output and storage facilities.

c) Define the term OMR and describe precisely why it is used in the marking of examination papers.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91974565
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question? 


Related Questions in Computer Engineering

Question suppose there are 150 users sharing a

Question : Suppose there are 150 users sharing a communication link. Suppose each user transmits data only 12% of the time. Give the (compact) formula for finding the probability that at most 20 users are transmitting si ...

Question you all work in or know of people who work in

Question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constantly changing. What makes it so difficult to maintain info ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

Test 1 - open loop level step response test1objective to

Test 1 - Open Loop Level Step Response Test 1)Objective: To get familiar with the process vessel and to measure the time constant. Procedure 1 1) Start the CE2000 software and load ?le ‘exp4-1.ict'. You will see the soft ...

A sample of a compound is decomposed in the laboratory and

A sample of a compound is decomposed in the laboratory and produces 330 g carbon, 69.5 g hydrogen, and 220.2 g oxygen. Calculate the empirical formula of the compound. Express your answer as an empirical formula.

Question research the security and reliability of apache

Question : Research the security and reliability of Apache Web Server and Microsoft IIS and determine which you consider the best and why you consider it the best. The response must be typed, single spaced, must be in ti ...

Question bullusing the spss software open the high school

Question: • Using the SPSS software, open the High School Longitudinal Study dataset (ATTACHED). • Based on the dataset you chose, construct a research question that can be answered with a Pearson correlation and bivaria ...

Objectivesthis assessment relates to the unit learning

Objective(s) This assessment relates to the unit learning outcomes as in the unit descriptors. It tests your understanding about Windows Server 2012r2 administration. Assignment Details Select one of the following system ...

Recommendations what improvements could you offer as an it

Recommendations: What improvements could you offer as an IT leader managing the strategy for the situation covered by the case? Consider time, cost, human capital, and the current status IT within the organization. Maint ...

Question 1 identify all the dfd data flow diagram elements

Question: 1. Identify all the DFD (data flow diagram) elements (Shostack, 2014, p.531.). 2. Identify all threat types to each element(Shostack, 2014, p.531.). 3. Identify threats (three or more), one each for data flow, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As