Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1:

a) What are the differences among Data, Information and Knowledge? Consider that a Departmental Store requires keeping data about its customers and the transactions made by such customers. What data, information and knowledge might be stored or generated for the Departmental Store for providing better services to its customers?

b) What are the problems associating to digital divide? A University wants to launch skill based computer programs across the country by using ICT, what efforts must it make such that problems associating to digital divide are minimized.

c) What is meant by the word Cyber Crime? How can you help in the prevention of cyber crime?

problem 2:

a) Study any ecommerce web-site, list out the security features associated to that website. What are the benefits of e-commerce?

b) List out at least two e-Administration services which are presently available in India. Describe the features and benefits of any one such service.

c) List out at least five applications of ICT for education. Describe any one of such application.

problem 3:

a) What do you mean by the term MIS? What are the various kinds of MIS?

b) Consider a bank; list out the requirements for the MIS for such a bank.

c) A University wants to set up an IT portal on Student Registration and Results. What would be the needs of such a project?

problem 4:

Define the given terms with an illustration or a diagram wherever presently required:

a) Real time Embedded operating system.
b) Hardware Description Language.
c) Human Computer Interface.
d) Uses of Computer Vision in Medical Science.
e) Graphical User Interface versus Voice User Interface. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92604

Have any Question? 

Related Questions in Computer Engineering

Describe the concepts of confidentiality integrity and

Describe the concepts of confidentiality, integrity, and availability (C-I-A), and explain each of the seven domains of a typical IT infrastructure. Summarize the threat triad, and explain how security personnel can main ...

Innbsp300 words answer the following discussion post

In 300 words, answer the following discussion post question: The Green Organization is a conglomerate of many smaller business units. The organization has offices globally. Some offices are contracted independent agents ...

1 what is the relationship between period and frequency2

1. What is the relationship between period and frequency? 2. What does the amplitude of a signal measure? What does the frequency of a signal measure? What does the phase of a signal measure? 3. How can a composite signa ...

Pauls estate for years lease will expire in two weeks at

Paul's estate for years lease will expire in two weeks. At that time, he will move to a larger apartment across town. What must Paul do to terminate this lease agreement? a. Paul must give the landlord one week's prior n ...

1 why is it important to explore traffic behavior when

1. Why is it important to explore traffic behavior when designing a network? What problems could arise if you don't understand traffic behavior when you build a new network or upgrade a network? 2. Do some research regar ...

Database controlsbased on your research conducted earlier

Database Controls Based on your research conducted earlier in this unit, identify the types of controls that are available to mitigate some of the vulnerabilities, threats, and risks you identified in the Unit 5 discussi ...

Read the summary of business rules published by the guide

Read the summary of business rules published by the GUIDE Business Rules Project (1997) and the article by Gottesdiener (1997). Search the Web for additional information on business rules. Then write a three-page executi ...

1 rewrite the console application that uses an

1. Rewrite the Console application that uses an iterator-based linked list as a Windows application. 2. According to legend, the 1st-century Jewish historian, Flavius Josephus, was captured along with a band of 40 compat ...

Taskin this assessment you are required to -- select a

Task In this assessment you are required to - - Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportiv ...

1 how does a signature-based idps differ from a

1. How does a signature-based IDPS differ from a behavior-based IDPS? 2. What is a monitoring (or SPAN) port? What is it used for? 3. List and describe the three control strategies proposed for IDPS control.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro