Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) What are the differences among Data, Information and Knowledge? Consider that a Departmental Store requires keeping data about its customers and the transactions made by such customers. What data, information and knowledge might be stored or generated for the Departmental Store for providing better services to its customers?

b) What are the problems associating to digital divide? A University wants to launch skill based computer programs across the country by using ICT, what efforts must it make such that problems associating to digital divide are minimized.

c) What is meant by the word Cyber Crime? How can you help in the prevention of cyber crime?

problem 2:

a) Study any ecommerce web-site, list out the security features associated to that website. What are the benefits of e-commerce?

b) List out at least two e-Administration services which are presently available in India. Describe the features and benefits of any one such service.

c) List out at least five applications of ICT for education. Describe any one of such application.

problem 3:

a) What do you mean by the term MIS? What are the various kinds of MIS?

b) Consider a bank; list out the requirements for the MIS for such a bank.

c) A University wants to set up an IT portal on Student Registration and Results. What would be the needs of such a project?

problem 4:

Define the given terms with an illustration or a diagram wherever presently required:

a) Real time Embedded operating system.
b) Hardware Description Language.
c) Human Computer Interface.
d) Uses of Computer Vision in Medical Science.
e) Graphical User Interface versus Voice User Interface. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92604

Have any Question? 


Related Questions in Computer Engineering

1 ftp uses the services of tcp for exchanging control

1. FTP uses the services of TCP for exchanging control information and data transfer. Could FTP have used the services of UDP for either of these two connections? Explain. 2. In FTP, which entity (client or server) start ...

Deterministic and random behavior it is human nature to

Deterministic and random behavior It is human nature to assume that there is a causal force behind everything that we observe, but some times this is not the case. However, even when we have a perfect understanding of a ...

1 how is an incident response plan different from a

1. How is an incident response plan different from a disaster recovery plan? 2. What is risk appetite? Explain why risk appetite varies from organization to organization. 3. What is a cost benefit analysis?

1 using the resources available in your library find out

1. Using the resources available in your library, find out what laws your state has passed to prosecute computer crime. 2. Using a Web browser go to www.eff.org. What are the current top concerns of this organization?

Design values and adjustment factors in the following

Design values and adjustment factors in the following problems are to be taken from the 1997 NDS. Assume wood will be used in dry-service conditions and at normal temperatures unless otherwise noted. a. Describe softwood ...

Algorithim tasksthis assignment involves creating an

Algorithim / Tasks This assignment involves creating an algorithm. An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem. We will see in future weeks how the detailed steps of this type ...

We consider known-plaintext attacks on block ciphers by

We consider known-plaintext attacks on block ciphers by means of an exhaustive key search where the key is k bits long. The block length counts n bits with n > k. 1. How many plaintexts and ciphertexts are needed to succ ...

Develop a listing of what you believe are the most

Develop a listing of what you believe are the most important metrics for operations managers. (Hint: Be sure to consider the triple bottom line.) Howdoes each metric support the overall financial performance of the organ ...

Consider an ethernet segment with propagation delay between

Consider an Ethernet segment with propagation delay between any two nodes at most 225 bit times. Assuming the smallest possible Ethernet frame to be 576 bits (which it is), can a host transmit a frame without detecting a ...

1 what is the typical relationship among the untrusted

1. What is the typical relationship among the untrusted network, the firewall, and the trusted network? 2. What is the relationship between a TCP and UDP packet? Will any specific transaction usually involve both types o ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen