Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) What are the differences among Data, Information and Knowledge? Consider that a Departmental Store requires keeping data about its customers and the transactions made by such customers. What data, information and knowledge might be stored or generated for the Departmental Store for providing better services to its customers?

b) What are the problems associating to digital divide? A University wants to launch skill based computer programs across the country by using ICT, what efforts must it make such that problems associating to digital divide are minimized.

c) What is meant by the word Cyber Crime? How can you help in the prevention of cyber crime?

problem 2:

a) Study any ecommerce web-site, list out the security features associated to that website. What are the benefits of e-commerce?

b) List out at least two e-Administration services which are presently available in India. Describe the features and benefits of any one such service.

c) List out at least five applications of ICT for education. Describe any one of such application.

problem 3:

a) What do you mean by the term MIS? What are the various kinds of MIS?

b) Consider a bank; list out the requirements for the MIS for such a bank.

c) A University wants to set up an IT portal on Student Registration and Results. What would be the needs of such a project?

problem 4:

Define the given terms with an illustration or a diagram wherever presently required:

a) Real time Embedded operating system.
b) Hardware Description Language.
c) Human Computer Interface.
d) Uses of Computer Vision in Medical Science.
e) Graphical User Interface versus Voice User Interface. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92604

Have any Question? 


Related Questions in Computer Engineering

1 list and describe the four basic conversion strategies as

1. List and describe the four basic conversion strategies (as described in the chapter) that are used when converting to a new system. Under which circumstances is each of these the best approach? 2. What is technology g ...

Random location of sparks after the third extension in the

Random location of sparks After the third extension in the Fire model, sparks are generated deterministically in the same place every time. This does not seem realistic, since real sparks probably jump to random nearby l ...

Consider the following scenariojason from the designer

Consider the following scenario: Jason from the designer group submitted a ticket with your companies IT Help Desk stating that he could no longer access the Internet. Whenever he types a website name into his web browse ...

1 a grab bag adt is similar to the bag adt with one

1. A Grab Bag ADT is similar to the Bag ADT with one difference. A grab bag does not have a remove() operation, but in place of it has a grabItem() operation, which allows for the random removal of an item from the bag. ...

Design and implement a word-searching algorithm that on

Design and implement a word-searching algorithm that on finding a mismatch with the current word simply reads characters to the start of the next word before attempting a match again.

1 if a label in a connection-oriented service is 8 bits how

1. If a label in a connection-oriented service is 8 bits, how many virtual circuits can be established at the same time? 2. List the three phases in the virtual-circuit approach to switching. 3. Do we have any of the fol ...

Pop3 protocol has some optional commands that a

POP3 protocol has some optional commands (that a client/server can implement). Using the information in RFC 1939, find the meaning and the use of the following optional commands: a. UIDL b. TOP 1 15 c. USER d. PASS

The task this week is to complete the following 2

The task this week is to complete the following 2 structures using a linked list: Stack Queue Assume the occurrence of a linked list node is represented by the object "Node" and its "Data" and "NextRef" attributes. Part ...

Perform a hierarchical clustering of the one-dimensional

Perform a hierarchical clustering of the one-dimensional set of points 1, 4, 9, 16, 25, 36, 49, 64, 81, assuming clusters are represented by their centroid (average), and at each step the clusters wit

Questionstudents are required to select a topic related to

Question: Students are required to select a topic related to global, social, ethical, or legal issues with digital media. You will perform in-depth research and provide an explanation of how an issue associated with your ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro