Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem1) Answer all the problems:

i) describe the different kinds of computer systems on the basis of their computing capabilities.

ii) How is primary memory different from secondary memory?

iii) Enlist the components of computer system and their features.

iv) prepare brief note on magneto optical storage.

v) describe input devices. Give exs of direct entry input devices.

problem2) describe the important aspects of ensuring secure exchange of data between systems connected through internet.

problem3) What is E-commerce? Describe the different stages of ecommerce sales life cycle.

problem4) Describe the following features of Windows XP:

a) Files and Folders

b) System Utilities and Control Panel. 

problem5) Answer all the problems:

i) “High level programming languages are more user oriented in contract to low level languages” - Why?

ii) What do you mean by network topology and describe star and ring topology?

iii) Distinguish Corel Draw and Page Maker.

iv) describe the term intranet. What are its benefits to the organization?

v) What features of personal computer makes it a popular computing machine?

problem6) Define operating system. What are the functions performed by operating system?

Quiestion7) describe the evolution of computer systems highlighting the features of computers of different generations.

problem8) prepare detailed note on classification of computer software.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93848

Have any Question? 


Related Questions in Computer Engineering

Consider a finite tree of depth d and branching factor b a

Consider a finite tree of depth d and branching factor b. (A tree consisting of only a root node has depth zero; a tree consisting of a root node and its It successors has depth 1; etc.) Suppose the shallowest goal node ...

1 what is the typical relationship among the untrusted

1. What is the typical relationship among the untrusted network, the firewall, and the trusted network? 2. What is the relationship between a TCP and UDP packet? Will any specific transaction usually involve both types o ...

Draw an entity relationship diagram for flapper

Draw an entity relationship diagram for Flapper Dumpling

In this exercise we illustrate the problem of using

In this exercise, we illustrate the problem of using nonprobabilistic cryptosystems, such as schoolbook RSA, imprudently. Nonprobabilistic means that the same sequence of plaintext letters maps to the same ciphertext. Th ...

In a tcp connection the initial sequence number at the

In a TCP connection, the initial sequence number at the client site is 2171. The client opens the connection, sends three segments, the second of which carries 1000 bytes of data, and closes the connection. What is the v ...

Discussion questionpersonal factors such as anger revenge

Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate security ...

1 identify the five components of a data communications

1. Identify the five components of a data communications system. 2. What are the three criteria necessary for an effective and efficient network? 3. What are the advantages of a multipoint connection over a point-to-poin ...

1 distinguish between multicasting and multiple unicasting2

1. Distinguish between multicasting and multiple unicasting. 2. When we send an e-mail to multiple recipients, are we are using multicasting or multiple unicasting? Give the reason for your answer. 3. Define which of the ...

Given an example of broadcast usage in the network and data

Given an example of broadcast usage in the network and data link layers. For each case, (1) name the protocol that utilizing the broadcast, (2) the reason why the broadcast rather that unicast is used, and (3) how the fa ...

1 add the operation getcodeseqsymbol to the morse code tree

1. Add the operation getCodeSeq(symbol) to the Morse Code Tree ADT, which accepts a single-character symbol and returns the corresponding Morse Code sequence for that symbol. None should be returned if the supplied symbo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen