Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) What do you mean software. Also describe the main kinds of software with their significance, usability, and interfacing capabilities.

b) What is the relationship between operating system, system software, and application software? What are their major objectives?

problem 2) What do you understand by a programming language? What are the major types of programming languages? Describe at least three languages in detail.

problem 3) What are the three main categories of optical laser disks? describe at least two applications where rewritable optical laser disks would be preferred over hard disks for storage.

problem 4)a) What do you understand by a computer virus? What are the major types of computer viruses which harm software and hardware?

b) What are the four fundamental components of a personal computer system?

problem 5)a)    What are the functions of the Control Unit, and Arithmetic and Logic Unit?

b) Distinguish between static RAM and dynamic RAM.

problem 6)a) What do you understand by point and draw devices? List and describe them briefly.

b) Which kind of OCR scanner is designed to read documents of varying sizes?

problem 7)a) All commercial spreadsheet packages manipulate rows and columns of data in a similar manner. What makes one spreadsheet package more desirable than another?

b) What is the relationship between a field, a record, and the structure of a database?

problem 8)a) Describe the conditional formatting and advance filtering features in MS-Excel with appropriate exs.

b) describe the features of application, document and dialog windows with the help of appropriate exs.

problem 9) What is control panel? Describe the most important utilities provided by control panel for computer management and security.

problem 10) Describe the significance of email in our society. Give ideas for effective usage of email for educational and research development.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96044

Have any Question? 


Related Questions in Computer Engineering

Assume that our network may corrupt packets but it never

Assume that our network may corrupt packets, but it never loses or duplicates a packet. We are also concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM of a new p ...

The server is starting to run slower and slower how do you

The server is starting to run slower and slower. How do you determine whether you need more RAM, a faster disk subsystem, or something else?

Design and implement an algorithm that performs insertions

Design and implement an algorithm that performs insertions and deletions on a doubly linked list. In a doubly linked list each node has two pointers (except at the head and tail), one to its successor and one to its pred ...

1 although there has been tremendous growth in the

1. Although there has been tremendous growth in the virtualization of computing resources, there are still many skeptics of the technology. List their concerns. Suggest ways to overcome those concerns. 2. Discuss the dif ...

1 potential incidents represent threats that have yet to

1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaining security? 2. Penetration testing is a particularly important contributor to the incident ...

1 give a detailed account of why the three-way handshake is

1. Give a detailed account of why the three-way handshake is a security threat. 2. In the chapter, we gave two examples of how a port scan can be a threat to security. Give three more examples of port scans that can lead ...

In ssltls protocol what kind of authentication is supported

In SSL/TLS protocol, what kind of authentication is supported when you establish a secure session between a client and a server? A) Only server authentication (optional). B) Server authentication (mandatory) and client a ...

You are a forensics investigator and need to address the

You are a forensics investigator and need to address the following cases. You can find the Case Projects at the end of Chapters 3 and 4 in your textbook. Case Project 3-3: Digital Evidence Storage Formats (CLO 1) Case Pr ...

1 visit cysecureorg and download the file

1. Visit cysecure.org and download the file LinuxDistributors.txt. a. If you can copy the content directly and paste onto your linux file, or b. Download it first into your computer. Then, copy and paste it from your com ...

Consider a developer who has both an isp workstation and a

Consider a developer who has both an ISP workstation and a devnet workstation on his desk, and who wants to move a program from the ISP workstation to the devnet workstation. a. Assume that the user is not allowed to mou ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro