Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Recent questions and answers
+1
vote
1
answer
10.4k
views
For Promo/Advert enquiry, mail info@cpentalk.com
asked
Dec 18, 2021
in
[ Sponsored Posts ]
by
(user.guest)
closed
Mar 17
by
(user.guest)
0
votes
1
answer
8
views
Explain Cache miss and state some of the ways it can be reduced
answered
11 hours
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
9
views
What does Cache hit and hit ratio mean
answered
11 hours
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
10
views
Explain the execution stage of the system instruction cycle
answered
13 hours
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
8
views
What are the 4 stages of the system instruction cycle
answered
14 hours
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
8
views
What does the instruction cycle refer to?
answered
14 hours
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
12
views
Stack addressing mode
answered
16 hours
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
343
views
When routing to another LAN, in addressing, only MAC address got changed. Justify your answer with proper figure.
answered
16 hours
ago
in
Computer Networks
by
(user.guest)
0
votes
1
answer
48
views
Discuss optimal routing.
answered
17 hours
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
18
views
Briefly describe how Ethernet's exponential backoff works. What is one reason why Ethernet's exponential backoff might be better than randomizing retransmission attempts over a fixed-length time interval?
answered
3 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
41
views
Suppose that routers were subjected to conditions that might cause them to fail fairly often. Would this argue in favor of a VC or datagram architecture?
answered
3 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
17
views
What is a Wireless Access Point
answered
3 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
48
views
Discuss how a hierarchical organization of the internet has made it possible to scale millions of users
answered
3 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
65
views
Provide examples when designing an architecture for security.
answered
3 days
ago
in
Software Engineering
by
(user.guest)
+1
vote
1
answer
16
views
What is a peer to peer network
answered
3 days
ago
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
17
views
What does software as a service refer to
answered
3 days
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
25
views
What are some advantages of flat panel displays
answered
May 19
in
Hardware Systems & Electronics
by
(user.guest)
+1
vote
0
answers
21
views
Produce a logical top level data flow diagram of the health centre system
asked
May 19
in
Computer Aided Design
by
(user.guest)
+1
vote
0
answers
27
views
Given a number in memory location 6100H ( x ), calculate th e result based on the following arithmetic formula:
asked
May 19
in
Computer Architecture
by
anonymous
0
votes
1
answer
33
views
Explain process framework
answered
May 15
in
Software Engineering
by
(user.guest)
+1
vote
1
answer
50
views
Explain the concept of Memory Hierarchy.
answered
May 14
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
40
views
Explain data independence and types of data independence
answered
May 14
in
Database Management Systems
by
(user.guest)
+1
vote
1
answer
38
views
Explain steps in query processing?
answered
May 14
in
Database Management Systems
by
(user.guest)
+1
vote
1
answer
43
views
What are the goals of a network
answered
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
34
views
What is a network?
answered
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
62
views
What is the use of SSH?
answered
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
41
views
Examine problems in application layer
answered
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
30
views
What are the goals of TCP/IP Model?
answered
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
44
views
What are the design issues for the Layers in networking?
answered
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
24
views
What are some network applications?
answered
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
29
views
What are some disadvantages of file system
answered
May 13
in
Programming Languages & Algorithms
by
(user.guest)
0
votes
1
answer
31
views
Explain the Operations on files
answered
May 13
in
Programming Languages & Algorithms
by
(user.guest)
0
votes
1
answer
39
views
Define and give examples of distributed Computing systems.
answered
May 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
86
views
What is known as the "Bus Grant"
answered
May 13
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
53
views
What are some applications that would benefit from the ATM's CBR service model
answered
May 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
64
views
Describe how packet loss can occur at input ports. Describe how packet loss at input ports can be eliminated (without using inline buffers)
answered
May 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
95
views
What are some of the ways in which data may be transferred to and from the CPU and I/O devices
answered
May 13
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
42
views
State the goals of distributed system
answered
May 13
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
95
views
Identify the netid and hostid of the IP Address given its subnet mask in binary. Show your solution. 192.168.15.187 255.255.255.0
answered
May 13
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
74
views
How many 8-bit I/O control module registers do we need for status reading and control of each device?
asked
May 12
in
Computer Architecture
by
anonymous
0
votes
0
answers
35
views
we compress the video with the pattren gop(16:3)
asked
May 10
in
Computer Networks
by
anonymous
0
votes
1
answer
71
views
What is Paging in the context of OS
answered
May 7
in
Compilers & Operating Systems
by
(user.guest)
0
votes
1
answer
65
views
Explain the five state process model
answered
May 7
in
Compilers & Operating Systems
by
(user.guest)
0
votes
1
answer
72
views
Explain the different file access methods
answered
May 7
in
Compilers & Operating Systems
by
(user.guest)
0
votes
1
answer
52
views
Explain System on Chip (SoC)
answered
May 7
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
54
views
Differentiate between the minimum and maximum mode of operation of the 8086 microprocessor
answered
May 7
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
61
views
What is the difference between conceptual architecture view and module architecture view?
answered
May 7
in
Software Engineering
by
(user.guest)
0
votes
1
answer
100
views
Explain the different types of file organisations
answered
May 4
in
Computational Tools
by
(user.guest)
0
votes
1
answer
57
views
What are the types of transmission Media
answered
May 4
in
Computer Networks
by
(user.guest)
0
votes
1
answer
56
views
What is Data Communication
answered
May 4
in
Computer Networks
by
(user.guest)
0
votes
1
answer
61
views
What are some advantages and disadvantages of the Magnetic Tape?
answered
May 4
in
Computer Architecture
by
(user.guest)
To get your solution from community members, start by
asking your question
. To see more, click for the
full list of questions
.
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...