Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Ask a Question
Hot questions
+2
votes
3
answers
Find the netid and the hostid of the following IP addresses:
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Suggest four reasons why the productivity rate of programmers working as a pair might be more than half that of two programmers working individuallyand also discuss the advantages and disadvantages
asked
in
Software Engineering
by
anonymous
+1
vote
1
answer
Describe the five components of the DBMS environment
asked
in
Database Management Systems
by
anonymous
+1
vote
1
answer
How does type declaration statement for simple variable affect the readability of a language
asked
in
Programming Languages & Algorithms
by
anonymous
0
votes
0
answers
A manager decides to use the reports of program inspections as an input to the staff appraisal process. These reports show who made and who discovered program errors. Is this ethical managerial behavior?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
When would you recommend against the use of an agile method for developing a software system
asked
in
Software Engineering
by
anonymous
+1
vote
0
answers
How does company size and software size affect software project management
asked
in
Software Engineering
by
anonymous
+1
vote
0
answers
What is the bit and byte stuffing. Explain this concept with help of neat diagram
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Discuss the purpose and objectives of prototyping in software engineering.
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
How is the throughput affected by best effort delivery
asked
in
Computer Networks
by
anonymous
+1
vote
0
answers
What is the disadvantage of using Nagle's algorithm on a badly congested network?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
How big would the window size have to be for the channel utilization to be greater than 98 percent
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Explain ICMP and its message types.
asked
in
Computer Networks
by
anonymous
+1
vote
0
answers
Discuss: Lehman’s laws of software evolution have been examined and validated in many systems and many applications. Discuss at least three applications.
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
MHC-PMS and use case of doctor
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
What are the four important attributes that all professional software should have? Suggest four other attributes that may sometimes be significant.
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Discuss the QPI protocol layers and the PCIe protocol layers.
asked
in
Computer Architecture
by
anonymous
–1
vote
1
answer
Duplicate: Explain the 7 Layers of the OSI model
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Choose any piece of software which you use regularly. Briefly describe the requirements that the software meets (for you as the user). Suggest three ways in which the software could be improve for you.
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
What, in general terms, is the distinction between computer structure and computerfunction?
asked
in
Computer Architecture
by
anonymous
0
votes
0
answers
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
What major technical and nontechnical factors hinder software reuse? Do you personally reuse much software and, if not, why not?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
A software process that is based on high quality should produce high quality software products but to manage the quality of a system many problems are faced, what are these probable problems?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
To improve the Software team collaboration it is important that all members have information regarding development and technical management. Why?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
A software process that is based on high quality should produce high quality software products but to manage the quality of a system many problems are faced, what are these probable problems?
asked
in
Software Engineering
by
anonymous
–1
vote
1
answer
Duplicate: Give four circumstances where you might recommend against software reuse.
asked
in
Software Engineering
by
anonymous
–1
vote
1
answer
Duplicate: List FIVE (5) components of a computer and briefly describe each of them.
asked
in
Computer Architecture
by
anonymous
–1
vote
1
answer
Duplicate: Are reflex actions (such as moving your hand away from a hot stove) rational? Are they intelligent in context of AI?
asked
in
Artificial Intelligence
by
anonymous
+1
vote
0
answers
Explain the differences between an attack and a threat.
asked
in
Computer Aided Design
by
anonymous
+1
vote
0
answers
Why does the costs of assuring dependability increase exponentially as the reliability requirement increases?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Explain why the risk-based approach is interpreted in different ways when specifying safety and security
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Extend the table in Figure 12.11 to identify two further threats to the MHC-PMS, along with associated controls. Use these as a basis for generating further software security requirements that implement the proposed controls
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Waterfall model
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
people argue that developers should never be responsible for testing their own code, and this task should be the responsibility of a separate team. Who should be responsible for all testing? Why? Give arguments for view.
asked
in
Software Engineering
by
anonymous
+1
vote
0
answers
Vital parts of SRS document and it's usefulness
asked
in
Software Engineering
by
anonymous
+1
vote
1
answer
Explain disk mirroring in RAID
asked
in
Computer Architecture
by
anonymous
+1
vote
1
answer
Determine the minimum sampling rate required to avoid aliasing
asked
in
Hardware Systems & Electronics
by
anonymous
+1
vote
0
answers
What is Horsepower
asked
in
Others
by
anonymous
+1
vote
1
answer
Explain the principle of von neuman architecture
asked
in
Computer Architecture
by
anonymous
+1
vote
0
answers
Problems while developing integrated information system
asked
in
Database Management Systems
by
anonymous
Page:
1
2
3
4
...
33
next »
Welcome to
CPEN Talk
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
Categories
All categories
Artificial Intelligence
(67)
Compilers & Operating Systems
(72)
Computational Tools
(0)
Computer Aided Design
(4)
Computer Architecture
(317)
Computer Networks
(287)
Computer Vision & Robotics
(17)
Database Management Systems
(29)
Hardware Systems & Electronics
(13)
Maths & Statistics
(17)
Numerical Methods
(1)
Programming Languages & Algorithms
(50)
Software Engineering
(379)
Tutorials
(1)
Opinion
(8)
Others
(22)
[ Sponsored Posts ]
(1)
...