Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Ask a Question
Hot questions
+1
vote
1
answer
Explain deadlock avoidance, prevention & detection
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
Explain Direct Memory Access(DMA)
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
What's the difference between a trap and an interrupt
asked
in
Compilers & Operating Systems
by
anonymous
0
votes
1
answer
How to solve the classic Philoshopher's deadlock problem
asked
in
Compilers & Operating Systems
by
anonymous
0
votes
1
answer
What is the worst-case complexity of running AC-3 on a tree-structured CSP?
asked
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
What are some characteristics of information in process control block
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
What is Kernel in OS context
asked
in
Compilers & Operating Systems
by
anonymous
0
votes
1
answer
What is Spatial locality and how does it relate to Temporal locality?
asked
in
Compilers & Operating Systems
by
anonymous
+2
votes
1
answer
What is an Interrupt
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
Why should control be given to the System Resource Manager(SRM)
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
What is a process in Operating Systems
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
What is a thread in OS
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
Explain Interrupt with examples
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
What are the steps in the process model
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
What are the conditions for mutual exclusion
asked
in
Compilers & Operating Systems
by
anonymous
0
votes
1
answer
What is the advantage of the Cache Memory
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
Why is the User mode and Kernel mode both needed in an Operating System
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
Is Multiprogramming different from Multiprocessing?
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
Distinguish between a monolithic and micro kernel
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
What is Multithreading
asked
in
Compilers & Operating Systems
by
anonymous
0
votes
1
answer
What are some tables that the Operating Systems use to maintain information for management purposes
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
Show that the fundamental period Np of the signals
asked
in
Hardware Systems & Electronics
by
anonymous
0
votes
1
answer
What is multiprogramming
asked
in
Compilers & Operating Systems
by
anonymous
0
votes
1
answer
Distinguish between virtual and real address
asked
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
How do you measure the performance of an agent
asked
in
Artificial Intelligence
by
anonymous
+2
votes
2
answers
What is overhead in computing
asked
in
Compilers & Operating Systems
by
(user.guest)
0
votes
1
answer
What's a utility function in AI
asked
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
What is an Agent in AI
asked
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
What is Intelligence in AI
asked
in
Artificial Intelligence
by
anonymous
0
votes
1
answer
Report on Loebner Prize winner
asked
in
Artificial Intelligence
by
anonymous
0
votes
1
answer
Write an algorithm for doing your laundry. Assume that you
asked
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
What is Artificial Intelligence
asked
in
Artificial Intelligence
by
anonymous
0
votes
1
answer
Explain why it is a good heuristic to choose the variable that is most constrained...
asked
in
Artificial Intelligence
by
anonymous
0
votes
1
answer
Suppose you wish to encrypt the message, M = 42
asked
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
There are three main types of cryptographic algorithms: Describe how they work
asked
in
Computer Vision & Robotics
by
anonymous
0
votes
1
answer
Construct a solution algorithm for the following
asked
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
Discuss some recovery site options?
asked
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
How are cryptographic algorithms used in web applications?
asked
in
Software Engineering
by
anonymous
+1
vote
1
answer
Explain the difference between face detection and face recognition. Give an example use of each in IT.
asked
in
Computer Vision & Robotics
by
anonymous
+1
vote
1
answer
Illustrates 5 Key trends that are fundamentally transforming IT leadership
asked
in
Programming Languages & Algorithms
by
anonymous
Page:
« prev
1
...
26
27
28
29
30
31
next »
Welcome to
CPEN Talk
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
When Chuck Norris throws exceptions, it's across the room.
...