Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
+1
vote
1
answer
10.4k
views
For Promo/Advert enquiry, mail info@cpentalk.com
asked
Dec 18, 2021
in
[ Sponsored Posts ]
by
(user.guest)
closed
Mar 17
by
(user.guest)
0
votes
1
answer
9
views
Explain Cache miss and state some of the ways it can be reduced
asked
1 day
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
9
views
What does Cache hit and hit ratio mean
asked
1 day
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
10
views
Explain the execution stage of the system instruction cycle
asked
1 day
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
10
views
What are the 4 stages of the system instruction cycle
asked
1 day
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
8
views
What does the instruction cycle refer to?
asked
1 day
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
52
views
Discuss optimal routing.
asked
3 days
ago
in
Computer Networks
by
anonymous
0
votes
1
answer
12
views
Stack addressing mode
asked
3 days
ago
in
Computer Architecture
by
anonymous
+1
vote
1
answer
21
views
Briefly describe how Ethernet's exponential backoff works. What is one reason why Ethernet's exponential backoff might be better than randomizing retransmission attempts over a fixed-length time interval?
asked
4 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
42
views
Suppose that routers were subjected to conditions that might cause them to fail fairly often. Would this argue in favor of a VC or datagram architecture?
asked
4 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
26
views
What is a Wireless Access Point
asked
5 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
52
views
Discuss how a hierarchical organization of the internet has made it possible to scale millions of users
asked
5 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
17
views
What is a peer to peer network
asked
5 days
ago
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
19
views
What does software as a service refer to
asked
5 days
ago
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
25
views
What are some advantages of flat panel displays
asked
May 19
in
Hardware Systems & Electronics
by
(user.guest)
+1
vote
0
answers
23
views
Produce a logical top level data flow diagram of the health centre system
asked
May 19
in
Computer Aided Design
by
(user.guest)
+1
vote
0
answers
27
views
Given a number in memory location 6100H ( x ), calculate th e result based on the following arithmetic formula:
asked
May 19
in
Computer Architecture
by
anonymous
0
votes
1
answer
33
views
Explain process framework
asked
May 15
in
Software Engineering
by
(user.guest)
+1
vote
1
answer
52
views
Explain the concept of Memory Hierarchy.
asked
May 14
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
43
views
Explain data independence and types of data independence
asked
May 14
in
Database Management Systems
by
(user.guest)
+1
vote
1
answer
39
views
Explain steps in query processing?
asked
May 14
in
Database Management Systems
by
(user.guest)
+1
vote
1
answer
44
views
What are the goals of a network
asked
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
34
views
What is a network?
asked
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
63
views
What is the use of SSH?
asked
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
42
views
Examine problems in application layer
asked
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
31
views
What are the goals of TCP/IP Model?
asked
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
47
views
What are the design issues for the Layers in networking?
asked
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
28
views
What are some network applications?
asked
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
33
views
What are some disadvantages of file system
asked
May 13
in
Programming Languages & Algorithms
by
(user.guest)
0
votes
1
answer
31
views
Explain the Operations on files
asked
May 13
in
Programming Languages & Algorithms
by
(user.guest)
0
votes
1
answer
39
views
Define and give examples of distributed Computing systems.
asked
May 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
87
views
What is known as the "Bus Grant"
asked
May 13
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
56
views
What are some applications that would benefit from the ATM's CBR service model
asked
May 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
95
views
What are some of the ways in which data may be transferred to and from the CPU and I/O devices
asked
May 13
in
Computer Architecture
by
(user.guest)
+1
vote
0
answers
80
views
How many 8-bit I/O control module registers do we need for status reading and control of each device?
asked
May 12
in
Computer Architecture
by
anonymous
+1
vote
1
answer
66
views
Describe how packet loss can occur at input ports. Describe how packet loss at input ports can be eliminated (without using inline buffers)
asked
May 12
in
Computer Networks
by
anonymous
0
votes
0
answers
37
views
we compress the video with the pattren gop(16:3)
asked
May 10
in
Computer Networks
by
anonymous
0
votes
1
answer
72
views
What is Paging in the context of OS
asked
May 7
in
Compilers & Operating Systems
by
(user.guest)
0
votes
1
answer
53
views
Explain System on Chip (SoC)
asked
May 7
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
73
views
Explain the different file access methods
asked
May 7
in
Compilers & Operating Systems
by
(user.guest)
0
votes
1
answer
69
views
Explain the five state process model
asked
May 7
in
Compilers & Operating Systems
by
(user.guest)
0
votes
1
answer
55
views
Differentiate between the minimum and maximum mode of operation of the 8086 microprocessor
asked
May 7
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
63
views
What is the difference between conceptual architecture view and module architecture view?
asked
May 7
in
Software Engineering
by
(user.guest)
0
votes
1
answer
43
views
State the goals of distributed system
asked
May 6
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
96
views
Identify the netid and hostid of the IP Address given its subnet mask in binary. Show your solution. 192.168.15.187 255.255.255.0
asked
May 6
in
Computer Networks
by
anonymous
0
votes
1
answer
104
views
Explain the different types of file organisations
asked
May 4
in
Computational Tools
by
(user.guest)
0
votes
1
answer
59
views
What are the types of transmission Media
asked
May 4
in
Computer Networks
by
(user.guest)
0
votes
1
answer
58
views
What is Data Communication
asked
May 4
in
Computer Networks
by
(user.guest)
0
votes
1
answer
63
views
What are some advantages and disadvantages of the Magnetic Tape?
asked
May 4
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
56
views
What is inheritance in OOP?
asked
May 3
in
Software Engineering
by
(user.guest)
0
votes
1
answer
56
views
What is byte stream?
asked
May 3
in
Computer Networks
by
(user.guest)
Page:
1
2
3
4
...
62
next »
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...