Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
No answer
No selected answer
No upvoted answer
Ask a Question
Recent questions without answers
0
votes
0
answers
1
view
what is the solution to avoid the HOL problem occurs at router input port.
asked
6 minutes
ago
in
Computer Networks
by
anonymous
+1
vote
0
answers
23
views
Produce a logical top level data flow diagram of the health centre system
asked
May 19
in
Computer Aided Design
by
(user.guest)
+1
vote
0
answers
27
views
Given a number in memory location 6100H ( x ), calculate th e result based on the following arithmetic formula:
asked
May 19
in
Computer Architecture
by
anonymous
+1
vote
0
answers
80
views
How many 8-bit I/O control module registers do we need for status reading and control of each device?
asked
May 12
in
Computer Architecture
by
anonymous
0
votes
0
answers
37
views
we compress the video with the pattren gop(16:3)
asked
May 10
in
Computer Networks
by
anonymous
0
votes
0
answers
48
views
Relate the VIEWPOINTS of the stakeholders in MHC-PMS with the outlined CONCERNS
asked
Apr 25
in
Software Engineering
by
anonymous
0
votes
0
answers
46
views
Forward Chaining, Backward Chaining and Hybrid Expert Systems
asked
Apr 25
in
Artificial Intelligence
by
anonymous
0
votes
0
answers
45
views
Provide an explanation, the concept and principle of Software Process. Provide examples.
asked
Apr 22
in
Software Engineering
by
anonymous
+1
vote
0
answers
47
views
Explain the concept and principle of Software Process Dynamics. Provide examples
asked
Apr 22
in
Software Engineering
by
anonymous
+1
vote
0
answers
76
views
Explain in details the concept and process of Software Economic Analysis. Give the example
asked
Apr 22
in
Software Engineering
by
anonymous
0
votes
0
answers
36
views
Please define the terms Hard Disk model, Platters, Tracks, Blocks, Rotational Delay, Seek Delay
asked
Apr 16
in
Computer Architecture
by
anonymous
0
votes
0
answers
108
views
Suppose that a 1Mbps connection is shared by 5 well behaving TCP and 5 UDP sources.
asked
Apr 10
in
Computer Networks
by
anonymous
0
votes
0
answers
38
views
How do you think would heterogeneity, business and social change, security and trust change the future of software development.
asked
Apr 8
in
Computer Networks
by
anonymous
+1
vote
0
answers
45
views
Convert 10111110111000000000000000000000 from single precision floating point to decimal?
asked
Apr 2
in
Programming Languages & Algorithms
by
anonymous
0
votes
0
answers
55
views
Programme segmant for operation X=(A+B) -(C+D)
asked
Mar 28
in
Computer Architecture
by
anonymous
0
votes
0
answers
148
views
A definition of computer architecture is built on four basic viewpoints namely the structure, the organization, the implementation, and the performance. Explain each one of the list viewpoints based on computer architecture
asked
Mar 28
in
Computer Architecture
by
anonymous
0
votes
0
answers
49
views
Where can I download this book "A Guide to International Financial Reporting (New 12th Edition)"?
asked
Mar 23
in
Tutorials
by
(user.guest)
0
votes
0
answers
129
views
Suggest how you could use aspects to simplify the debugging of programs.
asked
Feb 26
in
Software Engineering
by
anonymous
+2
votes
0
answers
102
views
What software engineering methodology would be suitable for developing the ticket reservation system. Justify your answers
asked
Feb 21
in
Software Engineering
by
anonymous
+1
vote
0
answers
84
views
How to carry out a proper requirements analysis when developing a virtual platform
asked
Feb 21
in
Software Engineering
by
anonymous
+1
vote
0
answers
137
views
Explain the functions of the three sublayers for an SDN controller in the ITU-T model? What is the purpose of the service abstraction layer in the OpenDaylight SDN controller?
asked
Feb 16
in
Computer Networks
by
anonymous
+1
vote
0
answers
357
views
Recall that TCP can be enhanced with TLS to provide process-to-process security services, including encryption. Does TLS operate at the transport layer or the application layer?
asked
Feb 3
in
Computer Networks
by
anonymous
+1
vote
0
answers
62
views
Describe the term traversed Seriatim.
asked
Feb 3
in
Law for Engineers
by
(user.guest)
+1
vote
0
answers
81
views
A sine wave form seen on a scope has peak to peak amplitude of 6cm, if vertical sensitivity setting is 5v/cm, The peak and rms voltages are?
asked
Jan 5
in
Hardware Systems & Electronics
by
anonymous
+1
vote
0
answers
145
views
Big Data Analytics using Hive
asked
Jan 5
in
Computational Tools
by
anonymous
+1
vote
0
answers
70
views
Software is increasingly being developed by teams
asked
Dec 31, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
99
views
Identify some of the sections that should be included in a project plan created within a plan driven development process
asked
Dec 17, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
149
views
i. Explain Software design? ii. State and describe the main software design levels iii. With Relevant Example describe concurrency in software design
asked
Dec 12, 2021
in
Software Engineering
by
(user.guest)
+1
vote
0
answers
185
views
An interactive travel planning system that helps users plan journeys with the lowest environmental impact:
asked
Dec 11, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
612
views
Based on your experience with a bank ATM, draw an Activity Diagram that models the data processing involved when a customer withdraws cash from the machine
asked
Dec 10, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
143
views
Using a hypothetical scenario, demonstrate how scientific management may be relevant in resolving a system challenge, (You may provide references in your examples)
asked
Dec 9, 2021
in
Others
by
(user.guest)
+1
vote
0
answers
85
views
Define MIS manager
asked
Dec 9, 2021
in
Others
by
(user.guest)
+1
vote
0
answers
170
views
A system to convert data from internal and external sources into information and to communicate that information in an appropriate form to managers at all levels in all functions and to enable them to make timely and effective decisions for planning.
asked
Dec 9, 2021
in
Others
by
(user.guest)
+1
vote
0
answers
141
views
Construct a solution algorithm for the following problems
asked
Dec 5, 2021
in
Programming Languages & Algorithms
by
anonymous
+1
vote
0
answers
386
views
Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Dec 4, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
817
views
Who should be involved in a requirements review? Draw a process model showing how a requirements review might be organized.
asked
Dec 4, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
139
views
Where natural language descriptions are presented in a standard format, write plausible user requirements for an unattended petrol pump system that includes a credit card reader
asked
Dec 1, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
252
views
Compare and contrast the scrum approach to project management with conventional plan based approaches.
asked
Nov 25, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
213
views
What is meant by the term ‘client–server architecture’ and what are the advantages of this approach? Compare the client–server architecture with two other architectures.
asked
Nov 24, 2021
in
Database Management Systems
by
(user.guest)
0
votes
0
answers
163
views
What are the Transmission Rates of Dial – up modems, Hybrid fiber-coaxial cable (HFC), Digital subscriber line (DSL) and Fiber to the home (FTTH)
asked
Nov 22, 2021
in
Computer Networks
by
(user.guest)
0
votes
0
answers
145
views
A project uses the timeboxing process model with three stages in each time box but with unequal length.
asked
Nov 13, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
208
views
Determine the source and destination MAC addresses and the source and destination IP addresses of the transmitted frame
asked
Nov 11, 2021
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
155
views
What times are messages sent considering that all nodes run the (i) Slloted Aloha (ii) Pure Aloha protocol?
asked
Nov 11, 2021
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
177
views
By which protocols do routers 1c, 1d, 3a, and 3c know about the network prefix x?
asked
Nov 11, 2021
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
291
views
How to design a 4-input (A,B,C,D) digital circuit that will give its output a logic 1 only if the binary number formed at the input is between 2 and 9 (2&9 inclusive)?
asked
Nov 11, 2021
in
Hardware Systems & Electronics
by
anonymous
0
votes
0
answers
125
views
List three (3) open source engineering computational software tools that you would recommend as alternative to Matlab software for calculating the Grade Point Average (GPA) of 1000 students for each semester
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
0
votes
0
answers
108
views
If C2 = 3, D7 = 15, E1 = 7, and F2 = 5, what would be the output of the Microsoft excel function below?
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
0
votes
0
answers
97
views
What will be the output of the Microsoft excel spreadsheet function below
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
0
votes
0
answers
122
views
With the support of a properly labeled diagram, briefly explain the engineering problem-solving follow process
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
0
votes
0
answers
132
views
Assume your friend has asked you to recommend an OS for his/her computer. List any two (2) OS types that you would recommend and give one (1) reason each for your choice
asked
Nov 8, 2021
in
Computer Architecture
by
(user.guest)
Page:
1
2
3
4
...
7
next »
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...