Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
No answer
No selected answer
No upvoted answer
Ask a Question
Recent questions without answers
0
votes
0
answers
Suggest four reasons why the productivity rate of programmers working as a pair might be more than half that of two programmers working individuallyand also discuss the advantages and disadvantages
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
A manager decides to use the reports of program inspections as an input to the staff appraisal process. These reports show who made and who discovered program errors. Is this ethical managerial behavior?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
When would you recommend against the use of an agile method for developing a software system
asked
in
Software Engineering
by
anonymous
+1
vote
0
answers
How does company size and software size affect software project management
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
How is the throughput affected by best effort delivery
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Discuss the purpose and objectives of prototyping in software engineering.
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
How big would the window size have to be for the channel utilization to be greater than 98 percent
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Explain ICMP and its message types.
asked
in
Computer Networks
by
anonymous
+1
vote
0
answers
What is the bit and byte stuffing. Explain this concept with help of neat diagram
asked
in
Computer Networks
by
anonymous
+1
vote
0
answers
What is the disadvantage of using Nagle's algorithm on a badly congested network?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
MHC-PMS and use case of doctor
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
What are the four important attributes that all professional software should have? Suggest four other attributes that may sometimes be significant.
asked
in
Software Engineering
by
anonymous
+1
vote
0
answers
Discuss: Lehman’s laws of software evolution have been examined and validated in many systems and many applications. Discuss at least three applications.
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Discuss the QPI protocol layers and the PCIe protocol layers.
asked
in
Computer Architecture
by
anonymous
0
votes
0
answers
Choose any piece of software which you use regularly. Briefly describe the requirements that the software meets (for you as the user). Suggest three ways in which the software could be improve for you.
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
What, in general terms, is the distinction between computer structure and computerfunction?
asked
in
Computer Architecture
by
anonymous
0
votes
0
answers
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
What major technical and nontechnical factors hinder software reuse? Do you personally reuse much software and, if not, why not?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
A software process that is based on high quality should produce high quality software products but to manage the quality of a system many problems are faced, what are these probable problems?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
To improve the Software team collaboration it is important that all members have information regarding development and technical management. Why?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
A software process that is based on high quality should produce high quality software products but to manage the quality of a system many problems are faced, what are these probable problems?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Extend the table in Figure 12.11 to identify two further threats to the MHC-PMS, along with associated controls. Use these as a basis for generating further software security requirements that implement the proposed controls
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Explain why the risk-based approach is interpreted in different ways when specifying safety and security
asked
in
Software Engineering
by
anonymous
+1
vote
0
answers
Explain the differences between an attack and a threat.
asked
in
Computer Aided Design
by
anonymous
+1
vote
0
answers
Why does the costs of assuring dependability increase exponentially as the reliability requirement increases?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Waterfall model
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
people argue that developers should never be responsible for testing their own code, and this task should be the responsibility of a separate team. Who should be responsible for all testing? Why? Give arguments for view.
asked
in
Software Engineering
by
anonymous
+1
vote
0
answers
What is Horsepower
asked
in
Others
by
anonymous
+1
vote
0
answers
Vital parts of SRS document and it's usefulness
asked
in
Software Engineering
by
anonymous
+1
vote
0
answers
Problems while developing integrated information system
asked
in
Database Management Systems
by
anonymous
0
votes
0
answers
Convert the following from base 10(Decimal) into base 2(binary) in a binary floating point representation. a. 55 = ? × 2 ? b. 11 = ? × 2 ? c. 525 = ? × 2 ?
asked
in
Numerical Methods
by
anonymous
+1
vote
0
answers
Discuss the type and the concept of data independence and explain its importance in a database environment.
asked
in
Database Management Systems
by
anonymous
0
votes
0
answers
Which address class(es) will allow you to have more than 1000 hosts per network?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
ATP generation
asked
in
Others
by
(user.guest)
0
votes
0
answers
Fermentation pathways from pyruvate
asked
in
Others
by
(user.guest)
+1
vote
0
answers
Problems between access time and cost in memory hierarchy
asked
in
Computer Architecture
by
anonymous
+1
vote
0
answers
Create and stimulate WAN using two or more router.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Find an action sequence that brings everyone safely to the opposite bank (i.e. Cross the river).
asked
in
Artificial Intelligence
by
anonymous
0
votes
0
answers
Identify the initial and goal states. Identify the set of states and operators Show using suitable representation the state space of the problem
asked
in
Artificial Intelligence
by
anonymous
0
votes
0
answers
What do we find in a DMA module that is not found in I/O module?
asked
in
Computer Architecture
by
anonymous
Page:
1
2
3
4
...
6
next »
Welcome to
CPEN Talk
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
Categories
All categories
Artificial Intelligence
(67)
Compilers & Operating Systems
(72)
Computational Tools
(0)
Computer Aided Design
(4)
Computer Architecture
(317)
Computer Networks
(287)
Computer Vision & Robotics
(17)
Database Management Systems
(29)
Hardware Systems & Electronics
(13)
Maths & Statistics
(17)
Numerical Methods
(1)
Programming Languages & Algorithms
(50)
Software Engineering
(379)
Tutorials
(1)
Opinion
(8)
Others
(22)
[ Sponsored Posts ]
(1)
...