-
Communication facilities in the world are systematically being upgraded from analog to digital facilities. Discuss any three reasons behind the very significant movement
Date posted:
April 2, 2019
-
Describe the guidelines that assist system auditors detect and deter fraud occurrences in an organization
Date posted:
March 27, 2019
-
Discuss cryptography as used in computer networking
Date posted:
March 26, 2019
-
Explain the advantages of fiber optic cables as used in networking
Date posted:
March 26, 2019
-
Explain the concept of distributed processing in networking
Date posted:
March 26, 2019
-
Outline the computer IP security architecture groups.
Date posted:
March 15, 2019
-
Explain the THREE stages of a computer software testing.
Date posted:
March 13, 2019
-
What is computer software testing?
Date posted:
March 13, 2019
-
Explain FOUR main components of computer software design.
Date posted:
March 13, 2019
-
Discuss the specifications a computer engineer should consider during computer software process model engineering.
Date posted:
March 13, 2019
-
Constant is any value that cannot be changed during program execution.in c language any single character number or character string is refered to as a constant.
Constants are of two types;primary and secondary constants.
Date posted:
March 12, 2019
-
Identifier are user defined words used to name entities like variables,arrays,function,structures e.t.c
Date posted:
March 12, 2019
-
Comment line indicates the purpose of the program and is represented as /*..........*/.
Comment line can be single or multiple line but should not be nested,can be anywhere in a program except inside a string and character constant.
Date posted:
March 12, 2019
-
Explain the characteristics of a computer Relational Model concept.
Date posted:
March 12, 2019
-
Discuss types of computer ER Model concepts.
Date posted:
March 12, 2019
-
Explain a two tier client server architure and a three tier client architecture found in computers.
Date posted:
March 12, 2019
-
Describe the main Main Characteristics of the Database Approach as used in database models.
Date posted:
March 9, 2019
-
State types of databases used in computer science.
Date posted:
March 9, 2019
-
Write a java program that allows user to input three numbers and output the largest of the three number after program compilation.
Date posted:
March 5, 2019
-
Compare and contrast Multiprogramming, Multitasking and Multiprocessing
Date posted:
March 5, 2019
-
Write a C function that has three inputs which are integers. The function returns true if the
first number raised to the power of the second number equals the third number.
Date posted:
March 5, 2019
-
Write a C function that computes that maximum of a specific row R in a
2D array of size 6 by 5.
Date posted:
March 5, 2019
-
#include
int *p, x;
int a[5]={100,200,300,400,500};
int *p2;
int main()
{
p=NULL;
x=500;
p=&x;
printf("1) %d %d \n",x,*p,p,&x,&p);
p2=a;
*(p2+1)=*p;
*p= *p2 + *(p2+2);
printf("2) %d %d \n",x,*p,*p2);
return 0;
}
Date posted:
March 5, 2019
-
What is the relationship between threads and processes in computer operating system?
Date posted:
March 5, 2019
-
Explain the function of ready queue as in operating system
Date posted:
March 5, 2019
-
Define the following as used in visual basic programming
1.Variables
2.Constant
Date posted:
January 28, 2019
-
What is Cryptography?
Date posted:
December 27, 2018
-
What is an Operating System(OS)?
Date posted:
December 27, 2018
-
Explain the meaning of cryptocurrency as used in the digital world and how it works.
Date posted:
December 26, 2018
-
What is TCP Chimney Offload?
Date posted:
December 24, 2018