answersLogoWhite

0

📱

Software Engineering

Software engineering is the process of applying well-developed techniques and practices in order to create new software products. Questions about everything from design patterns to requirements and specification belong here.

1,663 Questions

Why was fault tolerance a major focus of the initial design for the internet?

Fault tolerance was a major focus of the intitial design of the Internet because the serial data connections that formed the backbone of the Internet were noisy and subject to bit errors, both single and burst, because they often used telephone lines, and various techniques were developed to detect/retransmit or detect/correct errors.

Data integrity was and is paramount, and most protection is provided at layer four (transport layer), although much work has been done recently to enhance layer 2 (network layer) and layer 1 (physical layer).

Distinguish between dfa and nfa?

DFA stands for Deterministic finite automaton and NFA stands for Nondeterministic finite automaton.

Formally, an automaton is made up of: were delta is the transition function. In a DFA, delta takes as input a state and letter and returns only one state. In an NFA, delta takes as input a state and letter but returns a set of states.

An NFA accepts a word iff there exists a run of the automaton on it (intuitively, the automaton guesses an accepting run). A DFA has only one run on every word and therefore accepts a word iff the single run on it is accepting.

What are the types of serial communication?

There are four main types.

1:RS232

2:EIA232

3:EIA 422

4:RS485

The major difference lies in Range and Noise immunity.Hope this could answer what you need

Wajahat

What is Least Cubic Method?

"Least Cubic Method" Also called "Generalized the Least Square Method", is new Method of data regression.

What is meant by convocation of btech?

It's an assembly or gathering for a ceremony, such as graduation.

It's an assembly or gathering for a ceremony, such as graduation.

It's an assembly or gathering for a ceremony, such as graduation.

It's an assembly or gathering for a ceremony, such as graduation.

It's an assembly or gathering for a ceremony, such as graduation.

It's an assembly or gathering for a ceremony, such as graduation.

What is the working of 8087 NDP microprocessor?

The 8087 Numeric Data Processor is an adjunct to the 8086/8088 microprocessor, that gives the 8086/8088 floating point capability and 8 more registers. The 8087 integrates itself with the 8086/8088 in such a way that the pair actually becomes one processor, appearing to have the extra instructions and registers to start with.

Since it was an optional add-on to the system, many run-time libraries would detect whether or not the 8087 was present, and either use it or emulate it.

This separation of functionality into two chips was maintained in the product line up until the 80386DX and 80486, although the NDP was called something else (such as the 80287, and 80387) at which point the NDP became a permanent part of the instruction set.

What are advantages and disadvantages of unified process model?

Not sure if here you are meaning a data treatment of let's say, many variable not sorted one by one, but as mass, more or less parametrized.

So i need you to clarify, are you taking about flock instancing :)?

I think you already know, so this is meant more for external readers, pretend you have do manage a crowd, well a crowd is made of many entities, called instances, if any of them has individual AI, the program must sort them one by one before even builind the next frame, so there are multiple process, as any of these individual entity is a process the program needs to manages, and this eats cpu cycles in a geometrical progression.

This is cathegorized as non gaming, so I may assume you might be even talking about client instance managing on databases, and the example can be, having to update millions of fields by logical attribution, without needing to sort them one by one.

Ok, forgive me if i will go on with gaming examples, and talk about flocking, with flocking you can manage a huge group of entities in a single (or few) process, now our crowd is dinamically generated via parameters, the program will create only the people withing your sight, using just a big crowd AI (sadly not so unrealistic, as we are very keen to "flock" our brain into the mass when in crowd), that will react to the environments. The position of any member of the crowd will no more be explicit but implicit, if the crowd will move in a direction, the crowd entity will move accordingly, the crowd density will determine where each individual will be generated, more or less close each other, there also is the crowd extension. And only the people within your view will be individually drawn in a specific location.

I'll cut it short my elementary explanations to the point of interest, the disavantages:

The main are, the major risks of incoherence, indetermination and inaccuracy, roughly. In a word, genericness. About the crowd, there can easily be an inconsistency with the people generated in your view and those outside your view, this especially happens in games where it's often more the graphical result and the impressiveness of a big crowd managed without frame lagging, than the substance.

Flocking is also used in CGI scene for famous wide open field battles, optimized to be fought in a pretty much flat and devoid of obstacles environment :D.

Cause interation of the crowd entity with obstacles can be managed, but it's problem you have to confront with.

Now about client account updates, well let's say, the "age" can be flocked to progress every day, without a need for the servers to individually update them, using just the subtraction function, everytime the instance is requested.

The same can be done for cathegory updating, maybe by updating grops of fields with clauses and condition given determined criterias.

What are the input required to form a test plan?

The Input For Formating The Test Plan are:-

1.Project Plan

2.Requirments Document

3.System Design Document

swet raj singh

What are the functional requirements of an e-learning?

Students will need to know how to use and troubleshoot a computer and programs for their distance learning. They will not have someone right there to help them and will need to have skills to do it on their own.

Diff bw risc and cisc?

CISC stands for Complex Instruction Set Computer. CISC chips are relatively slow per instruction,but use little instructions RISC stands for Reduced Instruction Set Computer. A fewer, simpler and faster instructions would be better, than the large, complex and slower CISC instructions. However, more instructions are needed to accomplish a task. It's easier to write powerful optimised compilers, since fewer instructions exist.

How many cylinder is equal to 1bytes?

It depends on how many tracks and sectors, as well as the sector size. In a typical (very old) 360kb floppy, there were 40 cylinders, 2 tracks per cylinder, 9 sectors per track, and 512 bytes per sector so, in that case, 1 byte would be about 1.085 x 10-4 cylinders.

Topics on mini project in visual basic?

hotel management

hostel management

online reservation

airline resrvation

railway reservation

inventory management

hospital management

office automation

libraray management

What is standard commercial risk?

It is the standards of commercial business risk. BOOM!

How the wrong software process model will affect the software failure?

When you create a software you create a model or psuedocode then a flowchart for the preocess which can be called as Process Model then execution of the Software. If you have made the model correclty minimal issue wil be found during beta testing and perhaps common issue and every problem are possible to fix since you know where in the process model causes the problem. Process model can really affect the software if we did not implement and go throurh a series of testing.

How you get the size of arrays from user?

in c simply add three lines in the begining of your program:

int x;

printf("enter the size of the array to be entered :");

scanf("%d",&x);

after that use x as your maximum limit of array in your program.

in c++ just replace above printf & scanf statements by

cout<<"enter the size of the array to be entered :";

&

cin>>x;

respectively and do not use brackets.

How do you convert letter Z into its bit pattern?

First you will need to know the character code being used, there are several:

  • Unicode
  • UTF-8
  • ASCII
  • MASCII
  • EBCDIC
  • BCDIC
  • Hollerith punchcard code
  • Remington-Rand punchcard code
  • Zone + Digit codes
  • APL
  • FIELDATA
  • CDC display code
  • DEC Radix-50
  • BAUDOT
  • etc.
Then you need to find Z in that character code's encoding table.

What are the advantages and disadvantages of novell directory service?

pro: technical,easy to use, understandble, smells nice, looks good

con: unreliable, sucks me, has a virus.

What are the basic data processing principles?

There are three basic principles of data processing. These are ETL that is extraction, transformations and loading.

What are the two ways in which an architectural model of a system may be used?

1. As a way of facilitating discussion about the system design. A high-level architectural view of a system is useful for communication with system stakeholders and project planning because it is not cluttered with detail. Stakeholders can relate to it and understand an abstract view of the system. They can then discuss the system as a whole without being confused by detail. The architectural model identifies the key components that are to be developed so managers can start assigning people to plan the development of these systems.

2. As a way of documenting an architecture that has been designed. The aim here is to produce a complete system model that shows the different components in a system, their interfaces, and their connections. The argument for this is that such a detailed architectural description makes it easier to understand and evolve the system.

What is the basic structure of ram?

ram have divided into five part

a) heap

b)satck

c)code

d)global

e) unpatition space

How do you remove a program from the all programs menu?

you first go to the start menu then search up add or remove hardware.

\