UNIT 1 | UNIT 2 | UNIT 3 |
UNIT 4 | UNIT 5 | UNIT 6 |
OBJECTIVE | PRIVIOUS QUESTION PAPERS | IMP QUESTIONS |
UNIT 1 | UNIT 2 | UNIT 3 |
UNIT 4 | UNIT 5 | UNIT 6 |
OBJECTIVE | PRIVIOUS QUESTION PAPERS | IMP QUESTIONS |
UNIT 1 | UNIT 2 | UNIT 3 |
UNIT 4 | UNIT 5 | UNIT 6 |
OBJECTIVE | PRIVIOUS QUESTION PAPERS | IMP QUESTIONS |
UNIT 1 | UNIT 2 | UNIT 3 |
UNIT 4 | UNIT 5 | UNIT 6 |
OBJECTIVE | PRIVIOUS QUESTION PAPERS | IMP QUESTIONS |
UNIT 1 | UNIT 2 | UNIT 3 |
UNIT 4 | UNIT 5 | UNIT 6 |
OBJECTIVE | PRIVIOUS QUESTION PAPERS | IMP QUESTIONS |
This method uses a field in the header to specify the number of characters in the frame. When the data link layer at the destination sees the character count, it knows how many characters follow, and hence where the end of the frame is. The disadvantage is that if the count is garbled by a transmission error, the destination will lose synchronization and will be unable to locate the start of the next frame. So, this method is rarely used. [
This Cyclic Redundancy Check is the most powerful and easy to implement technique. Unlike checksum scheme, which is based on addition, CRC is based on binary division. In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number.
Several algorithms for computing the shortest path between two nodes of a graph are known. This one is due to Dijkstra (1959). Each node is labeled (in parentheses) with its distance from the source node along the best known path. Initially, no paths are known, so all nodes are labeled with infinity.
The following example shows how a pipe is created, reading and writing from pipe. A pipe provides a one-way flow of data. A pipe provides a one-way flow of data. A pipe is created by the pipe system call. int pipe ( int *filedes ) ; Two file descriptors are returned- filedes[0] which is open for reading , and filedes[1] which is open for writing. Pipes
The SRS document explains the purpose and features of the software, the interfaces of the software, what the software will do, the constraints under which it must operates and how the software will react to the external stimuli. This SRS document is intended for both the end-users and to the developers of the software.
Calculating effort for Attendance Management System using Function Point oriented estimation model. It is a method to break systems into smaller components, so they can be better understood and analyzed. It is used to express the amount of business functionality, an information system (as a product) provides to a user. Fps measure software size
The proactive management of risks throughout the software development life-cycle is important for project success. The risk management practice, which involves risk identification, analysis, prioritization, planning, mitigation, monitoring, and communication .Software development risks that seem to reoccur in educational and industrial projects A risk-driven process for selecting a software development model Risk in itself is not bad; risk is essential to progress, and failure is often a key part of learning.
Static websites are also known as flat or stationary websites. They are loaded on the client’s browser as exactly they are stored on the web server. Such websites contain only static informtion. User can only read the information but can’t do any modification or interact with the information. Static websites are created using only HTML. Static websites are only used when the information is no more required to be modified.