Explain in brief the origins of Just In Time. Explain the different types of wastes that can be eliminated using JIT.
Reviewed by
enakta13
on
August 31, 2012
Rating:
5
Describe the following with suitable examples: A) Modeling the realization of a Use case B) Modeling the realization of an operation C) Modeling a Mechanism
Reviewed by
enakta13
on
August 30, 2012
Rating:
5
Describe the following: A) Modeling the architecture of a system B) Modeling Systems C) Models and Views D) Traces
Reviewed by
enakta13
on
August 29, 2012
Rating:
5
Describe the following with suitable examples: A) Modeling the realization of a Use case B) Modeling the realization of an operation C) Modeling a Mechanism
Reviewed by
enakta13
on
August 29, 2012
Rating:
5
SYSTEM DESIGN USING MICROCONTROLLER
Reviewed by
enakta13
on
August 29, 2012
Rating:
5
Discuss in detail the Process management, Memory management, I/O and File management and Security and Protection in LINUX Operating System
Reviewed by
enakta13
on
August 28, 2012
Rating:
5
Describe why authentication is important for file protection.
Reviewed by
enakta13
on
August 28, 2012
Rating:
5
List the security attacks that cannot be prevented by encryption.
Reviewed by
enakta13
on
August 28, 2012
Rating:
5
There is a total of 15 units of Rl (resource 1) and 7 units of R2 and the system is in the following state (again call it SO):
Reviewed by
enakta13
on
August 28, 2012
Rating:
5
What will be the number of page faults for the algorithms (FIFO, LRU and Optimal) for the following page reference string: 1,2,3,3,5,1,2,2,6,2,1,5,7,6,3 for a memory with 4 frames?
Reviewed by
enakta13
on
August 28, 2012
Rating:
5
Consider the following jobs: Job # Arrival time Run time A05 B24 C35 D53
Reviewed by
enakta13
on
August 28, 2012
Rating:
5
State the Readers and Writers Problem and write its semaphore based solution. Also describe the algorithm. Can the producer consumer problem be considered as a special xase of Reader/Writer problem with a single Writer(the producer and a single Reader (consumer) Explain.)
Reviewed by
enakta13
on
August 28, 2012
Rating:
5
Write about Common Modeling techniques in Relationships
Reviewed by
enakta13
on
August 27, 2012
Rating:
5
Describe the following with respect to Common Modeling Techniques: A) Modeling object Structures B) Forward and Reverse Engineering C) Object Diagrams
Reviewed by
enakta13
on
August 26, 2012
Rating:
5
Discuss the common modeling techniques in UML
Reviewed by
enakta13
on
August 26, 2012
Rating:
5
Describe the theory and real time applications of Unified Modeling Language (UML)
Reviewed by
enakta13
on
August 25, 2012
Rating:
5
division of two 8 – bit numbers using 8051
Reviewed by
enakta13
on
August 24, 2012
Rating:
5
multiplication of two 8 – bit numbers using 8051
Reviewed by
enakta13
on
August 24, 2012
Rating:
5
Subtraction of two 8 – bit numbers using 8051
Reviewed by
enakta13
on
August 24, 2012
Rating:
5
Addition of 8 – bit numbers using 8051 instruction set
Reviewed by
enakta13
on
August 24, 2012
Rating:
5
INTERFACING 8279 KEYBOARD/DISPLAY CONTROLLER WITH 8085 MICROPROCESSOR
Reviewed by
enakta13
on
August 20, 2012
Rating:
5
INTERFACING ADC WITH 8085 PROCESSOR
Reviewed by
enakta13
on
August 20, 2012
Rating:
5
SQUARE OF A NUMBER USING LOOK UP TABLE
Reviewed by
enakta13
on
August 20, 2012
Rating:
5
ASCII TO HEX CONVERSION
Reviewed by
enakta13
on
August 20, 2012
Rating:
5
HEX TO ASCII CONVERSION
Reviewed by
enakta13
on
August 20, 2012
Rating:
5
HEX TO BCD CONVERSION
Reviewed by
enakta13
on
August 20, 2012
Rating:
5
BCD TO HEX CONVERSION
Reviewed by
enakta13
on
August 20, 2012
Rating:
5
ARRANGE AN ARRAY OF DATA IN DESCENDING ORDER
Reviewed by
enakta13
on
August 17, 2012
Rating:
5
ARRANGE AN ARRAY OF DATA IN ASCENDING ORDER
Reviewed by
enakta13
on
August 17, 2012
Rating:
5
SMALLEST NUMBER IN AN ARRAY OF DATA
Reviewed by
enakta13
on
August 17, 2012
Rating:
5
LARGEST NUMBER IN AN ARRAY OF DATA
Reviewed by
enakta13
on
August 17, 2012
Rating:
5
DIVISION OF TWO 8 BIT NUMBERS
Reviewed by
enakta13
on
August 17, 2012
Rating:
5
MULTIPLICATION OF TWO 8 BIT NUMBERS
Reviewed by
enakta13
on
August 17, 2012
Rating:
5
SUBTRACTION OF TWO 8 BIT NUMBERS
Reviewed by
enakta13
on
August 17, 2012
Rating:
5
ADDITION OF TWO 8 BIT NUMBERS
Reviewed by
enakta13
on
August 17, 2012
Rating:
5