Explain Database. Explain different types of elements.
Database Management System
Computer Science Engineering
632
Thomas
5 critical steps for effective data cleaning
Machine Learning
Computer Science Engineering
589
Vedhika
What are the rules for naming a variable?
What are glaciers? Explain its features.
Which of the following LAMELIBRANCHES does not belong to the same order
a) Ostrea, Gryphaea, Exogyra b) Cardita, Chama, Venus c) Trigonia, Schizodus, Unio d) Pecten, Spondylus, Pinna
Superficial similarities in the morphology of members of different Phyla is described as
a) Homology b) Homeomorphy c) Homomorphy d) Paedomorphosis
Which one is the correct answer :
Living fossils exhibit the phenomenon of a) Bradytelic evolution b) Orthogenesis c) Palingenesis d) Tachygenesis
What are the different arithmetic operators used in Python?
What do you mean by precedence of operators? Give examples.
What are the rules for naming a variable?
Write any four features of Python.
What do you understand by Typecasting in Python with the help of examples?
What is the role of indentation in Python
Explain IDLE and its main purpose.
Which are the applications of Python?
What is the difference between interactive mode and script mode in Python?
Python
Computer Science Engineering
2714
Alexandria
Distinguish between a conductor, an insulator and a semiconductor on the basis of energy band diagrams
What is p-n junction ? Explain briefly, with the help of suitable diagram, how a p-n junction is formed. Define the term Potential barrier and depletion region
How the reverse current suddenly increases at the breakdown voltage ? Explain.
Difference between Object Model Diagram and Class Diagram
Software Engineering
Computer Science Engineering
1133
Knowledge
What are the main characteristics of peer to peer systems?
Network Security & Cryptography
Computer Science Engineering
5114
Aanya
Explain Characteristics of multimedia data in details.
Network Security & Cryptography
Computer Science Engineering
732
Qayanat
Explain Andrew file system.
Network Security & Cryptography
Computer Science Engineering
690
Qayanat
Explain encapsulation polymorphism in details with example.
Network Security & Cryptography
Computer Science Engineering
659
Victoria
Explain about peer-to-peer architecture
Network Security & Cryptography
Computer Science Engineering
723
Qayanat
Describe operating system architecture in details.
Network Security & Cryptography
Computer Science Engineering
634
Aanya
Write a short note on Threshold Frequency (v0) and Threshold wavelength (&lemda;).
Explain the difference between transpiration and evaporation in details.
What are the different levels of biodiversity. Explain in details with example
What is biodiversity? Explain in details.
Two spherical bobs, one metallic and the other of glass, of the same size are allowed to fall freely from the same height above the ground. Which of the two would reach earlier and why?
Define the term ‘stopping potential’ in relation to photo-electric effect.
Why is the atmosphere essential for life?
Why is water essential for life?
How are living organisms dependent on the soil? Are organisms that live in water totally independent of soil as a resource?
Explainwhy Nazi propaganda was effective in creating a hatred for the Jews
What are the peculiarities of Nazi thinking?
Discuss why Nazism became popular in Germany in 1930.
Describe the problems faced by the Weimer Republic.
When a motorcar makes a sharp turn at a high speed, we tend to get thrown to one side. Explain why?