Ask
Search
Ask Question
Login
×
×
Welcome back.
and 4 others joined a min ago.
Continue with Google
Continue with email
Read
Write
Sort by: answers
updates
views
bookmarks
followers
votes
answers
0
votes
0
answers
274
views
0
answers
Explain the steps in developing a machine learning application.
machine learning
updated
16 months ago
by
prajapatijaimin
•
3.1k
0
votes
0
answers
198
views
0
answers
Explain the use of attenuators in microwave circuits? List their types.
microwave devices and circuits
updated
16 months ago
by
prajapatijaimin
•
3.1k
0
votes
0
answers
212
views
0
answers
What do you understand from the terms Manufacturing, Process plan, Maintenance?
manufacturing process
updated
17 months ago
by
prajapatijaimin
•
3.1k
1
vote
0
answers
217
views
0
answers
Write a short note on assembly process.
manufacturing process
updated
17 months ago
by
prajapatijaimin
•
3.1k
0
votes
0
answers
184
views
0
answers
What is the purpose of a bearing's separator? Explain any three types of bearing.
manufacturing process
updated
18 months ago
by
prajapatijaimin
•
3.1k
0
votes
0
answers
211
views
0
answers
Discuss the role of SU8 in MEMS applications.
mems technology
updated
18 months ago
by
Krishna_Agrawal
•
2.6k
1
vote
0
answers
380
views
0
answers
Explain the current and emerging cyber technologies in cyber management.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
291
views
0
answers
Explain the Cyber Operations in span the life cycle.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
321
views
0
answers
Define the terms. (1) Cyber Deception, (2) Cyber Hacktivists, (3) Cyber Operations Limitations.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
338
views
0
answers
Define the following terms. (1) Cyber space, (2) Full spectrum cyber, (3) Cyber ranges and information technology ranges, (4) Cyber Espionage.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
313
views
0
answers
What is partnership? Explain main features, and advantages of Partnership.
entrepreneurship and ebusiness
updated
23 months ago
by
prajapatijaimin
•
3.1k
0
votes
0
answers
328
views
0
answers
Explain the basic cyber operations activity concepts.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
409
views
0
answers
Express the contrapositive, converse and inverse forms of the following statement. if $3<b$ and $1+1=2$, then $\sin \frac{\pi}{3}=\frac{1}{2}$ .
discrete structures and graph theory
updated
23 months ago
by
prajapatijaimin
•
3.1k
1
vote
0
answers
935
views
0
answers
Define the cyber threat capability and it's tools.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
1
vote
0
answers
412
views
0
answers
How many Arsenal are available in cyber tools?
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
418
views
0
answers
Find $\operatorname{dnf}$ of $(p \rightarrow(q \wedge r)) \wedge(\sim p \rightarrow(\sim p \wedge \sim r))$ by truth table method.
discrete structures and graph theory
updated
23 months ago
by
prajapatijaimin
•
3.1k
0
votes
0
answers
548
views
0
answers
Consider metadata as an equivalent of Amazon Book Store where each data element is book. What this metadata will contain? Explain.
data warehouse and mining
updated
24 months ago
by
pradnyanabar2613
★
5.2k
0
votes
0
answers
375
views
0
answers
Entity relationship diagram for managing a chain of hospitals.
database management systems
updated
2.0 years ago
by
bo2.k679
•
20
0
votes
0
answers
1.7k
views
0
answers
Convert Regular Expression 01* + 1 to Finite Automata.
automata theory
updated
2.0 years ago
by
DevarenjiniP
•
3.1k
0
votes
0
answers
2.4k
views
0
answers
Construct Mealy machine for (0 + 1)*(00 + 11) and convert to Moore machine
automata theory
updated
2.0 years ago
by
DevarenjiniP
•
3.1k
0
votes
0
answers
339
views
0
answers
How polynomial manipulations are performed with lists? Explain the operations
data structures and algorithms
updated
2.0 years ago
by
DevarenjiniP
•
3.1k
0
votes
0
answers
392
views
0
answers
Explain the steps involved in insertion and deletion into a singly and doubly linked list
data structures and algorithms
updated
2.0 years ago
by
DevarenjiniP
•
3.1k
0
votes
0
answers
376
views
0
answers
Vectors analysis 1
engineering mathematics
updated
2.0 years ago
by
hwinsleymuka737
•
20
0
votes
0
answers
212
views
0
answers
Lateral Load Pile Calculation
advanced geotechnical engineering
updated
2.0 years ago
by
Chandan15
•
300
0
votes
0
answers
290
views
0
answers
Vector integration- line integrals
engineering mathematics
updated
2.0 years ago
by
samuelwabwi978
•
20
<prev
• 2,695 results • page 1 of 108 •
next >
×
Top contributors for
*** MISSING ***
×
Merge
*** MISSING ***
to
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money