Ask
Search
Ask Question
Login
Invalid limit parameter received
×
×
Welcome back.
and 2 others joined a min ago.
Continue with Google
Continue with email
Read
Write
Sort by: answers
updates
views
bookmarks
followers
votes
answers
0
votes
0
answers
269
views
0
answers
Explain the steps in developing a machine learning application.
machine learning
updated
15 months ago
by
prajapatijaimin
•
3.0k
0
votes
0
answers
192
views
0
answers
Explain the use of attenuators in microwave circuits? List their types.
microwave devices and circuits
updated
15 months ago
by
prajapatijaimin
•
3.0k
0
votes
0
answers
208
views
0
answers
What do you understand from the terms Manufacturing, Process plan, Maintenance?
manufacturing process
updated
16 months ago
by
prajapatijaimin
•
3.0k
1
vote
0
answers
207
views
0
answers
Write a short note on assembly process.
manufacturing process
updated
16 months ago
by
prajapatijaimin
•
3.0k
0
votes
0
answers
180
views
0
answers
What is the purpose of a bearing's separator? Explain any three types of bearing.
manufacturing process
updated
18 months ago
by
prajapatijaimin
•
3.0k
0
votes
0
answers
207
views
0
answers
Discuss the role of SU8 in MEMS applications.
mems technology
updated
18 months ago
by
Krishna_Agrawal
•
2.6k
1
vote
0
answers
374
views
0
answers
Explain the current and emerging cyber technologies in cyber management.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
286
views
0
answers
Explain the Cyber Operations in span the life cycle.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
314
views
0
answers
Define the terms. (1) Cyber Deception, (2) Cyber Hacktivists, (3) Cyber Operations Limitations.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
335
views
0
answers
Define the following terms. (1) Cyber space, (2) Full spectrum cyber, (3) Cyber ranges and information technology ranges, (4) Cyber Espionage.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
306
views
0
answers
What is partnership? Explain main features, and advantages of Partnership.
entrepreneurship and ebusiness
updated
23 months ago
by
prajapatijaimin
•
3.0k
0
votes
0
answers
323
views
0
answers
Explain the basic cyber operations activity concepts.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
407
views
0
answers
Express the contrapositive, converse and inverse forms of the following statement. if $3<b$ and $1+1=2$, then $\sin \frac{\pi}{3}=\frac{1}{2}$ .
discrete structures and graph theory
updated
23 months ago
by
prajapatijaimin
•
3.0k
1
vote
0
answers
927
views
0
answers
Define the cyber threat capability and it's tools.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
1
vote
0
answers
404
views
0
answers
How many Arsenal are available in cyber tools?
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
408
views
0
answers
Find $\operatorname{dnf}$ of $(p \rightarrow(q \wedge r)) \wedge(\sim p \rightarrow(\sim p \wedge \sim r))$ by truth table method.
discrete structures and graph theory
updated
23 months ago
by
prajapatijaimin
•
3.0k
0
votes
0
answers
539
views
0
answers
Consider metadata as an equivalent of Amazon Book Store where each data element is book. What this metadata will contain? Explain.
data warehouse and mining
updated
23 months ago
by
pradnyanabar2613
★
5.2k
2
votes
0
answers
375
views
0
answers
(Duplicate) What is a Firewall? Explain Firewall's types.
cyber security and laws
updated
23 months ago
by
Purvil
•
540
0
votes
0
answers
372
views
0
answers
Entity relationship diagram for managing a chain of hospitals.
database management systems
updated
23 months ago
by
bo2.k679
•
20
0
votes
0
answers
1.7k
views
0
answers
Convert Regular Expression 01* + 1 to Finite Automata.
automata theory
updated
23 months ago
by
DevarenjiniP
•
3.1k
0
votes
0
answers
2.4k
views
0
answers
Construct Mealy machine for (0 + 1)*(00 + 11) and convert to Moore machine
automata theory
updated
23 months ago
by
DevarenjiniP
•
3.1k
0
votes
0
answers
335
views
0
answers
How polynomial manipulations are performed with lists? Explain the operations
data structures and algorithms
updated
23 months ago
by
DevarenjiniP
•
3.1k
0
votes
0
answers
389
views
0
answers
Explain the steps involved in insertion and deletion into a singly and doubly linked list
data structures and algorithms
updated
23 months ago
by
DevarenjiniP
•
3.1k
0
votes
0
answers
373
views
0
answers
Vectors analysis 1
engineering mathematics
updated
24 months ago
by
hwinsleymuka737
•
20
0
votes
0
answers
210
views
0
answers
Lateral Load Pile Calculation
advanced geotechnical engineering
updated
24 months ago
by
Chandan15
•
300
<prev
• 2,893 results • page 1 of 116 •
next >
×
Top contributors for
*** MISSING ***
×
Merge
*** MISSING ***
to
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money