M.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following
|
|
- Mervyn Fox
- 5 years ago
- Views:
Transcription
1 (DMCA 301) Time : Three hours M.C.A DEGREE EXAMINATION, MAY Third Year Paper I ARTIFICIAL INTELLIGENCE SECTION A (3 15 = 45 marks) Answer any THREE of the following Maximum : 75 marks 1. (a) Explain about the reasons to study AI. (b) Describe the water jug problem. 2. Differentiate between A* and AO* algorithms. Explain AO*algorithm. 3. Explain about different issues to be considered in Knowledge representation. 4. Discuss in detail about forward versus backward reasoning. 5. What is an expert system? Discuss about the expert system shells. SECTION B (5 5 = 25 marks) Answer any FIVE of the following 6. Write a program to play Tic-Tac-Toe. 7. Write an algorithm for simulated annealing. 8. Describe the means-ends analysis method. 9. Explain the resolution procedure for prepositional logic. 10. Write the unification algorithm. 11. Explain the control knowledge search.
2 12. Discuss about the Dempster-Shafer theory. 13. Write a brief note on commonsense ontologies. SECTION C (5 1 = 5 marks) Answer ALL of the following 14. What is a production system? 15. What is AI Technique? 16. What is hill climbing? 17. What is natural language processing? 18. What is backward-chaining rule?
3 (DMCA 302) M.C.A. DEGREE EXAMINATION, MAY Third Year Paper II CRYPTOGRAPHY AND NETWORKS SECURITY Time : Three hours SECTION A (3 15 = 45 marks) Answer any THREE of the following. Maximum : 75 marks 1. Explain the following substitution techniques : (a) Caesar Cipher (b) Hill Cipher. 2. Explain in detail the AES key expansion algorithm. 3. Discuss about double DES and triple DES. 4. Explain about the principles of public-key cryptosysetms. 5. What is DSS approach? Explain the digital signature algorithm. SECTION B (5 5 = 25 marks) Answer any FIVE of the following. 6. Explain the difference between differential and linear cryptanalysis. 7. Write the Euclidean algorithm for polynomials and use it to find ( a ( x), b( x) ) a ( x) = x + x + x + x + x + x + 1, b ( x) = x + x + x Briefly describe the key expansion algorithm. 9. Explain the difference between a session key and a master key. 10. Explain the factoring problem. 11. What is the difference between direct and arbitrated digital signature? 12. Briefly write about password management. 13. What are the design goals for a firewall? gcd where
4 SECTION C (5 1 = 5 marks) Answer ALL of the following. 14. What is one-time pad? 15. What is a meet-in-the-middle attack? 16. What is Euler s totient function. 17. What is a honeyport? 18. What is a circuit-level gateway?
5 (DMCA 303) Time : Three hours M.C.A. DEGREE EXAMINATION, MAY Third Year Paper III EMBEDDED SYSTEMS SECTION A (3 15 = 45 marks) Answer any THREE of the following. Maximum : 75 marks 1. Explain about various cache mapping Technologies. 2. Explain about various embedded processor Technologies. 3. Explain Data flow models. 4. Explain control process models. 5. Explain single purpose processors. SECTION B (5 5 = 25 marks) Answer any FIVE of the following. 6. Explain about priority arbiter. 7. Explain stepper motor controllers. 8. Discuss how to select a micro processor for an embedded system design. 9. Explain the architecture of a general purpose processor. 10. Explain elevator controller using PSM. 11. Explain about Interrupt. 12. Explain about Memory. 13. Explain the terms (a) (b) Software and Hardware
6 SECTION C (5 1 = 5 marks) Answer ALL questions. 14. Define port. 15. Define Cross complier. 16. What is meant by Real time systems? 17. What is CMOS? 18. What is FPGA?
7 (DMCA 304) M.C.A. DEGREE EXAMINATION, MAY Third Year Paper IV DATA MINING TECHNIQUES Time : Three hours Maximum : 75 marks SECTION A (3 15 = 45 marks) Answer any THREE of the following. 1. Define a random variable and discuss its relationships between multiple random variables. 2. What is dimensional modeling? Discuss in the detail various schemes for modeling multidimensional data for data warehouse development. 3. Explain about various partitional algorithms used for data clustering. 4. Discuss various optimization methods for continuous parameter spaces. 5. What is SQL? Discuss different ways of evaluating a query with examples. SECTION B (5 5 = 25 marks) Answer any FIVE of the following. 6. Contrast the differences between data mining versus knowledge discovery in databases. 7. Describe the significance of neural networks. Also explain their advantages. 8. What are the predictive models for classification? 9. What is association rule learning? Explain. 10. What is uncertanity? Explain how fuzzy theory can quantify uncertanity. 11. Discuss about models and patterns. 12. Discuss about search and optimization methods. 13. Describe predictive modeling for regression.
8 14. What is score function? SECTION C (5 1 = 5 marks) Answer ALL of the following. 15. What is descriptive modeling? 16. What is OLAP? 17. What is Data organization? 18. What is multidimensional scaling?
9 M.C.A. DEGREE EXAMINATION, MAY Third Year Paper V SYSTEMS AUDITING (DMCA 305) Time : Three hours SECTION A (3 15 = 45 marks) Answer any THREE of the following Maximum : 75 marks 1. Explain programming Management Controls. 2. Differentiate between Application Controls and Management Control of Information systems. 3. Explain effectiveness of system evaluation process. 4. Explain Concurrent Audit Techniques. 5. Explain Quality Assurance Management Control. SECTION B (5 5 = 25 marks) Answer any FIVE of the following 6. Explain Database Controls. 7. Discuss Expert system. 8. Explain about output controls. 9. What is distributed database environment? 10. Explain Public key Cryptography. 11. Explain test Data and code comparision.
10 12. How does the real memory errors are detected? 13. Explain Evaluation system Efficiency. SECTION C (5 1 = 5 marks) Answer ALL the following 14. Define Auditing. 15. What is sandwitch testing? 16. What is meant by crypto system? 17. Define Data Integrity. 18. Why Information controls are used?
1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step.
(DMCA 301) ASSIGNMENT - 1, MAY - 2016. PAPER- I : ARTIFICIAL INTELLIGENCE 1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill
More information(DMSIT21) Software Engineering. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY
ASSIGNMENT-1 Second Year Software Engineering MAXIMUM MARKS:30 (DMSIT21) Q1) Explain Waterfall and Concurrent development process models. Q2) Discuss about the eliciting requirements of requirements engineering.
More informationM.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75
(DMSIT21) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - I : Software Engineering Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions
More information(DMCS21) User Interface Design. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC (Second Year) COMPUTER SCIENCE. MAXIMUM MARKS:30 Answer ALL Questions
ASSIGNMENT-1 User Interface Design MAXIMUM MARKS:30 (DMCS21) Q1) Discuss the characteristics of Graphics interface in detail. Q2) Discuss with suitable examples the human characteristics in design. Q3)
More information4) Discuss on various types of software myths and the true aspects of these myths.
(DMSIT 21) ASSIGNMENT - 1, DEC - 2018. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following: a) CMMI b) RAD model 2) Elaborate different requirement engineering tasks. 3) Discuss about class-based
More informationTime: 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answers from all the Groups as directed. Group A.
COPYRIGHT RESERVED End Sem (V) MCA (XXVIII) 2017 Time: 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate
More informationDEGREE EXAMINATION, MAY
ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, MAY - 2018 User Interface Design (DMCS21) Q1) Explain the characteristics and principles of user interface design. Q2) Name the models of user interface design. Illustrate
More informationUNIT -1 UNIT -II. Q. 4 Why is entity-relationship modeling technique not suitable for the data warehouse? How is dimensional modeling different?
(Please write your Roll No. immediately) End-Term Examination Fourth Semester [MCA] MAY-JUNE 2006 Roll No. Paper Code: MCA-202 (ID -44202) Subject: Data Warehousing & Data Mining Note: Question no. 1 is
More informationThe question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the
More informationSankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank
Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional
More informationM.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from
M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from 2017-18 Sl. No Course No. Subject Teaching Schedule Examination
More information10EC832: NETWORK SECURITY
10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationQuestion Bank. 4) It is the source of information later delivered to data marts.
Question Bank Year: 2016-2017 Subject Dept: CS Semester: First Subject Name: Data Mining. Q1) What is data warehouse? ANS. A data warehouse is a subject-oriented, integrated, time-variant, and nonvolatile
More informationCRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK
CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define
More informationTotal No. of Questions : 09 ] [ Total No.of Pages : 02
CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three
More informationR07. FirstRanker. 7. a) What is text mining? Describe about basic measures for text retrieval. b) Briefly describe document cluster analysis.
www..com www..com Set No.1 1. a) What is data mining? Briefly explain the Knowledge discovery process. b) Explain the three-tier data warehouse architecture. 2. a) With an example, describe any two schema
More informationCIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm
CIS 4360 Introduction to Computer Security Fall 2010 WITH ANSWERS in bold Name:.................................... Number:............ First Midterm Instructions This is a closed-book examination. Maximum
More informationMaster & Doctor of Philosophy Programs in Computer Science
Master & Doctor of Philosophy Programs in Computer Science Research Fields Pattern Recognition Data Analysis Internet of Things and Network Communication Machine Learning Web Semantic and Ontology For
More informationNepal Telecom Nepal Doorsanchar Company Ltd.
Nepal Telecom Nepal Doorsanchar Company Ltd. Syllabus lg=g+= 124 ;+u ;DalGwt cg';'lr - 3_ Part II: (Specialized subject for Computer Engineer Level 7 Tech. - Free and Internal competition) Time: 2 hours
More informationIntroduction to information Security
First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:
More informationProgramme Outcome COURSE OUTCOMES MCA
Programme Outcome PO1: To provide trained human resource for the IT industry. COURSE OUTCOMES MCA MCA 101 : Object Oriented Programming CO1 The students develops a sound approach to problem solving using
More informationDEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year / Semester: IV/VII CS1011-DATA
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationHEURISTIC SEARCH. 4.3 Using Heuristics in Games 4.4 Complexity Issues 4.5 Epilogue and References 4.6 Exercises
4 HEURISTIC SEARCH Slide 4.1 4.0 Introduction 4.1 An Algorithm for Heuristic Search 4.2 Admissibility, Monotonicity, and Informedness 4.3 Using Heuristics in Games 4.4 Complexity Issues 4.5 Epilogue and
More informationIT DATA WAREHOUSING AND DATA MINING UNIT-2 BUSINESS ANALYSIS
PART A 1. What are production reporting tools? Give examples. (May/June 2013) Production reporting tools will let companies generate regular operational reports or support high-volume batch jobs. Such
More informationData Mining. Ryan Benton Center for Advanced Computer Studies University of Louisiana at Lafayette Lafayette, La., USA.
Data Mining Ryan Benton Center for Advanced Computer Studies University of Louisiana at Lafayette Lafayette, La., USA January 13, 2011 Important Note! This presentation was obtained from Dr. Vijay Raghavan
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationANNA UNIVERSITY :: CHENNAI - 25 TIME TABLE M.C.A. (DISTANCE EDUCATION) DEGREE EXAMINATIONS AUGUST - SEPTEMBER
MCA 31-AUG-16 30-AUG-16 1 2 3 4 111001 : Programming Languages 111002 : Management Accounting 111003 : Data Structures and C 111004 : Computer Architecture and Organization 111005 : Operating Systems 112010
More informationStudy Guide to Mideterm Exam
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #7 Professor M. J. Fischer February 20, 2012 Study Guide to Mideterm Exam For the exam, you are responsible
More informationSirindhorn International Institute of Technology Thammasat University
1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : CSS 322 Security and Cryptography Instructor
More informationDATA WAREHOUING UNIT I
BHARATHIDASAN ENGINEERING COLLEGE NATTRAMAPALLI DEPARTMENT OF COMPUTER SCIENCE SUB CODE & NAME: IT6702/DWDM DEPT: IT Staff Name : N.RAMESH DATA WAREHOUING UNIT I 1. Define data warehouse? NOV/DEC 2009
More information(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography
Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider
More informationTIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz Nov 10, 2016 Class Announcements n Database Assignment 2 posted n Due 11/22 The Database Approach to Data Management The Final Database Design
More informationComputational Intelligence Applied on Cryptology: a Brief Review
Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence
More informationHybrid Feature Selection for Modeling Intrusion Detection Systems
Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,
More informationForeword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the
Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the M-94 Cryptography and History Cryptography and Computers
More informationTechnological foundation
Technological foundation Carte à puce et Java Card 2010-2011 Jean-Louis Lanet Jean-louis.lanet@unilim.fr Cryptology Authentication Secure upload Agenda Cryptology Cryptography / Cryptanalysis, Smart Cards
More informationInformation Security: Principles and Practice Second Edition. Mark Stamp
Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1
More informationManagement Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT
MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT VIDEO CASES Case 1: Maruti Suzuki Business Intelligence and Enterprise Databases
More informationUNIT -1 UNIT -II. Q. 4 Why is entity-relationship modeling technique not suitable for the data warehouse? How is dimensional modeling different?
(Please write your Roll No. immediately) End-Term Examination Fourth Semester [MCA] MAY-JUNE 2006 Roll No. Paper Code: MCA-202 (ID -44202) Subject: Data Warehousing & Data Mining Time: 3 Hours Maximum
More informationWKU-MIS-B10 Data Management: Warehousing, Analyzing, Mining, and Visualization. Management Information Systems
Management Information Systems Management Information Systems B10. Data Management: Warehousing, Analyzing, Mining, and Visualization Code: 166137-01+02 Course: Management Information Systems Period: Spring
More informationTribhuvan University Institute of Science and Technology MODEL QUESTION
MODEL QUESTION 1. Suppose that a data warehouse for Big University consists of four dimensions: student, course, semester, and instructor, and two measures count and avg-grade. When at the lowest conceptual
More informationTIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz May 20, 2014 Announcements DB 2 Due Tuesday Next Week The Database Approach to Data Management Database: Collection of related files containing
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that
More informationImplementing and Maintaining Microsoft SQL Server 2008 Analysis Services
Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Course Details Course Outline Module 1: Introduction to Microsoft SQL Server Analysis Services This module introduces
More informationFaculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)
Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.
More informationEncryption Details COMP620
Encryption Details COMP620 Encryption is a powerful defensive weapon for free people. It offers a technical guarantee of privacy, regardless of who is running the government It s hard to think of a more
More informationName of the lecturer Doç. Dr. Selma Ayşe ÖZEL
Y.L. CENG-541 Information Retrieval Systems MASTER Doç. Dr. Selma Ayşe ÖZEL Information retrieval strategies: vector space model, probabilistic retrieval, language models, inference networks, extended
More information9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis
More informationAn Efficient Approach for Color Pattern Matching Using Image Mining
An Efficient Approach for Color Pattern Matching Using Image Mining * Manjot Kaur Navjot Kaur Master of Technology in Computer Science & Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib,
More informationSIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) UNIT-I
SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : CO (16MC802) Year & Sem: I-MCA & I-Sem Course & Branch: MCA Regulation:
More informationIBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper
IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper 1. The tracks on a disk which can be accused without repositioning the R/W heads is (A) Surface (B) Cylinder (C) Cluster 2. Which
More informationData Warehouse and Mining
Data Warehouse and Mining 1. is a subject-oriented, integrated, time-variant, nonvolatile collection of data in support of management decisions. A. Data Mining. B. Data Warehousing. C. Web Mining. D. Text
More informationTaking Your Application Design to the Next Level with Data Mining
Taking Your Application Design to the Next Level with Data Mining Peter Myers Mentor SolidQ Australia HDNUG 24 June, 2008 WHO WE ARE Industry experts: Growing, elite group of over 90 of the world s best
More informationUniversity of Mumbai Institute of Distance and Open Learning
Page 1 University of Mumbai Institute of Distance and Open Learning T.Y.B.Sc. (IT) Semester - V 2012-13 SUBJECT: INTERNET SECURITY 1 Explain Diffie Hellman key exchange algorithm and problem associated
More informationCode No: R Set No. 1
Code No: R05321204 Set No. 1 1. (a) Draw and explain the architecture for on-line analytical mining. (b) Briefly discuss the data warehouse applications. [8+8] 2. Briefly discuss the role of data cube
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationSCHEME OF COURSE WORK. Data Warehousing and Data mining
SCHEME OF COURSE WORK Course Details: Course Title Course Code Program: Specialization: Semester Prerequisites Department of Information Technology Data Warehousing and Data mining : 15CT1132 : B.TECH
More informationChapter 3. Databases and Data Warehouses: Building Business Intelligence
Chapter 3 Databases and Data Warehouses: Building Business Intelligence How Can a Business Increase its Intelligence? Summary Overview of Main Concepts Details/Design of a Relational Database Creating
More information1 (eagle_eye) and Naeem Latif
1 CS614 today quiz solved by my campus group these are just for idea if any wrong than we don t responsible for it Question # 1 of 10 ( Start time: 07:08:29 PM ) Total Marks: 1 As opposed to the outcome
More information1. a) Discuss primitive recursive functions with an example? 15M Or b) Statements and applications of Euler s and Fermat s Theorems?
MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 1. a) Discuss primitive recursive functions with an example? 15M b) Statements and applications of Euler s and Fermat s Theorems? 15M 2. a) Define DFA and NFA
More informationSESSION M12-S12 INTERNAL ASSIGNMENT
MASTER OF COMPUTER APPLICATIONS RELATIONAL DATABASE MENAGEMENT SYSTEM PAPER CODE: MCA-401 SECTION-A Answer the following questions in around 100 words. 1. What are the differences between simple and composite
More informationState Space Search. Many problems can be represented as a set of states and a set of rules of how one state is transformed to another.
State Space Search Many problems can be represented as a set of states and a set of rules of how one state is transformed to another. The problem is how to reach a particular goal state, starting from
More informationLecture 3: Symmetric Key Encryption
Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07
More informationAjloun National University
Study Plan Guide for the Bachelor Degree in Computer Information System First Year hr. 101101 Arabic Language Skills (1) 101099-01110 Introduction to Information Technology - - 01111 Programming Language
More informationCryptography and Network Security
Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY
More informationM. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)
BHARATHIDASAN UNIVERSITY TIRUCHIRAPPALLI 620 024 M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year 2007-2008 onwards) SEMESTER I COURSE TITLE MARKS
More informationDate & Day CSE-58 CS-05 CNIS-78. Network Security (Elec-C1) Software Engineering(Open Elec) Software Architecture and Design Patterns (Elec-C2)
M.Tech. I Year I Sem. (R15-Regular)(2015 Batch) February-2016 Examination Timings-10-00 AM To 01-00 PM Date & Day CSE-58 CS-05 CNIS-78 Data Structures and Algorithms Data Structures and Algorithms Data
More informationDept. of Electrical Engineering
Department of Electrical Engineering Curriculum for M Tech in Instrumentation and Control(EEA) Semester 1 1 MA6002 Applied Mathematics 3 0-3 2 EE6101 Dynamics of Linear Systems 3 0-3 3 EE6103 Applied Instrumentation
More informationData Mining Overview. CHAPTER 1 Introduction to SAS Enterprise Miner Software
1 CHAPTER 1 Introduction to SAS Enterprise Miner Software Data Mining Overview 1 Layout of the SAS Enterprise Miner Window 2 Using the Application Main Menus 3 Using the Toolbox 8 Using the Pop-Up Menus
More informationDisquisition of a Novel Approach to Enhance Security in Data Mining
Disquisition of a Novel Approach to Enhance Security in Data Mining Gurpreet Kaundal 1, Sheveta Vashisht 2 1 Student Lovely Professional University, Phagwara, Pin no. 144402 gurpreetkaundal03@gmail.com
More informationOracle Database 11g: Data Warehousing Fundamentals
Oracle Database 11g: Data Warehousing Fundamentals Duration: 3 Days What you will learn This Oracle Database 11g: Data Warehousing Fundamentals training will teach you about the basic concepts of a data
More informationCS6302- DATABASE MANAGEMENT SYSTEMS- QUESTION BANK- II YEAR CSE- III SEM UNIT I
CS6302- DATABASE MANAGEMENT SYSTEMS- QUESTION BANK- II YEAR CSE- III SEM UNIT I 1.List the purpose of Database System (or) List the drawback of normal File Processing System. 2. Define Data Abstraction
More informationPESIT- Bangalore South Campus Hosur Road (1km Before Electronic city) Bangalore
Data Warehousing Data Mining (17MCA442) 1. GENERAL INFORMATION: PESIT- Bangalore South Campus Hosur Road (1km Before Electronic city) Bangalore 560 100 Department of MCA COURSE INFORMATION SHEET Academic
More informationInternational Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16
The Survey Of Data Mining And Warehousing Architha.S, A.Kishore Kumar Department of Computer Engineering Department of computer engineering city engineering college VTU Bangalore, India ABSTRACT: Data
More informationDATA MINING AND WAREHOUSING
DATA MINING AND WAREHOUSING Qno Question Answer 1 Define data warehouse? Data warehouse is a subject oriented, integrated, time-variant, and nonvolatile collection of data that supports management's decision-making
More informationSIR C R REDDY COLLEGE OF ENGINEERING
SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationComputer Engineering Syllabus 2017
INTRODUCTION The Canadian Engineering Qualifications Board of Engineers Canada issues the Examination Syllabus that includes a continually increasing number of engineering disciplines. Each discipline
More informationSIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)
SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : Data Warehousing and Mining (16MC815) Year & Sem: II-MCA & I-Sem Course
More informationMaster of Business Administration- MBA Semester 3. MB0050 Research Methodology - 4 Credits. (Book ID: B1206) Assignment Set - 1 (60 Marks)
Master of Business Administration- MBA Semester 3 MB0050 Research Methodology - 4 Credits (Book ID: B1206) Assignment Set - 1 (60 Marks) Note: Each question carries 10 Marks. Answer all the questions.
More informationVALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : III & VI Section : CSE - 2 Subject Code : IT6702 Subject Name : Data warehousing
More informationSyllabus for Ph.D Entrance Test, RGPV. Common for CSE/IT/CA
Syllabus for Ph.D Entrance Test, RGPV. Common for CSE/IT/CA Algorithms: Algorithms and complexity; Combinatorics and graph theory; Geometric Algorithms, Parallel and Distributed Algorithms, Randomized
More informationBusiness Intelligence Roadmap HDT923 Three Days
Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are
More informationAll Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME
All Rights Reserved Index No No. of Pages - 13 No of Questions - 07 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME YEAR II SEMESTER I (Intake II/III Group
More informationLecture 4: Symmetric Key Encryption
Lecture 4: Symmetric ey Encryption CS6903: Modern Cryptography Spring 2009 Nitesh Saxena Let s use the board, please take notes 2/20/2009 Lecture 1 - Introduction 2 Data Encryption Standard Encrypts by
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationSRI VENKATESWARA COLLEGE OF ENGINEERING
COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK
More informationDr.G.R.Damodaran College of Science
1 of 20 8/28/2017 2:13 PM Dr.G.R.Damodaran College of Science (Autonomous, affiliated to the Bharathiar University, recognized by the UGC)Reaccredited at the 'A' Grade Level by the NAAC and ISO 9001:2008
More informationExploiting the OpenPOWER Platform for Big Data Analytics and Cognitive. Rajesh Bordawekar and Ruchir Puri IBM T. J. Watson Research Center
Exploiting the OpenPOWER Platform for Big Data Analytics and Cognitive Rajesh Bordawekar and Ruchir Puri IBM T. J. Watson Research Center 3/17/2015 2014 IBM Corporation Outline IBM OpenPower Platform Accelerating
More informationAccelerated SQL Server 2012 Integration Services
1 Accelerated SQL Server 2012 Integration Services 4 Days (BI-ISACL12-301-EN) Description This 4-day instructor led training focuses on developing and managing SSIS 2012 in the enterprise. In this course,
More informationOracle 1Z0-515 Exam Questions & Answers
Oracle 1Z0-515 Exam Questions & Answers Number: 1Z0-515 Passing Score: 800 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ Oracle 1Z0-515 Exam Questions & Answers Exam Name: Data Warehousing
More informationDatabase Development (H4)
IMIS HIGHER DIPLOMA QUALIFICATIONS Database Development (H4) Thursday 30 th November 2017 10:00hrs 13:00hrs DURATION: 3 HOURS Candidates should answer ALL EIGHT questions in Part A and THREE of the FIVE
More informationAssignment For Promote (Session ) students Of MCA 5-year (Through Distance Education)
Assignment For Promote (Session 2018-2019) students Of MCA 5-year (Through Distance Education) For session 2018-2019 Directorate of Distance Education Guru Jambeshwar University of Science & Technology,
More informationCHAPTER 8 DECISION SUPPORT V2 ADVANCED DATABASE SYSTEMS. Assist. Prof. Dr. Volkan TUNALI
CHAPTER 8 DECISION SUPPORT V2 ADVANCED DATABASE SYSTEMS Assist. Prof. Dr. Volkan TUNALI Topics 2 Business Intelligence (BI) Decision Support System (DSS) Data Warehouse Online Analytical Processing (OLAP)
More informationData Warehousing & Mining. Data integration. OLTP versus OLAP. CPS 116 Introduction to Database Systems
Data Warehousing & Mining CPS 116 Introduction to Database Systems Data integration 2 Data resides in many distributed, heterogeneous OLTP (On-Line Transaction Processing) sources Sales, inventory, customer,
More informationData warehouse and Data Mining
Data warehouse and Data Mining Lecture No. 14 Data Mining and its techniques Naeem A. Mahoto Email: naeemmahoto@gmail.com Department of Software Engineering Mehran Univeristy of Engineering and Technology
More information