M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75
|
|
- Dorthy Sims
- 5 years ago
- Views:
Transcription
1 (DMSIT21) M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY Paper - I : Software Engineering Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Discuss in detail the capability maturity model integration. 2) How do you initiate requirement engineering process and explain requirement elicitation format. 3) Explain in detail various design elements in design model. 4) Explain black box testing technique in detail. 5) Explain the following : a) CK metrics suite b) Metrics for testing Section B (5 5 = 25) Answer any five questions 6) Discuss about different software myths and their corresponding realities. 7) Describe the prototyping process model. 8) Explain the communication practices of software engineering practice. 9) Explain the system engineering hierarchy. 10) Describe class Responsibility collaborator modeling of analysis model.
2 11) Develope different levels of DFD for safe home security function. 12) Discuss about the art of debugging. 13) Explain the function based metrics for the analysis model. Section C (5 1 = 5) Answer all questions 14) What is legacy software? 15) What do you mean by computer based system? 16) What is refactoring? 17) What are the factors of ISO 9126 quality factors? 18) What are cohesion metrics?
3 (DMSIT22) M.Sc. (Final) DEGREE EXAMINATION, DEC (Second Year) INFORMATION TECHNOLOGY Paper - II : Programming With C++ Time :.03 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Describe the following : a) Variable scope b) Dynamic memory allocation 2) Explain about call by value, call by reference and call by constant reference with suitable example. 3) What is pointer? How to create pointers in C++? Give the advantages of pointers. 4) What is operator overloading? Write a C++ program to overload +, operators for addition, subtraction of complex numbers respectively. 5) What is class template? What is its syntax? Explain class templates with multiple parameters. Section B (5 5 = 25) Answer any five questions 6) Explain about type casting is C++. 7) What is the syntax of switch structure? Write a program to accept a month number and display the maximum number of days in the month. 8) Describe any five string handling functions in C++. 9) What is constructor? Give the characteristics of constructors.
4 10) Explain about multiple inheritance with suitable example. 11) Explain how a single try block can be associated with multiple catch blocks. 12) Write a program to find number of characters, words and lines in a given text. 13) Briefly write about container classes. Section C (5 1 = 5) Answer all questions 14) What is a relational expression? 15) Differentiate between while loop and do-while loop. 16) What are formal arguments? 17) What is pointer? 18) What is function overriding?
5 (DMSIT23) M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY Paper - III : TCP/IP Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Explain in detail about TCP/IP protocol with neat diagram. 2) Explain Network technologies and Internetworking in detail. 3) Describe ARP and RARP in detail. 4) Explain routing protocols in detail. 5) Explain client Server model in detail. Section B (5 5 = 25) Answer any five questions 6) Differentiate between Classless and classful addressing in detail. 7) Discuss about different categories of networks. 8) Describe routing IP datagram. 9) Write about user Datagram protocol. 10) Discuss about error and control messages. 11) Describe about ICMP. 12) Describe Socket Interface. 13) Write about DHCP.
6 Section C (5 1 = 5) Answer all questions 14) What is Internet? 15) Define protocol. 16) What is IP? 17) Define Datagram. 18) What is subnetting?
7 (DMSIT24) M.Sc. (Final) DEGREE EXAMINATION, DEC (Second Year) INFORMATION TECHNOLOGY Paper - IV : Data Mining & Techniques Time : 3 Hours Maximum Marks : 75 Section - A (3 x 15 = 45) Answer any Three of the following 1) Briefly discuss about architecture of a typical Data Mining System. 2) Explain about Descriptive Data Summarization Model. 3) Discuss in detail about Bayesian classification. 4) Differentiate between Parallel and Distributed Algorithms clearly. 5) Explain score functions of Predictive Models. Section - B (5 x 5 = 25) Answer any Five of the following 6) Explain the components of Data Mining Algorithms. 7) What are different types of measurement for Data? 8) Describe about Multidimensional Scaling. 9) Explain CART algorithm for building tree classifiers. 10) Discuss about Fundamentals of Modeling. 11) Explain about different patterns for strings.
8 12) What is Multivariate Parameter optimization? 13) What are special-purpose Algorithms for Disk Access. Section - C (5 x 1 = 5) Answer all questions 14) What is snooping? 15) What are forms of Data? 16) What is classification? 17) Define Regression. 18) What is OLAP?
9 (DMSIT25) M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY Paper - V : Cryptography and Network Security Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Describe DES encryption algorithm with an example. 2) Write extended Euclidean algorithm and use it to find the multiplicative inverse of mod ) Explain in detail the key distribution techniques. 4) Describe RSA algorithm with an illustrative example. 5) Discuss about firewall design principles. Section B (5 5 = 25) Answer any five questions 6) Explain the transposition cipher with an illustrative example. 7) Describe the evaluation criteria for AES. 8) Explain the difference between the AES decryption algorithm and equivalent inverse cipher. 9) Explain the RC4 algorithm. 10) Discuss about different approaches to generate random numbers. 11) Explain the Miller- Rabin algorithm to test a large number for primality.
10 12) Explain the mutual authentication technique. 13) Discuss about UNIX password protection scheme. Section C (5 1 = 5) Answer all questions 14) What is symmetric cipher? 15) What is the purpose of the state array? 16) What is a nonce? 17) Define Euler s totient function? 18) What is a honeypot?
11 (DMSIT26) M.Sc. (Final) DEGREE EXAMINATION, DEC (Examination at the end of Second Year) INFORMATION TECHNOLOGY Paper - VI : Artificial Intelligence Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three of the following 1) What is state space approach? Explain about watering problem through state space approach. 2) a) Differentiate Depth first search and breadth first search technique. b) Describe various approaches and issues in knowledge representation. 3) Explain about the steepest Ascent Hill climbing technique in detail. 4) Explain about the characteristic features of expert systems in detail. 5) Explain about the semantic nets. Suggest a semantic net to describe the main organs of the human body. Section B (5 5 = 25) Answer any five questions 6) Explain about the applications of AI. 7) Write a short notes on heuristic search technique. 8) Discuss about back propagation training 9) Explain about monotonic and non-monotonic reasoning problem. 10) Explain about semantic analysis. 11) Explain about symbolic based learning techniques.
12 12) Explain the memory organization of commonsense behaviour. 13) Write a short notes on Dempster shafer theory. Section C (5 1 = 5) Answer all questions 14) What is AI? 15) What is frame? 16) Define predicate. 17) What is crypt arithmetic problem? 18) Define an Expert system.
(DMSIT21) Software Engineering. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY
ASSIGNMENT-1 Second Year Software Engineering MAXIMUM MARKS:30 (DMSIT21) Q1) Explain Waterfall and Concurrent development process models. Q2) Discuss about the eliciting requirements of requirements engineering.
More information4) Discuss on various types of software myths and the true aspects of these myths.
(DMSIT 21) ASSIGNMENT - 1, DEC - 2018. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following: a) CMMI b) RAD model 2) Elaborate different requirement engineering tasks. 3) Discuss about class-based
More information1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step.
(DMCA 301) ASSIGNMENT - 1, MAY - 2016. PAPER- I : ARTIFICIAL INTELLIGENCE 1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill
More informationM.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following
(DMCA 301) Time : Three hours M.C.A DEGREE EXAMINATION, MAY 2012. Third Year Paper I ARTIFICIAL INTELLIGENCE SECTION A (3 15 = 45 marks) Answer any THREE of the following Maximum : 75 marks 1. (a) Explain
More information(DMCS21) User Interface Design. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC (Second Year) COMPUTER SCIENCE. MAXIMUM MARKS:30 Answer ALL Questions
ASSIGNMENT-1 User Interface Design MAXIMUM MARKS:30 (DMCS21) Q1) Discuss the characteristics of Graphics interface in detail. Q2) Discuss with suitable examples the human characteristics in design. Q3)
More informationM.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from
M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from 2017-18 Sl. No Course No. Subject Teaching Schedule Examination
More informationM.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Paper - I : DATA STRUCTURES
(DMCS 01) M.Sc. (Previous) DEGREE EXAMINATION, MAY - 2014 (Examination at the end of First Year) Computer Science Paper - I : DATA STRUCTURES Time : 03 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer
More information10EC832: NETWORK SECURITY
10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to
More informationSRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : M.Sc-CST Semester / Year : Even / II Subject Name
More informationINFORMATION TECHNOLOGY
[DMSIT 01] M.Sc. (Previous) DEGREE EXAMINATION, DEC 2013 First Year INFORMATION TECHNOLOGY Paper I BASICS OF INFORMATION TECHNOLOGY Time : 3 hours Max. Marks : 75 Section A (3x15 = 45) Answer any THREE
More informationAO* algorithm Game playing algorithms: min-max algorithm C12 Game playing algorithms: alpha beta pruning. Assignment 1
Lecture Planning Starting w.e.f January 2018 Name of the Institute : Aravali College of Engineering & Management Name of teacher with designation: Ms. Ekta Dagar, Assistant Professor Department: Computer
More informationCOMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory
COMPUTER MCQs 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory 4)virtual memory 5) None of the above 2. The component is used by the data analyst to create
More informationSankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank
Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional
More informationTotal No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE.
(DMCS01) Total No. of Questions : 18] [Total No. of Pages : 02 M.Sc. DEGREE EXAMINATION, DEC. 2016 First Year COMPUTER SCIENCE Data Structures Time : 3 Hours Maximum Marks : 70 Section - A (3 x 15 = 45)
More information1) What is information system? Describe the basic concepts of information systems.
(DMSIT 01) ASSIGNMENT - 1, DEC - 2018. PAPER- I : BASICS OF 1) What is information system? Describe the basic concepts of information systems. 2) Discuss about input and output technologies of computer
More informationSIR C R REDDY COLLEGE OF ENGINEERING
SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,
More informationCS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities
More informationLecture Topics (including assignment and tests) day day Topic. The process, software products, emergence of software engineering
NAME OF FACULTY: : Mr. Sarjender Yadav DISCIPLINE: : Computer Science and Engineering SEMESTER: : 6th SUBJECT: : Principle of Software Engineering LESSON PALN DURATION: 15 WEEKS (from FEB 2018 to MAY 2018)
More informationDEGREE EXAMINATION, MAY
ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, MAY - 2018 User Interface Design (DMCS21) Q1) Explain the characteristics and principles of user interface design. Q2) Name the models of user interface design. Illustrate
More informationComputer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING
i SYLLABUS UNIT - 1 CHAPTER - 1 : INTRODUCTION Uses of Computer Networks, Network Hardware, Network Software, Reference Models (ISO-OSI, TCP/IP). CHAPTER - 2 : NETWORK LAYER Network Layer Design Issues,
More informationM.Sc. (Computer Science) I Year Assignments for May Paper I DATA STRUCTURES Assignment I
Paper I DATA STRUCTURES (DMCS 01) 1. Explain in detail about the overview of Data structures. 2. Explain circular linked list and double-linked list. 3. Explain CPU scheduling in Multiprogramming Environment.
More informationTotal No. of Questions : 09 ] [ Total No.of Pages : 02
CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationPreface to the Second Edition Preface to the First Edition Brief Contents Introduction to C++ p. 1 A Review of Structures p.
Preface to the Second Edition p. iii Preface to the First Edition p. vi Brief Contents p. ix Introduction to C++ p. 1 A Review of Structures p. 1 The Need for Structures p. 1 Creating a New Data Type Using
More informationHands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...
Hands-On Internetworking, TCP/IP, VLANS, Wirelss 802.11 and more... Course Description The Internet Protocol Suite, commonly known as TCP/IP, forms the basis for the Internet and the next generation of
More informationLecture Plan-1. Contents Methodology Time Queries Remarks. Question/ Answers. Discussion. Chalk Board. &Discussion. Discussion 10
Lecture Plan-1 Objective:- to networking. 2. to basics of networking. 10 OSI & TCP/IP Communication model in detail. & 20 10 Lecture Plan 2 Objective:-. Understanding the TC/IP Protocol architecture &
More informationObject Oriented Programming with c++ Question Bank
Object Oriented Programming with c++ Question Bank UNIT-1: Introduction to C++ 1. Describe the following characteristics of OOP. i Encapsulation ii Polymorphism, iii Inheritance 2. Discuss function prototyping,
More informationADMINISTRATIVE MANAGEMENT COLLEGE
First Semester ADMINISTRATIVE MANAGEMENT COLLEGE BACHELOR OF COMPUTER APPLICATION COURSE OUTCOME (CO) Problem solving techniques Using C CO 1: Understand the basic concepts of programming, software and
More information10CS64-Computer Networks-II Question Bank PART A
10CS64-Computer Networks-II Question Bank PART A Unit -1 PACKET SWITCHING NETWORKS-I:In this chapter we learn what is packet switching networks, general issues regarding packet switching networks. We examine
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationCOURSE OUTCOMES M.Sc (Computer Science)
COURSE OUTCOMES M.Sc (Computer Science) CS-101 Advanced C++ Programming 1. Understand advanced concepts for handling runtime errors using stack unwinding, uncaught exception and automatic cleanup. 2. Study
More informationRashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,
SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationM. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)
BHARATHIDASAN UNIVERSITY TIRUCHIRAPPALLI 620 024 M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year 2007-2008 onwards) SEMESTER I COURSE TITLE MARKS
More informationIntroduction to Data Analytics Maximum : 60 Marks (1X12 = 12 Marks) (4X12=48 Marks) 1. Answer all questions (1X12=12 Marks)
14CS IT 601 Common for CSE & IT Introduction to Data Analytics 1. Answer all questions (1X12=12 Marks) a) What is R Programming? b) what are the data types in R? c) What is the difference between "%%"
More informationCryptography and Network Security
Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY
More informationIntro to OOP Visibility/protection levels and constructors Friend, convert constructor, destructor Operator overloading a<=b a.
Intro to OOP - Object and class - The sequence to define and use a class in a program - How/when to use scope resolution operator - How/when to the dot operator - Should be able to write the prototype
More informationCode No: R Set No. 1
Code No: R05321204 Set No. 1 1. (a) Draw and explain the architecture for on-line analytical mining. (b) Briefly discuss the data warehouse applications. [8+8] 2. Briefly discuss the role of data cube
More information"Charting the Course to Your Success!" MOC B Programming in C# Course Summary
Course Summary Description This training course teaches developers the programming skills that are required for developers to create Windows applications using the C# language. During their five days in
More informationDietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++
Dietrich Paulus Joachim Hornegger Pattern Recognition of Images and Speech in C++ To Dorothea, Belinda, and Dominik In the text we use the following names which are protected, trademarks owned by a company
More informationStandard. Number of Correlations
Computer Science 2016 This assessment contains 80 items, but only 80 are used at one time. Programming and Software Development Number of Correlations Standard Type Standard 2 Duty 1) CONTENT STANDARD
More informationQuestion Paper Code : 97044
Reg. No. : Question Paper Code : 97044 B.E./B.Tech. DEGREE EXAMINATION NOVEMBER/DECEMBER 2014 Third Semester Computer Science and Engineering CS 6301 PROGRAMMING AND DATA STRUCTURES-II (Regulation 2013)
More informationMicrosoft Visual C# Step by Step. John Sharp
Microsoft Visual C# 2013 Step by Step John Sharp Introduction xix PART I INTRODUCING MICROSOFT VISUAL C# AND MICROSOFT VISUAL STUDIO 2013 Chapter 1 Welcome to C# 3 Beginning programming with the Visual
More informationTotal No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year INFORMATION TECHNOLOGY.
(DMSIT01) Total No. of Questions : 18] [Total No. of Pages : 02 M.Sc. DEGREE EXAMINATION, DEC. 2016 First Year INFORMATION TECHNOLOGY Basics of IT Time : 3 Hours Maximum Marks : 70 Section - A (3 x 15
More informationProgramming in C#
Course Outline 20483- Programming in C# Duration: 5 days (30 hours) Target Audience: This course is intended for experienced developers who already have programming experience in C, C++, JavaScript, Objective-C,
More informationCRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK
CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define
More informationINFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME
INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME CO-1 Programming fundamental using C The purpose of this course is to introduce to students to the field of programming using C language. The students
More informationCS1302 / Computer Networks
CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?
More informationIntroduction to Programming Using Java (98-388)
Introduction to Programming Using Java (98-388) Understand Java fundamentals Describe the use of main in a Java application Signature of main, why it is static; how to consume an instance of your own class;
More informationVALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK B.E. - Electrical and Electronics Engineering IV SEMESTER CS6456 - OBJECT ORIENTED
More informationSRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : M.Sc CST Semester / Year : EVEN / II Subject Name
More informationObject Oriented Programming
Program Structure for Master of Computer Application (MCA) Mumbai University (With Effect from 2012-2013) Semester I Object Oriented Programming 1 C++ Fundamentals: Data types, Operators, Preprocessor
More informationTime : 3 hours. Full Marks : 75. Own words as far as practicable. The questions are of equal value. Answer any five questions.
XEV (H-3) BCA (6) 2 0 1 0 Time : 3 hours Full Marks : 75 Candidates are required to give their answers in their Own words as far as practicable. The questions are of equal value. Answer any five questions.
More informationCourse Text. Course Description. Course Objectives. StraighterLine Introduction to Programming in C++
Introduction to Programming in C++ Course Text Programming in C++, Zyante, Fall 2013 edition. Course book provided along with the course. Course Description This course introduces programming in C++ and
More informationM.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Time : 03 Hours Maximum Marks : 75
M.Sc. (Previous) DEGREE EXAMINATION, MAY - 2013 (Examination at the end of First Year) Computer Science Paper - I : DATA STRUCTURES (DMCS 01) Time : 03 Hours Maximum Marks : 75 Section - A (3 15 = 45)
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationEND TERM EXAMINATION. 2 (a) Discuss about different web documents used in lntemet. (b) How Intemet administration is organized?
(Please write your Exam Roll No.) END TERM EXAMINATION SEVENTH SEM~S!~~lB.TECH LD~ EM~!R-2012-- Exam Roll No. I Cd' ETIT401 Subject: Advance Computer Networks :Paper 0 e. Maximum Marks :75 Time: 3 Hours..
More informationCS/IT321. Hall Ticket Number: April, 2017 Sixth Semester Time: Three Hours Answer Question No.1 compulsorily. Answer ONE question from each unit.
CS/IT321 Computer Networks 1. Answer all questions (1X12=12 Marks) a. Differentiate WAN & MAN. b. What is meant by Packet Switching? c. How multicasting is different from Broadcasting? d. Define a subnet.
More informationNetwork Layer, Link Layer, and Network Security Summary
CPSC 826 Internetworking, Link Layer, and Network Security Summary http://www.cs.clemson.edu/~mweigle/courses/cpsc826 1 Chapter 4, 5, 8 Topics» Forwarding and Routing» Router Architecture» Internet Protocol
More informationASSIGNMENT - 1 M.C.A.DEGREE EXAMINATION, MAY 2019 Second Year SOFTWARE ENGINEERING. Maximum : 30 MARKS Answer ALL questions.
ASSIGNMENT - 1 M.C.A.DEGREE EXAMINATION, MAY 2019 SOFTWARE ENGINEERING (DMCA201) Q1) Explain Spiral model with suitable example. Also explain how it differs from Software Prototyping model. Q2) a) Draw
More informationR07. FirstRanker. 7. a) What is text mining? Describe about basic measures for text retrieval. b) Briefly describe document cluster analysis.
www..com www..com Set No.1 1. a) What is data mining? Briefly explain the Knowledge discovery process. b) Explain the three-tier data warehouse architecture. 2. a) With an example, describe any two schema
More informationThe course introduces many of the techniques and technologies employed by modern desktop and enterprise applications, including:
Programming in C# OD20483B; On-Demand, Video-based Course Description This training course teaches developers the programming skills that are required for developers to create Windows applications using
More information2) Explain in detail about different AVL rotation applied on unbalanced trees.
(DMCS 01) ASSIGNMENT - 1, MAY-2014. PAPER- I : DATA STRUCTURES 1) Define circular queue. Write an algorithm to describe insertion and deletion operation on a circular queue. Illustrate these operations
More informationProgramming in C# Course: Course Details ABOUT THIS COURSE AUDIENCE PROFILE. Síguenos en:
Programming in C# Course: 20483 Course Details Audience(s): Developers Technology: Duration: Cross-Platform Development 40 Hours ABOUT THIS COURSE This training course teaches developers the programming
More informationCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai
More informationSESSION M12-S12 INTERNAL ASSIGNMENT
MASTER OF COMPUTER APPLICATIONS RELATIONAL DATABASE MENAGEMENT SYSTEM PAPER CODE: MCA-401 SECTION-A Answer the following questions in around 100 words. 1. What are the differences between simple and composite
More informationRecurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications
Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications D.A. Karras 1 and V. Zorkadis 2 1 University of Piraeus, Dept. of Business Administration,
More informationCourse Description. Audience. Module Title : 20483B: Programming in C# Duration : 5 days. Course Outline :: 20483B ::
Module Title : 20483B: Programming in C# Duration : 5 days Course Description This training course teaches developers the programming skills that are required for developers to create Windows applications
More informationMicrosoft Programming in C#
1800 ULEARN (853 276) www.ddls.com.au Length 5 days Microsoft 20483 - Programming in C# Price $4510.00 (inc GST) Version A Overview This training course teaches developers the programming skills that are
More informationAn Object Oriented Programming with C
An Object Oriented Programming with C By Tanmay Kasbe Dr. Ravi Singh Pippal IDEA PUBLISHING WWW.ideapublishing.in i Publishing-in-support-of, IDEA PUBLISHING Block- 9b, Transit Flats, Hudco Place Extension
More informationASSIGNMENT - 1 M.Sc. DEGREE EXAMINATION, MAY 2019 First Year COMPUTER SCIENCE Data Structures MAXIMUM : 30 MARKS ANSWER ALL QUESTIONS
ASSIGNMENT - 1 Data Structures (DMCS01) Q1) a) Write a sub-routine to implement PUSH ( ) and POP ( ) operations using linked list. b) Explain about open hashing and closed hashing. Q2) How to create double
More informationVALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Degree & Branch : B.E E.C.E. Year & Semester : II / IV Section : ECE 1, 2 &
More information- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT
- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT With the capacity of communications channels increasing at the current
More information10CS36: Object Oriented Programming with C++
10CS36: Object Oriented Programming with C++ Question Bank: UNIT 1: Introduction to C++ 1. What is Procedure-oriented Programming System? Dec 2005 2. What is Object-oriented Programming System? June 2006
More informationBRA BIHAR UNIVERSITY, MUZAFFARPUR DIRECTORATE OF DISTANCE EDUCATION
BSCIT/3 RD /BIT13-OOPS with Java Q. 1. What do you mean by Java Virtual Machine? Q. 2. Define Bytecode. Write different features of Java. Q. 3. How do you compile and execute a Java program? Q. 4. Discuss
More informationVB.NET. Exercise 1: Creating Your First Application in Visual Basic.NET
VB.NET Module 1: Getting Started This module introduces Visual Basic.NET and explains how it fits into the.net platform. It explains how to use the programming tools in Microsoft Visual Studio.NET and
More informationOral Question Bank for CL-3 Assignment
Oral Question Bank for CL-3 Assignment What is difference between JDK,JRE and JVM? What do you mean by platform independence? What is class loader and byte code? What is class, Object? what is mean by
More informationCS 6456 OBJCET ORIENTED PROGRAMMING IV SEMESTER/EEE
CS 6456 OBJCET ORIENTED PROGRAMMING IV SEMESTER/EEE PART A UNIT I 1. Differentiate object oriented programming from procedure oriented programming. 2. Define abstraction and encapsulation. 3. Differentiate
More informationLearning Objectives. C++ For Artists 2003 Rick Miller All Rights Reserved xli
Identify and overcome the difficulties encountered by students when learning how to program List and explain the software development roles played by students List and explain the phases of the tight spiral
More informationLearn to create Window applications using the C# language with Visual Studio 2012.
PROGRAMMING IN C# Course Code: 6420 Learn to create Window applications using the C# language with Visual Studio 2012. In this course, you will gain the programming skills that are required for developers
More information(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography
Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider
More informationPart I: Preliminaries 24
Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................
More informationThe Bhopal School of Social Sciences, Bhopal
Marking scheme for M.Sc. (Computer Science) II Sem. Semester II Paper Title of the paper Theory CCE Total I Data Structure & Algorithms 70 30 100 II Operating System 70 30 100 III Computer Networks with
More informationSCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION
Computer Science (4) Q.NO Expand SCSI Small computer system interface PART-A Name the gate which produces output 0, if there are even numbers of s in the input XOR What is complete tree? Tree in which
More informationLecture 6: Overview of Public-Key Cryptography and RSA
1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first
More informationModule 13 Network Security. Version 1 ECE, IIT Kharagpur
Module 13 Network Security Lesson 40 Network Security 13.1.1 INTRODUCTION Network Security assumes a great importance in the current age. In this chapter we shall look at some of the security measures
More informationM.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75
(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2012 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section - A Answer any Three of the following (3 15 = 45) 1) Define the
More informationCOURSE OUTCOMES OF M.Sc(IT)
COURSE OUTCOMES OF M.Sc(IT) Sr. No Subject Code Subject Name Sem-I CO Status Course Outcomes 1. A304101 PROGRAMMING USING C 2. A304102 FUNDAMENTALS OF COMPUTER & INFORMATION TECHNOLOGIES CO1 CO2 Understands
More informationSoftware Engineering 4C03 Answer Key
Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used
More information1) What is the role of Information Technology in modern business? 2) Define computer? Explain the Block Diagram of computer with a neat diagram?
(DMCA 101) ASSIGNMENT - 1, DEC - 2014. PAPER- I : INFORMATION TECHNOLOGY 1) What is the role of Information Technology in modern business? 2) Define computer? Explain the Block Diagram of computer with
More informationSyllabus Under Autonomy Mathematics
Syllabus Under Autonomy Mathematics Semester VI Course: Applied Component(Paper-I) [25 Lectures] Computer Programming and System Analysis(Java Programming & Networking) Learning Objectives:- To learn about
More informationSai Nath University. Assignment For BCA 5 TH
Sai Nath University Assignment For BCA 5 TH Sem. The Assignment will consist of two parts, A and B. Part A will have 5 short answer questions(40-60 words) of 4 marks each. will have 4 long answer questions
More informationCode No: RR Set No. 1
Code No: RR410402 Set No. 1 1. (a) Write any four reasons for using layered protocols. (b) List two ways in which the OSI reference model and the TCP/IP reference model are the same and list in which they
More informationITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.
ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation
More information(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75. Paper - I : INFORMATION TECHNOLOGY
(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2013 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section- A Answer any Three of the following (3 15=45) 1) What is the
More informationB.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET
B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET Course Outline The main objective of this course is to introduce students to the basic concepts of a selected language
More informationThe question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the
More informationIntroduction to information Security
First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More information