M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75

Size: px
Start display at page:

Download "M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75"

Transcription

1 (DMSIT21) M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY Paper - I : Software Engineering Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Discuss in detail the capability maturity model integration. 2) How do you initiate requirement engineering process and explain requirement elicitation format. 3) Explain in detail various design elements in design model. 4) Explain black box testing technique in detail. 5) Explain the following : a) CK metrics suite b) Metrics for testing Section B (5 5 = 25) Answer any five questions 6) Discuss about different software myths and their corresponding realities. 7) Describe the prototyping process model. 8) Explain the communication practices of software engineering practice. 9) Explain the system engineering hierarchy. 10) Describe class Responsibility collaborator modeling of analysis model.

2 11) Develope different levels of DFD for safe home security function. 12) Discuss about the art of debugging. 13) Explain the function based metrics for the analysis model. Section C (5 1 = 5) Answer all questions 14) What is legacy software? 15) What do you mean by computer based system? 16) What is refactoring? 17) What are the factors of ISO 9126 quality factors? 18) What are cohesion metrics?

3 (DMSIT22) M.Sc. (Final) DEGREE EXAMINATION, DEC (Second Year) INFORMATION TECHNOLOGY Paper - II : Programming With C++ Time :.03 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Describe the following : a) Variable scope b) Dynamic memory allocation 2) Explain about call by value, call by reference and call by constant reference with suitable example. 3) What is pointer? How to create pointers in C++? Give the advantages of pointers. 4) What is operator overloading? Write a C++ program to overload +, operators for addition, subtraction of complex numbers respectively. 5) What is class template? What is its syntax? Explain class templates with multiple parameters. Section B (5 5 = 25) Answer any five questions 6) Explain about type casting is C++. 7) What is the syntax of switch structure? Write a program to accept a month number and display the maximum number of days in the month. 8) Describe any five string handling functions in C++. 9) What is constructor? Give the characteristics of constructors.

4 10) Explain about multiple inheritance with suitable example. 11) Explain how a single try block can be associated with multiple catch blocks. 12) Write a program to find number of characters, words and lines in a given text. 13) Briefly write about container classes. Section C (5 1 = 5) Answer all questions 14) What is a relational expression? 15) Differentiate between while loop and do-while loop. 16) What are formal arguments? 17) What is pointer? 18) What is function overriding?

5 (DMSIT23) M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY Paper - III : TCP/IP Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Explain in detail about TCP/IP protocol with neat diagram. 2) Explain Network technologies and Internetworking in detail. 3) Describe ARP and RARP in detail. 4) Explain routing protocols in detail. 5) Explain client Server model in detail. Section B (5 5 = 25) Answer any five questions 6) Differentiate between Classless and classful addressing in detail. 7) Discuss about different categories of networks. 8) Describe routing IP datagram. 9) Write about user Datagram protocol. 10) Discuss about error and control messages. 11) Describe about ICMP. 12) Describe Socket Interface. 13) Write about DHCP.

6 Section C (5 1 = 5) Answer all questions 14) What is Internet? 15) Define protocol. 16) What is IP? 17) Define Datagram. 18) What is subnetting?

7 (DMSIT24) M.Sc. (Final) DEGREE EXAMINATION, DEC (Second Year) INFORMATION TECHNOLOGY Paper - IV : Data Mining & Techniques Time : 3 Hours Maximum Marks : 75 Section - A (3 x 15 = 45) Answer any Three of the following 1) Briefly discuss about architecture of a typical Data Mining System. 2) Explain about Descriptive Data Summarization Model. 3) Discuss in detail about Bayesian classification. 4) Differentiate between Parallel and Distributed Algorithms clearly. 5) Explain score functions of Predictive Models. Section - B (5 x 5 = 25) Answer any Five of the following 6) Explain the components of Data Mining Algorithms. 7) What are different types of measurement for Data? 8) Describe about Multidimensional Scaling. 9) Explain CART algorithm for building tree classifiers. 10) Discuss about Fundamentals of Modeling. 11) Explain about different patterns for strings.

8 12) What is Multivariate Parameter optimization? 13) What are special-purpose Algorithms for Disk Access. Section - C (5 x 1 = 5) Answer all questions 14) What is snooping? 15) What are forms of Data? 16) What is classification? 17) Define Regression. 18) What is OLAP?

9 (DMSIT25) M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY Paper - V : Cryptography and Network Security Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Describe DES encryption algorithm with an example. 2) Write extended Euclidean algorithm and use it to find the multiplicative inverse of mod ) Explain in detail the key distribution techniques. 4) Describe RSA algorithm with an illustrative example. 5) Discuss about firewall design principles. Section B (5 5 = 25) Answer any five questions 6) Explain the transposition cipher with an illustrative example. 7) Describe the evaluation criteria for AES. 8) Explain the difference between the AES decryption algorithm and equivalent inverse cipher. 9) Explain the RC4 algorithm. 10) Discuss about different approaches to generate random numbers. 11) Explain the Miller- Rabin algorithm to test a large number for primality.

10 12) Explain the mutual authentication technique. 13) Discuss about UNIX password protection scheme. Section C (5 1 = 5) Answer all questions 14) What is symmetric cipher? 15) What is the purpose of the state array? 16) What is a nonce? 17) Define Euler s totient function? 18) What is a honeypot?

11 (DMSIT26) M.Sc. (Final) DEGREE EXAMINATION, DEC (Examination at the end of Second Year) INFORMATION TECHNOLOGY Paper - VI : Artificial Intelligence Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three of the following 1) What is state space approach? Explain about watering problem through state space approach. 2) a) Differentiate Depth first search and breadth first search technique. b) Describe various approaches and issues in knowledge representation. 3) Explain about the steepest Ascent Hill climbing technique in detail. 4) Explain about the characteristic features of expert systems in detail. 5) Explain about the semantic nets. Suggest a semantic net to describe the main organs of the human body. Section B (5 5 = 25) Answer any five questions 6) Explain about the applications of AI. 7) Write a short notes on heuristic search technique. 8) Discuss about back propagation training 9) Explain about monotonic and non-monotonic reasoning problem. 10) Explain about semantic analysis. 11) Explain about symbolic based learning techniques.

12 12) Explain the memory organization of commonsense behaviour. 13) Write a short notes on Dempster shafer theory. Section C (5 1 = 5) Answer all questions 14) What is AI? 15) What is frame? 16) Define predicate. 17) What is crypt arithmetic problem? 18) Define an Expert system.

(DMSIT21) Software Engineering. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY

(DMSIT21) Software Engineering. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY ASSIGNMENT-1 Second Year Software Engineering MAXIMUM MARKS:30 (DMSIT21) Q1) Explain Waterfall and Concurrent development process models. Q2) Discuss about the eliciting requirements of requirements engineering.

More information

4) Discuss on various types of software myths and the true aspects of these myths.

4) Discuss on various types of software myths and the true aspects of these myths. (DMSIT 21) ASSIGNMENT - 1, DEC - 2018. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following: a) CMMI b) RAD model 2) Elaborate different requirement engineering tasks. 3) Discuss about class-based

More information

1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step.

1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step. (DMCA 301) ASSIGNMENT - 1, MAY - 2016. PAPER- I : ARTIFICIAL INTELLIGENCE 1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill

More information

M.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following

M.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following (DMCA 301) Time : Three hours M.C.A DEGREE EXAMINATION, MAY 2012. Third Year Paper I ARTIFICIAL INTELLIGENCE SECTION A (3 15 = 45 marks) Answer any THREE of the following Maximum : 75 marks 1. (a) Explain

More information

(DMCS21) User Interface Design. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC (Second Year) COMPUTER SCIENCE. MAXIMUM MARKS:30 Answer ALL Questions

(DMCS21) User Interface Design. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC (Second Year) COMPUTER SCIENCE. MAXIMUM MARKS:30 Answer ALL Questions ASSIGNMENT-1 User Interface Design MAXIMUM MARKS:30 (DMCS21) Q1) Discuss the characteristics of Graphics interface in detail. Q2) Discuss with suitable examples the human characteristics in design. Q3)

More information

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from 2017-18 Sl. No Course No. Subject Teaching Schedule Examination

More information

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Paper - I : DATA STRUCTURES

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Paper - I : DATA STRUCTURES (DMCS 01) M.Sc. (Previous) DEGREE EXAMINATION, MAY - 2014 (Examination at the end of First Year) Computer Science Paper - I : DATA STRUCTURES Time : 03 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer

More information

10EC832: NETWORK SECURITY

10EC832: NETWORK SECURITY 10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to

More information

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : M.Sc-CST Semester / Year : Even / II Subject Name

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY [DMSIT 01] M.Sc. (Previous) DEGREE EXAMINATION, DEC 2013 First Year INFORMATION TECHNOLOGY Paper I BASICS OF INFORMATION TECHNOLOGY Time : 3 hours Max. Marks : 75 Section A (3x15 = 45) Answer any THREE

More information

AO* algorithm Game playing algorithms: min-max algorithm C12 Game playing algorithms: alpha beta pruning. Assignment 1

AO* algorithm Game playing algorithms: min-max algorithm C12 Game playing algorithms: alpha beta pruning. Assignment 1 Lecture Planning Starting w.e.f January 2018 Name of the Institute : Aravali College of Engineering & Management Name of teacher with designation: Ms. Ekta Dagar, Assistant Professor Department: Computer

More information

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory COMPUTER MCQs 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory 4)virtual memory 5) None of the above 2. The component is used by the data analyst to create

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE.

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE. (DMCS01) Total No. of Questions : 18] [Total No. of Pages : 02 M.Sc. DEGREE EXAMINATION, DEC. 2016 First Year COMPUTER SCIENCE Data Structures Time : 3 Hours Maximum Marks : 70 Section - A (3 x 15 = 45)

More information

1) What is information system? Describe the basic concepts of information systems.

1) What is information system? Describe the basic concepts of information systems. (DMSIT 01) ASSIGNMENT - 1, DEC - 2018. PAPER- I : BASICS OF 1) What is information system? Describe the basic concepts of information systems. 2) Discuss about input and output technologies of computer

More information

SIR C R REDDY COLLEGE OF ENGINEERING

SIR C R REDDY COLLEGE OF ENGINEERING SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,

More information

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities

More information

Lecture Topics (including assignment and tests) day day Topic. The process, software products, emergence of software engineering

Lecture Topics (including assignment and tests) day day Topic. The process, software products, emergence of software engineering NAME OF FACULTY: : Mr. Sarjender Yadav DISCIPLINE: : Computer Science and Engineering SEMESTER: : 6th SUBJECT: : Principle of Software Engineering LESSON PALN DURATION: 15 WEEKS (from FEB 2018 to MAY 2018)

More information

DEGREE EXAMINATION, MAY

DEGREE EXAMINATION, MAY ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, MAY - 2018 User Interface Design (DMCS21) Q1) Explain the characteristics and principles of user interface design. Q2) Name the models of user interface design. Illustrate

More information

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING i SYLLABUS UNIT - 1 CHAPTER - 1 : INTRODUCTION Uses of Computer Networks, Network Hardware, Network Software, Reference Models (ISO-OSI, TCP/IP). CHAPTER - 2 : NETWORK LAYER Network Layer Design Issues,

More information

M.Sc. (Computer Science) I Year Assignments for May Paper I DATA STRUCTURES Assignment I

M.Sc. (Computer Science) I Year Assignments for May Paper I DATA STRUCTURES Assignment I Paper I DATA STRUCTURES (DMCS 01) 1. Explain in detail about the overview of Data structures. 2. Explain circular linked list and double-linked list. 3. Explain CPU scheduling in Multiprogramming Environment.

More information

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Total No. of Questions : 09 ] [ Total No.of Pages : 02 CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Preface to the Second Edition Preface to the First Edition Brief Contents Introduction to C++ p. 1 A Review of Structures p.

Preface to the Second Edition Preface to the First Edition Brief Contents Introduction to C++ p. 1 A Review of Structures p. Preface to the Second Edition p. iii Preface to the First Edition p. vi Brief Contents p. ix Introduction to C++ p. 1 A Review of Structures p. 1 The Need for Structures p. 1 Creating a New Data Type Using

More information

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more... Hands-On Internetworking, TCP/IP, VLANS, Wirelss 802.11 and more... Course Description The Internet Protocol Suite, commonly known as TCP/IP, forms the basis for the Internet and the next generation of

More information

Lecture Plan-1. Contents Methodology Time Queries Remarks. Question/ Answers. Discussion. Chalk Board. &Discussion. Discussion 10

Lecture Plan-1. Contents Methodology Time Queries Remarks. Question/ Answers. Discussion. Chalk Board. &Discussion. Discussion 10 Lecture Plan-1 Objective:- to networking. 2. to basics of networking. 10 OSI & TCP/IP Communication model in detail. & 20 10 Lecture Plan 2 Objective:-. Understanding the TC/IP Protocol architecture &

More information

Object Oriented Programming with c++ Question Bank

Object Oriented Programming with c++ Question Bank Object Oriented Programming with c++ Question Bank UNIT-1: Introduction to C++ 1. Describe the following characteristics of OOP. i Encapsulation ii Polymorphism, iii Inheritance 2. Discuss function prototyping,

More information

ADMINISTRATIVE MANAGEMENT COLLEGE

ADMINISTRATIVE MANAGEMENT COLLEGE First Semester ADMINISTRATIVE MANAGEMENT COLLEGE BACHELOR OF COMPUTER APPLICATION COURSE OUTCOME (CO) Problem solving techniques Using C CO 1: Understand the basic concepts of programming, software and

More information

10CS64-Computer Networks-II Question Bank PART A

10CS64-Computer Networks-II Question Bank PART A 10CS64-Computer Networks-II Question Bank PART A Unit -1 PACKET SWITCHING NETWORKS-I:In this chapter we learn what is packet switching networks, general issues regarding packet switching networks. We examine

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

COURSE OUTCOMES M.Sc (Computer Science)

COURSE OUTCOMES M.Sc (Computer Science) COURSE OUTCOMES M.Sc (Computer Science) CS-101 Advanced C++ Programming 1. Understand advanced concepts for handling runtime errors using stack unwinding, uncaught exception and automatic cleanup. 2. Study

More information

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015, SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)

M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards) BHARATHIDASAN UNIVERSITY TIRUCHIRAPPALLI 620 024 M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year 2007-2008 onwards) SEMESTER I COURSE TITLE MARKS

More information

Introduction to Data Analytics Maximum : 60 Marks (1X12 = 12 Marks) (4X12=48 Marks) 1. Answer all questions (1X12=12 Marks)

Introduction to Data Analytics Maximum : 60 Marks (1X12 = 12 Marks) (4X12=48 Marks) 1. Answer all questions (1X12=12 Marks) 14CS IT 601 Common for CSE & IT Introduction to Data Analytics 1. Answer all questions (1X12=12 Marks) a) What is R Programming? b) what are the data types in R? c) What is the difference between "%%"

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY

More information

Intro to OOP Visibility/protection levels and constructors Friend, convert constructor, destructor Operator overloading a<=b a.

Intro to OOP Visibility/protection levels and constructors Friend, convert constructor, destructor Operator overloading a<=b a. Intro to OOP - Object and class - The sequence to define and use a class in a program - How/when to use scope resolution operator - How/when to the dot operator - Should be able to write the prototype

More information

Code No: R Set No. 1

Code No: R Set No. 1 Code No: R05321204 Set No. 1 1. (a) Draw and explain the architecture for on-line analytical mining. (b) Briefly discuss the data warehouse applications. [8+8] 2. Briefly discuss the role of data cube

More information

"Charting the Course to Your Success!" MOC B Programming in C# Course Summary

Charting the Course to Your Success! MOC B Programming in C# Course Summary Course Summary Description This training course teaches developers the programming skills that are required for developers to create Windows applications using the C# language. During their five days in

More information

Dietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++

Dietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++ Dietrich Paulus Joachim Hornegger Pattern Recognition of Images and Speech in C++ To Dorothea, Belinda, and Dominik In the text we use the following names which are protected, trademarks owned by a company

More information

Standard. Number of Correlations

Standard. Number of Correlations Computer Science 2016 This assessment contains 80 items, but only 80 are used at one time. Programming and Software Development Number of Correlations Standard Type Standard 2 Duty 1) CONTENT STANDARD

More information

Question Paper Code : 97044

Question Paper Code : 97044 Reg. No. : Question Paper Code : 97044 B.E./B.Tech. DEGREE EXAMINATION NOVEMBER/DECEMBER 2014 Third Semester Computer Science and Engineering CS 6301 PROGRAMMING AND DATA STRUCTURES-II (Regulation 2013)

More information

Microsoft Visual C# Step by Step. John Sharp

Microsoft Visual C# Step by Step. John Sharp Microsoft Visual C# 2013 Step by Step John Sharp Introduction xix PART I INTRODUCING MICROSOFT VISUAL C# AND MICROSOFT VISUAL STUDIO 2013 Chapter 1 Welcome to C# 3 Beginning programming with the Visual

More information

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year INFORMATION TECHNOLOGY.

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year INFORMATION TECHNOLOGY. (DMSIT01) Total No. of Questions : 18] [Total No. of Pages : 02 M.Sc. DEGREE EXAMINATION, DEC. 2016 First Year INFORMATION TECHNOLOGY Basics of IT Time : 3 Hours Maximum Marks : 70 Section - A (3 x 15

More information

Programming in C#

Programming in C# Course Outline 20483- Programming in C# Duration: 5 days (30 hours) Target Audience: This course is intended for experienced developers who already have programming experience in C, C++, JavaScript, Objective-C,

More information

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define

More information

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME CO-1 Programming fundamental using C The purpose of this course is to introduce to students to the field of programming using C language. The students

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

Introduction to Programming Using Java (98-388)

Introduction to Programming Using Java (98-388) Introduction to Programming Using Java (98-388) Understand Java fundamentals Describe the use of main in a Java application Signature of main, why it is static; how to consume an instance of your own class;

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK B.E. - Electrical and Electronics Engineering IV SEMESTER CS6456 - OBJECT ORIENTED

More information

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : M.Sc CST Semester / Year : EVEN / II Subject Name

More information

Object Oriented Programming

Object Oriented Programming Program Structure for Master of Computer Application (MCA) Mumbai University (With Effect from 2012-2013) Semester I Object Oriented Programming 1 C++ Fundamentals: Data types, Operators, Preprocessor

More information

Time : 3 hours. Full Marks : 75. Own words as far as practicable. The questions are of equal value. Answer any five questions.

Time : 3 hours. Full Marks : 75. Own words as far as practicable. The questions are of equal value. Answer any five questions. XEV (H-3) BCA (6) 2 0 1 0 Time : 3 hours Full Marks : 75 Candidates are required to give their answers in their Own words as far as practicable. The questions are of equal value. Answer any five questions.

More information

Course Text. Course Description. Course Objectives. StraighterLine Introduction to Programming in C++

Course Text. Course Description. Course Objectives. StraighterLine Introduction to Programming in C++ Introduction to Programming in C++ Course Text Programming in C++, Zyante, Fall 2013 edition. Course book provided along with the course. Course Description This course introduces programming in C++ and

More information

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Time : 03 Hours Maximum Marks : 75

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Time : 03 Hours Maximum Marks : 75 M.Sc. (Previous) DEGREE EXAMINATION, MAY - 2013 (Examination at the end of First Year) Computer Science Paper - I : DATA STRUCTURES (DMCS 01) Time : 03 Hours Maximum Marks : 75 Section - A (3 15 = 45)

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

END TERM EXAMINATION. 2 (a) Discuss about different web documents used in lntemet. (b) How Intemet administration is organized?

END TERM EXAMINATION. 2 (a) Discuss about different web documents used in lntemet. (b) How Intemet administration is organized? (Please write your Exam Roll No.) END TERM EXAMINATION SEVENTH SEM~S!~~lB.TECH LD~ EM~!R-2012-- Exam Roll No. I Cd' ETIT401 Subject: Advance Computer Networks :Paper 0 e. Maximum Marks :75 Time: 3 Hours..

More information

CS/IT321. Hall Ticket Number: April, 2017 Sixth Semester Time: Three Hours Answer Question No.1 compulsorily. Answer ONE question from each unit.

CS/IT321. Hall Ticket Number: April, 2017 Sixth Semester Time: Three Hours Answer Question No.1 compulsorily. Answer ONE question from each unit. CS/IT321 Computer Networks 1. Answer all questions (1X12=12 Marks) a. Differentiate WAN & MAN. b. What is meant by Packet Switching? c. How multicasting is different from Broadcasting? d. Define a subnet.

More information

Network Layer, Link Layer, and Network Security Summary

Network Layer, Link Layer, and Network Security Summary CPSC 826 Internetworking, Link Layer, and Network Security Summary http://www.cs.clemson.edu/~mweigle/courses/cpsc826 1 Chapter 4, 5, 8 Topics» Forwarding and Routing» Router Architecture» Internet Protocol

More information

ASSIGNMENT - 1 M.C.A.DEGREE EXAMINATION, MAY 2019 Second Year SOFTWARE ENGINEERING. Maximum : 30 MARKS Answer ALL questions.

ASSIGNMENT - 1 M.C.A.DEGREE EXAMINATION, MAY 2019 Second Year SOFTWARE ENGINEERING. Maximum : 30 MARKS Answer ALL questions. ASSIGNMENT - 1 M.C.A.DEGREE EXAMINATION, MAY 2019 SOFTWARE ENGINEERING (DMCA201) Q1) Explain Spiral model with suitable example. Also explain how it differs from Software Prototyping model. Q2) a) Draw

More information

R07. FirstRanker. 7. a) What is text mining? Describe about basic measures for text retrieval. b) Briefly describe document cluster analysis.

R07. FirstRanker. 7. a) What is text mining? Describe about basic measures for text retrieval. b) Briefly describe document cluster analysis. www..com www..com Set No.1 1. a) What is data mining? Briefly explain the Knowledge discovery process. b) Explain the three-tier data warehouse architecture. 2. a) With an example, describe any two schema

More information

The course introduces many of the techniques and technologies employed by modern desktop and enterprise applications, including:

The course introduces many of the techniques and technologies employed by modern desktop and enterprise applications, including: Programming in C# OD20483B; On-Demand, Video-based Course Description This training course teaches developers the programming skills that are required for developers to create Windows applications using

More information

2) Explain in detail about different AVL rotation applied on unbalanced trees.

2) Explain in detail about different AVL rotation applied on unbalanced trees. (DMCS 01) ASSIGNMENT - 1, MAY-2014. PAPER- I : DATA STRUCTURES 1) Define circular queue. Write an algorithm to describe insertion and deletion operation on a circular queue. Illustrate these operations

More information

Programming in C# Course: Course Details ABOUT THIS COURSE AUDIENCE PROFILE. Síguenos en:

Programming in C# Course: Course Details ABOUT THIS COURSE AUDIENCE PROFILE. Síguenos en: Programming in C# Course: 20483 Course Details Audience(s): Developers Technology: Duration: Cross-Platform Development 40 Hours ABOUT THIS COURSE This training course teaches developers the programming

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai

More information

SESSION M12-S12 INTERNAL ASSIGNMENT

SESSION M12-S12 INTERNAL ASSIGNMENT MASTER OF COMPUTER APPLICATIONS RELATIONAL DATABASE MENAGEMENT SYSTEM PAPER CODE: MCA-401 SECTION-A Answer the following questions in around 100 words. 1. What are the differences between simple and composite

More information

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications D.A. Karras 1 and V. Zorkadis 2 1 University of Piraeus, Dept. of Business Administration,

More information

Course Description. Audience. Module Title : 20483B: Programming in C# Duration : 5 days. Course Outline :: 20483B ::

Course Description. Audience. Module Title : 20483B: Programming in C# Duration : 5 days. Course Outline :: 20483B :: Module Title : 20483B: Programming in C# Duration : 5 days Course Description This training course teaches developers the programming skills that are required for developers to create Windows applications

More information

Microsoft Programming in C#

Microsoft Programming in C# 1800 ULEARN (853 276) www.ddls.com.au Length 5 days Microsoft 20483 - Programming in C# Price $4510.00 (inc GST) Version A Overview This training course teaches developers the programming skills that are

More information

An Object Oriented Programming with C

An Object Oriented Programming with C An Object Oriented Programming with C By Tanmay Kasbe Dr. Ravi Singh Pippal IDEA PUBLISHING WWW.ideapublishing.in i Publishing-in-support-of, IDEA PUBLISHING Block- 9b, Transit Flats, Hudco Place Extension

More information

ASSIGNMENT - 1 M.Sc. DEGREE EXAMINATION, MAY 2019 First Year COMPUTER SCIENCE Data Structures MAXIMUM : 30 MARKS ANSWER ALL QUESTIONS

ASSIGNMENT - 1 M.Sc. DEGREE EXAMINATION, MAY 2019 First Year COMPUTER SCIENCE Data Structures MAXIMUM : 30 MARKS ANSWER ALL QUESTIONS ASSIGNMENT - 1 Data Structures (DMCS01) Q1) a) Write a sub-routine to implement PUSH ( ) and POP ( ) operations using linked list. b) Explain about open hashing and closed hashing. Q2) How to create double

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Degree & Branch : B.E E.C.E. Year & Semester : II / IV Section : ECE 1, 2 &

More information

- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT

- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT - 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT With the capacity of communications channels increasing at the current

More information

10CS36: Object Oriented Programming with C++

10CS36: Object Oriented Programming with C++ 10CS36: Object Oriented Programming with C++ Question Bank: UNIT 1: Introduction to C++ 1. What is Procedure-oriented Programming System? Dec 2005 2. What is Object-oriented Programming System? June 2006

More information

BRA BIHAR UNIVERSITY, MUZAFFARPUR DIRECTORATE OF DISTANCE EDUCATION

BRA BIHAR UNIVERSITY, MUZAFFARPUR DIRECTORATE OF DISTANCE EDUCATION BSCIT/3 RD /BIT13-OOPS with Java Q. 1. What do you mean by Java Virtual Machine? Q. 2. Define Bytecode. Write different features of Java. Q. 3. How do you compile and execute a Java program? Q. 4. Discuss

More information

VB.NET. Exercise 1: Creating Your First Application in Visual Basic.NET

VB.NET. Exercise 1: Creating Your First Application in Visual Basic.NET VB.NET Module 1: Getting Started This module introduces Visual Basic.NET and explains how it fits into the.net platform. It explains how to use the programming tools in Microsoft Visual Studio.NET and

More information

Oral Question Bank for CL-3 Assignment

Oral Question Bank for CL-3 Assignment Oral Question Bank for CL-3 Assignment What is difference between JDK,JRE and JVM? What do you mean by platform independence? What is class loader and byte code? What is class, Object? what is mean by

More information

CS 6456 OBJCET ORIENTED PROGRAMMING IV SEMESTER/EEE

CS 6456 OBJCET ORIENTED PROGRAMMING IV SEMESTER/EEE CS 6456 OBJCET ORIENTED PROGRAMMING IV SEMESTER/EEE PART A UNIT I 1. Differentiate object oriented programming from procedure oriented programming. 2. Define abstraction and encapsulation. 3. Differentiate

More information

Learning Objectives. C++ For Artists 2003 Rick Miller All Rights Reserved xli

Learning Objectives. C++ For Artists 2003 Rick Miller All Rights Reserved xli Identify and overcome the difficulties encountered by students when learning how to program List and explain the software development roles played by students List and explain the phases of the tight spiral

More information

Learn to create Window applications using the C# language with Visual Studio 2012.

Learn to create Window applications using the C# language with Visual Studio 2012. PROGRAMMING IN C# Course Code: 6420 Learn to create Window applications using the C# language with Visual Studio 2012. In this course, you will gain the programming skills that are required for developers

More information

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider

More information

Part I: Preliminaries 24

Part I: Preliminaries 24 Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................

More information

The Bhopal School of Social Sciences, Bhopal

The Bhopal School of Social Sciences, Bhopal Marking scheme for M.Sc. (Computer Science) II Sem. Semester II Paper Title of the paper Theory CCE Total I Data Structure & Algorithms 70 30 100 II Operating System 70 30 100 III Computer Networks with

More information

SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION

SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION Computer Science (4) Q.NO Expand SCSI Small computer system interface PART-A Name the gate which produces output 0, if there are even numbers of s in the input XOR What is complete tree? Tree in which

More information

Lecture 6: Overview of Public-Key Cryptography and RSA

Lecture 6: Overview of Public-Key Cryptography and RSA 1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first

More information

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Module 13 Network Security. Version 1 ECE, IIT Kharagpur Module 13 Network Security Lesson 40 Network Security 13.1.1 INTRODUCTION Network Security assumes a great importance in the current age. In this chapter we shall look at some of the security measures

More information

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75 (DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2012 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section - A Answer any Three of the following (3 15 = 45) 1) Define the

More information

COURSE OUTCOMES OF M.Sc(IT)

COURSE OUTCOMES OF M.Sc(IT) COURSE OUTCOMES OF M.Sc(IT) Sr. No Subject Code Subject Name Sem-I CO Status Course Outcomes 1. A304101 PROGRAMMING USING C 2. A304102 FUNDAMENTALS OF COMPUTER & INFORMATION TECHNOLOGIES CO1 CO2 Understands

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

1) What is the role of Information Technology in modern business? 2) Define computer? Explain the Block Diagram of computer with a neat diagram?

1) What is the role of Information Technology in modern business? 2) Define computer? Explain the Block Diagram of computer with a neat diagram? (DMCA 101) ASSIGNMENT - 1, DEC - 2014. PAPER- I : INFORMATION TECHNOLOGY 1) What is the role of Information Technology in modern business? 2) Define computer? Explain the Block Diagram of computer with

More information

Syllabus Under Autonomy Mathematics

Syllabus Under Autonomy Mathematics Syllabus Under Autonomy Mathematics Semester VI Course: Applied Component(Paper-I) [25 Lectures] Computer Programming and System Analysis(Java Programming & Networking) Learning Objectives:- To learn about

More information

Sai Nath University. Assignment For BCA 5 TH

Sai Nath University. Assignment For BCA 5 TH Sai Nath University Assignment For BCA 5 TH Sem. The Assignment will consist of two parts, A and B. Part A will have 5 short answer questions(40-60 words) of 4 marks each. will have 4 long answer questions

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR410402 Set No. 1 1. (a) Write any four reasons for using layered protocols. (b) List two ways in which the OSI reference model and the TCP/IP reference model are the same and list in which they

More information

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D. ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation

More information

(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75. Paper - I : INFORMATION TECHNOLOGY

(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75. Paper - I : INFORMATION TECHNOLOGY (DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2013 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section- A Answer any Three of the following (3 15=45) 1) What is the

More information

B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET

B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET Course Outline The main objective of this course is to introduce students to the basic concepts of a selected language

More information

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.). Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the

More information

Introduction to information Security

Introduction to information Security First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information