(DMSIT21) Software Engineering. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY

Similar documents
M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75

4) Discuss on various types of software myths and the true aspects of these myths.

1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step.

M.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following

(DMCS21) User Interface Design. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC (Second Year) COMPUTER SCIENCE. MAXIMUM MARKS:30 Answer ALL Questions

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year INFORMATION TECHNOLOGY.

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

10EC832: NETWORK SECURITY

INFORMATION TECHNOLOGY

3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8]

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

DEGREE EXAMINATION, MAY

Code No: RR Set No. 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE.

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

SRI VENKATESWARA COLLEGE OF ENGINEERING

Cryptography and Network Security

CRYPTOGRAPHY AND NETWORK SECURITY

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Introduction and Overview. Why CSCI 454/554?

Syllabus: The syllabus is broadly structured as follows:

(2½ hours) Total Marks: 75

Object Oriented Programming with c++ Question Bank

10CS64-Computer Networks-II Question Bank PART A

Introduction to information Security

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

KALASALINGAM UNIVERSITY

QUESTION BANK UNIT-I

Transport Level Security

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

M.Sc. (Computer Science) I Year Assignments for May Paper I DATA STRUCTURES Assignment I

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Paper - I : DATA STRUCTURES

Cryptographic Concepts

( 3 Hours ) 80 Marks. Q.3.a Using the Butterfly diagram, compute Hadamard transform for X(n)={ 1,2,3,4,1,2,1,2}

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

AO* algorithm Game playing algorithms: min-max algorithm C12 Game playing algorithms: alpha beta pruning. Assignment 1

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

E-commerce security: SSL/TLS, SET and others. 4.1

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Time : 03 Hours Maximum Marks : 75

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

Chapter 2 Network Models 2.1

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Introduction to Data Analytics Maximum : 60 Marks (1X12 = 12 Marks) (4X12=48 Marks) 1. Answer all questions (1X12=12 Marks)

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

Nepal Telecom Nepal Doorsanchar Company Ltd.

PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

1) What is information system? Describe the basic concepts of information systems.

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL

CS1302 / Computer Networks

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

ASSIGNMENT - 1 M.Sc. DEGREE EXAMINATION, MAY 2019 First Year COMPUTER SCIENCE Data Structures MAXIMUM : 30 MARKS ANSWER ALL QUESTIONS

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

I BCS-031 BACHELOR OF COMPUTER APPLICATIONS (BCA) (Revised) Term-End Examination. June, 2015 BCS-031 : PROGRAMMING IN C ++

Cryptography and Network Security

CS 6456 OBJCET ORIENTED PROGRAMMING IV SEMESTER/EEE

BRA BIHAR UNIVERSITY, MUZAFFARPUR DIRECTORATE OF DISTANCE EDUCATION

Lecture Topics (including assignment and tests) day day Topic. The process, software products, emergence of software engineering

SUMMARY OF INFORMATION ON EACH COURSE

Understanding Cisco Cybersecurity Fundamentals

Name of chapter & details.

Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan)

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

Ref:

( It will be applied from Fall)

Software Engineering 4C03 Answer Key

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

Cryptography MIS

COURSE OUTCOMES M.Sc (Computer Science)

2) Explain in detail about different AVL rotation applied on unbalanced trees.

SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN

Information Security: Principles and Practice Second Edition. Mark Stamp

3 rd Semester MTCE 701 A

HP Instant Support Enterprise Edition (ISEE) Security overview

2. (a) Briefly discuss the forms of Data preprocessing with neat diagram. (b) Explain about concept hierarchy generation for categorical data.

JAIPUR NATIONAL UNIVERSITY, JAIPUR

M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)

APNIC elearning: Cryptography Basics

Study Guide to Mideterm Exam

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory

CSC 774 Network Security

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Object Oriented Programming

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Code No: R Set No. 1

FACULTY OF INFORMATICS B.E. 4/4 (IT) I Semester (Old) Examination, July Subject : Digital Image Processing (Elective III) Estelar

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY OBJECT ORIENTED PROGRAMMING QUESTION BANK UNIT I 2 MARKS

Sri Satya Sai University of Technology & Medical Sciences, Sehore (M.P.)

Transcription:

ASSIGNMENT-1 Second Year Software Engineering MAXIMUM MARKS:30 (DMSIT21) Q1) Explain Waterfall and Concurrent development process models. Q2) Discuss about the eliciting requirements of requirements engineering. Q3) Explain the design concepts of software engineering. Q4) Explain White-box testing techniques in detail. Q5) Explain CK metrics suite and Component-level design metrics for design model. Q6) Discuss about different software myths and their corresponding realities. Q7) What are software engineering layers? Q8) Write the use-case template for surveillance of safe home system. Q9) What are SQA activities?

ASSIGNMENT-2 Second Year Software Engineering MAXIMUM MARKS:30 (DMSIT21) Q1) Explain verification and validation. Q2) What are size-oriented metrics? Explain. Q3) Explain Basis-path testing. Q4) What are ISO 9126 quality factors? Q5) What is Refactoring? Q6) What is cohesion? Q7) What is legacy software? Q8) Define Metric. Q9) Define Software Engineering.

ASSIGNMENT-1 Programming with C++ MAXIMUM MARKS:30 (DMSIT22) Q1) Explain control structures in detail. Q2) Explain any 5 string functions in C++. Q3) Define pointer? Explain this pointer. Q4) Explain Multiple-inheritance? Write a program to implement it. Q5) Explain in detail the exception handling mechanism in C++. Q6) Explain namespaces. Q7) Explain inline functions and also state their limitations. Q8) Differentiate between a pointer and a reference variable. Q9) Define new and delete operators. State the advantages of new over malloc().

ASSIGNMENT-2 Programming with C++ (DMSIT22) Q1) Explain the 3 access specifiers. Q2) What is a container class? Explain. Q3) Explain catch( ) statement. Q4) What is an pure virtual function? State its purpose. Q5) Late binding. Q6) Data encapsulation. Q7) Friend function. Q8) Destructor. Q9) Abstract class.

(DMSIT23) ASSIGNMENT-1 M.Sc. (Final) DEGREE EXAMINATION, DEC. 2017 (Paper III): TCP/IP Q1) Differentiate between the OSI reference model and TCP/IP reference model with neat diagram. Q2) Explain in detail the routing protocol. Q3) Explain in detail UDP and TCP protocols. Q4) Explain in detail network technologies. Q5) Explain about routing protocol in detail. Q6) Describe the client-server model. Q7) Discuss about Internet Control Message Protocol. Q8) Write about DHCP. Q9) Explain about RARP.

(DMSIT23) ASSIGNMENT-2 M.Sc. (Final) DEGREE EXAMINATION, DEC. 2017 (Paper III): TCP/IP Q1) Write about congestion control. Q2) What are the characteristics of mobile IP. Q3) Write down the difference between classfull and classless addressing. Q4) Write a short note on error and control message. Q5) What is internet? Q6) Write about Socket Interface. Q7) What is datagram? Q8) Define IP. Q9) What is a protocol?

ASSIGNMENT-1 Data Mining and Techniques (DMSIT24) Q1) What is scaling? Explain multi-dimensional scaling factors. Q2) Explain vector-space algorithms for Text-retrieval. Q3) Explain Naïve Bayes theorem. Q4) What are scoring patterns for datamining algorithms? Explain Score functions and descriptive models. Q5) Explain Tree model in detail. Q6) Explain data mining tasks. Q7) Explain Apriori algorithm for association rule mining. Q8) Explain about tree classifiers. Q9) Explain about EM algorithm.

ASSIGNMENT-2 Data Mining and Techniques (DMSIT24) Q1) What is cluster analysis? Give an example. Q2) Briefly explain un-supervised learning. Q3) Explain basic algorithm for parameter based clustering. Q4) What is a multivariate parameter optimization. Q5) What is perception? Q6) Explain generalization. Q7) Write about Classification. Q8) What is score function? Q9) What are Index structures?

ASSIGNMENT-1 Cryptography and Network Security (DMSIT25) Q1) Discuss the different types of attacks elaborately. Q2) Explain DES algorithm. Q3) Explain in detail about public-key cryptography and its uses. Q4) What is a Message Digest? Explain MD5 algorithm. Q5) What is a Firewall? How does it ensure security? Q6) Explain about key expansion schedule of AES. Q7) Write a short note on Transposition techniques. Q8) Explain RSA algorithm. Q9) Explain Diffie-Hellman key exchange algorithm.

ASSIGNMENT-2 Cryptography and Network Security (DMSIT25) Q1) Write a few words about Linear and differential cryptanalysis. Q2) Briefly describe Fermat s Theorem. Q3) Explain CFB and CTR block cipher modes of operations. Q4) Briefly explain the DSS algorithm. Q5) Define honey pot. Q6) What are security services? Q7) What is a hash function? Q8) What is user authentication? Q9) State the 3 objectives of security.

(DMSIT26) ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DECEMBER 2017 Second Year Artificial Intelligence Q1) What are problem characteristics? Discuss with examples. Q2) Discuss about various approaches to knowledge representation. Q3) Explain A* and AO* algorithms. Q4) Explain the steepest hill climbing algorithm. Q5) Discuss about commonsense ontologies. Q6) Explain the concept of question answering. Q7) Explain default reasoning approaches. Q8) Derive production rules of water jug problem. Q9) Explain control knowledge.

(DMSIT26) ASSIGNMENT-2 M.Sc. DEGREE EXAMINATION, DECEMBER 2017 Second Year Artificial Intelligence Q1) Explain Crypt-arithmetic problem. Q2) Write a short note on Dempster-Shafer Theory. Q3) Explain about semantic analysis. Q4) Write a short note on heuristic search technique. Q5) What is Al? Q6) Define an Expert System. Q7) What is natural deduction? Q8) What is conflict resolution? Q9) Define abduction.