M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75

Similar documents
(DMSIT21) Software Engineering. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY

4) Discuss on various types of software myths and the true aspects of these myths.

1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step.

M.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following

(DMCS21) User Interface Design. ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, DEC (Second Year) COMPUTER SCIENCE. MAXIMUM MARKS:30 Answer ALL Questions

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Paper - I : DATA STRUCTURES

10EC832: NETWORK SECURITY

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

INFORMATION TECHNOLOGY

AO* algorithm Game playing algorithms: min-max algorithm C12 Game playing algorithms: alpha beta pruning. Assignment 1

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE.

1) What is information system? Describe the basic concepts of information systems.

SIR C R REDDY COLLEGE OF ENGINEERING

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS

Lecture Topics (including assignment and tests) day day Topic. The process, software products, emergence of software engineering

DEGREE EXAMINATION, MAY

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

M.Sc. (Computer Science) I Year Assignments for May Paper I DATA STRUCTURES Assignment I

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Cryptography and Network Security

Preface to the Second Edition Preface to the First Edition Brief Contents Introduction to C++ p. 1 A Review of Structures p.

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...

Lecture Plan-1. Contents Methodology Time Queries Remarks. Question/ Answers. Discussion. Chalk Board. &Discussion. Discussion 10

Object Oriented Programming with c++ Question Bank

ADMINISTRATIVE MANAGEMENT COLLEGE

10CS64-Computer Networks-II Question Bank PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

COURSE OUTCOMES M.Sc (Computer Science)

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)

Introduction to Data Analytics Maximum : 60 Marks (1X12 = 12 Marks) (4X12=48 Marks) 1. Answer all questions (1X12=12 Marks)

Cryptography and Network Security

Intro to OOP Visibility/protection levels and constructors Friend, convert constructor, destructor Operator overloading a<=b a.

Code No: R Set No. 1

"Charting the Course to Your Success!" MOC B Programming in C# Course Summary

Dietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++

Standard. Number of Correlations

Question Paper Code : 97044

Microsoft Visual C# Step by Step. John Sharp

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year INFORMATION TECHNOLOGY.

Programming in C#

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

CS1302 / Computer Networks

Introduction to Programming Using Java (98-388)

VALLIAMMAI ENGINEERING COLLEGE

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Object Oriented Programming

Time : 3 hours. Full Marks : 75. Own words as far as practicable. The questions are of equal value. Answer any five questions.

Course Text. Course Description. Course Objectives. StraighterLine Introduction to Programming in C++

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Time : 03 Hours Maximum Marks : 75

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

END TERM EXAMINATION. 2 (a) Discuss about different web documents used in lntemet. (b) How Intemet administration is organized?

CS/IT321. Hall Ticket Number: April, 2017 Sixth Semester Time: Three Hours Answer Question No.1 compulsorily. Answer ONE question from each unit.

Network Layer, Link Layer, and Network Security Summary

ASSIGNMENT - 1 M.C.A.DEGREE EXAMINATION, MAY 2019 Second Year SOFTWARE ENGINEERING. Maximum : 30 MARKS Answer ALL questions.

R07. FirstRanker. 7. a) What is text mining? Describe about basic measures for text retrieval. b) Briefly describe document cluster analysis.

The course introduces many of the techniques and technologies employed by modern desktop and enterprise applications, including:

2) Explain in detail about different AVL rotation applied on unbalanced trees.

Programming in C# Course: Course Details ABOUT THIS COURSE AUDIENCE PROFILE. Síguenos en:

CRYPTOGRAPHY AND NETWORK SECURITY

SESSION M12-S12 INTERNAL ASSIGNMENT

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications

Course Description. Audience. Module Title : 20483B: Programming in C# Duration : 5 days. Course Outline :: 20483B ::

Microsoft Programming in C#

An Object Oriented Programming with C

ASSIGNMENT - 1 M.Sc. DEGREE EXAMINATION, MAY 2019 First Year COMPUTER SCIENCE Data Structures MAXIMUM : 30 MARKS ANSWER ALL QUESTIONS

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK

- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT

10CS36: Object Oriented Programming with C++

BRA BIHAR UNIVERSITY, MUZAFFARPUR DIRECTORATE OF DISTANCE EDUCATION

VB.NET. Exercise 1: Creating Your First Application in Visual Basic.NET

Oral Question Bank for CL-3 Assignment

CS 6456 OBJCET ORIENTED PROGRAMMING IV SEMESTER/EEE

Learning Objectives. C++ For Artists 2003 Rick Miller All Rights Reserved xli

Learn to create Window applications using the C# language with Visual Studio 2012.

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Part I: Preliminaries 24

The Bhopal School of Social Sciences, Bhopal

SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION

Lecture 6: Overview of Public-Key Cryptography and RSA

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75

COURSE OUTCOMES OF M.Sc(IT)

Software Engineering 4C03 Answer Key

1) What is the role of Information Technology in modern business? 2) Define computer? Explain the Block Diagram of computer with a neat diagram?

Syllabus Under Autonomy Mathematics

Sai Nath University. Assignment For BCA 5 TH

Code No: RR Set No. 1

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75. Paper - I : INFORMATION TECHNOLOGY

B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Introduction to information Security

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Transcription:

(DMSIT21) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - I : Software Engineering Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Discuss in detail the capability maturity model integration. 2) How do you initiate requirement engineering process and explain requirement elicitation format. 3) Explain in detail various design elements in design model. 4) Explain black box testing technique in detail. 5) Explain the following : a) CK metrics suite b) Metrics for testing Section B (5 5 = 25) Answer any five questions 6) Discuss about different software myths and their corresponding realities. 7) Describe the prototyping process model. 8) Explain the communication practices of software engineering practice. 9) Explain the system engineering hierarchy. 10) Describe class Responsibility collaborator modeling of analysis model.

11) Develope different levels of DFD for safe home security function. 12) Discuss about the art of debugging. 13) Explain the function based metrics for the analysis model. Section C (5 1 = 5) Answer all questions 14) What is legacy software? 15) What do you mean by computer based system? 16) What is refactoring? 17) What are the factors of ISO 9126 quality factors? 18) What are cohesion metrics?

(DMSIT22) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 (Second Year) INFORMATION TECHNOLOGY Paper - II : Programming With C++ Time :.03 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Describe the following : a) Variable scope b) Dynamic memory allocation 2) Explain about call by value, call by reference and call by constant reference with suitable example. 3) What is pointer? How to create pointers in C++? Give the advantages of pointers. 4) What is operator overloading? Write a C++ program to overload +, operators for addition, subtraction of complex numbers respectively. 5) What is class template? What is its syntax? Explain class templates with multiple parameters. Section B (5 5 = 25) Answer any five questions 6) Explain about type casting is C++. 7) What is the syntax of switch structure? Write a program to accept a month number and display the maximum number of days in the month. 8) Describe any five string handling functions in C++. 9) What is constructor? Give the characteristics of constructors.

10) Explain about multiple inheritance with suitable example. 11) Explain how a single try block can be associated with multiple catch blocks. 12) Write a program to find number of characters, words and lines in a given text. 13) Briefly write about container classes. Section C (5 1 = 5) Answer all questions 14) What is a relational expression? 15) Differentiate between while loop and do-while loop. 16) What are formal arguments? 17) What is pointer? 18) What is function overriding?

(DMSIT23) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - III : TCP/IP Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Explain in detail about TCP/IP protocol with neat diagram. 2) Explain Network technologies and Internetworking in detail. 3) Describe ARP and RARP in detail. 4) Explain routing protocols in detail. 5) Explain client Server model in detail. Section B (5 5 = 25) Answer any five questions 6) Differentiate between Classless and classful addressing in detail. 7) Discuss about different categories of networks. 8) Describe routing IP datagram. 9) Write about user Datagram protocol. 10) Discuss about error and control messages. 11) Describe about ICMP. 12) Describe Socket Interface. 13) Write about DHCP.

Section C (5 1 = 5) Answer all questions 14) What is Internet? 15) Define protocol. 16) What is IP? 17) Define Datagram. 18) What is subnetting?

(DMSIT24) M.Sc. (Final) DEGREE EXAMINATION, DEC. 2014 (Second Year) INFORMATION TECHNOLOGY Paper - IV : Data Mining & Techniques Time : 3 Hours Maximum Marks : 75 Section - A (3 x 15 = 45) Answer any Three of the following 1) Briefly discuss about architecture of a typical Data Mining System. 2) Explain about Descriptive Data Summarization Model. 3) Discuss in detail about Bayesian classification. 4) Differentiate between Parallel and Distributed Algorithms clearly. 5) Explain score functions of Predictive Models. Section - B (5 x 5 = 25) Answer any Five of the following 6) Explain the components of Data Mining Algorithms. 7) What are different types of measurement for Data? 8) Describe about Multidimensional Scaling. 9) Explain CART algorithm for building tree classifiers. 10) Discuss about Fundamentals of Modeling. 11) Explain about different patterns for strings.

12) What is Multivariate Parameter optimization? 13) What are special-purpose Algorithms for Disk Access. Section - C (5 x 1 = 5) Answer all questions 14) What is snooping? 15) What are forms of Data? 16) What is classification? 17) Define Regression. 18) What is OLAP?

(DMSIT25) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - V : Cryptography and Network Security Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Describe DES encryption algorithm with an example. 2) Write extended Euclidean algorithm and use it to find the multiplicative inverse of 24140 mod 40902. 3) Explain in detail the key distribution techniques. 4) Describe RSA algorithm with an illustrative example. 5) Discuss about firewall design principles. Section B (5 5 = 25) Answer any five questions 6) Explain the transposition cipher with an illustrative example. 7) Describe the evaluation criteria for AES. 8) Explain the difference between the AES decryption algorithm and equivalent inverse cipher. 9) Explain the RC4 algorithm. 10) Discuss about different approaches to generate random numbers. 11) Explain the Miller- Rabin algorithm to test a large number for primality.

12) Explain the mutual authentication technique. 13) Discuss about UNIX password protection scheme. Section C (5 1 = 5) Answer all questions 14) What is symmetric cipher? 15) What is the purpose of the state array? 16) What is a nonce? 17) Define Euler s totient function? 18) What is a honeypot?

(DMSIT26) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 (Examination at the end of Second Year) INFORMATION TECHNOLOGY Paper - VI : Artificial Intelligence Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three of the following 1) What is state space approach? Explain about watering problem through state space approach. 2) a) Differentiate Depth first search and breadth first search technique. b) Describe various approaches and issues in knowledge representation. 3) Explain about the steepest Ascent Hill climbing technique in detail. 4) Explain about the characteristic features of expert systems in detail. 5) Explain about the semantic nets. Suggest a semantic net to describe the main organs of the human body. Section B (5 5 = 25) Answer any five questions 6) Explain about the applications of AI. 7) Write a short notes on heuristic search technique. 8) Discuss about back propagation training 9) Explain about monotonic and non-monotonic reasoning problem. 10) Explain about semantic analysis. 11) Explain about symbolic based learning techniques.

12) Explain the memory organization of commonsense behaviour. 13) Write a short notes on Dempster shafer theory. Section C (5 1 = 5) Answer all questions 14) What is AI? 15) What is frame? 16) Define predicate. 17) What is crypt arithmetic problem? 18) Define an Expert system.