Showing posts with label mid sem. Show all posts
Showing posts with label mid sem. Show all posts

May 02, 2019

02 May

Cloud Computing - Mid Sem Solution

Note: We have tried solving the question paper in a very short time span as per our understanding and the study material we had. Feel free to contact us through comment box or through email if you have some descriptive answer. Q1. Answer the following questions in brief           ...

April 26, 2019

26 Apr

Data Storage Technologies and Networks - Mid Sem Solution

Note: We have tried solving the question paper in a very short time span as per our understanding and the study material we had. Feel free to contact us through comment box or through email if you have some descriptive answer. Question)  It is required to transfer a file of size 8000 bytes at a rate of...

April 17, 2019

17 Apr

Network Security - Mid Sem Solution

Mid-Sem Paper Solutions: Question: What are the different types of active security attack ? Answer: Security Attack: Any action that compromises the security of information owned by an organization. There are 2 types of attack as shown below. Active Attack: An Active attack attempts to alter system...

April 15, 2019

15 Apr

Software Architecture - Mid Sem Solution

Mid-Sem Paper Solutions: Question: Q.1 Choose the most appropriate architectural pattern (one) for the 5 descriptions below. Give reasons for choosing the pattern (in 1-2 line maximum) 1. Wants to split a system into a number of computationally independent execution structures (groups of software and hardware)...

November 12, 2018

12 Nov

Data Mining - Mid Sem Solutions

Question: Give an example for each of the following preprocessing activates a. Incomplete b. Inconsistent Answer: Data Processing: It is a data mining technique that involves transforming raw data into an understandable format. Our Real-world data is often incomplete, inconsistent, and/or lacking in certain behaviors...
12 Nov

Software Testing Methodologies - Mid Sem Solutions

Question One of your friends has written a program to search a string in a string and requested you to test the below function using equivalent class portioning : function strpos_generic( $haystack, $needle, $nth,  $insensitive) Following are terminology definitions: $haystack= the string in which...

November 05, 2018

05 Nov

Design and Analysis of Algorithms - Mid Sem Solution

Question 1A) The time factor when determining the efficiency of algorithm is measured by a) Counting microseconds b) Counting the number of key operations c) Counting the number of statements d) Counting the kilobytes of algorithm Answer: b Justification: It is hardware and language independent , rest are dependent...