Note: We have tried solving the question paper in a very short time span as per our understanding and the study material we had. Feel free to contact us through comment box or through email if you have some descriptive answer.
Q1. Answer the following questions in brief ...
Showing posts with label mid sem. Show all posts
Showing posts with label mid sem. Show all posts
May 02, 2019
April 26, 2019
26
Apr
Note: We have tried solving the question paper in a very short time span as per our understanding and the study material we had. Feel free to contact us through comment box or through email if you have some descriptive answer.
Question)
It is required to transfer a file of size 8000 bytes at a
rate of...
April 17, 2019
Mid-Sem Paper Solutions:
Question:
What are the different types of active security attack ?
Answer:
Security Attack: Any action that compromises the security of information owned by an organization. There are 2 types of attack as shown below.
Active Attack:
An Active attack attempts to alter system...
April 15, 2019
Mid-Sem Paper Solutions:
Question:
Q.1
Choose the most appropriate architectural pattern (one) for the 5 descriptions
below. Give reasons for choosing the pattern (in 1-2 line maximum)
1. Wants to split a system into a number of
computationally independent execution structures (groups of software and
hardware)...
November 12, 2018
Question:
Give an example for each of the following preprocessing activates
a. Incomplete
b. Inconsistent
Answer:
Data Processing: It is a data mining technique that involves transforming raw data into an understandable format. Our Real-world data is often incomplete, inconsistent, and/or lacking in certain behaviors...
12
Nov
Question
One of your friends has written a program to search a string in a string and requested you to test the below function using equivalent class portioning :
function strpos_generic( $haystack, $needle, $nth, $insensitive)
Following are terminology definitions:
$haystack= the string in which...
November 05, 2018
05
Nov
Question 1A)
The time factor when determining the efficiency of algorithm is measured by
a) Counting microseconds
b) Counting the number of key operations
c) Counting the number of statements
d) Counting the kilobytes of algorithm
Answer: b
Justification: It is hardware and language independent , rest are dependent...