Note: We have tried solving the question paper in a very short time span as per our understanding and the study material we had. Feel free to contact us through comment box or through email if you have some descriptive answer.
Q1. Answer the following questions in brief ...
Showing posts with label mid sem. Show all posts
Showing posts with label mid sem. Show all posts
May 02, 2019
April 26, 2019
26
Apr
Note: We have tried solving the question paper in a very short time span as per our understanding and the study material we had. Feel free to contact us through comment box or through email if you have some descriptive answer.
Question)
It is required to transfer a file of size 8000 bytes at a
rate of...
April 17, 2019
Mid-Sem Paper Solutions:
Question:
What are the different types of active security attack ?
Answer:
Security Attack: Any action that compromises the security of information owned by an organization. There are 2 types of attack as shown below.
Active Attack:
An Active attack attempts to alter system...
April 15, 2019
Mid-Sem Paper Solutions:
Question:
Q.1
Choose the most appropriate architectural pattern (one) for the 5 descriptions
below. Give reasons for choosing the pattern (in 1-2 line maximum)
1. Wants to split a system into a number of
computationally independent execution structures (groups of software and
hardware)...
November 12, 2018
Question:
Give an example for each of the following preprocessing activates
a. Incomplete
b. Inconsistent
Answer:
Data Processing: It is a data mining technique that involves transforming raw data into an understandable format. Our Real-world data is often incomplete, inconsistent, and/or lacking in certain behaviors...