28-mscit2

Upload: allison-watson

Post on 03-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 28-MSCIT2

    1/12

    (DMSIT 21)

    ASSIGNMENT - 1, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper I SOFTWARE ENGINEERING

    Maximum :25 MARKSAnswer ALL questions.

    1. What is software? Explain the evolving role and characteristic of software.2. Explain the requirements engineering process with the help of a diagram and also explain

    the spiral model of requirements.

    3. Explain in detail about different design elements in design model.4. Explain in detail basis path testing in white box testing technique.5. Explain the following :

    (a) metrics for source code

    (b) metrics for testing.

  • 7/28/2019 28-MSCIT2

    2/12

    (DMSIT 21)

    ASSIGNMENT - 2, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper I SOFTWARE ENGINEERING

    Maximum :25 MARKSAnswer ALL questions.

    1. Describe the rapid application development model.2. Explain the process patterns and give one example.3. Write short note on the system engineering hierarchy.4. Explain the sequence diagram to ATM withdrawal transaction.5. Discuss about the requements analysis.6. Explain the integration testing strategy.7.

    Write about graph based testing methods.

    8. Discuss about McCalls quality factors.9. What are the characteristics of software?10.What are the framework activities of personal software process?11.What is DFD?12.What is software testing?13.What are ISO 9126 quality factors?

  • 7/28/2019 28-MSCIT2

    3/12

    (DMSIT 22)

    ASSIGNMENT - 1, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information TechnologyPaper IIPROGRAMMING WITH C++

    Maximum :25 MARKS

    Answer ALL questions.

    1. Describe the following.(a) User defined data types (b) Storage classes.

    2. What is constructor? Explain about different types of constructors.3.

    Explain operator overloading and write a program to demonstrate binary operatoroverloading.

    4. Explain the following:(a) Purevirtual functions

    (b) Command line arguments.

    5. What is exception? Discuss about exception handling.

  • 7/28/2019 28-MSCIT2

    4/12

    (DMSIT 22)

    ASSIGNMENT - 2, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper IIPROGRAMMING WITH C++

    Maximum :25 MARKSAnswer ALL questions.

    1. Explain about type casting in C++2. Explain about Jump statements and their types.3. Write a note on static function.4. Discuss about the class template.5. Explain the difference between multiple and multilevel inheritance.6. Explain the runtime polymorphism with an example.7. Discuss about different access modifiers.8. Write a note on standard C++ vectors.9. What is NULL pointer?10.How can you pass an array to a function?11.What is inline function?12.What is template function?13.What is container class?

  • 7/28/2019 28-MSCIT2

    5/12

    (DMSIT 23)

    ASSIGNMENT - 1, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper III TCP/IPMaximum :25 MARKS

    Answer ALL questions.

    1. Discuss about TCP/IP protocol Suit.2. Explain different types of network in detail.3. Explain the operations of ARP.4. Explain UOP server Design.5. Discuss in detail about client server model.

  • 7/28/2019 28-MSCIT2

    6/12

    (DMSIT 23)

    ASSIGNMENT - 2, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper III TCP/IP

    Maximum :25 MARKSAnswer ALL questions.

    1. Explain about TCP/IP layering.2. Write Rooting principles.3. Write two characteristics of Mobile IP.4. Write in brief DHCP.5. What is User Diagram?6. Explain about Error reporting.7. Write about Sub netting.8. Explain TCP/IP Versions.9. Define protocol.10. Define DNS.11. What is URP?12. What RARP?13. Define Masking.

  • 7/28/2019 28-MSCIT2

    7/12

    (DMSIT 24)

    ASSIGNMENT - 1, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper IV DATA MINING TECHNIQUESMaximum :25 MARKS

    Answer ALL questions.

    1. Discuss in detail about various decision the based algorithms for data classification.2. What is data mining algorithm? Explain its components?3. Explain about various partitional algorithms used for data clustering.4. Discuss various optimization methods for continuous parameter spaces.5. What is preditive modeling? Explain.

  • 7/28/2019 28-MSCIT2

    8/12

    (DMSIT 24)

    ASSIGNMENT - 2, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper IV DATA MINING TECHNIQUES

    Maximum :25 MARKSAnswer ALL questions.

    1. What is meant by knowledge discovery in databases (DD)?2. Describe the issues of data mining.3. What is association rule mining? Explain.4. What are predicitive models for classification?5. Write short notes on scoring patterns.6. Write short notes on OLAP.7. Enumerate various approaches for building real classifiers.8. How is data organized in databases? Explain.9. What do you mean by uncertainity?10. What is clustering?11. What is data cleaning?12. What is regression?13. What is descriptive modelling?

  • 7/28/2019 28-MSCIT2

    9/12

    (DMSIT 25)

    ASSIGNMENT - 1, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper V CRYPTOGRAPHY AND NETWORK SECURITYMaximum :25 MARKS

    Answer ALL questions.

    1. Explain in detail the DES encryption algorithm.2. Explain the difference between the AES decryption algorithm and the equivalent

    inverse cipher.

    3. Explain the overview of stream cipher structure and write the RC4 algorithm.4. Describe the principles of public-key cryptosystems.5. List and briefly define four techniques to avoid guessable passwords.

  • 7/28/2019 28-MSCIT2

    10/12

    (DMSIT 25)

    ASSIGNMENT - 2, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper V CRYPTOGRAPHY AND NETWORK SECURITY

    Maximum :25 MARKSAnswer ALL questions.

    1. Explain the difference between a block cipher and a stream cipher.2. Write Euclidean algorithm and use it to find gcd (1970, 1066).3. Explain the concept of sleganography.4. What is traffic padding? Write about its purpose.5. What are the roles of the public and private key?6. Write about the threats associated with a direct digital signature scheme.7. Discuss about the firewall configurations.8. Explain the difference between packet-filtering router and a stateful inspection firewall.9. What is a transposition cipher?10. What is modular arithmetic?11. What is power analysis?12. What is a nonce?13. What is a suppress-replay attack?

  • 7/28/2019 28-MSCIT2

    11/12

    (DMSIT 26)

    ASSIGNMENT - 1, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information TechnologyPaper VI ARTIFICIAL INTELLIGENCE

    Maximum :25 MARKS

    Answer ALL questions.

    1. What are the problem characteristics? Discuss explicitly with examples.2. Explain BFS and DFS with examples.3. Discuss about various approaches to knowledge representation.4. Explain the following :

    (a) Conflict resolution (b) Bayesian networks.

    5. Discuss about the commonsense ontologies.

  • 7/28/2019 28-MSCIT2

    12/12

    (DMSIT 26)

    ASSIGNMENT - 2, MAY 2013.

    M.Sc., SECOND YEAR (FINAL) DEGREE EXAMINATION

    Information Technology

    Paper VI ARTIFICIAL INTELLIGENCE

    Maximum :25 MARKSAnswer ALL questions.

    1. Derive production rules for water jug problem.2. Explain the resolution algorithm for predicate logic.3. Illustrate the important components of a script by taking restaurant example.4. Explain about different matching processes.5. Explain about means-ends analysis.6. Describe the frame problem.7. Write the Dempster-Shafer theory.8. Write about expert system shells.9. What is A.I.?10. Differentiate procedural versus declarative knowledge.11. What do you mean by knowledge base?12. What is frame problem?13. What is an expert system?