1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model.



Similar documents
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

VALLIAMMAI ENGINEERING COLLEGE

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

EXAM questions for the course TTM Information Security May Part 1

Assessment for Master s Degree Program Fall Spring 2011 Computer Science Dept. Texas A&M University - Commerce

Lesson Plans Managing a Windows 2003 Network Infrastructure

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Network Security Administrator

NETWORK ADMINISTRATION AND SECURITY

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Information and Communications Technology Courses at a Glance

Network System Design Lesson Objectives

CRYPTOG NETWORK SECURITY

Chapter 10. Network Security

A DHCP Primer. Dario Laverde, 2002 Dario Laverde

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

ICTTEN8195B Evaluate and apply network security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Networking Technology Online Course Outline

Lectures for the course: Electronic Commerce Technology (IT 60104)

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

Curriculum Map. Discipline: Computer Science Course: C++

Overview - Using ADAMS With a Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Recommended IP Telephony Architecture

Networking and High Availability

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Overview - Using ADAMS With a Firewall

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Internetworking and Internet-1. Global Addresses

Course Name: ADVANCE COURSE IN SOFTWARE DEVELOPMENT (Specialization:.Net Technologies)

How To Understand And Understand Network Theory

Networking and High Availability

Cornerstones of Security

Managing and Maintaining Windows Server 2008 Servers

CompTIA Network+ (Exam N10-005)

Cisco Integrated Services Routers Performance Overview

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

MCSA Security + Certification Program

Chapter 8. Network Security

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

McAfee Next Generation Firewall (NGFW) Administration Course

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

10CS64: COMPUTER NETWORKS - II

Enabling Remote Access to the ACE

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Client Server Registration Protocol

Internet Protocol Address

Creating Web Farms with Linux (Linux High Availability and Scalability)

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

About Firewall Protection

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Security Design.

Voice over IP Security

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

KITES TECHNOLOGY COURSE MODULE (C, C++, DS)

SSVP SIP School VoIP Professional Certification

SCP - Strategic Infrastructure Security

Chapter 7 Transport-Level Security

Configuring Windows Server 2008 Network Infrastructure

Tim Bovles WILEY. Wiley Publishing, Inc.

Case Study for Layer 3 Authentication and Encryption

B.Sc. (Computer Science) First Year

Top-Down Network Design

How To Pass The Information And Network Security Certificate

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Implementing Cisco IOS Network Security

Lecture 02b Cloud Computing II

Overview. SSL Cryptography Overview CHAPTER 1

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

LAB THREE STATIC ROUTING

MSc Information Technology - E521

Detecting rogue systems

Network Layers. CSC358 - Introduction to Computer Networks

Introduction to Network Security Lab 1 - Wireshark

CS Final Exam

Network Security Course Specifications

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Proxy Server, Network Address Translator, Firewall. Proxy Server

Optimizing Data Center Networks for Cloud Computing

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

IINS Implementing Cisco Network Security 3.0 (IINS)

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

allow all such packets? While outgoing communications request information from a

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

CS5008: Internet Computing

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

EXPLORER. TFT Filter CONFIGURATION

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

LAN TCP/IP and DHCP Setup

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Availability Digest. Redundant Load Balancing for High Availability July 2013

INFORMATION TECHNOLOGY

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Transcription:

(DMSIT 21) ASSIGNMENT - 1, MAY-2014. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model. 2) What are requirements engineering tools? Explain the process of initiating the requirements engineering. 3) Describe the analysis building through flow-oriented modeling. 4) Discuss about software myths. 5) Write about a process framework. 6) Describe the modeling practices of software engineering. 7) Discuss about system modeling with UML. 8) Write a note on software evolution. 9) What is personal software process?

(DMSIT 21) ASSIGNMENT - 2, MAY-2014. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following: a) Integration testing. b) Control structure testing. 2) Describe the following class-oriented metrics: a) The CK metrics suite. b) The MOOD metrics suite. 3) Write about pattern-based software design. 4) Write short notes on debugging strategies. 5) Explain white-box testing. 6) Discuss in detail the architectural design metrics for design model. 7) What do you mean by deployment? 8) What is refactoring? 9) What is stress testing?

(DMSIT 22) ASSIGNMENT - 1, MAY-2014. PAPER- II : PROGRAMMING WITH C++ 1) Explain about variable scope and storage classes. 2) Discuss about different iterative statements with illustrative example. 3) What is operator overloading? Write a program to overload new and delete operators. 4) Explain various datatypes in C++. 5) Explain breat, continue and exit with examples. 6) Discuss about late binding and early binding. 7) Write a C++ program using inline functions. 8) Write about short hand arithmetic assignment operators. 9) What is the need to nest loops?

(DMSIT 22) ASSIGNMENT - 2, MAY-2014. PAPER- II : PROGRAMMING WITH C++ 1) What is pointer? What are its advantages? Explain the concept of pointers to functions. 2) Write a C++ program using function template to perform addition and multiplication of two matrices. 3) Write a program which copies one string into another and reverse a given string. 4) Write a note on pure virtual function. 5) What is an exception? How exceptions are handled? 6) Describe various file mode operations available in C++. 7) Differentiate formal and actual arguments. 8) What is Friend class? 9) What is destructor?

(DMSIT 23) ASSIGNMENT - 1, MAY-2014. PAPER- III : TCP/IP 1) Describe in detail about classful internet addresses. 2) Discuss about different layers of TCP/IP protocol. 3) Explain in detail the internet control message protocol. 4) Discuss the properties of an Ethernet. 5) Explain the features of primary and backup RARP servers. 6) Explain the characteristics of mobile IP. 7) Explain the features of dynamic host configuration protocol. 8) What is ICMP? 9) Define next-hep routing.

(DMSIT 23) ASSIGNMENT - 2, MAY-2014. PAPER- III : TCP/IP 1) Explain different types of networks in detail. 2) Describe the client-server model. 3) Discuss about congestion control. 4) Write about error and control messages. 5) Explain the gateway-to-gateway protocol. 6) Discuss about subnetting and supernetting. 7) Define DNS. 8) What is proxy ARP? 9) What do you mean by datagram?

(DMSIT 24) ASSIGNMENT - 1, MAY-2014. PAPER- IV : DATA MINING AND TECHNIQUES 1) Define random variable and multiple random variable. Explain their relationships in detail. 2) What is an estimator? Describe the desirable properties of estimators. 3) Explain the role of optimization in data mining. 4) Write a note on data quality for individual measurements. 5) Write about tree classifiers. 6) Write a note on clustering. 7) Explain EM algorithm for missing data. 8) What are models and patterns? 9) Define prediction.

(DMSIT 24) ASSIGNMENT - 2, MAY-2014. PAPER- IV : DATA MINING AND TECHNIQUES 1) Discuss about the supervised learning. 2) Explain about regression as a predictive model. 3) Write a note on state-space formulation algorithm. 4) What are the features of partition based clustering algorithm. 5) Describe the memory hierarchy of a computer system. 6) Discuss about data cleaning. 7) What are index structures? 8) Define conditional pattern base. 9) What is score function and classification?

(DMSIT 25) ASSIGNMENT - 1, MAY-2014. PAPER- V : CRYPTOGRAPHY AND NETWORK SECURITY 1) Explain DES encryption algorithm. What is the purpose of the S-boxes in DES? 2) Explain in detail the transformations takes place in AES encryption procedure. 3) Describe various modes of operations of block ciphers. 4) Explain the difference between monoalphabetic cipher and polyalphabetic cipher. 5) Explain the importance of the Feistel cipher. 6) Write Euclid algorithm and use it to find gcd(1970,1062). 7) Briefly describe the concepts SubBytes and SubWord. 8) Define the playfair cipher. 9) What is power analysis?

(DMSIT 25) ASSIGNMENT - 2, MAY-2014. PAPER- V : CRYPTOGRAPHY AND NETWORK SECURITY 1) Describe RSA algorithm with an illustrative example. 2) What kind of attacks are possible on packet filtering firewalls and suggest appropriate counter measures. 3) Use Euler s theorem to find a number x between 0 and 28 with x85 congruent to 6 modulo 35. 4) Explain the digital signature algorithm. 5) Write the benefits of an intrusion detection system. 6) What is traffic padding and what is its purpose? 7) What is denial service attack? 8) What is a digital envelope? 9) What is a circuit-level gateway?

(DMSIT 26) ASSIGNMENT - 1, MAY-2014. PAPER- VI : ARTIFICIAL INTELLIGENCE 1) Explain water jug problem with an illustrative example. 2) What is a best-first search? Explain A* algorithm. 3) Describe the resolution algorithm with an example. 4) Explain the concept of question answering. 5) Explain the breadth-first search algorithm. 6) Discuss the steepest-ascent hill climbing. 7) What is cryptarithmetic problem? Discuss its solution. 8) What is the criteria for success? 9) What is the role of knowledge?

(DMSIT 26) ASSIGNMENT - 2, MAY-2014. PAPER- VI : ARTIFICIAL INTELLIGENCE 1) Explain the following: a) Logic programming. b) Control Knowledge. 2) What is an expert system? Discuss about its role in real world. 3) Write a note on inheritable knowledge. 4) Discuss about the convertion of a wff into clause form. 5) Write a note on conflict resolution. 6) Briefly explain about commonsense ontologies. 7) Define the frame problem? 8) What do you mean by natural deduction? 9) What is commonsense?