Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Describe different techniques used to resolve hash collision. Describe the array of adjacency list representation of an undirected graph with the example.
Write the c function to create an ordered linked list. Write the recursive function to compute GCD of two numbers.
Write a function to create a tree for a postfix expression. Trace the same stepwise for the expression (A+ ((B-C)*D) ^E^F) by first giving the equivalent postfix expression.
Describe why the software maintenance phase is significant for a software development company. In brief explain why software maintenance is so expensive a phase in software maintenance.
Write a function to implement heap sort. Write the function to convert the infix expression to postfix expression using a stack.
What are the various categories of Hierarchical Clustering? Describe BIRCH technique of cluster representation in large databases with example.
How is association rules mined from large databases? Write Apriori algorithm to discover all frequent itemsets from large databases.
Describe two types of Priority Queue and the operations performed on them. Give two advantages and two disadvantages of a Linked List over an Array.
The waveform depicted in the figure below is highlighted by numerous peaks and troughs. When listening the audio file, the dB level constantly shifts up and down, thus giving the impression of a &l
Illustrate the three basic elements of mixing. Dynamic Processors basically comprise of an expander? Illustrate the term expander.
What are the differences between a normal fade and cross-fade? What is a digital signal processor? Describe how the various types of signal processors impact on frequency, dynamics, and time.
Describe the method of representing the disjoint sets in the memory. Find the Minimum spanning Tree by applying Prim’s Algorithm on undirected graph.
Write B-Tree insert non-full algorithm and also find the total CPU time for executing the same. Write and describe with the help of one example a decrease key algorithm in Binomial Heap. Determine t
Describe knowledge discovery in databases process. Bring out the block diagram of KDD process and explain the components of KDD process. Describe generalized Bayes decision model. Describe decision t
Describe the features and advantages of SANCopy as a Data Migration Tool. Describe the different logs used in MirrorView.
How can you store the XML data in relational databases using tree representation? Describe. How the various geometric constructs can be represented in a database in a normalized fashion?
With essential examples, define the following: Super Key and Primary Key. How the EER diagram can be reduced to relations? Describe.
Intermediary services can be classified as stateless services that bridge technical inconsistencies or design gaps in an architecture. They act as both clients and servers in a Service Oriented Arch
We identified three expansion stages that signify the different levels of maturity of an SOA in the enterprise: the fundamental SOA, the networked SOA and the process-enabled SOA.
A service is a software constituent of distinctive functional meaning which typically encapsulates a high-level business concept, and is basically made up of three parts. Illustrate the three sub-co
Consider an elliptic curve encryption or decryption scheme. The cryptosystem parameters are E5(1,6) and G = (2,4). B's secret key is nB = 2.
Consider cryptographic hash functions. Name four necessary properties for a cryptographic hash function, describing for each why it is vital.
Describe the significance of the Euler Totient function in Cryptography. Compute Euler Totient function value, φ(1280).
Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root α = 2.
In brief describe the given security goals given by cryptography: confidentiality, integrity, authentication and non-repudiation.