Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
What are the various categories of Hierarchical Clustering? Describe BIRCH technique of cluster representation in large databases with example.
How is association rules mined from large databases? Write Apriori algorithm to discover all frequent itemsets from large databases.
Describe two types of Priority Queue and the operations performed on them. Give two advantages and two disadvantages of a Linked List over an Array.
The waveform depicted in the figure below is highlighted by numerous peaks and troughs. When listening the audio file, the dB level constantly shifts up and down, thus giving the impression of a &l
Illustrate the three basic elements of mixing. Dynamic Processors basically comprise of an expander? Illustrate the term expander.
What are the differences between a normal fade and cross-fade? What is a digital signal processor? Describe how the various types of signal processors impact on frequency, dynamics, and time.
Describe the method of representing the disjoint sets in the memory. Find the Minimum spanning Tree by applying Prim’s Algorithm on undirected graph.
Write B-Tree insert non-full algorithm and also find the total CPU time for executing the same. Write and describe with the help of one example a decrease key algorithm in Binomial Heap. Determine t
Describe knowledge discovery in databases process. Bring out the block diagram of KDD process and explain the components of KDD process. Describe generalized Bayes decision model. Describe decision t
Describe the features and advantages of SANCopy as a Data Migration Tool. Describe the different logs used in MirrorView.
How can you store the XML data in relational databases using tree representation? Describe. How the various geometric constructs can be represented in a database in a normalized fashion?
With essential examples, define the following: Super Key and Primary Key. How the EER diagram can be reduced to relations? Describe.
Intermediary services can be classified as stateless services that bridge technical inconsistencies or design gaps in an architecture. They act as both clients and servers in a Service Oriented Arch
We identified three expansion stages that signify the different levels of maturity of an SOA in the enterprise: the fundamental SOA, the networked SOA and the process-enabled SOA.
A service is a software constituent of distinctive functional meaning which typically encapsulates a high-level business concept, and is basically made up of three parts. Illustrate the three sub-co
Consider an elliptic curve encryption or decryption scheme. The cryptosystem parameters are E5(1,6) and G = (2,4). B's secret key is nB = 2.
Consider cryptographic hash functions. Name four necessary properties for a cryptographic hash function, describing for each why it is vital.
Describe the significance of the Euler Totient function in Cryptography. Compute Euler Totient function value, φ(1280).
Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root α = 2.
In brief describe the given security goals given by cryptography: confidentiality, integrity, authentication and non-repudiation.
Name five problems with solutions that might take place while installing the Linux from Scratch (LFS) system.
For the given, cmd1 and cmd2 are arbitrary UNIX commands, and file1 and file2 are files owned by you. Write UNIX (bash) commands to:
What is the role of device independent layer of device driver? In brief explain why a micro-kernel operating system structure is more robust than a monolithic (simple) operating system structure.
Name all four contemporary technologies that are related to Grid computing. What are the major distinctions between conventional distributed computing and Grid computing?
Describe the contents of the Cost Assessment. Several Documents are needed for Configuration Management. State three of them, and describe their importance.