Wednesday, September 24, 2008

HI IF U WANT TO KNOW PREVIOUS VTH SEM PAPERS

Yes here i put some of the previous exam papers can be placed here.
So if u want to now more about the previous semester papers once refer this complete posts.
Thank you

Tuesday, September 16, 2008

DATA WAREHOUSING AND DATA MINING

1.Briefly discuss.
a) Virtual datawarehouse Vs Data mart.
b)Kneapsort Neighbor classifier.
c)Multi dimensional databases.
d)Bagging.
e)Pruning.
f)Synchronous generalization.
g)Segmentation by Natural Partitioning.
h)Strategies of data reduction.
1. Discuss about the efficient computation of data cubes.
2. explain architecture for on-line analytical mining.
3. Explain the methods of decentralization and hierarch generation for categorical data.
4. a) As a marketing manager of All Elecronics, characterize the buying habits of customers who purchases items priced at no less that $100, with respect to the customer’s age and type of item purchased, and the place in which the item was made.
b) Discuss about functional components of Data mining GUI.
6. a) How to implement attribute oriented induction technique?
b) Explain the Associate rule mining using market basket analysis.
7. a) What is classification and what is prediction and how to prepare data for classification and prediction?

8. Explain how back propagation is useful for classification of data.

EMBEDDED SYSTEMS(5th Sem)

1)Write short notes on the following hardware/units used to build embedded systems.
a) Microprocessor
b) Micro controller
c) DSP processor
d) Timer
e) Emulator.
2)Write truth table for the following types of gates and give on detailed illustration for each type of gate it can be used.
a)3-input NAND gate
b) 2-Input XOR gate
c) 2-input NOR gate
d) NOT gate.
3) What is an interrupt? Why they are required in a computer? Wxplain in detail how multiple tasks are handled by the computer.

4)Discuss the relative merits and demerits of various shared-data protection mechanisms.

5) Explain the features of the following methods of inter-task communications.
a) Semaphores
b) Queues
c) Mailboxes
d) Pipes

6) Expalin hard-real time scheduling considerations.

7) Explain the following software development tools.
a) Cross- Compiler
b) Cross assembler
c) Linker
d) Loader/locator.
8) Explain the important features of the following operating systems that are relevant to embedded systems.
a) PT Linux
b) Windows XP
c) WIN CE
d) Vx Words.

OBJECT ORIENTED SOFTWARE ENGINEERING

1) a) Describe the canonical form of a complex software system.
b) Differentiate algorithmic decomposition from object-oriented decomposition.
c) Write about Mastow meaning of Software design.
d) What are the modesls of onject oriented system design?
2) What are the components of object model and write about the advantages and applications of the object model?

3) Illustrate different types of relationaships exist in objuect oriented languages.
4) Expalin domain analysis for room heating system.

5) Write about features of UML system.
6) How to manage software configuration? Illustrate.
7) What are the activities of requirements elicitation? Explain with suitable example.
8) What are system design goals? How to address them? Illustrate with example.

NETWORK SECURITY( 3rd Year)

First question is compulsary

1. a) Explanin the differences between passive attacks and active attacks.
b) Describe Worms.
c) Give the requirements of public key encryption.
d) Explain Compression funcion.
e) Expalin Delegation.

2. a) Explain various types of viruses.
b) Explain simple DES algorithm.

3. Consider a Diffie-Hellman scheme with a common prime q-11 and a primitive root alpha=2.
a) Show that 2 is a primitive root of 11.
b) If user A has public key Ya=9, what is A's priate key Xa?
c) If user B has public key Yb=3, what is the shared secret key K?

4. a) Explain SHA-1 algorithm
b) Explain MD5 algorithm

5. a) Expalin address base authentication protocols.
b) Expalin the Procedures to establish a session key.

6. Desribe Kerberos version 5 Protocol.

7. a) Describe SSL architecture.
b) Explain Athentication Header.

8. a) Explain E-mail security.
b) Explain the content types of MIME.

INFORMATION SYSTEMS CONTROL AND AUDIT( 3rd Year)

(With effect from the admitted batch of 2004-2005)

Time: Three hours Maximum:100 marks

First question is compulsory.
Answer any FOUR from the remaining.
Answer all parts of any question at one place.


1. Answer the following:

a) What is meant by crypto system?
b) What are the characteristics of good data processing system?
c) What is a passive attack on a communication network?
d) What is the boundary system for an IS?
e) Describe the different input forms used for inputting data.
f) Why information controls are used?
g) What is meant by spooling?
h) What is the global evaluation judgement on maintenance of asset safeguarding and data integrity?
i) Incorrect data in a computer system makes what problems?
j) Write about phases of system development process?
k) How to measure effectiveness of information system?
L) Define information system efficiency.
M) What are the basic activities of boundary subsystem?
N) Define computer system error.
O) Why should application programs that update monetary data items needs to maintain suspense account?

2. Describe about the components of internal control of the IS in an MNC.

3. Briefly describe the impact of globalization and technology revolution and need for information control and auditing.

4. Write about the functional capabilities of utility software.

5. What is meant by encryption and decryption? Describe the advantages and disadvantages of any two crypto systems you know?

6. Differentiate amnagement controls and application controls of IS?

7. Suggest suitable information audinging system for railway reservation system in A.P.

8. Expalain auditing procedure to audit any one expert system.