Showing posts with label Anna University Exam Questions. Show all posts
Showing posts with label Anna University Exam Questions. Show all posts

CS6302 Database Management Systems November December 2015

Anna University Questions with Answers - CS6302 Database Management Systems November December 2015, Computer Science and Engineering, Information Technology Questions, Third semester and fifth semester, Regulation 2013

CS6302 Database Management Systems for B.E. Computer Science and Engineering

CS6302 Database Management Systems for B.Tech. Information Technology

CS6302 Database Management Systems for B.E. Mechanical and Automation Engineering


Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
Academic Year
November December 2015
Subject Code
CS6302
Subject Name
Database Management Systems
Branch
Computer Science and Engineering
Semester
Third/Fifth Semester
Regulation
2013

B.E / B.Tech. DEGREE END SEMESTER EXAMINATIONS, NOVEMBER / DECEMBER 2015
Computer Science and Engineering
Third/Fifth Semester
CS6302 – DATABASE MANAGEMENT SYSTEMS
(Common to B.Tech. Information Technology B.E. Mechanical and Automation Engineering B.E. Computer and Communication Engineering)
(Regulations 2013)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. State the anomalies of 1NF.
2. Is it possible for several attributes to have same domain? Illustrate your answer with suitable examples.
3. Differentiate Static and Dynamic SQL.
4. Why does SQL allow duplicate tuples in a table or in a query result?
5. What is meant by concurrency control?
6. Give an example of Two phase commit protocol.
7. Differentiate Static and Dynamic Hashing.
8. Give an example of a join that is not simple equi-join for which partitioned parallelism can be used.
9. List the types of privileges used in database access control.
10. Can we have more than one constructor in a class? If yes, explain the need for such situation.

Part-B (5* 16 = 80 Marks)

11. (a) (i) With help of a neat block diagram explain the basic architecture of a database management system. [8]
(ii) What are the advantages of having a centralized control of data? Illustrate your answer with suitable example. [8]
Or
(b) A car-rental company maintains a vehicle database for all vehicles in its current fleet. For all vehicles, it includes the vehicle identification number, license number, manufacturer, model, date of purchase, and color. Special data are included for certain types of vehicles:
Trucks: cargo capacity
Sports cars: horsepower, renter age requirement
Vans: number of passengers
Off-road vehicles: ground clearance, drivetrain (four- or two-wheel drive)
Construct an ER model for the car rental company database. [16]

12. (a) Describe the six clauses in the syntax of an SQL query, and show what type of constructs can be specified in each of six clauses. Which of the six clauses are required and which are optional?
Or
(b) Assume the following table.
Degree (degcode, name, subject)
Candidate (seatno, degcode, name, semester, month, year, result)
Marks (seatno, degcode, semester, month, year, papcode, marks)
[degcode – degree code, name – name of the degree (Eg. MSc.), subject – subject of the course (Eg. Physis), papcode – paper code (Eg. A1)]
Solve the following queries using SQL;
Write a SELECT statement to display,
(i) all the degree codes which are there in the candidate table but not present in degree table in the order of degcode. [4]
(ii) the name of all the candidates who have got less than 40 marks in exactly 2 subjects. [4]
(iii) the name, subject and number of candidates for all degrees in which there are less than 5 candidates. [4]
(iv) the names of all the candidate who have got highest total marks in MSc. Maths. [4]

13. (a) (i) What is Concurrency control? How is implemented in DBMS? Illustrate with suitable example.  [8]
(ii) Discuss view serializability and conflict serializability. [8]
Or
(b) What is deadlock? How does it occur? How transactions can be written to
(i) Avoid deadlock.
(ii) Guarantee correct execution.
Illustrate with suitable example.

14. (a) (i) What is RAID? List the different levels in RAID technology and explain its features.
(ii) Illustrate indexing and hashing techniques with suitable examples.
Or
(b) Write short notes on
(i) Spatial and multimedia databases.
(ii) Mobile and web databases.

15. (a) (i) Describe the GRANT functions and explain how it relate to security. What types of privileges may be granted? How rights could be revoked?
(ii) Write short notes on Data Warehousing.
Or
(b) Suppose an object oriented database had an object A, which references object B, which in turn references C. Assume all objects are in disk initially. Suppose a program first dereferences A, then dereferences B by following the reference from A, and then finally dereferences C. Show the objects that are represented in memory after each dereference, along with their state.

************************











IT2352 CRYPTOGRAPHY AND NETWORK SECURITY April May 2015

Anna University Questions - IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY, April may 2015, Computer Science and Engineering, Seventh Semester, Regulation 2008/2010



Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
Academic Year
April May 2015
Subject Code
IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46
Subject Name
Cryptography and Network Security
Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2008/2010

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2015
Computer Science and Engineering
Seventh Semester
IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY
(Common to Information Technology)
(Regulations 2008/2010)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. Differentiate between active attacks and passive attacks.
2. Find 117 mod 3.
3. Differentiate between stream ciphers and block ciphers.
4. State few applications of RC4 algorithm.
5. What is primitive root?
6. What is digital signature?
7. When are the certificates revoked in X.509?
8. What is tunnel mode in IP security?
9. Define worm.
10. What is the advantage of intrusion detection system over firewall?

Part-B (5* 16 = 80 Marks)

11. (a) Explain the substitution encryption techniques in detail. (16)
Or
(b) State and derive
(i) Fermat’s theorem. (8)
(ii) Euler’s theorem. (8)

12. (a) Explain Data Encryption Standard (DES) in detail. (16)
Or
(b) Explain the RSA algorithm in detail. For the given values, trace the sequence of calculations in RSA. p=7, q=13, e=5, and m=10. (16)

13. (a) Explain ElGamal public key cryptosystems with an example. (16)
Or
(b) Explain secure hash in detail. (16)

14. (a) Explain Kerberos Version 4 in detail. (16)
Or
(b) Explain Secure Socket Layer (SSL) in detail. (16)

15. (a) Write brief notes on the following;
(i) Classification of viruses. (8)
(ii) Worm Counter measures. (8)
Or
(b) Explain the characteristics and types of firewalls. (16)

************************