## TOPICS (Click to Navigate)

`  I request GUEST WRITERS for this web site. Anyone interested please contact me at saravu2k2013@gmail.com Thanks  `
Showing posts with label Previous Year Questions. Show all posts
Showing posts with label Previous Year Questions. Show all posts

## Anna University Questions - CS9402 Cryptography and Security April May 2014, Computer Science and Engineering (CSE), Seventh Semester, Regulation 2008

Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
April May 2014
Subject Code

Subject Name

## Cryptography and Security

Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2008

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2014
Computer Science and Engineering
Seventh Semester
CS9402 CRYPTOGRAPHY AND SECURITY
(Regulation 2008)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. Suppose we work mod 27 instead of mod 26 for affine ciphers. How many keys are possible?
2. Determine (231). (Eulers Totient function)
3. Give the differences between RC4 and RC5.
4. Discuss the timing attack on RSA and how it can be overcome.
5. What is meant by birthday attack in hash functions?
6. How MAC is different from hash techniques?
7. What is the purpose of X.509 certificate?
8. What problem was Kerberos designed to address?
9. List the key features of a trusted operating system.
10. What are the factors to be considered while determining the sensitive data in data base security?

Part-B (5* 16 = 80 Marks)

11. (i) Suppose we build an LFSR machine that works mod 3 instead of mod 2. It uses a recurrence of length 2 of the form                                                 (8)
XN+2 =C0Xn+ C1Xn+1 (mod 3)
To generate the sequence 1,1,0,2,2,0,1,1. Set up and solve the matrix equation to find the coefficients C0 and C1.
(ii) A group of people are arranging themselves for a parade. If they line up three to a row, one person is left over. If they line up four to a row, two people are left over and if they line up five to a row three people are left over. What is the smallest possible number of people? What is the next smallest number? (interpret this problem in terms of the CRT)                               (8)

12. a) (i) Show how 12 is transformed to C9 by subbyte routine using GF(28) field with the irreducible polynomial (x8+x4+x3+x+1) in AES algorithm. (8)
(ii) Discuss the key expansion in AES - 128. (8)
OR
b) (i) Discuss any one primality testing algorithm that is used to test whether a given number is a prime or a composite number. (8)
(ii) Perform encryption and decryption using the RSA algorithm p = 7,q = 11,e = 17,M = 8                      (8)

13. a) (i) Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root a = 2.
• Show that 2 is a primitive root of 11.                                                     (2)
• If user A has public key YA = 9, what is A's private key XA?            (3)
• If user B has public key YB = 3, what is the shared secret key K?    (3)
(ii) Discuss in detail about the secure hash algorithm. (8)
OR
b) (i) Discuss in detail about the digital signature standard algorithm. (8)
(ii) Discuss how the key exchange is done using elliptic curve cryptography. (8)

14. a) Discuss briefly about the PGP used for E-mail security. (16)
OR
b) Discuss briefly about IP security architecture. (16)

15. a) Discuss briefly about the security models involved in trusted operating systems. (16)
OR
b) Discuss in detail about the multilevel secure database. (16)

************************

## Anna University Questions - CS9049 - Programming in Dot Net - April May 2014, Computer Science and Engineering (CSE), Seventh Semester, Regulation 2008

Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
April May 2014
Subject Code

Subject Name

## Programming in .NET

Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2008

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2014
Computer Science and Engineering
Seventh Semester
CS9049 PROGRAMMING IN .NET
(Regulation 2008)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. What is the need of WPF when we had windows forms?
2. How do you bind data in WPF?
3. Write the syntax for simple SOAP message.
4. List the features of .Net remoting?
5. What is a message queue?
6. State the advantages of COM+?
7. How can you implement a condition in a workflow?
8. What are the different types of workflow in WF??
9. Define code based security?
10. What are the differences between declarative and imperative security.

Part-B (5* 16 = 80 Marks)

11. i. Explain in detail about the data binding and event handling in WPF (8)
ii. Explain the three types of controls in ASP .NET Server controls (8)

12. A) i. With suitable example explain the Web Service Description Language (WSDL). (8)
ii. Elaborate the .Net Remoting architecture functionalities with neat diagram (8)
(OR)
12. B) i. Develop a web service in ASP.NET environment with necessary code and deployment procedure. (16)

13. A) i. Explain the steps involved in creating an COM+ applications in .NET Remoting (10)
ii. What is an Enterprise Service? Explain with an example (6)
(OR)
13. B) i. Explain the various types of message queuing in COM+ application (8)
ii. Describe the role of Automatic transactions in COM+ applications (8)

14. A) i. Briefly discuss why workflows are based on Extensible Models (8)
ii. Explain the Custom Activities with an example. (8)
(OR)
14. B) Explain the following with an example
i. Directory Services             ii. Hosting workflows         (16)

15. A) i. Describe the debugging windows available in .NET. (8)
ii. Briefly discuss the how security issues can be solved for mobile devices? (8)
(OR)
15. B) i. Describes core components and capabilities of the .NET Compact Framework. (8)
ii. Explain the procedure of packaging and deployment of compact framework. (8)

************************

## Anna University Questions - CS9042 Software Project Management April May 2014, Computer Science and Engineering (CSE), Seventh Semester, regulation 2009

Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
April May 2014
Subject Code

Subject Name

## Software Project Management

Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2009

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2014
Computer Science and Engineering
Seventh Semester
CS9042 SOFTWARE PROJECT MANAGEMENT
(Regulation 2009)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. Mention some of the major activities covered by Software project management.
2. Highlight the levels of Decision making and Information system.
3. What is cash flow forecasting?
4. Define Risk identification and ranking.
5. Is data oriented or control oriented system to be implemented?
6. Mention some of the objectives of activity planning.
7. How are proposals evaluated?
8. Elucidate the stages of contract placement.
9. How would you select a right person for a job?
10. Define the expectancy theory of motivation.

Part-B (5* 16 = 80 Marks)

11.  i . Explain in detail the project control life cycle. (8)
ii. Explain portfolio management of software projects. Discuss with examples. (8)

12. (a) A software application is to be designed and built to assist in software cost estimation. It responds to certain input parameters and produces initial cost estimates to be used at bidding time.
i. It has been suggested that a software prototype would be of value in these circumstances. Explain why this might be. (8)
ii. Discuss how such prototyping could be controlled to ensure that it is conducted in an orderly and efficient way and within a specified time span. (8)
(Or)
(b) Where are estimates done and explain the problems with over and under estimates.

13. (a) For the table given below identify the critical path and hence calculate activity float and free float using forward and backward pass. (16)
 Activity Duration Precedents A 13 - B 9 - C 4 A D 6 B E 3 B F 6 - G 7 E,F H 2 C,D
(Or)
(b) Write Short notes on
i. Risk Engineering. (8)
ii. Software Project risks and strategies for risk reduction. (8)

14. (a) Explain the different stages of creating a framework.
(Or)
(b) i. Explain the procedure of Change Control. (8)
ii. Write a short note on Fixed price contracts. (8)

15. (a) i. Explain in detail any two motivation models.             (8)
ii. Write short notes on Decision Making.                       (8)
(Or)
(b) i. Explain in brief the various leadership styles and organizational structures. (10)
ii. Explain in detail how healthy and safety play an important role in IT development. (6)

************************

### Simple introduction to Naive Bayes classifier

Simple introduction to Naive Bayes classifier What is Naive Bayes Classifier? A Naive Bayes classifier is a probabilistic classifier ...