Showing posts with label Previous Year Questions. Show all posts
Showing posts with label Previous Year Questions. Show all posts

Thursday, 10 March 2016

Anna Universtiy BE CSE Seventh Semester Regulation 2004 and 2008 Questions

Anna Universtiy BE CSE Seventh Semester Regulation 2004 and 2008 Questions, Anna University Previous Years Exam Questions, Computer Science and Engineering Question papers



Anna University 
BE/B.Tech CSE Seventh Semester 
Regulation 2004 and 2008

 Click on the links below;



CS472 - Security in Computing - April May 2014

Anna University Questions - CS472 Security in Computing - April May 2014, Computer Science and Engineering (CSE), Seventh semester, regulation 2004





Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
Academic Year
April May 2014
Subject Code

CS472

Subject Name

Security in Computing

Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2004

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2014
Computer Science and Engineering
Seventh Semester
CS472 SECURITY IN COMPUTING
(Regulations 2004)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. State the advantages of Hill Cipher?
2. What is nonce and time stamp? List their roles in authentication.
3. What are non-malicious program errors?
4. Differentiate threats and virus.
5. What is assurance in trusted OS?
6. Differentiate between trusted and un-trusted operating system?
7. State the purpose of distributed intrusion detection system?
8. List the various threats in network security.
9. What are the benefits of Risk analysis?
10. What do you mean by software failure? Give an example

Part-B (5* 16 = 80 Marks)

11. A) i. With neat diagram, explain the Simple Data Encryption Standard and its features (8)
ii. Discuss about the symmetric and asymmetric encryption with an example (8)

12. A) i. Define access control list and capability and explain their relative strength and weaknesses. (8)
ii. Describe SSL protocol stack with suitable diagram (8)
(OR)
B) i. Explain the ways of preventing non-malicious program errors (8)
ii. Briefly explain how would you incorporate control against program threats? (8)

13. A) i. Describe authentication header mode of IP security with suitable sketch. (8)
ii. Distinguish among vulnerabilities, threats and control? (8)
(OR)
B) With neat diagram explain any two security models in trusted operating system (16)

14. A) i. Explain any two types firewall and its design issues (8)
ii. With suitable example, specify how you would secure e-mail (8)
(OR)
B) Elaborate your views in multilevel database and multilevel security is achieved (16)

15. A) Explain the purpose of an organization's security policy and what steps should be considered for its development. (16)
(OR)
B) Explain the following with an example
i. Computer Crime and its ethical issues (8)
ii. Risk Analysis in incorporating security (8)

************************













EC9073 - Bioinformatics - April May 2014

Anna University Questions - EC9073 Bioinformatics April May 2014, Computer Science and Engineering (CSE), Seventh semester, Regulation 2008




Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
Academic Year
April May 2014
Subject Code

EC9073

Subject Name

Bioinformatics

Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2008

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2014
Computer Science and Engineering
Seventh Semester
EC9073 BIOINFORMATICS
(Regulation 2008)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. What are the structural domain resources?
2. What is the need of bio informatics technologies?
3. Give short note on data quality.
4. How machine learning is used in bioinformatics?
5. List out the major steps used in PHMM generation.
6. How Bayesian networks used in modeling for bioinformatics?
7. What are the important problems in DNA and protein sequence analysis?
8. Give the unique function of promoters.
9. What are the methods used to extract the significant modes of variation from the large array of time series expression data?
10. What is gene expression profiling?

Part-B (5* 16 = 80 Marks)

11. (i) How can the secondary resources and associated algorithms be grouped? Discuss in detail. (12)
(ii) Explain in detail about the drug discovery (4)

12. a (i) With neat sketch, explain data ware housing architecture in detail (8)
(ii) Explain in detail about DNA data analysis (8)
(OR)
b (i) Explain in detail about Protein data analysis (8)
(ii) With necessary diagrams detail different learning algorithms used in neural networks. (8)

13. a. Explain briefly about Hidden Markov model for biological data analysis (16)
(OR)
b. Detail comparative and molecular modeling for biological data analysis (16)

14. a.(i) Explain two dimensional portrait representation of DNA sequences (8)
(ii) Discuss Chaos Game Representation of biological sequences (8)
(OR)
b.(i) Explain different DNA walk models in detail (8)
(ii) Discuss different approaches of motif detection with a sample pattern (8)

15. a Explain briefly about Image analysis for data extraction (16)
(OR)
b Elaborate data analysis for pattern discovery. (16)

************************







SQL exercises for beginners one

SQL Exercises for Beginners / Simple SQL Exercises with Answers / Solved SQL exercises / SQL solved exercises with simple conditions / So...