Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

7th sem mid

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

IEM) INSTITUTE OFSALT

ENGINEERING & MANAGEMENT


LAKE, KOLKATA
AHasted to MAKAUT d pevd by GTE

Degree: BTech, Stream: IT


Term - II, Seventh Semester Examination, November-2024
Subject Code: PECCS701F
Subject Name: Cyber Security and Blockchain
Full Marks:30 Duration:1 Hour

Part - A
Attempt 5 questions
Each qu estion carries 2 Marks (2 X 5)
2
1. What do you mean by crypto currency?

or
What is CIA triad? 2

2. What is social engineering attack? 2

Or
2. What do you mean by Distributed Ledger? 2

Why is Cyber Security important? 2

Or
3 Explain what is golden nonce? 2

.
What do you understand by identity theft? 2

Or
4. Explain the consensus protocols. 2

5 Discuss basic security precautions to be taken to safeguard laptops and 2


wireless devices.
5
Discuss basic security precautions to be taken to safeguard laptops and 2
wireless devices.

Or
5. 2
Describe when will the miner be considered as valid miners?

Part - B
Attempt 2 questions
Each qu estion carries 5 Marks (5 X 2)
6.
Compare active attack versus passive attack.

Or
6. Analyze the role of Blockchain Quality Engineer?

7. What is SQL injection attack? Are there any countermeasures that can
be used to prevent the attack?

Or
1 Proof-of-stake (POS) was created as an alternative to proof-of-work 5
(POW). Justify the statement.

Part -C
Attempt1 question
Each question carries 10 Marks (10 X1)
8 In your view, do 2008 amendments to the Indian IT Act address the 10
cybercrime issues that may emanate from cybercafé?

Or
8 Discuss a case study where a blockchain project has addressed 10
environmental or sustainability challenges, such as carbon credits or
supply chain sustainability.
INSTITUTE OF ENGINEERING & MANAGEMENT
IEM SALT LAKE, KOLKATA
Atiiated to MAKAUT nd approved by ACTE

Degree:B.Tech, Stream: IT
Term - II, Seventh Semester Examination, Novemb
Subject Code PECCS702E
Subject Name: Big Data Analytics
Full Marks:30 Duration:1 HoL

Part - A
Attempt 5 questions
Each question carries 2 Marks (2 X 5)
(1. What is Big Data? 2

or
What are the 5 V's of big data? 2

2. Demonstrate any two importance of Big Data Analytics in 2


business.

Or
2. Demonstrate two common tools used in Big Data Analytics 2

3. Differentiate between regular File Systems and HDFS.

Or
3 What would happen if you store too many small files in a cluster 2
on HDFS?

4 Formulate the regression equation to predict student finalcourse 2


grade calculation using two variables: Hours of Study (X) and
Previous GPA (Y).

or
classification 2
process offace
diagramofthe
4 Construct a flow
model.

Let a =2, b =4,c =8, and d =


10 membership function for
values to obtain the
Apply the followingTrapezoidal Membership Function
the point x-Susing
Or
2
Let a=2, b=2, c = 10 for
5.
obtain the membership function
Apply the following values to Membership Function
the point x=8 using Generalized Bell

Part - B
Attempt 2 questions
Each question carries 5 Marks (5 X 2)
6
Distinguish linear and nonlinear system analysis using example. 5
Given a system represented by the transfer function
H(s) =
s+3S-2 ,determine the poles of the system.

Or
6. You are a given dataset with three features X1,
decide to apply principal component analysis X2, and X3. You 5
dimensionality of data. (PCA) to reduce the
a) Discuss in simple
b) If PCA results in term what PCA aims to achieve.
five
features will be presentprincipal components,
in the new how many
dataset after
PCA? applying

7. Let the
by:
membership function of two fuzzy set A
andB are
LA) = {(Xi, 0.2), (X2, 0.3), (xX,, 0.5), given 5
Ano) = {(y1, 0.8), (y:, 0.6), (y, 0.3)} (x4, 0.6)}
Findthe membership function for A x B

or
7. Find the membership
function of the fuzzy set for an
point x-8,0 using sigmoid
b-6.0 membership lunction wherearbitrary
g=2 and

Galaxy S21FE "Tuhu


Part - C
Attempt 1question
Each question carries 10 Marks (10 X 1)
8. Aneural network model for handwritten digit
a dataset of 28x28 grayscale images of classification from 10
handwritten data.
Create a feed forward neural network
architecture suitable
for this image classification task. Describe the number of
layers, nodes in each layer and activation function for the
data analysis.
Explain how youwould evaluate the
trained neural network on the testing performance of
set. Mention the
relevant metrics you would use.

Or
8.
Present a practical case study or example where data
used. clustering is 10
Describe the dataset, the problem, and the clustering
approach used.
Discuss the results and insights gained from the
analysis. clustering

Galaxy s21 FE "Tuhu


INSTITUTEOFENGINEERING &MANAGEMENT
Ufech
IEM SALT LAKE, KOLKATA
Affiliated to MAKAUT and approved by AlCTE

Degree: B.Tech, Stream: IT/CSE (I0TCSBT)


Term Seventh Semester Examination, November - 2024
Subject Code: OECCS701A
Subject Name: Soft Skills & Interpersonal Communication
Full Marks: 30 Duration: 1Hour

Part - A
Attempt 5 questions
Each question carries 2 marks (2 x 5)
1. What are introspective skills?
Or
2
What are behaviouristic skills?

2
2. Suggest some ways to identify one's own soft skills.

2
What are the three different types of goals?

3. What is cognitive equilibrium?


or

2
What is cognitive disequilibrium?

4. What is lateral communication? 2

or
What are interpersonal skills? 2

5. How values can guide your attitude? 2


Or
How can sudden changes in life result in new beliefs or cancellation of old beliefs? 2

Part - B
Attempt 2 questions
Each question carries 5 marks (5 >x 2)
6. Prepare a plan of action to resolve a situation in
clash. which positive and negatiVe athudes 5

or

Page 1of2

Galaxy s21 FE TUhu


skills are complementary to each other. Give 5
soft and hard
Explain with examples how
examples.
5
and develop teams in an organization?
7. How would you introduce, maintain
Or
to realize its full
would you extend teamwork in an organization in order
How
potential?

Part - C
Attempt 1 question
(10 × 1)
Each question carries 10 marks 10
verbal language.
8. Compare and contrast body language with
Or
10
Critically analyze the barriers to effective communication.

--End-

Galaxy s21 FE Tuhu


VIEM INSTITUTE OF ENGINEERING &MANAGEMENT
SALT LAKE, KOLKATA Utech

Affiliated to MAKAUT and approved by AICTE


Degree: BTech, Stream: ITICSE(l0T)/ CSE(loTCSBT)
Term II, Seventh Semester Examination,
November- 2024
Subject Code: PCCCS701
Subject Name: Network Security & Cryptography
Full Marks: 30
Duration: 1 Hour
Part - A
Attempt 5 questions
Each question carries 2 marks (2 x 5)
1. State the problem that may appear regarding DES-2 algorithm. 2
Or
Define replay attacks and provide an example of such an attack in security. 2

2 How can Caesar cipher be cracked?


0r
Define Digital Certificate. 2

3. Explain the concept of a Caesar Cipher and how it works. 2

Or
Describe the result of encoding the plain text "Hello there, my name is Atul" 2
using Caesar Cipher.
2
4. Illustrate the Single Sign On (SSO) process.
Or
2
How SHTTP is different from SSL?
2
to upholding confidentiality within an
5. How can employees and users contribute
organisation?
Or 2
and the overall
you establish the relationship between message integrity
Can
security of information systems?
Part - B
Attempt 2 questions
marks (5 x 2)
Each question carries 5Transposition Technique and two 5
"MEET ME" using any two
6. Convert
Substitution Technique.
or 5
RSA, choosing two prime numbers p=7 ad
using
Encrypt the message "BE"
q-11. s
which a Demilitarized Zone (DMZ) is
A ssess the
circumstances under
critically evaluate the implementation
7. security, and organization's network
necessary for network for setting up a DMZ in an
methods and best practices
infrastructure.

Page 1 of 2

s21FE "Tuhu
or
Analyze and evaluate the differences between a Screened host firewall with a 5
dual homed bastion and a Screened host firewallwith a single-homed bastion,
considering their respective advantages and disadvantages in network security
architecture
Part - C
Attempt 1 question
Each question carries 10 marks (10 x 1)
8. The following 64-bit value is chosen as key k: (in HEX) 1
0123 4 5 67 8.9 A BCDEF 0
Find the value of the key K in the first round of DES.
Or
1
Decrypt the cipher text "PQTYJ" using Hill cipher with the inverse key

--End-

Galaxy S21FE Tuhu

You might also like