7th sem mid
7th sem mid
7th sem mid
Part - A
Attempt 5 questions
Each qu estion carries 2 Marks (2 X 5)
2
1. What do you mean by crypto currency?
or
What is CIA triad? 2
Or
2. What do you mean by Distributed Ledger? 2
Or
3 Explain what is golden nonce? 2
.
What do you understand by identity theft? 2
Or
4. Explain the consensus protocols. 2
Or
5. 2
Describe when will the miner be considered as valid miners?
Part - B
Attempt 2 questions
Each qu estion carries 5 Marks (5 X 2)
6.
Compare active attack versus passive attack.
Or
6. Analyze the role of Blockchain Quality Engineer?
7. What is SQL injection attack? Are there any countermeasures that can
be used to prevent the attack?
Or
1 Proof-of-stake (POS) was created as an alternative to proof-of-work 5
(POW). Justify the statement.
Part -C
Attempt1 question
Each question carries 10 Marks (10 X1)
8 In your view, do 2008 amendments to the Indian IT Act address the 10
cybercrime issues that may emanate from cybercafé?
Or
8 Discuss a case study where a blockchain project has addressed 10
environmental or sustainability challenges, such as carbon credits or
supply chain sustainability.
INSTITUTE OF ENGINEERING & MANAGEMENT
IEM SALT LAKE, KOLKATA
Atiiated to MAKAUT nd approved by ACTE
Degree:B.Tech, Stream: IT
Term - II, Seventh Semester Examination, Novemb
Subject Code PECCS702E
Subject Name: Big Data Analytics
Full Marks:30 Duration:1 HoL
Part - A
Attempt 5 questions
Each question carries 2 Marks (2 X 5)
(1. What is Big Data? 2
or
What are the 5 V's of big data? 2
Or
2. Demonstrate two common tools used in Big Data Analytics 2
Or
3 What would happen if you store too many small files in a cluster 2
on HDFS?
or
classification 2
process offace
diagramofthe
4 Construct a flow
model.
Part - B
Attempt 2 questions
Each question carries 5 Marks (5 X 2)
6
Distinguish linear and nonlinear system analysis using example. 5
Given a system represented by the transfer function
H(s) =
s+3S-2 ,determine the poles of the system.
Or
6. You are a given dataset with three features X1,
decide to apply principal component analysis X2, and X3. You 5
dimensionality of data. (PCA) to reduce the
a) Discuss in simple
b) If PCA results in term what PCA aims to achieve.
five
features will be presentprincipal components,
in the new how many
dataset after
PCA? applying
7. Let the
by:
membership function of two fuzzy set A
andB are
LA) = {(Xi, 0.2), (X2, 0.3), (xX,, 0.5), given 5
Ano) = {(y1, 0.8), (y:, 0.6), (y, 0.3)} (x4, 0.6)}
Findthe membership function for A x B
or
7. Find the membership
function of the fuzzy set for an
point x-8,0 using sigmoid
b-6.0 membership lunction wherearbitrary
g=2 and
Or
8.
Present a practical case study or example where data
used. clustering is 10
Describe the dataset, the problem, and the clustering
approach used.
Discuss the results and insights gained from the
analysis. clustering
Part - A
Attempt 5 questions
Each question carries 2 marks (2 x 5)
1. What are introspective skills?
Or
2
What are behaviouristic skills?
2
2. Suggest some ways to identify one's own soft skills.
2
What are the three different types of goals?
2
What is cognitive disequilibrium?
or
What are interpersonal skills? 2
Part - B
Attempt 2 questions
Each question carries 5 marks (5 >x 2)
6. Prepare a plan of action to resolve a situation in
clash. which positive and negatiVe athudes 5
or
Page 1of2
Part - C
Attempt 1 question
(10 × 1)
Each question carries 10 marks 10
verbal language.
8. Compare and contrast body language with
Or
10
Critically analyze the barriers to effective communication.
--End-
Or
Describe the result of encoding the plain text "Hello there, my name is Atul" 2
using Caesar Cipher.
2
4. Illustrate the Single Sign On (SSO) process.
Or
2
How SHTTP is different from SSL?
2
to upholding confidentiality within an
5. How can employees and users contribute
organisation?
Or 2
and the overall
you establish the relationship between message integrity
Can
security of information systems?
Part - B
Attempt 2 questions
marks (5 x 2)
Each question carries 5Transposition Technique and two 5
"MEET ME" using any two
6. Convert
Substitution Technique.
or 5
RSA, choosing two prime numbers p=7 ad
using
Encrypt the message "BE"
q-11. s
which a Demilitarized Zone (DMZ) is
A ssess the
circumstances under
critically evaluate the implementation
7. security, and organization's network
necessary for network for setting up a DMZ in an
methods and best practices
infrastructure.
Page 1 of 2
s21FE "Tuhu
or
Analyze and evaluate the differences between a Screened host firewall with a 5
dual homed bastion and a Screened host firewallwith a single-homed bastion,
considering their respective advantages and disadvantages in network security
architecture
Part - C
Attempt 1 question
Each question carries 10 marks (10 x 1)
8. The following 64-bit value is chosen as key k: (in HEX) 1
0123 4 5 67 8.9 A BCDEF 0
Find the value of the key K in the first round of DES.
Or
1
Decrypt the cipher text "PQTYJ" using Hill cipher with the inverse key
--End-