Digital Science November December 2022
Digital Science November December 2022
5. a. Au printemps____________ CO3 / R 1
a) il fait beau b) il pleut c) il fait du vent
b. Je __________(faire) le devoir CO3 / R 1
c. Ecrivez en anglaise CO3 / R 2
La couleur , rouge, une maison
d. Écrivez de deux mois de l ‘ année CO3 / R 2
e. Reliez les colones CO3 / U 14
1.Lundi - Saturday
2.Dimanche - august
3. Vendredi - Monday
4. Une femme - Sunday
5. Un manteau - Friday
6. Août - A Lady
7. Mai - pepper
8. Du poivre - May
9. L’avion - Ticket
10. Billet - Aeroplane
Mets les phrases a la forme négative
1.Je bavarde beaucoup
2. Nous écoutons la radio
3. Marie habite a Paris
4. Ils montent la tour Eiffel
(OR)
6. a. Ou habites -tu ? CO3 / R 1
b. A Quelle heure vas -tu au collège ? CO3 / R 1
c. Nommez deux vêtements CO3 / R 2
d. Deux monument en français CO1/ R 2
e. Cochez la bonne réponse: CO3 / U 14
1.J’habite _______ (à / au) Paris.
2. Il_____ (est / a) 45 ans.
3.Ils _____ (ont / sont) intelligents.
4.Feminin d’ Indien _______ (indienne / italien )
5.Masculin de chinoise _______ ( china / chinois)
6.Feminin de Suisse ________ (Suisse / russe)
7.J’_______ ( ai / suis ) deux enfants.
8.Vous _______ (êtes / avez ) Japonais?
9.Tu parles _______ ( anglais / inde )
10.L’aeroport ______ (est / as) en face de banque.
Conjuguez les verbes
11.Il _______(aimer) visiter le temple.
12.Nous ______(détester) la mer.
13.Vous _______(avoir) des livres.
14.Je ______(habiter) au Portugal.
COURSE OUTCOMES
CO1 Use familiar everyday expressions and very basic phrases aimed at the satisfaction of needs of a concrete
type
CO2 Understand the French culture and its nuances
CO3 Interact in a simple way provided the other person talks slowly and clearly and is prepared to help.
CO4 Learn the basic expressions of French and handle them confidently.
CO5 Learn the various strategies to overcome the basic difficulties in LSRW
CO6 Become familiar with the strategies of handling language contexts.
7. a. Tu t’appellescomment ? CO 4 / R 1
b. As – tu des frères ? CO 4 / R 1
c. Ton père , il s’ appelle comment ? CO 4 / R 2
d. Le frère de ta mère est ton o......... e CO 4 / R 2
e. Écrivez le négative : ( utilisez ne .......... pas ) CO 4 / U 14
1.Nous prenons les livres.
2.Elle entre dans la cathédrale.
3.Ils rentrent à Rome.
4.Je viens du stade.
5.Montent-elles sur la moto?
6.Louise tombe sur le trottoir.
7.Gilles et Jérôme rentrent .
8.Pourquoi vous téléphonez ?
9.Êtes-vous à la maison?
10.Prends-tu le métro?
11. Vous montez les valises
12. Je parle français.
13. Vous allez au cinéma
14. Il travaille à l ‘ école
(OR)
8. a. Les parents de son père sont tes g............ CO 4 / R 1
b. Aimez – vous le cinéma ? CO 4 / R 1
c. Écrivez le nombre 10 to 20 CO 4 / R 2
d. Quel est ton numéro de téléphone ? CO 4 / R 2
e. Eh bien; Télé aime la télévision, mais Blanco préfère la radio ... CO 4 / U 14
voilà, c'est très bien... mais non! Ce n'est pas très bien parce qu'il y
a aussi Jules et quelquefois, il y a Néron. Jules est le perroquet de
ma Soeur, Claire. Il est petit et très mignon, mais il n' aime pas la
télévision, il n’ aime pas la radio et il déteste la musique. Et
Neron, qui est-il? Eh bien ... Nerori est un gros chien noir et blanc.
C'est le chien demongrand-pere et il est tresmechant. Il deteste
les chats, il deteste les perroquets, il deteste la radio, il deteste la
musique et il n' aime pas beaucoup le chien de Marc. Alors, qu'est-
ce qu'il aime, Neron? Il aime deux choses: mon grand-pere et le
football ... a la television, naturellement! Il adore ça!
PART – B(1 X 20= 20 MARKS)
Compulsory:
9. a. Trouvez le mot : L -- -- n CO 1 / R 1
b. Dites vrai ou faux : M. Lavigne a téléphoné à son frère. CO 1 / R 1
c. Trouvez les verbes : 1. Parti , 2. Sorti , 3. Fini CO 1 / R 3
d. Trouvez le contraire : CO 5 / R 5
1. loin de ............................... (près de/à côté de)
2. pas encore ............................... (encore/déjà)
3. là bas ............................... (voilà/ici)
4. demain ............................... (prochain/hier)
5. sans ............................... (avec/sur)
e. Retrouvez les phrases : CO 6 / U 10
1. Vacances/elles/bonnes/ont/passé/de.
2. Je/nouvelles/de/ai/pas/eu/n’.
3. Longtemps/restés/sont/à/Paris/ils.
4. Lu / journal / d’ / -t’ / a / le / hier / il ?
5. Elle/oublié/a/à/la/n’/d’/banque/pas/aller.
COURSE OUTCOMES
CO1 Use familiar everyday expressions and very basic phrases aimed at the satisfaction of needs of a
concrete type
CO2 Understand the French culture and its nuances
CO3 Interact in a simple way provided the other person talks slowly and clearly and is prepared to help.
CO4 Learn the basic expressions of French and handle them confidently.
CO5 Learn the various strategies to overcome the basic difficulties in LSRW
CO6 Become familiar with the strategies of handling language contexts.
CO1 10 14 - - - - 24
CO2 6 14 - - 20
CO3 6 14 - - - - 20
CO4 6 14 - - 20
CO5 2 - - - - - 2
CO6 - 14 - - - - 14
100
Course Code 16CA2017 / 17CA2017 Duration 3hrs
Course Name OBJECT ORIENTED ANALYSIS AND DESIGN Max. Marks 100
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Summarize the salient features of object oriented systems CO1 U 10
development.
b Refer to the code snippet below and answer the following CO1 An 10
. questions:
#include <iostream>
using namespace std;
Class Room {
public:
double length;
double breadth;
double height;
Room()
{
length = breadth = height = 0;
}
Double calculateArea() {
return length * breadth;
}
double calculateVolume() {
return length * breadth * height;
}
};
int main() {
return 0;
}
i. Identify the names of the objects in the above code.
ii. Identify the name of the class in the above code.
iii. Identify the constructor in the above code.
iv. Identify the errors (three errors) in the above code.
v. What would be the output of room2.calculateArea();
(OR)
2. a. Design a class dogwith 5 attributes and three instance methods. CO1 A 10
Create an object of the dogclass and call the instance methods.
b Design interfaces for the following class hierarchy: CO1 E 10
.
Define at least two interfaces for each class and sketch the same
using a neat diagram.
5. Sketch the use case diagram with at least five use cases for CO3 A 20
student result management system and explain the functionality
of each case.
(OR)
6. Illustrate common class patterns approach with appropriate CO3 A 20
examples.
COURSE OUTCOMES
CO1 Show the importance of system analysis and design in software development.
CO2 Understand Object Oriented Software Development Process.
CO3 Gain exposure to Object Oriented Methodologies & UML Diagrams.
CO4 Apply Object Oriented Analysis Processes for software projects.
CO5 Construct various UML models.
Q. Course
Bloom’s
No Questions Outcom Marks
Level
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Summarize the history of object-oriented programming. CO1 U 10
b Explain the data types used in C# programming. CO1 U 10
.
(OR)
2. a. Construct a program to assign a value and print the same. CO1 A 8
b Summarize the features of .NET framework. CO2 U 12
.
COURSE OUTCOMES
CO1 Understand the basic programming concepts of .NET framework.
CO2 Understand object-oriented programming concepts of C#.
CO3 Develop standalone applications in C#.
CO4 Evaluate user requirements for software functionality required to decide whether the language
meet the requirement.
CO5 Propose the use of .Net Technologies by implementing them in the C# programming language for a
given problem.
CO6 choose an object-oriented approach for solving problems.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Discuss the different types of ethics. CO1 U 5
b
Define the 4 – way Test adopted in ethical framework. CO1 R 5
.
Identify your role as an IT professional involved in a group
c. CO2 R 10
supporting the education needs among the students.
(OR)
2. a. Identify the role of expert witness. CO2 R 10
b
Discuss the ethics in professional life. CO1 U 10
.
COURSE OUTCOMES
CO1 Understand the ethical framework in professional life.
CO2 Know the psychology and philosophy of ethics.
CO3 Recognize the ethics in scientific and engineering societies.
CO4 Diagnose the code of ethics and ethical standards.
CO5 Understand the integrity in research.
CO6 Realize the Enforcement of Code of Ethics.
Q. Course
Bloom’s
No Questions Outcome Marks
Level
.
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. m rpWfij kd;ddd; ---------------- CO3 U 1
.
M tPukhKdpth; vOjpa rpWfij ----------------- CO3 U 1
.
,. rpWfijapd; mbg;gil Nehf;fk; ahJ? CO3 R 2
<. Ma;jk; ngah;f;fhuzk; jUf. CO1 R 2
c. m rpWfijapd; ,yf;fzk; vOJf. CO3 R 5
.
M rpWfij Mrphpah;fs; gw;wp vOJf. 1. t.Nt.R.Iah; 2. fy;fp 3. CO3 R 9
. GJikg;gpj;jd;.
(OR)
2. m mir ------------ tifg;gLk;. CO1 U 1
.
M nky;ypd vOj;Jf;fs; MWk; -------------- gpwf;fpd;wd. CO1 R 1
.
,. vOj;Jf;fspd; ,lg;gpwg;G gw;wp vOJf. CO1 R 2
<. Njk;ghtzp E}y; tpsf;fk; jUf. CO4 R 2
c m Fws; ntz;ghit vLj;Jf;fhl;Lld; tpsf;Ff. CO1 R 5
.
M Ntypad; $Wk; ey;thh;j;ijfs; Fwpj;J fl;Liu vOJf. CO4 R 9
.
(OR)
3. m filr;rq;f fhyj;jpd; ,Wjpapy; Njhd;wpa fhg;gpak; ----------- CO1 R 1
.
M jkpo; ,yf;fpaq;fs; ----------------- ,yf;fpaq;fs; vd CO5 R 1
. miof;fg;gLfpwJ
,. ntz;gh vj;jid tifg;gLk;? mit ahit? CO1 R 2
<. rq;fk; kUtpa fhyk; Fwpg;G jUf. CO5 R 2
c m ntz;ghtpd; nghJ ,yf;fzk; tpsf;fk; jUf. CO1 R 5
.
M jpiz Ik;ghy; kw;Wk; mtw;wpd; tpsf;fk; jUf CO1 R 9
.
(OR)
4. m jk; fy;yiwapy; jk;ik xU jkpo; khztd; vd;W vOjr; nra;jth; CO2 U 1
. -------------------
M fpwpj;jt fk;gh; vd;W miof;fg;gl;lth; ------------------ CO2 U 1
.
,. rPfd; ghy;F Iah; Fwpg;G jUf. CO2 R 2
<. vl;Lj;njhif E}y;fs; ahit? CO5 R 2
c. m rq;ffhyr; rpwg;G gw;wp Fwpg;G jUf. CO5 R 5
.
M jkpo; ,yf;fpa tuyhw;wpd; Ml;rpf; fhyq;fs; gw;wp vOJf. 1. CO5 R 9
. gy;yth; fhyk; 2. Nrhoh; fhyk; 3. INuhg;gpah; fhyk;
(OR)
5. m jkpo; fpwpj;jth;fSf;F topghl;by; gad;gLkhW ghliy vOjpath; CO2 U 1
. -------------------
M vl;Lj;njhifapy; mfg;nghUSK; Gwg;nghUSk; Nrh;e;j E}y; CO5 U 1
. --------
,. jj;Jtg;Nghjfh; Fwpg;G jUf. CO2 R 2
<. FWe;njhif Fwpg;G jUf. CO5 R 2
c. m vr;.V.fpUl;bzg;gps;is Fwpg;G jUf. CO2 R 5
.
M jkpo;ehl;L fpwpj;jth;fs; gw;wp vOJf. 1. Ntjehafk; CO2 R 9
. rh];jphpahh; 2. Ntjehafk; gps;is.
(OR)
6. m $j;juhw;Wg;gil vd;Dk; E}ypd; kw;nwhU ngah;-------------- CO5 R 1
.
M neLe;njhif vd miof;fg;gLk; E}y; ---------------- CO5 R 1
.
,. neLey;thil Fwpg;G jUf. CO5 R 2
<. ,aw;wkpo; - Fwpg;G jUf. CO3 R 2
c. m mfehD}W Fwpg;G jUf. CO5 R 5
.
M vl;Lj;njhif E}y;fSs; Gwk; rhh;e;j E}y;fis vOJf. 1. CO5 R 9
. gjpw;Wg;gj;J 2. GwehD}W
(OR)
7. m Gul;rpf;ftpQh; vd;W miof;fg;gl;lth; ------------------ CO3 U 1
.
M ctikf;ftpQh; vd;W miof;fg;gl;lth; ----------------- CO3 U 1
.
,. gj;Jg;ghl;L E}y;fs; ahit? CO5 R 2
<. FwpQ;rpg;ghl;L Fwpg;G jUf. CO5 R 2
c. m ew;wpiz Fwpg;G jUf. CO5 R 5
.
M gj;Jg;ghl;L Mw;Wg;gil E}y;fs; gw;wp vOJf. 1. CO5 R 9
. jpUKUfhw;Wg;gil 2. nghUeuhw;Wg;gil
(OR)
8. m nrd;id muruit ftpQuhf tpsq;fpath; ---------------- CO3 U 1
.
M Njrpaf;ftp vd miof;fg;gl;lth; -------------------- CO3 U 1
.
,. ftpij xU ,yf;fpak; Fwpg;G jUf. CO3 R 2
<. ftpkzp Njrpf tpehafk; gps;is Fwpg;G jUf. CO3 R 2
c. m ehkf;fy; ftpQh; Fwpg;G jUf. CO3 R 5
.
M 20-Mk; E}w;whz;bd; ,izaw;w Gyth;fs; gw;wp vOJf. 1. CO3 R 9
. ghujpahh; 2. ghujpjhrd;
PART – B(1 X 20= 20 MARKS)
COMPULSORY QUESTION
9. m jkpo; tuyhw;Wg; Gjpdq;fspd; je;ij ----------------- CO3 U 1
.
M Kjy; tuyhw;Wg; Gjpdk; ------------- CO3 U 1
.
,. Nghyp vOj;Jf;fs; vd;why; vd;d? vj;jid tifg;gLk;? CO1 R 2
<. gFgj cWg;Gfs; ahit? CO1 R 2
c. m ty;ypdk; kpFk; ,lq;fis vLj;Jf;fhl;Lld; tpsf;Ff. CO1 R 5
.
M ehtypd; tiffis vOJf. CO3 R 9
.
COURSE OUTCOMES
CO1 khzth;fs; r%f khw;wr; rpe;jidfis mwpe;Jnfhs;th;.
CO2 khzth;fs; Gjpdj;ijf; fw;gjd; %yk; rKjhar; rpf;fy;fis czh;e;J mtw;wpw;Fj; jPh;Tfhz;gh;.
CO3 ehlfq;fis r%fg; gad;ghl;bw;F Vw;g cUthf;Fk; jpwd; ngWth;.
CO4 jkpo;f; fhg;gpaq;fspy; moFk; mwpTzh;Tk; Cl;Lk; gFjpfisg; gbj;Jg; Ghpe;J nfhs;th;.
CO5 gz;ila ,yf;fpa gjpTfspy; cs;s goe;jkpohpd; MSikfisAk; milahsq;fisAk; mwpe;J nfhs;th;.
CO6 Gjpdk; topj; jw;fhy rpf;fy;fisAk; mjw;fhd jPh;TfisAk; cUthf;Fk; jpwd; ngWth;.
COURSE OUTCOMES
CO1 nrk;nkhopahk; jkpo; nkhopapd; rpwg;ig mwpe;Jnfhs;th;.
CO2 Gj;jpyf;fpaq;fisg; gilf;Fk; jpwidAk; jpwdha;T nra;Ak; jpwidAk; ngWth;.
CO3 ehl;Lg;Gwg;ghly;fis jpwdha;T nra;Ak; jpwid ngWjy;.
CO4 jkpo;f; fhg;gpaq;fspy; moFk; mwpTzh;Tk; Cl;Lk; gFjpfisg; gbj;Jg; Ghpe;J
nfhs;th;.
CO5 gz;ila ,yf;fpag; gFjpfspy; cs;s goe;jkpohpd; MSikfisAk; milahsq;fisAk;
mwpe;J nfhs;th;.
CO6 Gjpdk; topj; jw;fhy rpf;fy;fisAk; mjw;fhd jPh;TfisAk; cUthf;Fk; jpwd;
ngWth;.
(OR)
(OR)
(OR)
(OR)
COMPULSORY QUESTION :
COURSE OUTCOMES
CO1 सामान्य हिंदी को समजने की क्षमता
CO2 सामान्य गीतों को उचित से समजने की क्षमता
CO3 हिंदी के हंबिंद हल करने की क्षमता
CO4 हिंदी पड़ने की ,अपनी राय प्रकट करने की क्षमता
CO5 व्याकरण सहित बात करने की क्षमता
CO6 औपचरिक ,अनौपचारिक पत्रों ,फ़ॉर्मों को बरने की क्षमता
Assessment Pattern as per Bloom’s Taxonomy
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 18 - - - - 20
CO2 2 18 - - - - 20
CO3 2 18 - - - - 20
CO4 2 18 - - - 20
CO5 10 - - - - - 10
CO6 10 - - - - 10
100
3. Develop the following query for the doctor table (Assume CO3 A 20
that,doctor table contains the following attributes:doc_no,
doc_name,pat_no,pat_name, pat_phno, pat_fees).
a. Create a view called docview (view must contain pat_no,
pat_name, pat_phno,pat_fees).
b. Insert a record into the docview.
c. Select all the record from the view
d. Update the fees as 50000, if the pat_no is 100.
e. Delete a record from the docview.
(OR)
4. Summarize the various queries of SQL. CO3 U 20
COURSE OUTCOMES
CO1 Differentiate database systems from file systems by enumerating the features provided by
database systems and describe each in both function and benefit.
CO2 Define the terminology, features, classifications, and characteristics embodied in database
systems.
CO3 Analyze an information storage problem and derive an information model expressed in the form
of an entity relation diagram and other optional analysis forms, such as a data dictionary.
CO4 Demonstrate with database design.
CO5 Describe on transaction management.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Discuss the taxonomy of security goals. CO1 U 7
b Classify the various security attacks. CO1 U 13
.
(OR)
2. Explain the mathematics for cryptography in detail. CO3 U 20
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. Articulate the following concept in detail. CO2 A 20
a. Message Authentication.
b. Random Oracle Model.
c. Pigeonhole Principle.
d. Birthday Problem.
COURSE OUTCOMES
CO1 Identify security threats and determine efforts to counter it.
CO2 Familiarity with information security awareness and a clear understanding of its importance.
CO3 Develop security algorithms in the network.
CO4 Compare various cryptographic techniques.
CO5 Design Secure applications.
CO6 Define the terms vulnerability, threat and attack.
Q. Course Bloom’s
Questions Marks
No. Outcome Level
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a. Illustrate on the different types of network topology. CO1 U 10
b. Enumerate on the types of network architecture. CO2 R 10
(OR)
2. a. Differentiate IPv4 and IPv6. CO1 An 5
b. Enumerate on link state and distance vector routing protocols. CO2 R 15
COURSE OUTCOMES
CO1 Explain data communications system and its components.
CO2 Identify the different types of network topologies and protocols.
CO3 Explain physical properties and characteristics of systems networking.
CO4 Identify the different types of network devices and their functions within a network.
CO5 Identify and describe the nature and roles of protocols and services at the application, network, data link,
and physical layers.
CO6 Solve network related problem.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain about computer hardware and networks. CO1 U 10
b List out the different types of computer memory and explain. CO1 U 10
.
(OR)
2. a. Summarize the following CO1 U 10
i. Hard disks.
ii. CD ROMs and DVD.
b Explain different types of Networks. CO2 U 10
.
COURSE OUTCOMES
CO1 Understand the history of computers and internet.
CO2 Develop an appreciation for the developments in the field of computers.
CO3 Understand the situation of cyber crimes and intellectual property rights.
CO4 Acquire knowledge on tools used for investigation.
CO5 Acquire knowledge on evidence collection and evidence preservation.
CO6 Understand cyber crime investigation and evaluate various laws related to cyber crimes.
Q. Course Bloom’s
Questions Marks
No. Outcome Level
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. m rpWfij kd;ddd; ---------------- CO3 U 1
.
M tPukhKdpth; vOjpa rpWfij ----------------- CO3 U 1
.
,. rpWfijapd; mbg;gil Nehf;fk; ahJ? CO3 R 2
<. Ma;jk; ngah;f;fhuzk; jUf. CO1 R 2
c. m rpWfijapd; ,yf;fzk; vOJf. CO3 R 5
.
M rpWfij Mrphpah;fs; gw;wp vOJf. 1. t.Nt.R.Iah; 2. fy;fp 3. CO3 R 9
. GJikg;gpj;jd;.
(OR)
2. m mir ------------ tifg;gLk;. CO1 U 1
.
M nky;ypd vOj;Jf;fs; MWk; -------------- gpwf;fpd;wd. CO1 R 1
.
,. vOj;Jf;fspd; ,lg;gpwg;G gw;wp vOJf. CO1 R 2
<. Njk;ghtzp E}y; tpsf;fk; jUf. CO4 R 2
c m Fws; ntz;ghit vLj;Jf;fhl;Lld; tpsf;Ff. CO1 R 5
.
M Ntypad; $Wk; ey;thh;j;ijfs; Fwpj;J fl;Liu vOJf. CO4 R 9
.
(OR)
3. m filr;rq;f fhyj;jpd; ,Wjpapy; Njhd;wpa fhg;gpak; ----------- CO1 R 1
.
M jkpo; ,yf;fpaq;fs; ----------------- ,yf;fpaq;fs; vd CO5 R 1
. miof;fg;gLfpwJ
,. ntz;gh vj;jid tifg;gLk;? mit ahit? CO1 R 2
<. rq;fk; kUtpa fhyk; Fwpg;G jUf. CO5 R 2
c m ntz;ghtpd; nghJ ,yf;fzk; tpsf;fk; jUf. CO1 R 5
.
M jpiz Ik;ghy; kw;Wk; mtw;wpd; tpsf;fk; jUf CO1 R 9
.
(OR)
4. m jk; fy;yiwapy; jk;ik xU jkpo; khztd; vd;W vOjr; nra;jth; CO2 U 1
. -------------------
M fpwpj;jt fk;gh; vd;W miof;fg;gl;lth; ------------------ CO2 U 1
.
,. rPfd; ghy;F Iah; Fwpg;G jUf. CO2 R 2
<. vl;Lj;njhif E}y;fs; ahit? CO5 R 2
c. m rq;ffhyr; rpwg;G gw;wp Fwpg;G jUf. CO5 R 5
.
M jkpo; ,yf;fpa tuyhw;wpd; Ml;rpf; fhyq;fs; gw;wp vOJf. 1. CO5 R 9
. gy;yth; fhyk; 2. Nrhoh; fhyk; 3. INuhg;gpah; fhyk;
(OR)
5. m jkpo; fpwpj;jth;fSf;F topghl;by; gad;gLkhW ghliy vOjpath; CO2 U 1
. -------------------
M vl;Lj;njhifapy; mfg;nghUSK; Gwg;nghUSk; Nrh;e;j E}y; CO5 U 1
. --------
,. jj;Jtg;Nghjfh; Fwpg;G jUf. CO2 R 2
<. FWe;njhif Fwpg;G jUf. CO5 R 2
c. m vr;.V.fpUl;bzg;gps;is Fwpg;G jUf. CO2 R 5
.
M jkpo;ehl;L fpwpj;jth;fs; gw;wp vOJf. 1. Ntjehafk; CO2 R 9
. rh];jphpahh; 2. Ntjehafk; gps;is.
(OR)
6. m $j;juhw;Wg;gil vd;Dk; E}ypd; kw;nwhU ngah;-------------- CO5 R 1
.
M neLe;njhif vd miof;fg;gLk; E}y; ---------------- CO5 R 1
.
,. neLey;thil Fwpg;G jUf. CO5 R 2
<. ,aw;wkpo; - Fwpg;G jUf. CO3 R 2
c. m mfehD}W Fwpg;G jUf. CO5 R 5
.
M vl;Lj;njhif E}y;fSs; Gwk; rhh;e;j E}y;fis vOJf. 1. CO5 R 9
. gjpw;Wg;gj;J 2. GwehD}W
(OR)
7. m Gul;rpf;ftpQh; vd;W miof;fg;gl;lth; ------------------ CO3 U 1
.
M ctikf;ftpQh; vd;W miof;fg;gl;lth; ----------------- CO3 U 1
.
,. gj;Jg;ghl;L E}y;fs; ahit? CO5 R 2
<. FwpQ;rpg;ghl;L Fwpg;G jUf. CO5 R 2
c. m ew;wpiz Fwpg;G jUf. CO5 R 5
.
M gj;Jg;ghl;L Mw;Wg;gil E}y;fs; gw;wp vOJf. 1. CO5 R 9
. jpUKUfhw;Wg;gil 2. nghUeuhw;Wg;gil
(OR)
8. m nrd;id muruit ftpQuhf tpsq;fpath; ---------------- CO3 U 1
.
M Njrpaf;ftp vd miof;fg;gl;lth; -------------------- CO3 U 1
.
,. ftpij xU ,yf;fpak; Fwpg;G jUf. CO3 R 2
<. ftpkzp Njrpf tpehafk; gps;is Fwpg;G jUf. CO3 R 2
c. m ehkf;fy; ftpQh; Fwpg;G jUf. CO3 R 5
.
M 20-Mk; E}w;whz;bd; ,izaw;w Gyth;fs; gw;wp vOJf. 1. CO3 R 9
. ghujpahh; 2. ghujpjhrd;
PART – B(1 X 20= 20 MARKS)
COMPULSORY QUESTION
9. m jkpo; tuyhw;Wg; Gjpdq;fspd; je;ij ----------------- CO3 U 1
.
M Kjy; tuyhw;Wg; Gjpdk; ------------- CO3 U 1
.
,. Nghyp vOj;Jf;fs; vd;why; vd;d? vj;jid tifg;gLk;? CO1 R 2
<. gFgj cWg;Gfs; ahit? CO1 R 2
c. m ty;ypdk; kpFk; ,lq;fis vLj;Jf;fhl;Lld; tpsf;Ff. CO1 R 5
.
M ehtypd; tiffis vOJf. CO3 R 9
.
COURSE OUTCOMES
CO1 khzth;fs; r%f khw;wr; rpe;jidfis mwpe;Jnfhs;th;.
CO2 khzth;fs; Gjpdj;ijf; fw;gjd; %yk; rKjhar; rpf;fy;fis czh;e;J mtw;wpw;Fj;
jPh;Tfhz;gh;.
CO3 ehlfq;fis r%fg; gad;ghl;bw;F Vw;g cUthf;Fk; jpwd; ngWth;.
CO4 jkpo;f; fhg;gpaq;fspy; moFk; mwpTzh;Tk; Cl;Lk; gFjpfisg; gbj;Jg; Ghpe;J
nfhs;th;.
CO5 gz;ila ,yf;fpa gjpTfspy; cs;s goe;jkpohpd; MSikfisAk; milahsq;fisAk; mwpe;J
nfhs;th;.
CO6 Gjpdk; topj; jw;fhy rpf;fy;fisAk; mjw;fhd jPh;TfisAk; cUthf;Fk; jpwd; ngWth;.
Assessment Pattern as per Bloom’s Taxonomy
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 36 01 - - - - 37
CO2 18 03 - - - - 21
CO3 45 08 - - - - 53
CO4 11 00 - - - - 11
CO5 57 01 - - - - 58
CO6 00 00 - - - - 00
167 13 180
Course Code 17LN2006 Duration 3hrs
Course Name TAMIL-II Max. Marks 100
Q. Course Bloom’s
Questions Marks
No. Outcome Level
ANSWER ALL QUESTIONS
PART – A(4 X 20= 80 MARKS)
1. m Mz;lhd; jkpio --------------- vd;W Fwpg;gpLfpwhh;. CO1 R 1
.
M njhy;fhg;gpak; --------- gphpTfisf; nfhz;lJ. CO1 R 1
.
,. rq;fk; ngah; tpsf;fk; jUf. CO1 R 2
<. ghapuj;jpd; nghJg;ngah;fs; ahit? CO1 R 2
c. m fhtyh;fs; ghtyh;fs; Fwpg;G jUf. CO1 R 5
.
M Kr;rq;f tuyhW Fwpj;j nra;jpfis njhFj;J vOJf. CO1 R 9
.
(OR)
2. m #j;jpuk; ------------- tifg;gLk;. CO1 U 1
.
M E}y; --------------- tifg;gLk;. CO1 U 1
.
,. #j;jpuk; tpsf;Ff. CO1 R 2
<. fPo;f;fzf;F E}y;fs; tpsf;fk; jUf. CO2 R 2
c. m E}y; ngah;f;ffhuzk; jUf. CO1 R 5
.
M khzhf;fhpd; tifiaAk; khzhf;fh; Mfhjthpd; jd;ikiaAk; tpsf;Ff. CO1 R 9
.
(OR)
3. m jphp vd;gjd; nghUs; ------------------ CO2 U 1
.
M Mrhuk; vd;gjd; nghUs; ---------------------- CO2 U 1
.
,. jpizkhiy E}w;iwk;gJ Fwpg;G jUf. CO2 R 2
<. Nguhrphpah;. Re;juk;gps;is Fwpg;G jUf. CO5 R 2
c. m ehybahh; Fwpg;G jUf. CO2 R 5
.
M ey;y Mrphpah; ,yf;fzKk;> mtw;wpd; jd;ikiaAk; tpsf;Ff. CO1 R 9
.
(OR)
4. m Ie;jpiz mWgJ vd;w rpwg;gpidg; ngw;w E}y; ----------------- CO2 R 1
.
M gQ;rk; vd;gjd; nghUs; ---------------- CO2 U 1
.
,. 19-Mk; E}w;whz;bd; ehlf tiffs; ahit? CO5 R 2
<. ciueil Fwpg;G jUf. CO2 R 2
c. m Mrhuf;Nfhit Fwpg;G jUf. CO2 R 5
.
M ePjp E}y;fspy; mwk; gw;wpa E}y;fis vOJf. 1.jphpfLfk; 2. CO2 R 9
. Vyhjp 3. rpWgQ;r%yk;.
(OR)
5. m jkpo;nkhopapy; Njhd;wpa Kjy; ehlf E}y; ------------- CO5 R 1
.
M ehlftpay; vd;w E}iy vOjpath; --------------- CO5 R 1
.
,. fy;ntl;Lf;fs; Fwpg;G jUf. CO5 R 2
<. goe;jkpo; ciueil E}y;fs; ahit? CO2 R 2
c. m gonkhop Fwpg;G jUf. CO2 R 5
.
M jpUf;Fwspd; ngahf;fhuzKk; mjd; rpwg;gpay;GfSk; tpsf;Ff. CO2 R 9
.
(OR)
6. m njd;dhl;L ngh;dhl;rh vd;W miof;fg;gl;lth; ------------ CO5 U 1
.
M ebg;Gf;fiy Mrhd; vd;W miof;fg;gl;lth; ----------------- CO5 U 1
.
,. jd;ikazp tpsf;fk; jUf. CO1 R 2
<. fhtb Ml;lk; Fwpg;G jUf. CO3 R 2
c. m jw;Fwpg;Ngw;w mzpia vLj;Jf;fhl;Lld; tpsf;Ff. CO1 R 5
.
M ehlfj;Jiw mwpQh;fs; gw;wp tpsf;fk; jUf. 1. rq;fujh]; CO5 R 9
. Rthkpfs; 2. gk;ky; rk;ke;j Kjypahh;.
(OR)
7. m jPgfk; vd;gjd; nghUs; ------------------- CO1 U 1
.
M VJ vd;gjd; nghUs; ---------------------- CO1 U 1
.
,. Ntw;Wikazpia tpsf;Ff. CO1 R 2
<. ngha;f;fhy; Fjpiu Ml;lk; tpsf;Ff. CO3 R 2
c. m ry;ypf;fl;L Fwpg;G jUf. CO3 R 5
.
M $j;J gw;wp fl;Liu tiuf. 1. njUf;$j;J 2. fiof;$j;J 3. ghitf;$j;J. CO3 R 9
.
(OR)
8. m fufk; vd;gjd; nghUs; ------------------ CO3 U 1
.
M rf;if vd;gjd; nghUs; ----------------- CO3 U 1
.
,. fpl;bg;Gs; Fwpg;G jUf. CO3 R 2
<. cr;rhpg;G tpisahl;L Fwpg;G jUf. CO3 R 2
c. m ehl;Lg;Gwf; fiyapd; tsh;r;rp epiyfs; gw;wp tpsf;Ff. CO3 R 5
.
M ehl;Lg;Gw ehlfq;fs; gw;wp fl;Liu vOJf.1.gs;S ehlfk; 2. CO3 R 9
. FwtQ;rp ehlfk; 3. nehz;b ehlfk;.
PART – B(1 X 20= 20 MARKS)
COMPULSORY QUESTION
9. m jkpo;j;jhj;jh vd;W miof;fg;gl;lth; ----------------- CO5 U 1
.
M jkpoj;njd;wy; vd;W miof;fg;gl;lth; ------------------ CO5 U 1
.
,. MWKf ehtyh; Fwpg;G jUf. CO5 R 2
<. jhyhl;bd; ,ir tpsf;fk; jUf. CO6 R 2
c. m jhyhl;L czh;j;Jk; jj;Jtk; tpsf;fk; jUf. CO6 R 5
.
M jhyhl;L gw;wp fl;Liu tiuf. CO6 R 9
.
COURSE OUTCOMES
CO1 nrk;nkhopahk; jkpo; nkhopapd; rpwg;ig mwpe;Jnfhs;th;.
CO2 Gj;jpyf;fpaq;fisg; gilf;Fk; jpwidAk; jpwdha;T nra;Ak; jpwidAk; ngWth;.
CO3 ehl;Lg;Gwg;ghly;fis jpwdha;T nra;Ak; jpwid ngWjy;.
CO4 jkpo;f; fhg;gpaq;fspy; moFk; mwpTzh;Tk; Cl;Lk; gFjpfisg; gbj;Jg; Ghpe;J
nfhs;th;.
CO5 gz;ila ,yf;fpag; gFjpfspy; cs;s goe;jkpohpd; MSikfisAk; milahsq;fisAk;
mwpe;J nfhs;th;.
CO6 Gjpdk; topj; jw;fhy rpf;fy;fisAk; mjw;fhd jPh;TfisAk; cUthf;Fk; jpwd;
ngWth;.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Differentiate unsupervised and descriptive learning through
CO1 U 10
suitable example.
b Briefly discuss the ingredients of machine learning.
CO1 R 10
.
(OR)
2. Create your own application based on decision trees in
CO2 C 20
classification model.
COURSE OUTCOMES
CO1 Recall the concepts used in machine learning.
CO2 Identify the problems that can be solved using machine learning techniques.
CO3 Identify the appropriate algorithms for solving problems.
CO4 Explore the fundamentals of images and their processing.
CO5 Apply machine learning techniques for problem solving.
CO6 Apply machine learning for processing images.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the structure of C Program with an example. CO1 U 10
b List out the files used in C program. CO1 R 5
.
c. Categorize the types of error. CO1 An 5
(OR)
2. a. Compare the generations of a programming language. CO1 An 10
b Explain in detail about the basic data types in c. CO2 U 10
.
5. Define array. What are the types of an array? Illustrate with an CO5 R 20
example.
(OR)
6. a. Develop a C code to print all the even numbers from 1 to 50 CO3 C 10
using for loop.
b Define Union. Explain in detail about UNION with an example. CO6 R 10
.
COURSE OUTCOMES
CO1 Illustrate the basics of computers and programming language.
CO2 Summarize about character sets and data types.
CO3 Apply control structures in programming.
CO4 Develop C programs to solve computational problems using functions.
CO5 Construct C programs using arrays and strings.
CO6 Develop C programs for solving problems using structures and union.
Q. Course
Bloom’s
No Questions Outcom Marks
Level
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain in detail about desktop computer and its components. CO1 U 10
b. Summarize the steps involved in data processing. CO1 U 10
(OR)
2. Discuss in detail about desktop computer and its components. CO1 C 20
COURSE OUTCOMES
CO1 Understand the different types of data.
CO2 Understand data storage in the computer.
CO3 Develop knowledge about the CPU, networks and output devices.
CO4 Understand the database concepts.
CO5 Acquire knowledge about data processing and the Internet.
CO6 Learn about applying IT techniques for societal impact.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Describe the type of operators with suitable example. CO1 R 15
b Construct a program that prompts users to enter two integers x CO1 A 5
. and y. Calculate and display the value of xy.
(OR)
2. a. Explain any ten string functions with suitable examples. CO1 U 10
b Summarize the history of python programming and its features. CO1 U 10
.
7. a. Create a list of first ten letters of the alphabet, then using the CO4 A 10
slice operations do the following operations.
i) Print the first three elements from the list.
ii) Print the last three elements from the list.
ii) Print the letters from any particular index to the end of the
list.
b Create a GUI using tkinter module. CO6 A 10
.
(OR)
8. a. Explain tuples and its operations with example. CO4 A 12
b Summarize the advantage of using files and explain the modes CO4 U 8
. used to handle the same.
COMPULSORY QUESTION
9. a. Explain the types of inheritance with examples. CO5 A 12
b Construct a program to read and write content to a file. CO6 A 8
.
COURSE OUTCOMES
CO1 Summarize the basics about python programming.
CO2 Demonstrate the use of control flow statements in python.
CO3 Develop modules for reusability of code.
CO4 Infer the concept of collections in python.
CO5 Illustrate object-oriented concepts.
CO6 Make use of file handling concepts.
Q. Course
Bloom’s
No Questions Outcom Marks
Level
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a Explain time and space complexity of algorithm with CO1 U 10
. example.
b Describe the classification of data structures. CO1 U 10
.
(OR)
2. a Define algorithm and explain the different approaches for CO1 R 10
. designing an algorithm.
b Analyze and write a find routine in array implementation. CO2 A 10
.
COURSE OUTCOMES
CO1 Outline the different ways of arranging and handling collection of data.
CO2 Organize data in arrays and perform operations.
CO3 Organize and manipulate data using linked lists.
CO4 Organize and manipulate data using stacks and queues.
CO5 Understand searching and sorting techniques.
CO6 Organize and manipulate data in trees and graphs.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. Explain the different components of Database System CO1 U 20
Architecture in detail.
(OR)
2. a. Describe the purpose of database management system in detail. CO1 U 10
b Summarize the various types of users and database CO1 U 10
. administrator in detail.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. a. Develop a PL/SQL procedure for finding the sum of two CO5 A 10
numbers.
b Develop a PL/SQL procedure for finding the greater of two CO5 A 10
. numbers.
COURSE OUTCOMES
CO1 Evaluate business information problem and find the requirements of a problem in terms of data.
CO2 Summarize about database schema and need for normalization.
CO3 Design the database schema with the use of appropriate data types for storage of data in database.
CO4 Use different types of physical implementation of database.
CO5 Construct simple and moderately advanced database queries using Structured Query Language
(SQL).
CO6 Facilitate students to understand the concept of triggers.
Q. Course Bloom’s
Questions Marks
No. Outcome Level
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. List out Charactertics of structure, semi structures and CO1 R 10
unstructured data.
b Explain in detail about data scientist. CO1 U 10
.
(OR)
2. a. List out the top challenges faced in big data. CO1 R 10
b Explain the Hadoop ecosystem. CO2 U 10
.
COURSE OUTCOMES
CO1 Understand the fundamentals of Big data.
CO2 Understand the concept of Hadoop.
CO3 Develop solutions to problem using Big data.
CO4 Acquire knowledge about MongoDB.
CO5 Apply big data to solve real word problems.
CO6 Illustrate the role of map reduce programming in various scenarios.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Classify the types of unsupervised learning algorithms. CO1 R 10
b Illustrate the following CO1 R 10
. i) Joining Numpy arrays.
ii) Numpy searching arrays.
(OR)
2. a. Explain in detail the handwriting recognition system. CO2 U 10
b Summarize the concept behind the classification using sigmoid CO2 U 10
. function.
COURSE OUTCOMES
CO1 Define the terminologies of Machine learning.
CO2 Describe the concepts of Naïve Bayes theory and decision trees.
CO3 Apply the algorithm of Support vector machines and Logistic regression in the real time problems.
CO4 Analyze the regression models.
CO5 Design unsupervised Learning algorithms using k-means clustering and Association analysis.
CO6 Modify the data using principal component and singular value decomposition.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Describe security in the systems development life cycle in detail. CO1 R 10
b Explain the approaches to information security implementation. CO1 R 10
.
(OR)
2. a. Consider that you have a website for collecting customer CO1 A 10
information who search on specific jobs from certain sites. If a
hacker hacks your website using the following type of threat,
explain its impact and information loss. Also, explain the type of
threat in detail.
i) A trojan horse via advertisement.
ii) Data storage in unprotected area.
iii) Default password for beginners.
iv) Theft of an office laptop.
v) Outdated operating system.
b Explain the broad classification of law in India and abroad in CO2 U 10
. detail.
(OR)
6. a. Explain how you can implement physical security control using CO5 A 10
the following mechanisms with appropriate examples:
i. Mantraps.
ii. Electronic monitoring.
iii. Alarms and alarm systems.
iv. Computer rooms and wiring closets.
v. Security in interior walls and doors.
b Write in detail on the technical aspects of implementing CO5 R 10
. information security.
COURSE OUTCOMES
CO1 Understand information security and the need for security.
CO2 Define the issues, laws and policies in information security.
CO3 Analyze the risks occur in information security.
CO4 Apply the cryptography for needed circumstances.
CO5 Analyze physical security in the day-to-day life.
CO6 Create employment policies and practices.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Distinguish moral, morality, ethics and values through suitable CO1 U 10
example.
b Ethical norms and standards are essentially contextual – Justify CO1 A 10
. this statement through suitable example.
(OR)
2. a. Briefly discuss the life skills through Australian, British and CO1 U 15
Canadian framework.
b CO1 R 5
List and explain the competencies of a professional.
.
COURSE OUTCOMES
CO1 Summarize the basics of ethics and values.
CO2 Solve professional problems using ethical codes.
CO3 Analyze ethical codes and audit.
CO4 Organize the life supporting ethics.
CO5 Apply attitudes in the various situations of personal life.
CO6 Illustrate the importance of the ethical standards in day-to-day lives.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Compare the business intelligence vs predictive analytics. CO1 An 10
b Discuss the steps in the predictive analytics process. CO1 U 10
.
(OR)
2. Paraphrase about the descriptive modeling in detail. CO3 U 20
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. Interpret the application of predictive analytics to solve real CO6 U 20
world problems.
COURSE OUTCOMES
CO1 Illustrate the steps involved in predictive analytics and modelling.
CO2 Demonstrate data cleaning procedures and pre processing.
CO3 Examine association rule mining and descriptive modelling for prediction.
CO4 Utilize Machine learning in predictive analytics.
CO5 Discover the role of ensembles and text mining methods.
CO6 Apply predictive modelling for solving real world problems.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Summarize different approaches of artificial intelligence. CO1 U 10
b Explain the types of agents with example. CO1 U 10
.
(OR)
2. a. Apply the PEAS approach in a vacuum cleaner. CO2 A 12
b List the advantages of artificial intelligence and its applications. CO2 U 8
.
COURSE OUTCOMES
CO1 Relate artificial intelligence to natural intelligence.
CO2 Summarize problem solving techniques in games.
CO3 Examine different forms of learning from nature.
CO4 Utilize logic-based reasoning and learning.
CO5 Discover the role of Artificial intelligence in natural languages.
CO6 Inspect the applications of Artificial Intelligence in Diverse Fields.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Describe the structure of operating systems. CO1 R 10
b Illustrate the system components in detail. CO1 R 10
.
(OR)
2. a. Explain the various design and implementation of OS. CO2 R 10
b Summarize the operations on process. CO3 U 10
.
COURSE OUTCOMES
CO1 Describe the Operating System concepts.
CO2 Explain the Operating Structure and Storage hierarchy.
CO3 State process management.
CO4 Show the capability in handling efficiently the Protection mechanism and the storage.
CO5 Discuss the Operating System Security and Protection mechanism.
CO6 Outline the kernel exploit.
Q. Course
Bloom’s
No Questions Outcom Marks
Level
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the roles of ECD and ICT in Cybercrime. CO1 U 10
b. List out the strategies to prevent Cybercrime. CO1 R 10
(OR)
2. a. Recall the classification of Cybercriminals. CO1 R 10
b. List out the challenges to mitigate the impact of Cybercrime. CO1 R 10
COURSE OUTCOMES
CO1 Categorize the changes in society associated with the advent of technological changes and the
introduction of the internet.
CO2 Explain computer-related crime.
CO3 Develop a working knowledge of the classifications of motive for modern computer intruders and
how they relate to each other in the digital security realm.
CO4 Discuss the basic concepts of cryptographic technology and the major mathematical principles used
by cryptographic systems.
CO5 Describe the risks posed by the various types of malicious code objects and develop adequate
countermeasures to protect the systems.
CO6 Access and mitigate vulnerabilities.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Identify the fundamental components of information security. CO1 U 10
b Summarize the various eavesdropping attacks. CO1 U 10
.
(OR)
2. Analyze any five security issues and explain the risk mitigation CO1 An 20
measures.
5. a. Indicate how you can categorize sensitive data and arrange them CO3 U 10
in different levels.
b Sketch the stages in the software development life cycle. CO4 U 10
.
(OR)
6. a. Identify the data roles and responsibilities in handling sensitive CO3 A 10
data.
b Classify industries based on Capability Maturity Model and CO4 An 10
. specify the features of each level.
COURSE OUTCOMES
CO1 Explain information security concepts and how they relate to one another helps security
professionals design and implement secure systems.
CO2 Apply various concepts, methodology, techniques and provide user access to resources.
CO3 Classify information based on its value to the organization.
CO4 Apply security in the software development life cycle and assess the effectiveness of software
security.
CO5 Discuss the ongoing, day-to-day management of security functions.
CO6 Explain the basic terminology of cryptography and apply various key algorithms.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the various phases in cyber forensics investigation CO1 R 15
process with neat diagram.
b Classify the various states of data with suitable example. CO1 U 5
.
(OR)
2. a. Summarize the fundamental principles of Cyber Forensics. CO2 U 10
b Describe about Locard’s Principle of Transference and Inman- CO2 R 10
. Rudin Paradigm.
3. a. Classify digital evidence into four categories and brief them. CO3 U 10
b Explain the locations where the evidences reside. CO3 E 10
.
(OR)
4. a. Illustrate various forms of data hiding such as Disk cleaning CO4 An 10
utilities, File wiping utilities and Disk degaussing.
b Relate the various methods recommended by NIST in physical CO4 A 10
. destruction of disk.
Q. Course Bloom’s
Questions Marks
No. Outcome Level
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. Summarize on OSI model layers and functions. CO1 U 20
(OR)
2. a. Compare and contrast the different types of firewall. CO1 An 10
b. Illustrate on the types of network architecture. CO1 U 10
COURSE OUTCOMES
CO1 Describe OSI and TCP/IP model, compare and contrast network topologies and also select the appropriate
cabling type based on implementation requirements.
CO2 Explain various router components, remotely access routers, and test network connectivity.
CO3 Demonstrate a detailed knowledge of the operation and configuration of switches.
CO4 Configure and understand the components and operation of a wireless LAN (WLAN).
CO5 Demonstrate expertise in configuring host and network level technical security controls.
CO6 Identify core networking and infrastructure components and design an IT infrastructure including devices,
topologies, protocols, systems software, management, and security.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. Explain about the different types of normalization in detail. CO1 An 20
(OR)
2. Illustrate about the following concept in detail. CO2 A 20
a. DDL.
b. DML.
c. Referential Integrity.
d. DBMS programming language interfaces.
3. a. Point out the various operations for accessing file records. CO3 An 8
b Prioritize the lock based protocols. CO3 An 12
.
(OR)
4. a. Paraphrase about the query processing. CO2 U 10
b Describe the various transaction state. CO4 U 10
.
COURSE OUTCOMES
CO1 Design and develop database.
CO2 Write efficient and complex queries.
CO3 Identify proper authentication and authorization techniques for Database applications.
CO4 Design multilevel security scheme for database.
CO5 Perform database auditing and database performance tuning.
CO6 Perform database backup and recovery.
(OR)
2. a. Explain any five behavioral biometric traits and their features. CO1 An 10
(OR)
b. Justify why the facial scan is the best-suited biometric trait for CO4 E 10
surveillance applications.
(OR)
COMPULSORY QUESTION
COURSE OUTCOMES
CO1 Describe the principles of biometric systems.
CO2 Recognize the various modules constituting a biometric system.
CO3 Explain different types of biometric traits.
CO4 Analyze basic biometric system applications.
CO5 Identify the sociological and acceptance issues associated with the design and implementation of
biometric systems.
CO6 Infer the challenges and limitations associated with biometrics.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Classify the malicious programs based on their functionality and CO1 U 12
attack vectors.
b List the goals of malware analysis its type. CO1 R 8
.
(OR)
2. a. Summarize the popular malware analysis tools. CO2 U 8
b Inferhow hex Editor is used for cybercrime investigation. CO2 A 12
.
3. a. Elaborate about the string extraction tools used in static analysis CO2 U 12
and write a python code to identify the file type.
b Outline the concept of file obfuscation. CO1 U 8
.
(OR)
4. a. Infer how to hide file extension in windows 10. CO2 A 6
b Illustrate about portable executable file. CO2 U 14
.
COURSE OUTCOMES
CO1 Explain the concept of malware analysis, types of malware analysis and differentiate malware and
a virus.
CO2 Classify and compare the malware samples and Extract strings, functions, and metadata
associated with the file.
CO3 Use Dynamic analysis tools and understand their features, steps involved in dynamic analysis.
CO4 Determine the possibilities that make experience with sandboxes and multi-AV scanners even
better.
CO5 Identify and correlate information regarding domains, hostnames and IP addresses.
CO6 Discuss the challenges encountered in the field of malware analysis.
COURSE OUTCOMES
CO1 Determine the security threats and vulnerabilities in computer networks using ethical hacking techniques.
CO2 Identify various attacks in various domains of cyber space.
CO3 Select the tools to gather the information regarding the vulnerabilities.
CO4 Use techniques, skills and modern tools necessary to gather the information and to identify the
vulnerabilities.
CO5 Discuss about the exploits in various operating systems and Wireless environment.
CO6 Identify the vulnerabilities associated with various network applications and database system.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain corporate security in detail. CO1 R 10
b Specify the need of special intelligence for corporate security in a CO1 A 10
. software company like TCS. Explain the roles in detail.
(OR)
2. a. Identify and list down any FIVE cybersecurity threats you know. CO1 A 10
Give suitable examples.
b List down any FIVE key benefits of establishing a sound cyber CO1 U 10
. security governance to an organization and explain them.
COURSE OUTCOMES
CO1 Explain the basics of cyber security governance.
CO2 Develop an Information Security Strategy.
CO3 State the need for resilience management.
CO4 Describe the existing and emerging security strategy.
CO5 Select a governing control or standards framework.
CO6 Discuss the various compliance laws.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the architecture of web application. CO1 U 10
b Describe the Secure Development life cycle. CO1 U 10
.
(OR)
2. a. Explain in detail the Cross site scripting. CO2 U 10
b Summarize the following CO2 U 10
. i. CSRF
ii. CORS
COURSE OUTCOMES
CO1 Explain Web Application architecture and technologies.
CO2 Identify and handle Web Application Attacks.
CO3 Defend web browser from attacks.
CO4 State the importance of web authentication and authorization.
CO5 Exhibit privacy for users.
CO6 Exhibit the skills in securing Web server.
Q. Course
Bloom’s
No Questions Outco Marks
Level
. me
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the components of data warehouse. CO1 U 10
7. a. Classify the Data using naïve bayes classifier based on the CO3 An 15
following condition.
X = (age <=30,
Income = medium,
Student = yes,
Credit_rating = Fair)
COURSE OUTCOMES
CO1 Explain various components and processes of data warehouse.
CO2 Design and implement Data Warehouse to industrial requirements.
CO3 Apply in association rule and classification technique in handling organizational problems.
CO4 Identify pattern and knowledge hidden in complex types of data.
CO5 Identify and handle anomaly detection in network.
CO6 Apply appropriate data mining technique in handling Malware attacks.
Assessment Pattern as per Bloom’s Taxonomy
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 20 20
CO2 10 10
CO3 35 15 50
CO4 40 40
CO5 20 20
CO6 20 20 40
180
Course Code 20CA2047 Duration 3hrs
Course Name EMAIL AND MOBILE FORENSICS Max. Marks 100
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the need for email investigation in detail (any five CO1 A 10
points).
b Explain email architecture with a flow diagram. CO1 R 10
.
(OR)
2. a. i. Explain the psychology why a criminal intends to delete CO1 A 10
emails (3 marks).
ii. List the type of information the criminals delete or try to
hide (4 marks).
iii. Also, explain how deleted emails help an investigator in
identifying the criminal (3 marks).
b Write notes on Email Activity Analysis Tool with suitable CO1 R 10
. examples.
COURSE OUTCOMES
CO1 Explain the role of client and server in email and the role of email in investigation.
CO2 Identify, analyze and investigate the malicious email.
CO3 State the need to secure the e-mail service.
CO4 Outline Mobile device proliferation and their functionalities.
CO5 Identify and investigate data from mobile devices using forensically sound and industry standard
tools.
CO6 Analyze mobile devices, their backup files, and artifacts for forensic evidence.
Q. Course Bloom’s
Questions Marks
No. Outcome Level
PART – A (4 X 20 = 80 MARKS)
(OR)
(OR)
(OR)
(OR)
PART – A (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
COURSE OUTCOMES
CO1 10 10 20
CO2 32 32
CO3 10 30 40
CO4 10 30 40
CO5 10 20 30
CO6 18 18
180
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Identify the essential characteristics of cloud computing and CO1 U 10
explain their role in cloud computing.
b Summarize the technological influences that enabled the CO1 U 10
. emergence of cloud computing.
(OR)
2. a. Explain any five cloud services and their applications in real-time. CO1 U 10
b Analyze the role of the following technologies in cloud CO1 An 10
. computing.
i. Autonomic computing.
ii. Virtualization.
iii. Utility computing.
iv. Service Oriented Architecture.
3. a. Describe the four deployment models of cloud computing and CO2 U 10
their features.
b Examine the dimensions of the Jericho cloud cube model of CO2 A 10
. cloud computing.
(OR)
4. a. Summarize the benefits of cloud computing. CO2 U 10
b Identify any five breaches against the confidentiality of CO2 U 10
. information.
COURSE OUTCOMES
CO1 Compare the deployment models versus service models of cloud computing.
CO2 Illustrate the architecture and categorize the services using cloud computing.
CO3 Identify the known threats, risks, vulnerabilities and privacy issues associated with cloud-based IT
services.
CO4 Explain the concepts and guiding principles for designing and implementing appropriate
safeguards and countermeasures for cloud-based IT services.
CO5 Describe the industry security standards, regulatory mandates, audit policies, and compliance
requirements for cloud-based infrastructures.
CO6 State the governance in the cloud.
Assessment Pattern as per Bloom’s Taxonomy
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 30 10 40
CO2 30 10 40
CO3 30 10 40
CO4 20 20
CO5 10 10 20
CO6 10 10 20
110 40 30 180
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Describe ethical consideration in Information technology. CO1 R 10
b Illustrate ethics for IT professionals. CO1 R 10
.
(OR)
2. a. Illustrate the ethics on internet of things. CO3 U 10
b Summarize the history of media. CO2 U 10
.
COURSE OUTCOMES
CO1 Identify the issues of professional conduct in information technology.
CO2 Analyses the relationship with machines, and in particular with the technological devices that we
use most in our everyday communication.
CO3 Assess the impact of the privacy laws.
CO4 Illustrate the issues related to intellectual property.
CO5 Adapt several codes of ethics, from general to specific in nature.
CO6 State the ethical issues that the software manufacturers face in making trade-offs between project
Schedules, project costs, and software quality.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Define cyber crime and explain the different types of cyber- CO1 R 10
crime.
b State and explain the Juvenile Offenders. CO1 R 10
.
(OR)
2. a. Describe the Profiling of Cyber criminals. CO2 U 10
b Explain the different Modus operandi used by Cyber criminals. CO2 U 10
.
3. a. List the need for Penetration Testing and explain the Phases of CO2 R 10
Penetration Testing.
b Explain the Tools and Techniques used in Cyber criminals. CO2 U 10
.
(OR)
4. a. Discuss the following crimes CO3 U 10
i. Hacking
ii. Cracking
iii. Stalking
b Explain about online marketing fraud. CO4 U 10
.
COURSE OUTCOMES
CO1 Explain the concept of crime and cyber crimes.
CO2 Outline the principle of crime, cause and extent of cyber crimes.
CO3 Discuss various forms of cyber crimes.
CO4 Debate the cyber frauds happening in the major sectors such as Banking sector, Telecom sector,
Health sector, Travel sector.
CO5 Give the theoretical perspectives of cyber crimes.
CO6 Describe the role of Criminal Justice Administration and cyber crimes.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the seven domains of typical IT infrastructure. CO1 R 10
b Explain about the weakest link in the security of an IT CO1 R 10
. infrastructure.
(OR)
2. a. Discuss in detail on the data classification standards. CO2 U 10
b How would you rate the advantages and disadvantages of CO1 E 10
. information security? Do you think it is feasible to provide an
error-free secure applications? Justify your answer.
3. a. Are modern storage systems secure? Justify your answer with CO2 A 10
suitable examples.
b Elaborate on personnel security in detail. CO3 U 10
.
(OR)
4. a. Explain how security has taken several transformations from CO3 R 10
encryption to IRM.
b Explain in detail on authentication and privacy. CO4 U 10
.
COURSE OUTCOMES
CO1 Explain the fundamental concepts of information security.
CO2 Describe the need for development of information security policies, and identify guidelines and
models for writing policies.
CO3 Outline how the organization has to equip itself for effective implementation of information
security.
CO4 Relate the importance of privacy and how they impact the information security.
CO5 State the importance of access controls and the need for an access control.
CO6 Recommend suitable controls and procedures for ensuring security.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. Explain in detail about OSI reference model. CO1 U 20
(OR)
2. Describe the concept of Virtual Local Area Network (VLAN) and CO1 R 20
Network Address Translation.
COURSE OUTCOMES
CO1 Define the concepts of protocols and their relationship to each other.
CO2 Explain different network types, IP address, sub-netting, network address translation and IP
versions 4 to IPv6.
CO3 Identify the various TCP/IP protocols used for the networking application.
CO4 Demonstrate routing protocols used for different networks.
CO5 Comprehend the cryptography concepts.
CO6 Evaluate network and internet security.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Define Cyber Space. Describe the evolution of Cyber Space. CO1 R 10
b Elaborate the salient features of Information Technology CO4 U 10
. (Amendment) Act 2008.
(OR)
2. a. Highlight the features of computers and Internet technology CO1 R 10
b Describe Jurisdiction with its types CO2 A 10
.
COURSE OUTCOMES
CO1 Learn techno-legal regulations of the Internet.
CO2 Outline the overall regulatory framework of cyber space in India and developing countries.
CO3 Develop the understanding of relationship between commerce and cyberspace.
CO4 Understand the Information Technology Act and legal framework of right to Privacy, Data Security
and Data Protection.
CO5 Analyze the legal constraints in the enforceability of IT Act and related legislations.
CO6 Understand the tools in cyber forensics, cyber investigation and also relate to other contemporary
issues like law relating to cloud technology, Block chain and crypto currencies in India.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Classify the various types of number system. Write the steps to CO1 R 15
explain how a letter is converted to binary form and back?
Convert Binary to Decimal
1. (1111)2= (?)10
2. (1001)2= (?)10
Convert decimal 35 and 55 to binary
b Interpret the basic principles of Cyber Forensics. CO1 U 5
.
(OR)
2. a. Write the steps by which USB drives can be blocked from writing. CO2 U 5
b Briefly discuss about file system. A) Naming files B) File CO2 R 15
. extensions C) Accessing a file D) File attributes
3. a. Briefly discuss about importance of Recycle Bin, Temp files and CO3 U 15
Thums.DB.
b Sketch and examine the cache maintained by Browsers (Chrome CO3 E 5
. and Mozilla) and list out the forensic importance of it.
(OR)
4. a. Illustrate various forms of data hiding such as Disk cleaning CO4 An 10
utilities, File wiping utilities and Disk degaussing.
b Explain in detail about Cryptography, types of Encryptions. CO4 A 10
.
COURSE OUTCOMES
CO1 Summarize the technical aspects related to Digital Forensics.
CO2 Explain Windows operating system and all of its functions.
CO3 Devise network forensics, evidence collection and network forensics analysis.
CO4 Apply the art of steganography.
CO5 Choose and apply current computer forensics tools.
CO6 Outline investigative process and codes of ethics.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the different phases of Business Continuity Planning. CO1 U 10
b Explain the BCMS process life cycle model (Alexander, 2009). CO1 U 10
.
(OR)
2. a. Describe the Business continuity planning. CO1 U 10
b Explain the types of Disaster to consider in BCP/DR. CO1 U 10
.
COURSE OUTCOMES
CO1 Design a disaster recovery plan, business continuity plan for sustained organizational operations.
CO2 Identify and prioritize critical business functions; determine maximum tolerable downtime and
other criteria and describe concepts of risk management.
CO3 Describe Business Continuity Strategy and be able to discuss incident response options and
contingency planning components.
CO4 Explain backup storage strategy, recovery site strategies and provide Training to test, update, assess
and maintain the plan.
CO5 Illustrate incident response, detection; response; reporting; recovery; remediation and understand
fault tolerance requirements.
CO6 Discuss the Best practices for Business continuity and disaster recovery planning.
Q. Course
Bloom’s
No Questions Outcom Marks
Level
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Observe the problem given below and answer the questions: CO1 A 10
Consider the following set of requirements for a UNIVERSITY database
that is used to keep track of students’ transcripts.
1. The university keeps track of each student’s name, student ID
number, permanent addressand phone number, birth date, sex,
class (Year 1/Year2/etc),major department, and the degree program
(B.A., B.Sc., ..., Ph.D.).
2. Each department is described by a name, department code, office
number, office phone number, and college. Both name and code
have unique values for each department.
3. Each course has a course name, description, course code, number of
credit hours, and offering department. The value of the course
number is unique for each course.
Design an ER diagram for theschema and draw it. Specify the key attributes
of each entity type, draw the multivalued/ composite attributes with
respective symbols and identify the structural constraintson each
relationship type.
b Explain data modeling and its objectives. Explain the application CO1 R 10
. development life cycle.
(OR)
2. a. Explain normalization procedures in detail. CO1 R 10
b Apply first three normal forms for the following table and list down the CO1 A 10
. decomposed tables with respective sample data sets:
S_i Sal Custom Ite Item Uni Quanti Total
d es er m nam t ty amou
dat name id e pric nt
e e
1 12- Sarah 100 Rin 11 2 22
Nov 1 Soap
-
202
2
101 Cand 20 3 60
5 le
2 12- Robel 101 Cand 20 1 20
Nov 5 le
-
202
2
3 13- Sarah 112 Rice 16 3 48
Nov 0
-
202
2
COURSE OUTCOMES
CO1 Describe database concepts.
CO2 Explain operational threats and vulnerable points of accessing and assess them.
CO3 Propose plan to prevent data leakage and data breach.
CO4 Protect personally identifiable information and other sensitive data from hackers.
CO5 Devise the schedule for database backup.
CO6 Develop security policy and perform database auditing.
Assessment Pattern as per Bloom’s Taxonomy
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 20 20 40
CO2 20 20 40
CO3 10 10 20
CO4 10 10 10 30
CO5 10 10 10 30
CO6 10 10 20
180
PART – A (4 X 20 = 80 MARKS)
1. a. Summarize the economic offences under various categories and explain CO1 / U 10
any one economic offence and its impact on society.
b. Analyze any two case studies related to transnational economic offences. CO2 / An 10
(OR)
2. a. Categorize the types of food adulteration and summarize their harmful CO1 / A 10
effects on society.
(OR)
4. a. Survey the different ways in which money is laundered and why it is a CO3 / An 10
serious economic offence.
5. a. Identify the offences involved in the theft of cultural objects and idols. CO3 / A 10
b. Discuss the harmful effects of house tenancy and insurance frauds. CO4 / U 10
(OR)
b. Discuss the ways in which different types of false travel documents CO4 / A 10
(OR)
b. Justify that digital technology has been abused in various ways for CO5 / E 10
committing economic offences.
COMPULSORY QUESTION
COURSE OUTCOMES
CO1 Explain the concepts of economic offences.
CO2 Outline the types and forms of economic offences.
CO3 State the modus operandi of committing economic offences.
CO4 Describe the economic offences in the digital space.
CO5 Outline the laws relating to economic offences in India.
CO6 Apply best practices to prevent and detect economic offences and discuss the role of an information
security professional.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the following terms with respect to Ethical Hacking CO1 R 15
i) Hack Value ii) Exploit iii) Vulnerability
iv) Target Evaluation v) Zero day attack vi) Daisy Chaining
b Classify the categories of information security threat. CO1 U 5
.
(OR)
2. a. Explain information security attack vectors, threat categories and CO2 U 15
types of attacks on a system.
b What is information warfare? What are its type? CO2 R 5
.
3. a. Relate various types of scanning done using Nmap. List different CO3 A 15
services with their port numbersto enumerate.
b What is banner grabbing? What are its types? What are the uses CO3 R 5
. of banner grabbing?
(OR)
4. a. Categorize the process of gathering information from a network CO4 An 15
by snooping on transmitted data. (Ex. Eavesdropping and Drive
by Download Payloads.)
b Illustrate in day to day activities how various Operating Systems CO4 An 5
. are compromised by various password attacks.
5. a. Defend the need of authentication, and correlate the three types CO5 E 12
of authentication.Compare WEP, WPA and WPA2.
b Define host header injection vulnerability. Explain the ways by CO5 R 8
. which header injection vulnerability can be prevented.
(OR)
6. a. Attackers often use social engineering methods to pin point your CO1 A 10
location while you are from a mobile device- Defend how this is
accomplished.
b Write about Operating system hardening and various ways by CO2 C 10
. which windows OS can be protected.
COURSE OUTCOMES
CO1 Determine the security threats and vulnerabilities in computer networks using ethical hacking
techniques.
CO2 Identify various attacks in various domains of cyber space.
CO3 Use the tools that can be used to perform information gathering.
CO4 Explain the exploits in various operating systems and Wireless environment.
CO5 Identify the vulnerabilities associated with various network applications and database system
CO6 Comprehend report writing procedure.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. Summarize the usage of numpy and explain the array operations CO1 U 20
with example.
(OR)
2. Describe the usage of pandas library and illustrate how missing CO1 U 20
values are handled.
3. a. Summarize how data is represented and the steps involved in CO2 U 10
creating feature and target matrix.
b Explain the usage of data visualization library and construct a CO2 A 10
. program to create various charts.
(OR)
4. Explain the types of cryptography and encrypt the word “Hello” CO4 A 20
with key =7. Encrypt and decrypt the message using
multiplicative cipher.
5. a. Construct a program to generate hash value for the given input CO4 A 8
string.
b Describe the different modes of operation. CO4 U 12
.
(OR)
6. a. Construct a program to communicate between the client and the CO4 A 10
server using socket programming.
b Explain about penetration testing and the types of approaches CO5 A 10
. used in penetration testing.
7. Explain about web application penetration testing and the tools CO3 U 20
used to perform the same.
(OR)
8. a. Explain HTTP protocol and the anatomy of HTTP Request. CO5 U 10
b Construct a program to extract the content of the web page. CO5 A 10
.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. a. Construct a program to retrieve wifi passwords connected to a CO6 A 10
network and discuss about password crafting.
b Explain cross site scripting, hashing and retrieving windows CO3 A 10
. password.
COURSE OUTCOMES
CO1 Use Python in data analysis using NumPy, IPython and Pandas.
CO2 Gain knowledge on Python’s role in data preparation, data visualization and statistical
computations.
CO3 Explain the Web Application Security, which includes Cross-Site Scripting Attacks, Cross-Site Request
Forgery, SQL Injection Attacks.
CO4 Describe crypto primitives and their applications.
CO5 Outline the process behind web pentesting.
CO6 Discuss the role ethical hacking plays in providing secure and robust networks.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. Categorize the system model designs for distributed and cloud CO1 An 20
computing.
(OR)
2. a. Illustrate the role of major actors of cloud computing with the CO1 A 10
help of real-time scenarios.
b Classify the service models of cloud computing. CO1 An 10
.
5. a. Explain the layered cloud architecture design and highlight its CO3 U 10
salient features.
b Identify the components of Hadoop and explain its application in CO3 A 10
. parallel and distributed programming.
(OR)
6. a. Discuss the challenges faced in designing cloud architecture. CO3 U 10
b Examine the suitability of HDFS and Map reduce model for CO3 A 10
. solving problems related to big data processing.
7. a. Amazon wants to calculate its total sales city-wise for the year CO4 A 10
2021. The database contains the details of daily sales of each
city. Apply map reduce model to simplify the computation of
city-wise total sales.
b Identify any three top security risks associated with cloud CO5 A 10
. computing and analyze the risk mitigation strategies.
(OR)
8. a. Classify the application architectures for mapping applications to CO4 An 10
parallel and distributed systems.
b Explain autonomic computing and its features. CO5 U 10
.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. Analyze the issues in symmetric key cryptography and discuss CO6 An 20
how PKI is used to resolve them.
COURSE OUTCOMES
CO1 Compare deployment models versus service models of cloud computing.
CO2 Apply suitable virtualization concept.
CO3 Design and Compute the Storage Clouds.
CO4 Use Programming model.
CO5 Debate the security risks associated with the cloud.
CO6 Discuss the governance and the legal issues in the cloud.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. Describe the different types of social media through suitable CO1 R 20
examples.
(OR)
2. a. Summarize the differences between Web 1.0, Web 2.0 and Web CO1 U 10
3.0.
b Briefly discuss the issues in digital privacy through suitable CO1 U 10
. example.
7. Describe the types of social media crimes against women and CO4 U 20
children.
(OR)
8. a. Analyze the causes, consequences and countermeasures of Child CO4 An 10
pornography.
b Elaborate the online frauds that are targeted against Children, CO5 U 10
. Youngsters, Women and Senior citizen.
PART – B(1 X 20= 20 MARKS)
COMPULSORY QUESTION
9. a. Discuss the various methods by which online frauds are carried CO5 U 10
out in real world.
b Illustrate the concept of moral policing and highlight how it is CO6 A 10
. different from online policing.
COURSE OUTCOMES
CO1 Explain about media, social media and social networks.
CO2 Describe different types of social media and their vulnerabilities.
CO3 Analyze the various services of social media, usage and their promotions.
CO4 Discuss social media and crimes against Women and Children.
CO5 Tell the other forms of social media such as online frauds, financial frauds, Digital cloning frauds,
identity theft data privacy and legal measures to prevent social media crimes.
CO6 Outline the response of the Criminal Justice System towards the social networking sites.
Q. Course
Bloom’s
No Questions Outcom Marks
Level
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Write in detail the privacy impacts of emerging technologies. CO1 A 10
b Discuss on the privacy compromises in the web applications. CO1 E 10
.
(OR)
2. a. E-commerce is existent ever since internet is renderedfor public CO2 A 10
usage. However recently, e-commerce threats are rising
drastically. Explain the security threats in e-commerce using
some real cases / evidence.
b Explain why cloud security is considered important when it CO2 A 10
. comes for its implementation in e-commerce applications.
3. a. Explain cryptographic access control in detail. CO2 U 10
b Explain the role of cybersecurity in healthcare. CO3 U 10
.
(OR)
4. a. Discuss on encryption blind spots with suitable examples. CO3 U 10
b Identify and explain FIVE best data protection practices for CO3 A 10
. healthcare community.
5. a. Describe on the significance of e-learning systems in the current CO4 A 10
era with suitable examples.
b Distinguish how today’s e-learning platform has less security CO4 An 10
. features when compared to financial applications (e.g. bank
app).
(OR)
6. a. Explain how security management model can be implemented CO4 A 10
in e-learning systems.
b Explain the concept of cryptocurrency in detail. CO5 R 10
.
7. a. Explain Bitcoin's Blockchain Technology in detail. CO5 R 10
b Explain blockchain types and how they differ from databases. CO5 U 10
.
(OR)
8. a. Explain the major characteristics of a smart city. CO6 R 10
b In a recent article (Oct 19th, 2022) in economic times, the CO6 An 10
. following news is published. Read through the paragraph and
answer the questions below.
Smart cities, energy shift make India a crucial market, says
Siemens' Matthias Rebellius
Siemens AG is well-positioned to play a key role in India's rapid
urbanization and energy transformation, said Matthias
Rebellius, CEO, smart infrastructure, at the Munich-
headquartered conglomerate. In an interview to Kalpana
Pathak, he said the MNC will continue Indiainvestment, having
spent ₹1 billion here in the past five to six years on
manufacturing facilities and expansion.
A. Describe the need of implementing smart cities in India
(3 marks).
B. Identify the security issues currently concerned with the
smart cities in India (4 marks).
C. List down your recommendations for upgrading the
current systems in the smart cities in India with
appropriate justification (3 marks).
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. a. Explain any five technology trends in reducing healthcare costs. CO3 A 10
b Explain any one blockchain application in detail. CO5 U 10
.
COURSE OUTCOMES
CO1 Recommend suitable controls and procedures for ensuring privacy and security.
CO2 Explain current e-commerce security threats faced by the organization and how to combat the
threats.
CO3 Apply best practices and solutions required to manage the security of the healthcare data.
CO4 Demonstrate the ability to select and design security solutions to the E-Learning module.
CO5 Generate knowledge about various operations associated with the life cycle of Blockchain and
Crypto currency.
CO6 Outline key issues with the development of smart cities.
Q. Course Bloom’s
Questions Marks
No. Outcome Level
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a. Illustrate the truth table of AND, OR, NOT and XOR gate. CO1 U 10
b. Enumerate on the working of half adder and full adder. CO1 R 10
(OR)
2. a. Explain in detail the evolution of automated computing devices. CO1 U 10
b. Summarize on NPN transistor. CO2 U 10
COURSE OUTCOMES
CO1 Summarize the architecture of a computer and the digital logic circuits.
CO2 Identify the processor elements and the components of a computer system.
CO3 Make use of various hardware and software interfaces.
CO4 Elaborate the processor and memory architectures.
CO5 Illustrate the application of computer architecture.
CO6 Outline the future direction of computer architecture.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Explain the iteration statements in java with example. CO1 U 10
b Describe Inheritance and its type with suitable example. CO2 U 10
.
(OR)
2. a. Explain the array and its types with suitable example. CO1 U 10
b i. Explain the use of exception handling in java. CO3 A 10
. ii. Write a JAVA program to generate and handle division by zero
arithmetic exception.
COURSE OUTCOMES
CO1 Create java programs that solve simple business problems.
CO2 Summarize the basic principles of object-oriented programming including constructors, inheritance,
polymorphism.
CO3 Construct programs in exception handling.
CO4 Summarize multithreading concepts.
CO5 Apply i/o methods in applications.
CO6 Develop simple graphical user interfaces.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. Discuss about the various applications of Artificial Intelligence. CO1 U 20
(OR)
2. Paraphrase the various functionalities of python in artificial CO1 U 20
Intelligence.
Q. Course
Bloom’ Mark
No Questions Outcom
s Level s
. e
PART – A(4 X 20= 80 MARKS)
(Answer all the Questions)
1. a. Recall the technologies used in display devices. CO1 R 10
b Tabulate the categories of thinking and memory types. CO1 R 10
.
(OR)
2. Visualize the type of devices used for virtual reality and 3D CO1 R 20
interaction.
7. a. Illustrate the factors and challenges that raises in designing for CO4 A 10
diversity.
b Sketch the diagrammatic notations used in dialog design. CO5 A 10
.
(OR)
8. a. Compare static and dynamic web content. CO6 U 10
b Explain the types of communication. CO5 U 10
.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. a. Describe the elements of windowing systems. CO6 R 10
b Explain about virtual and augmented reality CO6 U 10
.
COURSE OUTCOMES
CO1 Summarize the fundamental of HCI.
CO2 Illustrate the concepts of interactions.
CO3 Explain design process.
CO4 Apply design principles.
CO5 Demonstrate the design models.
CO6 Illustrate communication interface.