ADVANCED DATABASE SECURITY(MTCSPE3001A)Assignment QuestionsUNIT I: Database Basics & SQLBloom Level 3 – Apply1. Apply the concept of data abstraction by giving real-life examples of each level.2. Write a SQL query to display names and salaries of employees earning more than ₹50,000.3. Draw an ER diagram for a library management system.4. Demonstrate the process of converting...
Tuesday
Friday
Social Network Analysis
1: Introduction & Tools
Define social network analysis and explain its importance in real-world systems.
Describe the basic components of a graph. How are these used in network modeling?
Explain the differences between directed and undirected networks with suitable examples.
Write a Python snippet using NetworkX to create and visualize a simple graph.
Describe...
Thursday
Strategic Management
1: Introduction to Strategic Management
Explain the significance of strategic management in achieving organizational goals.
Discuss the steps involved in the strategic management process with examples.
Analyze how the liberalization of the Indian economy in 1991 impacted corporate strategy.
Compare corporate strategy with business and functional strategies.
Illustrate...
DATA PRIVACY Syllabus
DATA PRIVACY MTCSPE1001DCourse objectives:1. To create architectural, algorithmic and technological foundations for the maintenance of the privacy of individuals, the confidentiality of organizations, and the protection of sensitive information, despite the requirement that information be released publicly or semi-publicly.Course outcomes: After successful completion of this...
DCCN: Course objectives and Course Outcomes
This course introduces students to the fundamental concepts of data communication and computer networks. It covers the basic components of network systems, transmission media, multiplexing, switching technologies, error detection and correction techniques, medium access control protocols, and network topologies. The course also explores Internet protocols, transport layer...
DCCN:BOOKs
bookData-Communications-and-Networking-By-Behrouz-A.ForouzanComputer Network (Andrew S Tanenba...
Type of connection

Two types of connectionsa. Point-to-pointb. MultipointIn point-to-point connection the two devices are connected by a dedicated link. The entire capacity ofthe link is reserved for transmission between those two devices.A multipoint (also known as multidrop) connection is one...
Computer Network (Difination)
Network:
Definition:
A network is set of devices (nodes) connected by communication links (media)
A node can be a computer, printer or other device capable of sending and/or receiving data
Link connecting the devices are often called communication channels
Most network use distributed processing.
Distributed Processing
Networks use distributed processing in which a task...
Direction of data flow

Two devices can communicate in simplex, half-duplex or full-duplex mode.Simplex:In simplex mode, the communication is unidirectional. Only one of the devices on a link can transmit;the other can only receive.Ex. Keyboard and monitorHalf-duplexIn half-duplex mode, each station...
Internetwork

Connection of two or more networks by the use of internetworking devices which include routersand gateways Internet is a generic term used to mean an interconnection of networks The Internet is the name of a specific worldwide netwo...
protocol
A protocol is essentially a set of rules that governs how data is communicated between systems. These protocols have three fundamental elements:
Syntax: This covers the data formats and signal levels - essentially the structure and form that the data must follow.
Semantics: This involves control information and error handling - the meaning behind the data and how to respond...
Sunday
Data Privacy Question Bank
syllabus Question Bank DATA PRIVACY MTCSPE1001D
UNIT I Questions
Define data linking and
profiling in the context of privacy. Discuss how these techniques can
compromise individual privacy with relevant examples.
Compare and contrast
different access control models with special emphasis on role-based access
control. How do they contribute...
Tuesday
Notes on Protocols in Computer Networks
Definition of a ProtocolIn computer networks, communication occurs between entities (devices, applications, or systems) that exchange information. For successful communication, entities must follow a protocol—a set of rules governing data exchange. A protocol defines:What is communicated (data format).How it is communicated (transmission method).When it...
Client-Server Architecture
Definition:
Client-Server Architecture is a network architecture where multiple clients (users) request and receive services from a centralized server. The server hosts, manages, and delivers resources or services to clients over a network.
Key Components:
Client:
A device or software application that requests services or resources from the server.
Examples: Web browsers,...
Friday
Data representation
Data RepresentationInformation can be in any form such as text, numbers, images, audio, and video.1. Text
Text is represented as a bit pattern.
The number of bits in a pattern depends on the number of symbols in that language.
Code is the set of bit patterns designed to represent text symbols.
ASCII (American Standard Code for Information Interchange)
Developed by ANSI (American...
Subscribe to:
Posts (Atom)
- Recent
- Weekly
- Comment
Recent
Weekly
-
Class-Responsibility-Collaborator (CRC) Modeling...
-
Syllabus Text Book Reference Book...
-
What is class based modeling Class-based modeling...
-
Characteristics of Good SRS[Software Requirement...
-
ER model stands for an Entity-Relationship model. It is a...
-
Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise ...
-
QUESTION BANK Unit 1 part1 Explain different...
-
Relational Calculus Relational calculus is a...
-
Unit1: A) What is the Indian Knowledge System (IKS)...