Tuesday

ADVANCED DATABASE SECURITY

 ADVANCED DATABASE SECURITY(MTCSPE3001A)Assignment QuestionsUNIT I: Database Basics & SQLBloom Level 3 – Apply1. Apply the concept of data abstraction by giving real-life examples of each level.2. Write a SQL query to display names and salaries of employees earning more than ₹50,000.3. Draw an ER diagram for a library management system.4. Demonstrate the process of converting...

Friday

Social Network Analysis

 1: Introduction & Tools Define social network analysis and explain its importance in real-world systems. Describe the basic components of a graph. How are these used in network modeling? Explain the differences between directed and undirected networks with suitable examples. Write a Python snippet using NetworkX to create and visualize a simple graph. Describe...

Thursday

Strategic Management

 1: Introduction to Strategic Management Explain the significance of strategic management in achieving organizational goals. Discuss the steps involved in the strategic management process with examples. Analyze how the liberalization of the Indian economy in 1991 impacted corporate strategy. Compare corporate strategy with business and functional strategies. Illustrate...

DATA PRIVACY Syllabus

 DATA PRIVACY MTCSPE1001DCourse objectives:1. To create architectural, algorithmic and technological foundations for the maintenance of the privacy of individuals, the confidentiality of organizations, and the protection of sensitive information, despite the requirement that information be released publicly or semi-publicly.Course outcomes: After successful completion of this...

DCCN: Course objectives and Course Outcomes

 This course introduces students to the fundamental concepts of data communication and computer networks. It covers the basic components of network systems, transmission media, multiplexing, switching technologies, error detection and correction techniques, medium access control protocols, and network topologies. The course also explores Internet protocols, transport layer...

DCCN:BOOKs

 bookData-Communications-and-Networking-By-Behrouz-A.ForouzanComputer Network (Andrew S Tanenba...

Type of connection

 Two types of connectionsa. Point-to-pointb. MultipointIn point-to-point connection the two devices are connected by a dedicated link. The entire capacity ofthe link is reserved for transmission between those two devices.A multipoint (also known as multidrop) connection is one...

Computer Network (Difination)

 Network: Definition: A network is set of devices (nodes) connected by communication links (media) A node can be a computer, printer or other device capable of sending and/or receiving data Link connecting the devices are often called communication channels Most network use distributed processing. Distributed Processing Networks use distributed processing in which a task...

Direction of data flow

 Two devices can communicate in simplex, half-duplex or full-duplex mode.Simplex:In simplex mode, the communication is unidirectional. Only one of the devices on a link can transmit;the other can only receive.Ex. Keyboard and monitorHalf-duplexIn half-duplex mode, each station...

Internetwork

 Connection of two or more networks by the use of internetworking devices which include routersand gateways Internet is a generic term used to mean an interconnection of networks The Internet is the name of a specific worldwide netwo...

protocol

 A protocol is essentially a set of rules that governs how data is communicated between systems. These protocols have three fundamental elements: Syntax: This covers the data formats and signal levels - essentially the structure and form that the data must follow. Semantics: This involves control information and error handling - the meaning behind the data and how to respond...

Sunday

Data Privacy Question Bank

syllabus Question Bank DATA PRIVACY MTCSPE1001D  UNIT I Questions Define data linking and profiling in the context of privacy. Discuss how these techniques can compromise individual privacy with relevant examples. Compare and contrast different access control models with special emphasis on role-based access control. How do they contribute...

Tuesday

Notes on Protocols in Computer Networks

 Definition of a ProtocolIn computer networks, communication occurs between entities (devices, applications, or systems) that exchange information. For successful communication, entities must follow a protocol—a set of rules governing data exchange. A protocol defines:What is communicated (data format).How it is communicated (transmission method).When it...

Client-Server Architecture

 Definition: Client-Server Architecture is a network architecture where multiple clients (users) request and receive services from a centralized server. The server hosts, manages, and delivers resources or services to clients over a network. Key Components: Client: A device or software application that requests services or resources from the server. Examples: Web browsers,...

Friday

Data representation

Data RepresentationInformation can be in any form such as text, numbers, images, audio, and video.1. Text Text is represented as a bit pattern. The number of bits in a pattern depends on the number of symbols in that language. Code is the set of bit patterns designed to represent text symbols. ASCII (American Standard Code for Information Interchange) Developed by ANSI (American...