0% found this document useful (0 votes)
55 views

CVMU 2022 External Papers

CVMU 2022 External papers

Uploaded by

bffs814
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
55 views

CVMU 2022 External Papers

CVMU 2022 External papers

Uploaded by

bffs814
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
Enrolment No. 2.02 “yo UNIVERSITY Cc BE - SEMESTER - VIT+ IN yp wa MID TERM EXAMINATION-AUG 2023 Subject Code: 102046708 bi Date: 22-98-2923 Subject Name: Information and Netwo,, security Time: 10:00 AM to 11:15 AM Max. Marks: 40 Instructions: «Figures to the right indicate full marks, ‘+ Make suitable assumptions whenever necessary. ‘+ Draw neat, clean and detailed figures/aiagrams if itis asked to draw sketches, Q.1 (A). Answer the Following, (Each questjom eaeries ome mark). @ Non Repudiation (Avalanche Effect Gi) Masquerading () Diffusion (©) Confidentiality (vi) Integrity ia 2 Q.2 (A) What are the differences betwe ciphers and stream ciphers? Explain block ciphers principals in brief. (B) Explain single round of DES al with suitable diagram. (©) Use the Playfair Cipher to encipher the message “Money cannot buy happiness” using the key “CVMUNIVERISITY”. Show your calculations in detail. OR (©) Encrypt the message “CVM Examination” using the Hill cipher algorithm with the key matrix . Show your calculation and results. Q3 (A) Explain CFB algorithm mode with diagram @) List out Transformation Functions of AES and explain anyone in detail (©) Explain Diffie-Hellman key exchange algorithm with example OR (©) In RSA encryption method, ifthe prime number p and q are 3 and 7 respectively. The encryption exponent ¢ is 11, find the followine: 1. The least postive decryption component 2. Public and private key 3; Find Cipher text when the message yi 20 is encrypted using the pubic key oS BS eee [08] [05] (05) [06] SS LLL Horatiment NO. L2s67 Ghee e3024 ADIGE T/MBIT (CONST) pURNT INSTITUTION OF CVMU) BE = SEMESTER, F INTERNAL EXAMINATION ~ August 2023 * 192046704 ~ Compiler Design ‘Date: 21 August, 2023 “imme! 10,00 AM to 11S AM Maximum Marks: 40 — " on ight 2. ace oe Ado specify the same Qt (AY Answer the fotlow ing questions: 40 When can you say yaa Grammar is ambiguous? Explain the term Lud (Wi) Explain wwo-pass compiler ‘ (iy) Construct a parse eee forthe input = Hdd (> What type of errors ean the lesieat analyzer handle? (vi), Give an example ofa non-regular language, cd (vi) Write « regular expression for language of all strings over an alphabet 5 = {a,b} ending in abb. {viliy What is « Language? What are the operations on Languages? (08) based on the expression grammar. Q.2 (A) Explain the phases ofcompiler with a suitable example. 105] (B) Define: Lexemie, Token, Pattern Identify the lexemes and corresponding tokens in the 105) following ede. ita>by cours ese ks (cy NFA Spiel wing regular expression using Thompson's construction. Convert [06] DEA ving Fatmy aa*(bleje ear (©) Construct a DFA from the following augmented regular expression without constructing an NFA. {06| ‘using'Syntax tree and minimize the same if possible. (Gayb*)*# 3 (A) i, Define Context free grammar, Eliminate Left Recursion from the following grammar. {03] S>Aalb AvAc|d|€ {i What is the importance of left factoring? Perform left factoring on the following 1021 pes ad ja jab | abe | b (B) Find the FIRST and FOLLOW sets for the given grammar, 105] S> Ach | cbB| Ba A> da| BC. (©) Construct a predictive parsing table for the given grammar. Parse the following input string and [06] show the slack contents and derivation, Input nt i Grammar; p> TL; ‘Tint | float Lid, Liid on (©) 1 Bxplain in detail what do you mean by input buffering technique? 103) M. Differentiate between NFA and DPA {03} Week e ew AUT TUT OTCT Aha ee Enrollment No. Hicate full marks, table assumption if required, do specify 'B: (Each question carries two mark). {10} out Visual Design Principles. { - Which of the following visual elements is eoncerned with the shade of a color? a Line b.Texture c.Value d. Size 2 approach that involves creating ‘minimalistic two-dimensional v co illustrations for web and mobile interfaces. 3 © Q2 TAP ERPIatn the typefaces with their [05] (B) What do you mean by Emotio in's three levels of 05] Emotional design with a di (Q What do you mean by typi fos) a7 terminologies of Typography (©) Explain the Mental Model wit a [05] Model with different stages? if. Q.3 (A) Different between Low-fid fidelity prototypes [05] (B) What do you mean by Moo Why Use Mood Boards for UX or UI Design? [05 (©) What Is Material Design? Why Mi esign is important? [05] (©) What Is Human-centered 05) Important? BEST ¢# acess nape

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy