image

Solution of Assignment Synopsis & Project Dissertation Report


Note: ⇩    Fill the Name, Email and Mobile to get unlock the priclist...!!!!



Online-Typing-and-Filling

Title Name Wireless Communication and Network Security Solved Assignment for Amity better grades and marks in Delhi Noida Mumbai Faridabad and Ghaziabad India
University AMITY
Service Type Assignment
Course B.C.A
Semester Semester-V Course: B.C.A
Session
Short Name or Subject Code Wireless Communication & Network Security
Commerce line item Type Semester-V Course: B.C.A
Product Assignment of B.C.A Semester-V (AMITY)
Price

PRICE INR

Click to View Price
Download Question File
Download Answer File 572645328198.docx (Purchase the product for download...!!!)

Questions:-


Wireless Communication & Network Security

 

Assignment A

 

  1. 1. Identify the five components of data communication system? What is the difference between half-duplex and full-duplex transmission modes? Name the four basic network topologies, and cite an advantage of each type.

Answer:-  

  1. Define analog transmission? Define analog to analog conversion.

Answer:-  

  1. Define digital to analog conversion. Which of the four digital to analog conversion technique is most susceptible to noise? Defend your answer.

Answer:-

  1. How do guided media differ from unguided media? What are the three major classes of guided media? Name the advantages of optical fibre over twisted–pair and coaxial cable?

Answer:-

  1. Compare and contrast error control and flow control. What are the three protocols used for error control for noisy channels?

Answer:-

  1. State and explain adaptive and non-adaptive routing algorithms.

Answer:-

  1. What are the characteristics of CSMA/CD? Explain Token bus and Token ring standards.

Answer:- 

  1. What is TCP/TP model and explain function of each layer. Compare the TCP header and UDP header. List the fields in the TCP header that are missing from UDP header. Give the reason for their absence.

Answer:-

Solve by www.solvezone.in contact for more details at 8882309876

Assignment B

Case Detail:

Being a network administrator in XYZ bank, it so happened that a hacker stole sensitive business information, an employee opened an attachment with a virus that badly damaged your system and online bank password or credit card info is stolen using spyware?

  1. In view of the situation explained above, design robust firewalls with a secure network design to keep hackers at bay and implement a business continuity solution in case of an attack.

Answer:-

Assignment C

Question No.  1           Marks - 10

SQL helps to find _______.  

Options          

  1. the interesting data
  2. hidden information
  3. intermediate data
  4. data under constraints that are already known

Question No.  2           Marks - 10

A data warehouse is which of the following?

Options          

  1. Can be updated by end users.
  2. Contains numerous naming conventions and formats.
  3. Organized around important subject areas.
  4. Contains only current data.

Question No.  3           Marks - 10

The partition of overall data warehouse is _______.

Options          

  1. database
  2. data cube.
  3. data mart.
  4. operational data

Question No.  4           Marks - 10

OLAP is used to explore the ___________ knowledge.       

Options          

  1.  
  2.  
  3.  
  4.  

Question No. 5            Marks - 10

The decision support system is used only for _______.        

Options          

  1.  
  2.  
  3.  
  4.  

Question No. 6            Marks - 10

________ is a creative activity that has to be performed repeatedly in order to get best result        

Options          

  1. Cleaning
  2. Reporting
  3. Coding
  4. Selection

Question No.  7           Marks - 10

In K-nearest neighbor algorithm K stands for ________.     

Options          

  1. number of neighbors that are investigated.
  2. number of iterations
  3. number of total records.
  4. random number.

Question No.  8           Marks - 10

Genetic algorithm was proposed by _______.          

Options          

  1.  
  2. John Holland.
  3.  
  4.  

Question No.  9           Marks - 10

The set of attribute in a database that refers to data in another table is called ______.        

Options          

  1. primary key.
  2. candidate key.
  3. foreign key.
  4. super key.

Question No.  10         Marks - 10

In KDD and data mining, noise is referred to as ________. 

Options          

  1. repeated data.
  2. complex data.
  3. meta data.
  4. random errors in database

Question No.  11         Marks - 10

A coding operation in which an attribute with cardinality n is replaced by n binary attributes is called as ______.           

Options          

  1. falsification of table
  2. enrichment of table.
  3. flattening of table.
  4. fuzzification of table.

Question No.  12         Marks - 10

______ itself has become a production factor of importance.           

Options          

  1.  
  2.  
  3.  
  4.  

Solve by www.solvezone.in contact for more details at 8882309876

Question No.  13         Marks - 10

Data mining is used to refer ______ stage in knowledge discovery in database.     

Options          

  1.  
  2.  
  3.  
  4.  

Question No.  14         Marks - 10

__________________refers to the process of deriving high-quality information from text.           

Options          

  1. Text Mining.
  2. Image Mining.
  3. Database Mining.
  4. Multimedia Mining.

Question No.  15         Marks - 10

_____________ is the application of data mining techniques to discover patterns from the Web.  

Options          

  1. Text Mining
  2. Multimedia Mining.
  3. Web Mining
  4. Link Mining.

Question No.  16         Marks - 10

AI stands for ____.    

Options          

  1. art of interest.
  2. artificial interest.
  3. art of intelligence
  4. artificial intelligence.

Question No.  17         Marks - 10

The algorithms that are controlled by human during their execution is _______ algorithm.           

Options          

  1.  
  2.  
  3. batch learning.
  4.  

Question No.  18         Marks - 10

A snowflake schema is which of the following types of tables?       

 Options         

  1. Fact
  2. Dimension
  3. Helper
  4. All of the above

Question No.  19         Marks - 10

Fact tables are which of the following?         

 Options         

  1. Completely denormalized
  2. Partially denormalized
  3. Completely normalized
  4. Partially normalized

Question No.  20         Marks - 10

Data transformation includes which of the following?         

 Options         

  1. A process to change data from a detailed level to a summary level
  2. A process to change data from a summary level to a detailed level
  3. Joining data from one source into various sources of data
  4. Separating data from one source into various sources of data

Question No.  21         Marks - 10

The _______ data are stored in data warehouse.       

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  22         Marks - 10

A ______ is not the rule that govern the basic structure of data warehouse.

 Options         

  1. time dependent.
  2.  
  3. subject oriented.
  4.  

Question No.  23         Marks - 10

A collection of interesting and useful patterns in database is called _______.         

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  24         Marks - 10

SQL stands for ________.     

 Options         

  1. simple query language.
  2. structured query language.
  3. strong query language.
  4. simple language.

Question No.  25         Marks - 10

_______ is used to find relationship between multidimensional data.         

 Options         

  1. K-nearest neighbor
  2. Decision trees.
  3. Association rules.
  4. OLAP tools.

Question No.  26         Marks - 10

Association rules are always defined on________.  

 Options         

  1. binary attribute.
  2. single attribute.
  3. relational database.
  4. multidimensional attribute.

Question No.  27         Marks - 10

________analysis divides data into groups that are meaningful, useful, or both.    

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  28         Marks - 10

Which of the following is the not a types of clustering?       

 Options         

  1. Which of the following is the not a types of clustering?
  2.  
  3.  
  4.  

Question No.  29         Marks - 10

Data compression is to compress the given data by encoding in terms of _________.        

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  30         Marks - 10

Dimensionality reduction reduces the data set size by removing _________.         

 Options         

  1. relevant attributes.
  2. irrelevant attributes.
  3. derived attributes.
  4. composite attributes.

Question No.  31         Marks - 10

Capability of data mining is to build __________ models.   

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  32         Marks - 10

The terms equality and roll up are associated with___________.    

 Options         

  1. data mart.
  2.  
  3.  
  4. decision tree.

Question No.  33         Marks - 10

Discovery of cross-sales opportunities are called_________.          

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  34         Marks - 10

Which of the following is not a decision tree node? 

 Options         

  1. Root node.
  2. Internal node.
  3. Leaf node.
  4. predicted node.

Question No.  35         Marks - 10

Which of the following is not a data mining attribute?         

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  36         Marks - 10

Nominal and ordinal attributes are collectively referred to as_________ attributes.

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  37         Marks - 10

___________ is used for discrete target variable.     

 Options         

  1.  
  2.  
  3.  
  4.  

Question No.  38         Marks - 10

Binary attribute are    

 Options         

  1. This takes two values ´0´ and ´1´
  2. the natural environment of a certain species
  3. systems that can be used without knowledge of internal operations
  4. none of these

Question No.  39         Marks - 10

The task of correcting and preprocessing data is called ____________.      

 Options         

  1. data analysis
  2. data processing
  3. data cleansing
  4. data mining

Question No.  40         Marks - 10

A schema with a fact table, multiple dimensional table and foreign keys from the fact table to the dimension table is called a ____________.        

 Options         

  1. sub schema
  2. logical schema
  3. snowflake schema
  4. star schema


Questions:-



Only after making the payment you would be able to see the answer...!!!

Review

Average user rating

4.8 / 5

Rating breakdown

5
80% Complete (danger)
1
4
80% Complete (danger)
1
3
80% Complete (danger)
0
2
80% Complete (danger)
0
1
80% Complete (danger)
0

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

09-Apr, 2018
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.