PROGRAM - Master
of Science in Information Technology(MSc IT)
SEMESTER 4
SUBJECT CODE & NAME - MIT401– Data Warehousing and
Data Mining
1. Explain the Top-Down and
Bottom-up Data Warehouse development Methodologies.
Despite the
fact that Data
Warehouses can be
designed in a
number of different ways,
they all share
a number of
important characteristics. Most Data
Warehouses are Subject
Oriented. This means
that the information that is in the
Data Warehouse is
stored in a
way that allows
it to be connected to objects or event, which occur
in reality.
Another
characteristic that is frequently seen in Data Warehouses is called Time Variant.
A time variant
Data Warehouse will
allow changes in the
information to be monitored and recorded
over time. All the programs that
are used by a particular institution will be stored in
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Explain the Functionalities and
advantages of Data Warehouses.
Functionality of Data Warehouses
Data Warehouses
exist to facilitate
complex, data-intensive and
frequent adhoc queries. Data
Warehouses must provide
far greater and
more efficient query support than is demanded of transactional
databases. Data Warehouses provide the following functionality:
Roll-up: Data is
summarized with increased generalization.
Drill-down:
Increasing levels of detail are revealed.
Pivot: Cross
tabulation that is, rotation is performed.
Slice and Dice:
Performing projection operations on the dimensions.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Describe about Hyper Cube and
Multicube.
Multidimensional databases
can present their
data to an
application using two types of
cubes: hypercubes and multicubes. The
Hypercube is the cube with four Dimensions.
In the hypercube
model, as shown
in the following illustration, all
data appears logically
as a single
cube. This intuitive representation is
a hypercube, a
representation that accommodates
more than three dimensions. At a
lower level of simplification, a Hypercube
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. List and explain the Strategies
for data reduction.
Data reduction
techniques can be
applied to obtain
a reduced representation of
the data set
that is much
smaller in volume,
yet closely maintains the integrity
of the original data. That is, mining on the reduced data set should be more
efficient yet produce the same (or almost the same) analytical results.
Strategies for data
reduction include the following:
1) Date
cube aggregation
2) Dimension reduction
3) Data
compression
4) Numerosity
reduction
5) Discretization and
concept hierarchy generation
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Describe K-means
method for clustering.
List its advantages
and drawbacks.
K-means
K-means (MacQueen,
1967) is one of the
simplest unsupervised learning algorithms that
solve the well
known clustering problem.
The procedure follows a simple
and easy way to classify a given data set through a certain number of
clusters (assume k clusters) fixed a
priori. The main idea
is to define k centroids, one for each cluster.
The basic
step of k-means
clustering is simple.
In the beginning
we determine number of
cluster K and
we assume the
centroid or center
of these clusters. We can take any random
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Describe about Multilevel Databases
and Web Query Systems.
The database
approaches to Web
mining have generally
focused on techniques for
integrating and organizing
the heterogeneous and
semistructured data on the Web into more structured and high-level
collections of resources, such as
in relational databases,
and using standard
database querying mechanisms and
data mining techniques
to access and
analyze this information.
1) Multilevel Databases
Several
researchers have proposed a multilevel
database approach to organizing Web-based
information. The main
idea behind these proposals is
that the lowest
level of the
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
PROGRAM -
Master of Science in Information Technology(MSc IT)
SEMESTER 4
SUBJECT CODE & NAME - MIT4022- Network Security
1. Describe the
stream and block
encryption with their advantages and disadvantages.
Block based encryption system is classified as stream
and block encryption system.
Stream encryption algorithm
convert one symbol
of plaintext immediately into
a symbol of
ciphertext. (The exception
is the columnar transposition cipher.) The
transformation depends only on the symbol, the key, and the control information
of the encipherment algorithm. A model of stream enciphering is shown in below
figure
Some kinds
of errors, such
as skipping a
character in the
key during encryption, affect
the encryption of
all future characters.
However, such errors can
sometimes be recognized
during
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Compare DES and AES algorithms.
Comparison of DES and AES
|
|
DES
|
AES
|
|
Date
|
1976
|
1999
|
|
Block size
|
64 bits
|
128 bits
|
|
Key length
|
56 bits (effective length)
|
128, 192, 256 (and possibly more) bits
|
|
Encryption primitives
|
Substitution, permutation
|
Substitution, shift, bit mixing
|
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Explain Developmental Controls
and Administrative Controls.
Developmental Controls
Software development
is often considered
a solitary effort;
a programmer sits with a
specification or design and grinds out line after line of code. But in
fact, software development
is a collaborative
effort, involving people
with different skill sets
who combine their
expertise to produce
a working product. Development
requires people who can
·
specify
the system, by capturing the requirements and building a model of how
the system should work from the users' point of view
·
design
the system, by proposing a solution to the problem described by the
requirements and building a model of the solution
·
implement
the system, by using the design as a blueprint for building a working
solution
test the
system, to ensure
that it meets
the requirements and implements the solution as
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. List all the models of security
and explain any two models.
In security and
elsewhere, models are
often used to
describe, study, or
analyze a particular
situation or relationship. In
particular, security models
are used to
document a policy,
help conceptualize and
design an implementation, test a particular
policy for completeness
and consistency, check whether an implementation meets its
requirements. We assume that some access control policy dictates whether a
given user can access a
particular object. We
also assume that
this policy is
established outside any model.
That is,
a policy decision
determines whether a
specific user should have
access to a
specific
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Define and explain IP security.
Explain IP security architecture.
IPSec
provides connectionless, best-effort delivery of datagrams through a
network by protecting
it from snooping
or modification. IPSec
protects IP datagrams by defining
a method of specifying the traffic to protect, how that traffic is to be
protected, and to whom the traffic is sent. IPSec can protect packets between
hosts, between network
security gateways, or
between hosts and security
gateways. Since an
IPSec-protected datagram is
itself just another IP packet it is possible to nest security services
and provide, for example, end-to-end authentication between
hosts and send
that
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Describe guard and personal
firewalls.
Guard
A guard is a
sophisticated firewall. Like a proxy firewall, it receives protocol data units,
interprets them, and
passes through the
same or different protocol data units that achieve
either the same result or a modified
result.
The guard
decides what services
to perform on
the user's behalf
in accordance with its
available knowledge, such
as whatever it
can reliably know of the
(outside) user's identity, previous interactions, and so forth. The degree of
control a guard can provide is limited only by what is computable. But guards
and proxy firewalls
are similar enough
that the distinction between them
is sometimes fuzzy.
That is, we
can add functionality
to a proxy firewall until it
starts to look a lot
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
SUBJECT CODE & NAME MIT4032–
Cloud Computing
1. List and explain the services
of cloud computing
How Cloud
Computing Might Move
Cloud computing
takes its knocks
from opponents who
see it as an overused
phrase with no real meaning. On the other
side of the coin, there are
plenty of professionals who see the cloud as not only a useful thing, but also
an evolving beast.
We are on
the verge of
Cloud 2.0. As
cloud computing changes,
so must your
relationship with it.
In this section
we’ll look into our crystal balls and see where it might go.
We’ll also look at the opinions of
researchers who get
paid lots of
money to make
the right predictions. Researchers love
to tell us
what’s going to
happen next with
cloud
computing.
Are they right? We don’t know, but it’s worth sharing their views. Gartner has been especially diligent in
figuring out what’s going to happen with cloud computing. Salesforce.com—
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. List the areas of the organization which has the effect of cloud
computing and explain any two.
Sensational Feeling about
Organization
The services
which are provided
by the cloud
will influence your organization
either directly or indirectly. And this impact is not only for the IT department
but to the
whole company. Cloud
computing is an
advance technology which
represents transformation of our entire organization which includes people,
system and processes.
We may have different questions like; the service provided by the cloud will
be fit into your overall corporate and IT
strategy. Whether the
cloud
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Explain the different Software
clients.
Software clients
Now we
move on to
the software side,
we find that
software clients in general
can be put in one of three groups. These
different types include (in order from more desktop-related to more
web-related):
Rich or Fat Client
Desktop applications
connected to the
Internet or Fat
Clients are applications
that make use
of network support,
but also run
offline, sometimes with
limited functionality. Examples
are the e-mail
clientMicrosoft Outlook or the media player iTunes. These applications
need to be installed on the user's
machine.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. Explain the different types of data controls in cloud.
different types of data controls are given below:
Access controls: To
guarantee that only those who are
authorized to access the
data can do
so. Sensitive data
must also be
protected in storage and transfer. Encrypting the data can
help to do this.
Input validation controls: To
confirm that all data input to
any system or application are
whole, correct, and realistic.
Output reconciliation controls: To ensure that data can be reconciled from input to output.
File controls: To make certain that data are operated
accurately in any type of file
(structured and
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Explain (a) Open Cloud
Consortium (OCC) (b) Open Grid Forum (OGF).
Open Cloud Consortium (OCC)
The OCC
(www.opencloudconsortium.org) was formed in 2008. One of its goals is to
support the development of standards for cloud computing and frameworks for interoperating between clouds.
Members include Cisco and Yahoo as
well as a
number of universities
including North western.
The
OCC has
a number of working groups.
Two in particular
deal with cloud standards:
Working
Group on
Standards and Interoperability for
Clouds that Provide On-Demand Computing Capacity: The
focus for this group is on developing standards for
interoperating
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. What are the most popular cloud
applications?
most popular cloud applications
out there.
Apple Mobile
Me (http://www.me.com/) this
service synchronizes emails, photos, and
contacts among multiple
devices. Your computer, laptop, and mobile devices can remain in sync as long as
they have access to Apple’s cloud
servers. Google Docs (http://docs.google.com/) providing
an intuitive interface,
Google Docs
provides applications that
you normally associate
with the desktop
a word processor,
spreadsheet, and presentation
designer.
Documents can
be saved to the cloud
or locally. Multiple
users can collaborate
on the same document from
different computers with changes taking effect instantly.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
No comments:
Post a Comment