Wednesday, 2 September 2015

MSCIT - SEMESTER - 4 - SUMMER - 2015

PROGRAM  - Master of Science in Information Technology(MSc IT)
SEMESTER  4
SUBJECT CODE & NAME - MIT401– Data Warehousing and Data Mining


1.  Explain the Top-Down and Bottom-up Data Warehouse development Methodologies.

Despite  the  fact  that  Data  Warehouses  can  be  designed  in  a  number  of different  ways,  they  all  share  a  number  of  important  characteristics.  Most Data  Warehouses  are  Subject  Oriented.  This  means  that  the  information that  is  in  the  Data  Warehouse  is  stored  in  a  way  that  allows  it  to  be connected to objects or event, which occur in reality.

Another characteristic that is frequently seen in Data Warehouses is called Time  Variant.  A  time  variant  Data  Warehouse  will  allow  changes  in  the information to be monitored and recorded  over time. All  the programs that are used by a particular institution will be stored in                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Explain the Functionalities and advantages of Data Warehouses.


Functionality of Data Warehouses

Data  Warehouses  exist  to  facilitate  complex,  data-intensive  and  frequent adhoc  queries.  Data  Warehouses  must  provide  far  greater  and  more efficient query support than is demanded of transactional databases. Data Warehouses provide the following functionality:

Roll-up: Data is summarized with increased generalization.

Drill-down: Increasing levels of detail are revealed.

Pivot: Cross tabulation that is, rotation is performed.

Slice and Dice: Performing projection operations on the dimensions.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Describe about Hyper Cube and Multicube. 

Multidimensional  databases  can  present  their  data  to  an  application  using two types of cubes:  hypercubes and multicubes. The Hypercube is the cube with  four  Dimensions.  In  the  hypercube  model,  as  shown  in  the  following illustration,  all  data  appears  logically  as  a  single  cube.  This  intuitive representation  is  a  hypercube,  a  representation  that  accommodates  more than three dimensions.  At a lower level of simplification, a Hypercube                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  List and explain the Strategies for data reduction. 

Data  reduction  techniques  can  be  applied  to  obtain  a  reduced representation  of  the  data  set  that  is  much  smaller  in  volume,  yet  closely maintains the integrity of the original data. That is, mining on the reduced data set should be more efficient yet produce the same (or almost the same) analytical results.


Strategies for data reduction include the following:
1)  Date  cube  aggregation
2)  Dimension reduction
3)  Data  compression
4)  Numerosity  reduction
5)  Discretization  and  concept  hierarchy  generation

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Describe  K-means  method  for  clustering.  List  its  advantages  and drawbacks.

K-means

K-means  (MacQueen,  1967)  is  one  of  the  simplest  unsupervised  learning algorithms  that  solve  the  well  known  clustering  problem.  The  procedure follows a simple and easy way to classify a given data set through a certain number  of  clusters  (assume k  clusters) fixed  a  priori. The  main  idea  is to define k centroids, one for each cluster.

The  basic  step  of  k-means  clustering  is  simple.  In  the  beginning  we determine  number  of  cluster  K  and  we  assume  the  centroid  or  center  of these clusters. We can take any random                   


                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Describe about Multilevel Databases and Web Query Systems.

The  database  approaches  to  Web  mining  have  generally  focused  on techniques  for  integrating  and  organizing  the  heterogeneous  and  semistructured data on the Web into more structured and high-level collections of resources,  such  as  in  relational  databases,  and  using  standard  database querying  mechanisms  and  data  mining  techniques  to  access  and  analyze this information.

1)  Multilevel Databases

Several researchers have proposed a multilevel  database  approach to organizing  Web-based  information.  The  main  idea  behind  these proposals  is  that  the  lowest  level  of  the                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



 PROGRAM  - Master of Science in Information Technology(MSc IT)
SEMESTER  4
SUBJECT CODE & NAME - MIT4022- Network Security

1.  Describe  the  stream  and  block  encryption  with  their advantages and disadvantages.

Block based  encryption system  is classified as  stream  and block encryption system.  Stream  encryption  algorithm  convert  one  symbol  of  plaintext immediately  into  a  symbol  of  ciphertext.  (The  exception  is  the  columnar transposition cipher.) The transformation depends only on the symbol, the key, and the control information of the encipherment algorithm. A model of stream enciphering is shown in below figure

Some  kinds  of  errors,  such  as  skipping  a  character  in  the  key  during encryption,  affect  the  encryption  of  all  future  characters.  However,  such errors  can  sometimes  be  recognized  during                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2.  Compare DES and AES algorithms.

Comparison of DES and AES


DES
AES
Date
1976
1999
Block size
64 bits
128 bits
Key length
56 bits (effective length)
128, 192, 256 (and possibly more) bits
Encryption primitives
Substitution, permutation
Substitution, shift, bit mixing
                                           
                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Explain Developmental Controls and Administrative Controls. 

Developmental Controls

Software  development  is  often  considered  a  solitary  effort;  a  programmer sits with a specification or design and grinds out line after line of code. But in fact,  software  development  is  a  collaborative  effort,  involving  people  with different  skill  sets  who  combine  their  expertise  to  produce  a  working product. Development requires people who can

·         specify  the system, by capturing the requirements and building a model of how the system should work from the users' point of view
·         design  the system, by proposing a solution to the problem described by the requirements and building a model of the solution
·         implement  the system, by using the design as a blueprint for building a working solution
test  the  system,  to  ensure  that  it  meets  the  requirements  and implements the solution as                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  List all the models of security and explain any two models.

In  security  and  elsewhere,  models  are  often  used  to  describe,  study,  or  analyze  a  particular  situation  or relationship. In particular,  security  models  are  used  to  document  a  policy,  help  conceptualize  and  design  an implementation,  test  a  particular  policy  for  completeness  and  consistency,  check whether an implementation meets its requirements. We assume that some access control policy dictates whether a given user  can  access  a  particular  object.  We  also  assume  that  this  policy  is  established outside any model.
That  is,  a  policy  decision  determines  whether  a  specific  user should  have  access  to  a  specific                                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Define and explain IP security. Explain IP security architecture.

IPSec  provides connectionless, best-effort delivery of datagrams through a network  by  protecting  it  from  snooping  or  modification.  IPSec  protects  IP datagrams by defining a method of specifying the traffic to protect, how that traffic is to be protected, and to whom the traffic is sent. IPSec can protect packets  between  hosts,  between  network  security  gateways,  or  between hosts  and  security  gateways.  Since  an  IPSec-protected  datagram  is  itself just another IP packet it is possible to nest security services and provide, for example,  end-to-end  authentication  between  hosts  and  send  that                                                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Describe guard and personal firewalls.

Guard

A guard is a sophisticated firewall. Like a proxy firewall, it receives protocol data  units,  interprets  them,  and  passes  through  the  same  or  different protocol data units that achieve either the same result or  a modified result.
The  guard  decides  what  services  to  perform  on  the  user's  behalf  in accordance  with  its  available  knowledge,  such  as  whatever  it  can  reliably know of the (outside) user's identity, previous interactions, and so forth. The degree of control a guard can provide is limited only by what is computable. But  guards  and  proxy  firewalls  are  similar  enough  that  the  distinction between  them  is  sometimes  fuzzy.  That  is,  we  can  add  functionality  to  a proxy firewall until it starts to look a lot                                                                           
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


                   PROGRAM  Master of Science in Information Technology
                     SUBJECT CODE &  NAME MIT4032– Cloud Computing



1.  List and explain the services of cloud computing 
How Cloud Computing Might Move
Cloud  computing  takes  its  knocks  from  opponents  who  see  it  as  an overused phrase with no real meaning. On the other  side of the coin, there  are plenty of professionals who see the cloud as not only a useful thing, but  also  an  evolving  beast.  We  are  on  the  verge  of  Cloud  2.0.  As  cloud  computing  changes,  so  must  your  relationship  with  it.  In  this  section  we’ll  look into  our crystal balls and see where it might go. We’ll also look at the  opinions  of  researchers  who  get  paid  lots  of  money  to  make  the  right  predictions. Researchers  love  to  tell  us  what’s  going  to  happen  next  with  cloud
computing. Are they right? We don’t know, but it’s worth sharing their views.  Gartner has been especially diligent in figuring out what’s going to happen  with  cloud computing.  Salesforce.com—                                                                                             
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2. List the areas of the organization which has the effect of cloud computing and explain any two.
Sensational Feeling about Organization
The  services  which  are  provided  by  the  cloud  will  influence  your  organization either directly or indirectly. And this impact is not only for the IT  department  but  to  the  whole  company.  Cloud  computing  is  an  advance  technology which represents transformation of our entire organization  which  includes  people,  system  and  processes.  We may  have  different questions  like; the service provided by the cloud will be fit into your overall corporate  and  IT  strategy.  Whether  the  cloud                                                                          
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Explain the different Software clients. 
Software clients
Now  we  move  on  to  the  software  side,  we  find  that  software  clients  in  general can be put in one of three groups.  These different types  include (in  order from more desktop-related to more web-related):
Rich or Fat Client
Desktop  applications  connected  to  the  Internet  or  Fat  Clients  are  applications  that  make  use  of  network  support,  but  also  run  offline,  sometimes  with  limited  functionality.  Examples  are  the  e-mail  clientMicrosoft Outlook or the media player iTunes. These applications need to be  installed on the user's machine.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4. Explain the different types of data controls in cloud.
different types of data controls are given below:
  Access controls:  To  guarantee  that only those who are authorized to  access  the  data  can  do  so.  Sensitive  data  must  also  be  protected  in  storage and transfer. Encrypting the data can help to do this.
  Input validation controls:  To  confirm  that all data input to any system  or application are whole, correct, and realistic.
  Output reconciliation controls:  To ensure that data can  be reconciled from input to output.
  File controls:  To make certain that data are operated accurately in any  type of file (structured and            
                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



5.  Explain (a) Open Cloud Consortium (OCC) (b) Open Grid Forum (OGF).
Open Cloud Consortium (OCC)
The OCC (www.opencloudconsortium.org) was formed in 2008. One of its goals is to support the development of standards for cloud computing and  frameworks for interoperating between clouds. Members include Cisco and  Yahoo  as  well  as  a  number  of  universities  including  North  western.  The
OCC  has  a  number  of  working  groups.  Two  in  particular  deal  with  cloud  standards:
Working Group  on  Standards  and  Interoperability  for  Clouds  that  Provide On-Demand Computing Capacity: The focus for this group is on developing  standards  for  interoperating                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  What are the most popular cloud applications? 
most popular cloud applications out there.
Apple  Mobile  Me  (http://www.me.com/)  this  service  synchronizes  emails, photos,  and  contacts  among  multiple  devices. Your  computer,  laptop, and  mobile devices can remain in sync as long as they have access to Apple’s  cloud servers. Google  Docs  (http://docs.google.com/)  providing  an  intuitive  interface,
Google  Docs  provides  applications  that  you  normally  associate  with  the  desktop  a  word  processor,  spreadsheet,  and  presentation  designer.
Documents  can  be  saved  to  the  cloud  or  locally.  Multiple  users  can  collaborate  on the  same  document from  different computers  with  changes  taking effect instantly.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



No comments:

Post a Comment