ASSIGNMENT
DRIVE
SPRING 2019
PROGRAM
MASTER OF COMPUTER APPLICATION
SEMESTER
V
SUBJECT
CODE & NAME MCA5133 –OPEN SOURCE DB SYSTEMS
Assignment
Set -1
Q.1 Explain ACID properties in
transaction management. 2.5x4
Answer :
ACID properties
in transaction management :
Transaction
is an event which reads or writes a value on the database. Every transaction
must adhere to four properties. Taking their initials letters collectively
known as ACID properties. These properties are,
1.
Atomicity: A transaction is an atomic unit of data processing i.e. it is
either performed in its entirety or not performed at all.
2.
Consistency preservation: A transaction is consistency preserving. That
means complete execution of a transaction takes the database from one
consistent state to another.
3.
Isolation: A transaction should appear as though it is being executed in
isolation from other transactions. That is, the execution of a transaction
should not be interfered with by any other transactions executing
Q.2 What are the key issues one has
to keep in mind while choosing open source software? 10
Answer :
Key issues one
has to keep in mind while choosing open source software :
A
developer chooses an open source or free software license depending on the
situation. The developer may not carefully choose the license. Every license
has its own advantages and disadvantages. Developer selects the license
depending on the circumstance under which he has to operate the project. The
Q.3 Explain Relational algebra
operations in detail. 10
Answer:
Relational
algebra operations :
In
addition to defining the database structure and constraints, a data model must
include a set of operations to manipulate the data. A basic set of relational
model operations constitute the relational algebra. These operations enable the
user to specify basic retrieval requests. A sequence of relational algebra
operations forms a relational algebra expression, whose result will also be a
relation. The
Assignment
Set -2
Q.1 Differentiate between PHP
variables and constants. Also, explain PHP magic constants. 5+5
Answer :
PHP
Variable :
Variables
are used to store information in a PHP program. There are certain rules for
creating variables in PHP. They are,
·
Variable names must begin with a letter
or underscore character.
·
A variable name cannot use
Q.2 Explain inheritance in
PostgreSQL and mention its limitations.
5+5
Answer:
Inheritance in
PostgreSQL :
Inheritance
is the property in which one table acquires or inherits the properties of
another table. This is a concept from object-oriented database. Let's create
two tables: A table Bank and a table Branches. Naturally, Branches are also
Banks, so we need a way to show the Branches implicitly when we list all Banks.
Consider the example given below,
CREATE TABLE
Q.3
Explain about Data management in InnoDB. 4x2.5
Answer :
Data management
in InnoDB :
InnoDB
uses B+tree structure. In this tree, the inner nodes do not contain data, and
the leaves are connected to both directions, to the predecessor and the
successor. A B+tree is particularly efficient when data doesn’t fit in memory
and must be read from the disk, as it ensures that a fixed maximum number of
reads would be required to access any data requested, based only on the depth
of the tree. Every InnoDB table has a special index called the clustered index
where the data for the rows is stored. Typically, the clustered index is
synonymous with the
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
ASSIGNMENT
DRIVE
SPRING 2019
PROGRAM
MASTER OF COMPUTER APPLICATION
SEMESTER
V
SUBJECT
CODE & NAME MCA5142 Cryptography and Network Security
Assignment
Set -1
Q.1 What are the two requirements
for symmetric key encryption? 4
Describe the dimensions used to
characterize the cryptographic systems
6
Answer :
Cryptographic systems
are characterized along three independent dimensions:
1.
The type of operations used for transforming plaintext to cipher text. All
encryption algorithms are based on two general principles: substitution, in
which each element in the plaintext (bit, letter, group of bits or letters) is
mapped into another element, and transposition, in which elements in the
plaintext are rearranged. The fundamental requirement is that no information be
lost (i.e., that all operations are reversible). Most systems, referred to as
product systems , involve
Q.2 Describe the following : 4x2.5
a) Asymmetric Keys
b) Public Key Certificate
c) Public Key (Asymmetric) Cryptographic
Algorithm
d) Public Key Infrastructure
Answer :
Asymmetric Key :
Asymmetric
keys are the foundation of Public Key Infrastructure (PKI) a cryptographic
scheme requiring two different keys, one to lock or encrypt the plaintext, and
one to unlock or decrypt the cyphertext. Neither key will do both functions.
One key is published (public key) and the other is kept private (private key).
If the lock/encryption key is the one published, the system enables private
communication from the public to the unlocking key's owner. If the
unlock/decryption key is the one published,
Q.3 List and explain two categories
of attacks on hash functions. 2+8
Answer
:
Hashing is, simply
put, taking an input string of any length and giving out an output of a fixed
length.
Cryptographic hashing
refers a special class of hash functions with set properties. To be considered
secure, a cryptographic hash function needs to include properties such as
always getting a consistent result irrespective of how many times you parse
through an input, quick computation, and pre
Assignment
Set -II
Q.1 Describe the three types of
attacks on digital signatures. Also explain different The types of forgery 6+4
Answer
:
Message authentication protects two parties who exchange messages from any third party. However, it does notprotect the two parties against each other. Several forms
of dispute between the two
Q.2 Discuss the distribution of
public keys using following methods:
a) Public announcement 5
b)
Public-key authority 5
Answer
:
Public
Announcement of Public Keys :
Q.3 List and explain the different
techniques used for ensuring non guessable passwords. 2+8
Answer :
In
an exhaustive or brute force attack, the attacker tries all possible passwords,
usually in some automated fashion. Of course, the number of possible passwords
depends on the implementation of the particular computing system. For example,
if passwords are words consisting of the
26
characters A–Z and can be of any length from 1 to 8 characters, there are 261
passwords of 1 character, 262 passwords of 2 characters,
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
·
No comments:
Post a Comment