Sem 7-Endsem Paper

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Total No.

of Printed Pages: 2
PRN No. PAPER
2201099 2 CODE U473- 251 (FsE)
DECEMBER 2023 (ENDSEM) EXAM
B.TECH (SEMESTER- I)
COURSE NAME DATA SCIENCE AND ANALYTICS
COURSE CODE ITUA40201
(PATTERN 2020)

Time: [1 Hr. 30 Min] [Max. Marks: 40]


Instructions to candidates:
1) Figures to the right indicate full marks.
2) Use of scientific calculator is allowed
3) Use suitable data wherever required
4) All questions are compulsory. Solve any one sub question from Question 3 and any two sub
questions each from Questions 4,5 and6 respectively.
Q. No. Question Description Max. CO BT
Marks |mapped Level

Q.1 a) Classify digital data into different types [2] 2

Q2 a) Differentiate between data discovery and data visualization. [2] 2 4

Q3.. a) Compare between Properties of data attribute. [6] 3 4

b) Discuss different types of datasets used in data analytics.


[6] 3 2

Q.4 a) Differentiate between Parametric and Nonparametric tests 4 4


in Hypothesis testing

b) Suppose a data set consists of the following observations:


0.32 0.53 0.28 0,37 0.47 0.43 0.36 0.42 0.38 0.43. [5] 4 5

Evaluate
mean

ii) median
ii) mode

c) Evaluate the variance of the data 3, 4, 5, 6, 6,


and 7, [5] 4 5
representing the number of trout caught by a random sample
of 6 fishermen on June 19, 1996, at Lake
Muskoka
5 4
Q.5 a) Explain Different steps in multiplicative seasonal 5]
adjustment
5 4
b) Differentiate variables related to segment and variable 5]
markets

5 4
c) Identify different situations in which A/B testing is valuable (5]
6 4
Q.6): a) Justify use of NLPin Speech Recognition [5]

6 4
b) Difference between matplotlib and Numpy libraries in (5)
Python

[5| 6 4
c) Compare HDFS and Map Reduce components of Hadoop
Ecosystem

Notes: BT Levels 1: REMEMBER 2: UNDERSTAND 3: APPLY 4: ANALYZE 5:

EVALUATE 6: CREATE]
Total No. of Printed Pages: 2
PRN No. PAPERCODE
22010992. |U473-252(Ei)
DECEMBER 2023 (ENDSEM) EXAM
BTECH (INFORMATION TECHNOLOGY) (SEMESTER - 1)
COURSE NAME:ETHICAL HACKING AND NETWORK SECURITY
COURSE CODE: ITUA40202C
(PATTERN 2020)
Time: [1Hr. 30 Min] Max. Marks: [40]
Instructions to candidates:
1) Figures to the right indicate full marks.
2) Use of scientific calculator is allowed
3) Use suitable data wherever required
4) All questions are compulsory. Solve any one sub question from Question 3 and any two sub
questions each from Questions 4,5 and 6 respectively.

|Q. No. Question Description Max. CO BT


Marks mapped Level

Q.1 a) Explain the importance of ethical hacking. (2) 1 2

2] 2 2
Q2 a)Write a short note on Threat modeling.

03.-al Describe the different WEP Vulnerabilities and compare it [6] 3 3

with VOIP vulnerabilities.

2
b) What are Honeypots and explain IDS/IPS with applications. [6] 3

0.4- a) Ilustrate different Network Security fundamentals aspects [5] 4 3

with it's need.

Stream [5] 3
b) What is cryptography? compare Block cipher with
Cipher.
4 2
[5)
c) Explain the working of AES.
5 2
Euler's theorem with [5)
Q.5 a) Explain public key cryptography and
example.
3
5
MD5 and SHA (5]
b)What is message digest? Distinguish between
1.
c)Using the RSA algorithm to encrypt the plaintext"3" use the (5| 4

following parameters p=11, q-3, e=13.

Q.6)· a) Differentiate between Steganography and Cryptography. [5] 6 4

b) Using Difie-Hellman Key Exchange algorithm assume Alice (5 6 4


and Bob have chosen prime valueq= 17 and primitive root=
5. If Alice's secret key is 4 and Bob's secret key is 6, Find out
the secret key they exchanged?
5] 6 3
c) Explain the operation of DES algorithm in detail.
Total No. of Printed Pages:
PRN No, PAPER
22010992. CODE

December 2023 (END SEM) EXAM


v473-213<(p)
B. TECH (SEMESTER- I)
COURSE NAME: Data Centric AI Branch: All Branches COURSE CODE: IOEUA40203C
(PATTERN 2020)
Time: [1Hr. 30 Min] [Max. Marks: 40j
() Instructions to candidates:
1) Figures to the right indicate full marks.
2) Use of scientiic calculator is allowed
3) Use suitable data wherever required
4) Al questions are compulsory. Solve any one sub question from Question 3 and any two sub
questions each from Questions 4,5 and 6 respectively.
R. No.Question Description Max. CO BT Level
Marks mapped

Q.1 a) Explain Model-Centric AI in brief. [2 CO1 Understand

Q2 a) Explain Data-Centric Al in brief. [2


Understand
CO1

Q3. a) What are phases of Data-Centric AI [6] CO2 Understand

b) Why there is need for Paradigm shift from Model [6] CO2 Analyze
CentricAI to Data-Centric AI.
Q.4- a) What are various Data Pr-processing Techniques? (5] CO3 Understand
b)How data labeling is done for large scale of data ? (5) CO3 Analyse
) In which AI Learning Techniques data labeling is [5] CO4 Analyse
required?
Explain Why?
Q.5. a) What is Data Augmentation? [5] C04 Understand
Analyse
b)Why Data Augmentation is required? [5] CO4 Analyse
c) Discuss trade-off for Data Augmentation if any? [5 CO4
Q.6)aWhat do you mean by Technical Debt? How to avoid it? |5 CO6 Analyze
Analyze
b)What precautions should be taken before Data CO6
Deploymernt? Analyze
(5] CO6
c)What are the benefits and challenges of Data-Centric
Total No. of Printed Pages: 02
PRN No. PAPER CODE
220 o99 22
DECEMBER 2023 (ENDSEM) EXAM
V473-255A (PE)
B. TECH (CE/IT/E&TC/Al&c DS) (SEMESTER - I)
COURSE NAME: SOCIAL MEDIA ANALYTICs
COURSE CODE: IOEUA40204A
(PATTERN 2020)
Time: [IHr. 30 Min] [Max. Marks: 401
Instructions to candidates:
1) Figures to the right indicate full marks.
2) Use of scientific calculator is allowed
3) Use suitable data wherever required
4) All questions are compulsory. Solve any one sub question from Question 3 and any two sub
questions each from Questions 4,5 and 6 respectively.

Q. No. Question Description Max. CO BT


Marks mapped Level
Q.1 Illustrate the relevance of em ploying standard datasets and the (2] 1 2
different data formats in the realm of Social Media Analytics.
Q.2 Enumerate and claborate on the tools frequently utilized for 2 2 2
Data Visualization, emphasizing tihcir application in the realm
of Social Media Analytics.
Q.3 a) Illustrate with examples how Data mining algorithms are [6] 3
specifically utilized in different scenarios to extract insights
and patterns from datasets.

b) Analyze how thc Naive Bayes Algorithm is applied in the |6] 3 3


context of text classification or sentiment analysis in social
media.
Q.4 a) Design a hypothetical social nctwork scenario and explain 5] 4 3
which centrality measure(s) would be most appropriate for
identifying influential nodes within thc nctwork.

b) Imagine you are tasked with analyzing a social network 4 3


comprising diflerent communilies. Discuss how you would
employ various centrality mcasures (such as Degree Centrality,
Eigenvector Centrality, and Betwcenness Centrality) to identify
key individuals bridging these communities.

) Examine the distinctive characteristics and applications of [5] 4 3


Degree Centrality, Eigenvcctor Centrality, and PageRank
algorithms in the context of social network analysis.
Q.5 a) Create a simulation-based collcctive bchavior analysis model (5] 5 3
focusing on a specific social sccnario (c.g., information
dilusion, opinion formation) Develop the strueture, rules, and
interactions among individuals withìn the model.
b) Develop a novel algonthm that integrates individual
behavior (5) 5 3
analysis and collective bchavior modeling to predict the
emergene of trends in onine sociai networks.

) Develop a predictive model uilang individual and


collective
behavior analvsis to forccast consumer bclhavior trends for an
5 3

e commerce platform.
Q.6a) Compare and contrast the mining techniques and data |5] 6
sCquisition methodologies betwen Twitter and Facebook
platforms for social media analysis.
b) Examine the strategic differences and implications in 15) 6 4
leveraging Twitter's AP) versus uilizing Facebook's Social
Graph APls for social media rnining and analysis.

c Critically evaluate the privacy and cthical considerations 6


associated with data extracion from Twitler and Facebook
platforms.

Note: BT levcl - . Remember 2. Understand 3. Apply 4. Analyze 5. Evaluate 6.


Createl

You might also like