Some of the questions don't have answers at the moment. Please add if you know the answer. Thank you. Ask question Search Order By: ActiveTagClear Filter 0 Votes 1 Ans Describe the waterfall model and evolutionary process model. 124 viewsAnonymous Posted new comment 1 day agosepm 0 Votes 0 Ans What are the Agile Methodologies? Explain any of them. 102 viewsAnonymous Posted new comment 1 day agosepm 0 Votes 0 Ans Develop the SRS of University Management system. 110 viewsAnonymous Posted new comment 1 day agosepm 0 Votes 1 Ans compare FTR and walkthrough sepm 278 viewsAnonymous Posted new comment 1 day agosepm Software Engineering and Project Management 0 Votes 0 Ans Explain software reverse engineering in detail. 59 viewsAnonymous Posted new comment 1 day agosepm 0 Votes 0 Ans Elaborate COCOMO model for Cost estimation. 211 viewsAnonymous Posted new comment 1 day agosepm 0 Votes 0 Ans Q4 b) Explain the user interface design in detail with examples. 81 viewsAnonymous Posted new comment 1 day agosepm 0 Votes 1 Ans Explain with suitable example how the Term Frequency Solved856 viewsTeam Selected answer as best 1 day agoai-ds DAV 0 Votes 2 Ans d. List and explain security requirements of database. 588 viewsTeam Changed status to publish 3 days agocss 0 Votes 1 Ans CSS – Cryptography & System Security IMP Questions for IA 2 221 viewsTeam Answered question 3 days agoCryptography & System Security css 0 Votes 1 Ans Explain digital  signature scheme RSA. 601 viewsTeam Answered question 3 days agoai-ds css 0 Votes 1 Ans User A and B want to use RSA to communicate securely 1.13K viewsTeam Answered question 3 days agoai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 577 viewsTeam Answered question 3 days agoai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 932 viewsSupriya Birajdar Answered question 3 days agoai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved574 viewsTeam Selected answer as best 3 days agoai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 434 viewsTeam Changed status to publish 3 days agoai-ds css 1 Votes 1 Ans short note on DNS attack 572 viewsTeam Posted new comment 3 days agoai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved301 viewsTeam Selected answer as best 3 days agoai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 1.07K viewsTeam Answered question 4 days agoai-ds css 0 Votes 1 Ans Briefly explain database security. 752 viewsTeam Posted new comment 4 days agoai-ds css 1 2 … 5 6 Doubtly is an online community for engineering students, offering:Free viva questions PDFsPrevious year question papers (PYQs)Academic doubt solutionsExpert-guided solutions Leader boardAjink Gupta64 PointsSupriya Birajdar60 PointsHarsh Jagtap25 PointsROHITH HARIDAS18 PointsAbhinay bharath Oguri12 PointsUnanswered Questions Q4 b) Explain the user interface design in detail with examples. 0 Answers | 0 Votes Explain software reverse engineering in detail. 0 Answers | 0 Votes Develop the SRS of University Management system. 0 Answers | 0 Votes What are the Agile Methodologies? Explain any of them. 0 Answers | 0 Votes Elaborate COCOMO model for Cost estimation. 0 Answers | 0 Votes