Some of the questions don't have answers at the moment. Please add if you know the answer. Thank you. Team679 This account on Doubtly.in is managed by the core team of Doubtly. QuestionsAnswersReputations 0 Votes 2 Ans d. List and explain security requirements of database. 554 viewsTeam Changed status to publish 1 day agocss 0 Votes 1 Ans CSS – Cryptography & System Security IMP Questions for IA 2 212 viewsTeam Answered question 2 days agoCryptography & System Security css 0 Votes 1 Ans Explain digital signature scheme RSA. 586 viewsTeam Answered question 2 days agoai-ds css 0 Votes 1 Ans User A and B want to use RSA to communicate securely 1.09K viewsTeam Answered question 2 days agoai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 554 viewsTeam Answered question 2 days agoai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 892 viewsSupriya Birajdar Answered question 2 days agoai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved563 viewsTeam Selected answer as best 2 days agoai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 401 viewsTeam Changed status to publish 2 days agoai-ds css 1 Votes 1 Ans short note on DNS attack 551 viewsTeam Posted new comment 2 days agoai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved280 viewsTeam Selected answer as best 2 days agoai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 1.03K viewsTeam Answered question 2 days agoai-ds css 0 Votes 1 Ans Briefly explain database security. 700 viewsTeam Posted new comment 2 days agoai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 513 viewsTeam Answered question 2 days agoai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 634 viewsTeam Answered question 2 days agoai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 366 viewsTeam Answered question 2 days agoai-ds css 0 Votes 2 Ans a) Evaluating the Residuals in Linear regression. 786 viewsAnonymous Posted new comment 3 days agoai-ds DAV 0 Votes 1 Ans Explain with suitable example how the Term Frequency 829 viewsHarsh Jagtap Answered question 3 days agoai-ds DAV 0 Votes 1 Ans Suppose everyone who visits a retail website gets one promotional offer or no promotion at all. 56 viewsTeam Answered question 3 days agoai-ds DAV 0 Votes 1 Ans Describe how logistic regression can be used as a classifier. 44 viewsTeam Answered question 3 days agoai-ds DAV 0 Votes 1 Ans List and explain methods that can be used for sentiment analysis. 48 viewsTeam Answered question 3 days agoai-ds DAV 1 2 3 4 5 Next »