Ask question Search Order By: ActiveTagClear Filter 0 Votes 1 Ans Describe the waterfall model and evolutionary process model. 2.98K viewsAnonymous Posted new comment May 18, 2024sepm 0 Votes 1 Ans compare FTR and walkthrough sepm 2.40K viewsAnonymous Posted new comment May 18, 2024sepm Software Engineering and Project Management 0 Votes 1 Ans Explain with suitable example how the Term Frequency Solved3.26K viewsAjink Gupta Selected answer as best May 18, 2024ai-ds DAV 0 Votes 2 Ans d. List and explain security requirements of database. 3.22K viewsAjink Gupta Changed status to publish May 16, 2024css 0 Votes 1 Ans CSS – Cryptography & System Security IMP Questions for IA 2 1.90K viewsAjink Gupta Answered question May 16, 2024Cryptography & System Security css 0 Votes 1 Ans Explain digital signature scheme RSA. 2.73K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 2.43K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 2.91K viewsSupriya Birajdar Answered question May 16, 2024ai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved2.60K viewsAjink Gupta Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 2.55K viewsAjink Gupta Changed status to publish May 16, 2024ai-ds css 1 Votes 1 Ans short note on DNS attack 2.67K viewsAjink Gupta Posted new comment May 16, 2024ai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved2.44K viewsAjink Gupta Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 3.39K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 2.66K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 2.89K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 2.50K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 0 Ans cryptography 1.44K viewsAbhinay bharath Oguri Asked question May 15, 2024Cryptography & System Security 0 Votes 0 Ans Justify which of the following series are stationary? 1.46K viewsBrainiak - The padhai channel Asked question May 15, 2024DAV 0 Votes 2 Ans a) Evaluating the Residuals in Linear regression. 2.95K viewsAnonymous Posted new comment May 15, 2024ai-ds DAV 0 Votes 1 Ans Suppose everyone who visits a retail website gets one promotional offer or no promotion at all. 1.95K viewsAjink Gupta Answered question May 15, 2024ai-ds DAV « Previous 1 2 … 4 5 6 7 8 9 10 Next » Doubtly is an online community for engineering students, offering:Free viva questions PDFsPrevious year question papers (PYQs)Academic doubt solutionsExpert-guided solutions Unanswered Questions 🗣️ Discussions & Requests Submissions 📝 0 Answers | 3 Votes Aids Sem 8 previous year question papers 0 Answers | 0 Votes BDA AI&DS all previous year question papers? (For every subject if possible) 0 Answers | 0 Votes MIS Questions module 4,5,6 0 Answers | 0 Votes Explain the different Application of Blockchain. 0 Answers | 0 Votes The platform provides free PDFs for viva questions, previous year question papers (PYQs), and expert-guided solutions to academic doubts.