Ask question Search Order By: ActiveTagClear Filter 0 Votes 1 Ans Describe the waterfall model and evolutionary process model. 2.38K viewsAnonymous Posted new comment May 18, 2024sepm 0 Votes 1 Ans compare FTR and walkthrough sepm 1.84K viewsAnonymous Posted new comment May 18, 2024sepm Software Engineering and Project Management 0 Votes 1 Ans Explain with suitable example how the Term Frequency Solved2.81K viewsAjink Gupta Selected answer as best May 18, 2024ai-ds DAV 0 Votes 2 Ans d. List and explain security requirements of database. 2.50K viewsAjink Gupta Changed status to publish May 16, 2024css 0 Votes 1 Ans CSS – Cryptography & System Security IMP Questions for IA 2 1.50K viewsAjink Gupta Answered question May 16, 2024Cryptography & System Security css 0 Votes 1 Ans Explain digital signature scheme RSA. 2.23K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 2.02K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 2.50K viewsSupriya Birajdar Answered question May 16, 2024ai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved2.12K viewsAjink Gupta Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 2.00K viewsAjink Gupta Changed status to publish May 16, 2024ai-ds css 1 Votes 1 Ans short note on DNS attack 2.14K viewsAjink Gupta Posted new comment May 16, 2024ai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved1.91K viewsAjink Gupta Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 2.96K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 2.08K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 2.30K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 1.96K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 0 Ans cryptography 1.08K viewsAbhinay bharath Oguri Asked question May 15, 2024Cryptography & System Security 0 Votes 0 Ans Justify which of the following series are stationary? 1.13K viewsBrainiak - The padhai channel Asked question May 15, 2024DAV 0 Votes 2 Ans a) Evaluating the Residuals in Linear regression. 2.43K viewsAnonymous Posted new comment May 15, 2024ai-ds DAV 0 Votes 1 Ans Suppose everyone who visits a retail website gets one promotional offer or no promotion at all. 1.48K viewsAjink Gupta Answered question May 15, 2024ai-ds DAV « Previous 1 2 … 4 5 6 7 8 9 10 Next » Doubtly is an online community for engineering students, offering:Free viva questions PDFsPrevious year question papers (PYQs)Academic doubt solutionsExpert-guided solutions Unanswered Questions 🗣️ Discussions & Requests Submissions 📝 0 Answers | 3 Votes Aids Sem 8 previous year question papers 0 Answers | 0 Votes BDA AI&DS all previous year question papers? (For every subject if possible) 0 Answers | 0 Votes MIS Questions module 4,5,6 0 Answers | 0 Votes Explain the different Application of Blockchain. 0 Answers | 0 Votes The platform provides free PDFs for viva questions, previous year question papers (PYQs), and expert-guided solutions to academic doubts.