Ask question Search Order By: ActiveTagClear Filter 0 Votes 1 Ans Describe the waterfall model and evolutionary process model. 3.60K viewsAnonymous Posted new comment May 18, 2024sepm 0 Votes 1 Ans compare FTR and walkthrough sepm 3.01K viewsAnonymous Posted new comment May 18, 2024sepm Software Engineering and Project Management 0 Votes 1 Ans Explain with suitable example how the Term Frequency Solved3.79K viewsAjink Gupta Selected answer as best May 18, 2024ai-ds DAV 0 Votes 2 Ans d. List and explain security requirements of database. 4.02K viewsAjink Gupta Changed status to publish May 16, 2024css 0 Votes 1 Ans CSS – Cryptography & System Security IMP Questions for IA 2 2.33K viewsAjink Gupta Answered question May 16, 2024Cryptography & System Security css 0 Votes 1 Ans Explain digital signature scheme RSA. 3.25K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 2.90K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 3.34K viewsSupriya Birajdar Answered question May 16, 2024ai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved3.14K viewsAjink Gupta Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 3.06K viewsAjink Gupta Changed status to publish May 16, 2024ai-ds css 1 Votes 1 Ans short note on DNS attack 3.21K viewsAjink Gupta Posted new comment May 16, 2024ai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved3.03K viewsAjink Gupta Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 3.95K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 3.28K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 3.47K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 3.03K viewsAjink Gupta Answered question May 16, 2024ai-ds css 0 Votes 0 Ans cryptography 1.80K viewsAbhinay bharath Oguri Asked question May 15, 2024Cryptography & System Security 0 Votes 0 Ans Justify which of the following series are stationary? 1.82K viewsBrainiak - The padhai channel Asked question May 15, 2024DAV 0 Votes 2 Ans a) Evaluating the Residuals in Linear regression. 3.47K viewsAnonymous Posted new comment May 15, 2024ai-ds DAV 0 Votes 1 Ans Suppose everyone who visits a retail website gets one promotional offer or no promotion at all. 2.45K viewsAjink Gupta Answered question May 15, 2024ai-ds DAV « Previous 1 2 … 4 5 6 7 8 9 10 Next » Doubtly is an online community for engineering students, offering:Free viva questions PDFsPrevious year question papers (PYQs)Academic doubt solutionsExpert-guided solutions Unanswered Questions 🗣️ Discussions & Requests Submissions 📝 0 Answers | 3 Votes Aids Sem 8 previous year question papers 0 Answers | 0 Votes BDA AI&DS all previous year question papers? (For every subject if possible) 0 Answers | 0 Votes MIS Questions module 4,5,6 0 Answers | 0 Votes Explain the different Application of Blockchain. 0 Answers | 0 Votes The platform provides free PDFs for viva questions, previous year question papers (PYQs), and expert-guided solutions to academic doubts.