Tag ai-ds ai-ds 38 Questions Ask question Search Order By: ActiveClear Filter 0 Votes 0 Ans Apply various text preprocessing techniques for any given text 1.04K viewsAI_11_Ajink. Gupta Asked question July 18, 2024ai-ds NLP 0 Votes 1 Ans Briefly explain database security. 2.42K viewsTeam Posted new comment May 16, 2024ai-ds css 0 Votes 0 Ans Important questions in Image and video processing to pass and get good marks aids sem 6 971 viewsRitesh Maurya Asked question May 27, 2024ai-ds imp questions ivp sem 6 0 Votes 1 Ans Explain with suitable example how the Term Frequency Solved1.58K viewsTeam Selected answer as best May 18, 2024ai-ds DAV 0 Votes 1 Ans Explain digital  signature scheme RSA. 1.02K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B want to use RSA to communicate securely 1.83K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 1.04K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 1.44K viewsSupriya Birajdar Answered question May 16, 2024ai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved948 viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 790 viewsTeam Changed status to publish May 16, 2024ai-ds css 1 Votes 1 Ans short note on DNS attack 983 viewsTeam Posted new comment May 16, 2024ai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved805 viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 1.71K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 939 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 1.09K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 836 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 2 Ans a) Evaluating the Residuals in Linear regression. 1.21K viewsAnonymous Posted new comment May 15, 2024ai-ds DAV 0 Votes 1 Ans Suppose everyone who visits a retail website gets one promotional offer or no promotion at all. 412 viewsTeam Answered question May 15, 2024ai-ds DAV 0 Votes 1 Ans Describe how logistic regression can be used as a classifier. 356 viewsTeam Answered question May 15, 2024ai-ds DAV 0 Votes 1 Ans List and explain methods that can be used for sentiment analysis. 381 viewsTeam Answered question May 15, 2024ai-ds DAV 1 2 Next »