Tag ai-ds ai-ds 38 Questions Ask question Search Order By: ActiveClear Filter 0 Votes 0 Ans Apply various text preprocessing techniques for any given text 1.17K viewsAI_11_Ajink. Gupta Asked question July 18, 2024ai-ds NLP 0 Votes 1 Ans Briefly explain database security. 2.56K viewsTeam Posted new comment May 16, 2024ai-ds css 0 Votes 0 Ans Important questions in Image and video processing to pass and get good marks aids sem 6 995 viewsRitesh Maurya Asked question May 27, 2024ai-ds imp questions ivp sem 6 0 Votes 1 Ans Explain with suitable example how the Term Frequency Solved1.62K viewsTeam Selected answer as best May 18, 2024ai-ds DAV 0 Votes 1 Ans Explain digital signature scheme RSA. 1.05K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B want to use RSA to communicate securely 1.86K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 1.06K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 1.47K viewsSupriya Birajdar Answered question May 16, 2024ai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved980 viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 862 viewsTeam Changed status to publish May 16, 2024ai-ds css 1 Votes 1 Ans short note on DNS attack 1.03K viewsTeam Posted new comment May 16, 2024ai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved830 viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 1.80K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 1.00K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 1.17K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 940 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 2 Ans a) Evaluating the Residuals in Linear regression. 1.26K viewsAnonymous Posted new comment May 15, 2024ai-ds DAV 0 Votes 1 Ans Suppose everyone who visits a retail website gets one promotional offer or no promotion at all. 432 viewsTeam Answered question May 15, 2024ai-ds DAV 0 Votes 1 Ans Describe how logistic regression can be used as a classifier. 383 viewsTeam Answered question May 15, 2024ai-ds DAV 0 Votes 1 Ans List and explain methods that can be used for sentiment analysis. 404 viewsTeam Answered question May 15, 2024ai-ds DAV 1 2 Next »