Tag ai-ds ai-ds 38 Questions Ask question Search Order By: ActiveClear Filter 0 Votes 0 Ans Apply various text preprocessing techniques for any given text 179 viewsAI_11_Ajink. Gupta Asked question July 18, 2024ai-ds NLP 0 Votes 1 Ans Briefly explain database security. 1.37K viewsAnonymous Posted new comment June 1, 2024ai-ds css 0 Votes 0 Ans Important questions in Image and video processing to pass and get good marks aids sem 6 601 viewsRitesh Maurya Asked question May 27, 2024ai-ds imp questions ivp sem 6 0 Votes 1 Ans Explain with suitable example how the Term Frequency Solved1.31K viewsTeam Selected answer as best May 18, 2024ai-ds DAV 0 Votes 1 Ans Explain digital  signature scheme RSA. 800 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B want to use RSA to communicate securely 1.50K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 785 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 1.20K viewsSupriya Birajdar Answered question May 16, 2024ai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved748 viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 587 viewsTeam Changed status to publish May 16, 2024ai-ds css 1 Votes 1 Ans short note on DNS attack 795 viewsTeam Posted new comment May 16, 2024ai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved526 viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 1.51K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 722 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 873 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 576 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 2 Ans a) Evaluating the Residuals in Linear regression. 1.02K viewsAnonymous Posted new comment May 15, 2024ai-ds DAV 0 Votes 1 Ans Suppose everyone who visits a retail website gets one promotional offer or no promotion at all. 183 viewsTeam Answered question May 15, 2024ai-ds DAV 0 Votes 1 Ans Describe how logistic regression can be used as a classifier. 204 viewsTeam Answered question May 15, 2024ai-ds DAV 0 Votes 1 Ans List and explain methods that can be used for sentiment analysis. 201 viewsTeam Answered question May 15, 2024ai-ds DAV 1 2 Next »