Вы находитесь на странице: 1из 13
ser Key and Primary Key. (CH: 4] : orithm check a number is prime ornot prime. [CH: 5] subnet mask and network address from the given IP address ~ 0 output: [CH: 24] a, #include #include int mainQ{ char str1[20] = “Bangladesh”; char str2; str1[4] = ‘\0°; str2 = strlen(str1); printf(“%s”, str1); return 0; i b. #include int main(){ int i; for i<5; +4i){ ) continue; printf(“%d\n”, i); } return 0; oud Computing? Write advantages and disadvantages of it. (CH: 14] ig the difference between Hub, Router and Switch? (CH: 10] ence between Spoofing & Phishing? (CH: 13] js Click Fraud? Give example. [CH: 24] ference between Binary Insertion sort and Insertion sort, [CH: 5] ve example of Selection Sort. (CH: 5] raw an entity relationship diagram of a real life scenario for recipe ofa restaurant. [CH: 4] structor (instructor id, name, dept_name, salry), course (course_id, course_name, credit) HI: 4] fa, Show all the instructors whose salary is more than at least one salary of the Biology department. . Delete all the employees from instructor list whose salary is less than average salary. f. Give 5 percent bonus to all instructors whose salary is less than the average salary. What is Cryptography? [CH: 24] Text-"Assistant Programmer”, what will be the output text in ease of Caesar Cipher (-3)? What is a Public Key? [CH: 24] What is loT? Describe it. [CH: 24] What is Web 3.0? What are the differences betw Draw a UML use-case diagram for Credit Card. [CH: 24] n Web 2.0 and Web 3.0? (CH: 24] 36th BC algorithm to sort “n” number always in O (n Log n) time, Write a sorting ie onality of “Priority Queue”? How to implement these functions What are the main functi by using “Heap”? (CH: 24] What is Race peri Ci ‘ondition? F ‘tek Ne ae this? [CH: 2] ibe “Huffman’s Algorithm”. 1 Fist ae a LK Filp Flop to a T Flip Flop? (CH: 24] Explain Early Binding & Late Binding with example. [CH: 6] ecisin Method overloading & Method overriding with example. (CH: 6] i o implement Enqueue & Dequeue operation array of Circular Write pseudo ation, here ay Pola ic 4 queue. [(CHeSiam iff between Grapl vee? What is Hamiltanian Gray ¥ What are the di ae yey Lit full adder eireuit (CH; 7} ph? (CH; 24] Design a 4-Bit Oren Latch & Flip- Flop. (Ch-7) : B Distinguish between 1 ca CISC RSG Art =i haan ; a Tee at are differen i vt s be ical mouse does work? [CH: 24) the functionality of Push down ‘automata. [CH: 24] does Protected Memory Management work? [CH: 24] ing following numbers: 28 / 25 / 30/ 15/100 What is Big-O, Big-Theta? [CH: 5] Explain NP-Heard & NP- Complete with example. [CH: 5] ‘What is Minimum Spanning Tree? (CH: 5] Write down about Divide & Conquer algorithi & Conquer and Dynamic programming? [CH: 24] : Explain how to Bellman Ford algorithm can identify a negative cycle of a graph. Describe Agile Method. [CH: 12] Explain each component of Unit Test Environment. (CH: 12] What are the reasons of failure of a Software project? [CH: 24] Describe the disadvantages of prototype technique. [CH: 24} What is COCOMO Model? (CH: 24] a Explain Banker’s Algorithm for Deadlock handling. [CH: 24] : 4 Explain swapping & Memory protection system. [CH: 24] Distinguish between paging & segmentation. [ 4] } : Explain Native Baysian Model with example. (CH: 24] j Describe the procedure of Genetic Algorithm. [CH: 24) i What is Database Normalization? Why INF, 2NF, 3NF & BCNF are implemented? [( What are the differences between DDL & DML? [CH: 24] How “Hash Indexing” & “B+ Tree Indexing” do work? [CH: 4] What is Primary Key & Foreign Key? [CH: 4] What is SQL? Write down two example of SQL. [CH: 4] What is VPN? How it works? [CH: 10] et is Digital signature? How public key & private key encryption does it are the differences between FDM & TDM? [CH: 24] DNS does work? (CH: 24] DoS & Brute Force Attack. (CH: 13] m. What are the differences betwe it Programmer of Investment Corporation B:

Вам также может понравиться