University Past Papers

AGRI 482: CROPPING SYSTEMS EXAM PAPER Trending!
2 Pages 2381 Views 0 Downloads 579.35 KB
Uploaded: 2025-02-10
Ethical Hacking QUESTION & ANSWERS Trending!
Download questions and answers to the unit Ethical Hacking and be a head of others with elaborative answers . Q1. a) Define the following terms as used in Ethical Hacking (5 Marks) i) Hacking - Hacking refers to the unauthorized access or manipulation of computer systems, networks, or data. ii) Ethical Hacking - Ethical Hacking involves the authorized use of hacking techniques to identify and fix vulnerabilities in systems to prevent unauthorized access or data breaches. iii) Ping Sweep - Ping Sweep is a technique used to identify active devices on a network by sending ICMP echo requests (pings) to a range of IP addresses and waiting for responses. iv) Inverse TCP Flag Scanning - Inverse TCP Flag Scanning is a technique used to identify systems that are not vulnerable to certain types of attacks by exploiting the TCP protocol's behavior.
8 Pages 2064 Views 0 Downloads 70.86 KB
Uploaded: 2025-02-05
CMT 311: FUNDAMENTALS OF SOFTWARE ENGINEERING QUESTIONS & ANSWERS.
Q1. a) The Software Development Life Cycle (SDLC) is a process used to design, develop, test, and maintain software applications. It consists of several stages including planning, analysis, design, development, testing, deployment, and maintenance. During each stage, the development team performs various activities such as gathering requirements, creating a design, coding, testing, and documenting the software. b) Two important documents in software engineering process are: Software Requirements Specification (SRS): It is a document that captures the requirements for a software application. It includes details such as user requirements, functional requirements, performance requirements, and other specifications. Software Design Document (SDD): It is a document that describes the architecture, design, and implementation details of a software application. It includes details such as system architecture, data flow, user interface design, and other technical specifications.
7 Pages 360 Views 0 Downloads 90.37 KB
Uploaded: 2025-02-05
CMT 311: FUNDAMENTALS OF SOFTWARE ENGINEERING QUESTIONS & ANSWERS
Q1a. Explain any TWO advantages of sketching a proposed user interface as opposed to using a drawing program or building a prototype. (4 Marks) A: Two advantages of sketching a proposed user interface are that it is quick and inexpensive. Sketching allows for easy ideation and exploration of different design options without the need for specialized software or technical skills. It also provides an opportunity to get feedback early in the design process, helping to identify and address potential issues before investing significant resources in building a prototype.
9 Pages 176 Views 0 Downloads 96.14 KB
Uploaded: 2025-02-05
BIT 2317: COMPUTER SYSTEM SECURITY Trending!
2355 Views 0 Downloads 2.02 MB
Uploaded: 2025-02-02
BIT 2317: COMPUTER SYSTEMS SECURITY Trending!
2184 Views 0 Downloads 37.63 KB
Uploaded: 2025-02-02
BIT 2319: Artificial Intelligence
201 Views 0 Downloads 41.5 KB
Uploaded: 2025-02-02
BIT 2319: Artificial Intelligence
204 Views 0 Downloads 80.5 KB
Uploaded: 2025-02-02
BIT 2319: Artificial Intelligence
222 Views 0 Downloads 47.5 KB
Uploaded: 2025-02-02
BIT 2319: Artificial Intelligence
206 Views 0 Downloads 36.5 KB
Uploaded: 2025-02-02
BIT 2319: Artificial Intelligence
224 Views 0 Downloads 47 KB
Uploaded: 2025-02-02
BIT 2319: Artificial Intelligence
213 Views 0 Downloads 40.5 KB
Uploaded: 2025-02-02
BIT 2319: Artificial Intelligence
208 Views 0 Downloads 50.5 KB
Uploaded: 2025-02-02
BIT 2319: Artificial Intelligence
194 Views 0 Downloads 50.5 KB
Uploaded: 2025-02-02
BIT 2317: COMPUTER SECURITY Trending!
2088 Views 0 Downloads 2.07 MB
Uploaded: 2025-02-01
CMT 300: DATA COMMUNICATION
Q1. a) Identify and explain the FIVE components of a data communications system. (5 Marks) b) Name the FOUR basic network topologies, and cite an advantage of each type. (8 Marks) c) Differentiate between half-duplex and full-duplex transmission modes.(2 Marks) d) Using a well labeled diagram, discuss the Internet model. Note: Your answer should include the names of all the layers, the functions of each layer and at least TWO protocols implemented at each layer. (15 Marks) Q2. a) Name any TWO services provided by the application layer in the Internet model. (2 Marks) b) The terms listed below are associated with electronic signals in data communications: i) Period ii) Frequency iii) phase i) With the help of a diagram, explain what the above terms refer to (3 Marks) ii) What does each of the above measure? (3 Marks)
21 Pages 335 Views 0 Downloads 1.48 MB
Uploaded: 2025-01-31
CMT 304 :DATA STRUCTURE AND ALGORITHM
Write a structured C program with an algorithm to Swap two numbers using third variables and execute the code on the code blocks. (5 marks) ii) Create an executable structured code to delete an element between two items. (5 marks) b) Discuss THREE basic primary operations of a Graph. (6 marks) c) Define the following terms: i) Queue (2 marks) ii) State and explain THREE time complexities (3 marks) iii) Below is call the function findIndex with array and number to be searched.
17 Pages 313 Views 0 Downloads 1.86 MB
Uploaded: 2025-01-31
CMT 445: BUSINESS INTELLIGENCE
a) Define the following terms explaining their meaning i) Business Intelligence [2 marks] ii) Data Warehouse [2 marks] iii) Data Mining [2 marks] iv) Decision Tree [2 marks] v) Web Mining [2 marks] b) Using appropriate diagrams, describe the Business Intelligence data processing chain. [6 marks] c) What are the key elements of a data warehouse? Describe each. [8 Marks]
2 Pages 202 Views 0 Downloads 468.97 KB
Uploaded: 2025-01-30
CMT 445 CAT
Download Question and Answer paper CMT 445 for your revision purpose . Which of the following statement is true about Business Intelligence? A. BI convert raw data into meaningful information B. BI has a direct impact on organization's strategic, tactical and operational business decisions. C. BI tools perform data analysis and create reports, summaries, dashboards, maps, graphs, and charts D. All of the above
16 Pages 321 Views 0 Downloads 389.34 KB
Uploaded: 2025-01-30
CMT 445: BUSINESS INTELLIGENCE
Provide an explanation of each of below; i) Business Intelligence [2 marks] ii) By giving example explain what is business knowledge [2 marks] iii) Decision Support System(DSS) [2 marks] b) The logistics manager of a manufacturing company wishes to develop a medium-term logistic-production plan. This is a decision-making process of high complexity which includes, among other choices, the allocation of the demand originating from different market areas to the production sites, the procurement of raw materials and purchased parts from suppliers, the production planning of the plants and the distribution of end products to market areas. Describe three benefits of using that the logistics manager will get in using BI tools. [6 marks]
2 Pages 199 Views 0 Downloads 606.87 KB
Uploaded: 2025-01-30