Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

TAKSHASHILA POLYTECHNIC, AMRAVATI

DEPARTMENT OF COMPUTER ENGINEERING


SESSIONAL TEST -I
(2023-24)
Class: I yr Subject: PIC (312303) Semester: II
Time: 1:30 Hrs. Date: Max Marks: 30
====================================================================
Q.1 ATTEMPT ANY FIVE 5*2=10
a) Define array ?
b) Define structure. Give syntax of declaring it?
c) Define typedef.?
d) Define function and need of function? .
e) Define i) calloc () ii) malloc () iii)getchar() iv)putchar ()
f) Define two dimensional array? How is it declared and initialized?
g) List different categories of function?

Q.2 ATTEMPT ANY THREE 3*4


a) Explain CIA model of security.
b) Describe different password selection criteria?
c) Describe terms regarding computer security:
a) Assets b) Vulnerability c) Threats d) Risk
d) State any four advantages of biometrics?
e) Describe different password selection criteria?
f) Explain the terms : (i) Shoulder surfing (ii) Piggybacking

TAKSHASHILA POLYTECHNIC, AMRAVATI


DEPARTMENT OF COMPUTER ENGINEERING
SESSIONAL TEST -I
(2021-22)
Class: III yr Subject: NIS (22620) Semester: VI
Time: 1 Hrs. Date: Max Marks: 20
====================================================================
===========
Q.1 ATTEMPT ANY FOUR 4*2
a) Define computer security and state it’s need.
b) What is information ?
c) Define entity authentication?
d) List the advantages of hill cipher.
e) Define entity authentication.
f) What is cryptology ?

Q.2 ATTEMPT ANY THREE 3*4


a) Explain CIA model of security.
b) Describe different password selection criteria?
c) Describe terms regarding computer security:
a) Assets b) Vulnerability c) Threats d) Risk
d) State any four advantages of biometrics?
e) Describe different password selection criteria?
f) Explain the terms : i) Shoulder surfing (ii) Piggybacking

You might also like