Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Q.

Name:B.Sc.
Programme
Course IT
4. 3. 2. 1.No.
KET's
Sort Write Merge theConsider isa Name
is What Solve
8 2 600
major
element
b.row a. V.
following an any Data :
column
the and G.
algorithm algorithm? a three.
following each two Structure Vaze
18 Aj4](3]
elements in major dimensional
12 array
H order College
to If
delete linkedorder the
element Explain
23programming
increasing the list array the of
15 using Arts,
last occupies
characteristicsA
order node merging
34 of Science
language four size
ofa
using 20 5
circular algorithm. memory X6.
bubble storesSuppose of and
64 an
linked cells.
algorithm. Commerce
sort. the
S6
list. address
element What base of
78

is
inthe (Autonomous)
77 address
NUL 98
Sem:IV
array
of
5 5 5 5
Course
Programme
BScIT
No.Q.Name:
5. 4. 3. 2. 1.

: KET's
Write
ExplainExplain three.
any
Internet
With WriteSolve

appropriate
a a V.G.Vaze
short
:IP,TCP,TCP/IP
SUIT,UDP. the short of
concept note Things
note
College
Example
on on
static small open
of
and Explainpieces and Arts,
dynamic closed
,loosely Science
the
conceptsources.
ip joined &
address.Commerce(Autonomous)
of in
Internetdetail.

of
things.
Sem
Programme
$YBScIT
Name:
Course
No. Q.
5. 4. 3. 2. 1.

Advanced : KETs
Explain
Explain
ii)foreach Multiple
Explain
1)output
Explain Solveany
Explain
: three.

V.G.Vaze
named parameter
Abstract the
loop Web
.NET
and with Programming College
Architecture
class Inheritance
used
optional an
with
example. in of
method Arts,
parameter an in
example detail with Science
with
all
with and its
in an &
example.
C#. give
componénts.
an Commerce(Autonomous)
example. an
example

of
it.

Sem-IV
5 5 5
Course
Programme
5. 4. 3. 2. 1. No. Q. KET's

LiExplain
st systems.
1.criticalWhat Write Solve Name
Explain
Exposure V.G.
and a any Name:
:
isshort Software
the
explain the dependability? three.
workingfollowing B.Sc. Vaze
of i. note
Vulnerability
types Engineering
on IT
College
the
of security
Why
waterfall socio-technical
project of
dependability
terminologies Arts,
plans.model. i i.
Attack
Science
system.
iv. is
Threat the and
most
Commerce
Control V.emergent

property (Autonomous)

Sem
:IV
fer

5 5 5
KET'S VGVaze Of Arts,Commerce and Science(Autonomous) Sem IV
Programme Name:Bsc IT
Course Name: Computer Oriented Statistical Techniques
Q.No Solve Any Three 5
1. Compute the Mean for the data in Table
Class Frequency
10 to 15 3
15 to 20 7
20 to 25 16
25 to 30 12
30 to 3S 9
35 to 40 5
40to 45 2 5
Find the Median of the distribution in table
2.
Class Frequency
10to 15 3
15to 20 7
20 to 25 16
25 to 30 12
30to 35
35 to 40 5
40 to 45 2 5
12,6,3,15,10,18,5
the Mean Deviation of the set of numbers. a)
3. Find
b)9,3,8,8,9,8,9,18 5
Geometric Mean withexample. given below.
4. Explain Harmonic Mean, data organized in the table
Find the mode for the grouped
5.
Class Frequency
10-20
20-30 15
30-40 12
40-50 5
40
Total

You might also like