Ask question Search Order By: ActiveTagClear Filter 0 Votes 1 Ans compare FTR and walkthrough sepm 1.27K viewsAnonymous Posted new comment May 18, 2024sepm Software Engineering and Project Management 0 Votes 1 Ans Explain with suitable example how the Term Frequency Solved2.07K viewsTeam Selected answer as best May 18, 2024ai-ds DAV 0 Votes 2 Ans d. List and explain security requirements of database. 1.67K viewsTeam Changed status to publish May 16, 2024css 0 Votes 1 Ans CSS – Cryptography & System Security IMP Questions for IA 2 1.00K viewsTeam Answered question May 16, 2024Cryptography & System Security css 0 Votes 1 Ans Explain digital signature scheme RSA. 1.48K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B want to use RSA to communicate securely 2.27K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 1.47K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 1.91K viewsSupriya Birajdar Answered question May 16, 2024ai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved1.46K viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 1.28K viewsTeam Changed status to publish May 16, 2024ai-ds css 1 Votes 1 Ans short note on DNS attack 1.50K viewsTeam Posted new comment May 16, 2024ai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved1.28K viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 2.29K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 1.43K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 1.63K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 1.41K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 0 Ans cryptography 681 viewsAbhinay bharath Oguri Asked question May 15, 2024Cryptography & System Security 0 Votes 0 Ans Justify which of the following series are stationary? 656 viewsBrainiak - The padhai channel Asked question May 15, 2024DAV 0 Votes 2 Ans a) Evaluating the Residuals in Linear regression. 1.67K viewsAnonymous Posted new comment May 15, 2024ai-ds DAV 0 Votes 1 Ans Suppose everyone who visits a retail website gets one promotional offer or no promotion at all. 819 viewsTeam Answered question May 15, 2024ai-ds DAV « Previous 1 2 … 4 5 6 7 8 9 10 Next » Doubtly is an online community for engineering students, offering:Free viva questions PDFsPrevious year question papers (PYQs)Academic doubt solutionsExpert-guided solutions Unanswered Questions 🗣️ Discussions & Requests Submissions 📝 0 Answers | 3 Votes Aids Sem 8 previous year question papers 0 Answers | 0 Votes BDA AI&DS all previous year question papers? (For every subject if possible) 0 Answers | 0 Votes MIS Questions module 4,5,6 0 Answers | 0 Votes Explain the different Application of Blockchain. 0 Answers | 0 Votes The platform provides free PDFs for viva questions, previous year question papers (PYQs), and expert-guided solutions to academic doubts.