Navigation Menu

Search code, repositories, users, issues, pull requests..., provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

  • Notifications You must be signed in to change notification settings

NPTEL Assignment Answers and Solutions 2024 (July-Dec). Get Answers of Week 1 2 3 4 5 6 7 8 8 10 11 12 for all courses. This guide offers clear and accurate answers for your all assignments across various NPTEL courses

progiez/nptel-assignment-answers

Folders and files.

NameName
187 Commits

Repository files navigation

Nptel assignment answers 2024 with solutions (july-dec), how to use this repo to see nptel assignment answers and solutions 2024.

If you're here to find answers for specific NPTEL courses, follow these steps:

Access the Course Folder:

  • Navigate to the folder of the course you are interested in. Each course has its own folder named accordingly, such as cloud-computing or computer-architecture .

Locate the Weekly Assignment Files:

  • Inside the course folder, you will find files named week-01.md , week-02.md , and so on up to week-12.md . These files contain the assignment answers for each respective week.

Select the Week File:

  • Click on the file corresponding to the week you are interested in. For example, if you need answers for Week 3, open the week-03.md file.

Review the Answers:

  • Each week-XX.md file provides detailed solutions and explanations for that week’s assignments. Review these files to find the information you need.

By following these steps, you can easily locate and use the assignment answers and solutions for the NPTEL courses provided in this repository. We hope this resource assists you in your studies!

List of Courses

Here's a list of courses currently available in this repository:

  • Artificial Intelligence Search Methods for Problem Solving
  • Cloud Computing
  • Computer Architecture
  • Cyber Security and Privacy
  • Data Science for Engineers
  • Data Structure and Algorithms Using Java
  • Database Management System
  • Deep Learning for Computer Vision
  • Deep Learning IIT Ropar
  • Digital Circuits
  • Ethical Hacking
  • Introduction to Industry 4.0 and Industrial IoT
  • Introduction to Internet of Things
  • Introduction to Machine Learning IIT KGP
  • Introduction to Machine Learning
  • Introduction to Operating Systems
  • ML and Deep Learning Fundamentals and Applications
  • Problem Solving Through Programming in C
  • Programming DSA Using Python
  • Programming in Java
  • Programming in Modern C
  • Python for Data Science
  • Soft Skill Development
  • Soft Skills
  • Software Engineering
  • Software Testing
  • The Joy of Computation Using Python
  • Theory of Computation

Note: This repository is intended for educational purposes only. Please use the provided answers as a guide to better understand the course material.

📧 Contact Us

For any queries or support, feel free to reach out to us at [email protected] .

🌐 Connect with Progiez

Website

⭐️ Follow Us

Stay updated with our latest content and updates by following us on our social media platforms!

🚀 About Progiez

Progiez is an online educational platform aimed at providing solutions to various online courses offered by NPTEL, Coursera, LinkedIn Learning, and more. Explore our resources for detailed answers and solutions to enhance your learning experience.

Disclaimer: This repository is intended for educational purposes only. All content is provided for reference and should not be submitted as your own work.

Contributors 3

@raveshrawal

NPTEL Software Engineering Week 6 Assignment Answers

NPTEL Software Engineering Week 6 Assignment Answers :- In this post, we have provided the answers to the NPTEL Software Engineering Week 6. All the answers are provided here on the basis of data available on the internet.

NPTEL Software Engineering All Week Assignment Answers

NPTEL Software Engineering Week 6 Assignment Answers 2022

1. A data flow diagram represents which one of the following?

  • a. The conditions based on which data items may be processed
  • b. The order in which different activities are carried out
  • c. The transformation of data through processing stations
  • d. The order in which various functions of a program are invoked e. Interaction among different modules of program

2. For a given programming problem, a DFD (data Flow Diagram) model depicts which of the following?

  • a. Flow of data
  • b. Flow of control
  • c. Flow of decisions
  • d. Flow of atomic conditions
  • e. equence of interaction among processes
  • f. Interaction among modules

3. Which one of the following statements is not true of a data flow diagram (DFD) model?

  • a. It is a hierarchical diagram.
  • b. It represents code structure
  • c. It does not represent decisions and control flows.
  • d. It represents decomposition of functions and data into finer forms.
  • e. It represents the sequence in which the different processes are invoked.

4. In a procedural design approach, during the detailed design stage, which of the folloWing is undertaken?

  • a. Module structure is designed
  • b. Data flow representation is developed
  • c. Data structures and algorithms for the individual modules are designed
  • d. Structure chart is developed e. Module call relationships are designed f Module interactions are designed

5. Which one of the following is true of a function-oriented design approach?

  • a. Top-down
  • b. Bottom-up
  • c. Mixed-in
  • d. Bottom-out
  • e. Bottom-up at system level and top-down at module level

6. A context diagram should not represent which of the following?

  • a. External entities.
  • b. Module Interactions
  • c. Data input to the system by the extermal entities,
  • d. Output data generated by the system.
  • e. Module structure

7. Which of the following correctly characterize balancing of DFDS

  • a. Data flowing into a bubble must match the data flowing out of the next level of DFD.
  • b. Data flowing into a bubble must match the data flowing into the next level of DFD.
  • c. Data flowing out ot a bubble must match the data tiowing out of the next level of DFD.
  • d. Data flowing into a bubble must match the data flowing nto the previous level of DFD.
  • e. Data flowing into a bubble must match the data tlowing out of the bubble
  • f. Data flowing out of a bubble must match the data flowing into the next level DFDP
  • g. Data flowing into a bubble must match the data flowing out of other bubbles at the same level

8. Which of the following are identifiable mistakes in the following context diagram?

  • a. External entities are appearing at the context level
  • b. Input/Output occurring at the context level
  • c. Data item name missing on a data flow arrow
  • d. A data store appearing at the context level
  • e. Solid arrows have been used in place of dashed arrows
  • f. Name of one entity is missing

9. Which of the following are identifiable mistakes in the following DFD (Data Flow Diagram)?

  • a. Unbalanced
  • b. Presence of synchronous data flow
  • C. Presence of asynchronous data flow
  • d. Presence of control information
  • e. Missing data name

10. Which one of the following information is not present in a structure chart model of a software system?

  • a. Various modules makıng up the system,
  • b. Module call structure
  • c. Parameters passed among different modules
  • d. Data structures and algorıthms of the modules
  • e. How the data 1s transtformed by the functions

Important Links:-

NPTEL Answers

Join Our Telegram

Leave a Comment Cancel reply

Save my name, email, and website in this browser for the next time I comment.

Cloud Computing Nptel Week 6 Assignment Answers

Are you looking for the Cloud Computing Nptel Week 6 Assignment Answers Look no further! Our platform provides precise and comprehensive Cloud Computing Nptel Assignment Solutions for Week 6 in this course

Course Link:  Click Here

Table of Contents

Cloud Computing Nptel Week 6 Assignment Answers images

Cloud Computing Nptel Week 6 Assignment Answers (July-Dec 2024)

1. Interception is considered as an attack on

A) Confidentiality B) Availability C) Integrity D) Authenticity

Answer: A) Confidentiality

2. Find the correct statement(s):

A) Different types of cloud computing service models provide different levels of security services B) Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider C) Data should be transferred and stored in an encrypted format for security purposes D) All are incorrect statements

Answer: A) Different types of cloud computing service models provide different levels of security services B) Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider C) Data should be transferred and stored in an encrypted format for security purposes

3. Which of the following is/are example(s) of passive attack?

A) Replay B) Denial of service C) Traffic analysis D) Masquerade

Answer: C) Traffic analysis

4. Modification is considered as an attack on

Answer: C) Integrity

5. Spoofing is not an example of

A) Deception B) Disclosure C) Usurpation D) Disruption

Answer: B) Disclosure D) Disruption

6. Consider the following statements:

Statement I: Authorization is the identification of legitimate users. Statement II: Integrity is the protection against data alteration/corruption.

Identify the correct options: A) Statement I is TRUE and statement II is FALSE. B) Statement I is FALSE and statement II is TRUE. C) Both statements are TRUE. D) Both statements are FALSE.

Answer: B) Statement I is FALSE and statement II is TRUE.

7. Access policy control refers to

A) Cyclic Inheritance Control B) Virus Attack C) Violation of SoD (separation of duties) Constraint D) Man in the middle attack

Answer: A) Cyclic Inheritance Control C) Violation of SoD (separation of duties) Constraint

8. Which of the options is/are considered as the basic components of security?

A) Confidentiality B) Integrity C) Reliability D) Efficiency

Answer: A) Confidentiality B) Integrity

9. Which of the following is/are not a type of passive attack?

A) Traffic Analysis B) Release of message contents C) Denial of service D) Replay

Answer: C) Denial of service D) Replay

10. Side channel exploitation has the potential to extract RSA & AES secret keys

A) True B) False

Answer: A) True

These are Cloud Computing Nptel Week 6 Assignment Answers

Cloud Computing NPTEL All weeks:  Click Here

For answers to additional Nptel courses, please refer to this link:  NPTEL Assignment Answers

Cloud Computing Nptel Week 6 Assignment Answers (JAN-APR 2024 )

Course Name: Cloud Computing

For answers or latest updates join our telegram channel:  Click here to join

These are nptel cloud computing week 6 answers

Q1. Modification is an attack on: A) Authenticity B) Integrity C) Confidentiality D) Availability

Answer: B) Integrity

Q2. Which of the following is/are example(s) of passive attack? A) Replay B) Denial of service C) Traffic analysis D) Masquerade

Q3. Which of the following is/are the recovery goal(s) of the security mechanism? A) Prevent attackers from violating security policy B) Detect attackers’ violation of security policy C) Stop attack, assess and repair damage D) Continue to function correctly even if attack succeeds

Answer: C), D)

Q4. Statement I: Authorization is the identification of legitimate users. Statement II: Integrity is the protection against data alteration/corruption. A. Statement I is TRUE and statement II is FALSE. B. Statement I is FALSE and statement II is TRUE. C. Both statements are TRUE. D. Both statements are FALSE.

Answer: B. Statement I is FALSE and statement II is TRUE.

Q5. Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits? A) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc. B) Hypervisor that hides itself from normal malware detection systems C) Improper configuration of VM. D) Hypervisor that creates a covert channel to dump unauthorized code.

Answer: B), D)

Q6. A) 1-(a), 2-(b), 3-(d) B) 1-(c), 2-(a), 3-(d) C) 1-(b), 2-(c), 3-(d) D) 1-(a), 2-(c), 3-(d)

Answer: B) 1-(c), 2-(a), 3-(d)

Q7. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task. A) TRUE B) FALSE

Answer: B) FALSE

Q8. Which of the following Open-source tools is/are used to perform TCP connect probes on the Amazon EC2 platform? A) nmap B) wget C) ipconfig D) hping

Answer: A) nmap

Q9. In para virtualization, VMs interact with the host OS. A) TRUE B) FALSE

Answer: A) TRUE

Q10. In conflict removal, when is introduction of a virtual role required? A) In case of violation of SoD constraint violation. B) In case of cyclic inheritance conflict where exactly matched role set exists. C) In case of cyclic inheritance conflict where no exactly matched role set exists. D) None of the above.

Answer: C) In case of cyclic inheritance conflict where no exactly matched role set exists.

More Weeks of Cloud Computing:  Click here

More Nptel Courses:  Click here

Cloud Computing Nptel Week 6 Assignment Answers (July-Dec 2023)

These are nptel cloud computing week 6 solutions

Q1. Fabrication is an attack on : A) Integrity B) Confidentiality C) Authenticity D) Availability

Answer: C) Authenticity

Q2. Reliability and efficiency are basic components of security. A) True B) False

Answer: B) False

Q3. Spoofing threat on cloud security is an example of. A) Deception B) Disruption C) Usurpation D) Disclosure

Answer: A, C

Q4. Statement I : Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress. Statement II : Authentication is the determination of whether or not an operation is allowed by a certain user. A) Statement I is TRUE and Statement II is FALSE. B) Statement II is TRUE and Statement I is FALSE. C) Both statements are TRUE. D) Both statements are FALSE.

Answer: A) Statement I is TRUE and Statement II is FALSE.

Q5. Which of the following is/are hypervisor risks associated with rough hypervisor root kits? A) Improper configuration of VM. B) Hypervisor that hides itself from normal malware detection systems. C) Hypervisor that creates a covert channel to dump unauthorized code. D) Vulnerable virtual machine applications like Vmchat. VMftp. Vmcat etc.

Answer: B, C

Q6. In fault tolerance, replication is mirroring/sharing data over disks which are located in separate physical locations to maintain consistency. A) True B) False

Q7. In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of requests to a certain service, causing denial of service? A) Injection attack B) Flooding C) Cross-site scripting (XSS) D) Metadata (WSDL) spoofing attack

Answer: B) Flooding

Q8. When is it better to switch cloud providers? A) Contract price decrease B) Provider bankruptcy C) Provider service shutdown D) Increase in service quality

Q9. Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the Amazon EC2 platform? A) wget B) nmap C) ipconfig D) hping

Answer: D) hping

Q10. In risk-based access control (RAC), computing security uncertainty is addressed. A) True B) False

Cloud Computing Nptel Week 5 Assignment Answers

Nptel Data Science For Engineers Assignment 6 Answers 2023

NPTEL Data Science for Engineers Assignment 6 Answers 2023 !  In this article we will discuss about the answers for Week 6 assignment of Data science for Engineers. Consider these answers as reference only. I am confident in providing these answers. Then Come with us until the last of page to know more about week 6 Assignment.

About Nptel

NPTEL offers both video and web-based courses, which are available to anyone who wants to learn. Learners can enroll in the courses for free and receive a certificate upon completion of the course, after passing an online exam. NPTEL also provides e-learning resources such as course materials, lecture notes, and quizzes to supplement the video lectures. NPTEL has a vast repository of courses, and it has been a popular platform for learning among students and professionals in India and around the world.

Nptel Data Science For Engineers Assignment 6 Answers 2023  

For the following set of questions 1, 2, 3, 4, 5 use the dataset bonds.txt. This dataset

Q1.  What is the relationship between the variables, Coupon rate and Bid price?

Q2.  Choose the correct option that best describes the relation between the variables Coupon rate 

Q4. What is the adjusted R-Squared value of the model obtained in Q1 ?

                We can see in the picture there are 5 residuals have been given. 

Q8.  Linear Regression is an optimization problem where we attempt to minimize

Conclusion:

Contact form.

IMAGES

  1. Assignment -6 Model Answer

    assignment 6 answer

  2. Assignment 6 answers

    assignment 6 answer

  3. PPT

    assignment 6 answer

  4. Assignment 6

    assignment 6 answer

  5. Assignment 6 Answer

    assignment 6 answer

  6. Solved Assignment 6 Answer all questions. Provide code

    assignment 6 answer

VIDEO

  1. গণিত ফাইনাল প্রশ্নের উত্তর //Math/নতুন কারিকুলাম/গণিত প্রশ্নের উত্তর //#maths #six#sixmath শেষ কাজ-গ

  2. Writing the Names of Every Subscriber

  3. BCSL 13 Solved assignment 2023-24

  4. NPTEL Soft Skill Development Assignment 8 Solution||2024 Week 8 ||NPTEL Assignment Solution #swayam

  5. NMIMS Assignment Solution of Corporate Finance for December 2023

  6. Half Yearly English Assessment Question & answer //ষষ্ঠ শ্রেণির ষান্মাসিক মূল্যায়ন #classsix #final

COMMENTS

  1. Nptel Cloud Computing Week 6 Assignment 6 Answers & Solution

    These are Nptel Cloud Computing week 6 Assignment 6 Answers. Q4. Statement I : Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress. Statement II : Authentication is the determination of whether or not an operation is allowed by a certain user.

  2. Introduction To Machine Learning Week 6 Assignment 6 Solution

    #machinelearning #nptel #swayam #python #ml All week Assignment SolutionIntroduction To Machine Learning - https://www.youtube.com/playlist?list=PL__28a0xF...

  3. NPTEL Assignment Answers 2024 with Solutions (July-Dec)

    NPTEL Assignment Answers and Solutions 2024 (July-Dec). Get Answers of Week 1 2 3 4 5 6 7 8 8 10 11 12 for all courses. This guide offers clear and accurate answers ...

  4. DATA ANALYTICS WITH PYTHON WEEK 6 ASSIGNMENT 6 SOLUTION| NPTEL

    We are looking forward to sharing many exciting stories and examples of analytics with all of you using python programming language. This course includes exa...

  5. NPTEL Assignment Answers 2024 And Solutions Progiez

    Nptel Assignment Answers 2024. Sorted: Introduction To Industry 4.0 And Industrial Internet Of Things Programming Data Structure And Algorithms Using Python Artificial Intelligence Search Methods For Problem Solving Machine Learning and Deep Learning - Fundamentals and Applications.

  6. Software Engineering

    Join Channel Membership to get access to Exam Notes:https://www.youtube.com/channel/UCmt2xnmpmOmhiaB2BRqdLDA/joinDo Like & Share this Video with your Friends...

  7. NPTEL Software Engineering Week 6 Assignment Answers

    All the answers are provided here on the basis of data available on the internet. NPTEL Software Engineering All Week Assignment Answers. Software Engineering Week 1 Answer. Software Engineering Week 2 Answer. Software Engineering Week 3 Answer. Software Engineering Week 4 Answer. Software Engineering Week 5 Answer.

  8. NPTEL Programming In Java Week 6 Assignment 6 Answers

    These are NPTEL Programming In Java Week 6 Assignment 6 Answers. Complete the code segment to count number of digits in an integer using while loop. Solution: num = num / 10; count++; These are NPTEL Programming In Java Week 6 Assignment 6 Answers. Complete the code segment to display the factors of a number n.

  9. SUS1501 A6

    Assignment 6. What was my original answer and why; Option E. Because rhinos satisfy a significant role in the ecosystem. Rhinos are grazers, expending a lot of vegetation, which helps shape the African landscape. This adds as an advantage to different creatures and keeps a sound parity inside the ecosystem.

  10. NPTEL Introduction to Internet of Things Week 6 Assignment 6 Solution

    The assignment is from Week 6 and is designated as Assignment 6. The content focuses on solving a problem or exercise related to IoT. Specific details about the problem or solution are not provided in the given text. The assignment solution could involve various aspects of IoT, such as sensor networks, data communication, and applications.

  11. Data Base Management System Week 6 Assignment Answers

    #DataBaseManagementSystem #dbms #nptelwithateeqDataBase Management System | SWAYAM | NPTELIn this video, we're going to unlock the answers to the DataBase Ma...

  12. Assignment 6 Text

    UVEG. Exercise 1 Read the instructions found in that slide, then select 10 vocabularies and write up the question as well as its answers with the grammar specified there (try to balance the number of affirmative and negative responses.

  13. Cloud Computing Nptel Week 6 Assignment Answers

    2. Find the correct statement(s): A) Different types of cloud computing service models provide different levels of security services B) Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider

  14. Nptel Data Science For Engineers Assignment 6 Answers 2023

    Answer: [ C ] Bid Price = 74.7865 + 3.066 * Coupon rate. According to the Summary results, it is of the form y=b + b*x0. Q2. Choose the correct option that best describes the relation between the variables Coupon rate. and Bid price in the given data. a. Strong positive correlation. b. Weak positive correlation.

  15. Assignment 6 Submission: CONS 127 203 2022W2 Observing the ...

    First, download the instruc ons and ques ons for this assignment here: CONS127_Assignment_6_2023-1.pdf Then, answers the ques ons via the Assignment 6 Quiz before the deadline , which is March 30 at 11:59 PM. If you have any comments or ques ons please post these on the assignment 6 discussion board and your TA Samuel will answer as soon as ...

  16. Assignment 6 Answer

    Answer Key to Assignment Six Money and Banking ECON 2300 Vanderbilt University Professor Kevin X. Huang (100 points in total) Each of the forty multiple-choice questions is worth 1 point (subtotal of 40 points) Corporate bonds usually pay higher interest rates than Treasury bonds because _____. a) They are riskier b) They are less liquid c ...

  17. Database Management System Week 6 Assignment 6 Solution

    #dbms #nptel #swayam #DatabseManagementSystemAll content and materials provided on video are intended for educational purposes.All Week Assignment SolutionDB...

  18. BUS 210

    Module 6 Assignment. Holly Sagers Southern New Hampshire University BUS210: Managing and Leading in Business Dr. Tomecca Williams October 11, 2020 In examining the original organization structure, I observed that there were many demands placed upon the managers, as stated in the scenario.

  19. Cyber security and privacy week 6 NPTEL assignment 6 answer

    Join this channel to get access to perks:https://youtube.com/channel/UCtW1VxdWStDSvxHI3F9exzA*Telegram*https://t.me/mithunnikhar01*Instagram*https://www.inst...

  20. assignment 6 Crossword Clue

    The Crossword Solver found 30 answers to "assignment 6", 6 letters crossword clue. The Crossword Solver finds answers to classic crosswords and cryptic crossword puzzles. Enter the length or pattern for better results. Click the answer to find similar crossword clues . Enter a Crossword Clue. A clue is required.

  21. NPTEL Deep Learning Week 6 Assignment Answers

    #deeplearning #nptel #npteldeeplearning Deep Learning In this video, we're going to unlock the answers to the Deep Learning questions from the NPTEL 2024 Jan...

  22. PART 1 Assignment Module 6

    c. the assignment will count for 20% of your final mark in module 6. in the following situations, describe the most appropriate actions or responses to be taken by the personal support worker and explain why this is correct. your answer should reflect knowledge of effective communication skills, the extent and limitations of your role, and an