0% found this document useful (0 votes)
9 views5 pages

Module 6

The document outlines an end-semester examination for Centurion University of Technology and Management, detailing various questions categorized by two, five, and twelve marks. Each question is linked to specific Course Outcomes (COs) and covers topics related to email communication, database security, and cluster deployment. The examination assesses students' understanding of practical applications and theoretical concepts in technology and management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views5 pages

Module 6

The document outlines an end-semester examination for Centurion University of Technology and Management, detailing various questions categorized by two, five, and twelve marks. Each question is linked to specific Course Outcomes (COs) and covers topics related to email communication, database security, and cluster deployment. The examination assesses students' understanding of practical applications and theoretical concepts in technology and management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CENTURION UNIVERSITY OF TECHNOLOGY AND MANAGEMENT

ANDHRA PRADESH

END SEMESTER – 2023

SUBJECT NAME:

SUBJECT CODE:

SEMESTER:

Question WRT TWO MARK QUESTIONS WITH SPECIFIC 10 10


COs
No

1 (CO3) Describe the process of downloading 2


messages from the internet and saving them to
your device.

2 (CO3) How can you send attachments of text 2


information via email?

3 (CO3) Discuss two common issues encountered 2


in email communication.

4 (CO3) What are the advantages of sending 2


attachments of pictures via email?

5 (CO3) Describe two features of E-chatting 2


platforms.

6 (CO3) Explain the concept of email attachments 2


and their significance.

1
7 (CO1) Compare and contrast browsing and 2
downloading operations on the internet.

8 (CO2) Explain the importance of security 2


measures in database clusters.

9 (CO3) How can the skills of cluster deployment 2


be applied in real-world scenarios?

10 (CO2) Discuss two techniques for solving 2


security problems in database clusters.

Question WRT FIVE MARK QUESTIONS WITH SPECIFIC 10 10


COs
No

1 (CO3) Discuss the challenges of deploying clusters in 5


real-world applications, including scalability and
resource allocation.

2 (CO2) Analyze the importance of security measures in 5


database clusters, considering potential risks and
consequences

2
3 (CO1) Propose strategies for improving the efficiency 5
and reliability of email systems.

4 (CO2) Evaluate the effectiveness of access control 5


mechanisms in database cluster security.

5 (CO3) Analyze the benefits of deploying clusters in 5


real-world applications, considering scalability and
performance.

6 (CO3) Discuss the advantages and disadvantages of 5


sending attachments via email compared to other
methods.

7 (CO3) Explain how E-chatting platforms ensure the 5


privacy and security of conversations.

8 (CO3) Compare and contrast the process of sending 5


and receiving emails with browsing and downloading
operations on the internet.

9 (CO2) Describe the role of encryption in securing 5


email attachments and messages.

10 (CO2) Evaluate the impact of security breaches in 5


database clusters and propose preventive measures.

3
Question WRT 12 MARK QUESTIONS WITH SPECIFIC COs 10 10

No

1 (CO3) Explain two challenges in deploying clusters in real world 12


applications and suggest solutions.

2 (CO3) Describe two methods for sending and receiving messages 12


over the internet, highlighting their differences.

3 (CO1) How can clustering techniques be used to improve the 12


reliability of email systems?

4 (CO2) Describe two ways to enhance the security of email 12


attachments.

5 (CO3) Explain two benefits of E-chatting for communication. 12

6 (CO2) How can database cluster security be improved through 12


access control mechanisms?

7 (CO3) Discuss two factors to consider when deploying clusters in 12


real-world applications.

4
8 (CO2) Discuss the importance of encryption in securing database 12
clusters.

9 (CO2) How does ensuring security in database clusters contribute to 12


data protection?

10 (CO3) Explain two features of email systems that facilitate sending 12


attachments

You might also like