CSIT 5th Semester
Cryptography Board Question Paper 2080

Views: ...

CSC 327-2080 ✡

Tribhuvan University

Institute of Science and Technology

TUpapers.com TUpapers.com
Bachelor Level/Third Year/Fifth Semester/Science
Bachelors in Computer Science and Information Technology (CSC 327)
(Cryptography) <br> <b class='underline'>(Old Course</b>)
Full Marks: 60 Pass Marks: 24 Time: 3 hours

Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Section A
Long Answer Questions
Attempt any Two questions.
[2x10=20]
1.

Why do we need asymptotic notation? Justify with an example. Solve the following recurrence relation using iteration method.
T(n) = 2T(n-1) + 1, T(0) = 1

2.

How does greedy approach differ with dynamic approach? Find the maximum loot from following information using 0/1 Knapsack problem, where weight of knapsack (W) is 20.

Items1234567
Profit(P)42212350
Weight(w)122341110

3.

Find the LCS between "TELEMEDICINE" and "ELECTIFINE".

Section B

Attempt any Eight questions

[8×5=40]
4.

Using Quick sort, arrange the following data set in ascending order.
23, 6, 7, 89, 24, 9, 11, 56, 43, 22, 99, 3.

5.

Select the maximum size set of mutually compatible activities, S : {1,2, 3, 4, 5, 6,7 , 8, 9, 10} with respective start and end time {(5,9), (1,2), (3,4), (2,6), (5,7), (8,9), (4,10), (9,7), (12,13), (15,20)}

6.

Explain the detail worst case analysis of Randomized Quick Sort.

7.

Define about left turn, right turn, ear, mouth and diagonal. Explain the Graham's scan algorithm to find convex hull.

8.

What is an optimal Huffman code for the following set of frequencies, based on the first 8 Fibonacci numbers?
A:1, B:1,C:2, D:3, E:5, F:8, G:13,H:21

9.

Define convex hull. How a given polygon can be triangulated? Justify your answer with example.

10.

Why do we need concept of NP completeness? Discuss about Approximation algorithm for vertex cover problem.

11.

12.