CENTURION UNIVERSITY OF TECHNOLOGY AND MANAGEMENT
ANDHRA PRADESH
END SEMESTER – 2023
SUBJECT NAME:
SUBJECT CODE:
SEMESTER:
Question WRT TWO MARK QUESTIONS WITH SPECIFIC 10 10
COs
No
1 (CO3) Describe the process of downloading 2
messages from the internet and saving them to
your device.
2 (CO3) How can you send attachments of text 2
information via email?
3 (CO3) Discuss two common issues encountered 2
in email communication.
4 (CO3) What are the advantages of sending 2
attachments of pictures via email?
5 (CO3) Describe two features of E-chatting 2
platforms.
6 (CO3) Explain the concept of email attachments 2
and their significance.
1
7 (CO1) Compare and contrast browsing and 2
downloading operations on the internet.
8 (CO2) Explain the importance of security 2
measures in database clusters.
9 (CO3) How can the skills of cluster deployment 2
be applied in real-world scenarios?
10 (CO2) Discuss two techniques for solving 2
security problems in database clusters.
Question WRT FIVE MARK QUESTIONS WITH SPECIFIC 10 10
COs
No
1 (CO3) Discuss the challenges of deploying clusters in 5
real-world applications, including scalability and
resource allocation.
2 (CO2) Analyze the importance of security measures in 5
database clusters, considering potential risks and
consequences
2
3 (CO1) Propose strategies for improving the efficiency 5
and reliability of email systems.
4 (CO2) Evaluate the effectiveness of access control 5
mechanisms in database cluster security.
5 (CO3) Analyze the benefits of deploying clusters in 5
real-world applications, considering scalability and
performance.
6 (CO3) Discuss the advantages and disadvantages of 5
sending attachments via email compared to other
methods.
7 (CO3) Explain how E-chatting platforms ensure the 5
privacy and security of conversations.
8 (CO3) Compare and contrast the process of sending 5
and receiving emails with browsing and downloading
operations on the internet.
9 (CO2) Describe the role of encryption in securing 5
email attachments and messages.
10 (CO2) Evaluate the impact of security breaches in 5
database clusters and propose preventive measures.
3
Question WRT 12 MARK QUESTIONS WITH SPECIFIC COs 10 10
No
1 (CO3) Explain two challenges in deploying clusters in real world 12
applications and suggest solutions.
2 (CO3) Describe two methods for sending and receiving messages 12
over the internet, highlighting their differences.
3 (CO1) How can clustering techniques be used to improve the 12
reliability of email systems?
4 (CO2) Describe two ways to enhance the security of email 12
attachments.
5 (CO3) Explain two benefits of E-chatting for communication. 12
6 (CO2) How can database cluster security be improved through 12
access control mechanisms?
7 (CO3) Discuss two factors to consider when deploying clusters in 12
real-world applications.
4
8 (CO2) Discuss the importance of encryption in securing database 12
clusters.
9 (CO2) How does ensuring security in database clusters contribute to 12
data protection?
10 (CO3) Explain two features of email systems that facilitate sending 12
attachments