0% found this document useful (0 votes)
140 views17 pages

Sem 6 Question Papers

Uploaded by

Om Kokate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views17 pages

Sem 6 Question Papers

Uploaded by

Om Kokate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

·- -

ARDA GHARD A INSTIT UTE OF TECHN OLOGY GITIGHARDAor


INSTITUTE
routlJATION Departm ent of Compu ter Enginee ring TECHNOLOG,

First Srssiona l Examination-2022-23 (Even Scm)


r-

,' Subject: System Programming & Com1>iler Construction Date: 3/03/202 3


Sem: VI Time: 11 to 12 _pm
Year: TE Max Marks: 20

Q. Sub. co
Question Marks Mapp BL Pl
No. Q.
in_g
1 Solve any two
a Describe various phases of Compiler. C03 1,2 2.3.1
Differentiate between System program and Application program
b cot 1,2 1.1.4

Remove left recursion from the following grammar. 10


5-)( L) Ix C04 3 4.4.2
L ➔ L,sls
C

2 Attempt any one 5

a Describe SLR(l) parser. 5 C04 3 4.4.2


OR
Compute first and follow for follwing Grammar.

s--:, AatAb /BbBa.


b A--7 G 5 C04 3 4.4.2

'B~ E,

3 Attempt any one s


ra -
Describe different types of Parser.
OR
5 C03 1,2 2.3.1

Construct the LL(l) parsing table for the following grammar

b
5~ cs) l£ 5 C04 3 4.4.2

*********** BEST OF LUCK••• ••••••••••

I
.-

V
fGHAACA
FOUlflATKlN
GHARDA INSTITUT EOFTECH NOLOGY
Departmen t of Computer Engineerin g
Second Sessionnl Exnminntion -2022-23 (Even Sem)
GIT/: ~
Subject:
System Programming & Compiler Construction
Sem: ' Date:20/04/2 023
VI
Year: Time: 11 TO 12.00
TE Max Marks: 20

Q. Sub. co
No. Q. Question Marks Mapp PO
1 ing
Solve any two
.> Explain various functions ofloader.
CO2 2
y What are different features of macro?
CO2 2
10
C Write a short note on macro expansion. C03 2

2 Attempt any one s


y What are various strategies fo r code optimization? 5 C03 2
OR
b Write a short note on algorithm for basic block construction. 5 C04 4

3 Attempt any one s


With reference to assembler explain following tables (i)POT (ii)
/ MOT (iii) ST 5 C03 2

OR

b Write a short note on Lex. 5 CO2 2

• 0 • •0 ••** BEST OF LUCK •••••••••••••


.. GIIAR DA INS'ITI UTt: OF Tl':CII NOLO C;y
r :,GHIJDA
~...,.rr.-
Department of Computer Engineering
f ntcrnal A,Hc~,mcnt -1 Eramlnaffon-2022-23 (Even SemJ GIT=;
Subject: Cryptography & Syrill!,n
Sem:
[Link] ([Link] 1
VI
Date·~~ :t~2-.f
o" /o?/wv.
C:bH Tlm[Link] • 1(,:()0 Hr:i.
(Year): T.E
Max Marlu:20
Sub
Q•
No.
.Q.N
Quc1Uon
0 Marla co PO

1 Attemp t anv ONF.


from following
5
a Explain Security Services and Mechanisms In detail. Explain the
relationship between them. 5 cot POt,2
b List and explain various types of attacks on encrypted message?
5 cot POt,2
2 Attempt any 01i£. from following
5
Encrypt"Academic committee will meet today" using play fair
a
cipher with keyword "ROYAL ENFIELD". 5 cot POt,2
Using hill cipher substitution technique find plain text by decrypting
b -
cipher text "XVWG" with Key matrix
3 5 cot PO1,2
....
5 1~

3 Attempt any 01i£. from following 10


Discuss DES with reference to following points:
i. Fiestel structure and its significance
ii. Block Size & key Size
iii. Key Expansion
iv. Significance of extra swap between left and right half blocks
a v. Need of expansion permutation 10 CO2 POl,2,3
vi. Significance of S-box
vii. DES function
viii. Weak Keys and semi weak keys
ix. Possible attacks on DES
x. Avalanche effect
Elaborate the steps of key generation using RSA algorithm. In RSA
!;ystem the public key (E, N) of user A Is defined as (7,187). Calculate
b '1.>(N) and private key 'D'. 10 CO2 POl,2,3
What Is the cipher text for M=10 using the
public key.
fili6HAROA GIIAIUlA INSTJ'l'lJTE OF Tl~CJINOLOC;Y
IOIHlATllH
Dl'Jmrtmcnt of CompuCcr Engineering
lnkrnnl Asscssml~nt -II lo:x11111l1111llo11-2022-23 (Even Sem)
Gm:,:
Subject: Crypto11raphy & System
Security (CSC602) V:ite: 1'J.04.2023
Sem:
VI Tlme:1 5:00 • 16:00 Hrs.
Class
(Year): T.E Max Markt :20

Sub
Q.
.Q.N Question
No.
0
Markii co PO

1 Attempt any Qfi.£. from followlna s


___,, Explain Applications of Cryptographic Hash Functions?
5 CO2 POl,2.3
b Explain Various Digital Signature Schemas? 5 CO2 POl,2,3
2 Attempt any Qfi£. from following s
What is a Denial of Service attack? What arc the different ways In
a 5 C03 POl,3,S
which an attacker can mount a DOS attack on a system?
Define (i) Phishing (ii) Buffer Overflow (Ill) Format Strings Attacks
.,lt
(iv) SQL Injection (v) Intrusion Detection System? s C03 POl,3,5

3 Attempt any QNE from following 10

,,,;a How does PGP achieve confidentiality and authentication In emails? 10 C03 POl,3,5
Explain IPsec Authentication Header and Encapsulating Security
b
Payload?
to C03 POl,3,5
l
J?!! Gm:
GHARDA INSTITUTE OF TECHNOLOGY
Computer Engineering
First Sessional Examination-2022-23 (IA-I-FH-2023)
Subject: Mobile Computine Date 3 March2023
Sem: VI Time 1 3 PMto4pm
Class TE Max Marks: I 120 I
I
Q.
No.

1
Sub.
Q.N
0
Questions

Attempt any .tw2._from following


Marks co BL l PI

10
a Compare 3G & 4G 5 cos L2 10.1.1
b What is mobile computing ? 5 CO2 Ll 10.1.2
C Draw & explain Electromagnetic spectrum for communication · 5 COl L2 1.4.1
d Enlist the characteristics of SIM(Subscriber Identity Module) 5 CO3 i:.1 8.1.1

2 Attempt any~ s
a What is frequency reuse concept in cellular communication ? 5 COl L3 1.3.1
OR

b Categorize GSM according to types of service provided. 5 jco1I L4 1.3.1

3 Attempt any~ 5 I I
a Discuss multiplexing in wireless communication ) 5 jco1I L6 I 1.3.1
OR

b Assess various issues in signal propagation


5 lco31 LS I 8.1.1
GHARDA li'.'.STITUTE OF TECH1'OLOGY
§GHAROA
~:lilll.'(
Computer Engineering
Second Sessional Examinalion-2022-23 (IA-11-FR-2023) GIT~
~
7

Subject: Mobile Computin2 Da~ 20 April 2023


Sem: VI Time 3 PMto4pm
Oass TE Max Marks: 20

Sub.
Q.
No.
Q.N Questions Marks co PO
0

1 Attempt any two from following 10


Why do hidden & exposed terminal problem arise ? How would you
>" propose to solve it ? 5 CO2 P03

...Expla in the difference between Ad-hoc network & infra strucutre


based wireless networks.
5 C04 P02

Evaluate the various techniques used for optimizing the performance


C 5 CO2 P02
of mobile IP.
d Write a short note on cellular IP. 5 CO2 POl

2 Attempt any~ s
a How is power management utilized in an 802.11 infrastructure
network to optimize energy consumption and extend the battery life of 5 C04 P02
w ireless devices?

~' Expla in the 4G LTE architecture with neat diagram. 5 cos POlO
-..,.

3 Attempt any~ s
a Analyze the Bluetooth architecture and Its layered protocol stack,
outlining the specific functions and Interactions of each layer, as well s C04 P02
as the overall system design and how It facilitates communication
between Bluetooth-enabled devices .
OR

I.; Discuss how tunneling works for mobile IP uslnl! IP In IP Encaosulation. s CO2 POlO
GHAR□A GHARDA INSTITUTE OF TECHNOLOG Y
FOUNDATION Department of Computer Engineering GIT/E :
First Scssionnl Examination-202 2-23 (Even Sem)

Subject: Artificial Intelligence Date: 09-03-2023


Sem: VI Time: 11.00-12.00
Class (Year): TE Computer Max Marks: 20
[Link]. [Link] Question Marks co Pl

1 Attempt any Two from following 10


a Define artificial intelligence in different context with example 5 COl POl

b Summarize properties of task enviroment with the help of example 5 COl P02

What is Intelligent agent? What are the different types of agents?


C 5 COl P03
Demonstrate Utility based agent with diagram.
2 Attempt any one 5
Discover root value for Alpha Beta Pruning algorithm for terminal
values -1,4,2,6,-3,-5,0,7. Assume that the terminal values are
a 5 C03 P04
present at Binary tree of level 3. State its space complexity and time
complexity.
OR
Discover root value for Minimax algorithm for terminal [Link] .. ~s -
1,4,2,6,-3,-5,0, 7. Assume that the terminal values are present at
b 5 C03 P04
Binary tree oflevel 3. State its space complexity and time
complexity.

3 Consider following figure & Attempt any one 5

a Apply RBFS algorithm to find the path from Arad to Bucharest 5 CO2 POS
UK
b Apply A* algorithm to find the path from Arad to Bucharest 5 CO2 POS

Str.-..i;,ilit ..iw. Jd1Dl'ICIO


[Link]
Aud 366
Bucbt'flt 0
Cnio,·a 160
Doba~•• ."?4.!
Eforu 161
Fagan, 178
Giurpa n
Hino,-. lSl
1:ni ~6
Lucoj !-M
Mellaclia ?41
Neamt !J4
Oradea JSO
Pitesd ,a
Riaulin ,·DNa ltJ
Sibia 2"
Timhoara Jlf
l'nitftd IO
\"uJui 1ft
Zeriad 374
--

GHAR□A GHARDA INSTITUTE OF TECHNOLOGY


FOUNDATION Department of Computer Engineering G1r1=.
Internal Assessment-II 2022-23 (Even Sem)

I Subject:
Sem:
Class (Year):
Artificial lntellil!ence
VI
TE Computer
Date: 19-04-2023
Time: 11.00-12.00
Max Marks: 20

Q. No. [Link] Question Marks co PO

1 Attempt any Two from following 10


Explain various steps of the Knowledge Engineering Process with
a
examples.
s C04 P03

b Elaborate phases ofNLP? Explain Steps to build an NLP pipeline. s cos P03

Illustrate with example Bayes' rule and its use. Also explain
C
semantics of Bayesian network.
s cos P03

2 Attempt anv one 5


Dilferntiate between i) forward & backward chaining
a ii) Propositional Logic and First Order Logic
s C04 POS

OR
b Differentiate between STRIPS and AOL s cos POS

3 Attemot anv one 5


1 Cons1<1er tne lollowmg statements.
1. Rimi is hungry.
2. If Rimi is hungry she barks.
a 3. If Rimi is barking then Raja is angry. s C04 POS
Convert statements in predicate logic. Convert them into CNF form.
Prove that Raja is angry using resolution

OR
Create the partial order plan for the following blocks-world
b s C04 POS
problem(fig 1).

C 8

Stat1 State Goat State


i'
•"
- r.r,6X4fiOA
l!J/'llt(\lffll
GllARDA INSTITUTE OF TECHNOLOGY
N:1mt• of D~p:irtm~nt-CO~I PUT ER
GJT;~,
l~ ° '

S~ssionnl I ExamlnaUon-2022-23

-
S1 bject:
Son:
ta 'JJ
Internet of Things
VI
TE
Date:4/ 03/ 23
nme:11 TO 12
Max Marks: 20
" Q. Sub.
No. [Link]
Question Marks co BL Pl

1 Attempt any Ili:Q s


A fa-plain the loT World Forum (loT\VF) Standardized Architecture. 5 COi L2 1.3.1

OR
B Define smut object and list the different trends in smart objt--cts in brief. 5 CO2 LI 2.2.2
OR
C Write a short note on oneM2M IoT Architecture. i 5 COi L2 1.3.1
I
2 Attempt any one 5
A Compare Edge, Fog and Cloud computing. 5 COi u 2.2.4
OR l

B E.--cplain in brief the different types of sensors? 5 CO2 L5 3.2.1


3 Attempt any one 5
A Discuss IoT Enabler Technology-BLE. 5 CO2 l6 5.-tl
OR
B Make use of an example to explain lot Impact on smart creatures 5 COi L3 2.1.1
I

~

,
/
✓ GUAllDA INSTITUTE OF TECHNOLOGY
Name of Department-COMPUTER
Sessional II Examination-2022-23
Internet of Things Date:21/04/23
GIT •n~=
'Gffii!CA

r'°1.W.!Aif

/ VI Time:11 TO 12
,ear) TE Max Marks: 20

'-
Sub.
[Link]
Question Marks co BL Pl
,, 1 Attempt any Iw.o 5
~ A Explain the Layer I of Core JoT Functional Stack 5 CO2 L2 1.3.l
OR
B Define SCADA and mention in brief about Adapting SCADA for IP. 5 CO2 LI 2.2.2
OR
C Write a short note on generic web-based protocols. 5 COi u 1.3.l
2 Attempt any one 5
A Compare COAP and MQTT. 5 COi IA 2.2.4
OR
B Explain in brief the different categories ofloT application protocols. 5 CO2 L5 3.2.1
3 Attempt any one 5
A Discuss the specifications of BeagleboneBlack. 5 CO2 L6 5.4.l
OR
B Make use of an [Link] to explain Domain Specific IoT:Home Automation. 5 COi L3 2.1.1
PnpH I s_ul>jl•ct Code: 89281 / Systl'll1 Progrn111111ing ,~ Compiler Construction

I•
. l,

' (3 llours ) Totul Murks: 80


'
N.B: (I) Question No. I is compulsory.
(2) Attempt m,y lhrCl' questions 0111 of the remaining five <111cstionl1.
(3) l\lukc suit:~blc assumpt ions whl'rcvcr nl'l'Cssary.
- - - - - - - . ::::'t.------... .:--::;_.:..:.:;. _;,_.:,~:_.-... :...:- ·-= ...;:.. . . -- =-~--~ .:.;...:::.:;:...;,;;,_=-=.:. ·--=-==.::::..::....=.;.:,.~~=---

Q.1. A. What is three-address code? Generntc three-address code for - 5


whil l.! (~1"'- b) do
: , .i.t{c < d) the n
; x :=y ..._z
•· e lse
x :=y- z
B. Compare between Compiler and Interpreter. 5
C. Explain absolute loader. State its advantages and disadvantages. 5
D. Discuss ,vith example · fo rwa rd rclc rcncc ·. 5

Q.2. A. Construct SLR parser fo r the fo llowi ng grammar and parse the input 10
..<)< r: s - <S)s IE.
8. State and explain with examples, different types of statements used in Ill
assemblers with respect to system programming.
A. Explain the concept of basic blocks and flow graph with example the 10
Q.3.
three-address code.
8. Ex plain with help or a llowcharl , the first pass of two-pass macro 10
processor.
_.PA. A. Explain the phases of a ·compiler. Discuss the uccion taken in various JO
phases to compile the statement:
a=b* c+IO, where. a, b, c arc of type real.
Write short note on: lO
8.
(i ) Synta x-directed Translati on. (ii) Macro facilities
What is code optimiza tion? Ex plain with example. the following code 10
A.
optimiza tion techniques:
(i) Common sub-expression elimination (ii)Codc motion
(iii) Dead code eliminati on (iv)Constant prop:igation
in suitable example. 10
8. Explain Direct Linking Loader
It)
A. Test whether fo llowing grammar is LL( I) or not. Ir it is LL( I). cnnstrul!I
parsi ng table for th\! same:
S ➔ I A B )c
A ➔ I ACIOC
O ➔ OS
C➔ I
B. Draw and explain thl! flowdrnrt or Pass-I or two pass assl!mbk:r with 10
sui tabll! exarnp h.:.

27651 Puge I of I

IMOA 77UA( '-l l>Hl( "II-IA/\ I ~ l 09:!KIID0711 I F


•~r« I S•hjttt C'odt': ~l82 I C~·ptography & System Security

ll\lu Marks: 801

" .R ~ \ l) ,\~tl\.'fl 1'~, l ,~ t·\,mrulsory.


\:'.) .,U\.'n'f't any th1'.'c:' (l\ll'.'$hons out of the remaining five.
\-~' :\ U ~~tl\.'11\$ t~rty \.~ual m:uts..
\..-, .,~mlC' ~1i~hk d3ta.. if required and state it clearly.

l A~-n'lpt any f()UR [20J


a E~in 1k rebti.."IC\ship bi:-twecn Security Services and Mechanisms in detail. ii
t, f~,..,~in R'B and COC nlOdcs of block ciphcr-. I
~ ~ -f alt n..~utioo and authentication. Show with example how it can be achieved.
J E'q'ain .:N.l~ ~ authentication tokens.
,t fa?hin butYer o,U'tlow attack

_ a Eab..n x- the stq)S of key ~ using the RSA algorithm. In RSA system the [ I OJ
'('Uh:~ 'L:cy tE. 1'.1) of use A is defined as (7, 187). Calculate Cl>(N) and private key 'D'.
\\[Link] is the cipher re..xt for M=IO using the public key.

}\ ~ --USS DES with r e f ~ to follo,\>ing points [ I OJ


I. Bkd si2le and key size
~~ .::, fc . ~ permutation
3Jl..-.k ofS-h:lx
-[Link]: l:~s and semi we31: keys
5. P~'bk :[Link]:soo DES

3 a "1lal ~~SCf'\~usingamessage digest? ExplainusingMDS. [IO]


b "\\"hat is DOOS amcl:? Explain how is it launched. [IO]

./l a "~ are digiw <X:rtificates and signatures required? What is the role of digital signature [IO]
a d:pul <X:rtificatcs'? Explain any one digital signature algorithm.
b H.- docs PGP a..::hie\'C confidentiality and authentication in emails? [IO]

5 a State dlC rules for finding Euler's phi function. Calculate [IO]
a. rq,(JJ )
b. rq>(49)
c.. (p(240)
b [Link] "-'.crbcros. \\by is it [Link] as SSO? [ l O]

6 a Enlist ~ vanous functions of the different protocols of SSL. Explain the phases of [ l OJ
~ [Link]
b H-,. tS adue\'cd in Tnnspon and Tunnel modes oflPSEC'? Explain the role of
socuril) [10)
AH and ESP.

18998 Page I of I

5)..\INS:49f~018R798C3D8'.!4B8D329B7
Paper/ Subject Code: 8'J28J / Mobile Computing

Duration: Jhrs
fMu Mark,:HOJ

(1) Question No I is Compulsory.


(2) Attempt any three questions out of the remaining five.
(3) All questions carry equal marks.
( 4) Assume suitable data, if required and stale it clearly.

Attempt any FOUR (201


a Explain concept of frequency reuse with clustering. 5
b Explain in short wireless LAN security threats. 5
c What is spread spectrum? 5
d Describe use of Cellular IP. 5
e Explain in short voice over LTE. 5

2 a Explain in short different algorithm used for authentication and privacy in GSM. (101
b What is the use of different interfaces used in global system for mobile (101 '
communication (GSM) with diagram? i'
I

3 a Explain hidden station and exposed station problem with solution in WLAN. (10)
b How is packet delivery achieved to and from mobile node? (10)

4 a Explain snooping TCP and mobile TCP with their merits and demerits. (101
b Explain the process of registration in Mobile IP. (101

5 a Explain protocol architecture of IEEE 802.l l with diagram. (10)


b How IP mobility is achieved in wireless network. [10)

6 a Explain different components used in LTE architecture with diagram. [101


b Which components are new in GPRS as compared to GSM? What is there [101
purpose?

2H390 Page 1 of 1

76D2All24AC49F0116A5047F4D6AA09EB8
Paper/ Subject Code: 89284 / Artificial Intelligence

Time: 3 Hours Marks: 80


1) Q. l is compulsory
2) Attempt any three from remaining five questions

~ ) Solve any four of the following:

a) Describe different categories of Al (5)


~ Describe the characteristics of a medical diagnosis system using the PEAS propenies (5)
~ Explain Goal based Agent with a block diagram (5)
....d) Compare and contrast propositional logic and first order logic [5)
fr What do you mean by hill climbing. Explain. [5]

~~onn a - ~ pruning on the following graph, clearly indicating the


a and~ cuts and the final value of root node. [10)

MIN

~
H

D ~ F

Go, ., GGoo
MAX '\

K L M N 0 p Q R s T u V w X y z a

~ t do you understand by informed and uninformed search methods? Explain in detail

with example. [IO]

Q3)
a) Consider the following statements: [10]
a) All people who arc earning are happy
b) All happy people smile
c) Someone is earning
Perform the following tasks:
i) Represent above statements in FOL
ii) Conven each to CNF
iii) Prove that someone is smiling using resolution technique. Draw the resolution tree

b) What do you understand by forward chaining and backward chaining. Explain in detail
[ 10]

26341 Page 1 of 3

7SD8E3CF77ED0252 f 6C I SC I FD690I FCD


Pnpcr / Suhjcct Code: 89284 / Artilicinl Intelligence

Q.4

a) For the given graph, the table below indicntcs the path costs and the heuristic values. S is the
start node and GI , G2 nnd G3 arc the goal nodes. Perform A• search to find the shortest distance
path from S to any of the goal nodes. [JO]

cp
0
/ ·
Edge Cost Edge Cost Edge Cost
SA 5 BA 2 DS 1
SB 9 BC 1 DC 2
SD 6 cs 6 DE 2
AB 3 CG2 5 EG3 7
AGl 9 CF 7 FD 2
FG3 8

Node Heuristic Node Heuristic Node Heuristic


s 5 D 6 Gl 0
A 7 E 5 G2 0
B 3 F 6 G3 0
C 4

b) What is planning in AJ? Discuss partial order planning and hierarchical planning in detail [IO]

26341 Page 2 of 3

75D8E3CF7 7ED0252F6C I SC I FD690 I FCD


Paper/ Subject Code: 89284 / Artificial Intelligence

~_,>) Explain the concept of genetic programming · [ l 0)


~What is fonnulation ofa problem. Fonnulate the Wumpus world problem in terms of following
components: initial state, actions, successor function, goal test, path cost. (10)

(20)
~ Write short notes on :

~pplications of AI
~imulated annealing

26341 Page 3 of 3

75D8E3CF77ED0252F6C l 5CI FD6901 FCD


\l

P11per I Subjl'ct Codl': 8928~ / lntl'rnl't of Thin~s (DLOC)

Time: 3 hours

Instructions:
I) Solw :my FOUR questions .
2) All qu~t ion carrks equal marks .
.3) Figun.-s to l~ right indicate foll marks.
4) Assume suitable additional data. if necessary nnd clearly state ii.

Q. l_a) Discuss IOTWF Standardized Architecture.


( .'- \ii)
~ ) Explain Raspberry Pi with diagram.
(5 M)
fl\ Descnoe Zig~ protocol stack using IEEE 802. 15.4.
( 10 1\,1)

Q..:! j> \\liat are gateways and backhaul sub layers?


(5 \1)
)(I Briefly explain Adapting SCADA for IP. (5 \1)
c) What do you mean by SoC? Also explain its applications.
( 101\,1)

Q3 a) Describe various health & lifestyle domain specific IOT.


(5 M)
b) faplain the different pin/pans of Arduino Uno board.
(5 M)
c) Descnoe data vs. network analytics for an loT network.
(IUMJ

Q.~ Write short notes on BLE.


1-' .\It
~ Differentiate betw~n Sensors an~ actua'.ors _with neat di_agram.
(5 .\11)
j;) \\bat is Iol: Explain loT blocks in detail. List out the different IOT Challenges. (101\,1)

~ Explain JOT Application layer with a neat diagram. (5 M)


_>) Discuss the concept of Edge computing.
(5 Ml
faxplai n MQIT. Compare - COAP and MQTT.
(10 M)

Q.6 a) Describe Architecture of Wireless Sensor Network.


(5 M)
b) Explain different Energy related IOTs Domain with example. (~ 1\1)
c) \[Link] are JOT software platform? Explain in short with an example. (10 M)

•••••••••••

27003

3807396AODA ?ES 11 S4F!IC-l9079D93t>F I

You might also like