Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
35 views
12 pages
Previous Question Paper (Ns & MAD)
Urgent of this pdf download
Uploaded by
Rupesh Singh
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Previous Question paper ( Ns & MAD ) For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
35 views
12 pages
Previous Question Paper (Ns & MAD)
Urgent of this pdf download
Uploaded by
Rupesh Singh
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Previous Question paper ( Ns & MAD ) For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Previous Question paper ( Ns & MAD ) For Later
You are on page 1
/ 12
Search
Fullscreen
example. (co-7) Q.27 Differentiate between symmetric and asymmetrickey cryptography? (C02) 2.28 How we can handle cyber assets? (CO-6) 2.29 Define digital signature and digital certification (CO-2) (0.30 Define cycle redundancy check. | (CO-2) Q.31 What is Worm? Explain its types. * (CO-3) @.32 Write down the various steps for modifying security policy. (co-8) 2.33 Explain various types of network disasters? (CO-8) Q.34 What is HTTP and SSH? (co2) Q.35 What are various principles of data security? (co) SECTION-D Note:Long answer type questions. Attempt any two outofthree questions. 2x10=20 @.36 Explain the term encryption. What are its methods? Explain them with suitable example. (co-2) 37 What is RAID, server redundancy and clustering? What is the role of disk mirroring in RAID management? Explain ts levels. (CO-8) Q.38 What are the advantages and disadvantages of afirewall? (CO-4) (Note: Course outcome/CO is for office use only) (2800) (4) 180862/170862/120862 No. of Printed Pages : 4 Role : 1180862/1708 6TH Sem. / Computer Engg. ‘Subject : Network Security Time : 3 Hrs. MM. : 100, SECTION-A Note:Multiple choice Questions. All questions are ‘compulsory (10x1=10) (Course OutcomelCO) 1 Which one of the following is a key function of, firewall? (co-4) a) Copying b) Moving ©) Deleting 4) Monitoring ‘Apperson who uses his or her expertise to gain access to other people's computers to get information ilegally ordodamageisa_ (CO-3) a) hacker b) Analyst ©) spammer 4) programmer SSL provides (co-2) ‘a)_messageintegrity b) confidentiality c) compression d)_alloftheabove The protocol POP’ stands for (co-4) 1a) _personalorfice protocol b)_ postoffice protocol-__ news val a5 Men rocptpvacy ‘cos a) Confidentiality b) integrity 6) authentication 4) noneoftheabay cs ting nieces eat a) 32bits >) 64>its ©) 128bits d) 256 bits 7 “arty bis" re used for which ofthe following purposes? (Cos) a) Encryption ofdatab) totransmitfaster 6) todetecterrors d) _toidentifythe user 08 Thetoms FTE stands fo? (eon) 3) Fokacsiuogae 2) Felsrensaen aaa 2) leant pon 0) Rte lead 29 D&S dane a) Data Encryption Standard b) DataEncryption Statistics ©) Dan Ercypton Syston 9) Daa Enypton Sequence Q10_ IS used to validate the identity of the message sendertotherecipient. (CO-2)) | ) Encryption b) °) Digital Certticate d) (2) 180862/170862/12086; Decryption None ofthese SECTION.B Note:Objective {ype questions. All questions are compulsory, 10x1=10 0.11 What are single points of failures? (C08) (Q.12 What is session in VPN? (co-7) Q.13 Any two limitations of IDS. (co-s) Q.14 What are outbound rules in firewall? (CO-4) Q.15 What is use of VPN? (co7) Q.16 Define Network disaster. (co-8) Q.17 Define IPS, (Co-5) Q.18 Define virus, (co-3) Q.19 Any two limitations of IDS. (co-5) Q.20 Define SSH (co-2) SECTION-C Note:Short answer type questions. Attempt any twelve questions out of fifteen questions. 12x5=60 Q.21 Write down various features of IT Amendment ‘Act 2008, (CO-1) Q.22 Why do we need secure network? (CO-6) Q.23 What are the limitations of intrusion detection system? (CO-5) 2.24 Explain the advantages of firewall? (CO-4) tion cipher encryption method? Q.25 Explain substitution cipher encryptios wey Q.26 Drawa neat diagramSECTION-D Note:Long answer type questions. Attempt any three ‘questions outoffourquestions. . 3x10=30 .33 What is VPN? What are its various types? Explain with the help of diagram. .34 What do youmean by RAID. What areits various levels? Explain in detail Q.35 What is virus? Explain its various components indetal Q.36 Write shortnote on . Digital signature b. Cyberethics Ngo Prnted Pages :4 Si line 1208627030885 6th Sem. ! Computer Engg. 17. ‘Subject : Network Security Time : 3 Hrs. MM. : 100 ‘SECTION-A Note:Objective type questions. All questions are ‘compulsory (10x1=10) Q1 Define firewall 2 Whatare end pointsin VPN? 3. Whatisciphertext? Q4 Define clustering. 5 DESstands for Q6 Define encryption. Q7 Define stream cipher. Q.8 Whatisinternetbackup? Q.9 Whatiseithical hacking?Q.10 SSH stands for SECTION-B Note: Very short answer type questions. Attempt any, ten questions outof twelve questions. 10x2=29 11 Whatis Se: .12 Define passive attacks? .13 Whatdo you mean by ethical hacking? 0.14 Define ferential backup. 15 Differentiate between HTTP and HTTPS. 0.16 Whatare igital cortiicates? .17 Nameany two IDS imitations. 0.18 Define SSH 0.19 Whatare various rewalltypes? 2.20 Definenon-repudiaton, 2.21 Whatis certifying authorities? 2.2 Define access controllist. @ SECTIONS Note:Short answer type questions. Attempt any sight questions outof ten questions. BxS=40 2.23 Whatis the need of network security? 0.24 Explain 3-DES withthe help of diagram. 2.25 What are various principles ofnetwork security? 2.26 What is cyber-crimes? What are its various types? 2.27 Explain RSA encryption wth diagram, (2.28 Explain MDS along withits various properties. (2.29 What do you mean by Worms? Explain its any twotypes. Q.30 Stale firewalls? Explain any two firewall functions in detai. 2.31 What are various types of hackers? Explain in detail. 2.32 Define clustering? What are its various. ‘advantages? @) 120862/0308654on of 027 Differentiate between encryption and deerton (C08) (co2) (C02) daa? Q.28 Explain configuration policy ofcyber asses. Q.29 Define digital certficateand IPSec. Q30 Define cycle redundancy check Q31 Whatisapplicationlevel virusseannes? (CO) Q.32 Write anote on configuration of required objects it VPN. (CO-7) Q.33 Explain about network disasters. (CO8) Q34 Whatis process configuration? (C03) Q35. Whatis ethical hacking explain it with example? (CO-!) SECTION-D Note: Long answer type questions. Atempt any two questions out ofthe questions. Q36 What do you mean by heuristic scanners a explain deplaying virus protection (Q37 What are the types of firewall and its imitations? (CO-4) Q38 Writeshort note on the following 8) Host based IDS setup (cos) b)_ Disaster category (co#) (Note: Course outcome/C0 is for office use only) 180862/170762/ 120862030865 ‘No.of Printed Pages 0 pide ad twose2 70760) - 1208621030865 4h Sem / Computer Engs. Subject: Network Security Tine :3 Hrs, MM. : 100 SECTION-A Multiple choice questions. All questions are compulsory (xI-10) ‘The field that covers the variety of computer network, both public and private, that used in everyday job? (co) 2) Arial Ineligence » ML 91 &) Network Security Which one of the following is @ key function of Firewall? (co-4) a) Copying b) Moving: ©) Deleting 4d) Monitoring SSL provides (C02 ‘8) Messageintegrity b) Confidentilly ©) Compression _d)__Alloftheabove ‘Theprotocol ‘POP’ stand for (co) a) Personaloffie protocol 'b)_ Postoffice protocol ©) Privacy overall protocol 4) Privacy over protocol6 2 QS Firewallsareused for a9 Qu0 isan example ofpublickey algorithm. (CO.9y a) RSA by DES ©) IREA @ RCS VPNstand for 2) Visual Public Network ) Virtual Publie Network (con ©) Virtual Private Network 4) Visual Private Network 7 purposes? 4) Encryptionofdata b) ») 2 a RAID stands for ” » 2 a Message sent a 9 party bts” are used for whieh of the following (C03) Totransmit faster Toidentify theuser (Co-4) ) Todetectertors — d) Routing Security Unauthorized acess Congestion contol (cos) Redundant array ofindependent disks Readingarray ofindependent disks Redundantaray of inter disks Redundant array ofindependen drives is used to validate the identity of the to the recipient. (CO-2) Encryption 'b) Decryption Digital Certificated) Noncofthese @ 180862/170762/ 120862/030865 SECTION-B Note: Objective type questions compulsory, (9.11 Define term security of data over internet: 0.12 WhatisITAct2000amended2008? —_(CO-1) 13 Define vinis Scanners, (€03) Q.14 Whatarethedifferenttypesofencryption? (Ct Q.15 DefinePGP. Q.16 Explainhost. QT Defineeyber rime. Q.18 WhatisIDS? Q19 Define VPN. 0.20 Expandclustering. AIL questions are (Ox1=10) (ony SECTION-C Note: Short answer type questions. Attempt any twelve questions outof fifteen questions, (125-60) Q.21 Writedown various features ofTTAct2000, (CO-1) ain the concept of encryption and decryption a as (c0-2) (23, Whatate the disposable policies in handling of cyber assetssystem? (co-6) {24 Explain IDS counter measures (cos) Q.25 Explain Digital signatures? op {Q.26 Draw a neat diagram of VPN and explain it example. (co-r) 180862/170762/ 1208621030865. ®Q28 Write the steps used in developing a mobile application ormakinga phone cal (co) Q.29 Summarize the procedure to ereate gallery (C0-6) android Q30 Explain about context menus used inandroid, (CO-6) Q31 Explain about geo coding and reverse geocoding i location-based services (C0-6) Q.32 Explain about the process of obtaining API keys in location-based services. (Co) Q.33 Explain the steps for accessing the web services in android. (€o-77) Q34 Describe the process of storing and retrieving the data from external storage (co-7) Q35 Describe the procedure to navigate to « specifi location in location-based services of android. (CO-7) SECTION-D Note: Long answer type questions. Attempt any two {questions out of three questions. Qx1 Q.36 Explain location-based servicesindetail. _ (CO-6) Q.37 Define mobile computing. Explain 3-tier architecture ‘ofmobile computing along with its diagram. (CO-1) Q.38 Describe the following: (c0-6), a) EditText view b)_ TimePicker view (Note: Course outcome/CO is for office use only) (4280) No. of Printed Pages : 4 Roll No, 180863/170863 / Computer Engineering MM. : 100 SECTION-A Note: Multiple choice questions. All questions are compulsory (10x1=10) QI Andoidis: (co-4) a) Webbrowser —b)_ Webserver ©) Operatingsystem d) Database Which ofthe following virtual machine is used by the Android operatingsystem? (CO-5) a) Simple viral machine >) Javavirtal machine ©) Dalvikyvrtual machine 4) Android virtual machine ‘Tier-2 in mobile computing architecture is also calledas: (co-2) a) Operatingtier —b)- Mobility ter ©) Applicationtier d)Alloftheabove ADT means: (co-) 4) _AllDevelopment Tool +b) Android Direction Toolmeans it will occupy the complete spree available onthe display ofthe device. (€0-6) a) wrap_content —_b)-_match_content ©) rap_parent 8) match_parent Toembeda web browserin your activity which view is used? (C0-6) 8) Edit View b) Chrome View ©) BrowserView d)_ WebView InAndroid,a view isalso knownas: (co-6) a) I b) Widget ) Scene @) PeView Which ofthe following isnot part of Android’s native libraries? (CO-4) 8) SQLite b) Webkit ©) Dalvik ) OpenGL Q9 Content provider includes (co-7y 8) ViewContacts _b) Add Contacts ©) DeleteContacts d)_Allofthe mentioned Q10 Which year was the Open Handset Alliance: announced: (co-4) a) 2006 b) 2007 ©) 2008 SECTION-B Note: Objective type questions. All questions are compulsory (10x1=10) Qt WEFT stands for (C03) (0.12 WEMAX standsfor_—— (C03) 0.13. Listany two android mobile devie manufactures. (CO-) 0.14 Givefull form of SDK. (C05) (0.15 Name any two atributes of RadioButton view.(CO-6) (0.16 TextViewisused for a (Co) Q.17 Givefull formofSMS, (0-6) Q.18 SQLiteisadatabasesystem.(TruelFalse) _(CO-1) 0.19 Givefull formof HTTP (co 0.20 Zoomcontrolisusedfor__. (co-7) SECTIC Note: Short answer type questions. Attempt any twelve ‘questions out of fifteen questions. (12x5=60) Q21 Discuss about the evolution of mobile computing. (co-1) Q.22. Explain about Android Runtime. (co-4) Q.23 List any five differences between wired and wireless ‘mechanism in mobile computing, (cou, Q.24. Explain any five features of android. (cOo-4) Q25. Explain about intentsavailableinandroid. — (CO-5) Q.26 Explain any five attributes of DatePicker view.(CO-6) 2 estes ToggeButo an natn von 3 = je (CO)31 Explain the process of Downloading binary data in Android, (cO-5) Q.32 Give any five differences between FOMA and COMA. (co-2) SECTION-D Note:Long answer type questions. Attempt any three ‘questions outoffourquestions. 3x 10=30 @.33 What do you mean by Content Provider? Explain how it can be used for sharing data in Android, (cos) Q.34 What are different types Menu's in Android? Explain the working of any one type with example. (co-4) Q.35 What are different phases of life cycle of an activity in Android with the help of diagram. (co-3) Q.36 What is mobile computing? Explain its three tier architecture with the help of diagram. (CO-1) (Note: Course outcome/CO is for office use only) No.of Printed Pages RolNo 6th Sem. / Computer Engg. ‘Subject : Mobile Application Development Time 3 Hrs. MM: 100 SECTION-A Note:Objecive type questions. Al questions are compulsory (10x1=10) {Course Outcomelco) 1. NFCstands for (co) 2. Define mobi staton. (co-) 03 Event is called when the actviy becomes viibietotheuser. (003) 4 Whatis need of Progress Bar Viewin Anérig? (cos) 05 ___ Objects used to store data les locally ‘on Android device's internal memory. (CO-5) Q6 Define Network and Switching Subsystem. (CO-2) 7 Define GPRS. (002) 17086328 List any two android devices in the market (coy 0.9 Which parameter is used to display text in Textview? (coy (2.10 Name any two manufactures and their mobile (coz) operating systems, SECTION-B. Note: Very Short answer type questions. Attempt any ten questions out of twelve questions. 10x2=20, 2.11 Define mobile computing (co-t) .12 Define Android Market. (co-3) 0.13.Give four names of companies and their ‘mobiles OS. (co-2) Q.14 ListanytwoGPRSapplications. _(CO-2) 0.15 Whatis Android SDK. (co-s) (2.16 What do you mean by Fragments in Android? (co-3) Q.17 Define reverse geo coding nAndroid. (CO-5) Q.18 Define Context Menu, (co) 2.19 Whatdoyoumeanby LinuxKeme!? (CO-2) 2.20 Define EditText View. 0.21 Listany two features of tutooth, 0.2 Define GSM. SECTIONS Note:Short answer type questions. tempt any five questiosoutoftenquestons. _5x6=40 (0.28 Explain the process of storing and Retioving data rom Extema storagein Android, (CO-5) 0.24 Whatis the use of Data Picker View in android? (co) 0.25 Explain various types of layouts in Android. (cos) 0.26 What is short Message Service? Explain its various strengths. (co-2) 0.27 Explain various steps for consuming web service ‘tough HTTPin Android. (cos) (0.28 What do mean by List View. Explain its use with thehelp of example. (co) 229 Differentiate between 3G and 46 Technology. (c02) 30 Explain the use of Radio button and Rao Group viewinAndroid wth example, (CO) (cosy (co2)rite how to Call buit-in application using 2.27 wre how to Call bitin applealon sid Q.28 Explain user interface with views and viewgroups, Display orientation? (CO-2) 0.29 Explain Text view, Button, Image Button, Edit Text? (CO-3) Q.30 Explain Time picker view, and Date Picker view? (co-3) 0.31 Explain analog and Digital view & Dialog Boxes. (0-3) .32 Explain how to display Pictures & Menu with views? (CO-3) 2.33 Explain Geo coding & reverse Geo coding? (co-4) Q.34 Explain any two Android Services? (CO-4) Q.35 Explain Storage with SQLite in Android?(CO-4) ‘SECTION-D Note:Long answer type questions. Attempt any two outofthree questions, 2x10=20 Q.36 Explain 3-Tier Architecture of Mobile Computing {CO-1) Q.37 Explain the steps for sending SMS, Receiving ‘SMS and Making phone call? (CO-3) Q.38 Explain Location based Services, content provide, SQLite in detail? (co) (2760) 180863/170863 Be eran | Roll No. 180863/170863 Computer Engineering. ‘Subject : Mobile Application Development Time: 3 Hrs. MM. 100 SECTION-A Note:Multiple choice Questions. All questions are ‘compulsory (10x1=10) (Course OutcomeiCO) 1 Which among these are not a part of Android's native libraries’ (co2) a) Webkit b) Dalvik ©) OpenGL d)_ Scite Dialog classes in Android? (co) a) AlertDialog ——_b) Progress Dialog ©) Date picker Dialogd) Allabove 1 you want share the data across the all applications, you should gofor? (co) a) Shared preference b) Content provider ©) Intemal storage 4) SQLite database Which year was the open handset alliance announced? (co-1) a) 2005 b) 2006 ©) 2007 200@5 The Emulator is identical to running @ real phone ‘except when emulating/simulating what? (Co-1) a). Telephony b) Application ©) Sensor d) Allaspect Q.6. The XML file that contains all the next that your application uses? (co2) a) stack xm! b) textxmt ©) strings xml d) string java Q7 Creating @ Ul (User Interface) in Android requires careful use of. (co-2) a) javaandSQL —b)_xmlandjava ©) xmlandc++ Q8 ADT means: dreamweaver (co-2) a) Android Developmenttool b) Android Data ©) AllData Too! d)_AllDelete tool 9 HTTP means: a) Hyper Text Transfer Protocol b) Hard Text Transfer Protocol ©) Heavy Text Transfer Protocol d) Hyper Too! Text Place Q.10 Tim Picker is available in: a) Advanceview b) SMS. ©) Content provider d) Geocoding . (2) 1708 180869/170863 (co-3) SECTION-B Note:Objective type questions. All questions are ‘compulsory. 10x1=10 Q.11. Name Android mobile manufacturer_(CO-1) Q.12 What is the latest Android Operating system 1 es (0-1) Q.13 Meaning of ADT. (Co-2) Q.14 Whatis thenameAndroidRunTime__ (CO-2) Q.15 Meaning of AVD. (co-2) Q.16 Name Tier 1 ofAndroidarchitecture_ (CO-1) Q.17 Name Tier3 of Android architecture _(CO-1) Q.18 HTTP means, (cO-4) Q.19 DYM stands for (co-2) Q.20 SMS stands for (co-3) SECTION-C Note:Short answer type questions. Attempt any ‘twelve questions out of fifteen questions. 12x5=60 2.21 Write Mobile computing Security issue?(CO-1) Q.22 Compare wired and wireless mechanism? (CO-1) 23 Explain 3-Tier Architecture of Mobile Computing in brief? (co-t) Q.24 Write various features Wi-Fi and Wi-Max, Bluetooth? (CO-1) Q.25 Explain in Android its Features, Versions, Market, Runtime? (CO-1) Q.26 Explain how to install and configure Android? ¢ (co-2)
You might also like
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
From Everand
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
Mark Manson
4/5 (6458)
Principles: Life and Work
From Everand
Principles: Life and Work
Ray Dalio
4/5 (648)
Grit: The Power of Passion and Perseverance
From Everand
Grit: The Power of Passion and Perseverance
Angela Duckworth
4/5 (650)
Never Split the Difference: Negotiating As If Your Life Depended On It
From Everand
Never Split the Difference: Negotiating As If Your Life Depended On It
Chris Voss
4.5/5 (1005)
The Glass Castle: A Memoir
From Everand
The Glass Castle: A Memoir
Jeannette Walls
4.5/5 (1856)
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
From Everand
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
Ashlee Vance
4.5/5 (582)
The Emperor of All Maladies: A Biography of Cancer
From Everand
The Emperor of All Maladies: A Biography of Cancer
Siddhartha Mukherjee
4.5/5 (298)
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
From Everand
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
Brené Brown
4/5 (1175)
The Little Book of Hygge: Danish Secrets to Happy Living
From Everand
The Little Book of Hygge: Danish Secrets to Happy Living
Meik Wiking
3.5/5 (464)
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
From Everand
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
Ben Horowitz
4.5/5 (361)
A Man Called Ove: A Novel
From Everand
A Man Called Ove: A Novel
Fredrik Backman
4.5/5 (5181)
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
From Everand
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
Viet Thanh Nguyen
4.5/5 (141)
Steve Jobs
From Everand
Steve Jobs
Walter Isaacson
4.5/5 (1139)
Yes Please
From Everand
Yes Please
Amy Poehler
4/5 (2016)
The Perks of Being a Wallflower
From Everand
The Perks of Being a Wallflower
Stephen Chbosky
4.5/5 (4103)
Shoe Dog: A Memoir by the Creator of Nike
From Everand
Shoe Dog: A Memoir by the Creator of Nike
Phil Knight
4.5/5 (629)
Angela's Ashes: A Memoir
From Everand
Angela's Ashes: A Memoir
Frank McCourt
4.5/5 (943)
The Outsider: A Novel
From Everand
The Outsider: A Novel
Stephen King
4/5 (2886)
Rise of ISIS: A Threat We Can't Ignore
From Everand
Rise of ISIS: A Threat We Can't Ignore
Jay Sekulow
3.5/5 (144)
The Yellow House: A Memoir (2019 National Book Award Winner)
From Everand
The Yellow House: A Memoir (2019 National Book Award Winner)
Sarah M. Broom
4/5 (100)
Team of Rivals: The Political Genius of Abraham Lincoln
From Everand
Team of Rivals: The Political Genius of Abraham Lincoln
Doris Kearns Goodwin
4.5/5 (244)
The Woman in Cabin 10
From Everand
The Woman in Cabin 10
Ruth Ware
3.5/5 (2814)
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
From Everand
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
Margot Lee Shetterly
4/5 (1022)
The Light Between Oceans: A Novel
From Everand
The Light Between Oceans: A Novel
M.L. Stedman
4.5/5 (815)
The Constant Gardener: A Novel
From Everand
The Constant Gardener: A Novel
John le Carré
4/5 (278)
Sing, Unburied, Sing: A Novel
From Everand
Sing, Unburied, Sing: A Novel
Jesmyn Ward
4/5 (1267)
The Unwinding: An Inner History of the New America
From Everand
The Unwinding: An Inner History of the New America
George Packer
4/5 (45)
The World Is Flat 3.0: A Brief History of the Twenty-first Century
From Everand
The World Is Flat 3.0: A Brief History of the Twenty-first Century
Thomas L. Friedman
3.5/5 (2289)
Fear: Trump in the White House
From Everand
Fear: Trump in the White House
Bob Woodward
3.5/5 (836)
Her Body and Other Parties: Stories
From Everand
Her Body and Other Parties: Stories
Carmen Maria Machado
4/5 (903)
Bad Feminist: Essays
From Everand
Bad Feminist: Essays
Roxane Gay
4/5 (1090)
The Art of Racing in the Rain: A Novel
From Everand
The Art of Racing in the Rain: A Novel
Garth Stein
4/5 (4372)
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
From Everand
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
Gilbert King
4.5/5 (280)
Little Women
From Everand
Little Women
Louisa May Alcott
4.5/5 (2369)
A Tree Grows in Brooklyn
From Everand
A Tree Grows in Brooklyn
Betty Smith
4.5/5 (2033)
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
From Everand
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
Dave Eggers
3.5/5 (233)
John Adams
From Everand
John Adams
David McCullough
4.5/5 (2546)
Wolf Hall: A Novel
From Everand
Wolf Hall: A Novel
Hilary Mantel
4/5 (4135)
Manhattan Beach: A Novel
From Everand
Manhattan Beach: A Novel
Jennifer Egan
3.5/5 (919)
On Fire: The (Burning) Case for a Green New Deal
From Everand
On Fire: The (Burning) Case for a Green New Deal
Naomi Klein
4/5 (78)
Brooklyn: A Novel
From Everand
Brooklyn: A Novel
Colm Tóibín
3.5/5 (2141)