BSC ITIM 4th Sem Question Paper May 2012

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

BSIMS-E1

Page No 1

Third/Fourth Semester B.Sc., (ITIM) Degree Examinations


May/June 2O12

(CBCS) Interconnecting Network Devices


Time: 3 hrs.] from Part B [Max.Marks: 100 Note: Answer all questions of Part A. Any FIVE questions

PART A
1. What is the purpose of Bootstrap program? 2. POST is an acronym of ____________ 3. Which are the three Global configuration models? 4. What is Routing? 5. What is a routing loop? 6. Which are the 4 types of OSPF routers? 7. What do you mean by Wild card mask? 8. What do you mean by circuit switching? 9. What is store and forward switching? 10 ____________and _____________are switch port parameters 11. What is VPN? 12. What are security associations? 13. What is WAP?

25 Marks 2 1 3 2 2 2 2 2 2 2 2 2 1

PART B
and their properties of serial ports. b) What are different versions of CISCO - IOS? 2. a) How does the file configurations do? Explain. b) What are Global configuration models? Explain. b) What do you mean by Dynamic routing? Explain. .

75 Marks

1. a) What are the different interfaces of router ? Explain the signaling standards (10+5) (8+7) (10+5) Contd... 2

3. a) How does routing takes in a Network? Explain with an example.

BSIMS-E1
4. 5. 6. a) How does you do routing authentication? Explain. b) What are the evaluation rules for access list? Explain. a) Draw and explain WAN connectivity. b) What is PPP? Explain. a) What do you mean by Tunneling ? Explain. b) What are different types of VPN? c) Enllist the frequency and Data rates of 802.11 protocol. 7. a) How IPv6 deals with limitations of IPv4 ? Explain. b) Define and explain i) Anycast and 8. Write a note on i) RIP ii) IPv6 iii) HTTP ii) Unicast.

Page No 2

(8+7) (8+7)

(5+5+5)

(7+8) (5X3)

*******

BSIMSE2

Page No... 1

Third/Fourth Semester B.Sc., (ITIM) Degree Examinations


May/June 2012 (CBCS)

Programming using C #
Time: 3 hrs.] Note: 1. Answer all questions in Part A. 2. Answer any FIVE complete questions in Part B Part A Answer all questions. 1. Name the possible states of a mobile phone. 2. In the using system, system is a _______ 3. Console is a __________ 4. _______ operators are used to evaluate expressions and return a Boolean value. 5. State whether the following statements are true or false. a. Encapsulation means preventing access to non-essential details. b. In a public access specifier, all this public members of the base class become protected. c. Abstraction represents the essential characteristics of an object or classes that differentiate it from other objects or classes, 6. What is just-in-time compilation? Briefly explain. 7. What is project output? Illustrate. 8. How do you declare an array? Give an example. 9. A destructor has the same name as its class bit is prefixed with _____ 10. The ________ process identifies the unused objects and releases them in C#. 1 11. What is the need for operator overloading? Explain. 3 2 Contd...2 12. Indicate the various relationships that can be established between the objects of different classes. 1+1+1 2 2 3 1 1 Max Marks 25 2 1 1 [Max.Marks:100

BSIMSE2

PART B

Page No... 2 Max Marks: 75

Answer any FIVE complete questions.


b) Indicate the rules for naming classes in C#

1. a) Briefly explain the three phases involved in the object - oriented methodology. c) With suitable example, differentiate between member variables and member functions. 2. a) Briefly explain the steps to be followed while compiling and executing a program. b) Write a complete C# program to identify whether a character entered by a user is vowel or a consonant. . 3. a) Define a method. Further, discuss the followings i) ii) Defining methods Calling methods (8+7)
(7+8)

(6+4+5)

(8+7)

b) Write a program to calculate the factorial of the number entered by a user. Create this program by using static functions and static variables. 4. a) What is Switch..... case construct? Explain with an example.
b) Briefly explain the components of the .NET Framework.. 5. a) Enlist the significant advantages offered by the .NET framework.

b) What do you mean by enumeration? Explain how an enumeration is declared and implemented.
c) Enlist the commonly used properties of the array class. (5+7+3)

6. a) With illustrative examples explain the instanic constructions and static constructors. b) What are destructors? Explain the implementation of destructors and the declaration of destructors. 7. a) With an illustrative example, discuss the overloading of binary operators. b) Write a program in C++, which increments the number of pages of a book by the number of pages entered by the user. 8. a) Briefly explain the various relationships that can be established between the objects of different classes. b) Develop the programs to i)
ii)

(8+7)

(7+8)

Calculate the area of a circle


Calculate the volume of the cube. (8+7)

*******

BSIMSE3

Page No... 1

Third/Fourth Semester B.Sc., (ITIM) Degree Examinations


May /June 2012 (CBSC) OOPS with Java
Time: 3 hrs.] [Max.Marks: 100

Note: 1. Answer all questions of Part A. 2. Any FIVE complete questions in Part - B PART A Answer all questions. Max.Marks 25
1. Enlist the principal advantages of OOP. 2. The _________ of an object is determined by the current values of its data.
3. Java is platform neutral. State True /False

2 1
1

4. The compiled code of JAVA is called __________ 5. Long data type takes up ________ bytes of memory, while floating point numbers take up _______ bytes of memory.
6. Labelled loops are supported in Java: State True / False. 7. What do you mean by garbage collection? Briefly discuss.

1 2
1 2

8. ________ variables are those data members of a class that are shared among all objects of the class. 9. _______ is a method that compares the values held by two character objects.
10. _______ operator is used for concatenating two strings.

1 1
1

11. What do you mean by method overriding? 12. Multiple inheritances can be implemented in JAVA. State True/False. 13. How do you define an interface? 14. A ________ is a collection of related classes and interfaces providing access protection and name space management.
15. A try statement must be accompanied by at least one catch block or one finally block. State True/False.

2 1 2 1
1

16. The exception specification uses a keyword called __________ 17. Define local and remote applets 18. ________ method can be used to draw a hollow circle.
19. AWT stands for ___________

1 2 1
1 Contd...2

BSIMS-E3 PART B
Answer any FIVE complete questions.
1. a) Briefly explain the significant features of JAVA programming language. b) Explain the structure of a complete Java program. 2. a) Discuss the following operators in JAVA. i) instance of ii) >>> iii) Object references iv) Dynamic method dispatch v) Short circuit logical
vi) Bit-wise assignment

Page No... 2

Max. Marks: 75

(8+7)

15

3. a) What is a constructor ? How do you overload the constructor? Illustrate with an example.
b) How do you initialize instance variables of super class using the constructor of sub class. Give an example (8+7)

4. a) Compare and contrast : String class and string buffer class. Write a Java program to initialize an array of strings with the days of a week and sort the bubble sort technique. b) What do you mean by abstract methods and classes? 5. a) What is method overriding ? How is it different from method overriding? array using (10+5)

Illustrate with a sample Java program


b) Write a note on visibility specifiers in Java. between interfaces and classes. b) Write a JAVA programme to illusturate the use of interface. To support multiple inhertitace package? Illustrate with a program. b) Develop a JAVA program that creates a try block and likely to generate three types of exceptions and then incorporate necessary catch blocks to catch and handle them. (8+7) (7+8) 7. a) What is meant by package ? What are the advantages of packages? How do you create and invoke your own (10+5) 6. a) What are interfaces ? Enlist the benefits of interfaces. Further, bring out the similarities and differences

8. a) Create an applet to implement a simple calculator that performs 4 - basic operations - Addition, Subtraction, Multiplication and Division. b) Write a brief note on delegation event model. (10+5)

********

BSIMS 31 May/June 2O12 (CBCS) Deploying Business Desktops


Time: 3 hrs.]

Page No... 1

Third Semester B.Sc., (ITIM) Degree Examinations

[Max.Marks:100

Note: 1. Answer all questions of Part A. 2. Any FIVE complete questions in Part B
Part A Answer all questions. Max. Marks 25
low network 1 1 1. In the environment, connectivity with deployment servers is not available due to bandwidth and infrastructure resources. 2. Which desktop deployment method is applicable in rationalized level organization?

3. The __________ file contains the portion of the user profile that pertains to office 2003 editions. 1 4. Name the tools which prepare a desktop on a reference computer for image creation. 2

5. Microsoft Windows Vista uses a single Extensible Markup Language (XML) based answer file format known as ______________ 1 6. Which tool helps to preserve and restore the users' data during desktop deployment? 7. USMT is used for the____________ and ______________ scenarios. 1 2

8. Why do you need to create the .OPS and .mst files while packaging Microsoft office 2003 in a desktop image? 2 9. The scanstate tool collects the users's accounts, files, and settings and creates a data store called _____ 1 10. Different platforms use different techniques to store authorization information. The most common authorizations technique is known as _________ 1 11. ________ fire wall has a limited capacity of screening data packets transferred over the network. 1 12. _________ helps in generating .ISO files and WIM images by using Microsoft Windows PE. 1 13. List at least two points on the benefits of network visualization. 2

14. ___________ costs are less visible and dispersed across the various business operations of an enterprise. 1 Contd...2

BSIMS 31
15. List the utilities through which automation is done in Windows Vista. 16. An operating system operates in two modes: ____________ and __________ 17. Which are the three desktop scenarios?

Page No... 2
2 2 3

PART B
Answer any FIVE complete questions. 1. a) List all the phases of desktop deployment. b) Enlist the components of the network infrastructure required for deployment. 2. a) Briefly explain the advantages of an image - based desktop deployment. Also discuss the tasks involved in an image based desktop deployment. b) With an aid of a diagram describe the use of Windows based tools for desktop deployment in a new computer scenario. 3. a) Explain the different types of application compatibility databases. b) List the best practices for resolving application compatibility issues. 4. a) What are the guidelines and practices for the various stages of the Microsoft solution accelerator business desktop deployment tool for deploying desktop images by using the standardized method b) Explain the different types of application compatibility databases. 5. a) Briefly describe various types of identity data sources. b) What are the different levels of deployment? Explain. 6. a) Explain the tasks to be performed by the sms server while migrating user state. b) Describe credential management of identifying life cycle management. 7. a) Briefly describe different types of identity data sources. b) Why do you need ZIP? What are the components of ZIP? 8. a) Girish has recently joined as a Desktop Administrator in Parkers & Sons, Inc. He has been assigned the task to create and deploy desktop images on the computers there. While planning for the deployment, Girish finds that the network insufficient for creating as well as deploying desktop images. The Contd3 bandwidth is (8+7) (8+7) (7+8) (10+5) (7+8) (7+8) (8+7) Max. Marks: 75

BSIMS-31
SMS infrastructure and security system are also poorly managed. In such a based deployment method should he choose and why? Discuss

Page No3 situation, which image

b) Techno Sol, Inc. is a software company, which has shifted its office to Kolkata. Ms. Sheela who is working as a Desktop Administrator in the company has been given a responsibility to deploy the operating system on the new computer. She has been instructed by her seniors to maintain the same user settings that the employers were using in the previous office. Which deployment scenarios should she choose? How will she perform the deployment? Explain. (7+8)

********

BSIMS-32

Page No... 1

Third Semester B.Sc., (ITIM) Degree Examinations


May/June 2012
(CBCS) Networks Protocols & Internetworking Time: 3hrs.]
Note: 1. Answer all questions in Part A. 2. Answer any FIVE complete questions in Part B

[Max.Marks:100

PART A Answer all questions.


1. What are the basic functionalities of an IP - Router? 2. Router is a device that operates at _________ layer. 3. CRC is done at __________ layer. 4. Draw and mention the routing components. 5. Which layer does congestion control? 6. What is DNS? 7. Expand SMTP. 8. ___________ and __________ are the non-adaptive routing algorithms. 9. __________, ________ ______ and __________________ are The classification of adaptive routing. 10. ARP is a protocol that supports dynamic mapping: State True or False. 11. An ARP request is a broadcast to all devices on the network: State True or False. 12. What are the basic functionalities of network layer? 14. Expansion of CIDR is ___________ 15. TTL is _____________ 16. Which of the following is not a function of the router? a) Encapsulation b) Packet transmission 1 Contd...2. 1 3 1 1 3 1

Max Marks 25
2 1 1 3 1 1 1 2

13. The two primitive protocols for transport layer are _________ and ________ 2

BSIMS-32

PART B Answer any FIVE complete questions.


1. a) What do you mean by shortest path routing ? Explain the algorithm. b) Explain the routing tables look up, with an illustrative example. 2. a) What is routing ? Discuss the direct and indirect routing strategies.

Page No2 Max Marks: 75


(7+8)

b) Explain the different approaches used to make the routing table more efficient. 3. a) Bring out the important features of RARP. b) Give the classification of routing algorithms. c) What is flooding? Explain. 4. a) When is TCP preferable? Explain its segment. .

(5+10)

(5+5+5)

b) Why 3 way hand shaking is needed? Explain. 5. a) Explain the need of pushing data operation in TCP.

(7+8)

b) Describe how flow - control is achieved in TCP using sliding window mechanism. 6. a) What are the components of VIP: - header? Explain. b) How does an image file stored on to server from a client? Explain, with an Example 7. a) Write a brief description on the commands processing. Describe the groups into which commands can be divided. b) Discuss the functions of ICMP. Give different types of ICMP messages with the help of a suitable table. 8. Write short notes on the following: a) Client server model b) ICMP messages c) ARP

(7+8)

(5+10)

(7+8)

(5X3=15)

********

BSIMS-33

Page No... 1

Third Semester B.Sc., (ITIM) Degree Examinations


May/June 2O12
(CBCS)

Data Storage and Management


Time: 3 hrs] Note: 1. Answer all questions of Part A. 2. Any FIVE complete questions in Part B PART A Answer all questions.
1. One Nibble = ___________ bits and 1 KB = __________ bytes 2. CDROM is __________ type of storage media. 3. l G b yt e = ________ MB 4. Mention any two advantages of magnetic tape. 5. Define NAS and DAS. 6. What are the three basic characteristics of HOD? 7. Cache is used as _________ 8. What are the advantages of RAID? 9. __________ and _________ are file system protocols associated with NAS. 10. Having more than one path from host to a LVN is called _______ 11. _________, ______ ________ and __________ are fiber topologies. 12. What are the components of a GAS?

Max.Marks:100

Max. Marks 25
2 1 1 2 2 3 1 2 2 1 3 3

13. Data storage and management plays a pivotal role in the success of a company: State True or False. 1 14. Communication between initiator target pair is called a __________ 1

PART B Answer any FIVE complete questions.


1. a) Define data and the different types of data storage. b) Explain in detail the characteristics of storage. 2. a) What are the steps involved in recording data on floppy disk ? Explain. b) Define compact disk. Classify the optical storage devices. Discuss the working and construction of computer disk. (7+8) Contd...2 (5+10)

Max. Marks: 75

BSIMS-33
3. a) What are the different fiber channel topologies? Explain. b) Discuss the architectural overview of SCSI. 4. a) Explain volume management. b) Draw and explain the structure of device driver. 5. a) Describe the scenario where RAID S is implemented. b) Explain the DAS implementation. 6. a) List the benefits and challenges of FC SAN. b) Explain FC SAN component interactions. c) When device drivers are used? What types of software is it? 7. a) How is the backup designed ? Explain. b) What is virtualization? Discuss. 8. a) What are the various considerations for designing a basic SAN setup ? b) Compare and contrast between ISCSI and FCIP implementation.

Page No...2
(8+7) (5+10) (8+7)

(5+5+5) (10+5) (8+7)

********

BSIMS 41

Page No 1

Fourth Semester B.Sc., (ITIM) Degree Examinations


May / June 2012 (Distance Education) INTRODUCTION TO DBMS Time: 3 hrs] [Max. Marks: 100 2. Answer any FIVE full questions from PART B PART A
I. Answer all questions: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. What is Data? What is a record? What is a file? What is a flat file? What is a database? What is a data model? What is an entity? What are attributes? What is procedural language? What is query language? What is Rename operation? What is relation schema? What is union compatibility? DDL expands to what? Define tuple variable. What is set membership? What are embedded SQL statements? What is set comparison? What is binary relation? What is schema definition? Contd .2 20 x 1 = 20 Marks

Note: 1. Part A compulsory

BSIMS 41

Page No... 2

II.

Fill the following blanks:


1. 3. ____ Committee proposed N/W model. _______ attributes are displayed in double ovals.

5 x 1 = 5 Marks

2. A set represents a _______ relationship between the owner & member. 4. The notations are used for representing E R diagrams. 5. The overall design of the database is called____________.

PART B Answer any FIVE questions:


1. a) Explain the components of database system. b) Explain different types of database users. 2. a) Explain three different categories of data models. b) List and explain the rules of relational model. 3. a) Explain the five phases of database development life cycle. b) Explain various types of keys with example. 4. a) b) b) 6. a) Explain the fundamental relational algebra operations with example. Explain clearly the additional relational algebra operations. Explain various types of set operations in SQL.

5 x 15 = 75 Marks
8Marks 7 Marks 8 Marks 7 Marks 8 Marks 7 Marks 8 Marks 7 Marks 5 Marks 10 Marks

5. a) Give brief history of SQL.

Explain the different types of bars available when database window is opened. 8 Marks 7 Marks 8 Marks 7 Marks 8 Marks 7 Marks

b) Explain how forms can be used to view, add, delete, & save records. 7. a) Which issues are to be addressed in database security? Explain b) Explain how DBA is responsible for securing data in the database. 8. a) List & explain the tasks handled by the DBMS packages. b) Explain advantages & disadvantages of file oriented systems.

*******

BSIMS 42

Page No..... 1

Fourth Semester B.Sc., (I.T) Degree Examinations


May / June 2012
(C.B.C Scheme)

PERSONALITY DEVELOPMENT PROGRAMME


Time: 3 hrs] Note: 1. Part - A compulsory 2. Answer any FIVE full questions from PART B [Max. Marks: 100

PART A 5 x 5 =25 Marks 1) List out your short term goals of professionals. 2) Prepare a good Bio -Data of yourself. 3) Write any five commonly asked questions in an interview and briefly indicate your responses to the same. 4) Explain the qualities for a good personality development. 5) Explain the features of good paragraph.

PART B 5 x 1 5 = 75 Marks 1) a) Explain the reasons for rejection in interviews. b) Prepare a list of your strengths and weaknesses. 2) a) Plan out a strategy to make a good impression on your first job. b) Identify your weaknesses on time management & put in a plan to overcome it. 8 Marks 3) a) List out some of the important principles of human engeneering in which you are good at b) What is Creativity? Explain its characteristics. 4) a) What are the tips for organizational skill development? Explain. b) Explain the styles of etiquette. 5) a) Explain the rules of etiquette in using cell phone. b) What are the important qualities of team player? Explain. 8 Marks 7 Marks 10 Marks 5 Marks 8 Marks 7 Marks Contd. ...... 2 8 Marks 7 Marks 7 Marks

BSIMS 42 6) a) Explain the ten successful traits for an IT - Tyro. b) Explain the different methods to improve your communication skills. 7) a) Mention the different sub skills of writing. Discuss the importance of each of them. b) Write a letter to the station master of the nearest railway station complaining against the theft of your suitcase during your train journey. 8) a) What tips are considered for writing letter? b) Briefly explain E-mail, Fax & memo.

Page No..... 2 10 Marks 5 Marks 8 Marks 7 Marks 8 Marks 7 Marks

*******

BSIMS 43

Page No... 1
May / June 2012 (Distance Education) LINUX ADMINISTRATION

Fourth Semester B.Sc., (ITIM) Degree Examinations

Time: 3 hrs] Note: 1. Part A compulsory

[Max. Marks: 100


2. Answer any FIVE full questions from PART B

PART - A
I. Answer all questions: 25 Marks

1. Which is the default boot loader of Fedora Core 4 Linux? 2. Which licenses does not require payment for the use of the software? 3. Which community sponsored the Fedora Core 4 Project? 4. What is the name of the journalize4file .system of Ext2? 5. What is modularity? 6. What is extensibility? 7. What is interoperability? 8. What is the role of x window manager?
9.

2 2 2 2 1 1 1 1 2 2 2 2 1 2 2

Which file is used to maintain the password related information of the user & group accounts

10. Which file contains system, settings that are used while creating new user & group accounts? 11. Name the command used to display the list of suspended and back ground processes along with their job numbers on the terminal. 12. Which files are required to start the Linux Operating System? 13. What is the use of the / proc file system? 14. Which command can you use to display the contents of the crontab file? 15. How can you change the run level of Linux? PART A Answer any FIVE questin : 1. a) Explain the IT - related business requirements of an organization. b) Explain the points of planning for installation.
5 x 15 = 75 Marks

8 Marks 7 Marks
Contd.......2

BSIMS 43
2. 3. 4. 5. 6. 7. 8.

Page No 2
8 Marks 7 Marks 8 Marks 10 Marks 5 Marks 8 Marks 7 Marks 8 Marks 7 Marks 8 Marks 7 Marks 8Marks 7 Marks

a) Explain the various features of GNOME desktop environment. b) Explain the types of K Desktop environment. a) Explain various elements of the GNOME panel. a) Explain the options of the user add command. b) Explain the options of the group add command. a) Which components constitute as the service profile of open SSH. b) Explain the parameters for /etc/xinetd.d/ <service > a) Explain the process / Kernel model with diagram. b) Explain the directions in the kernel source tree. a) Explain the steps of managing system scripts. b) Explain syrv init Runlevels & activities. a) Explain the steps of single user mode in GRUB. b) Explain the components of the- rpm utility.

b) Explain the list of servers available for receiving mail configuration. 7 Marks

*******

BSIMS 51

Page No..... 1

Fifth Semester B.Sc., (ITIM) Degree Examinations


May / June 2012 (C.B.C Scheme) ESSENTIALS OF SOFTWARE TESTING & QUALITY ASSURANCE
Time: 3 hrs] Note: 1. Part A compulsory 2. Answer any FIVE full questions from PART B [Max. Marks: 100

PART A
25 Marks 1) What do you mean by Quality concept? 2) What is Testing? 3) What points are preserved in test case design? 4) What is inspection? 5) Mention path testing methods. 6) Define Verification and Validation. 7) What are the common types of problems found in static web applications? 8) Which are the primitive matrices? 9) What is Extreme testing? 10) What are Defect Removal Effectiveness (DRE) percentage? 11) What do you mean by testing strategy? 2 1 3 2 2 2 3 3 3 2 2

PART B
5x 15 = 75 Marks 1) a) What are factors that decide cost of quality? Explain. b) Explain Capability Maturity Model (CMM)? 2) a) When does White box test need? Explain. b) Explain (i) Debug Testing and (ii) Operational Testing. 3) a) Explain the Rapid testing Techniqure. b) What is the complexity of GUI testing? Explain. 7 Marks 8 Marks 5 Marks 10 Marks 7 Marks 8 Marks Contd .2

BSIMS 51

Page No..... 2

4) a) What is the purpose of Integration testing? Brief the Top down integration testing. 10 Marks b) What a Poisson execution time model proposes? 5) a) Explain V-Model in detail. b) Which are the Validation tests? Explain any two. 6) a) What are the methods to improve test process? b) What parameters are considered while setting up metrices? Explain. 7) a) What are the best practices of Extreme Testing? Explain. b) What is Psuedo localization? Explain. 8) Write short notes on: a) Automated Testing b) Black box Testing c) Software Bugs 5 Marks 10 Marks 5 Marks 5 Marks 10 Marks 10 Marks 5 Marks 3 x 5 = 15

*******

BSIMS 52 Fifth Semester B.Sc., (ITIM) Degree Examinations May / June 2012 (C.B.C Scheme)

Page No..... 1

IT INFORMATION SECURITY AND MANAGEMENT


Time: 3 hrs] Note : 1. Part A compulsory 2. Answer any FIVE full questions from PART B [Max.Marks:100

PART A
Choose the correct option: 1) In which of the following ways a computer system cannot be secured? a) Ports and devices should be enabled. b) User accounts should be bound c) Unwanted services & applications should be disabled. d) Antivirus and fire wall application should be installed. 2) Which of the following threats are caused due to malfunctioning of devices? a) Intentional threats c) Unintentional threats protect? a) Confidentiality c) Integrity a) Confidentiality c) Authorization b) Restricted d) Availability b) Natural threats d) Manmade Disasters

(25 Marks) 5x1=5

5x1=5

3) Which of the following options is not a principle that security of information aims to 5x1=5

4) Which of the following option is not a primary goal of cryptography? b) Integrity d) Non repudiation

5x1=5

5) When servers are not members of the Active Directory domain, create a script that uses ______ to implement the security settings of a template. a) Secedit c) Incremental security template Answer all Questions: 6) Name the levels of security controls. 7) Which are the types of malicious code attacks? 8) Identity the network components required for implementing directory services 9) List the methods used for securing files and folders in windows. Contd.2 2 2 2 2 b) Group Policy d) Base Template 5 x l= 5

BSIMS 52
10) What are the primary goals of cryptography? 11) What are the benefits of VPN?

Page No..... 2
2 2 2 2 2 2

12) Name any two measures of designing secure system administration. 13) What are smart cards? 14) List the different types of authentication attacks. 15) What is the need for protecting information from vulnerabilities and threats?

PART B
5 x 15 = 75 Marks 1) a) With an example explain the concern for information security in an organization. 5 Marks b) Compare and contrast packet spoofing and site spoofing. 5 Marks c) What measures have to be taken to prevent Authentication attacks? 2) a) Describe Kerberos Authentication. b) Explain the process of implementing Authentication and authorization in Linux. 3) a) Discuss the activity involved in incrementing EFS. b) Describe briefly Access control mechanism for files and folders. c) Explain briefly how to net file and directory access permissions. 4) a) Explain the security strategies for Backup and Recovery. b) Give the Guidelines for designing a WSUS NAV infrastructure. c) Describe the role assigned to the server by a network. 5) a) Discuss briefly the functions of a Firewall. b) Write a note on Network Address Translation. 6) a) Explain the working of JP Tables. b) Describe VPN Architecture. 5 Marks 5 Marks

10 Marks 5 Marks 5 Marks 5 Marks 5 Marks 5 Marks 5 Marks 10 Marks 5 Marks 5 Marks 10 Marks

7) a) What is E - Commerce? And list the threats associated with E - Commerce. 5 Marks b) Define Cryptography? What are its primary goals? Explain different techniques of Cryptography. 10 Marks 8) a) What is incident handling? Why they are required. b) How to identify the incidents? 5 Marks 5 Marks

c) Discuss the tasks that the incident handling team needs to perform for eradicating the bugs. 5 Marks *******

BSIMS 53

Page No... 1

Fifth Semester B.Sc., (ITIM) Degree Examinations


May / June 2012
(Distance Education)

IT OPERATIONS & INFRASTRUCTURE MANAGEMENT PROCESSES


Time: 3 hrs] [Max. Marks: 100 Note: 1. Part A compulsory 2. Answer any FIVE full questions from PART B

PART A
I. Answer all questions: 1. Define IT infrastructure. 2. Name the common characteristics of a process. 3. Compare and Contrast i) Change management process. ii) Configuration management process. iii) Release management process. 4. List the major areas covered in the scope of the planning stage 5. Indicate the various departments in the organisation that play a major role in development and deployment of websites. 6. List the different types of agreements that are developed for documenting agreed service levels to be provided by the service provider. 7. Define the concept of IT service provider. 8. Define service catalog. 2 1 1 2 25 Marks 1 1

3 2

9. Name the three primary supporting activities of the financial management process. 1 10. The transition phase allows an organization to use standardized methods for _____, _______ and ________ the approved changes in the live environment. 2 11. What are the three different types of changes identified by the change process model? 2 12. _ _ _ _ _ _ is a type of service desk approach mainly used in the _ _ _ _ setup where the reported incidents are passed around among geographically dispersed IT service desks that may be many time zones apart. 2 13. Enlist the activities performed within the PDCA cycle. 14. Name the activities of the ISM process. 15. Define the PDCA improvement life cycle. 16. Name the two primary benefits of implementing the improve phase. 1 1 1 2 Contd.......2

BSIMS 53 PART B
Answer any FIVE questions:

Page No... 2
5 x 15 = 75 Marks

1. a) What do you mean by IT infrastructure? Discuss the components and features of IT infrastructure. 8 Marks b) Briefly explain the supporting processes and activities in the infrastructure capacity management process . 7 Marks 2. a) Discuss the following common frameworks/standards used for implementing ITSM in organizations: i) ITIL ii) CUBIT 8 Marks b) Explain the important objectives of planning for IT services. 7 Marks

3. a) Briefly explain the three activities performed within the financial management process. 7 Marks b) Identify and explain the activities of the DRM process. 4. a) What is a service provider? Explain briefly the types of service providers. 8 Marks b) Briefly explain the scope and supporting activities of the financial management process. 7 Marks 5. a) Define the transition phase. Briefly discuss the following with respect to the transition phase. i) Objectives ii) Scope 7 Marks b) With an aid of a neat diagram, explain the change request process for various types of changes. 8 Marks 8 Marks

6. a) Briefly explain the core activities that are required to create and maintain the configuration database at all times. 7 Marks b) Discuss which process of the transition phase should be implemented first, the change management process or the configuration management process. 8 Marks 7. a) Briefly explain the types of IT service desks. b) Explain the objectives of the incident resolution process. 7 Marks 8 Marks 7 Marks b) State the role of RAG status report in continual improvement. Also discuss the actions required for RAG status, along with the format of report. 8 Marks *******

8. a) Discuss the activities performed within the service improvement life cycle.

BSIMS 54

Page No.. 1

Fifth Semester B.Sc., (ITIM) Degree Examinations


May / June 2012 (C.B.C Scheme) UNDERSTANDING IT PROJECT MANAGEMENT
Time: 3 hrs] Note: 1. Part A compulsory 2. Answer any FIVE full questions from PART B [Max. Marks: 100

PART A
5 x 5 = 25 Marks 1) Explain the two primary activities to manage risks for a project. 2) Explain the phases of the scope management process. 3) Give the details of SRS document 4) Give the comparison of models. 5) Explain the resource types for an IT project.

PART B
5 x 15 = 75 Marks 1) a) Explain the main activities of IT project management. b) Explain the evolution of software project management. 2) a) Explain the types of feasibility. b) Explain the different phases of the scope management process. 3) a) Explain the broad categories of stake holders of projects. b) Explain the characteristics of a SRS document. 4) a) Explain the benefits of using a process model. b) Explain the tasks of spiral model. 5) a) Explain hierarchical chart for WBS. 8 Marks 7 Marks 8 Marks 7 Marks 8 Marks 7 Marks 8 Marks 7 Marks 8 Marks

b) Explain how the WBS helps in performing talks of project management. 7 Marks Contd .2

BSIMS 54
6) a) Explain the tools & techniques of project scheduling. b) Explain the factors to create an accurate project scheduling. 7) a) Explain the categories of IT projects risks. b) Explain the steps of Risk management. 8) a) Explain the time budgeting guidelines. b) Explain the steps to create a metric. *******

Page No..... 2
10 Marks 5 Marks 8 Marks 7 Marks 10 Marks 5 Marks

BSIMS 61 May / June 2012


(Distance Education)

Page No... 1

Sixth Semester B.Sc., (ITIM) Degree Examinations

MANAGING & ADMINISTERING SMALL IT SETUPS


Time: 3 hrs] [Max. Marks: 100 Note: 1. Part A compulsory 2. Answer any FIVE full questions from PART B

PART A
I. Answer all questions: 1. ICT stands for ____________. 2. Weiner is famous for which part of computer science? 3. SCM stands for ___________ 4. What is the role of ISM in IT industry? 5. Give typical incident examples related to Application and Hardware. 6. In which sector SCM applications are used most? Manufacturing / Banking. 7. Are customer issues addressed using supply chain management? State True/False. 8. List 2 major problems addressed in supply chain management. 9. What are the managerial challenges involved in building e - business? 10. e - Bay is an example of _______ e - commerce. 11. Which attribute finds the problem complexity in terms of effort and time required to develop the product? 12. What is LOG? List the drawbacks of LOG? 13. What do you mean by "Incidents" in IT service? 14. List two deliverables of the release management. 15. Define the professional and computer ethics. 1 3 1 1 3 25 Marks 1 1 1 3 3 1 1 1 3 1

PART B
Answer any FIVE questions: 5x15 =75 Marks 1. a) Discuss the step by step procedure, on how a Project Manager schedules the project activities. 8 Marks b) Explain the organization of the software project management plan (SPMP) document for any software project of your choice. 7 Marks Contd.......2

BSIMS 61
2. a) What is SAM? Explain the different steps of SAM. b) What is IRM? Discuss the need for IRM. 3. a) Describe how RVP promotes the iterative development b) Enlist the different phases and work flows of the RVP.

Page No 2
7 Marks 8 Marks 8 Marks 7 Marks

4. a) What is service desk? Discuss the primary functions and features of service desk. 8 Marks b) Mention the key outputs of ICT design and planning process. 7 Marks

5. a) With an aid of a neat flow diagram, discuss the control process of security management. 7 Marks b) How do you evaluate the security in place in an IT company and give the security involved around internet E - mail policies. 8 Marks 6. a) Why is Software Asset Management mandatory in industries? Explain briefly. 5 Marks b) Explain the different parts of SAM, Further, discuss the areas that the implementation of SAM results in savings. 10 Marks 7. a) What are intellectual properties that need to be controlled in an IT Organization? b) What are the different computer crimes that can happen? How to control them? Explain. 8 a) Differentiate between professional and computer ethics. b) Write short notes on the following: i) Software project management plan ii) Software tools 7 Marks 8 Marks 5 Marks 5 x 2 = 10 Marks

******

You might also like