MCS 22 em 2023 24 MP
MCS 22 em 2023 24 MP
MCS 22 em 2023 24 MP
0 5
Answer all the questions of the assignment having 80 marks in total. 20 marks are for viva
voce. You may use illustrations and diagrams to enhance the explanations. Please go
909
through the guidelines regarding assignments given in the Programme Guide for the
format of presentation. Answer of each part of the question should be confined to about
300 words.
Q1.
922
(a) Explain two approaches used to improve system performance by overlapping input, output and
processing in CPU. (6)
(b) Explain the characteristics of multiprocessor operating system. (4)
-99
Q2.
(a) What is Token Ring? How does it work? Differentiate between token ring and token bus. (5)
(b) What is meant by Trust Relationship? Discuss the role of Kerberos and Domain controller
in maintaining trust relationships. (5)
DF
Q3.
(a) Describe the pre-installation checks and information gathering that need to be carried out before
RP
(a) Is desired to create a file in LINUX called "newfile" that consists of the last 15 lines of a file "filer
followed by the last 6 lines of a file "file2". Both "filet" and "file2" already exist. Write the sequence
of commands in LINUX to achieve this
OT
(b) Write the LINUX command to change the password of a user called "SOCIS" to "E93df!kN#". Who
can run this command?
(c) Write the LINUX command to find the number of users currently logged into the system?
(d) Write the LINUX command to take a text file named "source-file" as input and circularly shift every
small case letter forward by 5 characters, such that "a" becomes "f", "z" becomes "e" and so on, but
"A", "3", "$" and other such characters are left unchanged.
Q5.
(a) What is the Active Directory in Windows 2000? Describe, with the help of a diagram, the logical
structure of the Active Directory. (5)
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
(b) Differentiate the role and responsibilities of user mode and kernel mode of Windows 2000 system.
(5)
Q6.
(a) Write a shell script which will generate the list of users along with details of files those are created
/modified by the respective user during the specified time. (5)
(b) Differentiate between LAN, MAN and WAN in terms of size, protocols, access mechanism, hardware
devices and switching methods. (5)
5
Q7.
0
(a) What are the security services provided by IPsec? Discuss the two IPsec components in WINDOWS
2000. Also explain the policy options for IPsec implementation. (5)
909
(b) List and describe various security features in WINDOWS 2000 O/S. (5)
922
(a) NTFS
(b) Packet switching
(c) EFS services
(d) Firewall
-99
DF
RP
HE
OT
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
MCS-022
5
SOLVED ASSIGNMENT 2023-24
0
909
922
Q.1 - (a) Explain two approaches used to improve system performance by
-99
overlapping input, output and processing in CPU.
ANS.- Overlapping Input, Output, and Processing in CPU:
DF
one instruction is undergoing a certain stage, the next instruction can enter the pipeline
and start the first stage. This allows multiple instructions to be in different stages of
execution simultaneously, leading to increased throughput.
For example, in a classic five-stage pipeline (Fetch, Decode, Execute, Memory Access, Write
HE
Back), while one instruction is being executed in the Execute stage, another instruction can be
in the Decode stage, and yet another can be in the Fetch stage. This overlapping reduces the
idle time of the CPU and improves overall throughput.
OT
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
0 5
(b) Explain the characteristics of multiprocessor operating system.
909
ANS.- Characteristics of Multiprocessor Operating System:
922
some key characteristics of such an operating system:
1. Parallelism and Load Distribution: Multiprocessor OSs are designed to exploit the
parallel processing capabilities of multiple CPUs or cores. They distribute tasks among
-99
the available processors, aiming to achieve better performance through workload
balancing. This involves assigning tasks to processors based on their availability and
load.
DF
2. Synchronization and Mutual Exclusion: Since multiple processors can access shared
resources concurrently, mechanisms for synchronization and mutual exclusion are
crucial. Multiprocessor OSs provide synchronization primitives (like semaphores, locks,
RP
and barriers) to coordinate access to shared resources and prevent conflicts that could
lead to data corruption or incorrect results.
3. Thread and Process Management: These operating systems support parallel execution
HE
by managing multiple threads and processes across different processors. Load balancing
algorithms allocate threads or processes to available cores in a way that minimizes
contention and maximizes overall system throughput.
OT
4. Cache Management: Modern processors have multiple levels of cache, and efficient
cache management is essential for multiprocessor systems. The OS needs to handle
cache coherency, ensuring that multiple processors see consistent views of shared
memory, which can involve various protocols like MESI (Modified, Exclusive, Shared,
Invalid).
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
the processor accessing it. The OS should be aware of NUMA characteristics and
optimize memory allocation to minimize access latency.
0 5
7. Fault Tolerance and Redundancy: Some multiprocessor systems incorporate
redundancy for fault tolerance. The OS should handle hardware failures gracefully,
909
possibly by migrating processes to healthy processors and ensuring continued
operation.
922
strategies to dynamically adjust CPU frequencies and voltages to conserve energy when
the full processing power is not required.
Q.2 - (a) What is Token Ring? How does it work? Differentiate between token
ring and token bus.
RP
ANS.- Token Ring is a local area network (LAN) protocol that uses a physical ring topology to connect
computers and devices. In Token Ring networks, data is transmitted in the form of "tokens." A token is a
small packet that circulates around the network ring. Devices on the network can only transmit data
when they possess the token. When a device wants to send data, it seizes the token, attaches its data to
HE
it, and releases the token for circulation. The receiving device extracts the data and returns an
acknowledgment to the sender. This process helps to avoid data collisions and ensures orderly
communication.
OT
Token Ring and Token Bus are both LAN protocols that use tokens to control access to the
network medium, but they differ in topology. Token Ring uses a physical ring topology where
devices are connected in a closed loop, while Token Bus uses a linear bus topology. In Token
Ring, the token circulates continuously, while in Token Bus, devices contend for the token when
they want to transmit data. Token Ring offers deterministic performance due to its predictable
token-passing mechanism, but it can be more complex to manage and install than Token Bus.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
(b) What is meant by Trust Relationship? Discuss the role of Kerberos and
Domain controller in maintaining trust relationships.
ANS.- A Trust Relationship refers to the reliance and authorization between two entities within a
network, allowing them to share resources and information securely. Kerberos is a widely used
authentication protocol that plays a crucial role in maintaining trust relationships. It provides strong
authentication by issuing tickets to users and services, which they use to prove their identity without
5
transmitting passwords over the network.
0
A Domain Controller (DC) is a key component in Windows-based networks, responsible for
909
authenticating users and managing trust relationships. It validates users' credentials and grants
access to network resources. Kerberos is used in Windows domains to facilitate secure
authentication. The Domain Controller issues and validates Kerberos tickets, ensuring that users
and services within the domain can access resources they are authorized for, while denying
922
unauthorized access.
In maintaining trust relationships, Kerberos and the Domain Controller work together to ensure
secure authentication, authorization, and resource access, thereby fostering a secure network
-99
environment.
DF
Q.3 - (a) Describe the pre-installation checks and information gathering that
need to be carried out before installing LINUX on a computer.
RP
ANS.- Before installing LINUX on a computer, several pre-installation checks and information
gathering steps should be carried out to ensure a smooth installation process. First, verify
hardware compatibility by checking the system requirements of the chosen LINUX distribution.
Backup all important data to prevent data loss during installation. Determine the installation
HE
method: dual-boot, clean install, or virtual machine. Gather essential hardware information,
such as disk layout, partitioning scheme, and network settings. Make a note of system
specifications like RAM, CPU, and graphics card. Ensure you have installation media (DVD/USB)
or a network installation setup. Disable secure boot, if required, and choose the appropriate
OT
firmware settings. Verify BIOS/UEFI compatibility. Consider driver availability for hardware
components, especially if they require proprietary drivers. These checks and information
gathering steps help avoid compatibility issues and streamline the installation process.
(b) Differentiate between absolute and relative path names, along with an
example of each.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
ANS.- Absolute and relative path names are used to specify the location of files or directories in a file
system. An absolute path refers to the exact location from the root directory, starting with a leading
slash ("/"). For example, "/home/user/documents/file.txt" is an absolute path pointing directly to the
"file.txt" in the "documents" directory under the "user" directory.
On the other hand, a relative path is defined in relation to the current working directory. It
doesn't start from the root directory and can involve ".." to indicate moving up one level in the
5
directory hierarchy. For instance, if the current directory is "/home/user/", the relative path
0
"documents/file.txt" would point to the same "file.txt" in the "documents" directory.
909
In summary, absolute paths provide a full and fixed location starting from the root directory,
while relative paths are defined in relation to the current directory and can change depending
on the context.
922
Q.4 - Answer the following questions related to Linux commands:
-99
(a) Is desired to create a file in LINUX called "newfile" that consists of the last 15
lines of a file "filer followed by the last 6 lines of a file "file2". Both "filet" and
DF
"file2" already exist. Write the sequence of commands in LINUX to achieve this
ANS.- To create a file named "newfile" in Linux with the specified content, you can use the
following commands:
RP
HE
The first command extracts the last 15 lines of "file1" and writes them to "newfile". The second
OT
(b) Write the LINUX command to change the password of a user called "SOCIS"
to "E93df!kN#". Who can run this command?
ANS.- The Linux command to change the password for the user "SOCIS" to "E93df!kN#" is:
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
This command should be run by a user with superuser (root) privileges or by using the sudo
5
command, as changing user passwords typically requires administrative rights.
0
909
(c) Write the LINUX command to find the number of users currently logged into
the system?
ANS.- To find the number of users currently logged into the system, you can use the following
922
command:
-99
This command utilizes the "who" command to list logged-in users and then pipes the output to
DF
the "wc" command with the "-l" option to count the number of lines, which corresponds to the
number of users.
RP
(d) Write the LINUX command to take a text file named "source-file" as input
and circularly shift every small case letter forward by 5 characters, such that "a"
becomes "f", "z" becomes "e" and so on, but "A", "3", "$" and other such
characters are left unchanged.
HE
ANS.- To perform circular shifting on lowercase letters in a text file named "source-file,"
advancing each by 5 characters while leaving other characters unchanged, you can use this
OT
command:
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
This command uses the "tr" command to translate characters. The character range 'a-z'
represents lowercase letters, and 'f-za-e' defines the circular shift by 5 positions. The output is
redirected to a new file named "shifted-file."
Q.5 - (a) What is the Active Directory in Windows 2000? Describe, with the help
5
of a diagram, the logical structure of the Active Directory.
0
ANS.- Active Directory in Windows 2000: Logical Structure
909
Active Directory (AD) is a directory service developed by Microsoft for Windows domain
networks. Introduced in Windows 2000, it serves as a centralized repository of information
about network resources, including user accounts, computers, printers, and more. The logical
922
structure of Active Directory is designed to organize and manage these resources efficiently.
At the core of Active Directory is the Domain. A domain is a security boundary within which
users, computers, and resources are managed and authenticated. Multiple domains can be
-99
organized into a Forest. A forest is a collection of domains that share a common schema and
global catalog, and they are linked by trust relationships.
Here's a simplified diagram illustrating the logical structure of Active Directory in Windows
DF
2000:
RP
HE
OT
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
0 5
909
922
-99
DF
In the diagram, the forest is the top-level container that holds one or more domains. Each domain
contains objects like user accounts, computers, groups, and organizational units (OUs) that provide a
way to organize these objects logically. Domain controllers are servers that store and replicate directory
RP
The global catalog is a specialized domain controller that contains a partial replica of the
directory for faster searching across the forest. Trust relationships define the authentication
and authorization relationships between domains within the forest, enabling users from one
HE
(b) Differentiate the role and responsibilities of user mode and kernel mode of
Windows 2000 system
ANS.- User Mode vs. Kernel Mode in Windows 2000
User mode and kernel mode are distinct privilege levels in the Windows 2000 operating system
that serve different functions and have separate responsibilities.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
1. User Mode: In user mode, applications and user-level processes run. User mode
processes have limited access to hardware and system resources, primarily interacting
with the operating system through system calls. They don't have direct access to critical
system resources or memory. This separation provides a layer of security and stability,
preventing applications from causing system crashes or interfering with each other.
5
interactions, performing file and network operations, and accessing user-specific data. User
0
mode processes rely on the kernel mode to perform privileged operations on their behalf.
909
2. Kernel Mode: Kernel mode is the privileged execution mode in which the core operating
system components and device drivers operate. Kernel mode processes have direct
access to hardware and system memory, allowing them to control hardware devices,
manage memory, and execute critical tasks.
922
Responsibilities in kernel mode encompass managing hardware resources, memory
management, process scheduling, and handling interrupts. Kernel mode code must be highly
reliable and well-tested to ensure system stability and security.
-99
In summary, user mode is where applications and user processes run with restricted access to
system resources, while kernel mode is where the operating system's core components and
device drivers execute with higher privileges and control over hardware resources. This
DF
separation is crucial for maintaining system stability, security, and preventing unauthorized
access to critical components.
RP
Q.6 - (a) Write a shell script which will generate the list of users along with
HE
details of files those are created/modified by the respective user during the
specified time.
OT
Here's a basic shell script that utilizes the find command to generate a list of users and details of files
created or modified by each user within a specified time range:
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
0 5
909
922
Replace /path/to/search with the actual directory you want to search in. Run the script with
appropriate start and end times and provide an output file name. This script lists the usernames
along with the paths of files created or modified by each user within the specified time range.
-99
(b) Differentiate between LAN, MAN and WAN in terms of size, protocols, access
DF
Local Area Network (LAN): A LAN covers a limited geographical area like a single building or
campus. It uses Ethernet or Wi-Fi protocols for data transmission. Access is usually high-speed
and shared among devices. Common hardware includes switches and routers for local traffic
HE
management. LANs use Ethernet switching for data transmission within the network.
Metropolitan Area Network (MAN): MANs cover larger areas like a city. They can use
technologies like fiber optics and microwave transmission. Access mechanisms can involve
OT
leased lines or wireless connections. Routers and switches manage traffic. MANs typically
employ circuit-switching or packet-switching methods.
Wide Area Network (WAN): WANs span across countries or continents. They use various
protocols like MPLS or Frame Relay. Access can be through leased lines, satellite, or wireless
links. Hardware includes routers, switches, and modems. WANs use packet-switching and
virtual circuits for data transmission over longer distances.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
In summary, LANs are smaller, with high-speed access and Ethernet/Wi-Fi protocols. MANs
cover a city, use various access mechanisms, and might use circuit-switching. WANs cover large
distances, use diverse protocols and access methods, and rely on packet-switching for data
transmission.
0 5
Q.7 - (a) What are the security services provided by IPsec? Discuss the two IPsec
909
components in WINDOWS 2000. Also explain the policy options for IPsec
implementation.
ANS.- IPsec (Internet Protocol Security) provides several security services to enhance the
922
confidentiality, integrity, and authenticity of IP packets. In Windows 2000, IPsec consists of two main
components: the Authentication Header (AH) and the Encapsulating Security Payload (ESP). AH provides
data integrity, authenticity, and optional anti-replay protection. ESP offers confidentiality, data integrity,
authenticity, and anti-replay protection through encryption and authentication. These components work
-99
together to secure communication between networked systems.
Regarding policy options for IPsec implementation in Windows 2000, administrators can define
security policies using the IPsec Policy Management snap-in. This includes selecting traffic to
DF
secure, specifying the security methods (AH or ESP), choosing authentication methods (such as
digital certificates or preshared keys), and setting up key exchange mechanisms. The policies
can be assigned at the domain, organizational unit, or local computer level. These policies
RP
dictate how IPsec is applied to network traffic and provide flexibility in tailoring security
requirements based on organizational needs.
HE
(b) List and describe various security features in WINDOWS 2000 O/S.
ANS.- Windows 2000 includes various security features to protect the operating system and its
resources. These features encompass:
OT
2. File System Security: NTFS (New Technology File System) offered access control lists
(ACLs) for files and directories, allowing administrators to define precise permissions for
users and groups.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
3. Encrypting File System (EFS): EFS provided file-level encryption, ensuring data
confidentiality on disk. Encryption keys were tied to user accounts and protected by
user passwords.
4. Kerberos Authentication: Windows 2000 adopted the Kerberos protocol for secure
authentication, replacing the less secure NTLM authentication.
5
5. Group Policies: Group Policy enabled administrators to enforce security settings across
0
domains and organizational units, managing user rights, software installation, and
system configurations.
909
6. Auditing and Event Logging: Enhanced auditing capabilities tracked security events,
aiding in intrusion detection and compliance monitoring.
922
7. Secure Remote Access: Windows 2000 introduced improved Virtual Private Network
(VPN) and Remote Access Service (RAS) capabilities for secure remote connections.
8. Public Key Infrastructure (PKI): Windows 2000 supported PKI through the Certificate
Services component, allowing organizations to issue digital certificates for secure
-99
communication and authentication.
changes.
10. Software Restriction Policies: These policies controlled which software could run on a
RP
These features collectively bolstered the security posture of Windows 2000, addressing
vulnerabilities and providing a foundation for robust security management.
HE
(a) NTFS
ANS.- NTFS (New Technology File System): NTFS is a file system introduced by Microsoft and is
the default file system for Windows operating systems. It offers several advantages over its
predecessor, FAT (File Allocation Table), including improved performance, security, and support
for larger file sizes and volumes. NTFS supports features like file and folder permissions,
encryption, compression, and disk quotas. It provides a more robust and reliable platform for
managing files and data on Windows systems.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
5
shared use of network resources, better fault tolerance, and the ability to handle various types
0
of data traffic simultaneously.
909
(c) EFS services
ANS.- EFS Services (Encrypting File System): EFS is a feature in Windows operating systems
that provides encryption for files and folders on NTFS volumes. It allows users to protect
922
sensitive data by encrypting it, making it unreadable to unauthorized users even if they gain
access to the physical storage. EFS uses a combination of public-key cryptography and
symmetric encryption to ensure data security. Only users with the appropriate encryption keys
and permissions can access the encrypted files. EFS services are particularly useful for
-99
protecting sensitive information on shared computers or in cases where data confidentiality is
paramount.
DF
(d) Firewall
ANS.- A firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predetermined security rules. It acts as a barrier
RP
between a trusted internal network and untrusted external networks (like the Internet),
preventing unauthorized access and potential threats from reaching the protected network.
Firewalls can be implemented at both hardware and software levels. They help prevent
malicious activities, such as unauthorized access, malware infections, and data breaches, by
HE
allowing only authorized traffic and connections while blocking or filtering out potentially
harmful traffic.
OT
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY