0% found this document useful (0 votes)
92 views77 pages

MCS 022

Uploaded by

Anish kumar Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views77 pages

MCS 022

Uploaded by

Anish kumar Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 77

01._June_2010 MCS-022.

pdf
02._Dec_2010 MCS-022.pdf
03._June_2011 MCS-022.pdf
05._June_2012 MCS-022.pdf
06._Dec_2012 MCS-022.pdf
07._June_2013 MCS-022.pdf
08._Dec_2013 MCS-022.pdf
09._June_2014 MCS-022.pdf
10._Dec_2014 MCS-022.pdf
11._June_2015 MCS-022.pdf
12._Dec_2015 MCS-022.pdf
13._June_2016 MCS-022.pdf
14._Dec_2016 MCS-022.pdf
15._June_2017 MCS-022.pdf
16._Dec_2017 MCS-022.pdf
17._June_2018 MCS-022.pdf
18._Dec_2018 MCS-022.pdf
19._June_2019 MCS-022.pdf
20._Dec_2019 MCS-022.pdf
21._June_2020 MCS-022.pdf
22._Dec_2020 MCS-22.pdf
23._June_2021 MCS-022.pdf
24._Dec_2021 MCS-022.pdf
25._June_2022 MCS-022.pdf
26._Dec_2022 MCS-22.pdf
No. of Printed Pages : 2 MCS-022I

MCA (Revised)
Term-End Examination
7t.
June, 2010

MCS-022 : OPERATING SYSTEM CONCEPTS


AND NETWORKING MANAGEMENT
Time : 3 hours Maximum Marks : 100
Note : Question No. 1 is compulsory. Answer any three
questions from the rest.

What is a Computer Network ? Discuss its 10


advantages and disadvantages in detail.
Differentiate between Multiprogramming 5
and multithreading.
Discuss layered architecture of Windows 10
2000 operating system.
Discuss the important features of LINUX 10
operating system.
(e) Write a shell script in LINUX to count the 5
number of words in a given file.

Explain in detail two computer security 10


mechanism.
Explain the logical and physical structure 10
of active directory with reference to
Windows 2000.

MCS-022 1 P.T.O.
3. (a) What are wild cards ? Discuss their 8
importance with examples.
(b) Mention the usage of following LINUX
commands with an example of each : 2x4=8
(i) tail
grep
chmod
sort
(c) What happens if you try to "cat" a 4
non-existing file ? Explain the steps taken
by OS to handle this.

4. (a) Explain in detail various types of guided 10


transmission media.
(b) Explain FTP and TELNET. Discuss their 10
importance and uses.

5. Write short notes on the following : 5x4=20


Domain Name System.
Peer-to-Peer Network.
(c) Virtual Private Network remote access in
Windows 2000.
(d) Firewall.
No. of Printed Pages : 3 MCS-022

MCA (Revised)
c\1
Term-End Examination
-14
June, 2011
O
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.

1. (a) What is a fire wall ? How does it secure the


system ? Explain the limitations of firewall.

(b) Explain two approaches used to improve 6


system performance by overlapping input,
output and processing in CPU.

(c) What is packet switching ? What are the 6


two approaches for packet switching ?

(d) What is meant by trust relationship ? 6


Explain the importance of Kerberos and
Domain Controllers in maintaining trust
relationships.

(e) What are the standard user groups in 7


windows 2000 ? Explain the access
privileges of each.

MCS-022 1 P.T.O.
(f) Write the Linux/ Unix commands for the 6
following :
(i) List all the files in a directory that have
3 characters in their name.
(ii) Show if a user is logged on, their real
name and mail status
(iii) Tell the system to continue running a
process, even if the user logs out.
(iv) To allow a user to communicate with
another user logged on by splitting the
screen and providing two way
communication.
(g) Differentiate between absolute and relative 3
path names, along with an example of each.

2. (a) List and explain the three file systems 10


supported by windows 2000 ? What is file
replication service ?
(b) Which application layer protocal is used by 10
network management frame-works to
manage and monitor network devices ?
Explain its architecture and working.

3. (a) Explain the abstract model of virtual 10


memory used in Linux operating system.
Give a suitable diagram to explain its
working.

MCS-022 2
(b) Assume we want to display a logon warning 6
message, stating that "unauthorized access
to this system is punishable" if an
unauthorized user tries to log in. Write the
steps to create the above mentioned logon
warning message.
(c) Explain the characteristics of multiprocessor 4
operating system.

4. (a) What is stored in the Registry of Windows 7


XP ? Explain the various components of a
registry. Also, list the utilities that can be
used to manage registry in windows.
(b) Explain SNMP architecture with the help 6
of a diagram.
(c) Which topology has a dedicated point to 7
point link to every other node ? Write its
three advantages and three disadvantages
of this topology.

5. Write short notes on the following : 20


(a) Hubs
(b) Optical fibre
(c) Domain Name System
(d) Pipes and Filters in Linux
(e) Offline and Online communication

MCS-022 3
No. of Printed Pages : 2 MCS-022
MCA (Revised)
Term-End Examination
O
O June, 2012
O
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.

1. (a) Discuss the functionality of User and Kernel 10


modes of Windows 2000 operating system.
(b) Explain the process and thread 10
management in LINUX o/s.
(c) With the help of Architecture diagrams 10
explain the Simple Network Management
Protocol (SNMP) and User Datagram
Protocol (UDP).
(d) What is the use of Transmission media in 10
Networking ? List and explain various
guided and unguided transmission media
with their advantages and disadvantages.

2. (a) Explain the abstract model of Virtual 10


memory in Linux o/s with the help of a
address mapping diagram.

MCS-022 1 .P.T.O.
(b) Explain how NTF's, FAT 16 and FAT 32 file 10
systems are supported in Windows
2000 o/s.

3. (a) Explain various User Authentication 10


methods that the computer system uses.
(b) Discuss Registry Management in 10
WINDOWS.

4. (a) Write the purpose of VPN and name VPN 5


technologies supported by WINDOWS
2000.
(b) Write the procedure to use the mapped 5
drive in WINDOWS 2000 o/s.
(c) Explain the Backup and Restoration 10
procedures in LINUX.

5. Write short notes on the following :


5x4=20
(a) Kerberos management in WINDOWS
2000 o/s.
(b) Distributed o/s
(c) Trivial File Transfer Protocol (TFTP)
(d) Pipes and filter commands in LINUX.

MCS-022 2
No. of Printed Pages : 3 MCS-022
MCA (Revised)
tr) Term-End Examination
December, 2012
C
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.

1. (a) Explain the following with reference to 10


WINDOWS 2000 0/S :
(i) Trust Relationships and Work Groups
(ii) Remote Access
(iii) IP Sec
(iv) User mode
(b) Explain the memory management concepts 10
in LINUX 0/S.
(c) List and explain the various Networking 10
topologies.
(d) Explain the various computer-security 10
classifications recognised by Trusted
Computer System Evaluation Criteria
(TCSEC)

MCS-022 1 P.T.O.
2. (a) List and explain the characteristics of 10
Modern Operating Systems.
(b) Explain the following with reference to 10
Domain Name System(DNS) :
(i) DNS Architecture
(ii) DNS Zones

3. (a) With the help of an example for each, write


the usage and syntax for the following
LINUX commands. 4x21/2=10
(i) Cat (ii) diff
(iii) Sort (iv) Cmp
(b) Write a shell script to convert all the lower 10
case letters of a (text) file to upper case.

4. (a) Write the basic purpose and name the OSI


layer where the following devices will be
operating: 5x2=10
(i) Repeater (ii) Hub
(iii) Bridge (iv) Router
(v) Gateway
(b) Explain the following with reference to
"Hardening" in WINDOWS 2000 0/S : 4x21/2=10
(i) Hardening the 0/S and application
code
(ii) Hardening the file system security
(iii) Hardening the local security policies
(iv) Hardening the services

MCS-022 2
5. Write short notes on the following : 4x5=20
(a) Fire Wall
(b) Packet Switching
(c) Unguided Transmission Media
(d) Multi threading

MCS-022 3
No. of Printed Pages : 2 MCS-022
MCA (Revised)
Term-End Examination
cJ June, 2013

MCS-022 : OPERATING SYSTEM CONCEPTS


AND NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.

1. (a) What is an operating system ? Explain the 6


component of computer system with a neat
diagram.

(b) Describe the evolution of operating 6


system.

(c) What are the characteristics of modern 6


operating system ?

(d) Explain the various topologies for a 6


networking system.

(e) Explain the detail about the OSI layers. 7

(0 Give the differences between LAN and 6


WAN.

(g) Write down the purpose of the repeater. 3

MCS-022 1 P.T.O.
2. (a) List down the application layer protocols. 10
Explain each one of them in detail.
(b) Explain the Architecture of Simple Network 10
Management protocol (SNMP) with a neat
diagram.

3. (a) Discuss about the various component of 10


Linux Operating System.
(b) What are the file manipulation commands. 8
Briefly explain them with the Syntax.
(c) What are called filters ? 2

4. (a) Explain about windows 2000 domains, 7


workgroups and trusted relationships.
(b) Discuss in detail about user account 6
administration.
(c) How do you configure TCP/IP protocol 7
setting for windows XP ?

5. Give a brief note on the following : 20


(a) System Access Control
(b) Password Management
(c) Intrusion Detection
(d) Firewall
(e) Windows NT Domain Management

MCS-022 2
No. of Printed Pages : 2 MCS-022
MCA (Revised)
Term-End Examination
December, 2013
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


Note : Question No. 1 is compulsory. Answer any three
questions from the rest.

1. (a) What are the functionalities of Graphical 6


User Interface ?
(b) Write a note on Batch Processing. 6
(c) What is a Distributed Operating system ? 6
Explain in Detail.
(d) Describe the different types of Networks. 6
(e) What are the different types of Modems ? 7
(f) What is Optical fibre ? List the Advantages 6
of Optical fibre.
(g) Write the advantages and disadvantages of 3
Infrared Transmission.

2. (a) With reference to ISO-OSI Reference model, 10


explain the different types of connecting
devices in detail.

(b) Explain about the TCP/IP Related 10


protocols.

MCS-022 1 P.T.O.
3. (a) Discuss about shell scripts in detail. 10

(b) Write the short notes on Network File 6


Server.

(c) Explain about Backups and Restoration. 4

4. (a) Describe briefly about Group Accounts 7


Administration.

(b) How will you enable the offline file 6


features ?

(c) Give the steps how to use the Mapped Drive. 7

5. Write the short notes on the following : 20


(a) Instrusion Detection System (IDS)

(b) Fault Tolerant Systems

(c) Packet Filters

(d) Trust Relationships in Windows 2000

(e) NTFS File System

MCS-022 2
No. of Printed Pages : 3 MCS-022
MCA (Revised)/BCA (Revised)
Term-End Examination
C.)\
c\I June, 2014
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT
Time : 3 hours Maximum Marks : 100
(Weightage 75%)

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.

1. (a) Write the steps to configure a Windows 2000 5


computer to ensure that users can log-on to
the server only during the specified times.

(b) Differentiate the role and responsibilities of 5


user mode and kernel mode of
Windows 2000 system.

(c) Explain the various file access control 8


mechanisms provided by LINUX operating
system. Also, give the suitable example for
each.

(d) List the important components of domain 8


name server. Also, explain how the domain
name server is configured in LINUX
operating system.

MCS-022 1 P.T.O.
(e) How is print server configured in 7
Windows 2000 ? Also, explain the
importance of print queue management.

(f) What is kerberos ? Explain the complete 7


process of client authentication through
kerberos.

2. (a) Write the use of following LINUX 8


commands, with an example for each :

(i) cmp (ii) sort

(iii) grep (iv) chmod

(b) Describe the addressing scheme used in the 8


Network layer and Transport layer of
TCP/IP model.

(c) Differentiate between coaxial cable and 4


optical fiber cable.

3. (a) What is Virtual Private Network (VPN) ? 10


Describe the mechanism to create a virtual
private network. Also, explain the
significance of VPN in security.

(b) Explain the principle of Token Ring 8


protocol. Also , explain its working with the
help of a suitable example.

(c) List the functions of Network Interface Card 2


(NIC).

MCS-022 2
4. (a) Write a shell script which will generate the 10
list of users along with details of files those
are created /modified by the respective user
during the specified time. Also, draw the
flow-chart of this shell script.
(b) Differentiate between LAN, MAN and 10
WAN in terms of size, protocols, access
mechanism, hardware devices and
switching methods.

5. Write short notes on the following (any four) :


(a) NTFS 5x4=20
(b) Packet switching
(c) IPsec
(d) EFS services
(e) Firewall

MCS-022 3
No. of Printed Pages : 3 MCS-022
MCA (Revised) I BCA (Revised)
Term-End Examination
December, 2014

MCS-022 : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage 75%)
Note : Question no. 1 is compulsory. Answer any three
questions from the rest.

1. (a) Explain the collision avoidance mechanism


of CSMA/CD. Also, differentiate between
CSMA/CD and token passing access
methods. 8
(b) Describe the concept and advantages of
using EFS services in Windows 2000. 7
(c) What option in Registry Management will
be useful in tracking who accessed the
registry, from where, and when ? Also,
write the steps for enabling this option. 5
(d) How does Windows 2000 manage the
domains ? Also, explain how the trust
relationship is created and managed
between domains. 9
(e) Explain the steps for configuring the Local
Area Network (LAN) in LINUX system. 7
(0 List the IPv4 class formats and its uses. 4
MCS-022 1 P.T.O.
2. (a) Explain the built-in groups supported by
Windows 2000. Also, discuss the group
policies of each group. 8

(b) Explain the process of encryption and


decryption in symmetric key, asymmetric
key crypto systems. 8
(c) Write the advantages of Virtual Private
Network. 4

3. (a) Compare and contrast between Network


operating systems and Distributed
operating systems. Also, list the
advantages of Distributed operating
systems over Centralized operating
systems. 8
(b) Write a Shell script which will delete the
temporary files from all local users after
24 hours of their creation/modification.
Also, make the flow chart of this Shell
script. 10
(c) Differentiate between bridges and
gateways. 2

4. (a) Explain the file systems supported by


LINUX systems. Compare these file
systems with NTFS. 8
(b) Compare and contrast the 'Mandatory
Access Control' and 'Discretionary Access
Control' mechanisms in Windows. 5
(c) What is print server ? Write the steps to
configure a print server in LINUX system. 7

MCS-022 2
5. Write short notes on the following (any four) :
4x5=20

(a) Proxy Server


(b) DNS
(c) RAID
(d) Network Topologies
(e) TCP/IP

MCS-022 3 10,000
No. of Printed Pages : 3 I MCS-022
MCA (Revised) / BCA (Revised)
Term-End Examination
June, 2015
112E33
MCS 022 : OPERATING SYSTEM CONCEPTS AND
-

NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage 75%)
Note : Question no. 1 is compulsory. Answer any three
questions from the rest.

1. (a) Briefly explain the following in the context


of Domain Name System : 10
(i) Design Goals
(ii) Design Principles
(iii) Architecture
(iv) DNS Zones
(b) Explain the memory management in
LINUX operating system. 10
(c) Discuss the Users' Administration in
WINDOWS 2000 by highlighting : 10
(i) Existing User Accounts Modification
(ii) Managing User Profiles
(iii) Group Accounts Administration
(iv) Auditing

MCS-022 1 P.T.O.
(d) Explain how fault tolerant systems can be
designed to protect the system in the event
of hardware failures using the following
techniques : 10
(i) System Fault Tolerance technique
(ii) RAID

2. (a) Describe the process and file management


in LINUX operating system. 10
(b) "A LINUX machine can be configured to
work with a Network File System (NFS),
where files on other machines on the
network can be made available as if they
were local files." Explain the process of
configuring it. 10

3. (a) List and explain the various Network


protocols being supported by
WINDOWS 2000. 10
(b) Discuss the purpose of Virtual Private
Network and explain how it can be
configured in WINDOWS 2000. 10

4. (a) List the components of WINDOWS 2000


kernel and mention the functionality of
each component. 10
(b) Describe the purpose and functioning of
the following network devices : 10
(i) Repeaters
(ii) Hubs
(iii) Bridges
(iv) Gateways

MCS-022 2
5. Write short notes on the following : 20

(a) Network and Distributed operating system


(b) Auditing the Registry Access of
WINDOWS 2000
(c) Backup and Restoration in LINUX
(d) Shell Scripts and its uses in LINUX

MCS-022 3 11,000
No. of Printed Pages : 3 I MCS-022 I

MCA (Revised) / BCA (Revised)


Term-End Examination
"4 December, 2015

MCS-022 : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage 75%)

Note : Question no. 1 is compulsory. Answer any three


questions from the rest.

1. (a) Briefly explain the purpose of the following


directories of Linux System : 10
(i) /bin
(ii) /dev
(iii) /etc
(iv) /lib
(v) /sbin
(vi) /tmp
(vii) /usr/bin
(viii) /mnt
(ix) /usr/local/bin
(x) /usr/games

MCS-022 1
(b) Explain WINDOWS 2000 layered
architecture along with a neat diagram
depicting the layers. 10
(c) Explain the computer security
classifications as per the Trusted
Computer System Evaluation Criteria
(TCSEC). 10
(d) Explain the process of configuring TCP/IP
in WINDOWS 2000. 10

2. (a) Explain the following in context to Linux


operating system : 10
(i) File permission modes and changing
them
(ii) Pipes and Filters
(b) Describe the components of logical
structure and physical structure of a
domain respectively and mention their
functionality in WINDOWS 2000 operating
system. 10
3. (a) Differentiate between Mandatory Access
Control (MAC) and Discretionary Access
Control (DAC) mechanisms. Also, discuss
Hardware Tokens and Software Tokens
authentication methods along with their
merits and demerits. 10
(b) Write short notes on the following
Application Layer protocols : 10
(i) FTP
(ii) TFTP
(iii) TELNET
MCS-022 2
4. (a) What is the functionality of a MODEM ?
List and explain various types of modems
along with their respective features. 10

(b) What is the use of IPsec ? Mention its


features, components and implementation
options. 10

5. Write short notes on the following : 4x5=20


(a) Virtual Memory in Linux
(b) Using the Mapped Drive in WINDOWS 2000
(c) RAID and its levels
(d) Distributed and Real Time Operating
Systems

MCS-022 3 12,000
No. of Printed Pages : 4 MCS-022

MCA (Revised) / BCA (Revised)


Term-End Examination
June, 2016

MCS-022 : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage 75%)
Note : Question no. 1 is compulsory. Answer any three
questions from the rest.

1. (a) Describe the structure and characteristics


of any two different types of guided
transmission media.

(b) (i) What are the different layers of the


TCP/IP protocol suite ? Write the
function of each. Give a mapping
between the TCP/IP layers and the
OSI layers. 10

(ii) Explain the layers of the "THE"


operating system and their structure. 5

(c) What is the Windows NT Registry ? What


does it consist of ? Explain how you can
seeure the Registry and audit its critical
components. 10

MCS-022 1 P.T.O.
(d) Describe the data structure of a process in
LINUX, giving its components and the
structure of each. How does the data
structure of a process differ from that of a
thread ? 10

2. (a) What is a firewall and what are its


functions ? Describe how it is useful and
explain its limitations. 10

(b) (i) List the 7 RAID levels. What are the


limitations of disk striping ? 4
(ii) How can you configure a domain user
account in Windows to allow the user
to access her account only from 08:00
to 12:00 hours on Saturdays and
Sundays ? 3
(iii) In LINUX, what is the purpose of the
file "ktc/shadow" ? Why is it readable
only by root ? 3

3. (a) (i) As an ordinary user in LINUX, you


have a file called "secret" with some
set of permissions. By writing the
relevant commands, give two ways to
remove write permission for all except
yourself from "secret", such that the
other permissions that already exist
for the file remain unchanged. 2
2
(ii) Write the LINUX command to display
on the screen a given word as many
times as it occurs in a text file. 2 —1
2
MCS-022 2
(iii) There is a program "wonderful" that
takes a file as a command line
argument and produces output and
any error message on the screen.
Write the LINUX command to run
"wonderful" on "bigfile", as input file,
sending the output to "outfile" and
error messages to "diagfile". 2—
2
(iv) Describe with examples the syntax
and usage of the "mesg" command. 2
2
(b) Write a bash shell script in LINUX called
"calculate" that provides the result of the
four basic arithmetic operations for two
numbers. For example,
$ calculate 96/6
16
$
Ensure that your script carries out basic
error checking. 10

4. (a) (i) Explain the function of any two


protocols in the TCP/IP suite. 2
(ii) Explain the meaning and utility of
unicasting, multicasting and
broadcasting. 2
(iii) What is the mesh topology ? How is it
different from star topology ?
(iv) What are Data Terminal Equipments
and Data communication
Equipments ? 2
(v) What is a multiprocessor operating
system ? 2

MCS-022 3 P.T.O.
(b) (i) How can one encrypt a file using EFS
in Windows XP ? 2
(ii) Name any two network protocols
supported by Windows 2000. 2
(iii) What is a roaming user profile in
Windows 2000 ? 3
(iv) List six events that can be audited on
a Windows 2000 computer. 3

5. Write short notes on the following : 4x5=20

(a) Backups, describing all the three types of it


(b) Working of Windows 2000 in User mode and
Kernel mode
(c) Group Policy in Windows 2000
(d) Installation classes while installing LINUX

MCS-022 4 11,500
No. of Printed Pages : 3 I MCS-022 I

MCA (Revised) / BCA (Revised)


Term-End Examination
December, 2016

MCS-022 : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage 75%)
Note : Question no. 1 is compulsory. Answer any three
questions from the rest.

1. (a) (i) Describe the purpose and working of


the Telnet protocol. How is rlogin
different from, and simpler than
Telnet ? 5
(ii) What are dialog boxes and icons ?
What is their utility ?
(b) Explain the concept of a virtual machine in
networking with the help of a diagram.
Describe how it is useful. 10
(c) Describe the pre-installation checks and
information gathering that need to be
carried out before installing LINUX on a
computer. 10
(d) Explain how the Encrypting File System
works. Discuss the importance of
Encrypting File System. 10
MCS-022 1 P.T.O.
2. (a) What is the Active Directory in
Windows 2000 ? Describe, with the help of
a diagram, the logical structure of the
Active Directory. 10
(b) Explain the following in the context of
packet switching in data communication : 10
(i) Datagram Approach
(ii) Virtual Circuit Approach

3. (a) (i) It is desired to create a file in LINUX


called "newfile" that consists of the
last 15 lines of a file "filer followed
by the last 6 lines of a file "file2". Both
"filet" and "file2" already exist. Write
the sequence of commands in LINUX
to achieve this. 2!
2
(ii) Write the LINUX command to take a
text file named "source-file" as input
and circularly shift every small case
letter forward by 5 characters, such
that "a" becomes "f", "z" becomes "e"
and so on, but "A", "3", "$" and other
such characters are left unchanged. 2!
2
(iii) Write the LINUX command to change
the password of a user called "jyoti" to
"D93ef!kM$". Who can run this
command ? 2L
2
(iv) Write the LINUX command to find
the number of users currently logged
into the system ? 2L
2
MCS-022 2
(b) Write a LINUX shell script that takes
exactly 3 filenames as arguments and
outputs an error message otherwise. In the
first file, all lower case letters are changed
to upper case. The second file is unchanged.
In the third file, all upper case letters are
changed to lower case. New files are
created to hold these outputs. 10

4. (a) How does the SNMP application work ?


Why is it usually run over LTDP ? Describe
its architecture and usage. 10
(b) (i) Name any six services offered by the
Windows 2000 server. 3
(ii) What is a 'Virtual Private Network'
and how is it supported on the
Windows Operating System ? 2
(iii) What is a domain in Windows 2000 ?
How does it enhance its
functionality ?
(iv) How can you map a network resource
to a drive letter in Windows 2000 ? 2

. Write short notes on the following : 4x5=20


(a) Trivial File Transfer Protocol ( 111)
(b) Filters and Pipelines in LINUX
(c) Windows Explorer
(d) Hybrid Network Topologies

MCS-022 3 8,500
No. of Printed Pages : 3 I mcs422 1
MCA (Revised) / BCA (Revised)
Term-End Examination
1- June, 2017

MCS-022 : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage 75%)
Note : Question no. 1 is compulsory. Answer any three
questions from the rest.

1. (a) Explain the features of User mode and


Kernel mode of Windows 2000 operating
system.
(b) List and explain the significance of any five
networking devices.
(c) Explain the file access control methods
provided by Linux operating system. Give
an example for each. 8
(d) Write the step-by-step procedure to
configure domain name server in Linux
operating system. 8
(e) List and describe the different security
features in Windows 2000 operating
system. 10
(f) Define Distributed Operating System. 2
MCS-022 1 P.T.O.
2. (a) Write a Linux shell script that will convert
all numeric digits present in a text file into
"*". The path of the text file would be given
by the user. 10

(b) Explain the following with reference to file


organisation of Windows 2000 operating
system : 10
(i) File Replication Service
(ii) NTFS
(iii) FAT 16
(iv) FAT 32

3. (a) Which protocol is used by TFTP at the


transport layer ? Also, give any two
advantages of TFTP and FTP.

(b) Discuss the importance of "Backup. Domain


Controller" in Windows 2000 operating
system. 5

(c) What is virtual memory ? Explain the


abstract model of virtual to physical
address mapping with reference to Linux
operating system. 10

4. (a) Write the steps to change the password in


Linux ? What are the precautions that
should be taken while choosing a password ? 5

(b) Describe the concept of encryption using


EFS services. 5

MCS-022 2
(c) What is a filter ? Give two examples to
demonstrate the use of filters in Linux/Unix. 5
(d) Explain the output of the following
Linux/Unix commands :
(i) $ date who
(ii) $ diff abc.txt xyz.txt
(iii) $ man who
(iv) $ is -a
(v) $ pwd

5. Write short notes on the following : 4x5=20

(a) RAID Levels


(b) TCP/IP Model

(c) SNMP Architecture

(d) Virtual Private Network

MCS-022 3 8,500
No. of Printed Pages : 3 I MCS-022 I
MCA (Revised) / BCA (Revised)
Term-End Examination
December, 2017
CI
MCS-022 : OPERATING SYSTEM CONCEPTS AND
NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage 75%)

Note : Question no. 1 is compulsory. Answer any three


questions from the rest.

1. (a) Define a Real Time Operating System. Give


any two examples of a real time operating
system. What are the most important
issues in the design of a real time operating
system ? 10

(b) What is Token Ring ? How does it work ?


Differentiate between token ring and token
bus. 10

(c) What is meant by Trust Relationship ?


Discuss the role of Kerberos and Domain
controller in maintaining trust
relationships. 10

MCS-022 1 P.T.O.
(d) Write the Linux/Unix commands for the
following : 10
(i) Show the users logged in on the
network.
(ii) List the files having more than one
digit in the name.
(iii) Tell the system to run the process
continuously even if the user logs out.
(iv) To allow a user to communicate with
another user, logged in by splitting
the screen and providing two-way
communication.
(v) To kill a process after one hour.

2. (a) List and explain the file systems supported


by Linux operating system. Also, write the
security features provided by Linux in each
file system. 10

(b) Differentiate between gateways, routers


and switches.
(c) Differentiate between relative and absolute
pathnames using an example for each in
Linux.

3. (a) Explain the concept of pipes, filters and


redirection in Linux operating system. Give
an example for each.
(b) Explain the basic purpose of enabling the
offline features in Windows 2000 operating
system.

MCS-022 2
(c) Write a Linux shell script for automatic
grouping of files given in a directory. All
files will be grouped on the basis of their
size and will be saved into the newly created
folders based on file size groups given
below : Files will be grouped into 0 to 5 kB,
5 kB to 5 MB, 5 MB to 1 GB and greater
than 1 GB. 10
Note : Make suitable assumptions, if
necessary.

4. (a) Explain how distributed operating system is


better than network operating system.
(b) Write the step-by-step procedure to create
a group named "MCS22". Now add a user
"Kamal" in Windows 2000 operating
system. Assume user "Kamal" is already a
member of the guest account in your
system.
(c) What is X-Window system ? Explain the
X-Window library and X-Toolkit. 5
(d) Explain the characteristics of
multiprocessor operating system. 5

5. Write short notes on the following : 4x5=20


(a) LAN Topologies
(b) Optical Fibers
(c) Network Monitoring Tools
(d) Active Directory in Windows 2000

MCS-022 3 8,00Q
No. of Printed Pages.: 7 MCS-022

MCA (Revised) / BCA (Revised)


Term-End Examination
June, 2018
CI Ei
MCS-022 : OPERATING SYSTEM CONCEPTS AND
NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage 75%)

Note : Question no. 1 is compulsory. Answer any three


questions from the rest.

1. (a) Write the rules for a packet filtering


firewall that implements the following : 6

(i) Allow all inbound HTTP traffic to a


machine on the internal network
with IP address 172.17.15.69.

(ii) Allow all inbound DNS resolution.

(iii) Block all other inbound traffic from


any external source.

MCS-022 I P.T.O.
(b) Name the data transmission mode in each
of the following cases : 4

(i) Two people talking over the


telephone

(ii) A television serial being telecast

(iii) A press conference

(iv) Broadcast on FM radio

(c) List and explain the various network


topologies. Write one advantage and one
disadvantage of each. 10

(d) Assume a new contract employee, Rajesh


Kumar, has joined an organisation for one
year. You are the system administrator
there. Write down the steps you will follow
to arrange 10

(i) To create a Windows 2000 domain


user account for Rajesh.

(ii) To allow Rajesh to log on to the


network only during his work
timings on weekdays.

MCS-022 2
(iii) Make sure that Rajesh can access
the network only during his contract
period.

(e) What is multiprogramming ? How does


multiprogramming differ from
multitasking ? 10

2. (a) You are the network administrator in a


network with IP addresses 202.40.20.1 to
202.40.20.255.
(i) If the machine 202.40.20.67 sends a
packet to 202.40.20.185, is this
unicasting, multicasting or
broadcasting ?
(ii) Give an example of multicasting.
(iii) Give an example of broadcasting.
(b) (i) Name the different permissions
that can be set for printers in
Windows NT. Explain the
significance of each. 4

(ii) What is the default location of the


print spooler in Windows NT ? • 2
MCS-022 3 P.T.O.
(iii) Write the Linux/Unix commands to
create a file called "file3", which
consists of "filer appended to
"file2". Both "filer and "file2"
already exist.

(iv) How can you start the Apache


webserver on Linux ? How will you
verify that it has started and is
running correctly ?

3. (a) (i) A Linux file called "poets_list" has


some set of permissions. If you are
the owner of the file, write the
Linux command to set the
permissions of "poets_list" such that
only you and users that are part of
your group can change its contents.
Others can only read it but cannot
search for it.

(ii) In the question above, how can the


permissions be set if you are the
power user of the file ?
MCS-022 4
(iii) Suppose there is no command or
program called "vroom" on your
Linux system. What will be the
output of
vroom > testfile
on the screen ? What will be the
contents of "testfile" ?
(iv) There are 26 files in a directory .

called "mydirectory". The files have


names of the form "myfileA.py ",
"myfileB.py ", and so on up to
"myfileZ.py". Give any four ways of
moving all these 26 files to a
directory called "hisdirectory", with
the Linux or Unix commands that
will be used.

(b) What are the three strategies that can be


used to authenticate a user to a computer
system ? Describe how authentication can
be done using hardware tokens. • 10

MCS-022 5. P.T.O.
4. (a) What are the design goals of the Domain
Name System (DNS) ? Describe its design
principles and architecture. 12

(b) (i) State whether the following are


guided or unguided transmission
media : 2

• Optical fibre

• Twisted pair

• Co-axial wire

• Air

(ii) Name the four different options


available to sort the contents of a
folder that are displayed in its
directory listing in Windows 2000. 2

(iii) Name the four different types of


vulnerabilities of a computer system. 2

(iv) Write the linux command to remove


all files and directories from the
current directory.

MCS-022 6
5. Write short notes on the following : 4x5=20

(a) X Windows

(b) Data Backup Strategies

(c) Auditing in Windows 2000

(d). Microkernel Architecture

MCS-022 7 11,000
No. of Printed Pages : 3 I MCS-022(S) I

MCA (Revised) / BCA (Revised)


Term-End Examination
December, 2018

MCS-022(S) : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage : 75%)

Note : Question no. 1 is compulsory. Answer any three


questions from the rest.

1. (a) What is Kernel mode in Windows 2000 ?


Also, differentiate the role and
responsibilities of 'user mode' and 'kernel
mode' in Windows 2000 system. 10

(b) What is the significance of IPSec ? Explain


its features, components and
implementation options. 10

(c) What are the components of Domain Name


Server ? Explain how the Domain Name
Server is configured in LINUX operating
system. 10

MCS-022(S) 1 P.T.O.
(d) Explain, how an optical fiber cable works.
Also, discuss its advantages and
disadvantages over coaxial cable. 10

2. (a) Explain the functions of a router. Explain


its working with the help of an example. 10

(b) Draw a diagram of the SNMP architecture


and explain how it is used to manage
network devices. 10

3. (a) Explain the various file access control


mechanisms provided by Linux. Give
suitable example for each mechanism. 10

(b) Write a shell script in Linux named


"converter" that will take a number in
metres and convert into kilometres or
centimetres. Ensure that your script
carries out basic error checking. 10

4. (a) Explain the different RAID levels. What


are the limitations of disk striping ? 10

(b) Explain the steps to configure print server


on Windows 2000. Also, explain the
importance of print queue management. 10

MCS-022(S) 2
5. Write short notes on the following : 4x5=20

(a) Virtual Memory

(b) Group Policy of Windows 2000

(c) NTFS

(d) Intrusion Detection System

MCS-022(S) 3 8,500
0035
No. of Printed Pages : 3 MCS-022
MCA (Revised) / BCA (Revised)

Term-End Examination, 2019


MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT
Time : Three Hours] [Maximum Marks : 100
(Weightage 75%)

Note : Question No. 1 is compulsory. Attempt any three


questions from the rest.

1. (a) How collision can be avoided on CSMA/CD


network ? Compare CSMA/CD and token
passing access methods. [10]

(b) Write a Shell Script program to find Greatest


Common Divisor (GCD) for any two numbers.
Ensure that your script carries out basic error
checking. [10]

(c) What is Network File System (NFS) ? Write steps


to configure a Linux machine to work as on NFS
server. [10]

MCS-022 (1) [P.T.O.]


(d) Explain functions of Primary Domain Controller.
Also, explain the role of the 'primary domain
controller' and 'backup domain controller' in
enhancing security of window 2000 server.
[10]

2. (a) Explain the memory management model of the


Linux Operating System. [10]

(b) Compare and Contrast the 'Mandatory Access


Control" and "Discretionary Access Control"
mechanism in windows 2000. [10]

3. (a) Discuss, how windows 2000 manage the


domains. Also, explain how the trust relationship
is created and managed between domains. [10]

(b) What is packet filtering ? Explain its advantages


and limitations. How these limitations are
overcome by stateful packet filtering firewall.
[10]

4. (a) Write the usage for the following Linux/Unix


Commands. Give an example for each :
[21/2x4=10]

MCS-022 (2)
(i) Netstat

(ii) Cm p

(iii) Ping

(iv) Chmod

(b) List and explain any five network topologies. Also,


make suitable diagram for each. [10]

5. Write short notes on the following : [5x4=20]

(a) Multithreading

(b) Packet Switching

(c) IPSec

(d) EFS Services

MCS-022 ( 3 ) 8,000
6794
No. of Printed Pages : 3 MCS-022 I
MCA (Revised) / BCA (Revised)

Term-End Examination, 2019

MCS-022 : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 Hours Maximum Marks : 100


Weightage : 75%

Note : Question no. 1 is Compulsory. Answer any three


questions from the rest.

1. (a) What is GUI ? Briefly explain any three common


GUI. [8]

(b) Briefly explain the purpose of the following


directories of Linux operating system : [4]

(i) /lib

(ii) / sbin

(iii) /etc

(iv) /bin

(c) What is distributed operating system ? Explain


its advantages in detail. [6]
(d) Explain process of configuring TCP/IP in
Windows 2000. [10]

(e) What is Guided Transmission media ? Explain


which transmission media to be used while
surfing the net using WiFi. [5]

(f) What isActive Directory ? Explain how to secure


a guest account in Windows 2000. [7]

2. (a) What is Firewall ? Explain any three types of


vulnerabilities, a Firewall can protect. Briefly
explain any three limitations of Firewall. [10]

(b) What is IPSec ? Briefly explain its features and


its Windows 2000 components. Also list its
implementation options. [10]

3. (a) What is Virtual Machine Multiprogramming?


How is it different from conventional
Multiprogramming ? [5]

(b) What is Repeater ? Explain its uses. At which


layer of OSI model Repeater operates ? [5]
(c) Briefly explain how network resources are shared
in Windows XP, with the help of examples. [10]

(a) What is Multithreading ? How multithreading is


different than symmetric multiprocessing ? [10]

(b) Explain security goals of computer


systems. Briefly explain major security threats.
[1 0]

5. Write short notes on the following : [4x5=20]

(a) RAID and its levels

(b) Classification of Advanced OS

(c) Packet Filters

(d) DNS

x
No. of Printed Pages : 3 MCS 022 -

MCA (Revised) / BCA (Revised)


Term-End Examination

MCS-022 : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 Hours] [Maximum Marks : 100


(Weightage 75%)

Note: Question number 1 is compulsory. Answer any


threqusionfmret.

1. (a) What is 3D GUI? Explain any three major


components on development environment of
GUI. 8

(b) Briefly explain the purpose of the following


directories of Linux operating system: 4
(i) /lib
(ii) /dev
(iii) /tmp
(iv) /user/bin

(c) What is computer network? What is the need


of different network topologies? Explain
structure of Bus topology and star topology.

MCS-022 / 3470
(d) Why memory management is required in
OS? Eplain use of virtual memory in Linux.
6

(e) Explain how. Group Account Administration


is done in Windows 2000. Also explain Group
Policy Objects. 7

(f) What is vulnerability? How is it different from

threat? Briefly explain process of intrusion


detection. 8

2. (a) Explain registry management in windows NT.


6

(b) Explain how Drives are shared in Windows


XP. 4

(c) What is Domain Name System (DNS)?

Briefly explain design goals and design


principles of DNS.

3. (a) What is virtual machine? Explain uses and


advantages of virtual machine. 7

(b) Briefly explain functionalities of seven layer


of 051 reference model. 7

(2) MCS-)22 / 3470


(c) Explain Microkernel, Multithreaded &
symmetric multiprocessing operating system.

4. (a) Explain process of Linux Network Server


Setting. 8

(b) What is optical fiber? Explain advantages of


it. 6

(c) Briefly explain following application Layer


Protocols: 6

(i) FTP

(ii) TELNET

5. Write short notes on the following: 4x5=20

(a) X windows

(b) Simple Network Management Protocol


(SNMP)

(c) Backups and Restoration

(d) Computer Viruses

-x-

MCS-022 / 3470 (3)


No. of Printed Pages : 3 MCS-022

MCA (Revised) / BCA (Revised)


Term-End Examination
February, 2021

MCS-022 : OPERATING SYSTEM CONCEPTS AND


NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage : 75%)

Note : Question no. 1 is compulsory. Answer any three


questions from the rest.

1. (a) Draw a diagram of Simple Network


Management Protocol (SNMP) architecture
and show how it is used to manage network
devices. 10

(b) List and describe various security features


in WINDOWS 2000 O/S. 10

(c) Write LINUX/UNIX commands for the


following : 52=10

(i) To list all the files in a directory


that have 3 characters in the file
name.

MCS-022 1 P.T.O.
(ii) To set file permissions of a file ABC
to read, write, execute for all (user,
group and others)
(iii) To kill the process using its
process-id.
(iv) To rename an existing directory.
(v) To route the command’s output to
the terminal and to a file using
‘‘tee’’ command.
(d) Explain the abstract model of virtual
memory used in Linux O/S with the help of
a suitable diagram to explain its working. 10

2. (a) List and explain the 3 file systems


supported by WINDOWS 2000. Also
describe what is file replication service. 10
(b) What is stored in the Registry of
WINDOWS XP ? Discuss various
components of a Registry. 5
(c) What is packet switching ? What are its 2
approaches ? Briefly describe. 5

3. (a) List and explain the different states of a


process in LINUX. 6
(b) What is a Repeater ? At which level of OSI
model is it used and how ? 6
(c) Define a protocol. List and explain any two
application layer protocols. 8
MCS-022 2
4. (a) What are the security services provided by
IPsec ? Discuss the two IPsec components in
WINDOWS 2000. Also explain the policy
options for IPsec implementation. 10

(b) Explain the following w.r.t. DNS : 10


(i) DNS Architecture
(ii) DNS Zones

5. Write short notes on any four of the


following : 45=20

(a) ‘‘Hardening’’ in WINDOWS 2000 O/S

(b) Unguided Transmission Media

(c) Differences between ‘‘Diff’’ and ‘‘Cmp’’


commands of LINUX with examples

(d) Memory Management in LINUX O/S

(e) Firewalls

MCS-022 3 P.T.O.
[2] MCS-022

(iv) To print contents of a file using line


No. of Printed Pages : 3 MCS-022
printer.

MASTER OF COMPUTER (v) To search and locate a file based on


the owner, access permission, created
APPLICATION (M.C.A.) (REVISED)
date etc.
Term-End Examination
(vi) To change the password
June, 2021 (vii) To create a directory
MCS-022 : OPERATING SYSTEM CONCEPTS AND (viii) To change from current directory to a
NETWORKING MANAGEMENT new working directory

Time : 3 Hours Maximum Marks : 100 (ix) To list of current users logged in the
system.
Weightage : 75%
(x) To execute a command at given time.
Note : (i) Question No. 1 is compulsory.
(b) What are the three strategies that can be
(ii) Attempt any three questions from the used to authenticate a user to a computer
rest. system ? Discuss how authentication can
1. (a) Write the LINUX commands for the be done using hardware tokens. 10
following : 1×10=10 (c) Write a shell script to select all the files of
(i) To copy a file from one directory to a source directory and copy them to a new
another. directory specified by the user. 10
(ii) To move a file from one directory to (d) Explain the process of how TCP/IP protocol
another. is configured in Windows XP. 10
(iii) To remove/delete a file from a 2. (a) List and discuss the pre-installation checks
subdirectory. to be done before installing LINUX. 10

P. T. O.
[3]

(b) With respect to fault tolerant system,


explain the following techniques : 10

(i) Disk mirroring

(ii) RAID

3. (a) Explain the registry backup management


to secure the registry. 10

(b) Explain the file-system NTFS 5.0 of


Windows 2000. 6

(c) Define mapped drive. Describe how to


assign a drive letter to a network computer
(or) folder. 4

4. (a) Describe the layered architecture of


Windows 2000 O/S. 10

(b) Explain the process and thread


management in LINUX O/S. 10

5. Write short notes on the following : 4×5=20

(a) Kerberos management in Windows 2000

(b) Pipes and filter commands in LINUX

(c) Virtual private network

(d) User Datagram Protocol


MCS–022
[2] MCS-022

1. (a) Compare and contrast the Distributed


No. of Printed Pages : 5 MCS-022
operating system with the Network

operating system. Give an example of


MASTER OF COMPUTER
each. 5
APPLICATIONS (MCA)
(b) What is an X-window system ? Discuss the
(REVISED)/BACHELOR OF
X-window library and X-toolkit. 5
COMPUTER APPLICATIONS (BCA)

(REVISED) (c) What is a Multiprocessor Operating

Term-End Examination System ? Discuss the characteristics of

December, 2021 multiprocessor operating system. 5

MCS-022 : OPERATING SYSTEM CONCEPTS AND


(d) Distinguish between relative and absolute
NETWORKING MANAGEMENT
pathnames, using an examples for each in
Time : 3 Hours Maximum Marks : 100
Linux. 5
Weightage : 75%

(e) Explain the features of user mode and


Note : (i) Question No. 1 is compulsory.
kernel mode of Windows 2000 operating
(ii) Attempt any three questions from the
rest. system. 5

P. T. O.
[3] MCS-022 [4] MCS-022

(f) Discuss the role of “Backup Domain 3. (a) What is the Domain Name Server (DNS) ?

Controller” in Windows 2000 operating Briefly discuss the utility of DNS. Write

step-by-step procedure to configure DNS in


system. Support your discussion with
Linux operating system. 10
suitable block diagram. 5
(b) List and describe the various security
(g) What is EFS service ? Describe the concept
features in Windows 2000 operating
of encryption using EFS service. 5 system. 10

(h) Compare TFTP and FTP. Which protocol is 4. (a) What is Virtual Memory ? Explain the

used by TFTP at the transport layer and abstract model of virtual to physical

why ? 5 address mapping with reference to Linux

operating system. 10
2. (a) Discuss the working of Token ring and
(b) Explain the following with reference to file
Token bus. Give suitable example and
organization of Windows 2000 operating
supporting diagram for each. 10
system : 10

(b) In the context of Windows 2000, define (i) NTFS

Trust Relationship. Discuss the role of (ii) FAT 16

Kerberos and Domain Controller in (iii) FAT 32

maintaining the Trust relationship. 10 (iv) File Replication Service

P. T. O.
[5] MCS-022

5. Write short notes on the following : 4×5=20

(a) RAID levels

(b) TCP/IP model

(c) Virtual private network

(d) SNMP architecture

MCS–022

P. T. O.
No. of Printed Pages : 4 MCS-022

M.C.A. (REVISED)/B. C. A. (REVISED)

Term-End Examination
June, 2022
MCS-022 : OPERATING SYSTEM CONCEPTS AND
NETWORKING MANAGEMENT

Time : 3 Hours Maximum Marks : 100

Weightage : 75%

Note : (i) Question No. 1 is compulsory.

(ii) Attempt any three questions from the


rest.

1. (a) Explain the output of the following


Linux/Unix commands : 5

(i) date who

(ii) diff abc.txt xyz.txt

(iii) man who

(iv) ls-a

(v) pwd

P. T. O.
[2] MCS-022

(b) Explain the concept of filters and pipelines


in Linux operating system. Give example
for each. 5

(c) What is the default location of print


spooler in Windows NT ? Name the
different permissions that can be set for
printers in Windows NT. Explain the
significance of each. 5

(d) What do you understand by disk striping ?


What are the limitations of disk striping ?
List the RAID levels. 5

(e) Describe the structure and characteristics


of any two types of guided transmission
media. 5

(f) Differentiate between data terminal


equipment and data transmission
equipment. Give example of each. 5

(g) What is VPN ? Write the purpose of VPN


and name the VPN technologies supported
by Windows 2000. 5

(h) Explain the architecture of Simple


Network Management Protocol (SNMP),
with the help of a suitable diagram. 5
[3] MCS-022

2. (a) Write Linux shell script that will convert


all numeric digits present in a text file into
“*”. The path of the text file would be given
by the user. Support your code with
suitable comments for better readability.

10
(b) Compare multiprogramming and
multitasking. Give suitable example for
each. 10

3. (a) List and explain various network


topologies. Write one advantage and
disadvantage of each. 10

(b) With reference to security system and


facilities, explain the following : 10

(i) System Access Control

(ii) Data backup and off-site retention

4. (a) Discuss the functionality of user and


kernel modes of Windows 2000 operating
system. 10

P. T. O.
[4] MCS-022

(b) Explain the process and thread management


in Linux Operating System. 10

5. Write short notes on the following : 4×5=20

(a) Microkernel Architecture

(b) Data Backup Strategies

(c) Auditing in Windows 2000

(d) Group policy in Windows 2000

(e) Active directory in Windows 2000

MCS–022
No. of Printed Pages : 3 MCS-022

MCA (Revised) / BCA (Revised)


Term-End Examination
December, 2022

MCS-022 : OPERATING SYSTEM CONCEPTS


AND NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100


(Weightage : 75%)

Note : Question no. 1 is compulsory. Attempt any


three questions from the rest.

1. (a) Discuss Pipes, Filters and Redirection


commands in LINUX, along with suitable
examples and explanation. 10

(b) Elucidate the following with reference to


Windows XP Networking : 10

(i) TCP/IP Protocol settings

(ii) VPN and Remote Networking


facilities

MCS-022 1 P.T.O.
(c) In context to computer security, explain the
following : 6

(i) Integrity

(ii) Confidentiality

(iii) Availability

(d) Define authentication tokens. With


reference to authentication tokens, explain
the use of Hardware tokens and Software
tokens. 6

(e) Discuss Trivial File Transfer Protocol


(TFTP) and TELNET. 8

2. (a) Explain the features of Network Operating


System and Distributed Operating System. 10

(b) Define Domain Name System (DNS). In


context to DNS, explain DNS Architecture
and DNS Zones. 10

3. (a) Discuss process and thread management in


LINUX. 10

(b) Discuss the file system, special files and file


management in LINUX. 10
MCS-022 2
4. (a) Discuss the following (giving an example for
each) with reference to shell scripting in
LINUX : 10
(i) variables
(ii) if ... else statement
(iii) echo command
(iv) break and continue

(b) Briefly discuss the following network


connecting devices, mentioning their
purpose, operating layer and working
principle : 10
(i) Repeaters
(ii) Hubs
(iii) Bridges
(iv) Routers

5. Write short notes on the following : 45=20

(a) SNMP and UDP

(b) LINUX Utilities

(c) User-to-User Communication in LINUX

(d) Redundant Array of Independent Disks


(RAID) and its Implementation

MCS-022 3 P.T.O.

You might also like