KEC Combined
KEC Combined
&PRACTICE SETS
B.Sc. CSIT (VII Semester)
Al ects
Features FOR
New Syllabus
Model Questions-Answers
TU Questions-Answers
Model Questions Secs
2079
CONTENTIS
Model Questions-Answers 49
TUQuestions-Answers 2078 75
Model Questions Sets For Practice
SET 1. * * * * * * * *
... 126 SET 2...****" 127
SET 7...
************* * * * * *
..129 SET 8. ***********
* * * * * *
. . 130
Data Warehousing and
Data Mining (CSC 410) 131-176
************ ***
************ 131
New Syllabus. ************ **********
Sets and(Mulached
tiple
Operations using Java,Result Sets, Row
4.2 DDL and DML Updateable
Scrollable Result Sets,
Results,
Transactions, SQL Escapes.
Row Sets,
(5 Hrs) 5
Network Programming atocol (TCP),
(TCP), Use
User Datagram Protocoi (UDP), Por
Unit 5: Protocol
control
Transmission
5.1. Classes in JDK
Network
IP Address using UDP, Working
Socket rogramming using TCP, Socket programming
Class.
rking
5.2 with URL
Connection
with URL's, working Receiving Email
Mail APl, Sending and
5.3. Java
Laboratory Work
The laboratory work includes writing programs related to basic java programming
concepts, Designing GUL, Event Handling, JDBC, Network Programming, Web
Programming, and Distributed Programming. They also learn to develop web
applications using Java Web Frameworks.
Text Books:
Cay S. Horstmann, Core Java Volume i-Fundamentals, Pearson, Eleventh
Edition, 2018
2. Cay S. Horstmann, Core Java Volume l1-Advance Features, Pearson, Elevenu
Edition, 2019
3. Herbert Schildt, Java: The
Complete Reference, McGraw-Hill Educat
Eleventh Edition, 2018
Reference Book:
1. D.T. Editorial Services, Java 8
Programming Black Book, Dreamtech Press, 01
Advanced Java Programming..3
TRIBHUVAN UNIVERSITY
Institution of Science and Technology
MODEL QUESTIONS-ANSWERS
If we initialize a
and methods, which makes them non-changeable.
its value. If we
variable with the final keyword, then we cannot modify
subclasses.
declare a method as final, then it cannot be overridden by any
restrict the other classes to inherit
And, if we declare a class as final, we
or extend it.
a c c e s s modifiers and non-
There are two types of modifiers in java:
access modifiers. The access modifiers in java specity accessiblity
data member, method, constructor or class.
(scope) of a
four types of java access modifiers:
There are
1. private
2. default
3. protected
4. public static, abstract,
There are many non-access modifiers such
as
void Message()
System.out.println("Hello");
//save by B.java
package packB;
import packA.*;
class B
1/save by B.java
package packB;
Advanced Java Programming...5
import packA. *;
class B extends A
Output: Hello
public access modifier
The public access modifier is accessible everywhere. It has the widest
scope among all other modifiers.
Example: Java program showing use of public access modifier
Wsave by Ajava
package packA;
public class A
System.out.println("Hello");
lsave by B.java
package packB;
import packA. *;
class B
obj.Message0;
Output: Hello
Understanding all java access modifiers
Let's understand the access modifiers by a simple table.
N N N
Private Y
Y N N
Default Y
Protected Y Y Y N
Y Y Y
|Public Y
form with user id, password, ok
2. Write a program to create login
java such that pressing T
button, and cancel button. Handle key events id
performs login and pressing clears text boxes and púts focus on user
'c
box. user table having fields
Uid and Password in the
text Assume
database named account.
(10)
6 A
.
Complete TU Solution of CSIT 7th Semester and Practice Sets
Ans:
LoginFrame.java
import javax.swing.*;
import java.awt.*;
import java.awt.event.*;
import java.sql.sQLException;
public class LoginFrame extends JFrame
ex.printStackTrace();
messagelabel. setText (ex.getMessage
finally {
add(messagelabel)
setSize(200, 100)
Advanced Java Programming.. 7
setVisible(true);
@Override
public void mouseClicked (MouseEvent e)
super.mouseclicked (e);
self.requestFocus();
this.addKeyListener(new KéyListener()
@Override
public void keyTyped (KeyEvent e)
@Override
public void keyPressed (KeyEvent e)
if (e.getKeyChar() ==
1')
okBtn.doclick();
else i f (e.getkeyChar() == 'c')
userIdTextField. setText("");
passwordField. setText ("");
userIdTextField .grabFocus();
@Override
public void keyReleased (KeyEvent e)
new LoginFrame () ;
Solution of CSIT 7th Semester and Practice Sets
8 A Complete TU
Loginservices.java
import java.sql.Connection;
import java.sql.PreparedStatement;
import java.sql.ResultSet;
import java. sql.sQLException;
public class LoginService
Connection connection;
public LoginService()
ps.setString(1, user);
ResultSet rs = ps.executeQuery);
ent(query)
return rs.next();
ps.setString(1, user);
ps.setString (2, hashedPasSword);
ResultSet rs ps.executeQuery();
return rs.next();
3. Discuss various scopes of JSP objects briefly. Create a HTML file wih
principal, time and rate. Then create a JSP file that reads values from t
HTML form, calculates
simple
interest and displays
it. 4+6
Ans: The availability of a JSP
object for use from a particular place ot u
application is defined as the scope of that JSP object.Object scope
segregated into four
parts and they are page, request, sessi and
application.
Page Scope:
Fage scope means, the JSP object accessed only from within the same
where it was created. JSP implicit objects out,
exception, re pone
pageContext, config and page have page scope
//Example of JSP Page Scope
Jsp:useBean id="employee class="EmployeeBean" scope="pagee"/»
Request Scope:
A JSP object created using the page
<title>Simple Interest</title»
</head
<body
h1>Simple InterestF</h1>
<form action="index.jsp">
Enter the principal: <input type="text" name="principal"><br />
cbr /> Enter the time: <input type="text" name="time">xbr />
<br /> Enter the rate (%): <input type="text" name="rate"><br />
value="Calculate">
<br / <input type="submit"
</form>
</body
/html>
Index.jsp
<html
<head
<meta charset="UTF-8"
<title>1SP Page«/title
/head
body
double p = Double. parseDouble(request.getParameter ("principal "))
double t = Double.parseDouble(request.getParameter("time"));
double r = Double. parseDouble(request.getParameter("rate"));
double interest (p * t r) / 100;
<h1
Simple Interest <K=interest X»
</h1
</body
</html
Sets
7h Semester and Praçtice
Solution of CSIT
TU
A Complete Section B
10.
(8 x5 40)
questions. of Employee class in the file
in
Attempt any eight that
writes objects
interest.
Write a java program of
class as your 5
4. Create
Employee
named emp.doc.
implements
class Employee
p r i v a t e S t r i n g name;
this.name = name
this.age = age;
@Override
public String toString()
"
name
Age:" + age;
"Name: +
return
class RWObject
("emp.doc");
ObjectoutputStream objectoutputStream = new ObjectOutputStream
(fileoutputStream) ;
1/Write object to file
objectOutputStream. writeObject (employee1) ;
objectoutputStream.write0bject(employee2) ;
objectoutputStream.close() ;
fileOutputStream.close();
FileInputStream fileInputStream new
FileInputStream("emp.doc");
ObjectInputStream objectInputStream = new
(fileInputStream); ObjectInputStream
//Read Objects
Employee employee
(Employee) =
objectInputStream.readObject();
Employee employee3 (Employee)
objectInputStream read0bject ( ):
.
System.out.println(employee. toString () ):
System.out.printlnclose();
objectInputStream. (employee3.toString0%
fileInputstream.close() ;
Advanced Java Programming... 11
catch (Exception e)
e.printStackTrace();
What are layout managers? Explain Gridbag layout with suitable example.
5.
(1+4)
Ans: The LayoutManagers are used to arrange components in a particular
manner. The Java LayoutManagers facilitates us to control the positioning
and size of the components in GUI forms. LayoutManager is an interface that
is implemented by all the classes of layout managers. There are the following
classes that represent the layout managers:
java.awt.Borderlayout
java.awt.FlowLayout
java.awt.GridLayout
java.awt.CardLayout
java.awt.GridBagLayout
javax.swing. BoxLayout
javax.swing.GroupLayout
javax.swing.ScrollPaneLayout
javax.swingSpringLayout etc.
GridBaglayout
The gridbag layout is a flexible layout manager that aligns components
vertically and horizontally, without requiring that the components be of the
same size. It maintains a dynamic rectangular grid of cells with each
Example
package project3;
1/Java program to demonstrate GridBagLayout class.
import java.awt.*
import java.awt.event.*;
import javax.swing.JFrame
import javax. swing.";
public class GridbagDemo extends JFrame
GridbagDemo ()
setTitle ("GridBagLayoutDemo") ;
JPanel p = new JPanel () ;
P.setLayout (new GridBagl ayout( ));
GridBagConstraints c = new GridBagConstraints ();
C.insets = new Insets(2, 2, 2, 2);
C.gridx = 0;
C.gridy 0 ;
12.A Complete TU Solution of CSIT 7th Semester and Practice Sets
C.ipadx = 15;
C.ipady=50;
p.add(new JButton("Java Swing"), c)5
C.gridx = 1;
c.ipadx = 90;
C.ipady = 40;
P.add(new JButton("Layout'"), c);
C.gridx = 0;
C.gridy 1;
C.ipadx = 20;
c.ipady 20;
P.add (new JButton ("Manager"), c);
c.ipadx = 10;
C.gridx ='1;
p.add(new JButton("Demo*"), c);
WindowListener wndCloser =
new
WindowAd apter ()
public void windowClosing (WindowEvent e)
System.exit(0);
1/ add the
actionwindowlistener
addWindowListener (wndCloser);
getContentPane().add
setsize(600, 400)
(p);
setVisible(true);
I/Main Method
public static void
main(String[] args)
new
GridbagDemo () ;
str = actionEvent.getActionCommand
String ();
t1.setText("You have clicked
"
str);
new ActionDemo();
of the
the Demo Button, with the help
In the above example if clicked on
event done on
will be able to see the click
getActionCommand() method
we
Example
package com. STH. JDBC;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.ResultSet;
inport java.sql.sQLException;
import java.sql.Statement;
public class Exception_Example
stub
I/ TODO Auto-generated method
employee_details set email="' martin@
String update_query "update 10011";
gmail.com' where empNum1
Class.forName ("oracle. jdbc.driver.OracleDriver");
try(Connection conn
OriverManager.getConnection("jdbc:oracle:thin
System/pass123@localhost:1521:XE"))
14..A Complete TU Solution
of CSIT 7h Semester and Practice Sets
Statement statemntl
= conn.
Createstatement () :
Resultset rs1 =null;
statemnt1 =conn.createstatement();
System.out.println( "Executing Update query
executelpdate method");
using
int return_rows statemntl.executeUpdate(updata
updateuery.
_query),
of Affected Rows
System.out.println("No.
'+return roWSOwS,
catch(SQLException sqe)
System.out.println("Error Code
System.out.println( "sQL state =
"
+sqe.getErrorCode():
sqe.getSQLState();
System.out.println("Message 5qe.getMessage()):
system.out.println("printTrace /n");
sqe.printStackTrace() ;
Datipadd,agramPacket
6878); sendPck=new DatagramPacket
DatagramPacket (send,
(send, send. lengt
Advanced Java Programming... 15
clientSocket.send(sendPck);
DatagramPacket resPck=new DatagramPacket (resive, resive.
length);
clientSocket.receive(resPck);
String fact=new String (resPck.getData());
"
SERVER:
"
+n+"| +fact);
System.out.println("FROM
=
clientSocket.close()
factserver.java
import java.io.*;
import java.net.*;
class factserver
{
public static void main(String argv[ 1) throws Exception
num=new String(resPck.getData());
num=num.trim();
no=Integer.parseInt(num);
fact 1;
for(i-1; 1ic=no; i++)
fact=fact*i;
res=Long.toString(fact);
send=res.getbytes () i
How JavaEx differs from Swing? Explain steps of creating GUI using
javaFx. (2 +3)
Ans: The key differences between JavaFX and Swing.
iavafx.scene.Scene class. We need to pass the layout object to the scene class
constructor.
the Stage
Step 5: Prepare
javafx.stage.Stage class provides some important methods which are
to be called to set some attributes for the stage. We can set the
title
required
of the stage. We also need to call show) method without which, the stage
won't be shown.
for the button
Step 6: Create an event
event on the button. We need to
As our application prints hello world for an
call setOnAction() on the
create an event for the button. For this purpose,
button and define an anonymous class Event
Handler as a parameter to the
method handle() which
method. Inside this anonymous class, define a
contains the code for how the event is handled. In our case, it is printing
throws Exception
public void start(Stage primaryStage)
/Step 2
Buttonbtn1=new Button("Say, Hello World");
1/Step 3
StackPane root=new StackPane();
root.getChildren () . add(btnl);
1/Step 4
Scene scene=new Scene(root,400, 300);
1/Step 5
primaryStage. setScene (scene)
JavaFX Application");
primaryStage.setTitle("First
primaryStage.show()
Semestor and Practice Sets
18.. A Complete
TU Solution of CSIT 7
1/Step 6
btni.setonAction(new Handler());
class Handler
implements EventH
tHandler<Action Event»
Contd..
@Override
handle(ActionEvent ae)
public void
System.out.print.
intln("hello world");
1/Step 7
public static void main (String[] args)
launch(args);
Output
First JavaFX Application
X
res.setContentType("text/html");
Printwriter pw=res.getwriter()5
String name=req.getParameter("name");
pw.printin("Welcome "+name)
11 How CORBA differs from RMI? Discuss the concepts of IDL briefly(2+3)
Ans: Major differences between RMI and CORBA are listed below.
RMI L CORBA
RMI stands for remote method | CORBA stands for Common Object
invocation Request Broker Architecture
It uses Java interface for It uses Interface Definition Language
implementation. (LDL) to separate interface from
innplementation.
CORBA passes objectsby value. CORBA passes objects by reference
Java RMl is a server-centricmodel. CORBAis a peer-to-peer system.
RMI uses the Java Remote Method CORBA use Internet Inter- ORB
Protocol as its underlying remote Protocol as its underlying remote
CORBA. RMI.
Java IDL is a technology for distributed objects that is, objects interacting
to interact
on different platforms across a network. Java IDL enables objects
regardless of whether they're written in the Java programming language
or
ample,youa
use it instead to define interfaces, not implementations. For ev
function used to calculate sales tax on an order might be defined like this:
interface order
//statement to bé synchronized
Every Java object with a critical section of code gets a lock associated with
the object. To enter critical section a thread need to obtain the
corresponding objece's lock.
If we d not use syncronization, and let two or more threads access a
shared resource at the same time, it will lead to distorted
results.
Example:
class First
System.out.print ("["+msg);
try
Advanced Java Programming..21
Thread.sleep(1000);
catch(InterruptedException e)
e.printStackTrace();
System.out.println ("]");
String msg
First fobj
Second (First fp,Stringstr)
fobj=fp;
msg str;
start
public void run()
fobj.display(msg);
Output
welcome
new
programmer]
22 A Complete TU Solutlen of CSIT 7 Semester and Practlce Sets
TRIBHUVAN UNIVERSITy
Institution of Science and Technology
TU QUESTiONS-ANSWERS 2078
Course Title: Advanced Java Programming Full Marks: 60 +
Course No: CSC409
Lab
Pass Marks: 24 20+
Nature of the Course: Theory +
+8+
Credit Hrs.
Semester: VII
Section A
add(12)
add (t2);
add(b1);
add(t3);
b1.addActionListener(this);
setSize(400, 300);
setLayout(null);
setVisible(true);
setDefaultclose0peration(JFrame.EXIT_ON_CLOSE);
@Override
public void actionPerformed (ActionEvent e)
if(e.getsource()==b1){
int numi =Integer.parseInt (t1.getText ());
int num2 Integer.parseInt(t2.getText());
int sum = num1 num2;
t3.setText(String.value0f(sum));
new Addition() ;
saaaupen4sssanosm***aaa*****a *ass**,
Servilet
Servlet Container
init() service0destroy0|
*****************sASBesee
The class
der
loader is load the
24 AComplete l o a d e d wher
en the first request for
the
Instantiated:
and class is
Then;it creates the instance of
Loaded
1. servlet
class. The
container.
web
by the s e r v l e t class. The servlet instance
servlet
servlet is
received
created
the
after loading
servlet life cycle.
a
in the servlet
once init 0
method:
The web contain calls the
only the rvlet instance.
calling the servi The init
Initialized by creating
after
2.
method only
once
servlet. Syntax of the init method is
the
init) to
initialize
method is used
ServletException
given below: throws
config)
init(ServletConfig
service) method
public void request by
invoking
time when reau
Process a
client's
service
m e t h o d each for
3. calls the lized, it calls the servi
The web
container
servlet is initialized,
After
is
received.
method of the Servlet interface is
the servlet service
of the
method. The syntax
given below: ServletResponse response)
service(SeroletRequest
request,
public void
throws ServletException, IOException
used methods within
in
are most frequently
and doPost()
The doGet)
each service request. The web container calls
method:
the destroy)
4.
Terminated by callingg the servlet instance from the
method before removing
the destroy to clean upP any resource for
the servlet an opportunity
service. It gives of the destroy method of the
thread etc. The syntax
example memory, below:
Servlet interface is given
public void destroy() servlet is destroyed, garbage
the JVM: Once the
5. Garbage collected by collecting the garbage's.
collector component of JVM responsible
is
System.out.println("password:"
/get response writer
password)
Printwriter writer
/Ibuild HTML code response.getWriter ();
String htmlRespone "<html> ";
=
Stubs Skelétons
RMI
System Remote Reference Layer
Transport
Transport Layer this layer connects the client and the server. It
manages the existing connection and also sets up new connections
Stub - A stub is a representation (proxy) of the remote object at client. It
resides in the client system; it acts as a gateway for the client program.
Skeleton this is the object which resides on the server side. Stub
communicates with this skeleton to pass request to the remote object.
RRL (Remote Reference Layer) It is the layer which manages the
references made by the client to the remote object.
Program part,
Create the remote interface
import java.rmi. ";
public interface Multiply extends Remote
26.. A Complete TU
Solutlon of CSIT 7hSemester and Practice Sets
Multiply
MultRemote()throws RemoteException
implements
super()
public int Mult(int x, int y)
return x*y;
Create the stub and skeleton objects using the rmic tool
rmic MultRemote
Start the registry service by the rmiregistry tool
rmiregistry 5000
Create and run the server application
import java.rmi.*;
inport java.rmi.registry.*;
public class MyServer
catch(Exception e)
Advanced Java Programming... 27
Section B
(8 x 5 40)
Attempt any eight questions.
What is package? How can you create your own package in Java? Explain
4.
with example. (1+4)
to control
Ans: Packages are used in Java in order to prevent naming conflicts,
access, to make searching/locating and usage of classes, interfaces,
enumerations and annotations easier, etc. A Package can be defined
as a
annotations)
grouping of related types (classes, interfaces, enumerations andSome of the
providing access protection and name space management.
existing packages in Java are:
System.out.println("From Class A
of Package P1");
Ax=new A);
x.show();
Output
From Class A of Package Pl
Practice Sets
CSIT 7h Somester and
TU Solution of
28. A Complete of check boxes f.setsize(300, 300);
Explain the
uses
components?
and
need swing f. show():
5. Why do we
(2+3)
GUI programming.
radio buttons in lass which is lightweight and
f o u n d a t i o n clas
f.setsize(300, 300);
f. show()
JRadioButton
TRadioButton is used to render a group of radio buttons in the UI. A user can
select one choice from the group.
Example:
Java JRadioButton Example
importjavax.swing
public class RadioButtonExample
JFrame f;
RadioButtonExample(0
f=new JFrame();
JRadioButton r1=new JRadioButton("A) Male"
JRadioButton r2=new JRadioButton("B) Female");
r1.setBounds(75,50,10030);
r2.setBounds(75,100,100,30);
ButtonGroup bg=new ButtonGroup0;
bg.add(r1);bg.add(r2);
f.add(r1);f.add(r2);
f.setSize(300,300);
f.setLayout(nul);
f.setVisible(true);
selection is made,
or when a checkable me
or disselected.
item is selected
mwe)
Text Listener Defines one method to recognize when a text
value changes.
voidtertValue Changed (Text Event te)
WindowFocusListener Defines two methods to recognize when a
window gains or looses input focus.
void window Gained Focus (Window Event
we) void window Lost Focus (Window Event
we)
WindowListener Defines seven methods to recognize when a
window is activated, closed, deactivated,
deiconified, iconified, opened, or quit.
void window Activated (Window Event we)
void window Closed (Window Event we)
void window Closing (Window Event we)
void windowDeactivated(WindowEvent we)
void windowDeiconified(WindowEvent we)
void windowlconified(WindowEvent we)
void windowOpened(WindowEventwe)
Example of event handling within class
import javax. swing. *;
import java.awt.event.*;
class EventDemo extends JFrame implements, ActionListener
JTextField tf;
EventDemo()
tf.setText ("Welcome");
public static void main(String args[ 1)
new EventDemo();
32.A Complete TU Solution of CSIT7 Semester and Practice Sets
Adapter Class vs. Listener Interface
for the
Any class which handles events must implement a listener interface
event type it wishes to handle. A class can implement any number of
listener interfaces. To implement
a listener interface the class must
implement every method in the interface.
Sometimes we may want to implement only one or two of the methods in an
of all the
interface. We can avoid having to write o u r own implementation
An adapter class is a class
methods in a n interface by using án adapter class.
interface. Our
that already implements all the methods in its corresponding
class must extend the adapter class by
inheritance so w e can extend only one
does not support multiple
adapter class in o u r class because Java classes and the listener interfaces
inheritances. Here a r e the Java adapter
that adapters exist for only listener
they implement. Web can notice
interfaces with m o r e than one method.
Listener Interface
Adapter Class
ComponentListener
Component Adapter
Container Adapter ContainerListener
FocusListener
Focus Adapter
KeyListener
Key Adapter
MouseListener
Mouse Adapter
MouseMotionListener
Mouse Motion Adapter
Window Adapter WindowListener
7. What is row set? Explain cached row set in (1+4)
detail.
Ans: RowSet is an interface in java that is present in the java.sql package. The
instance of RowSet is the java bean component because it has properties and
a java bean notification mechanism. It is introduced in JDK5. A JDBC RowSet
It makes the data more
provides a waý to store the data in tabular form.
flexible and easier than a ResultSet. The connection between the RowSet
object and the data source is maintained throughout its life cycle.
The CachedRowSet is the base implementation of disconnected row sets. It
connects to the data source, reads data from it, disconnects with the data
source and the processes the retrieved data, reconnects to the data source
and writes the modifications.
Creating a CachedRowSet
You can create a Cached RowSet object using the createCachedRowSet)
method of the RowSetFactory.
You can create a RowSetFactory object using the newfactory(0 method of the
RowSetProvider method.
CachedRowSet »
Create a object using the above-mentioned methods
shown below:
//Creating the RowSet object
RowSetFactory factory RowSet Provider .newFactory ();
CachedRowSet rowset
factory.createCachedRowSet ();
Advanced Java Programming... 33
follows:
Get the session object that stores all the information of host like host
name, username, password etc.
compose the message
send the message
Example:
import java.util. *;
import javax.mail. *;
import javax.mail.internet.*;
import javax.activation. *;
public class SendEmail
mex.printStackTrace ();
launch(args);
Output
JavaFX HBox Example X
Button Button 2Buton3
Instead of arranging the nodes in horizontal row, Vbox Layout Pane arranges
the nodes in a single vertical column. It is represented
by javafx.scene.layout. VBox class. The VBox class contains four constructors
that are given below.
VBox0: creates layout with 0 spacing
Vbox(Double spacing): creates layout with a spacing value of double
type
creates layout with the
Vbox(Double spacing, Node children):child nodes
a
= new VBox(5);
VBox root Insets (5) ) ;
root. setPadding (new
root.setAlignment(Pos. BASELINE_CENTER);
root.getChildren().add (btn1);
root.getChildren().add(btn2);
r o o t . g e t Children ( ) . a d d ( b t n 3 ) ;
scene=new
Scene(root, 300, 200);
Scene
primaryStage. setScene(scene);
VBox Example");
setTitle( "JavaFX
primarystage.
primarystage. show();
(String[] args)
static void main
public
launch (args);
Output
X
JavaFX VBox Example
Button 1
Button 2
Button3
HTTP
HTTP Server
Protocol
Web Browser Servlets
Program
Database
</table»
</body>
</html>
11 Why CORBA isimportant? Compare CORBA with RMI. (3+2)
between distributed
Ans: Common Object request broker is used for communication
written by in java language are any other
and heterogeneous objects that are
language. CORBA is developed by Object Management Group (OMG). This was
followed by many revisions of CORBA architecture. CORBA is world's leading
information independent of
middleware solution enabling the exchange of
programming language, and operating system.
hardware platform, that provides services to software
Middleware is type of computer software
a
the operating system. It makes easier
applications beyond those available from
for software developers to implement communication and input/output, so they
can focus on the specific purpose of their application.
Machine A Machine B Machine C
Distributed applications
COBRA
Local OS Local OS
Local OS
Network
CORBA as Middleware
Figure:
38.A Complete TU Solution of CSIT 7Th Semester and
Practice Sets
Ans: Java Server Pages (sP) is a server-side programming technology that enables
the creation of dynamic, platform-independent method for building Web-
based applications. JSP have access to the entire family of Java APls,
including the JDBC API to access enterprise databases. It can be thought of as
an extension to servlet because it provides more functionality than servlet. A
JSP page consists of HTML tags and JSP tags. The JSP pages are easier to
maintain than servlet because we can separate designing and development.
Web developers write JSPs as text files that combine HTML or XHTML code,
XML elements, and embedded JSP actions and commands. jSP tags can be
used for a variety of purposes, such as retrieving information from a
database or registering user preferences, accessing JavaBeans components,
passing control between pages and sharing information between requests,
pages etc.
hello.jsp
Read Transition
2
helloServlet.java| phase
- 3
Generate
Compile
Request
5helloServlet.class
Execute processing
phase
MODEL SET 1
Semester: VII
Section A
Attempt any TWO questions. (2 10 20)
1. What are the uses of protected access specifiers in Java? Explain each use of
the access specifiers with suitable example.
2. Write a program using swing components to multiply two numbers. Use
text fields for inputs and output. Your program should display the result
when the user presses a 'Mult' button.
40. A Complete TU Solution of CSIT 7h: Semester and Practice Sets
that reads
Create a simple servlet and
in detail.
3. Explain life-cycle of servlet with two fields' usernam
form. Assume form
displaysdata from HTML
and password.
Section B
(8x5 4 0
Attempt any EIGHT questions. in Java? Explai
create your
own package
1. What is package? How can you
from client.
with suitable example
Explain different types of
constructors
10. What is constructor?
sessions? Write dow
11. What is session? What are different ways
of tracking
suitable servlet for tracking session.
MODEL SET 2
Section A
Attempt any TWO questions. (2 * 10 2
1. What is the significance of stub and skeleton In RMI? Create a RMIl applicatid
such that a client sends an Integer number to the server and the server retun
the factorial value of that integer. Give a clear for everyspecification step
2 Describe the responsibility of Serializable interface. Write a program to re
an input string from the user and write the vowels of that string
VOWEL.TXT and consonants in CONSOLNANT.TXT
3. Why do we need to handle the exception? Distinguish error and excepu
eptio
Write a program to demonstrate
your own exception class.
Advanced Java Programming... 41
Section B
Attenpt any
EIGHT questions. (8 x5 40)
4.
4.
What is static data? How it is differ from normal data? Explain.
5. Explain CORBA architecture briefly.
What is nesting method? Explain with suitable example.
6.
What is IDL? Explain its structure briefly.
7. methods?
8. Differentiate between Synchronized block and Synchronized
What is inner class? Explain with suitable example.
9. with
What is Servlet? Explain the position of servlets
in web applications
10.
suitable diagram.
code and
11. Explain the steps used in writing servlets with suitable source
brief description of each step.
can it be avoided?
How to detect a deadlock condition? How
12
13. What is the use of this keyword in java? Explain.
MODEL SET 3
Section A
(2x 10 20)
Attempt any TWO questions.
a text field, a text label for displaying
the
1. Design a GUI form using swing with
and three buttons with caption Check
input message "Input any String', for above scenario
Palindrome, Reverse, Find Vowels. Write a complete program
reverse it after clicking second
and for checking palindrome in first button,
button and extract the vowels from it after clicking
third button.
MODEL SET 4
Section A
(2x 10 20)
TWO questions. interest. Use text
Attempt any to find simple
program using
swing components should display the result when
1. Write a
Your program
fields for inputs and output.
button.
the user presses a life cycle of servlet in
Discuss
Differentiate it with JSP.
What is servlet?
detail.
extract name
of those students who
to
Write a Java program using JDBC that the student table has four
Kathmandu district, assuming
live in
district, and age).
attributes (ID, name,
Section B
(8 x 5 40)
EIGHT questions.
Attempt any
various JavaFX UI
Controls? Explain briefly.
What are the servlet?
and read cookies by using
What is cookie? How
can you store
5.
Explain with example.
of Garbage Collection
in java? Explain.
6.
6. What is the use
and eturns
Tunction named is Balanced that accepts an array of integers
the array is balanced otherwise it returns 0.
Advanced Java Programming.. 43
MODEL sET 5
Section A
(2 x10 20)
Attempt any TWO questions.
What is interface? How can you use the concept of interface to achieve
1.
multiple inheritance? Discuss with suitable example,
What are exceptions? Why is it important to handle exceptions? Discuss
2
different keywords that are used to handle exception.
How Swing is different from AWT? Write a program to display a login form
3.
containing user id, password, account type and a "ok" button. Account type
must be admin or user. Use layout managers properly.
Section B
(8 x 5 4 0 )
Attempt any EIGHT questions.
9. What are two key features of Swing? Explain how GUI can be developed by
using JFrame.
10. Write a simple Java program that reads a file named "Test.txt and displays
its contents.
MODEL SET 6
Section A
(2 x 10 20)
Attempt any TWO questions.
1. What are different types of borders used in Swing? Explain all borders with
suitable example.
2. Define servlet. Discuss life cycle of servlet. Differentiate servlet with JSP.
Write a simple JSP file to display 'I0ST' 20 times.
3. Write a Java program to find the sum of two numbers using swing
components. Use text fields for input and output. Your program displays
output if you press any key in keyboard. Use key adapter to handle events.
7th Semester and Practice Sets
Solution of CSIT
A Complete TU
44.
Section B
(8 x5 40)
MODEL SET 7
ar.as
.Section A
Attempt any TWO questions. (2 x 10 20
schema named MRS and create a table named Movie (id, Tille, Genrette
Language, Length). Write a program to design a GUI form to take input to
this table and insert the data into table after
clicking the OK button.
22 What is the significance of stub and skeleton In RMI? Create a
RMI application
such that a client sends an
Integer number to the server and the server reru
the factorial value of that
integer. Give a clear specification for every step.
3.3. Why do we need to handle the on
Write
exception? Distinguish error and excepto
a program to demonstrate your own
exception class.
Advanced Java Progromming... 45
Section B
EIGHT questions. (8x 5 40)
Attempt any
1. How can you create menus by using Swing? Explain different classes used in
anotherfile
10. What are the benefits of using swing components? Explain.
11. Discuss different driver types
on JDBC.
12 What is servlet? Discuss its life cycle.
and write it into
13. Write a program that read data of employees from keyboard
the file emp.doc
MODEL SET 8
Section A
(2 x 10 20)
Attempt any TWO questions.
write multithreaded programs in
1. What is multithreading? How can you
java? Discuss with suitable example.
of using inheritance. Discuss
2. Define inheritance. Discuss the benefits
multiple inheritance with suitable example. events
we need event handling?
Discuss the process of handling
Why do class.
listener interface with adapter
with example. Differentiate event
Section B
(8 x 5 40)
Attempt any EIGHT questions.
RMI?
What is CORBA? How is it different from
use this APl to send email messages?
What is Java Mail API? How can you
file to display "B.Sc. CSIT 7th semester"
What is servlet? Write a simple JSP
ten times.
HBox and BBox layouts of JavaFX.
Compare JavaFX with swing. Explain
Describe about default layout manager.
What is the task of Layout manager?
of CSIT 7h Semester and Practice Sets
46.AComplete TU Solution
block is mandatory in while handling excepti
6 When does the finally
Describe with a suitable scenario.
the procedure to create it.
7. What is the task of manifest file? Write
called on array of all possibilities
8. A non-empty array A of lengthn is
inclusive. Write a met
contains all numbers between 0 and A.length-1
returns 1 if
named is All Possibilities that accepts an integer array and
otherwise it returns 0.
array is an array of all possiblities,
need adapter class ine
9. Define event delegation model. Why do we
handling?
breadth
cube having data member's length,
:
interest.
height. Use member functions of your own
method overloading with suita
11. What
is meant by overloading? Explain
example
five classes used if file handl-
12. Why file handling is important? Explain any
briefly.
13. Write down steps for writing CORBA programs with suitable example.
Prinelples of Management
New Syllabus
Principles o f Management
Course Description:
ontains The Nature of Organizations, Introduction to Management,
Management,
This course
Environmental Context of
Tlation of Management Thought, Motivation,
and
Planning and Decision Making Organizing Function, Leadership, Context of
Plarning Control and Global
Quality Management,
C o m m u n i c a t i o n ,
Course Objective: to
is to give a comprehensive
knowledge
of this course
The basic objective the major functions,
organization and help them understand
shidents about course deals
with basic functions
of management. The to
and techniques orientation
principles,
organizing, leading
and controlling with special business
ike planning, practices which are essential to manage
modern management
other organizations.
successfully and
CourseContents: (3 Hrs.)
Nature of Organizations and types.
Unit 1: The goals concept,
- purposes,
and
Organizational
organization. processes
Concept of
formulation
-
effective organizational
goals. Goal formulation.
Features of Problems of goal
succession and displacement.
Goal
approaches. (3 Hrs.)
of organization.
Changing perspectives Management of functions
Introduction to Process and
Unit 2: of management.
and principles skills and
Definition,
characteristics, Managerial
Types of managers.
Managerial hierarchy.
management.
management. (5 Hrs.)
roles. Emergingchallenges for and
Management
Thought Human relations
Unit 3: Evolution
of theory,
of Classical science
limitation
and Management
Introduction,
contribution
Decision theory,
theories, System
theory, workforce
concepts:
Behavioural science management
Emerging organization.
Contingency theory. learning
theory, and knowledge
management, (5 Hrs.)
outsourcing, internal and
diversity, Context of Management environment
-
Environmental business
Unit 4:
environment. Types of political, and
Concept of
business
of economic,
socio -cultural, business concept
-
and
Basic c o m p o n e n t s of
responsibility
external. environments.
Social ethics- meaning and
Business
Technological responsibility.
Pproaches.
Areas ofsocial environment
in Nepal. (5 Hrs.)
business
Emerging of planning.
giicance. Making and importance
and Decision Process SWOT
Unit 5: Planning hierarchy of planning. concept and
methods.
tools for
scanning -
Oncept, types,
Quantitative
Environmental
of strategic
plans.
decisions.
egiC
planning. implementation
approaches.
Types of
Formulation and and Problem solving
-
definition
alysis. making and uncertainty.
Decision of certainty
aning. conditions
strategies.
under solving
sion making Problem
Unit 6: Oganizing
Function
organizing.
APproaches
anizing
to organizi
an
n
6Hrs.
- classical
TRIBHUVAN UNIVERSITY
Concept
and principles
of
contingency.
Proxess
structuring
of
Delegation of authority ganization.
mean
Institution of Science and Technology
behavioural,
and
meaning ánd
types.
Centrali7ation
and
decentralizatio
- ning
meanin Bachelor of Science in Computer Science && Information Technology
mechanisti
Departmentalization
barmiers.
ic and
features,
advantages,
and
Concept
of organic
structures
a
views
MODEL QUESTIONS-ANSWERS
disadvantages.
and
nd
orgarnizational
advantages
modern
organization.
Types of
Approaches to
(3 Hrs Time: 3 Hours
network Conflict to leadership Course Title: Principles of Management
Unit 7:
Leadership
&
Leadershup styles.
leadership.
Types and chara Pass Marks: 32
Concept and functions
and
situational.
Group
tion.
formation
onflicts
confl in organizatior
acteristics of Full Marks: 80
Semester: VII
trait,
behavioral,
and types.
Managing
Course Code: MGT 411
(3 Hrs.
-
meaning
Group A
-
Conflict
and Maiv.
throughtion-Hygien
groups
U n i t 8: M o t i v a t i o n Need Hierarchy,
thro Attempt any Three Question (3x10-30)
employe
-
motivation
of Motivation
Theories performance.
Concept.
managed teams present business operation
molivate
system
to
and selt-
Discuss The challenging Perspectives of organization in
Reward life, has to
The organization environment is always changing. So the organization
work
-
and
nonverbal
c o m m u n i c a t i o r n .
Growth of business sector in Nepl. Major C. Globalization: Globalization is the free movement of goods, services
and service sector. Existing manao
agement and people across the worid in a seamless and integrated manner. It is
oriented, import-substitution,
export of businesses in Nepal,
business culture. Major problems making the world single market. Globalization has brought the
practices and competition. The manager have to work hard by considering the global
Recommended Books:
AITBS Publishers and Distributors, Delhi prospective. Managers must be innovative and adjustable according to
1 Gritin, Ricky W, Management, the globalized changing
environment
2 Hitt, Michael A., J. Black, Stweart, and Porter, Lyman N., Management d. Learning system: In this competitive environment, customers expet
Pearson, India. new
ideas, new things and creativity in product or service from any
Prentice-Hall of India
Robbins, Stephen P., and Coulter, Mary, Management, organization. To fulfillsuch expectation, manager has to accumulate
New Delhi. knowledge and ideas of all personnel involved in the organization.
And on the basis of requirement it is essential to hire new or up-to-date
knowledge. Inandsummary, Managers need to manage knowledge of
hire knowledge from outside source to fulfill social
subordinated
expectation.
Temporary Employment: The tendency of contract job and daily wage
system has been evolved. The concept of permarnent employment is
being terminated due to priority to work rather than job security
f.
Human resource management (workforce Diversity): Employee
working in the organization belongs to different age, gender and
ethnicity. The overall age of the worker is increasing. Without employee
organization can't work but managing diversified workiorce is tough job
to the management. Employee retention is also challenging.
Sete
Proctiee
Semester
and
ofCSIT
sent:7 The teani members are empower
Principles of Management.. 51
m e m b e r s
Solution
TU feam
50.. A
Complete
Thetheir job having authority to ed an
E m p o w e r m e n t :
the watchdog. It
Th Judiciary (court of law) serve a s
canPlan
activities
legislature.The
Ocau
p e r f o r m i n g
Team
in control k n o w l e y
for
and
And settles and carries out judicial review for jústice.
the
independent
coordinate logic
and
rol8e. the mar
theirown play the e of coordin
agn Political Philosophy: It can be democratic, totalitarian o r
resounes,
to and hourtionge
acvording
infomation
of twentv mix of both. Democracy vests power in the hands of people.
work
ur
only
communicate
Time
flexibility:
The
workers
concept
are
allowed to
been
ce
thei operation ha Totalitarian vests power in the hands of the state. A mix of
Work and to 5 has
evolved
hour
trom
10
both is based on power sharing
been
of
working àce Pressure Groups: They a r e special interest groups. They
are
concept
of mployees in
planning organized to use the political process to advance their
b y f l e x i b l e h o uC
Participative
r su
. lture: Participation
and
suggestions
from
i m p l e m e n t a t i o n .
goals an the direction of laws, policies and practices.
views o n its
Technologi
dceacli s i
taking any
D oe
nv e l o p m e n t :
nological development is
Technological
and grasp
the opportu
oPportunuty
n the
the basis ooff
basis
consists of following:
business
modify products
and
servces on
changing needs Laws: They consists of law enacted by the parliament. They
have to
Nepal
protects the right and interest of consumers, Labour,
the customers. environment in Business and societies.
business
recovery
B u s i n e s s
and time
the can changes over
reexsion
and country. It
within family, community
paserity,
o n g a n i z a t i o n .
level.
influences costs
health Culture consists of
Inflation: Itisrisein price Attitudes: Attitudes a way of thinking
mean
or behaving
profitof organization.
price towards a person, ideà o r activity. Work
object,
motivation,
Stage
of
Economic evelopment:
Deve An
economy can be
and developed
profit motivation, attitudes toward gift-giving meaning
of
culture to
.
vary from
developed,
ievelopot/ developing country.
developing
Nepal is l body gestures
culture.
and towards time
It is making
the whole world as one single
the
Values and beliefs: Values are basic conviction. Beliefs are
to all the social-cultural surroundings that influeno produce. The type of food people eat, beverages they drink, of
clothes they w e a r and materials they u s e for construction
refers
t
Tganization always
anganizational pertormance.
sider
conside the socio-cultural operates in houses. lt vary from religion to religion.
responsibility environme
so it hould
siety social communication. It is
concern
as increas Language: Language is the means of
Nowadays the growing Language also influence
to the business. Socio-cultural dependable o n cast and ethnicity.
the
additional
sists of (Demography,
pressure
Social institutions, social environme business.
iv. Technological Environment: Technology refers to knowledge
factors tools. Organization
Demography: Demography 1S concerned with h. Skills, ideas, procedures, equipment and
.
hum transforms inputs into outputs using technology. Technological
population and its distribution. Demographic forces environment refers to all the technological surroundings that
of the following influence organizational performance.
Size, distribution and growth of population
Level of Technology: level of technology can be labour
Age mix of population based or capital based. in labour based technoiogy human
Migration of population etc. labour is mainly used for the operations whereas machinery
Social Institutions: It consists of family, reference
grou or technology or automation is mainly used for operation.
and social class. The level of technology influences management.
Family: Two or more persons related by blo P'ace of Technology Change: Technology is a dynamic force.
marriage or adoption who reside together constitut Its pace of change is accelerating. In general labour based
family techrology is replaced by capital based technology.
Reference Group: They consists of group that have Managenment should adapt to the changing iechnological1
direct or indirect influence on the attitudes aa forces. It should also upgrade the skills of human resources
behavior of corsumers. to effectively cope with the demands of technological
Social class: t is the rank within a society. It can changes.
classified into upper, middle and lower. Technology Transfer: Technology transfer implies technology
Social Change: Social change implies modification imported from technologically advanced foreign countries. The
relationships and behavior patterns in a society. Life st speed of technology transfer is important. Technology transfer
and social values promote social change. Life style is can be done through globalization, projects, trade, technical
person's pattern of living reflected in his activities, inter assistance, training and publications.
and opinions. It affects product choice. Management shou Research and Development (R & D): R & D is the essence of
consider social change. innovation. Customers expect new products of superior quality
Cultural Factors: It refers which are safe, comfortable and environment friendly. This calls
nfiuence
to the cultural surrounding for increased research and development budget.
organizational performance and output. It is createu
society. It is transferred from generation to Government and industry collaboration in R & D efforts is also an important
generation. It is sia aspect of technological environment. Industries also collaborate with universities.
Sets
ster and Practice
Principles of Management ... 55
Semester
CSIT7
Selutienol
organizaio.
organizational
ture. It is
TU of modem
teams.
of of work
m o d e m
Complee
ypes off creating function, Team Structure: This structure
consists entirely
54A o b. innovations. The
3Descrbe
different
the s
the
plement
p r a s
plans
p lans and decisions structure of getting popular for n e w product
development and
synergy.
The team
of team produces
s t r u x t u r e
di
i m p l e m e n t
It s a
assignine performance
right
arganization
goak therr
limk, individuals. It consists of:
decisions. It creates skills
to make
and
to
sijons anuauthornty make
but complementarý
a r g a n i z a t i o n a l
There is
no
uniformity
o r g a n i z a t i o n a l
st
s But
tr
ruuc
cttu
urre
e..
folle
Ihey a r e a s llows:
s t r u c r u r e
classify four Individual and mutual accountability.
moderm
organizathonal
structu on
superimposes
ne ofmodem Structure:
This structure
basic
o r g a n i z a t i o n
structure is nctional.
Matri 1he
functional
structure.
is superimnp ove unctional strue
T e m p o r a r yp r o j e c t s t r u c t u r e
are assigned
aeparunents
from functiona ma on
Speaialists wdely used
for project Figure: Work Team Concept
projects This
structure1S General] Advantages:
The collective performance is high
Manager Decision making is decentralized
There is no rigid chain of command
Performance evaluation is by members themselves
Manager Manager Manager Promotes creativity and innovation
Manager
ProjectsProduction| Marketing
Manager Finance Personnel
******************* ******* . . . . . . . .
Disadvantages:
www*ena
********
Effectiveness of the t situationally dependent.
Conflicts may arise between teams and departments.
ManagerProduction Marketing Finance Personnel Duplication of efforts of departments and team.
Group Group Group Group Network Structure: Network structure is a series of independent
Project A C.
eaeesreanznas*n**************************************************** ...
ruincuonal a n a project structure. Every
business units linked together by internet and computers in an
The matrix structure combines This is also called
information system that designs, produces and markets products. It is
projet is headed by a project manager. roject composed of a series of project groups or collaborations linked by
structure. Employees continuously work o n projects networks. Most activities are outsourced. The business functions are
management
Features of Matrix structure not located in a single building. The headquarter acts as "broker"
Hybrid structure electronically connected to completely owned divisions, subsidiaries
Functional managers and independent companies.
Project managers Packagers
Problem of unity of command
Specialization Designers Suppliers
Suitability for multi-project organization.
Advantages:
Environmental adaptation
Flexibility in organization Corporate
Facilitates efficiency in utilization of resources headquarter
Motivation and commitment through participation
Free time for
top.management
Employee development
Disadvantages: Manufacturers Distributors
Dual boss and
multiple command structure: Advertising
rower struggle between functional managers and project manage Agencies
Duplication in the efforts Figure: Network Organization Structure
The structure is
costly to implement.
ster o n d
o n
Practice Sets
a7 Semester
Seme
7
Principles of Management ... 57
of SIT
S e l u r i e n
TU
Complete
changing environment
5 6 A
to ch
adapl Disadvantages:
Advantei if
ntages
to
Prorides lheribilit lity toget, they are miles
ark togeunrt firms Process is very lengthy and complex
to
work
apart.
through effectively use the 360 degree
allows
peope
of eftic
in distinctive competencies
outsourcino
in ing Heavy effort to train the employee
to
which
a d v a n t a g e
T a k e
Aliowsconcentrationin organizing
c o m a n yd o e s h e s t . the .Overlapping and duplication
theory of
Maslow's need hierarchy
What is motivation? Explain
Diadvantages conflicts. motivation.
c a u s e
Ans: Motivation:
actors
with networked
firms can create
Intormabion sharingwith
Too
many
of techno. competitors Motivation is inducement for better performance toward goal
threats
due to
use of massive use
gy Achievement.
Saunity
S t r u c t u r e :
It is the act of stimulating, inspiring or energizing employee for higher
whichhich elaborates the effoe
d
60
Degree
new
way of
thinking Iveness of
performance.
Human resource is the only one resource of the organization
which
t is
to activate the
sIr manager takes the activates all the resources of the organization. In order
t e a m s t r u c t u r e
eac
Under
this
hlosopdecision
philosophy,
ma and feedba
decision making accountability human resource organization motivate the employees
which ultimateiy
and central
responsibility
shares
as, views
the ideas, feedback each membe
to activates all resources of organization.
Each
member
u n d e r the
structure
so that
s o that
increased.
the cooperation,
ordination and mutual "Motivation means a process of
desired goals"- William C. Scott.
stimulating people to action to achieve
can be
understandimg
standing ca ing from different persons combined
The different i
60 degree
assessment. provide # Features of motivation:
more
accurate
Psychological Process
:mostly focused on the contribution of emni
360degree
organizing8
balanced way to aploye
tencies. It is balanced
Complex and Unpredictable
The
skils along with the competencies. view the Continuous Process
and their
pertormance
of employee
in the area of teamwork, leadershin Situational
actual
mteraction, mterpersonal communic nication, mutual and
accountabulity
and sincerity of work habi ne Pervasive
contribution, muial the Goal Oriented
enmplovees.
Positive or negative
Productionn Intrinsic or Extrinsic
Manager
Theory of Human Needs (Abraham Maslow): This theory also called theory
of human needs. This theory advocated that human behaviour is motivated
BOD HR Manager by needs. The need of human being forms a hierarchy. People satisfy most
pressing needs first. Human needs are:
The basic premises of Maslow's Theory are:
X(CEO a) Man is a wanting Being: Man continrously wants more and more. Nó
need is ever fully satisfied. When one need is satisfied. Another
R&D Marketing
Manager Manager emerges. Needs activate individuals to work. They influence
behaviour. They motivate for greater efforts.
b) Satisfied needs do not motivate: This is a deficit
principle of
Finance Manager motivation. A satisfied need does not motivate.
c) Needs Have a hierarchy: Human needs are
arranged in a hierarchy.
Advantages Needs are satisfied in an order. This is the
Comprehensive View progressive principle of
motivation. People have set of five needs.
Ihe diferent ideas They are physiological
needs,
coming from different persons combined provie safety needs, social needs, Esteem needs and self-actualization needs.
more accurate 360 degree assessment. Physiological and safety needs are lower order needs. They are most
Feedback helps self
IncTease responsibilities and alertness of
development pressing. Social, esteem and self-actualization needs are higher order
employees needs. They are least pressing.
Farticipation of employees increases their motivation.
Practice Sets Management .. 59
and Principles of
and
ester
S e m e s e r
CT
7"
Sohution
of
TU
Maslow's Theory:
Strengths of
Complete
A motivation.
5 6 .
They
It is usefulguide for understanding understand.
and easy to
It is simple, practical
Self Weakness of Maslow's Theory: arrangement
of needs.
the hierarchical
Actualizatiorn
are
hodily
requirements.
wages satisfy different level. But,it is not to hire and manage homogenous
easy
set of
They
physiologicalneeds. Globalization and growing legal
concern for equal
human resources.
Needs They
consists of needs for protection1from physi opportunities at job position, the complexities
of work force variation i.e.
Provident
Prov fund, pension plan, health there are different
Diversity is increasing rapidly. In modern organizations,
harm.
emotional
workplace satisfy safety needs. in terms of age, gender, caste and race,
and
safetyin types of human resources (workforce) etc. They hold
insurance,
consist of needs for ffection, Belongin economic status, social status, geographical variation,
Needs: They In organizations infor challenge in order to
Social
social acceptance. different individual goals. Management is facing more
and
friendship
nends at work, employee clubs, refreshment fulfill the needs of human resources, to fulfill the basic legal formalities as
groups,
needs. well as to bear social responsibility. Getting synergy from diversity of human
programmes satisfy social resources is great challenge to the current management.
Needs): They can be internal self esteem
dEsteem Needs (Ego needs. Internal esteem
Benefits of workforce diversity:
needs. They can be extemal public-esteem Variety of perspectives:
advancement. Extemal
needs can be for self-respect, autonomy, Increased creativity
esteem needs an be for status, recognition, praise, prestige
Increased productivity
needs. Praise and greetings
Position titles, luxury cars satisfy such
Improved performance
from the subordinates is also desirable. Brand reputation
Self-Actualization Needs: They consist of needs for achievement
Better decision Making
utilization and sell
growth sel-development. creativity, Talent
fulillments. It is what
becoming one capable
is of becoming. Thee Higher employee engagement and reduced turnover
needs can neve be fully satisfied. Challenging jobs, Advices from
Improved hiring results.
Limitations of workforce diversity
employees and parbicipative decision making satisfy this need. Poor focus on leadership qualities
Implications of Maslow's Theory for Managers:
Chance of conflict
Motivation is need-based. Satisfaction of needs motivates people. A
Decrease in mutual trust
employes have needs.
Misted ned do not motivate. Only unsatisfied needs make peo
Creating communication problems
Increase in complaint
wILingto work The degree of need satisfaction is not rigid. t
from person to
person. 6.
Difficult to apply
Define business ethics.
)
augers should endeavor eds d Explain their significance.
to satisfy the unsatisfied net Ans: Ethics in
general means the acceptable principles,
employes for motivation morals. In' broad term, ethics is the situation of
beliefs, conscience, and
d) Higher order needs providepurposes. integrity on actions and
higher motivation.
and Practice Sets
Practice
Semesher
Principlesof Management ...
61
CS1 2"
TU
Selutlon of and
actions
a n d
set policie t
deals and measures,
Complete
Bthics in day lo day life
Ips to Ca with
classify, adulteration, cheating in weights
price hiking,
principles
0 . A
E unnatural false
products, promoting
and vahues.
and and harmful
8? tt
a c t i o n s
is right quality
sial
low business
others. Reells us to
bolets, and what
b efits of selling of natural resources, etc. of various
things for
of
is a d , efits abusive use
principles
simple but
but broad vi wrong ar
helps make
decisions with
confidence
greater
as
very
simple terms of quality, utility,
business ethics treat fair in
ctivities,
organizations with
g+ves
s i t u a t i o n s ,
definition
of the business org Business ethics helps
to
This
Tns
ions and actions b e t w e e n ions .By etc. of the products.
addessd
addressed 4:fferentiate between the correct and
d i f t e r e n t i a t e
reliability, quantity, price,
increase the confidence
we
can
false is the foundation for
ethics,
Survival and growth of business: Business ethics
o r g a n i z a t i o n s .
business business
the busin.
ethics those organizations
ofthe the
"the as
business survival and growth. Consumers trust
husiness
activities
Raymond
C
B a u m h a r t
defines
in
which the
the
Here,
business ethics one
step ahead, is arm retention c a n be maintained. But,
consumers
r e s p o n s i b i l i t y
ness ethics
r s
working
conditions, grOwth
opport treatment to principles to the
business society.
good business, organizations should avoid ans
This helps develop good and friendly relations between
their employees.
As ethical
channel members as well a s
the on PE of Being ethical in business, community takes the
business organization assa
the consumers,
maintain good profit and
exploitations to
fair business competition in the market. Thev must good organization. Thus, business ethics helps to business
Ther must encourage
societv. contribute
sustainable growth. Along with growing economy, ethical
the governmeit,
practice helps improve the standard of living of the society.
to
deposit taxes regularly
Features: Good organization image: Business ethics creates a good image of the
be
Code ofconducts organization. If the business follows all ethical rules, then they will
the The society always supports such
Framework for business activities fully accepted by society.
business and businessmen who follow the necessary business ethics
Moral and social values based
Focus on protection of stakeholders and avoids dishonest activities. If the business succeeds in creating
its goodwill in the society, it flourishes well even in the
and
maintaining
.Voluntary most competitive markets.
Comprehensive Protects employees and shareholders: Business ethics is required to
Comparatively new concept protect the interest of employees, shareholders, competitors, dealers,
Significance of Business Ethics suppliers, customers, government, etc. It protects them from exploiting
Business environment is being more challenging because of growing each other through unfair trade practices like cheatings or frauds.
compétition because of globalization. No matter the size and nature o Ethics compels each entity participating in the business activity to
business, none of the organizations can sustain their business with properly execute its role by adhering the established.code of conduct.
Benerosty of time, market situation, and its customers without ethica Since everyone is disciplined and functions appropriately, business
standards. Not only the customers, but grows well in the long run.
employees also pay high value to u Other points for
oganuationswith high business ethics in practice. So, business ethics is significance:
Supporting pillar for stability, and prosperity of business. More specna Healthy competition
business ethics has the Smooth functioning of business
following significance. Promotes consumer satisfaction
revents malpractices: Business ethics prevents business malpraactices Maintains the support from employee.
treating in unfair trade practices such as black-market
Semester and PracticesSots
luion of CST 7* Principles of Management... 63
planning.
of
6 2 .A Comple
importance
the Types o f Decisions:
Highlight
of
Planning
predeterminat
of future course of action On the basis of frequency of recurrence:
1. routine and
Concept
decisions are.
g o a l s and choosing the
#
Programed Decisions: Programed
Ans:
s of
Plannimgprocess
Planning
is the
of setting
setting goals
to actions achia
a.
tis
in is to do it) situations. In practice, more
deciding it a n d
who
deal with such
tis
whern
to do course of action from the alternatives. of this ype. Middle and lower level managers worker
Example: payroll procedures, recruiting regular
cours
to do,
future
selects for allocating resources. It also decisions.
Planning
guidance
for a l l o c minimiz the in the factory.
It
erves
as
i Programmed decisions are
Non-
theeffective control mechar b. Non-Programmed decisions:
anduncertain
ism frequently. They deal with
standard
for achieving commitment of management for long term purpose are called strategic
anagers a
ensures
Plannin8 decisions.
Commitment: the organization is focused Long term goals, objectives, strategic plans are strategic
b)
employee.
Al people inthe towards b.
Tactical Decision: Tactical decisions are the decisions made by
achievement through planning. Such
the yard department level managers for their respective departments.
Planning
serves as the vardstick for the effective
contrl decision translate decision into departmental actions.
strategic
Con
which is compared
with the actual performano Operational Decision: Decisions taken to solve the problems regarding
C.
providesstandard Effective control corrects the deviations.
deviations. day to day operation are called operationa decision Authority is
find out the
Environmental factors: Organization operates in t delegated to lower level management to make such decisions.
Adaptation of factors are always ch
dynamic environment. Environmental
3. On the basis of Participants involved in decision making process:
to anticipate the future to adapt the in t changes d. Individual Decisions: The decision which is made by a single
Planning helps person is called individual decision. They are generally prevalent
environmental factors.
to focus on goals. It defines gu in small organizations.
e) Goal Focus: Planning helps managers e. Group Decisions: The decision which is made by a grouP of
courses of action to achieve them.
and determines persons is called Group decision. Under this method, group
facilitates efficient use of resourcs
Eficiency Promotion: Planning members participate in discussion and share their opinion, ideas
is a rational approach for goal achievement. It reduces cost and views to reach in decision.
eliminating waste and
avoiding duplication in efforts. 4. Other decisions:
environmental scanning
Uncertainty Reduction: Forecasting and Organizational and personal decisions
future uncertainties. Forecasting and environme Policy and operational decisions
anticipate
scanning helps to anticipate future uncertainty. Financial and non-financial decisions
Short term and long term decisions
Tool to remember CAGE to Reduce uncertainty 9. What is centralization? Explain its disadvantages.
8. State the types of decisions. Ans: Centralization:
Ans: Decision Making Centralization is the process of systematically retaining power and
decisio
Choosing the best alternative among the alternatives is call authority in the hands of higher level managers.
decision making). In centralization, all the decisions are made by the higher level managers.
Manager always performs through the decision making. Top Managers make allthe decisions. Subordinates simply carry them out.
It is a means to achieve ends. Disadvantages of Centralization:
a) Delay in decision: There is possibility of delay in decision making
5apath selected for moving the organization from existing
desired state. because the files need to move through bottom to top level for making
Au the
orgarizational problems are solved from the decision making P
a
Prgchi
P r a c t i c e Sets
an d
nd
S e m e s e r eser
Sehutien a
CS m a k e all all the decisic Principtos of Management .. 6 5
TU CANnot
C o m p h e
ability
one
xTM
lasing busnss
Gavacity opportunities
ot subontinates
b u s i n e s s
can
o p r
andickly
Profit
utilized dy. Thi
iaision
i n T E N S S
Only
the
chan.r
o losing
all in
naking p o E s
diterent furtional
areas.
ay ot be
ingle person ma
Singl.
he followers as they like.
he decisions at quick run effer
effective Leaders give reward and punishment
d A 7 s o n
nen for n
iecisionsmaking al d
qualithus,in
or
d e T
nmaker may
s i o
may decrease the
n
maker
rease
Strong control by the leader
canaity
arerational plans
operational
plans and implementation Advantages of Autocratic Style:
which higher
imitad
strategies situations. Achieves
t
Effective in crisis and emergency
organization
of t h e
mance t of
n has to make all the decision
t o m u i a t i o n
sut lon
resut low
As only One productivity
rk under overload. Work ove thus Chain of command is clear.
the
manager
should
always
decisian
making.
Thi also decreases the
This verload
quality Discipline is maintaincd in the organization
elay in
mayinder
hinder on
on
growth
8Towth a
and
nd
diversification of
Very useful style for small organization
deisions This of Disadvantages of Autocratic Style:
Orgarnizabon motivation:
e level
Middle level managers, supervis
m
decrease
Iney nave
n morale and motivation of the authority.
employes
It does not consider situational needs
It is not useful style for big organization.
These
causes
skilled and experienced employees
Tunover rate af qualified,
get Democratic: Power and Decision making is decentralized. Discussion,
mreased
make decisin. consultation and participation is encouraged. Its features are:
power
misuse: 1op level managers On the Leaders consult with subordinates about decisions. Subordinates
Chance for is centralized
el the authority
hasis ofthinks
maker s/hejudgnent
pesonal as authority of the organiza:ECISion
is the sole nis willingly cooperate with the leader. They are, encouraged
io
octice Set
67
of Management..
Semestr
oSI Principles
U S o b i e n
Rein
Style
consulted. It is group
d
autonomy to work.
C o m h
and
ork. Thes
subordinatives
A afPr* f r e d o m
Three: Consultative;
Adrantes
have
They set
System
Followers has power
and control.
It is leader
and
the
S u h o r d i n a t e s
f Frefarusstowardg
toward goals achievement. (Contingency) Style:
Situational situations.
D i s a d v a n t g g e s
lack
4. which is best for all
There is no one style
Subordinates
Fraduthvity
Sufers
situational.
be
avoidetd
It states that leadership
style is power
of leader
may
leader-led relations and position
Structure of task,
Respansiiliy
un-necessary
c o m m u n i c a t i o n
hierarchy serve as
barriers murchuricate performance is compared. Standards
quantity, costs, income and e .
can be in terms of quality,
ets
S n
is a strategic commitmen
ement by
omanagement
Ce
ake
quality guiding
T o nu a i R ym a n g e m e
business
to
a
is
whole
apnoach
Principles of Menagement. 71
R.W.factGriorffinin
henge
tveytheneitdoes V. Statistical Quality Control: It includes a set of specific statistical tools
OM that can be used to monitor quality. This method extremely uses thee
ef
Toos
first
Hn Employees ensure quality
time
Employees
whi.
probability and other statistical techniques to control
D i e r e n t
Ri
for the
first result is time. The
the sampling
zero the quality. It is also one of the major tools used for quality
defect wot
i
chance to make
They enthave second
do
assurance. Benefits of Statistical Quality Control
conet Renchmarking is the proce
Benchnrking
from
bcess of
Benchmark
continuous
Globalization refers to the integration of economies and societies all
world. Globalization involves
over the
(ommuniadn transpon
intenational
action of market land with hundred percent
capital
the
f word alternative in foreign country for
less an organizationa foreign
7 A
bo organizations in
It is
which promotgo des,s Multinational in
gnowang
investment
the the company.
wa ten and services do direct foreign
ö
the world. For
tazhnologV.
gohalitation
ndaries through
erit
sei
tre
entr
and
m e a n s
strategy
nefworks. boundaries
It is the mea
order to reduce
and complete
control over operations
and profit of new
established
It is the
nand markeing
the
company.
is limited with holding
eiohalizabon
foreign competitors
ee lird (subsidiary) company in China
phodu wel as the
Podusel
evel
a m p e t e
i nd o n e s
ations are being intluenced b quality o
commonly used method of globalization
since last 30 years
western countries and
their multinationals.
ting popularity throughout the world and Asian countries by the
a n dp e r o r m a n e M a d e m
eobal with
,
of sharing ownership
Venture: Joint venture is the process in
e t e t a nd
dh h u l Joint method of globalization
Methods
a f
Globalization
traditior.al and
d e s c n h e d
are It is knowledge,
Egporting
countries.
eficitcommon
globalua orting
n and and bp this method, the necessary capital investment from developed
g l o b a l i z a t i o n
i familiar
globalization
political
ideologies
which affects
give first prority
the business negatively.
Employees
There
es are bei nding
are lots of labour Bachelor of Sclence
in Computer Science & Information Technology
parties
ommitted for the organizational
benefits.
in Nepal.
less TUQUESTiONS-ANSwERS 2078
happening
strikes and pen down are
problems Raw materi for the Time: 3 Hours
Raw
meterial
related
whoneeds.
business is the Pass Marks: 32
related
depends
on either foreign supplier n Full Marks: 80
Nepal, such
business
not be
the same ime,
the right time. These factors
available at the reasons,r Attempt any
Three Question
(3x10-30)
formulated?
serious for up
gradation of
the business
Politcal ideolo8y sets the
ecan.
Define organizational goals. How are organizational goals
Politics related problems: These
mic,
policies need to
fiscal Ans: Organizational Goals:
future. Achievemernt of
f. want to achieve in
industrial policy of the country.For this, political stabilit clear, Goals are what organizations
and
stable and favorable
for the business. bility is must, a goal is the destination.
most latile
volat since
politics is being ong. In such . Goals guide the action of the organization.
But in c a s e of Nepal formulat long term strategies existence the organization.
of
gives the meaning, purpose and
cannot
business,organization Goal
situation, success.
1.
Envlronmental
Scanning
H Formation of
Overall Goals
of globalization is it empowers
multinational
For exanmple, he
citizens ot these
tion
counties
(MCC) in Nepal
has been on the Millennium
ve
challen
e of controversi Group-B (10x5-50)
was proposed.
sine the dav it TEN Question
As a esult
Nepal has faced the
of globalization. jor problem Attempt
any
management? Explain the functions of Management.
drain as skilled manpower like doctors, engineers are mov bra 5. what is contribution made by FW.
Explain the major
theirhome country to abmad for better opportunities, which scientific management.
Define
lack of skilled manpower
for the country. fron Taylor.
in a with suitable examples.
resuts in the rapid circulation of diseasee the formal and informal groups
Glahahzation also Describe
For example, affected Nepal from one plaq
the coronavirus has /.
What is planning? Discuss the step involved in planning process.
to another.
ie yber attacks,
conmunal riots,
acial around the
discrimination Explain
globe and goals?
environmental degradation, climate change, so on.
is motivation important to achieve organizational
10. Why features of delegation of
Conclusion:
Define delegation
of Authority. Explain major
be two sides to every story. In regards to ola.
11.
There will aways Authority.
people who are concept argue that globalization ha
in favor of this
ore
lization, What is business
environment.Explain the types of
business environment.
henefits than drawbacks, whereas, people, who opPPose this conce 12.
globalization? Explain the methods of globalization.
that. it has resulted in huge exploitation of workers, enviro argue What is
13.
degradation. and the huge gap between rich and poor coena Explain growth of business sectors in Nepal.
the
14. teams.
Globalization is trending and no country can resist it. So Nepal also e of work life and self managed
15. Explain about the Quality
focus to benefit more form the globalization through the
rease An
cooperation. production, skills, technology, information etc. MODEL SET 2
12 11hat
linutations
is management
of management
science
scicce
theory?
theory. contribution and MODEL SET 4
examine the changi
13. Give the concept of globalization
and
lobal business
Senario.
Group B
Group-A (10x5-50)
Attempt any Three Question Attempt any TEN Question
(3x10-30) 5.
What is leadership? Explain the different style of leadership.
Explain about the changing perspective of organization. contribution and linitations of
What is behavioural 6. What is bureaucracy Theory? Explain the
studies or theories.
perspective of management. Explain with different Bureaucracy Theory
distinctions between authority
3. . What is authority and responsibility. Give the
Control is amanagement function that focuses on the process of
monitoring and responsibility
activities toensure that
they are being accomplished as planned.
manager of
As a . What is need hierarchy theory? Explain in details.
an
organization, what types of control
system would you
recommernd to achieve
planned result? 9. What is control? Explain the importance of control.
What is motivation? What are the importance of
4. What is motivation?
globalization? Explain about the effect of globalization in details.
10
11. Justify the importance of communication in organization.
7.
advantages and limitations of vertical communication.
What is
organizatiornal
organizational change. change? Explain the various characteristics Or
Explain the
concept of
development. organizational intervention in
organizatio
of CSIT 7 Semester and Practice Sets Network Seeurity
100. A Complete TU Solution
concepts,
basics of security in cloud
and loT.
Network Security
Fundamentals
(3 Hrs.)
4 Explain about the contingency Unit 1: Computer
Group B 1.1. Introduction
Network
the Computer
1.2. Securing
Attempt any TEN Question (10x5 1.3. Forms
of Protection
as a 'nerve Centre. Why thie
Explain the concept of manager role 14. Security Standards
(4 Hrs.)
important to organizational performance? Authentication
Define motivation. State, explain and compare Maslow's need hiera Unit 2: User
. rarch User-Authentication Principles
of motivation and Herzberg's two factor theory. 21. Remote
theory Using Symmetric Encryption
User-Authentication
Explain the concept of quality. What are the emerging issues 22. Remote Encryption
User-Authentication Using Asymmetric
2.3. Remote
managemenf?
2:4. Federated ldentity Management (6 Hrs.)
8. What is meant by goal succession? Explain different reasons for g
Unit 3: Transport
Level Security
succession.
3.1. Web Security
9. Why is management important in modern organization? Justify your
answers 3.2. Transport Layer Security (TLS)
3.3. HTTPS
10. What is business ethics? Explain the significance of business ethics fo
sucesful operation of business 3.4. Secure Shell (SSH)
(6 Hrs.)
11 Explain the socio-cultural environmental factor for business. Unit 4: Wireless Network Security
12 What is strategic planning? How the strategic planning is implemented in 4.1. Wireless Security
the organization? 4.2. Mobile Device Security
Overview
13. Explain the meaning of 4.3. IEEE 802.11 Wireless LAN
crisis. How the crisis can be handled?
14 How the communication can be 4.4. JEEE 802.11i Wireless LAN Security
enhanced inside the organization? (8 Hrs.)
15. What is deming Unit 5: Electronic Mail Security
management? Explain the principles and techniques of
deming management 5.1. Internet Mail Architecture
5.2. E-mail Formats
Email Threats and Comprehensive
Email Security
5.3
54. S/MIME
000 5.5. Pretty Good Privacy (PGP)
5.6. DNSSEC
Entities
5.7. DNS-Based Authentication of Named
and Practice Sets Network Security.. 103
102A Complete TU Solution of CSIT 7 Semester
Framework TRIBHUVAN UNIVERSITY
5.8 Sender Policy
Keys ldentified Mail Institution of Science and Technology
Domain
50
5.10 Domain-Based Message Authentication, Reporting, and Conforman.
ance
Unit 6:IP Security (6 Hrs.) MODEL QUESTIONS
6.1. IPSeurity Overview
being carried by
or
vload
tollows these steps:
praedure
is added to
the payload.
An ESP trailer Compress
Next header: The 8-bit next-header field is similar to that defined specified, so the default compression algorithm is null. The next step in
in t code o v e r the
is to compute a message authentication
AH protocol. It serves the same purpose as the protocol field in tho processing the compressed
data. TLS makes u s e of HMAC algorithm. Next,
header before encapsulation. compressed encryption.
plus the MAC s encrypted using symmetric
Authentication data: Finally, the authentication data field is the result o message
length by m o r e than 1024 bytes,
so
the content
applying an authentication scheme to parts of the datagram. Note the Encryption may not increase 214+ 2048. The following encryption
exceed
difference between the authentication data in AH and ESP. In AH, thetotal length may not
par algorithms are permitted:
of the IP header is included in the calculation of the
authentication data Stream Cipher
in ESP, it is not. Block Cipher
2 Differentiate TLS session from TLS connection. How TLS Record Algorithm Key Size Algorithm Key Size
Protocol AES 128,256 RC4-128 128
guarantees confidentiality and message integrity? Discuss its operations. [3+7
Ans: A TLS session is an assoiation between a client and a server.
Sessions are 3DES 168
is to prepare a header
created by the Handshake Protocol. Sessions define a set of The final step of TLS Record Protocol processing
cryptographic consisting of the following fields:
security parameters, which can be shared among multiple connections used to process the
Sessions are used to avoid the Content Type (8 bits): The higher-layer protocol
expensive negotiation of new security enclosed fragment.
parameters for each connection. Whereas TLS connection is a version of TLS in For TLSv2,
transport that Major Version (8 bits): Indicates major use.
provides a suitable type of service. For TLS, such connections are peer-to- the value is 3.
peer relationships. The connections are transient. Indicates minor version in For TLSv2, the
associated with one session. Every connection Minor Version (8 bits):
use.
he data into
manageable blocks, optionally wired LANs in close proximity may create overlapping transmission ranges.
MAC,
encrypts, adds a header, and compresses the data, apple LAN may unintentionally
lock on to a
transmits the resulting unit in a A user intending to connect to o n e
segment Received data are wireless access point from a neighboring network.
reassembled before decrypted, verified, and
decompressed,
being delivered to
higher-level users.
ond Practice Sets
06A Complete TU Solution of CST 7 Semester Notwork Socurity... 107
In this situation, a wireless devica AS End Station
Malicious association: is STA
appear to
be a legitimate access point, enabling the
Eaceral
on
this strategy involves the
part in the network
shares a ecret key,
known as a master L (KDC).
with
accept traffic
from this
to the
local port 9999 and sends them
eys, andttim
known as session
oconnection betweem
two parties, takes any bits sent to
The client
over a
keys to protec decrypts the
distributing thase keys using
approach is quite o o m m o n .
The
the master
Kerberos system in an distribution.
exXa
example of it. This server inside
incoming
the encrypted SSH session. The SSH
bits and sends the plaintext to port
110.
server
figure below.
The received on port 110
of Kerberos is shown in direction, the SSH s e r v e r takes any bits
In the other
overview
2. As verifies users access nght in inside the SSH session back to the client, who decrypts
database, creates acket-granting ticket and sends them
and session key. Kesults are encrypted to the process connected to port 9999.
and sends them
using key derved rom user s passowrd. client acts o n the server's behalf. The
onece p *********** * remote forwarding, the user's SSH
user logon With the traffic
session Kerberos receives traffic with a given destination port number, places
client chooses. For
and sends it to the destination the u s e r
T e q u e s t t i c k e t
STanting ticket
port
on the correct wish home computer.
1 . User logs on to to a c c e s s a s e r v e r at work from your
ticketsession key
example, you
workstadon and
regests sevie
Authentication
server Because the
work server is behind a firewall, it will not accept an SSH request
SSH
T e q u e s t s e r v i c e
aprutohviendtesicatsoerrver
andress and m e to TGS
traffic on port 2222.
for remote logon to the
Oace p 6. Host verifes that You now have a n SSH tunnel that can be used
5. Workstation sends service sessio icket and authenucator
taclet and authenticator work server.
Host/ match, then grants access
security, client/server traffic security, and barrier security
ost to service. If m u t u a l sets
application How device
server authenticauon mobile device security strategy?
1s
required, server
an authenticatobr.
returms
of a mobile device security strategy fall into three
Ans: The principal elements
What is port forwarding? How SSH
b.
provides local forwarding and remote
categories: device security, client/server traffic security,
and barrier security.
forwarding? [1+4 Device Security
Ans: One of the most useful features of SSH is port
forwarding. Port forwarding A number of will supply mobile devices for employee u s e and
organizations
provides the ability to convert any insecure TCP connection into a secure those devices to conform to the enterprise security policy.
SSH connection This is also referred to as SSH preconfigure
to
identifier of a user of TCP. So, any tunneling. Here, port is an However, many organizations will find it convenient o r even necessary
number.
application that runs on top of TCP has a adopt a bring-your-own-device(BYOD) policy that allows the personal
port Incoming TCP traffic is delivered to the apropriate mobile devices of employees to have access to corporate resources. 1T
application on the basis of the port number. An each device before allowing network
muliple port numbers. application may employ managers should be able to inspect
Local access. IT will want to establish configuration guidelines for operating
forwarding allows the
client to set up a
"hijacker" example, "rooted" "jail-broken" devices
intercept selected application-level
This
will
traffic and redirect it from an unsecured
process. systems and applications. For or are
TCP connection to a not permitted on the network, and mobile devices cannot store corporate
secure SSH tunnel. SSH
is configured to listen device is
selected
ports.
SSH grabs all traffic on contacts on local storage. Whether a
owned by the organization or
tunnel. On the other end, theusing selected port and sends it BYOD, the organization should configure the device with security controls
a
an SSH
SSH server sends the throug like: Enable auto-lock, enable password or PIN protection, enable remote wipe,
the destination
port dictated by the client incoming tratic
you have e-mail client on
an application. For example, suPP ensure that SSL protection is enabled, install antivirus software as it becomes
your desktop and use it to available and so on.
mail
server via the
Post Office Protocol get e-mail from y
PO3 is port (POP). The assigned port number
110. We can secure this traffic Traffic Security
in the
following way: Traffic security is based on the usual mechanisms for encryption and
authentication. All traffic should be encrypted and travel by secure means,
TU Solution ol CST 7* Semester
and Practice Sets Network Security...111
A me
1 a \TN A strong to limnit new signature A security bel may be included in the authenticated
device to the
resoures of the organization Security l a b e l s :
as o m the
devicespecific authenticator, because it s
Often, a a SignedData
object. A security label is a set of security
i e has a single
the devie has onlv one user. A preferable strategy is to have assumedmobu attributes of
rmation regarding the sensitivity of the content that is protected by
h
a two-laye The labels may be used for access control, by
authentiatban mathanism which involves
user of the device.
authenticating tlhe device c/MIME encapsulation.
users are permitted access to an object.
then authenbcating the indicating which VWhen a message to multiple recipients, a
u s e r sends a
Cure
Secur mailing lists: is required, including the u s e of
Ramie urity of per-recipient processing
The arganizatian should have security mechanisms to protect certain amount relieved of this work by
the each recipient's publi key. The u s e r can be
unauthorized a c e s Ihe security strategy can also incls ewo An MLA can
om the services of a n S/MIME Mail List Agent (MLA).
olikies speific to mobile device traffic. Firewall policies can limit firewa employing the recipient-specific encryption
perform
data and application all mobile the take a single incoming message,
acoess for devices.
Similarly,
detection and intrusian prevention systems can be configured to ha..sio
int for each recipient,
and forward the message.
is bind a sender's
used to securely
service
have Signing certificates:
This
ruies for mobile derice traffic. tighte certificate to their signature through
a signing certificate attribute.
What is DNS Security Extensions (DNSSEC)? How DNsSEC is dec: of intrusion detection. [1+4]
DNS cients from accepting forged altered DNesigne What is intrusion? Discuss differcnt approachesto
compromise the integrity,
to or
protec
records? esource Intrusion is any set of actions
that attempts
Ans:
of
Ans: DNS Security Extensions (DNSSEC) are used by several protocols [1+4 confidentiality o r availability
a resource.
th Following approaches
are used for intrusion detection:
provide email security. It provides end-to-end protection through the use approach This of intrusion detection is
digital signatures that are created by responding zone administrators an Signature-Based Approach: or a known identity, of
"
DNSSEC is designed to protect DNS clients from detect the attacks whose pattern
accepting forged or altere Signature-based approach carn easily it is
DNS resource records. It does this
by using digital signatures to provide: (signature) already exists in system
but quite difficult to detect the
known.
Data origin authentication: Ensures that
data has originated new malware attacks as their pattern (signature) is not
is real-time
peer-to-peer
own
of their
don' t tunnel.
encapsulation
IPsec needs
to hence the end-hosts redirecting Web traffic to the CP.
or outbound email,
hence
need ID control o v e r inbound and
E-mail security provides
end-hosts
implemented
on each
encrypted; IP headerhashed
No edits on or encompasses intrusion
detection, prevention,
is Intrusion management
packet during transit. applied the and response.
information and event management (SIEM) aggregates -
log
Security and
Used in securing communicationUsed to tunnel traffic from one . and real networks, applications,
and event data from virtual
device to another.
another
from one systems. data at rest
service that c a n be provided for
Encryption is a pervasive
-
authenticates the IP payload and entire inner IP packet and the distribute, monitor, and protect the underlying
resource services.
the
DLP security of data at in rest,
can be motion, and
implenented by the cloud client. u
Network Security... 115
CSIT 7h Semester and Practice
Sets
Solution of
114A Complete TU
IP connections, the network
TRIBHUVAN UNIVERSITY
I from
yer that in the usual network
OSI Laye
creates
and Technologv connectionless. However, with security associations, IPSec
Institution of
Science e P is
aylconnection-oriented channels at the network layer. This logical
TU QUESTiONS-ANSWERS 2078 oriented channel is created by a security agreement
established
nection- the sending
two hosts stating specific algorithms to be used by
Question) Course Title: Network Secu etween the integrity,
SET 1 (CDSIT Model confidentiality (with ESP), authentication, message
Course No: CSC 416
Seventh Semester
curity24
Pass Marks: arty to ensure
and anti-replay protection.
to be used and
address, and any IPvó header extensions. The A
also defines the
hosts are in the clear because they are needed in routing the datag PSec to be provided with integrity
and secrecy. The protocol
through the network.
tagram key size, key lifetime,
and the cryptographic algorithms.
during the
Figure: IPSec's Transport Mode
and which pårts of the header
and u s e r traffic a r e protected
Tunnel mode offers protection to the entire IP datagram both in AH and ESp communication process.
how the handshake protocol
between two PSec gateways. This is possible because of the added new
header in both IPv4 and IPvó as shown in figure below. Between the
Ip 2. What is the use of TLS protocol? Describe
TLS? 3+7]
two and change cipher spec works in
gateways, the datagram is secure and the original P address is also secure.
Ans: Transport Layer Security (TLS),
widely adopted security protocol
is a
However, beyond the the datagram may not be secure.
gateways, for communications o v e r
the
Such to facilitate privacy and data security
protection is created when the first IP'Sec gateway designed
encapsulates the datagram case of TLS is encrypting the communication
Internet. A primary u s e
including its IP address into a new shield
datagram with a new IP address of between web and servers, such as web
applications
browsers loading a
the receiving IPSec such as
gateway. At the receiving gateway, the new datagram is website. TLS can also be used to encrypt other
communications
unwrapped and brought back to the original datagram. This and voice o v e r IP (VolP).
based on its original IP address, can be datagram, email, messaging,
but
passed on further by the receiving three main components to what
the TLS protocol accomplishes
are
as follows:
IP IPSec IP third
TCP/UDP Protected ESP hides the data being transferred from parties.
Header Header Encryption: information are
Header Data Trailer Authentication: ensures that the parties exchanging
Figure: IPSec's Transport Mode who they claim to be.
In order to perform the verifies that the data has not been forged or tampered with.
security services that IPSec provides; IPSec must first Integrity:
get as much information as
possible on the security arrangement of the two Handshake Protocol
communicating hosts, Such security arrangements are called Handshake Protocol allows the
and client to authenticate each other
server
associations (SAs). A secury
security association is a unidirectional and to negotiate an encryption algorithm and cryptographic keys
and MAC
arrangement defining a set of items and securiy to be used to protect data. The
Handshake Protocol is used before any
between the two procedures that must be
shareu Protocol consists of a series
communicating
communication process. entities in order to protect e applicationdata is transmitted. The Handshake
of messages exchanged by client and server
of CSIT Th Semester and Practice Set Notwork Security...117
116 A Complete TU Solution
Server
Client messages have "nonce"
to prevent replay attack.
Both this
client helo Phase 1
Server
Phase 2, Ser Authentication and Key Exchange: The server begins
2,
Establish security capabilities, incl. its certificate if it needs to be authenticated.
protocol version, session ID, cinudin 1se by sending suite.
compressIon method, and Server sends chosen cipher
number initial Server may request
client certificate. Usually, it is not done.
random indicates end of Server_hello.
gortihcate
Server
Authentication and Key Exchange: The client should verify
Phase 3, Client if required and check that the
s e r v e rk e y _ e x c h a r g e
Change cipher suite and finish the cipher suite to be used on this connection.
c h a n g e _ c h i p e r _ s p e c
server _hello contains the selectedpreference. Probe Responses to advertise its IEEE 802.11i security policy.
The
and a new
session_id. Cipher Specification (Cipherspec) wireless station (STA) uses these to identify an AP for a WLAN
with
The
CipherSpec contains fields like: which it wishes to communicate. The STA associates with the AP,
Cipher Algorithm (DES, 3DES, RC2, which it uses to select the cipher suite and authentication mechanism
MAC and RC4) when the Beacons and Probe Responses present a choice.
Algorithm (based on
Public-key algorithm (RSA) MD5, SHA-1) Authentication: During this phase, the STA and AS prove their
identities to each other. The AP blocks non-authentication traffic
Solution of CSIT 7 Semester
and Practice Sets Network Security...119
118. A Complete TU
As until the authenticatio of
the STA and must remain
unaltered during all
between
successful. The AP does
not participate in transactio retrieval, update,
operations by
and transfer. Data
u n a u t h o r i z e d entities.
transaction other
than forwarding traffic between the STA ticati these include hashing, data validation
Key generation and distribution: The AP and the STA perform ses
S. used to e n s u r e
data integrity
Methods controls. Data integrity
checks, and access
that cause crypkographic keys to be generated and nSeveal data consistency above.
checks, one or more of the methods listed
opera
exchanged between the.Placed. on the need
include
Frames are can
used to describe
the AP and the STA. P and STA systems
availability is the principle
Data times.
Availability: and services at all
only. availability of information systems
Frames exchanged between. he STA
are
to maintain to information
Protected data transfer:
access
c a n prevent
and system failures the
the AP. As denoted by the shadir and Cyber-attacks the availability of
the end station through For example, interrupting
encryption module
icon, secure data transfer occurs betweeng and the systems
and services.
down may provide a n advantage
Ph se 5-Connection Termination
Figure: 1EEE 802.11i phases of operation
Section B
Attempt any EIGHT questions. Data Principal
4 Define integrity, [8x5-40 Consumer
Ans: The CIA triad
confidentiality and availability.
concept in information
organization's efforts towards ensuring datasecurity
which guides an
security.
confidentiality, integrity and availability is also known CIA stands for
foundations of as three Attribute
information systems security. service
Confidentiality: Confidentiality prevents the
to unauthorized people, resources and
disclosure of information
confidentiality is privacy. Organizations processes. Another term for
only authorized restrict
ensure access to that
operatorscan
use data
example, a programmer should not or other network resources. For Administrator
information of all have access to the persona
Methods used to
employees.
ensure Architecture
confidentiality include data encryptio
authentication, and access control. Figure: Generic ldentity Management
and data flows in a generic identity
Integrity: Integrity is the Above figure illustrates entities
data during its accuracy, consistency, and A principal is a n identity
holder. Typically, this is
management architecture.
Another term for trustworthiness
entire life o the network.
undergoes numbercycle.
services
seeks access to r e s o u r c e s and
on
Data human that
operations such asintegrity
a a user
is
of qually Principals authenticate themselves to an identity provider. The identity
capture, storag
Network Security... 121
20 A Complete TU Solution of CSIT 7h Semester
and Practice Sefs
a TCP connection to
the This is done via the TCP
server.
SSH Packet
the
the packet in bytes, not including
Establish TCP Connection Packet length (pktl): Length of
packet length and MAC fields.
random padding field.
Padding length (pdl): Length of the
ldentification string SSH-protoversion-softwareversion Payload: Useful contents of the packet. Prior to algorithm negotiation,
exchange is negotiated, then in
this field is uncompressed. If compression
SSH-protoversion-softwareversion subsequent packets, this field is compressed.
injection
and network
7. Describe how accidental association, MAC spoofing
Algorithm SSH_MSG KEXINIT security threats to wireless networks.
create
LANs or wireless access points to
negotation Ans: Accidental association: Company wireless
sSH_MSG_KEXINIT wired LANs in close proximity (e.g., in the same or neighboring buildings)
an MUA
remote s e r v e r o r o n
retrieves messages
a remote
from s e r v e r using
POP
f addition,
anomaly-based approach
assumes
It is subject to a man-in-the-middle attack, in which a third.Es knowledge of IT departments, to be protected and monitored.
of what needs
impersonates B while communicating with A and impersonatesty accurate inventory and scale of loT
Because of the variety
communicating with B. Both A and B end up negotiating a kev A while Limited security integration:
into security systems ranges
fromn
them
which can then listen to and pass on traffic. devices, integrating
challenging to impossible. for loT
It is computationally intensive. As a result, it is Firmware developed
vulrnerable
toa cloeo
Open-source code
vulnerailities:
software, which is prone
to bugs
attack. in which an opponent requests a high number
of keys. The vis includes open-source
devices often
spends aonsiderable computing resources doing usel ss mod
exponentiation rather than real work.
nodular and vulnerabilities.
volume: The amount of data generated by loT
Overwhelming data and protection
difficult.
IKE key determination is designed to retain th. advantages of Diffi devices make data oversight, management,
security,
The IKE developers do not prioritize
Hellman while countering its weaknesses.
five features:
key determinatiom Poor testing: Because most loT
effective vulnerability testing
to identify
algorithmn is characterized by important they fail to perform
It employs a mechanism known as cookies to thwart clogging attacks. weaknesses in loT systems. have unpatched
devices
lt enables the two parties to negotiate a group; this, in essence, vulnerabilities: Many loT
specifies Unpatched
reasons, including patches
not being available
the global parameters of the Diffie-Hellman key for many
exchange. vulnerabilities
behavior wil be
flagged. However, previously unusual-looking anon sate,of that hackers cannot break into their loT devices via weakly configured
unknown, but
leg or unauthenticated APls.
126A Complete TU Solution of CSIT 7 Semester and Practice Seta Network Security.. 127
Improve network visibility: IT teams need dedicatm d provided by PGP
detailedvisibility
field42
(NAC) to main services padding
like network access controls
all network-connected devices. NAC technology should inventony Explain
different
relevant diagrams.
E>xplain
and security
services. [10
with its components
Describe IPSec protocol
3 Section B
oDEL QUESTONS SETS FOR PRACTICE 8x5-40]
EIGHT questions.
Attempt any systemn (2+3]
methods to protect computer
control?
What is a c c e s s
Explain the
and information security?
What is security
MODEL SET 1 5.
Explain security
various
mechanisms.
TLS protocols
7. Compare SSL and WLANN?
block of a n 802.11
8. What is the basic building content type
and MIME transfer
SET 1 (CDCSIT Model Question) Course Title: Network Security a MIME
is the difference between
Course No: CSC 416 9. What
Pass Marks: 24 (2+3]
Level: B. S CSIT Fourth Year /Seventh Semester encoding? of computer
viruses.
Time: 3 hours. | Define Virus. Explain different types
Section A 10. intruders.
different classes of
Attempt any TWO questions. 11. Explain the cloud computing
reference architecture.
Diffie-Helna4R a network?
Section B
Attempt any EIGHT Section B [8x5-40]
4 Explain firewall questions. 8 x5-40 Attempt any EIGHT questions. of IPSec.
in details. mode and transport mode
What is denial of 4. Differentiate between tunnel
service attack? PGP protocol.
6. Discuss five principal services provided by
provided byExplain.
What are the 5.
services authentication and non-repudiation.
VPN? 6. Differentiate between
Explain.
128A Complete TU Solution of CSIT 7 Semesher end Prectiee Sets Network Security... 129
What is cloud security service (Secaas)? Explain any
as a
any two service is a continuous process; what
are the state in
security
details
What are the principal elements of mobile device security strat. h e e n stated
It
h a sb e e n .
that
8.
What are the various advantages and disadvantages of NIDS2 LAN.
t h i sp r o c e s s ?
9. 802.11 wireless
10. Explain the characteristics of a good firewall mplementation. Discuss IEEEDomain Keys dentified Mail (DKIM) strategy. to
7.
Explain the
What precautions can be taken
techniques.
11. What is trojan horse? What is the principie behind
it? different intrusion
version 5?
S
12 What are the main features of Kerberos 9.
prevent intrusion.
would most
12.
What factors
Section A
MODEL SET 6
Attempt any TWO questions.
1. Explain IEEE 802.11i services
What are IDS? Discuss IDS limitations and counter measures.
2*10-20
2. Section A
3. Give an example fora situation that compromise in confidentiality 12x10-20]
compromise in integrity. Write about the usage of session keys, puh s to TWO questions.
8+8
What is PKI? Why isExplain.
Course Title ritle: Data
it so important in informafion security?7 C o u r s e N o :C S C 4 1 0
What is the use of ide network security? Describe the Nature o fthe
th
Course: heory +
Lab Credit Hrs:3
elements of an identify management sy'sten SSL
security in Protocol?
incipa Semester: VII
10.
are
Discuss sender policy framework
carry? the principles, research results and
commercial
ompassing
modes operations of IPSec protocol.
of
e n c o m
Semeskerand
Proctice Sets
A Complee
TU Solution of CSIT 7 TRIBHUVAN UNIVERSITY
132
derfit ing Ktoj
.
Overtitting and . .
cross
validation, Comparing
in cluster
analysis,
K-means++, Mini R een
Types of data Partitioning (K-means,
- Batch
ha neans,
ojectsk Full Marks: 60
and DrVISIve), Density
Clustering techniques:
sed Pass Marks: 24
medoids),
Hierarchical
Outlier analvsis
(Agglomerative
Network Analysis
(DBSCAN arse
Title:
Data
Warehousing
410o
and Data
Mining
Semester
Time: 3 hours.
of struchs
mining, Friends search Ler
questions.
of data
warehouse.
How data
cube
5+5]
Sigmed network (Theory ired balang TWO
any components
friends, Degree assortativity, Attempt different
and Jian
Pei. Morgan Kaufmann Series in Data Management Figure: Components of data
warehouse
below:
Systems Morgan Kaufmann Publishers, July 2011. of data warehouse
are explained
Reference Books: of your data
The major four components database serves as the foundation
Central database:
A databases
1. Introduction to Data standard relational
Mining, 2nd ed
Pang-Ning Tan, Michael Steinbach, warehouse. Traditionally,
these have been the need for
Anuj Karpatne, Vipin Kumar Pearson Publisher, 2019. because of Big Data,
in the cloud. But
premise or of RAM,
Mining of Massive Datasets
by Jure Leskovec, Anand Rajaraman, Jeffrey D. running on
a
Osdovke
and
R l ohe In order to ensure fast OLAP, it is sometimes c ber P2(4,5), PI(10,40),.
P(4efinal
show the final clusters after
2 iterations. Assume P1 and P3 as initial
2+8]
all
(i.e., the cells of all
the full cube of the c l u s t e r c e n t r o i d s .
precompute
ven data
This, however
cube).
is exponential
dimensions
to cuboids
n fo limitations
The Huge number of Apriori
of candidates:
algorithm are:
consider concoontains 2
amber ofa A n s :
Algorithms,
cOst of the Apriori It is costly to handle a huge number of
no matter what implementation
cuboids
it we candidates
more cuboids
There are even
In addidon, the size of each cuboid erarchid technique is applied. 1-itemsets, the Apriori algorithm
ch dimensian. deperds 104 large
example, if there
a r e
1hus, precomputation of th ds on 2-itemsets. Moreover for
of its dimensions. on set. For than 10"
candidate
cube canthe
ality to generate
more
is approximately
and often excessive amounts of memorv will need more than 210 which
mquire huge 100-itemsets,
it must generate
those cuboid cells
lonbengcubetcontains only whose
measures candidates in total. mine large data sets for
1030 database so, to
egate ar iceberg
emirimum
condition The
support or a lower bound on average, min orimax.
satisfies
aggregate condition could Multiple
scans
not a good
of transaction
choice.
t is be this algorithm is large number
for creating Fx
a
icebeng cube because it contains only some oftthe cells of the full alled an long patterns scanned to check Ck k-itemset.
Database is not c o n t a i n any
When they do
The pupose of the
Iceberg-cube ube like will be scanned
even
the tip af an iceberg is to
be required identify and
of t r a n s a c t i o n s
annpurte onhy thase values that will most likely Numerical: K-means algorithm
port queries The ageregate condition specifies which csh ecision Given,
e nearinghul
and should therefore be stored. This is one
solution tothe
are Instance
P1
oblem ofaomputing versus storing data cubes
40
Closed cube: k consists of anly closed cells. A cell that has no
descendant P3
10
oell than it is dosed cell 55
P4 60
Shell cube: Another strategy for 80
partial materialization
pre is to P5
compute only portion and fragments of the cube shell created (K) =2.
involving smal no. of dimensions such as 3 to 5), based on the (cuboids
to be
Number of clusters P1 =
(2, 3)
of interest. For cuboids Centroid for first (C1) cluster
=
example, shell fragment cube ABC contains 7 cuboids: Centroid for second
cluster (C2)
=
P3 (10, 40)
=
to C1.
So, data point P2 belongs
(55 3)2 77.897
=
to C2.
So, data point P4 belongs
d(C1, P5) =V(70-2)2+ (80 3)2=102.728
AB d(C2, P5) =V(70 -10)2 + (80 - 40)2 72.111
BC Here, d(Ci, P5) > d(C2, P5)
2-D cuboids
to C2.
So, data point P5 belongs
The after first iteration is:
resulting cluster
P3, P4, P5
P1, P2
C2
ABC 3D (base) C1
Figureie cubolde
making up of 30 dete
cube with th Figure: Clusters after first iteration
nsions A, B, and C
Practice Sela
136. A Complete TU
Soluion of CSIT Semester and Data Warehousing and Data Mining 137
Iteration 2
cluster: aining dataset
to construct the Naíve Bayes classifier is as shown
centroid for each The
given
Now, calculating A n s :
intablebelow.
Attrib2 Attrib3 Class
Attrib1
cluster (C1) Tid No
Centroid forfirst Yes Large 125K
100K No
0.57x0.14x0.43
P(X11 Class No) =
0.14
PAttrib2 Small Class No)
= = =
P(X12IClass Yes) 0 =
Figure: Clusters after second iteration P(Atrib2 Medium (Class Yes) 0/3 0
= =
Consider the Xa
Tid
following training data set. P(Attrib2 Medium |Class No)= 4/7 =
0.57
P(X12 Class =
No) 0.43x0.57x043
=
=0.11
Attib Attrib
Atrb Class Now Classify the date Tid (10 P(Attrib3 "<100K" |Class Yes) 3/3 =1 = =
123 Attrib Attrib Atrib Clas5 P(Attrib3= <100K" |Class No) 3/7= 0.43 = =
1YesLarge 125K
No
2 No Medium |100K No 12 3 1 JNo Small 55K
P(Attrib1 Yes Class Yes) =0/3 0
P(Atrib1 Yas |Class No) 3/7 0.43 = =
=
=
0
PX13|Class= Yes) =
Smal 70K No 12 Yes Medium 8OK PAtrib2- Large |Class Yes) 1/3 =0.33 = =
8 No Smal 220K No
P(Atrib1 No |Class No) 4/7 0.57 = = =
A s s o c
like "If at
i a t i o
between
least 50% of the upper part
of the picture is blue, then
A rule this category since it links the
FAd KTOON" Cs=No]:37043 belongs to
to represent sky"
Q conditioned on Xas
of class is likely
Calculate the probubility content to the
keyword sky.
contents that are not
related to spatial
PC-PXC)*P{C) image
image
Class Yes) Associations among contains two blue squares, then
Xa)=PNu|Clas=Yes) *P{
=
=
07
Clas Ys relationships: A
rule like "fa picture
belongs to this category
(Maimum)
P{Class No) 0.03 x0.7x =
02 likely to
circle as
contain one red well
PClass NoXu)= PXu|Cass=No)
=
x0
O2 it is image contents.
associations are all regarding
P{Class Yes) 0 since the relationships: A
P(Clas Yes|Xu) =PX:|dass= Yes)
* = =
0 contents related to spatial
No)
=
No) =
0.11l Associations among image between two yellow squares, then it is
P(Cass No X)-P\a|Cass xF{dass x07
red triangle is
rule like "If a underneath" belongs to this category
0077 (Maximum) object is
P{ Cass= Yes) =0 x
ikely a big oval-shaped in the image with spatial relationships.
PClass Yes|Xa)-PMo|Cass=Yes) P{Class associates objects follows
web contentmining are as
No) 0.07 since it
* =
image. a second, users who are globally well-trusted may command greater influence
A Complete TU Solution
of CSIT7 Semester ond Practice Sete Data Warehousing and Deta Mining.. 141
140.. interactive access to formation. Since OLAPs9eTveTS
and serves. Such aa syster (ast, consistent, and
goods
encmags
d higher prices tor nultidimensional view of data, we will discuss OLAP operations in
and
higherdin atn
individuals to act
trustworthy
in a
constructs of
the we
manner,
does not reflet expected rea-world behavior. We assume that distrust does and
allow to make direct inferenes of any kind. This conservat net Dhangadi 818 746 43 591 698
iom
cities to provin
Gandaki 1941 185
127
data a
country". On
rarchyfrom thei level of city to the level of province
ro
Rol-up on locationh 02 680 952 31 512
(from cities to
provinces) (Q3812|1023 30 501
May
680 952 31 512 728 Jun
Jul
AUg
Sep
B12 1023 30 501 Oct
NOV
Dec
Slice
The selects orne particular dimension from
slice operation
Location(Cities) Pokhara 854 882 89 623
that en
the following diagram cube
provides a new sub-cube. Consider am
shows hoand
38 872
Kawasoti/1087 968
slice works when sliced for first quarter i.e, Q1.
Q2
14 400 682 784
Q1 605 825 3O 501
1002870 Q3 812 1023
728
Q2 680 952 31 512 984 1038 38 580
Q4 927
TV PC AP SSD or
Dice for (location "Mahendranagar"
=
Mahendranagar
Dhangad818 746
Mahendranagar Q1 605 825 769
Q 605 825
769 680 952
2 680 952 TV PC
Product (types)
TV PC
Product (types) Figure: Illustration of dice operation on sales data
Figure: llustration of slice The dice operation on the cube based on the following selection criteria
operation
Here, Slice is performed for the dimension
on sales dat time involved three dimensions are
"time" using the criterio
Q.It
Dice
will form a new sub-cube
by selecting one or more dimerns (location "Mahendranagar" or "Dhangadi") and
Dce selects two more dimensions from a given cube and
or a
new (time "Q1" or "Q2") and
Pivot as It rotatse,
rolation.
is also k n o w n below
The pivot operation alternative
esentation
the
of da data axe A n s
Minimum s u p p o r t = 3
:
G i v e n
Item
se
A Infrequent_
854 882 89
Pokhara 623
Infrequent
1087 968 38 F}
Kawasoti 872 Infrequent
G Infrequent
(H Infrequent
818 746 43 591 Infrequent
Dhangadi
1.e., Ll is as below
(K}
of the size of
c a n d i d a t e list Remarks
pruning CL, the Support Count
Mahendranaga 605 825 14 400 After
Itemset 3
A}
TV PC AP
SSD B
Product (types)
F the size of 2
i.e., C2 is a s below
candidate itemset of Remarks
Pivot Iteration 2: The Support Count
Infrequent
Itemset
{A,B Infrequent
{A, D Infrequent
A, E
TV 854 1087 818 605 {A, F
B, D)
Infrequent
E
B,
PC 882 968 746 825 {D,E
Infrequent
{D,F
as below
E, F_ candidate list of the
size of 2 i.e., L2 is
the Remarks
AP 89 38 43 14 After pruning C2, Support Count
Item set
A, D
B, D
SSD 623 872 591 400 B, E
D, EJ
(D,F_ i.e., C3 is as below
Pokhara Kawasoti Dhangadi Mahendranagar itemset of thesize of 3
Iteration 2: Thecandidate Support Count
Remarks
Location (Cities) Item set
3
Figure: llustration of pivot operotion on sales data B,D, E) L3 is as below
Given the following data set, find the frequent itemset using priorn the size of 3 i.e.,
C3, the candidate list of
8.
RemarksS
After pruning Support Count
algorithm with minimum support 3. Itemset
JA, B, C, D, E, F_ B,D, E we cannot
further generate
candidate itemsets
2
B, C, D, E, F, G_ Form this frequent itemset
L3
itemset is L3 =
{B, D, E}
1A, D, E, H_ we stop here
and o u r final frequent
so
A, D, F, LJ
B, D, E, K_
148A Complete TU Selution of CSIT 7
Semester and Prectice Sets Dato Warehousing and Date Mining. 149
9 Illustrate the hierarchical clustering with an example. all data
Ans: Hierarchical method cluster is cluster containingmostgiveneimilar?points (1, 2, 3, 4, 5)
creates a hierarchical decomposition of top-level
ide
to decide
which point is As you noted, we
data points using some criterion such as
proximity measi the iven
tho
given *t we
have
whiHicehrarics tidca
decomposition of data points results in tree-l
like structure,
called a dendrogram. A.d/L3+dl 4+d1.5)_(4+4+5+).
w ec o m p u t e
5 average
dissimilar, we pick one of
these
For data point for the most
1 and 3 are tied 4, 5} and Cluster 2 =
merged into one or until the termination condition holds. groups Similarly, we can calculate for other point in
Divisive Approach: This approach starts with all of the
same luster. In the continuous iteration, a cluster
objects in th For point3-
is
smaller clusters. It is down until each object in one split up in
cluster or he and
tenination condition holds For point 4-
This method is rigid, ie., once a merging or
splitting is done, it can never h For point 5 -3.
=
Point 2: (d(2.4)+2d2.5).0*)3
5 5 so point 2 is the most
The other averages are point 45 and point 5:
dissimilar. Wesplit |2, 4,5} into clusterl1= (4, 5) and cluster12= (2). We need
to check if sóme additional should
points be moved into the set cluster12.
and Data Mining 151
Data Warehousing
...
150 A Complete TU Solution of CSIT 7 Semesterand Practice Setss not use all cells
and precision does
d(4.5)-d(4, 2) 2-3-1 a
model
and using recall
usir
false negatives
Evaluating with true positives
Recall deals
d5,4)-d(5,2) =2-3 -1 Howeve
o ft h econtusion.
rix.
and false positives.
lse positives. Thus, using this
be moved. We split (2.4 true positives into
So, no additional points should nto 2) aand deals with
true negatives
are n e v e r
taken
full data set (1, (2}, 13), 14. where the
giving us the partition of the
a n dprecision
should only
be
the last cluster to get (1) {2] (3) 14/ 15) Thus, thefull hierarchly, we
is
P a i o
r fp e r f o r n
affirm
when we
want to
DBSCAN
works? [2+3]
useful How
k-means? version of the
mini batch
ore
more.
modified
the
concept algorithm is time in
what is the k-means
clustering the computation
mini
batch
batc min-batches
to reduce of the clustering.
The It uses the result
optimize
k.means algorithm. to
inputs which
Ans:
attempts
addition, it
mini-batches as
In is takes
datasets.
batch batch k-means
k-means
4 large the mini The mini
S achieve this, randomly. datasets.
used for the large
To dataset,
the whole
Figure: Clusers obtained from DINA are
subsets of k-means and
it is normally
10. Discuss about overfitting and underfitting. How precision and faster than
considered
used to evaluate classifier? DBSCAN AJgorithm
Ans: When a model perfoms very wel tor training data but has 243 Input: n objects
set containing
performance with test data (new data), it is knoWn as overfittine poor D: a data and
case, the machine learming model learns the details and noise in tho this e:The radius
parameter,
density
threshold
data such that it negatively affects the pertformance of the model on trainin Minpts: the
neighborhood
Output
the
When a model has not learmed pattems in the
training data well nd Method: unvisited;
unable to generalize well on the new data, it is known as underfittino is 1 Mark
all objects as
unvisited
An object is
2. Do until
no
underfit model has poor performance on the training data and will result
unreliable predictions. Underfitting occurs due to high bias and low unvisited object p;
Randomly select
an
variance a.
Mark p as visited;
Actual Class1 Actual Class 2 b. of has at least Minpts
objects
If the e-neighborhood p to C
cluster C, and add p
c.
Predicted TP Ture Positive
TP FP i. Create a new e-neighborhood of p;
in the
i. Let N be the set of objects
Class1 TN= True Negative
Predicted
FN TN FP False Positive ii. each For p' in N point
Class2 FN False Negative
Ifp' is unvisited
Figure: Confusion Matrix
Precision: Precision refers to the measure of exactness that means mark p' as visited;
what has at least
percentage of test data tuples labeled as classl category are actually If the e-neighborhood of p'
Based on the classification such Minpts points,
report given in the form of confusion matrix it is Add those points to N;
calculated as
a member of any cluster,
add
Ifp' is not yet
PrecisionTP+TPFP p' to C;
Recal: Recall refers to the true
positive rete that means the
tupes that are correctly identified. Based on the proportion
0
classl test data iv. Output C;
report given in the form of confusion matrix it is classification d. Else mark p as noise
calculated as
IP
Recall TP+FN 12 How beam search and logic programming is used to mine graph? Explain. [51
Ans: Beam Search
The
precision and recall are useful metrics is A beam search is a heuristic search technique that combines elements of
mbalanced. lf classifier predict class 2 all the intimecasesandwhere99.5%
the recall
the
datataset breadth-first and best-first searches. Like a breadth-first search, the beam
and precision both will be 0. Because there are noget accura search maintains a list of nodes that represent a frontier in the search space.
classifier is not a true posives. 50,
it indications that good classifier. When the precision and recall both are.high Whereas the breadth-first adds all neighbours to the list, the beam search
the classifier is orders the neighbouring nodes according to some heuristic and only keeps
doing very well.
152. A Complete TU
Solvtion of CSIT 7 and Data Mining.. 153
Semester and Prectice Sets Data Warehousing
the n (or k or B) best, where n is the beam size. TRIBHUVAN UNIVERSITY
and so on.
So me antapplicar
chine learming graph ly rethug Institution
of Science
TU QUESTIONS-ANSWERS 2078
Beam Seardh Algorithm Full Marks: 60
2
Let beam width = n.
Create two empty lists: OPEN and
mirimg Warehousing
and Data
Mining Pass Marks: 24
Data Time: 3 hours.
3. Start from the initial node
CLOSED. se Title: 410 Semester
No:
SC
Year/Seventh
5
Repeat the steps 5 to 9 until GOAL node is
fOPEN list is empty, then EXIT the reached.
'orderode ordered OPEN C o u r s e
disadvantages
MOLAP is
of
that it is
less
(e, ez . , enl
of edges E
=
only a
limited
nm/ and is a
OPEN list by heuristic function. all nodes N
=
(n, nz ., network/graph
eleme ot Given a set of
nodes, e
=
(n, n). A signed E, and a
9. Nodes to be of a set of edges
expanded should not be greater than beam where each edge is a pair set of nodes N, there is
consisting of a network,
and update the OPEN list by best n successors. width n. Pm. <N, E, S> In the signed
Inductive Logic Programming (ILP)keeping Prune triple G which is a function S: E {+}. indicates friendship
mapping S between 2 nodes either t o r The+
sign
Inductive logic programming (LP) is between 2 nodes.
traditionally concerned with alwaysa sign the "sign
indicates enmity
separated into two
logical programs (as Prolog code). ILPdetectina
and be
patterns in data in form of between 2 nodes only if
nodes can
the
if and two nodes of
learning that uses first-order logic to is the
balanced
subfield of machine A signed graph
is link joins
such that each positive different subsets.
exclusive subsets
hypotheses and data. Because first-order
logic is expressive and declarative represent mutually
negative link joins
nodes from
friend"
inductive logic subset and each of my friend is my
programming specifically targets problems involvine
same
implies that "the friend
the sign of the
structured data and background Balance theory generally friend". Let sij represent
knowledge. Inductive logic is my -1 denote a
problems in machine leaming,programming and "the enemy of my
tackles a wide variety of enemy 1 and =
=
where sy
and the node jh Balance
classification, regression, clustering, and reinforcertent including link between the ih node
link are observed
between ui and u;.
B:()
- C:( D: -77)
important applications in bio- and chemo-informatics, natural language A:()
and C
Triads A
processing sequence, graph mining and web mining. Figure: An illustration of balance theory. imbalanced.
The first motivation and most
important motivation for are balanced; while triads B and D are
using inductive loge Beam Search algorithm depends on the
programming is that it overcomes the representational limitations o The space complexity of the
attribute-value learning systems. Such systems following things, such as
representation where the instances correspond to
employ a
table-Das Beam Search's memory consumption is its most desirable trait.
tne
rows in the table,
attributes to columns, and Since the algorithm only stores nodes at each level in the search tree.
for each instance, a single value is assigneu
each of the attributes. This is The worst-case space complexity = O(Bxm) where, B is the beam width,
sometimes called the single-table single-tupe
assumption. and mis the maximum depth of any path in the search tree.
This linear memory consumption allows Beam Search to probe very deeply
into large search spaces and potentially find solutions that other algorithms
cannot reach. Example: Tracing of beam search algorithm
Mining
.
and Data
Warehousing
Date Generate
the
154
information?
where
A
.
using
FP growth,
= the
ITEMS
equent
H
D, F,
T I D
A, B, C,
F
A, D, E,
1
C,D,F
B, H
3
41 G, H
4 A, C F
G
5 C, D, E,
I
6 A, C, D, of
d i s c r e t i z a t i o n
defines a
attribute collecting
numeric
reduce
the data
for a given used to attribute
hierarchy can be for the
value
A concept
hierarchies
numeric
Ans: Concept as or senior).
attribute. (such
8
0 the
and replacirng
low-level
concepts
(such as young
middle-aged,
becomes
meaningful
and it
level concepts into it
higher generalization,
a r e organized
age) by detail is lost by such model, data
Step OPEN={ CLOSE 0 Although
m u l t i d i m
c o n t a i n s multiple
e
levels of
n s i o n a l
Remarks In the
to interpret. dimension
1 OPEN= (a) is easier and each
CLOSE { Starting from inita multiple
dimensions,
hierarchies.
node a. Given,
3
each item set
=
Minimum support
3 OPEN= {d7, cs} CLOSE = {a} support count for
Prune bo keep Constructing 1-itemsets
and counting
n-2 successors).
best Support Count RemarkS
Itemset
4 OPEN=go, is, hs) CLOSE= {a, c, d
Exploring children
node c and d.
Intrequent
D 5
F
() H
3
1S6 A
Compiete TU Solution of
CsIT 7
Sorting frequent Semester and
Proctice Set Data Warehousing and Dato Mining.. 157
support. Transaction
D 5
Remarks count For null
D:1
Now, ordering each C:I
ID itemsets in D based
on frequent
ITEMS 1-itemsets aboue
above:
A,C, D, F, H ORDERED ITEMS D:1
A:1
A, D, F
C,D, A, F, H
3 D, A, F
4
CD, F C, D, F F:T
H
H
A, C, F, H
6 C, A, F, H
C,D,
C,D
A, C,D F:1,
Now C, D, A
drawing FP-tree by using ordered itemsets one
1 For Transaction 1: C, D, A, F, H by one:
null
For Transaction
3: C, D, F
3.
null
C:1
D:1
C:2
D:1
D:2 1
A:1
F:1
F:1
F:1
H:1 H
158. A Coimplele TU Solution of CSIT 7 Semester and Practice Set Warehousing and Data Mining.. 159
Data
4 For Transaction 4: H
Transaction
6: C, D
For
null null
D:1
C:2
D:1 :4
H:1 H:1
D.2 A:1
D:3 A:1
A:1
A:1 F:1
F:1 F:1
A:1 F:1
F1
FT
H:1
5. For Transaction 5: C, A, F, H
7. For Transaction 7: C, D, A
null null
C:3 D:1 5
:1
H:1 H:1
D:2
A:1 A:1
D4
F:1
A:1
Q
Q
F:1
F:1
F:T,
H:1
H:1
160A Sets
Data Warehousing and Data Mining.. 161
u
MinPts
=
3
2.5and
Gven
C:5 Epsilon(9)
Data pOint
A
A C
F D
H F1
G 8
H distance
DBSCAN we need to first calculate the
To find the clusters by using Distance between data points
is
of given data point.
all pairs to calculate d(B, A).
among
after calculating distance d(A, B) no need data
Now we need to find conditional pattern base and symmetric so,
distance for all pairs of eight given
frequent patterns. For thisConditional FP T Euclidean
each item then generate the We calculate thedistance matrix becomes as shown in table below. Also
can
start with final
points and distance is <= 2.5
our
Practice Sets
Solution ofCSIT Data Warehousing and Data Mining. 163
TU
Complete
162A
Numerosity reduction
concept
and hierarchy generation
Discretization to replace raw
Data could also be discretized
, Data Discretization: levels. This step involves the reduction of a
Performance Issues values with interval the range
MiningMethodology
e n d U s e rInteraction
Diverse Data Types number of values of
a continuous attribute by dividing
lssues of attribute intervals.
Sometines, due to time, storage
or memory
Data Sampling to be worked with.
or too complex
Eficienicy and scalability constraints, a dataset is too big
Mrningdiferent
koindsof
ofdata mining algorthms Handing of relatonala Sampling techniques
can be used to
select and work with just a
Knoedgeindatabase
rteradive miningof Paralel, distribuled and complex types of dala subset of the dataset,
that it has approximately
provided
the same
knowledgeat
multple levels of| incremental mining
Mining infomaion fom properties of the original
one.
abstacdon
Incoporation ofbackground
algorithms hetanderoglobalgeneoUsinformationdatabas 6Definespatial mining.
data
with an example.
are the chalienges
What of multimedia
2+3]
systems mining? Describe of data mining techniques to
Data Mining (SDM) is the application
knowledge
Date mining query
languages Ans: Spatial the same mining, with the
functions in data
and ad hac data mning spatial data and follows along data
mining discovers
Presentation and visualzaton
end objective to find patterns in geography. Spatial
from explicit spatial datasets. Spatial data,
ofdate mining results patterns and implicit knowledge in geospatial data
Handing nasy or ncompee data in many cases, refer to geo-space
related data stored
Patlem evaluation raster" formals, or in the form of
repositories. The data can be in "vector" or data
imagery and geo-referenced multimedia. Recently, large geographic
warehouses have been constructed by integrating thematic and geographically
5Definedata discretization. Describe the tasks for data preprocestinn
referenced data from multiple scurces.
Ans Data disctetization is defined as a process of converting continuaue
Some challenges/issues in multimedia data mining contains conteni-based
attribute values into a finite set of intervals and associating with e
interval some specific data value. In other words, data discretizatiom
retrieval, similarity search, dimensional analysis, classification, prediction
analysis and mining associations in multimedia data
values of continuous data into a finie
method of converting attributes
intervals with minimum data loss.
stl Conient-based retrieval and Similarity search: Content-based retrieval in
multimedia is a stimulating problem since multimedia data is required for
Data goes through a series of tasks during preprocessing:
detailed analysis from pixel values. We considered two main families of
Data Cleaning Data is cleansed through processes such as fling
multimedia retrieval systems, ie, similarity search in multimedia data.
missing values or deleting rows with nissing data, smoothin d
Description-based retrieval system creates indices and object retrieval
noisy data, or resolving the inconsistencies in the data. Smouthiy
based on inage descriptions, such as keywords, captions, size, and
noisy data is particularly important for ML datasets, since machie
creation time.
cannot nake use of data they cannot interpret. Data can be cleaned
Content-based retrieval system supports image content retrieval, for
dividing it into equal size segmen: that are thus smoothed (binm
example, colour histogram, texture, shape, objects, and wavelet transform
by iting it to a linear or multiple reyression function (regressin
Use of content-based retrievul
by grouping it into clusters of similar data system: Visual features index images
(clustering) and promote object retrieval based on feature
Data Integration: Data with different representations are pur
desirable in various applications. These
similarity; it is very
and conficts within the data are
resolved. weather prediction, TV
applications include diagnosis,
Data Transformation:
Data is and generalun production and internet search
engines for
normalized pictures and e-commerce.
Notmalization isa process that ensures that no data is redu Multidimensional Analysis: To perform multidimensional
all stored in a single place, and all the ependencies are ogical multimedia databases, multimedia data cubes analysis of large
Data abasesa
constructed similarly to traditional data cubes may be designed and
Reduction: When the volun of data is huge, datstore1 from relational data. A
become slower, multinedia data cube has several dimensions. For
costly to acces and challengingsentation
reduction step aims to prese a reduced
to propery
of the
data n
image or video in bytes; the width and example, the size of the
data warchouse. height of the frames,
dimensions, the date on which image or video was creating two
created or last modified,
er and Practice
164. A Complete rU Selution of CST 7" Semester
and Practice Sets Data Warehousing and Date Mining... 165
image
of the e o r video, sequ
frame (Confide Yes, Studied Yes, Sick
X
= =
durs. be classify is
durat
the ion in seconds,
=
imensi video,
tuple
Internet domain of pages data the given training Here, in
edge orientation dimension. each class Ci as: P(Ci)=ICi..
colour dimension
and A
for. keywords
multimedia
nmultinywoo esult =?).
ent. Now, Calculating
Probability of
ultimedia li
and measures Ci in D.
of training tuples of class
dimensions
data ike a
additional
have number
D| :is the
s sa r ep r e s e n t . .
can
oscientificparticularly
analvsis has been Pass)=3/5
npredi
PResult class:
astrononmy, seismology, and scienific for each
analysis like
classification is an
important method for analysis. Decis
reported image fi Comp
P(Xk|C)
1/2 0.5
=
66.66 Yes
Result
| Result
=
Fail)
=
=
datatree
=
PIConfident =
carefully classified as
for models Yes | Result =
66.66
=
galaxies, stars on
magnitudes, areas, intensity, image moments and orientation
classification and clustering
properties PIStudied=
PSick No
|Result Fail)
1/2 0.5
33.33
=
=
data analysis methods could be applied to image data minir techniques and scientificand P(X|Result= Pass)
of
=
0.125 x0.4
0.66
0.05 class C,
x 0.66
conditioned
x 0.33 0.144
on X as: P(G;|X)
=
P(X|C) x
P(C)
Mining Associations in Multimedia: Data Association
Calculate the probabilityP(X|Result Fail) x P(Result Fail)
=
=
rules involv?
=
0.144
multimedia objects have been
mined in and video image P(Result Fail |X) =
Pass)x P(Result
Pass)= =
databases
=
P(X|Result
categories c a n be
observed:
tabases. Three PResult Pass | X ) =
x0.6=0.0864 (Maximum)
=
conditioned o n X is 0.0864
Associations between mage content and non-image contens
of class Pass,
feat is found that the probability dataset.
Associations among image contents that are Here, it in the given training
not relatedres
ated to spatial which is highest among
all classes present
the new data tuple X
=
computation
table
previoush
t s ent
computed lower-level aggregates,
to
efficiently: The Aprioi property, in the context of da compute iceberg with one
another. Note that we apply
links. Some triads satisfy
both theories such as the
and snowflake
schem
sa.
List any
ApplyK/-2
(188, 77) up two
dat (185,
over the Mining 169
72),
..
Differentiate
(182, 72), (170,
10 normalization.
fact Instance
a star
with
ent of X
It resembles
store
related connected to tables
ultiple dimension
P3 168
60
dimension P4 179
attributes P5 68
tables are The dimension 182
The dimension normalized. tables P6 188
demoralized.
are
More joins betu Number of clusters to be created (K) =2.
Fewer joins between dimension
tables between dimensic Centroid for first cluster (C1) = P1 = (185, 72)
tables mean fast query response
times
ension
mean slow
qiery response Centroid for second cluster (C2) = P2 (170, 56)
times lteration 1:
Reguires more space to store NEuires less space space to store
dimension tables which results in dimension tables
which minimizes Now calculating similarity by using Euclidean istance measure as:
d(C1, P3) 20.809
data redundancy.
=
TUSolution
ofCSIT7 Data
170A
Complete
to C2
Warehousing and Data
P2belongs
thearchitecture and
implementation of data Mining 171
So, data point
Eplaint h ea
a
Section B
d(C2 P ) = 2 2 6
mining?
challenges of graph
So, point
data
6.543
nanning
0Trace spanning tree of following graph from node a to node j using 243
d(C1. Po)
=
P1,
P1,P4,P5, P2, P3 8 d
9
P6 C2
Tid
List of items Section B Mining.. 173
EIGHT questions.
Atributes. Briefly explain types of attributes
Mepl
any
e f i n
A
e .
warehouse architecture.
8x5-40
i n the data 14
ntiate between Data mart and Meta data.
plain data cube with example.
sociation rules are generated from frequent item sets.
H the decision tree algorithm with example.
Whatare
the types ofregression? Explain.
the contribution of spati
data mining in academic
T ain the data mining tasks performed on a text database. activities.
Section B
Attempt
EIGHT questions.
anyis data mining? Briefly explain the motivatins challeno
MODEL SET 4
What
of dap
mining.
OLAP and OLTP
Differentiate between
for multidimensional data models. Section A
Explain schemas TWO questions.
Explain
arious evaluation 4Mempt
methods are required? the any
7. Why evaluation 2x10-20
methods.
Describe the various phases in
knowledge discovery process with a neat
Explain briefly agglomerative hierarchical clustering with ev diagram.
8.
Diferentiate between data marts and data Outline the major ideas ofnaive Bayesian classification. Explain
9. cubes along with classification. Naive-Bayes
implementation
What are key issues in hierarchical clustering? 5+5]
10 Explain about prediction and regression.
Agglomerative Hierarchical clustering algorithm.
Explain about the basic
11 Explain the application of mining used in WWW. 5+5
Section B
12 What do you mean by multi-media data mining? What is the importar Aftempt any EIGHT questions.
data mining in medical and insurance field? 8x5-40]
2 Given two objects represented by the
tuples: (22, 1, 42, 10) and (20,0,36,8),
compute the Euclidean distance, Manhanttan distance, Minkowski distance
between the two objectsusing q=3.
MODEL SET 3 5. What are summery statistics?
Explain
6. Describe strengths and weaknesses of K-means.
Explain Functionalities of search engines
Section A Discuss about
mining the web link structure to identify authoritative web
pages.
Attempt any TWO questions. 9 What is outier detection?
Explain distance-based outlier detection.
1 Differentiate between Data-Warehouse and
of KDD Data-Mining. Write partitioning
Explain me s11. Compare around mediods algorithm.
OLTP and OLAP.
State K-means algorithm. Apply K-means algorithm with two ond oW to
compute support and confidence for an association rule X > I
form two
cluster by taking the initial cluster centers as terdu
subjects anu
I
Subject A B
1.0 1.0
MODEL SET 5
1.5 2.0
3.0 4.0
5.0 7.0 Aftempt
1. WhyanydataTWO questions.
Section A
(2x10-201
3.5 5.0
prep 15 important? Explain the role played by sourcing
4.5 5.0 acquisition,cleanupiand transformation tools in building adata warehouse. 2+8
3. What are the 3.5 4.5 2What cube materialization? Define full cube, iceberg cube, closed cube and
shell cube.
mining challenges of gra ung? Explain the applicabion
otg 2+8]
ST T Semester and Practice Sets Data
TUSolution
ofCS/IT Warehousing and Data Mining
174.A
Complee
3. setusing
tollowing
data
T t e m sP u r c h a s e d ETL process in
detail. 85-40
TID Straw Berry
Explain
back propagation is used in classification.
Litchi Banana, ibe how
Describe
109
Litchi, Banana a small universe of five web pages: A, B, C, D and E.
243
110 Section B Calculate the
rank of following graph using google PageRank algorithm.
EIGHT questions.
Attempt any
4 How Support
Vector Machires are
Nonlinear data ?
applied for the
classification8 5
Linear and
Hierarchical clustering algorithm
5. Write Agglomerative
For the following vectors X and Y, calculate the cosine similaarity.
6.
whereX-3 20500020 0, Y =|1 0000 0 0 1 02
of cluster analysis.
7. Explain the requirements
How lassification plays significance role in data mining? Fml plain
Define dimension table and fact table. What makes the
the necessity
multidimensional data model?
10. Describe statical description of data.
11. Explain the link analysis page ranking algorithm.
12 What are the typical information extraction apPplications? Discuss. MODEL SET 7
MODEL SET 6
Section A
Atempt any TWO questions.
What is warehouse and data mart?
[2x10-20]
Section A Why do any organization need
Warehouse separately though it has transactional database
Attempt any TWO questions. with its application. system? Explain
1 A data warehouse can be
2410- [2+2+6]
modeled by either a star schema or a
schema". With relevant snomis What is the use of FP-Growth method in market basket analysis? Explain FP-
2 Explain ID3
examples discuss the two types of schemas growth method with a suitable example.
algorithm. Calculate TPR, FPR and Accuracy 1or 3 What is a decision tree 3+71
Confusion matrix. and how information gain is used for attribute
selection? Explain with
Actual+
example. [10
Actual- Section B
Predicted+ 100 40 Atfempt any EIGHT questions. [8x5-401
| Predicted - 60 pladin briefly the structure of data warehouse. How a data warehouse
3.
Explain Apriori algorithm in market basket 300 Derive ciation helps in better analysis of a business.
rom the
following analysis.
market basket transactions with 50ro minim
[3+2
support and ene Association rule mining two step processes. Explain
suppor
confidence respectively. confidence measures. 2+3
Transaction Itemsets eSCribe the difference between Hierarchical and partitioning clustering
How K-means clustering is 2+31
A, B,C What do you mean
applied
A,C by data discretization? Explain the concept hierarchy. |2+3]
A, D Explain variouso data miningiissues and functionalities in detail
B, E, F
and Practi.
and Practice Sets
176 A Complete
TU Solution of CSIT 7 Semester
Explaink-fold
k-i cross
validatio Software Projeet Management
W'hat is cross
validation?
with its
and disadvantages.
and negative link can be predicted.
Explain how positive in social network.
advantaaggs New Syllabus
10. network. Wha
the
11. Define balance theory
in signed network.
Discuss the tuno.
importance of distn e tle:
Title
Software Project Management
Full Marks: 60+20+20
What do you mean by web mining? web mining 24
12
Pass Marks: 24+8+8
p eN a rC S C 4 1 5
e cCourse:?Theory+ Lab
MODEL SET 8 whor
ofthe Credit Hrs.3
eimesterV I
dian:
Description: This course familiarizes students with
different concepts of
Section A management ainly focusing on project
hvare
project
analysis,
allocation, risk analysis, monitorir control and software scheduling,
Attempt any TWO questions. do we configuration
What kind of data preprocessing need before applvino uagement.
1
algorithm to any dataset. Explain binning method to handle nois data minin (yuseObjectives
2 What are outliers? Discuss the methods adopted for outlier detec data. (46 main objective of this course is to
provide knowledge of different
management concepts of
3 Applv Aprioi algorithmfor the folowing transaction database on
all frequentitem sets systematicallywith minsup = 0.3. entih stware proect
and id2ae various
that studernts will be able to
so
instruction behaviour
e Tle
ground, selecting the right person for
the job, back
best methods
e
Lab
Nor:CSC415
+
Pass Marks: 24+8-8
motivation, working in groups,
becoming team, decision
a
of the Course: Theory Credit Hrs. 3
conclusion, further exercises.
making, leaders krester:VIT
organizational structures,
ertionA
Project Activity
Definition and Activity Seauen
ing Plan Development Execution: Project Plan
a
3.
describe all the specitic
activities that mustbe. In
ormed tothis step we
Project
the inputs collected from all the other Development
planning processes such
orables. The Projtheect
e m p l o y s
and Activity described. The Project Plan documents all the assumptions, activ
is to decide the etfort required and drives the project. Each of the
the next vital step to schedule, and
timelin
he activities. The Efort can be calculated usin mplete ed
monitored. The team and the Project tasks
tha ach of
the and activities are occasionally
techniques obtainable
Such as Function Poink e of
keholders are well-versed of the progress. This serves
Complexity of Code, Benchmarks, etc. This step clearl Lines of
estimatesCodeand
Co tstanding communication mechanism. Any delays are
documents the time, effort and resource required for ch the project plan may be adjusted consequently.
analyzed and
5. Risk Factors
ldentification:
xpecting the unexpectedaandactivity. Performance Reporting: As explained above the progress of each of
It is significant to recognize and document the risk factors facing it the tasks/activities illustrated in the Project plan is monitored. The
with the project based on the
etc.
associalo
assumptions, constraints, prog is compared with the schedule and timelines documented in
expectations, specific situation, user
Schedule Development: 1he time plan for the project the Project Plan. Different techniques are used to measure and report
can be the project performance such as EVM (Earned Value Management).
required forarrieach
ved ofat
based on the activities, interdependence and effort
them. The schedule may power the cost 12 Planning Change Management: Study of project performance can
estimates, the cost demand certain aspects of the project be changed. The Requests for
analysis and so on. Project Scheduling is one of the beneft
task of Project Planning and also the most
most s
Changes need to be analyzed cautiously and its impact on the project
complex tasks. In should be analyzed. Considering all these aspects the Project Plan may
projects it is possible that several teams work on very larg
project. They may work on it in equivalent. However theirr t developir be customized to accommodate this request for Change.
Change
Management is also essential to accommodate the implementation of
be mutually dependent: Again various factors
may impart
pad the project at present under development in the production
effectively scheduling a project
environment. When the novel product is implemented in the
Teams not directly under our control
production environment it should not negatively impact the
Resources with not enough experience
environment or the presentation of other applications sharing the same
7. Cost Estimation and Budgeting: Based on the
information compose hosting environment.
in all the
previous steps it is possible to estimate the cost concemed in 13. Project Rollout Planning: In Enterprise environments, the achievement
executing and implementing the project. A Cost Benefit can
inwards for the project. Based on the Cost Estimates Analysis ke
of the Project depends a huge deal on the success of its rollout and
is done for the project.
Budget allocation
implementations. Whenever a Project is rolled out it may influence the
8. technical systems, business systems and sometimes even the way
Organizational and Resource Planning: Based on the actions is run. For an application to be effectively implemented not
identified, schedule and
budget allocation resource types and resource business
only the technical environment should be ready but the users should
are
acknowledged. One of the primary goals of Resource planning ist accept it and use it efficiently. For this to happen the users may have to
ensure that the
project is run proficiently. This can only be achieved b be trained on the new
keeping all the project resources fully utilized as possible. The succes system. All this requires planning.
he table below is an example of project specification with estimated
depends on the correctness in predicting the resource demanas u activity duration and precedence requirements:
will be placed on the
project. Activity ctivity Duration Precedents
Kesource
planning is an iterative process and essential to optimize u" Name (Weeks)
use of resources throughout the
project life cycle thus makungources Hardware Selection
project execution more competent. There are various types or System Configuration
re
9.
-
D
H ntrol
10
any eight
questions.
(8x 5 40)
ept
doyou mean by Software Project Management? In what ways
What
are projects are different from other types of projects?
in project management is edicated to the planning,
s Software
surce allocation, execution, tracking, and delivery of software and web
scheduling,
projects.
e might be many differences but according to my knowledge there are
Cansider the paths, beginning with the start node and four basic differences between software project and other projects.
node. There four such paths forthe given
are stopping
proje They are aswith the end Software project are based on logical work, while other are based on
PathI follows: physical work.
Start AD>H>End with a time of 6+4+2-12 weeks
Path II We can't measure complexity of software project until we actually
work on it.
Start BE>G>End with a time of 4+3+3=10
weeks There is invisibility of progress in software projects. Means customers
Path I 3)
of software project an't see the outcome in middle of
Start C>H>End witha time of 3 =3 weeks project, because
Path IV customers don't know about coding and other technical work and as
Start FG>End with we know an incomplete project will not
a time of 10-10 weeks give an outcome.
Consequerntly it becomes very difficult to satisfy customers of software
Compare the times for the four paths. Maximum of {12, 10, 3, project that actually their work is being done by team.
see that
path I has the maximum time of 12 weeks. Therefore, 10] 12 We
=
critical path. The critical activities are path I is the One good point of software projects is that, they are flexible. Customer
A, D and H. The
The project
completion time is 12 weeks.
project only wants final result, so rest of things are in control of programmer,
he can
For non- critical activities. modify software at any stage.
Whule this thing is not in other projects, as everything is in frornt of customer
Timefor path I- Time for path II =12-10=2 weeks. he is aware
about progress he
Time for path I- Time for path III 12-3 9 weeks. can view what work is being done by project
Time
for path I
Time for path IV 12- 10 2 weeks.
- manager and team so it is not in the hands of project team to make changes
at any stage of project development.
=
Why are process Capability Models more effective than Explain cost benefit evaluation techniques.
Describe 3any
capability models in product matrices
describes a strategy fordetail
Ans: This model Would consider proceeding with a project only where the benefits
o a De tollowed by moving through software processlevels.
5 different improv
Each level
that uweigh the costs. However, in order to choose among projects, we need to
l ofo t o account the timing of the costs and benefits as well as the benefits
maturity shows a process relative to the size of the investment.
1 capability level.
Level initial: The
procedures followed tend
haphazard. Soto be n g a r e the some common methods for comparing projects on the
projects may be successful, but
this tends to be basis of their cash flow forecasts:
because
parncular individuals, including project managers. Thereor islevel
no 0 Net profit
ana so any organization would be at this level default. net profit of a project is the difference between the total costs ana tie
Level 2
Managed: Organizations at this levelbywill total income over the life of
Payback period the project.
nanagement procedures in place. However, the way have al tasks
ae camied out will depend largely inu inve ack period is the time taken to break even or pay back the
initial
on the
person doing estment.
Normally, oject with the shortest payback period will be
the proj«
184A Complee TU Solution of
Software Project Manager
CSIT 7m Semester and Practice Sets .185
chosen on the basis that an organization will wish to min means
identifying and alloc resources for a
specific period
a project is 'in debt'.
The advantage of the payback is that it is
period
minimize
the
simpla to calculate timne that
ctheduling
various
types
needed
of
to
to
activities.
meet
Project manager estimate resource
meet the end results and resource allocation
is
these. Each project is an integration of several
. ewulrements
not particularly sensitive to small
casting errors. Its disa
based on
selection technique
Return on investment profitability
the of dvantaod is h ar
te q u i
and ensuring that the right resource is working on the right project
task at
The returm on investment (RO), also known as the acCoutn. ect. pro4S a nanage
right moment. If the resource's skills are not
aligned with the
ing rate of ight #he activity is being pertormed at the wrong project
(ARR), provides a way of comparing the net time, the quality
profitabilityto
he
required. retu c t v i t i e s ,
CHiciently
eating a work breakdow
scheduling project
resources include:
structure that defines all the essentiàl
where this is not the case, then the discount rate should bestandard rate selecting an ments of the project and outlines task dependencies alongside
available interest rates (borrowing costs here the but,
sen to reflect Once the details are sorted out, project managers or
equired skills. hedule resources with the right skills for the project
from loans) plus some premium to reflect the fact project must be coordinators can
that softw
ware funded
inherently more risky than lending money to
isnormally less important than ensuring that
a bank. The
exact
scount rate
projects are activities.
Resource optimization techniques to better manage projects. These
for all projects being compared. discount
rate is
used
might be, for example, resource leveling or resource smoothing.
Internal rate of return Centralize resource planning: in order to centralize resource planning
One disadvantage of NPV as a measure of there should be one schedule for the entire company from which each
profitability is that. ala. ugh it
may be used to compare projects, it might not be directly comn
from other
project manager can get information. This enables planning and
earnings investmernts or the costs of
borrowing capital with Scheduling to be performed in real time by multiple stakeholders and
The IRR is calculated as that
percentage discount rate that would prodtuce ensures that there is no double booking of a resource.
NPV of zero. It is most easily calculated as
Track skills in real time so you can assign the right people to the right
using a spreadsheet or other
computer program that provides functions for calculating the IRR. Microsoh tasks. Individuals are assigned to the right project based on skills,
Excel and Lotus, for example, both provide IRR
with an initial guess or seed value
functions which,
provided experience, qualifications, location, cost ratio, etc. This information
(which may be zero), will search for needs to be up-to-date at all times so that you have a clear and factual
retun an IRR and
6. Why is it necessary to plan the activities?
picture of the situation.
How do you visualize progress of the project? Explain any two types.
Ans: Great planning yields effective results in
every aspect of an organization or Aas Amanager needs some way of presenting that data to greatest effect. Some
individual's activities. A good plan has
clearly defined outcomes and
key
methods of presenting picture are,
milestones to reach that outcome. These
outoomes become an
clearly defined milestones and Gantt chart: tracking project progress .It is the simple and the oldest
integral part of the periodic review process. form of representing the progress of the project. It consists of activity
Necessary to plan the activities are listed below: bar that indicates the scheduled activity dates and the duration along
To understand the nature of the work with the activity floats.
To eliminate or reduce risk Slip chart visual indication of activities that are not progressing to
To ensure the right schedule. Alternative view of Gantt chart by providing a visual indication
employees are assigned to the work of those activities which are not on schedule. The more bend in the greater
To ensure
adequate safety strategies the variation in the project plan. If the slip line deviates more towards the
To develop a framework for monitoring and controlling the work
To improves decision-making non-achievement of project objectives then it has to be reconsidered
7. different types of resources? How do you schedule them in the Additional slip lines can be included at regular intervals
What are
project? Ball charts:
way of showing or not targets have been met or not. It is
Ans represented in the form of circles that indicate the start and the end
A resource is defined as any person or item that is required for the executo
o a project. There are generally seven types of resources in project Pont completion of activities. Circles of the ball chart mostly contain
only two dates the original and the revised one. An activity is denoted
management. by a red circle and green color denotes that the activity is ahead of its
Services Labor
ehedule. Slippage in the date but it is overcome by
project completion
Equipment Materials the timeline charts
Money Space imeLine: The timeline is a method of recording and displaying the way
Time n
which targets have changed throughout the duration of the project.
Practice Sets
1 8 6 A Complete TU
Solution of CSIT7* Semester ond Software Project
terms of a contract.
Management .187
9. Describe the typical S t a n d a r d s
This
example, who is meant
Form of agreement
of sale, a lease, or a licenco
defined, for For
example,
dard relating
a customer can
to the
require the supplier
softwar life cycle
to
and its
conform to
documentation
comply.
the IS0 12207
For cxample, is
it a contact
Also, can the sub-set ofthe standard). Within the (or, more
as a licence to use a software. ly, a customized European
of the contract,
such
application be suby customers with tracts for projects above a certain Union,
threshold
transfe
government
to another party?
Goods and services
to be supplied
software to be supplied includes
sferted value must by law, ensure that the work
conforms to certain standards.
Equipment and an actual list Some customers find that specially written or modified software
to be delivered, is not
individual pieces of equipment complete by the supplier pefore delivery. Sorne
model numbers
with the of thoroughly tested
suppliers seem to
s think that it is cheaper to get the customer to do the testing for them!
Services to be provided covers such things as: spechc
Documentation Project and quality management
Installation
Conversion of existing files The arrangements for ihe management of the project must be agreed.
Among
Mainternance agreements these would be frequency and nature of progress meetings and the progress
Transitional insurance arrangements information to be supplied to the customer. The contract could require that
appropriate ISO 9000-series standards be followed. The ISO 12207 standard
Ownership of the software provides for the customer to have access to quality documentation generated
Who has ownership of the software: Ihere are two internally by the supplier, so that the customer can ensure that there is
key issuee
whether the customer can sell the software to others and. son here firstly, adherence to standards.
the supplier can sell the software to others. Where
ncerned, the supplier often simply grants a off-the-sholc whether Timetable
software. Where the software is being written
software is
that customer will normaly wish to ensure specially a custom for Thisprovides a schedule of when the key parts of the project should be
they may object to software which
exclusive use of
the safthua customer, then completed. This timetable will commit both the supplier and the customer.
-they hoped are For example, the supplier might be able to install the software on the
competitive edge being sold to their rivals. They couldwould this
give thor
them a date only il the customer makes the hardware agreed
the copyright to the software do b platform
available at that
outright or by
exclusive use of the software. This wouldspecitying that they
need to be ha
have should point.
contract. Where a core system has been written into the Price and payment method
customized by
is less
scope for the customer to insist on exclusive
a
supplier, then ther
here
use. Obviously the price is very important! What aiso needs to be agreed is when
Environment the payments are to be made. The
Where physical
supplier's desire to be able to meet costs as
equipment is to be installed, they are incurred needs to be balanced by the customer's requirement to
the the demarcation
suppliers and customer's line between ensure that goods and services are
satisfactory before parting with their
accommodation and electrical responsibilities with regard to such
matters as money.
is being supply needs to be
specified. Where software
supplied,
hardware and
the
compatibility of the software Miscellaneous legal requirements
operating system platforms would need to bewith the existing
Customer commitments confirmed. This is the legal small print. Contracts often have clauses that deal with such
Even when work is matters the legal jurisdiction that will apply to the contract, what conditions
carried out by external contractors, would apply to the sub-contracting of the work,
project still needs the development
a liability for damage to third
to participation
provide accommodation of the customer. The
customer will have
parties, and liquidated damages. Liquidated damages are estimates of the
for the financial losses that the customer would suffer if the
as telephone lines. suppliers and perhaps other facilities sudn short of their
supplier were to fall
obligations. It is worth noting that under English law, the
Acceptance procedures penalties laid down in penalty clauses must reflect the actual losses the
customer would suffer and cannot be unrealistic and
Good practice would be to merely punitive.
ungergone user acceptance tests.accept
details as
delivered
This part of
a
system only after t 10. Describe Verification and Validation of the
Program.
the time the contract would Ans: Software testing is a
that the
customer wilI have to conductspecuy process of the exanmining functionality and behavior of
deliverables upon which tlhe software through verification and validation. Verification is
the a
process of
signing off the testing as acceptance tests depend and the f determining if the software is
designed and developed per the specified
completed. pio as
Software Project Manogement
.189
Solution of CSIT 7 Semester and Practice Sets
T88.A Complete TU uration is the functional and physical characteristics of a product as
of checking if ontigurati
requirements.
Validation is the process
and expectatione
the software (end figura specification and achieved through the deployment of project
true needs ns. in its
the client's ned
product) has met anagementp l a n s
question Aesignedinputs
is
and
a for
developed
developmer
to
requiro in
oblems with
software development tools have configuration management
for the the sottware
Specifications act as
sood the
on the speciPOcess, ents, n t SO
curent
for any
is
software application
WTitten based on
specifications documeni
nent.
features builtin.
of configuration
management
check ifthe
software being developed has Purpose of configurati management is to identify,
Verification is done
at every stage
of the
development hered to Within a
ject, the purpose liverables or from unauthorized
these specifications ycle the project's products
1s in une with specifica nd protect
verification ensures
that thecode iogiC tions. The track
the ssets
venification checks the project's
of products in use and in existence and hold
Further, that begins well in advvance over
Verification is a
continuous process
of sDecify the versions
processes and
runs until
the software application is validated and validatio information on their status,
who owns them and relationships between
are:
eased. them
of the verification pieces
these of information
The main advantages record containing
at every stage of the softwaro maintain an up-to-date
It acts as a quality gateway
process.
teams to develop products that
development control changes to the products ensuring
the agreement
that changes
of appropriate named authorities
are made only
memboers
am recognize
that the
N o r m t n gs t a g e
ards teamifterent
the table. And through the storming stage, confli is resolved and
bring to
vou play in
the team and
how you contribute tou.
for
don't impor
understand mehenlbery
me Aant
pertormance
(leamsget
et degree
merges. In the norming stage, consensus evelops around who
o fu n i l t yc m e r g e s
the
some
Performing stage
In the pertorming stage, consensus and cooperati
can slid back into
followed. to be
Management Full Marks: 60 +20+ 20
Important aspects like test estimation, test scope, Test Stra. Software Project
Pass Marks: 24+8+8
ManagementStrategy are u r s e1Tille:
documented in Test Plan, so it can be reviewed by o u r s eN o : C S C
15
4 1 5
Credit Hrs. 3
+ Lab
and 1heory
re-used for other projects ( of the
Course:
change. Duration
The plan is
updated is a change approved.
is Reporting day
Implementation where the necessary actions are taken and monitored. Cost/day (Rs.) Total Cost
Activity Duration (days) Precedence 200 1600
200 800
A, B 300 1200
400 1600
B
SV
BCWP BCWSS CPICV SPI
ActivityACWP 1600
1400 1600
A 800 800
400
900 900
C 1000
1000 800 800
D 0.105 0
4000
Total 38000 4000
3400
194. A Complete TU Solution of CSIT 7 Semester and
CP-BCWP/ACWP = 0.105
Practice Sets
Proel
Sotware Project Management.. 195
CV BCWP- ACWP= 34000
P a y b a c kP e r i o d
SPl BCWP/ BCWS 1 Period shows how long it, takes for a business to recoup an
The yback
SV-BCWP - BCWS =
0 This type of analysis allows firms to
compare alternative
nent. lecide
Differentiate between progr.
investm
opporlunities project that returns its investment
and on a
2
Define Payback period. How can it management and invest
ment
time if thatcriteria is important to them.
ed as an
What are its advantages and disadvantages? ortfolio managemen in
the
shortest
coordimannatageedmenmat nnerha
diminish over
manages dissimilar projects, programs in a grouptype of ma exactly when payback occurs, the following formula can be used.
To find
objectives.
Major differentiate between them
agement
hieve main stra tha
-
Initial invest1nent
Opening cumulative Cash Flow
are
tabulated beloww: =
Program Management
avback period Closing Cumulative Cash Flow
It mainly focuses on management It
Portfolio Management - Opening CumulativeCash Flow
one or
The ballot receiving server
-
(70000-50000)/50000*100% 20000/50000*100%
=
not been cast =
through different channels in controlled as well as easily adjustable to voti (activity) is recursively decomposed and divided into smaller sub-activities,
uncontrolled
tasks, removes theenvironme
This simplifies the audit and certification two weeks to
until at the leaf level, the activities require approximately
technical barriers against
changes if the problem develop and can be given to a single development
team. It follows top-down
technological or political conditin
change, and helps the voter feel confident under the new approach.
Incoming ballots should be registered on a conditions.
"write-once" Hybrid approach:
preclude deletions or overwriting of the ballots. medium b In this approach, an alternative work breakdown structure is constructed
affects the quality of the software. Because of high competition and result, Path I:
Start A->B->D->End
technology, it has become even more challenging for the development ing 5+3+10-18
the project managers to cope with tight deadlines. and cost:
of total path
Changing project requirements and priorities: One of the s u . Path II:
challenges in software project management is
changing requirements A - C > D > E n d
priorities. The needs of the clients may change as the project and Start 5+5+10=20
when that happens, extra time, cost, and resources need progresses
cost:
. And Of total path II is a critical path.
which further impacts the project.
ala
to be allocated
I has more cost than path I so path
Since path
Maslow's hierarchy of
needs. (5)
Poor communication: Poor communication with Explain In teams, there a r e
clients, other stakehold. describes the of individual person.
needs
and the
development team affects the overall project. blders, Ans:
Maslow's theory
whose needs should
be satisfied. In order
to lead the team
individuals should
Skills managers
management: One of the biggest challenges of a project many successful project delivery, project
finding the right team with the skills and experience to finish themanager is ofindividuals to
members are not skilled job. If tha recognize that need.
enough, then the chances of failure increases. It puthe in Project Management
the project managers in a puts Self-actualizetion
risky situation. empower personal growth
and interests
technology may not work tomorrow. So, it is essential to get thing. Today's empyee's achievernentand
companYs mission
software. As project might have already developed the basic things to provide
managers, they should consider this. know their salaries.
team members ventilated, and
7 Draw precedence network
diagram for the following and
Salary: Let your
Comfortable place to
work at: Make s u r e the
office is clean,
for employees
critical path. the identify should be a suitable place
comfortable to work in. Also, there
Activity Duration (weeks) to eat and rest.
they don't perform
well
5 Precedence No distractions at work;
54% of workers
Once when a
cited that
worker is
distractions at work.
should because of
locused
minutes to get
as they
Gloria Mark, it
takes them 23
according to
distracted, use and unnecessary
D A technology for personal
10 again. Encourage limiting
B,C meetings.
200 AComplete TUSelutionof CSIT 7 Semesterand FPractice Sets
Software Project Management 201
Enough sleep: Don't send tasks or email out of workin.
Set clear goals: Everyone should know why the orking time or planning and Identification: The first step in the process is plannin
teams hol
Once you have communicated these categories, th and identification. In this step, the goal is to plan for the development
Every team member is provided with a them, m will folow ofthe software project and identity the items within the scope. This is
fulfilling psychological needs, there come safety
place, money, and
eeds. accomplished by having meetings and brainstorming sessions with
em
acco
Safety in Project Management your team to figure out the basic criteria for the rest of the project.
After you fulfill primary needs, there come Version Control and Baseline: The version control and baseline step
hierarchy of needs in project managemen such as econdary needs 2,
ensures the continuous integrity of the product by identifying an
Even though it seems easy, research has shown
Masl ty, in accepted version of the software. This baseline is designated at a
1 security,
that
trust their employer. To avoid
employeesthat, and
3 employee
should be sure trus specific time in the SCM process and can only be altered through a
salary and work conditions. formal procedure.
Social Needs in Project Management don The point of this step is to control the changes being made to the
Love and
theu
belonging needs in a business
environment are a product. As the project develops, new baselines are established,
than in private life. Even though the resulting in several versions of the software.
colleagues miohi little bi
interpersonal skills, all team members should feel
Moreover, building trust and motivating the
team are
people whoailfernt 3. Change Control: Change control is the method used to ensure that any
changes that are made are consistent with the rest of the project.
projectmanagers should have. To help your coworke Having these controls in place helps with quality assurance, and the
the team, there are a few things to do: feel oft skil approval and release of new baseline. Change control is essential to the
Esteem in Project Management belonging htin successful completion of the project.
Employees are more motiva work when
to 4. Configuration Status Accounting: The next step is to ensure the
their intermal team and the external they feel
feel competent and efficient inside public They are appreciat ed, bothb projectis developing according to the
plan by testing and verifying
Therefore,
their team. motivated when the
according to the predetermined baselines. It involves looking at release
to motivate them, a notes and related documents to ensure the software
meets all
Further, praising the suocoesses project manager should show functional requirements.
of employees will an
these needs are
gratified, we can expect more creativityakefrom
them appreciated. 5. Audits and Reviews: The final step is a technical review of
every stage in the
Self-actualization in Project Management team memh Ate software development life cycle. Audits and reviews look at the
process,
Humans have a natural nbers. configurations, workflow, change requests, and everything that has gone into
the rest of their needs aretendency
to
express themselves in developing each baseline throughout the projece's development.
personal interests with theirfulfilled, different waays.
work. there
are
Self-actual many ways they combine the The team performs multiple reviews of the application to verify its
9.
is using
creativity to improve your role alization
at work.
in
project managemet integrity and also put together essential accompanying documentation
Briefly explain different quality factors. such as release notes, user manuals, and installation
Ans: The various guides.
factors, which influence the 11. Different between Gantt chart
factors. They can software, are termed as and slip chart. (5)
the factors is of be broadly divided into two softwa Ans: A Gantt chart,
commonly used in project management,
those that can be categories. The categoryd
logical errors, and the second measured directly such as first
is one
popülar and useful ways of showing activities (tasks or events) displayed
of the most
For
example, on Day 0 of the project you announce you will ship in 90 days.
Ans: Software process of Software ConfigurationReusability, Interoperability On day 90,
computer configuration
you ship. Your slip chart consists of the point (0, 90) and (90, 90).
management (SCM) refersManagement
systems, servers, to a That is, you finished
exactly when you said you would up front, and your
ne sorware
and software in a
desired, process for maunaa graph is a horizontal line.
to track configuration consistent state 12
and
manage all management process is series of steps desigi
a
Write short notes on:
and
budgets throughoutthea defects, resources,s, codes, documents, a. Present worth:
nvolving people at project. SCM is an interdisciplinaryhardproces
every level,
Ans: Present value is the
concept that states an amount of mnor today is worth
managers/owners, SysAdmin and testers.including DevOps, developa proyect more than that same amount in the future. In other words, money received
in the
future is not worth as much as an equal amount received today.
202A Complete TU Solution of CSIT 7 Semester and
Software Project Management 203
Practice Sets
For
example, if an investor receives $1,000 today and Differentiate
between project life cycle. What do you mean by project
return of 5% per a. can eam
year, the $1,000 today is planning andscheduling
Teceiving $1,000 five certainly worth moro
from now. If an
years investor waited five Expla ware
the softwa configuration management with its roles and tasks.
$1,000, theere would be an an
the rate of returm for the opportunity
cost or the investor
five years. would lose Section B
b. PERT chart
Ans: A PERT chart is a Attem EIGHT
questions.
any EIG
8x5 40)
project
coordinate tasks within amanagement
tool used to involved in stepwise project planning?
schedule, organizo Explain the various steps
project. PERT stands for
process of nalysis
the cost benefit in project evaluation.
Review Technique, a
to
methodology developed by the U.S.Program Evalnd
Navy in +hon Explain the
application development.
manage the Polaris submarine missile program. A Explain rapid
the
the Critical Path Method similar methodals factors needed for allocating a
task? Explain.
(CPM) was tor developed project
.
What are the
the private sector at about the same time. managemenin Discuss
about control with example.
change
A PERT chart
presents person for the job.
selecting the right
a
graphic illustration
projert ot a
Explain about
the
diagram consisting of numbered nodes (either circles nehwo
work
as a
9. the process of effort estimation usingfunction point analysis
representing events, or milestones the project linked
in
or
rectanole Explain
(directional lines) representing tasks in the project. The by
labelled vect with example
and disadvantages of COCOMO?
arrows on the lines indicates the direction of thohe
sequence of tasks. For example: 11. What are the advantages
on:
Write short notes
12 b. SPM tools
5 d a y s
a. SQA plan
3 days
2 days 6 days
MODEL SET 2
3 days
3 d a y s
64days /2days
Section A
2 days 3 days (2 x 10 20)
Attempt any TWO questions. that a software project mnanager
activities
1. Explain the important
planning.
performs during software projectdifferent
is from other project. Explain the
2. How software
are the project
different phases of software project life cycle.
software project
MODEL QUESTIONS SETS FOR PRACTICE 3. Explain the different techniques
for enhancing the quality of
Section B
(8x5 40)
Attempt any EIGHT questions.
framework.
4. Explain about SPM
MODEL SsET 1 5. Differentiate between rapid application,
development and waterfall
model.
Course Title: Software Project contents list of projectplan.
Management Full Marks: 60+20+ 20 6. Explain the reduction.
Course No: CSC415 Differentiate between
risk planning and risk
7.
Nature of the Course: Pass Marks: 24 +8+8 major workflows
involved in software development.
Theory + Lab Credit Hrs. 3 8. Describe the
project?
Semester: VII How network
chart help scheduling
in a
SPM tools
management cycle and SPM framework. project SQA plan b.
Software Project
Z04A Complete TU Solution of CSIT 7 Management .
205
Semester and Practice Sets at least seven deliverables in a software project
M e n
Low
How can we do project monitoring and control? Explain.
Section A Discuss
the role ofcost estimation in software development project.
Attempt any TWO questions. 12
Write
s h o r t notes o n :
1. Outline the contents of Software Project (2 x 10 13
b Earned value
Management plan 20)
a Resource allocation
explain in detail. a.
and
2 Explain in detail about critical path
scheduling method
Explain the various maturity levels of SEl CMM and with examnla
key process areas for each level. also discuss the MODEL SET 5
Section B
Attempt any EIGHT questions. Section A
4 Explain the SPM framework. (8 x5 40)
5. Attempt any
TWO questions. (2x 10 20)
Differentiate between project life cycle and
Comparison between waterfall model with product
6. life cycle. Explain the software engineering problem. What do you mean by
7. Explain objectives of activity planning
the spiral model. software project management? Explain.
8. Explain the Gantt Charts in Scheduling with Diferentiate
9. example. What do you mean by rapid application development?
What are the roles of Software prototyping model.
models and
spiral
10 Explain the function of softwareEngineer
in a project? between
Explain. its tasks and roles.
configuration management.
11 Explain the three modes of the basic 3 Explain the software configuration management and
12 Explain the COCOMO model.
SQA plan with example. Section B
13. Write short notes on:
a. Charge Control b.
Attempt any EIGHT questions. (8x5 40)
Software Quality 4. What do you mean by SPM framework?
5. Explain the product life cycle.
MODEL SET 4 6. Explain the cost-benefit evaluation techniques.
7. Explain the network planning model with example.
What do you mean by resource allocation?
What do you mean by change control?
Section A contract? Mention the different types of
Attempt any TWO questions. 10. Explain the typical terms of
in the team in the software project management.
1. What is project? (2 x 10 20) people and validation? Explain with
Explain different phases of project 11 What do you mean by verification
2.
Explain in the cost benefit planning.
techniques of cost benefits. analysis
in details. example.
Explain the evaluation Write short notes on:
3. 12.
Explain SEI Capability Maturity Model
the Visualizing progress b. Test strategies
(CMM) and SQA plan. a.
MODEL SET 6
Section B
Attempt any EIGHT questions.
4. What do you (8x 5 40)
5.
mean by SPM framework?
Explain the product life cycle. Section A
b. What do you mean (2 x 10 20)
7.
by cash flow forecasting? Attempt any
TWO questions.
Discuss the concept of project management cycle. What are the five competencies
8 PERT/CPM in software project management. 1. Explain the
Explain the QA organizational structure. of project management
skills? Explain
Complete TU Solution of
CSIT 7h
Semester
What are
the
and Proctice Set
and managersfive maturity level of CMM? Seftwrare Project Manogement
207
aboutSCM
tasks and tools.