0% found this document useful (0 votes)
26 views122 pages

KEC Combined

The document outlines the curriculum and practice sets for various courses in the B.Sc. CSIT (VII Semester) program, including Advanced Java Programming, Principles of Management, Network Security, Data Warehousing and Mining, and Software Project Management. It includes model questions, answers, and practice sets for each course, along with detailed course descriptions and objectives. The document serves as a comprehensive guide for students to prepare for their examinations and practical applications in these subjects.

Uploaded by

mdazmanalc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views122 pages

KEC Combined

The document outlines the curriculum and practice sets for various courses in the B.Sc. CSIT (VII Semester) program, including Advanced Java Programming, Principles of Management, Network Security, Data Warehousing and Mining, and Software Project Management. It includes model questions, answers, and practice sets for each course, along with detailed course descriptions and objectives. The document serves as a comprehensive guide for students to prepare for their examinations and practical applications in these subjects.

Uploaded by

mdazmanalc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 122

ACOMPLETE TU SOLUTION

&PRACTICE SETS
B.Sc. CSIT (VII Semester)

Al ects

Features FOR
New Syllabus
Model Questions-Answers
TU Questions-Answers
Model Questions Secs
2079
CONTENTIS

Advanced Java Programming (CSC409) 1-46

New Syllabus *i.. . .. .

Model Questions-Answers.. sssdsn. ..***** ***********"****""""**********************.3

TU Questions-Answers 2078. * ************** *****


******. LZ

Model Questions Sets For Practice

SET 1..... **********"***°°***


******* 39 SET 2..****°'***************° ***********..40
SET 3... ********** SET 4. 42
SET 5.. 43 SET 6...*****°*** 43
SET 7...
************** ************** °*o*****o**** 44 SET 8...
* *********°****°******"*°**************
45

Principles of Management (CSC411) 47-100

New Syllabus... *****" 47

Model Questions-Answers 49

TUQuestions-Answers 2078 75
Model Questions Sets For Practice

SET 1... *********


**..94
SET 2....... 5
SET 3...
**** * * * * * * *
.96
. SET 4... .97
SET 5...
O....e******* ..97 SET 6... 98

SET 7. * * . .99 SET 8... * * * * * * * * * 100

Network Security (CSC416) 101-130

New Syllabus... *************************************


101

Model Questions-Answers. ***** ************** ********** ***


103

TU Questions-Answers 2078.. ******* **** ***°**


114

Model Questions Sets For Practice

SET 1. * * * * * * * *
... 126 SET 2...****" 127

SET 3... ************ * * * * * * * * * * * * * * * * * * * .127 SET 4..***** 128

SET 5.. *** ***


.128 SET 6... 129

SET 7...
************* * * * * *
..129 SET 8. ***********
* * * * * *
. . 130
Data Warehousing and
Data Mining (CSC 410) 131-176
************ ***

************ 131
New Syllabus. ************ **********

Model Questions-Answers.. ************** *******"*******.. 133

2078.. ****** ***************ev 153


TU Questions-Answers
For Practice
Model Questions Sets
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
.170
* * * * * *
SET 2.. ***********"
.171
SET 1..
SET ********************************
...172 SET 4.... ************************** .173

SET ****************************** *****


...173 SET 6.. **************. .174
SET ***************************************°***
...175 SET 8.. ********** .176
.....

Software Project Management (CSC 415) 177-207


New Syllabus . .********************* 177
Model Questions-Answers. ********** ********* 179

TU Questions-Answers 2078...******** . 193


Model Questions Sets For Practice

SET 1.************************* ***** ..202 SET 2. *************** 203


SET 3..
*******************************************
....204 SET 4. 204
SET 5.. *********************************.205 SET 6. 205
SET 7.. ******
** ** ************** .206 SET 8.. .207
Advaneed Java Programming
New Syllabus
Full Marks:60+ 20+20
Course Title:
Advanced Java Programming
Course No: CSC409 Pass Marks: 24 +8+8
+Lab Credit Hrs.:3
Nature of the Course: Theory
Semester: VIlI
well
familiarizes students with basic
as as
This course
Course Description: to GUI and event-
Emphasis will be given
advanced features of Java Programming Servlets and
Database Connectivity, Socket Programming,
drivenprogramming
and Distributed Programming.
SP Technology,
Course Objectives
of this course is to
The main objective
Introduce basic concepts of Java Programming.
GUI programming and JDBC
Exemplify the concept of and servlet and JSP
Demonstrate socket
remote
programming. objects,
Technology
Course Contents (8)
Unit 1: Programming
in Java (8 Hrs.)
Path and Class Path variables, Sample
Architecture, Java Buzzwords,
1.1. Java
and Running Java Programs.
Java Program, Compiling Overloading, Access Privileges,
for each loop, Class and Object, Inheritance,
1.2 Arrays, and Static Modifiers, Packages,
Final
Interface, Inner Class,
Overriding. Throws, and Throw keywords,
1.3. Handling Exceptions: Try, Catch, Finally,
Creating Exception Class.
Writing
Multithreaded Programs,
Introduction, Thread States,
1.4. Concurrency: Thread Priorities
Thread Synchronization,
Thread Properties, Classes, Random
Stream Classes, Character Stream
1.5. Working with Files: Byte
File, Reading and Writing Objects. (10 Hrs.)
Access (10)
with Swing Life
Interface Components
Unit 2: User
of AWT, AWT vs. Swing,
Java Applets, Applet
2.1. Introduction: Concept Containers
Class Hierarchy, Component and Grid Layout,
Cycle, Swing Flow layout, Border Layout,
2.2. Layout Management:
No Layout,
Grid bag Layout, Group Layout. Scroll Pane, Labels,
Password Fields, Text Areas,
2.3. GUI Controls: Text Fields, Sliders
Radio Buttons, Borders, Combo Boxes, Buttons in
Check Boxes, Check Box and Radio
Menu Items,
2.4. Menu, Menu Item, Icons in and Accelerators,
Mnemonics
Keyboard
Menu Items, Pop-up Menus, Tooltips
Menu Items, Toolbars, Choosers, Internal
Enabling and Disabling Choosers, Color
Creating Dialogs, File
2.5. Option Dialogs, and Tables.
Frames, Frames, Tables,
Trees, (4)
Unit 3: Event Handling (4 Hrs.) Interfaces, Using Action Commands,
Listener
3.1. Event Handling Concept,
Window
Adapter Classes Mouse Event,
Events, Focus Events,
Events, Key
32.
Handling Action (4)
Event, Item Events
Unit 4: Database Connectivity (4
Hrs.) Configuration, Managing
Driver Types, JDBC
4.1.JDBC Architecture, JDBC Result Set, SQL Exceptions
Connections, Statements,
of CSIT 7h Somester
and Practice Sets
TU Solution
2 . A Complete
Prepared Statements, AM.

Sets and(Mulached
tiple
Operations using Java,Result Sets, Row
4.2 DDL and DML Updateable
Scrollable Result Sets,
Results,
Transactions, SQL Escapes.
Row Sets,
(5 Hrs) 5
Network Programming atocol (TCP),
(TCP), Use
User Datagram Protocoi (UDP), Por
Unit 5: Protocol
control
Transmission
5.1. Classes in JDK
Network
IP Address using UDP, Working
Socket rogramming using TCP, Socket programming
Class.
rking
5.2 with URL
Connection
with URL's, working Receiving Email
Mail APl, Sending and
5.3. Java

Unit 6: GUI with


JavaFX (3 Hrs.) (3)
Javarx Layouts: FlowPane, BorderPam
6.1. Introduction, JavaFX vs SWng
Hbox, VBox, GridPane

Controls: Label, extriela, Button, RadioButton, CheckBox.


6.2 JavaFX UI FileChooser.
Hyperlink, Menu, Tooltip,
Server pages (8 Hrs.) (8)
Unit 7: Servlets and Java
Web Container, Introductiorn
to
Serviets, Life cycle of servlets, The servlet
71,
APls, Writing Servlet Programs,
Keading Form Parameters, Processing
Forms, Handling HTTP Request and Kesponse (GET/ POST Request)
Cookies and Session.
Database Access with Servlets, Handling
7.2. Servlet vs. JSP, JSP Access Model, JSP Syntax (Directions, Declarations.
Expression, Scriplets, Comments), JSP Implicit Objects, Object Scop
Access with JSP.
Processing Forms, Database
Frameworks
7.3 Introduction to Java Web
Unit 8 RMI and CORBA (3 Hrs.) 3)
8.1 Introduction, of RMI, Architecture of RMI, Creating and Executing RMI
Applications
8.2 Introduction to CORBA, RMI vs. CORBA, Architecture of CORBA, IDL
Simple CORBA Program.

Laboratory Work
The laboratory work includes writing programs related to basic java programming
concepts, Designing GUL, Event Handling, JDBC, Network Programming, Web
Programming, and Distributed Programming. They also learn to develop web
applications using Java Web Frameworks.
Text Books:
Cay S. Horstmann, Core Java Volume i-Fundamentals, Pearson, Eleventh

Edition, 2018
2. Cay S. Horstmann, Core Java Volume l1-Advance Features, Pearson, Elevenu
Edition, 2019
3. Herbert Schildt, Java: The
Complete Reference, McGraw-Hill Educat
Eleventh Edition, 2018
Reference Book:
1. D.T. Editorial Services, Java 8
Programming Black Book, Dreamtech Press, 01
Advanced Java Programming..3

TRIBHUVAN UNIVERSITY
Institution of Science and Technology

MODEL QUESTIONS-ANSWERS

Course Title: Advanced Java Programming Full Marks: 60 +20 +20


Pass Marks: 24 +8+8
Course No: CSC409
Credit Hrs.3
Nature Course:
of the Theory +Lab
Semester: VII
Section A
(2 x 10 20)
Attempt any two questions.
1. What are the uses of final modifier? Explain each use of the modifier with
suitable example. (1+9)
modifier used for classes, attributes
Ans: The final keyword is a non-access

If we initialize a
and methods, which makes them non-changeable.
its value. If we
variable with the final keyword, then we cannot modify
subclasses.
declare a method as final, then it cannot be overridden by any
restrict the other classes to inherit
And, if we declare a class as final, we
or extend it.
a c c e s s modifiers and non-
There are two types of modifiers in java:
access modifiers. The access modifiers in java specity accessiblity
data member, method, constructor or class.
(scope) of a
four types of java access modifiers:
There are

1. private
2. default
3. protected
4. public static, abstract,
There are many non-access modifiers such
as

we wiil learn access


synichronized, native, volatile, transient etc. Here,
modifiers.
Private access modifier
within class. In following
The private access modifier is accessible only
and Simple. A class contains
example, we have created two classes A
are accessing these private
private data member and private method. We
time error.
members from outside the class, so there is compile
class A

private int data=40;


private void Message()
{
System.out.println("Hello java");

public class Simple

public static void main(String args[])

A obj=new A() Time Error


System.out.println (obj.data) ;//Compile
and Practice Sets
4 A Complete TU Solution of CSIT 7th Semester
Time Error
obj.Message () ;//Compile

Default access modifier


If you don't use any modifier, it is treated as default by default. Tho
default modifier is accessible only within package. In following example
we have created two packages pack A and pack B. We are accessing the
class from outside its package, since A class is not public, so it cannot ha
be
accessed from outside the package.
//save by A.java
package packA;
class A

void Message()

System.out.println("Hello");

//save by B.java
package packB;
import packA.*;
class B

public static void main(String args[])


A obj new A(); //Compile Time Error
obj.Message(); //Compile Time Error
In the above
example, the of
scope class A and its
default so it cannot be accessed method Message) is
from outside the
Protected access modifier package.
The protected access modifier is
outside the package but accessible within
through
modifier can be applied on the data inheritance package and
only. The protected
can't be member, method and access
applied the class. In
on
constructor. It
two packages packA and packB. The following example, we have
A created the
so can be
accessed from outside the class of But packA package is public,
this package is declared as package.
protected, so it can be . Message0 method
the class only
through
//save by A.java
inheritance. accessed from outs oftside
package packA;
public class A
{
protected void
Message ()
System.out.println("Hello") ;

1/save by B.java
package packB;
Advanced Java Programming...5

import packA. *;
class B extends A

public static void main(String args[])

B obj new B();


obj.Message ();

Output: Hello
public access modifier
The public access modifier is accessible everywhere. It has the widest
scope among all other modifiers.
Example: Java program showing use of public access modifier
Wsave by Ajava
package packA;
public class A

public void Message0

System.out.println("Hello");

lsave by B.java
package packB;
import packA. *;
class B

public static void main(String args|)

A obj = new A0;

obj.Message0;

Output: Hello
Understanding all java access modifiers
Let's understand the access modifiers by a simple table.

Access within within outside package by outside

Modifierclass package subclass only package

N N N
Private Y
Y N N
Default Y

Protected Y Y Y N

Y Y Y
|Public Y
form with user id, password, ok
2. Write a program to create login
java such that pressing T
button, and cancel button. Handle key events id
performs login and pressing clears text boxes and púts focus on user
'c
box. user table having fields
Uid and Password in the
text Assume
database named account.
(10)
6 A
.
Complete TU Solution of CSIT 7th Semester and Practice Sets

Ans:
LoginFrame.java
import javax.swing.*;
import java.awt.*;
import java.awt.event.*;
import java.sql.sQLException;
public class LoginFrame extends JFrame

JLabel userIdLabel, passwordLabel;


JTextField userIdTextField;
JPasswordField passwordField;
JButton okBtn, cancelBtn;
JFrame self;
public LoginFrame ()
self this;
userIdLabel new
JLabel("üser ID");
passwordLabel = new
JLabel("Password");
userIdTextField JTextField (20);
=
new
passwordField new JPasswordField (20);
okBtn new
=
JButton( "OK");
cancelBtn new
3JButton ("Cancel")
=

okBtn.addAction Listener(new ActionListener()


@Override
public void
actionPerformed(ActionEvent e)
new JFrame ()
{
JLabelmessagelabel new JLabel();
=

LoginService loginService nen


LoginService();
String user userIdTextField.getText();
String password new String (passwordField.
getPassword ())
try {
if (loginService. isAuthenticated(user
password))
messagelabel.setText
("Login Success!")
else {
messageL abel.setText ("Invalid
credentials! ");

catch (SQLException ex)

ex.printStackTrace();
messagelabel. setText (ex.getMessage
finally {
add(messagelabel)
setSize(200, 100)
Advanced Java Programming.. 7
setVisible(true);

this.addMouseListener (new MouseAdapter()

@Override
public void mouseClicked (MouseEvent e)
super.mouseclicked (e);
self.requestFocus();

this.addKeyListener(new KéyListener()

@Override
public void keyTyped (KeyEvent e)

@Override
public void keyPressed (KeyEvent e)

if (e.getKeyChar() ==
1')

okBtn.doclick();
else i f (e.getkeyChar() == 'c')

userIdTextField. setText("");
passwordField. setText ("");
userIdTextField .grabFocus();

@Override
public void keyReleased (KeyEvent e)

this.set Focusable (true);


this.setSize (300, 500);
this.set Layout (new FlowLayout (FlowLayout. LEFT));
this.add(userIdLabel);
this.add(userIdTextField)
this.add(passwordLabel);
this.add(passwordField) ;
this.add(okBtn) ;
this.add (cancelBtn);
this.setVisible(true);

public static void main(String[] args)

new LoginFrame () ;
Solution of CSIT 7th Semester and Practice Sets
8 A Complete TU

Loginservices.java
import java.sql.Connection;
import java.sql.PreparedStatement;

import java.sql.ResultSet;
import java. sql.sQLException;
public class LoginService

Connection connection;

public LoginService()

public boolean isvalidUser (String user) throws


ows SoLE
SQLException
{ "SELECT Uid from I
user WHERE
String query
PreparedStatement ps = Connection.prepareStatement

ps.setString(1, user);
ResultSet rs = ps.executeQuery);
ent(query)
return rs.next();

Dublic boolean isAuthenticated ( String user, String passr


throws SQLException HOrd)

if (!isvalidUser (user)) return false;


String hashedPassword = "";

String query "SELECT Uid from user WHERE Uid =


Password = ?";
PreparedStatement ps = connection.preparestatement (query):

ps.setString(1, user);
ps.setString (2, hashedPasSword);
ResultSet rs ps.executeQuery();
return rs.next();

3. Discuss various scopes of JSP objects briefly. Create a HTML file wih
principal, time and rate. Then create a JSP file that reads values from t
HTML form, calculates
simple
interest and displays
it. 4+6
Ans: The availability of a JSP
object for use from a particular place ot u
application is defined as the scope of that JSP object.Object scope
segregated into four
parts and they are page, request, sessi and
application.
Page Scope:
Fage scope means, the JSP object accessed only from within the same
where it was created. JSP implicit objects out,
exception, re pone
pageContext, config and page have page scope
//Example of JSP Page Scope
Jsp:useBean id="employee class="EmployeeBean" scope="pagee"/»
Request Scope:
A JSP object created using the page

that serves request scope can be aaccessed from anre


that request. More than page can serve asingle
a
sing
Implicit object request has the request one
1/Exmple of JSP
Request Scope scope.
Advanced Java Programming... 9

jsp:useBean id="employee" class="EmployeeBean" scope="request"/>


Session Scope?
Session scope means, the JSP object is accessible from pages that belong to
the same session from where it was created. Implicit object session has the
session scope.
1/Example of JSP Session scope
sjsp:useBean id="Employee" class="EmployeeBean" scope="session"/>
Application Scope
A JSP object created using the application scope can be accessed from any
has the
pages across the application. The implicit object application
application scope.
1/Ecmaple of JSP application scope.
jsp:useBean id="Employee" class="EmployeeBean" scope="application"/>
Second Part
index.html
html>
<head
meta charset="UTF-8">

<title>Simple Interest</title»
</head
<body
h1>Simple InterestF</h1>
<form action="index.jsp">
Enter the principal: <input type="text" name="principal"><br />
cbr /> Enter the time: <input type="text" name="time">xbr />
<br /> Enter the rate (%): <input type="text" name="rate"><br />
value="Calculate">
<br / <input type="submit"
</form>
</body
/html>
Index.jsp
<html
<head
<meta charset="UTF-8"
<title>1SP Page«/title
/head
body
double p = Double. parseDouble(request.getParameter ("principal "))
double t = Double.parseDouble(request.getParameter("time"));
double r = Double. parseDouble(request.getParameter("rate"));
double interest (p * t r) / 100;

<h1
Simple Interest <K=interest X»
</h1
</body
</html
Sets
7h Semester and Praçtice
Solution of CSIT
TU
A Complete Section B
10.
(8 x5 40)
questions. of Employee class in the file
in
Attempt any eight that
writes objects
interest.
Write a java program of
class as your 5
4. Create
Employee
named emp.doc.

Ans: import java.io. "; S e r i a l i z a b l e

implements
class Employee

p r i v a t e S t r i n g name;

private int age; int age)


name,
(String
public Employee

this.name = name

this.age = age;

@Override
public String toString()

"
name
Age:" + age;
"Name: +
return

class RWObject

static void main(String[] args)


public
new Employee ( "Arjun", 20);
Employee employee1
=

Employee employee2 = new Employee ( "Ram", 20)


try
FileOutputStream fileOutputStream = new File0utputStream

("emp.doc");
ObjectoutputStream objectoutputStream = new ObjectOutputStream
(fileoutputStream) ;
1/Write object to file
objectOutputStream. writeObject (employee1) ;
objectoutputStream.write0bject(employee2) ;
objectoutputStream.close() ;
fileOutputStream.close();
FileInputStream fileInputStream new
FileInputStream("emp.doc");
ObjectInputStream objectInputStream = new
(fileInputStream); ObjectInputStream
//Read Objects
Employee employee
(Employee) =

objectInputStream.readObject();
Employee employee3 (Employee)
objectInputStream read0bject ( ):
.

System.out.println(employee. toString () ):
System.out.printlnclose();
objectInputStream. (employee3.toString0%
fileInputstream.close() ;
Advanced Java Programming... 11
catch (Exception e)

e.printStackTrace();

What are layout managers? Explain Gridbag layout with suitable example.
5.
(1+4)
Ans: The LayoutManagers are used to arrange components in a particular
manner. The Java LayoutManagers facilitates us to control the positioning
and size of the components in GUI forms. LayoutManager is an interface that
is implemented by all the classes of layout managers. There are the following
classes that represent the layout managers:

java.awt.Borderlayout
java.awt.FlowLayout
java.awt.GridLayout
java.awt.CardLayout
java.awt.GridBagLayout
javax.swing. BoxLayout
javax.swing.GroupLayout
javax.swing.ScrollPaneLayout
javax.swingSpringLayout etc.

GridBaglayout
The gridbag layout is a flexible layout manager that aligns components
vertically and horizontally, without requiring that the components be of the
same size. It maintains a dynamic rectangular grid of cells with each

component occupying one or more celis. Each components managed by a

grid bag layout is associated with an instance of GridBagConnstraints that


specifies how the component is arranges within its display area.

Example
package project3;
1/Java program to demonstrate GridBagLayout class.
import java.awt.*
import java.awt.event.*;
import javax.swing.JFrame
import javax. swing.";
public class GridbagDemo extends JFrame

GridbagDemo ()
setTitle ("GridBagLayoutDemo") ;
JPanel p = new JPanel () ;
P.setLayout (new GridBagl ayout( ));
GridBagConstraints c = new GridBagConstraints ();
C.insets = new Insets(2, 2, 2, 2);
C.gridx = 0;
C.gridy 0 ;
12.A Complete TU Solution of CSIT 7th Semester and Practice Sets
C.ipadx = 15;
C.ipady=50;
p.add(new JButton("Java Swing"), c)5
C.gridx = 1;
c.ipadx = 90;
C.ipady = 40;
P.add(new JButton("Layout'"), c);
C.gridx = 0;
C.gridy 1;
C.ipadx = 20;
c.ipady 20;
P.add (new JButton ("Manager"), c);
c.ipadx = 10;
C.gridx ='1;
p.add(new JButton("Demo*"), c);
WindowListener wndCloser =
new
WindowAd apter ()
public void windowClosing (WindowEvent e)
System.exit(0);

1/ add the
actionwindowlistener
addWindowListener (wndCloser);
getContentPane().add
setsize(600, 400)
(p);
setVisible(true);
I/Main Method
public static void
main(String[] args)
new
GridbagDemo () ;

6. What is the use of action


command in event
example. handling? Explain with
Ans: Action command
is used to
handle event caused the (1+4)
Example by Buttons.
import javax. swing.*;
import java.awt.*;
import java.awt.event.ActionEvent;
import java.awt.event.ActionListener
public class ActionDemo
extends JFrame
JLabel 11, 12,
implements ActionListener
JTextField t1, 13
JButton b1, b2; t2, t3;
public ActionDemo ()

super("Handling Action Event");


11 new
JLabel("Click button toon
get
t1
result") ;
JButton( "DemoJTextField
new
b1 new (20);
Button");
b1.addActionListener(this)
Advanted Java Programming... 13

setLayout(new FlowLayout (Flowlayout.CENTER, 150, 19));


add(11);
add(t1);
add(b1);
setSize(400, 300);
setVisible(true);

public void actionPerformed(ActionEvent actionEvent)

str = actionEvent.getActionCommand
String ();
t1.setText("You have clicked
"
str);

public static void main(String[] args)

new ActionDemo();

of the
the Demo Button, with the help
In the above example if clicked on
event done on
will be able to see the click
getActionCommand() method
we

the output. with


How it can be handled? Explain
causes SQL exception?
7. What
example. (1 +4)
the query.
execute or create
we may get exceptions
when we
Ans: In JDBC, under SQL
due to the Database or Driver
come
Exceptions that occur can handle the SQL Exception like
Exception. Using Exception handling,
we

we handle the normal exception.


It extends the Exception
SQLException is available in the java.sql package.
available in the Exception
class which means that we can use the methods
class in the SQLException class as well.

Example
package com. STH. JDBC;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.ResultSet;

inport java.sql.sQLException;
import java.sql.Statement;
public class Exception_Example

public static void main(String[]


args) throws ClassNot FoundException

stub
I/ TODO Auto-generated method
employee_details set email="' martin@
String update_query "update 10011";
gmail.com' where empNum1
Class.forName ("oracle. jdbc.driver.OracleDriver");

try(Connection conn
OriverManager.getConnection("jdbc:oracle:thin
System/pass123@localhost:1521:XE"))
14..A Complete TU Solution
of CSIT 7h Semester and Practice Sets

Statement statemntl
= conn.
Createstatement () :
Resultset rs1 =null;

statemnt1 =conn.createstatement();
System.out.println( "Executing Update query
executelpdate method");
using
int return_rows statemntl.executeUpdate(updata
updateuery.
_query),
of Affected Rows
System.out.println("No.

'+return roWSOwS,
catch(SQLException sqe)

System.out.println("Error Code
System.out.println( "sQL state =
"
+sqe.getErrorCode():
sqe.getSQLState();
System.out.println("Message 5qe.getMessage()):
system.out.println("printTrace /n");
sqe.printStackTrace() ;

. Write a java program using TCP such that client sends


and displays its factorial. The server number to seri
received from client. (5)
computes factorial of the numbe
Ans:
factclient.java
import java.io.*;
import java.net.*
class factclient

public static void


main(String argv[]) throws Exception
String n
DatagramSocket clientSocket =new
byte []send=new DatagramSocket()%
byte[ 102]
byte []resive=new byte[102]
BufferedReader inFromUser
InputStreamReader (System. in) BufferedReader(n
new

System.out.println("\n Enter Number ")5


n-inFromUser.readLine();
InetAddress ipadd= InetAddress.getbyName
send=n.getBytes() s.getByName("localhd

Datipadd,agramPacket
6878); sendPck=new DatagramPacket
DatagramPacket (send,
(send, send. lengt
Advanced Java Programming... 15

clientSocket.send(sendPck);
DatagramPacket resPck=new DatagramPacket (resive, resive.

length);
clientSocket.receive(resPck);
String fact=new String (resPck.getData());
"

SERVER:
"
+n+"| +fact);
System.out.println("FROM
=

clientSocket.close()

factserver.java
import java.io.*;
import java.net.*;
class factserver

{
public static void main(String argv[ 1) throws Exception

String num, res;


int i,no;
long fact;
System.out.println("Server is ready")
DatagramSocket serverSocket = new DatagramSocket(6870);
byte [ ]send=new byte[102];
byte [ ]resive=new byte[102]
resPck=new
DatagramPacket (resive,
DatagramPacket
resive.length);
serverSocket.receive(resPck);

num=new String(resPck.getData());

num=num.trim();
no=Integer.parseInt(num);

fact 1;
for(i-1; 1ic=no; i++)
fact=fact*i;
res=Long.toString(fact);
send=res.getbytes () i

InetAddress ipadd= resPck.getAddress () ;


int port=resPck.getPort() ;
DatagramPacket sendPck=new
DatagramPacket(send, send. length, ipadd, port);
serverSocket.send (sendPck) ;
16.A Complete TU Solulen of CSIT 7m Semester end Praethke Set

How JavaEx differs from Swing? Explain steps of creating GUI using
javaFx. (2 +3)
Ans: The key differences between JavaFX and Swing.

JavaFX Java Swing


JavaFX supports MVC very Swing supports MVC but is not
consistent with components.
friendly.
UI Swing has a more sophisticated set
|JavaFX also has some

lesser than of GUI items.


components but is
Swing
JavaFX is platform support for GUI| Swing is a standard toolkit for GUI
Applications.
JavaFX has UI Components but still Swing is the legacy library for GUI.
also has several
evolving It
components built over the Swing.

JavaFX can help rich


to create Swing can help to create UI
internet applications with modern components with a decent look.
UI.

JavaFX is also supported by IDEs Various IDEs support Swing.


but not as good as
Swing
Writing Sample Javafx Program
Here, we are creating a simple JavaFX application which prints hello world
on the console on clicking the button shown on the stage.
Step 1: Extend javabx.application.Application and override start)
Start0 method is the starting point of constructing a JavaFX application
therefore we need to first override start method of
javafx.application.Application class. Object of the class javabx.stage.Stage is
passed into the start(0 method therefore import this class and pass its object
into start method.
Step 2: Create a Button
A button can be created by instantiating the javafx.scene.control.Button class.
For this, we have to import this class into our code. Pass the button label text
in Button class constructor.
Step 3: Create a layout and add button to it
JavaFX provides the number of layouts. We need to implement one of them
in order to visualize the
widgets properly. It exists at the top level of the
scene
graph and can be seen as a root node. All the other nodes
(buttons,
texts, etc.) need to be added to this layout. In this application, we have
implemented StackPane layout. It can be implemented by instantiating
javafx.scene.layout.StackPane class.
Step 4: Create a Scene
The layout needs to be added to a scene. Scene remains at the higher level in
the hierarchy of application structure. It can be created by instantiating
Advaneed Java Programming... 17

iavafx.scene.Scene class. We need to pass the layout object to the scene class
constructor.

the Stage
Step 5: Prepare
javafx.stage.Stage class provides some important methods which are
to be called to set some attributes for the stage. We can set the
title
required
of the stage. We also need to call show) method without which, the stage
won't be shown.
for the button
Step 6: Create an event
event on the button. We need to
As our application prints hello world for an
call setOnAction() on the
create an event for the button. For this purpose,
button and define an anonymous class Event
Handler as a parameter to the
method handle() which
method. Inside this anonymous class, define a
contains the code for how the event is handled. In our case, it is printing

hello world on the console.


Step 7: Create the main method
which are required to
Till now, we have configured all the necessary things
this application is still incomplete.
develop a basic JavaFX application but
at the last, we need to create a
We have not created main method yet. Hence,
i.e. will call launch()
main method in which we will launch the application
to it.
method and pass the command line arguments
to demonstrate Steps of Writing JavaFX Programns
/Example: Program
import javafx. application.Application;

import javafx.scene.control. Button;


import javafx. stage. Stage;
import javafx.scene. Scenej
import javafx.scene. layout. StackPane
Application //Step 1
public class HelloWorld extends

throws Exception
public void start(Stage primaryStage)

/Step 2
Buttonbtn1=new Button("Say, Hello World");

1/Step 3
StackPane root=new StackPane();
root.getChildren () . add(btnl);

1/Step 4
Scene scene=new Scene(root,400, 300);
1/Step 5
primaryStage. setScene (scene)
JavaFX Application");
primaryStage.setTitle("First
primaryStage.show()
Semestor and Practice Sets
18.. A Complete
TU Solution of CSIT 7
1/Step 6
btni.setonAction(new Handler());

class Handler
implements EventH
tHandler<Action Event»
Contd..

@Override
handle(ActionEvent ae)
public void

System.out.print.
intln("hello world");

1/Step 7
public static void main (String[] args)

launch(args);

Output
First JavaFX Application
X

Say, Hetlo Wortd

10. What are


Servlet different ways of
Ans: The program using any onewriting servlet programs
programs? Write sa
servlet way. (1 +4)
example can be created
By by three ways.
implementing
By inheriting Servlet interface,
By inheriting GenericServlet class, (or)
HttpServlet class
Advaneed Java Programming... 19
The mostly used approach is by extending HttpServlet because it provides
http request sperific method such as doGet), doPost), doHead) etc.
Example:
import javax.servlet.http.";
import javax.servlet.*;
import java.io.*;
public class DemoServ. extends HttpServlet

public void doGet (HttpServletRequest req


HttpservletRes ponse res) throws ServletException,
IOException

res.setContentType("text/html");
Printwriter pw=res.getwriter()5
String name=req.getParameter("name");
pw.printin("Welcome "+name)

11 How CORBA differs from RMI? Discuss the concepts of IDL briefly(2+3)
Ans: Major differences between RMI and CORBA are listed below.

RMI L CORBA
RMI stands for remote method | CORBA stands for Common Object
invocation Request Broker Architecture
It uses Java interface for It uses Interface Definition Language
implementation. (LDL) to separate interface from
innplementation.
CORBA passes objectsby value. CORBA passes objects by reference
Java RMl is a server-centricmodel. CORBAis a peer-to-peer system.
RMI uses the Java Remote Method CORBA use Internet Inter- ORB
Protocol as its underlying remote Protocol as its underlying remote

communication protocol. communication protocol.


RMI is slow in execution than CORBA is fast in execution than

CORBA. RMI.
Java IDL is a technology for distributed objects that is, objects interacting
to interact
on different platforms across a network. Java IDL enables objects
regardless of whether they're written in the Java programming language
or

another language such as C, C++, COBOL, or others.


An interface description language (or alternatively, interface definition
is a used to describe a
specification language
language), or IDL for short,
Software component's interface. IDLs describe an interface in a language
software
components
independent way, enabling communication between written in
that do not share a language for example, between components
-

Ctand components written in Java.


20A Complete TU Solution of CSIT 7h Somester and Practice Sots
We can't write actual programs in IDL because it lacks the logic a
control structures. We need to do anything useful with it. Inet low
both for primitive and class ad, IDL
concentrates on type definitions,
types, so

ample,youa
use it instead to define interfaces, not implementations. For ev
function used to calculate sales tax on an order might be defined like this:

float calculate_tax (-in float amount );


Here we have a function, calculate_tax, that receives a single input (bv.
float. The function also returns a val ue
parameter, amount, of type
implementation of the calculate ta type
float. Notice that there is no
functi
here; we provide that in our native language. nction declarations
are
collected into interfaces, which represent all the defined methods for a clas
These interfaces are defined using the standard curly braces. ToTo extendtthe lass.
above example, we might include the calculate_tax function, along
order interface, like this:
with
some other functions, in an

interface order

float calculate_tax ([in] float taxable_amount):


float calculate_total([in] item_list items);
bool place_order([in, out] item_list items) ;

12. When thread synchronization is necessary? Explain with suitable example


(1+4)
Ans: At times when more than one thread try to access a shared resource, we need
to ensure that resource will be used by only one thread at a time. The process
by which this is achieved is called synchronization. The synchronization
keyword in java creates a block of code referred to as critical section.
Syntax:
synchronized (object)

//statement to bé synchronized

Every Java object with a critical section of code gets a lock associated with
the object. To enter critical section a thread need to obtain the
corresponding objece's lock.
If we d not use syncronization, and let two or more threads access a
shared resource at the same time, it will lead to distorted
results.
Example:
class First

public void display(String msg)

System.out.print ("["+msg);
try
Advanced Java Programming..21

Thread.sleep(1000);

catch(InterruptedException e)

e.printStackTrace();

System.out.println ("]");

class Second extends Thread

String msg
First fobj
Second (First fp,Stringstr)

fobj=fp;
msg str;
start
public void run()

synchronized(fobj) //Synchronized block

fobj.display(msg);

public class Syncro

public static void main (String|] args)


First fnew = new First();

Second ss = new Second(fnew, "welcome");


Second ssl- new Second (fnew, 'new");
Second ss2 new Second(fnew, "programmer");

Output
welcome
new
programmer]
22 A Complete TU Solutlen of CSIT 7 Semester and Practlce Sets

TRIBHUVAN UNIVERSITy
Institution of Science and Technology

TU QUESTiONS-ANSWERS 2078
Course Title: Advanced Java Programming Full Marks: 60 +
Course No: CSC409
Lab
Pass Marks: 24 20+
Nature of the Course: Theory +
+8+
Credit Hrs.
Semester: VII
Section A

Attempt any two questi


AWT with Swing. Write a GUI program (2 10 2
1. Compare
find sum and difference of two numbers. Use two text fieids
input and a label for output. The program should display
mponents
play sum if use
presses mouse and difference if user release mouse. (2+8)
Ans There are many differences between avaAW andswingthatare given bal.
Java AWT ava Swing elow:
AWT components are platform- Swing components are
dependent. independent. platform-
AWT components are heavyweight. Swing components are
AWT doesn't support pluggable Swing supports lightweight
feel pluggable look anc
look and feel.
AWT provides fewer Swing provides more
components than Swing. powerfu
Components.
AWT doesn'tfollows MVC. Swing follows MVC.
Program part,
import javax.swing.*
import java.awt. *;
import java.awt.event.ActionEvent;
import java.awt.event.ActionListener;
class Addition extends JFrame implements ActionListener

Label 11, 12;


JTextField t1, t2, t3;
Button b1;
public Addition ()
11= JLabel("First Number: ");
new

11.setBounds (20, 10, 100, 20); l/x, y, width, height


t1 new JTextField (10) ;
t1.setBounds(120, 10, 100, 20);
12 new JLabel("
Second Number: ") ;
12.setBounds
t2
(20, 40, 100, 20);
=
new
JTextField (10);
t2.setBounds (120, 40, 100, 20);
b1 new JButton("Sum");
b1.setBounds
t3 new
(20, 70, 80, 20);
t3.
JTextField (10);
setBounds (120, 70, 100, 120);
add(11);
add(t1);
Advaneed Jave Programming.. 23

add(12)
add (t2);
add(b1);
add(t3);
b1.addActionListener(this);
setSize(400, 300);
setLayout(null);
setVisible(true);
setDefaultclose0peration(JFrame.EXIT_ON_CLOSE);
@Override
public void actionPerformed (ActionEvent e)

if(e.getsource()==b1){
int numi =Integer.parseInt (t1.getText ());
int num2 Integer.parseInt(t2.getText());
int sum = num1 num2;
t3.setText(String.value0f(sum));

public static void main(String args[])

new Addition() ;

Create a simple servlet that reads and


2 Explain life-cycle of servlet in detail.
Assume form with two fields'
username

displays data from HTML form.


and password. (5+5) its creation till
Ans: A servlet life cycle can
be defined as the entire process from
followed by a servlet lifecycle:
the destruction. The following are the stages
Loaded and Instantiated

Initialized by calling the init 0 method


Process a client's request by invoking service0 method
Terminated by calling the destroy0 method
Garbage collected by the JVM.
Web Server

saaaupen4sssanosm***aaa*****a *ass**,

Servilet

Servlet Container

rhread AXThread Thread

init() service0destroy0|
*****************sASBesee

Fig: Servlet Life Cycle


Practice Sets
Semesterand
of CSIT 7 responsible to
TU
Solution

The class
der
loader is load the
24 AComplete l o a d e d wher
en the first request for
the
Instantiated:

and class is
Then;it creates the instance of
Loaded
1. servlet
class. The
container.
web
by the s e r v l e t class. The servlet instance
servlet

servlet is
received
created
the
after loading
servlet life cycle.
a
in the servlet
once init 0
method:
The web contain calls the
only the rvlet instance.
calling the servi The init
Initialized by creating
after
2.
method only
once
servlet. Syntax of the init method is
the
init) to
initialize

method is used
ServletException
given below: throws
config)
init(ServletConfig
service) method
public void request by
invoking
time when reau

Process a
client's
service
m e t h o d each for
3. calls the lized, it calls the servi
The web
container
servlet is initialized,
After
is
received.
method of the Servlet interface is
the servlet service
of the
method. The syntax
given below: ServletResponse response)
service(SeroletRequest
request,
public void
throws ServletException, IOException
used methods within
in
are most frequently
and doPost()
The doGet)
each service request. The web container calls
method:
the destroy)
4.
Terminated by callingg the servlet instance from the
method before removing
the destroy to clean upP any resource for
the servlet an opportunity
service. It gives of the destroy method of the
thread etc. The syntax
example memory, below:
Servlet interface is given
public void destroy() servlet is destroyed, garbage
the JVM: Once the
5. Garbage collected by collecting the garbage's.
collector component of JVM responsible
is

HTML code of a login form:


action="loginServlet">
form name="loginForm" method="post"
name="username"/> <br/>
Username: <input type="text"
Password: <input type="password" name="password"/> <br/
input type="submit" value="Login" />
</form>
package net.codejava.servlet;
import java.io. IOException;
import java.io.PrintWriter;
import javax.servlet.ServletException;
import javax. servlet.annotation.WebServlet;
import javax. servlet.http.HttpServlet;
import javax. servlet.http.Httpservlet Request;
import javax. servlet.http.HttpServletResponse;
@WebServlet("/l0ginServlet")
public class Loginservlet extends HttpServlet
protected void doPost
(HttpServletRequest request,
HttpServletResponse response) throws ServletException,
IOException
// read form fields
String username = request.get Parameter ("username")
String password request.getParameter("password")
Advenced Java Progamming.. 25
System.out.println("username: " + username);

System.out.println("password:"
/get response writer
password)
Printwriter writer
/Ibuild HTML code response.getWriter ();
String htmlRespone "<html> ";
=

htmlRespone "<h2>Your username is: +Username+


"<br/>";
htmIRespone * "Your password is:" password+ "</h2>";
htmlRespone "</html>";
1/ return response
writer.println (htmlRespone);
3. Explain RMI architecture layers in detail. Write a Java programs using
RMI to find product of two numbers. (4+6)
Ans: The RMI system consists of three layers:
The stub/skeleton layer client-side stubs (proxies) and server-side
skeletons
The remote reference layer remote reference behavior (e.g. invocation
to a single object or to a replicated object)
The transport layer connection set up and management and remote
object tracking
The application layer sits on top of the RMI system. The relationship
between the layers is shown in the following figure.

Application Client Server

Stubs Skelétons
RMI
System Remote Reference Layer

Transport
Transport Layer this layer connects the client and the server. It
manages the existing connection and also sets up new connections
Stub - A stub is a representation (proxy) of the remote object at client. It
resides in the client system; it acts as a gateway for the client program.
Skeleton this is the object which resides on the server side. Stub
communicates with this skeleton to pass request to the remote object.
RRL (Remote Reference Layer) It is the layer which manages the
references made by the client to the remote object.
Program part,
Create the remote interface
import java.rmi. ";
public interface Multiply extends Remote
26.. A Complete TU
Solutlon of CSIT 7hSemester and Practice Sets

int y) throws RemoteExcens,


public int Mult(int
x,
eption;
of the remote interface
Provide the implementation
import java.rmi.*;
import java.rmi.server. *;
public class MultRemote extends UnicastRemote0bject

Multiply
MultRemote()throws RemoteException
implements
super()
public int Mult(int x, int y)

return x*y;

Create the stub and skeleton objects using the rmic tool
rmic MultRemote
Start the registry service by the rmiregistry tool
rmiregistry 5000
Create and run the server application
import java.rmi.*;
inport java.rmi.registry.*;
public class MyServer

public static void main (String args[])


try {
Multiply stub=new Mult Remote ();
Naming.rebind ("rmi://localhost:5000/sonoo", stub);
catch(Exception e)
system.out.println(e);
Create and run the client
import java.rmi.*; application
Pcation

public class MyClient


public static void
main (String args[])
try{
Multiply
Naming.Syst
lookup(em."ormuti.:p/ ri1lnotcalin(sthostub.: 5e00/
mult sonoo"
(34, 14))
)
stub (Multiply)

catch(Exception e)
Advanced Java Programming... 27

Section B
(8 x 5 40)
Attempt any eight questions.
What is package? How can you create your own package in Java? Explain
4.
with example. (1+4)
to control
Ans: Packages are used in Java in order to prevent naming conflicts,
access, to make searching/locating and usage of classes, interfaces,
enumerations and annotations easier, etc. A Package can be defined
as a

annotations)
grouping of related types (classes, interfaces, enumerations andSome of the
providing access protection and name space management.
existing packages in Java are:

java.lang- bundles the fundamental classes


java.io classes for input, output functions are bundled in this package
to bundle group of
Programmers can define their own packages
classes/interfaces, etc.
Creating a package
for the package and put
When creating a package, you should choose a name
source file that
a package
statement with that name at the top of every

contains the classes, interfaces, enumerations,


and annotation types that you
statement should be the first
want to include in the package. The package
one package
statement in each
line in the source file. There can be only statement is not
source file, and it appies to
all types in the file. If a package
and annotation types will be
used then the class, interfaces, enumerations,
put into an unnamed package.
Example
package P1;
public class A

public void show0

System.out.println("From Class A
of Package P1");

the file A.class in a sub-directory called P1. Now,


Compile above file and put different
we can use above
class from package as below:
import P1.
public class B

public static void main(String al|)

Ax=new A);
x.show();

Output
From Class A of Package Pl
Practice Sets
CSIT 7h Somester and
TU Solution of
28. A Complete of check boxes f.setsize(300, 300);
Explain the
uses
components?
and
need swing f. show():
5. Why do we
(2+3)
GUI programming.
radio buttons in lass which is lightweight and
f o u n d a t i o n clas

is part of Java based applicatione


Ans: Swing in java for creating window
is used It together tall
platform independent. field etc. Putting
button,scroll bar, text
JRadioButton
like
includes components u s e r interface.
TRadioButton is used to render a ga
makes a graphical blocks of an application, We
1
these c o m p o n e n t s
basic building
knov select one choice from the group.
are the application has some
Swing components toolkit for Java. Every Example:
GUI widget a button, check-box dio
that Swing is a user. For example,
for the in Swine.
interactive
interface
form the components Java JRadioButton Example
etc. These together
button, text-field, import javax.swing.
The check-box has two statee
JCheckBox with a
label.
JCheckBox renders
a check-box
on anda
small tick is displayed in the ho.
box public class RadioButtonExample
selected, the state is
When
on/off.
Example:. JCheckBox( "Show Help", true); JFrame f;
new
CheckBox chkBox =
Notice the second paramete
with the label
Show Help.
Itreturnsa checkbox boolean value that
indicates the default state of th RadioButtonExample0
c o n s t r u c t o r . It is a
in the defaulted to o n state.
check-box. True means the check-box is
JCheckBox f=new JFrame0;
create a simple checkbox using
java Program to JRadioButton rl=new
import java.awt.event.*;

import java.awt.*; JRadioButton r2=new


import javax. swing.*; r1.setBounds(75,50,10C
JFrame
class solve extends
r2.setBounds(75,100,1
ButtonGroup bg=new
// frame
static JFrame f; bg.add(r1);bg.add(12).
/main class f.add(r1):f.add(2);
public static void main(String[] args) f.setSize(300,300);
f.setLayout(null);
1/ create a new frame
f.setVisible(true);
f new JFrame("frame");
/ set layout of frame
public static void main(Strin
f.setLayout (new FlowLayout () )
1/ create checkbox
CheckBox c1
=new JCheckBox("checkbox 1");
JCheckBox c2 = new
JCheckBox ("checkbox 2");
//create a
new panel
JPanel p new
JPanel ();
=
How can we use listener
// add checkbox to panel interface with adapter class-
p.add(c1) ns: To handle events we must ir
p.add(c2) requirements. First, it must
// add receive notifications about s
panel to frame
methods to receive and
f.add(p) and their pro
1/set the size of frame
corresponding met.
Advanced Java Programming.. 29

f.setsize(300, 300);
f. show()

JRadioButton
TRadioButton is used to render a group of radio buttons in the UI. A user can
select one choice from the group.

Example:
Java JRadioButton Example
importjavax.swing
public class RadioButtonExample

JFrame f;
RadioButtonExample(0

f=new JFrame();
JRadioButton r1=new JRadioButton("A) Male"
JRadioButton r2=new JRadioButton("B) Female");
r1.setBounds(75,50,10030);

r2.setBounds(75,100,100,30);
ButtonGroup bg=new ButtonGroup0;
bg.add(r1);bg.add(r2);
f.add(r1);f.add(r2);
f.setSize(300,300);
f.setLayout(nul);
f.setVisible(true);

public static void main(Stringl] args)


new RadioButtonExample();

handle events? Compare listener


listener interface to
How can we u s e
interface with adapter class. (3+2) interfaces. It has two major
event listener
To handle events we implement
must one or more
s o u r c e s to
ns: must have been registered with
requirements. First, it must implement
types of events. Second, it
receive notifications about specific listener interfaces
The event
notifications.
methods to receive and process these
declarations are given below.
and their corresponding method
Solutlon of CSIT 7h Semester
and Practice Sets
JO.A Complete TU

Interface Description action events,


Declares one method to receive
Action Listener
Action events are
when a buttonn
generated is
pressed.
Event ae)
voidaction Performed (Action
receive adjustment events
Adjustment Listener Declares one method to when a scrollbar
are generated
Adjustment events
is manipulated. Changed (Adjustment
Value
void adjustment
Event ae) methods to recognize
when
Declares four resized,
Component Listener moved,
is hidden,
component

shown. (ComponentEvent ce)


void component Resized( C o m p o n e n t E v e n t ce)
Moved
void component (ComponentEvent ce)
Shown
void component (ComponentEvent ce
Hidden
voidcomponentmethods to recognize when
two
Declares removed from
is added to
or
Container Listener
component
a
container.
cel
Added (ContainerEvent
void component col
Removed (ContainerEvent
voidcomponent
methods to recognize when
Defines two
Focus Listener or loses keyboard
focus,
component gains
fe)
Gained (FocusEvent
voidfocus
Eventfe)
voidfocusLost (Focusto when a che
Defines one method recognize when a choi
Item Listener item is clicked,
box or list

selection is made,
or when a checkable me
or disselected.
item is selected

void item State Changed(ltem Event


ie)
Defines three methods
to recognize when a ke
KeyListener typed.
is presses, released,
or

void key ke)


Pressed (Key Event

void key Released (KeyEvent ke)


void key Typed(Key Event ke)
Defines five methodsto recognize when the
MouseListener
mouse is clicked, enters a component, exits
is released.
component, is pressed,
or

void mouse Clicked (Mouse Event me)


void mouse Entered (MouseEvent me)
void mouse Exited (Mouse Event me)
void mouse Pressed (MouseEvent me)
void mouse Released (MouseEvent me)when
Defines two methods to recognize
Mouse Motion Listener mouse is dragged or moved.
me)
void mouse Dragged (Mouse Event
void mouseMoved (Mouse Eventme)
Advanted Javo Programming... 31

Mouse Wheel Listener Defines one method to recognize when the


mouse wheel is moved.
void mouse Wheel Moved (Mouse Wheel Event

mwe)
Text Listener Defines one method to recognize when a text
value changes.
voidtertValue Changed (Text Event te)
WindowFocusListener Defines two methods to recognize when a
window gains or looses input focus.
void window Gained Focus (Window Event
we) void window Lost Focus (Window Event
we)
WindowListener Defines seven methods to recognize when a
window is activated, closed, deactivated,
deiconified, iconified, opened, or quit.
void window Activated (Window Event we)
void window Closed (Window Event we)
void window Closing (Window Event we)
void windowDeactivated(WindowEvent we)
void windowDeiconified(WindowEvent we)
void windowlconified(WindowEvent we)
void windowOpened(WindowEventwe)
Example of event handling within class
import javax. swing. *;
import java.awt.event.*;
class EventDemo extends JFrame implements, ActionListener

JTextField tf;
EventDemo()

tf=new JTextField (15);


tf.setBounds(60, 50, 170, 20) ;
setLayout (nul1);
J8utton b=new JButton("click me")
b.setBounds (100, 120, 80, 30) ;
b.addAction Listener (this);
add(b);
add(tf);
setSize(300, 300);
setVisible(true);
public void actionPerformed (ActionEvent e)

tf.setText ("Welcome");
public static void main(String args[ 1)

new EventDemo();
32.A Complete TU Solution of CSIT7 Semester and Practice Sets
Adapter Class vs. Listener Interface
for the
Any class which handles events must implement a listener interface
event type it wishes to handle. A class can implement any number of
listener interfaces. To implement
a listener interface the class must
implement every method in the interface.
Sometimes we may want to implement only one or two of the methods in an
of all the
interface. We can avoid having to write o u r own implementation
An adapter class is a class
methods in a n interface by using án adapter class.
interface. Our
that already implements all the methods in its corresponding
class must extend the adapter class by
inheritance so w e can extend only one
does not support multiple
adapter class in o u r class because Java classes and the listener interfaces
inheritances. Here a r e the Java adapter
that adapters exist for only listener
they implement. Web can notice
interfaces with m o r e than one method.
Listener Interface
Adapter Class
ComponentListener
Component Adapter
Container Adapter ContainerListener
FocusListener
Focus Adapter
KeyListener
Key Adapter
MouseListener
Mouse Adapter
MouseMotionListener
Mouse Motion Adapter
Window Adapter WindowListener
7. What is row set? Explain cached row set in (1+4)
detail.
Ans: RowSet is an interface in java that is present in the java.sql package. The
instance of RowSet is the java bean component because it has properties and
a java bean notification mechanism. It is introduced in JDK5. A JDBC RowSet
It makes the data more
provides a waý to store the data in tabular form.
flexible and easier than a ResultSet. The connection between the RowSet
object and the data source is maintained throughout its life cycle.
The CachedRowSet is the base implementation of disconnected row sets. It
connects to the data source, reads data from it, disconnects with the data
source and the processes the retrieved data, reconnects to the data source
and writes the modifications.
Creating a CachedRowSet
You can create a Cached RowSet object using the createCachedRowSet)
method of the RowSetFactory.
You can create a RowSetFactory object using the newfactory(0 method of the
RowSetProvider method.
CachedRowSet »
Create a object using the above-mentioned methods
shown below:
//Creating the RowSet object
RowSetFactory factory RowSet Provider .newFactory ();
CachedRowSet rowset
factory.createCachedRowSet ();
Advanced Java Programming... 33

he Mail API? How use this API to send email


What is Java can you
of (1+4)
messages?
st
JavaMail API provides a platform-independent and protocol-
Ans: The The
independent framework to build mail and messaging applications. that comprise
JavaMail API provides a set of abstract classes defining objects for reading,
an
ne
a mail system.
It is an optional package (standard extension)
SS composing, and sending electronic messages.
construct an interface to a
JavaMail provides elements that are used to
ne and interfaces. While this
messaging system, including system components
le JavaMail does
specification does not define any specific implementation,
and MIME Internet
S
include several classes that implement RFC822
the JavaMail
messaging standards. These classes are delivered as part of
class package.
There are various ways to send email using JavaMail API. For this purpose,
SMTP server that is resporisible to send mails.
you must have
the SMTP server:
You can use one of the following techniques to get
Install and u_e any SMTP server such as Postcast server, Apache James
server, cmail server etc. (or)
Use the SMTP provided by the
server host provider e.g. my SMTP
server is mail.javatpoint.com (or)
etc.
Use the SMTP Server provided by other companies e.g. gmail
There are following three steps to send email using JavaMail. They
are as

follows:
Get the session object that stores all the information of host like host
name, username, password etc.
compose the message
send the message
Example:
import java.util. *;
import javax.mail. *;
import javax.mail.internet.*;
import javax.activation. *;
public class SendEmail

public static void main(String [] args)


String to = "[email protected]";//change accordingly
String from ="[email protected]";chánge accordingly
address
String host "localhost"; //or IP
=

//Get the session object


Properties properties System.getProperties () ;
properties.setProperty( "mail.smtp. host", host);
Session session Session.getDefaultInstante(properties) ;
//compose the message
try{
MimeMessage message = new MimeMes sage (session);
message.setFrom(new InternetAddress(from) );
message.addRecipient(Message.RecipientType. TO, new
InternetAddress (to) ) ;
message. setSubject("Ping");
message.setText ( "Hello, this is example of sending email ");
Complete TU Solution of CSIT 7h
Semester and Practice Sets
34. A
1/ Send message
Transport.send(message);
sent successfully. . . .
");
System.out.println("message

}catch (MessagingException mex)

mex.printStackTrace ();

HBox and VBox layouts of JavaFX. (2+


with swing. Explain
9. Compare JavaFX is provided
below.
between JavaFX
and Swing
Ans: Key differences JavaFX
Swing
toolkit for JavaFX provides platform suppo
for creating desktop applications.
standard
Swing is the
creating GUL number of TJ
Java developer in
decent
JavaFX has a
sophisticated
set
| available but lesser
Swing has a
more
components
of GUI components
than what Swing provides.
JavaFX has UI components that are
library that fully still evolving with a more advanced
Swing is legacy
a
pluggable UI
features and provide look and feel.
Components JavaFX has several components
has a UI component library
Swing built over Swing
and act as a legacyhave support for JavaFX has a support for
does not
Swing XML customization using CSS and XML
customization using CSS and With JavaFX one can also create
to
it is very difficult
With Swing, beautiful 3-D applications
create beautiful 3-D applications.
HBox and VBox layouts of JavaFX
in our application, all the nodes are set in
If we use HBox in the layout
The class named HBox of the packag
single horizontal row.
the HBox pane. The HBox class contains tw
javafx.scene.layout represents
below.
constructors that are given
new HBox): create HBox layout with 0 spacing

new Hbox(Double spacing) : create HBox layout with a spacing value


demonstrate HBox Layout
'/Example: Program to
import javafx.application.Application;
import static javafx.application.Application.launch;
import javafx. scene.control. Button;
import javafx.stage.Stage;
import javafx.scene.Scene;
import javafx.scene.layout.HBox;
import javafx.geometry. Insets;
import javafx.geometry. Pos;
public class HBoxEx extends Application

public void start(Stage primaryStage) throws Exception


{
Button btn1=new
Button("Button 1");
Button btn2=new
Button btn3=new
Button("Button 2")5
Button ("Button 3")
Advanced Java Programming... 35
HBox root new HBox (10);
root.setPadding(new Insets(5));
root.setAlignment(Pos. BASELINE_RIGHT) ;
root.getChildren().add(btn1);
root.getChildren().add(btn2);
root.getchildren(). add (btn3);
Scene scene=new Scene (root, 300, 200);
primaryStage.setScene (scene);
primaryStage. setTitle("JavaFx HBox Example");
primaryStage. show() ;
public static void main (String[] args)

launch(args);

Output
JavaFX HBox Example X
Button Button 2Buton3

Instead of arranging the nodes in horizontal row, Vbox Layout Pane arranges
the nodes in a single vertical column. It is represented
by javafx.scene.layout. VBox class. The VBox class contains four constructors
that are given below.
VBox0: creates layout with 0 spacing
Vbox(Double spacing): creates layout with a spacing value of double
type
creates layout with the
Vbox(Double spacing, Node children):child nodes
a

specified spacing among the specified


Vbox(Node children): creates a layout with the specified nodes having8
O spacing among them
I/Example: Program to demonstrate VBox Layout

import javafx.application. Application;


import static javafx.application.Application. launch;
import javafx. scene.control.Button;
import javafx.stage.Stage;
import javafx.scene. Scene
import javafx.scene.layout.VBox;
import javafx.geometry. Insets;
Practice Sets
A Complete Tu
Solution of CSIT 7h Semester and
36.
import
javafx.geometry . Pos;
Application
extends
public class VBoxEx
throws
primaryStage) tion
public void start (Stage
Button( "Button 1");
btn1=new
Button Button("Button 2");
btn2=new
Button Button("Button 3");
btn3=new
Button

= new VBox(5);
VBox root Insets (5) ) ;
root. setPadding (new
root.setAlignment(Pos. BASELINE_CENTER);

root.getChildren().add (btn1);
root.getChildren().add(btn2);
r o o t . g e t Children ( ) . a d d ( b t n 3 ) ;

scene=new
Scene(root, 300, 200);
Scene
primaryStage. setScene(scene);

VBox Example");
setTitle( "JavaFX
primarystage.
primarystage. show();

(String[] args)
static void main
public

launch (args);

Output
X
JavaFX VBox Example

Button 1
Button 2
Button3

display "Tribhuwan Universiy


10 What is servlet? Write a simple JSP file to
five times. (2+3)
Ans: Java servlets are server-side program that runs inside a web server a
he
handles client requests and return dynamic response for each request
dynamic response could be based on user's input (e.g., search, on
othe
shopping, online transaction) with data retrieved from databases or ou
es). It actsas
applications, or time-sensitive data (such as news and stock prices). HTT
between requests coming from a Web browser or other T
dmuddle layer
client and databases or applications on the HTTP server (Web se
ver

Following diagram shows the position of Servlets in a Web Applicatio


AdvancedJava Programming... 37

HTTP
HTTP Server

Protocol
Web Browser Servlets
Program

Database

Figure: Position of Servlets


Program part,
!DOCTYPE html>
<html>
<head
<meta http-equiv="Content-Type" content="text/htm; charset=UTF-8">
<title> ISP program to display "Tribhuvan University" 5
times</title>
</head>
<body»
h1> Displaying "Tribhuvan University" 5 times!!</h1>
table»

for(int i-1; i«-10; i++)

<tr>ctd> Tribhuvan University</td></tr>


<%

</table»
</body>
</html>
11 Why CORBA isimportant? Compare CORBA with RMI. (3+2)
between distributed
Ans: Common Object request broker is used for communication
written by in java language are any other
and heterogeneous objects that are
language. CORBA is developed by Object Management Group (OMG). This was
followed by many revisions of CORBA architecture. CORBA is world's leading
information independent of
middleware solution enabling the exchange of
programming language, and operating system.
hardware platform, that provides services to software
Middleware is type of computer software
a
the operating system. It makes easier
applications beyond those available from
for software developers to implement communication and input/output, so they
can focus on the specific purpose of their application.
Machine A Machine B Machine C

Distributed applications

COBRA

Local OS Local OS
Local OS

Network
CORBA as Middleware
Figure:
38.A Complete TU Solution of CSIT 7Th Semester and
Practice Sets

RMI and CORBA are listed below.


Major differences between
R CORBA
for remote method CORBA stands for Common
RMI stands Obie
Request Broker Architecture oject
invocation
interface for It uses Interface Definition Language
It usesJava
implementation.
(IDL) to separate interface fro
implementation.
CORBA
CORBA passes objects by
value.
reference.
passes objects by
server-centric model. CORBA is a peer-to-peer system.
Java RMI is a
the Java Remote
Method CORBA use Internet Inter- ORR
RMI uses

Protocol as its underlying


remote Protocol as its underlying remote
communication protocol.
communication protocol.
RMI is slow in execution
than CORBA is fast in execution than
RMI.
CORBA
12. Write short notes on: (2x 2.5=5
a. JDBC drivers
which is a standard Java AD
Ans: JDBC stands for Java Database Connectivity,
between the Java programmin
for database-independent connectivity
databases. The JDBC library includes APls fo
language and a wide range of
each of the tasks commonly associated with database usage:
or

Making a connection to a database


Creating SQL or MysQL statements
Executing that SQL or MySQL queries in the database
Viewing & Modifying the resulting records
The JDBC API supports both two-tier and three-tier processing models for
database access but in general JDBC Architecture consists of two layers:
JDBC API: This provides the application-to-JDBC Manager connection.
JDBC Driver API: This supports the JDBC Manager-to-Driver
Connection
Java Application
JDBC API|
JDBC Driver Manager

JDBC Driver JDBC Driver JDBC Driver

Ofacle SQL ODBC


Server Data
Souree
Figure: JDBC Architecture.
Advanced Java Programming.. 39

b. Java server pages

Ans: Java Server Pages (sP) is a server-side programming technology that enables
the creation of dynamic, platform-independent method for building Web-
based applications. JSP have access to the entire family of Java APls,
including the JDBC API to access enterprise databases. It can be thought of as
an extension to servlet because it provides more functionality than servlet. A
JSP page consists of HTML tags and JSP tags. The JSP pages are easier to
maintain than servlet because we can separate designing and development.
Web developers write JSPs as text files that combine HTML or XHTML code,
XML elements, and embedded JSP actions and commands. jSP tags can be
used for a variety of purposes, such as retrieving information from a
database or registering user preferences, accessing JavaBeans components,
passing control between pages and sharing information between requests,
pages etc.

hello.jsp
Read Transition
2
helloServlet.java| phase

- 3
Generate
Compile

Request
5helloServlet.class
Execute processing
phase

Figure: JSP Architecture

MODEL QUESTIONS SETS FOR PRACTICE

MODEL SET 1

Course Title: Advanced Java Programming Full Marks: 60+20+20


Course No: CSC409 Pass Marks: 24 +8+8
Nature of the Course: Theory + Lab Credit Hrs. 3

Semester: VII
Section A
Attempt any TWO questions. (2 10 20)
1. What are the uses of protected access specifiers in Java? Explain each use of
the access specifiers with suitable example.
2. Write a program using swing components to multiply two numbers. Use
text fields for inputs and output. Your program should display the result
when the user presses a 'Mult' button.
40. A Complete TU Solution of CSIT 7h: Semester and Practice Sets
that reads
Create a simple servlet and
in detail.
3. Explain life-cycle of servlet with two fields' usernam
form. Assume form
displaysdata from HTML
and password.
Section B
(8x5 4 0
Attempt any EIGHT questions. in Java? Explai
create your
own package
1. What is package? How can you

with example. of check boxes and


Explain the
uses

need swing components?


2. Why do w e
radio buttons in GUI programming.
file to display
"Tribhuwan University
What is servlet? Write a simple
JSP
3.
five times. need adapter
class in even
model. Why do we

4 Define event delegation


handling? in while handling exception
block is mandatory
5. When does the finally
scenario.
Describe with a suitable
of a servlet.
6. Explain the life cycle client/serve
marshalling? Write a

7. Define RMI. What is stub and parameter


of two numbers.
application using RMI to find product with example.
8. What is the use of action command in event handling? Explain
TCP such that client sends number to server and
9. Write java program using
a
r e v e r s e of the number received
The server computes
displays it's reverse.

from client.
with suitable example
Explain different types of
constructors
10. What is constructor?
sessions? Write dow
11. What is session? What are different ways
of tracking
suitable servlet for tracking session.

to create a form add, delete, update, and.searc


12. Write a JavaFX program
database.
employee records from
What is RMI? Discuss stub and skeleton. Explain its role in creatin
13.
distributed applications.

MODEL SET 2
Section A
Attempt any TWO questions. (2 * 10 2

1. What is the significance of stub and skeleton In RMI? Create a RMIl applicatid
such that a client sends an Integer number to the server and the server retun
the factorial value of that integer. Give a clear for everyspecification step
2 Describe the responsibility of Serializable interface. Write a program to re
an input string from the user and write the vowels of that string
VOWEL.TXT and consonants in CONSOLNANT.TXT
3. Why do we need to handle the exception? Distinguish error and excepu
eptio
Write a program to demonstrate
your own exception class.
Advanced Java Programming... 41

Section B

Attenpt any
EIGHT questions. (8 x5 40)
4.
4.
What is static data? How it is differ from normal data? Explain.
5. Explain CORBA architecture briefly.
What is nesting method? Explain with suitable example.
6.
What is IDL? Explain its structure briefly.
7. methods?
8. Differentiate between Synchronized block and Synchronized
What is inner class? Explain with suitable example.
9. with
What is Servlet? Explain the position of servlets
in web applications
10.
suitable diagram.
code and
11. Explain the steps used in writing servlets with suitable source
brief description of each step.
can it be avoided?
How to detect a deadlock condition? How
12
13. What is the use of this keyword in java? Explain.

MODEL SET 3
Section A
(2x 10 20)
Attempt any TWO questions.
a text field, a text label for displaying
the
1. Design a GUI form using swing with
and three buttons with caption Check
input message "Input any String', for above scenario
Palindrome, Reverse, Find Vowels. Write a complete program
reverse it after clicking second
and for checking palindrome in first button,
button and extract the vowels from it after clicking
third button.

Describe the process to deploy the servlet.


Write program to a JSP web
a
2 form to take input of a student and submit it to second JSP file which may

simply print the values of form submission.


in which a server
3. What is socket? Write client and server programs
a
of a circle from the client program. Computes
program accepts a radius
and displays it by
area,sends the computed area to the client program,
client program.
Section B
(8 x 5 40)
Attempt any ElIGHT questions.
4. Explain the steps for writing JavaFX programs
member's length, breadth and
5. Write a program to model a cube having data
height. Use member functions of your own interest
using RMI such that the program finds
6.
Write server and client program by
factorial of n.
What is CORBA? Compare it with RMI. Discuss the steps used in creating
7.
CORBA programs.
What is meant by overloading? Explain method overloading with suitable example
8.
Semester and Practice 5ets_
A Complete TU Solution of CSIT 7h
Discuss different JavaFX layouts with suitable example.
method dispatch with example,
10. What is dynamic polymorphism? Explain dynamic
block.
and synchronized
11. Difference between synchronized keyword
descriptor? Explain works
web container and deployment
12. is meant by
Whatby web container briefly.
done
deadlock with example.
What is thread deadlock? Explain thread
13.

MODEL SET 4

Section A
(2x 10 20)
TWO questions. interest. Use text
Attempt any to find simple
program using
swing components should display the result when
1. Write a
Your program
fields for inputs and output.
button.
the user presses a life cycle of servlet in
Discuss
Differentiate it with JSP.
What is servlet?
detail.
extract name
of those students who
to
Write a Java program using JDBC that the student table has four
Kathmandu district, assuming
live in
district, and age).
attributes (ID, name,
Section B
(8 x 5 40)

EIGHT questions.
Attempt any
various JavaFX UI
Controls? Explain briefly.
What are the servlet?
and read cookies by using
What is cookie? How
can you store
5.
Explain with example.

of Garbage Collection
in java? Explain.
6.
6. What is the use

CORBA programs with


suitable example.
7. Write down steps for writing
methods?
block and Synchronized
Differentiate between Synchronized
8 file and writes data
to
reads data from one
9. Write a simple java program that
another file

10. Discuss different driver types on JDBC.

11. What is servlet? Discuss its life cycle.


C
of
statements are different with statement? List the types J
12 How prepared
driver etc
13.
13 An array is called balanced if it's even numbered elements (a|0], al4
are even and its odd numbered elements (a[1, a[3]etc.) are Odd. Wre
s1i

and eturns
Tunction named is Balanced that accepts an array of integers
the array is balanced otherwise it returns 0.
Advanced Java Programming.. 43

MODEL sET 5
Section A
(2 x10 20)
Attempt any TWO questions.
What is interface? How can you use the concept of interface to achieve
1.
multiple inheritance? Discuss with suitable example,
What are exceptions? Why is it important to handle exceptions? Discuss
2
different keywords that are used to handle exception.
How Swing is different from AWT? Write a program to display a login form
3.
containing user id, password, account type and a "ok" button. Account type
must be admin or user. Use layout managers properly.
Section B
(8 x 5 4 0 )
Attempt any EIGHT questions.

4. How do you achieve multiple inheritance in java? Discuss.

5. What is constructor? Explain different types of constructors with suitable


example
6.
6. What is JDBC? Discuss different driver types of JDBC.

What is RMI? Differentiate it with CORBA?


7
8. What is package in java? Describe their types with suitable example.

9. What are two key features of Swing? Explain how GUI can be developed by
using JFrame.
10. Write a simple Java program that reads a file named "Test.txt and displays
its contents.

11 Discuss MVC design pattern with example.

12 How do you handle HTTP request (GET) using servlet?


13. What are different layers of RMI architecture? Explain.

MODEL SET 6

Section A
(2 x 10 20)
Attempt any TWO questions.
1. What are different types of borders used in Swing? Explain all borders with
suitable example.
2. Define servlet. Discuss life cycle of servlet. Differentiate servlet with JSP.
Write a simple JSP file to display 'I0ST' 20 times.

3. Write a Java program to find the sum of two numbers using swing
components. Use text fields for input and output. Your program displays
output if you press any key in keyboard. Use key adapter to handle events.
7th Semester and Practice Sets
Solution of CSIT
A Complete TU
44.
Section B
(8 x5 40)

EIGHT questions. of all the digits


of an Atte-
Attempt any the sum
servlet to find
4. Write a wen application using 1.
input integer. on click of
and age from the
user
name
which takes 2
5. Write a program in java to vote o r not.
user is eligible
a message
the button and display First text field accepts
fields.
three text
Write a swing program
containing
FirstName. On click of button
accepts the
.
LastName and second text field
the third box.
full name is displayed in application with 5.
text and accelerator keys? Explain
. What is meant by tooltip
proper java code.
and discus each layers in the7
architecture with suitable diagram
Discuss RMI
8.
architecture briefly.
class in creating
different types of dialog 9.
How can we use JOptionPane
.
suitable syntax.
boxed explain with 10.
Exception in JDBC. 11.
10. Explain any two SQL
product (id number,
name varchar, 2.
create a table
11 Write aJDBC program to record in the table. 13
insert
pricer varchar) and
a

browser, reads number


two text boxes in web
12 Create a servlet that displays
calculates factorial and displays it in second text box.
entered in first text box,
the steps used in sending
13 What is the purpose of Java
mail API? Explain
email using Java mail API.
by
Atte

MODEL SET 7

ar.as
.Section A
Attempt any TWO questions. (2 x 10 20

1. You are hired by a reputed software company which is going to design an


application for "Movie Rental System". Your responsibility is to design a

schema named MRS and create a table named Movie (id, Tille, Genrette
Language, Length). Write a program to design a GUI form to take input to
this table and insert the data into table after
clicking the OK button.
22 What is the significance of stub and skeleton In RMI? Create a
RMI application
such that a client sends an
Integer number to the server and the server reru
the factorial value of that
integer. Give a clear specification for every step.
3.3. Why do we need to handle the on
Write
exception? Distinguish error and excepto
a program to demonstrate your own
exception class.
Advanced Java Progromming... 45

Section B
EIGHT questions. (8x 5 40)
Attempt any
1. How can you create menus by using Swing? Explain different classes used in

designing menus with example.


and explain its
Discuss Java mail architecture with suitable diagram
components.

factorial of a number n and sends


3. Write and program where server calculates
client.
result to the client provided that n should be supplied by
What is the use of Garbage Collection in java? Explain.

Explain Method Parameters and Return Types java?


in
5.
events? List any five event classes.
6. Why is it important to handle
Discuss the process of sending email messages using Java.
7.
What is InetAddress class? Discuss.
8.
data from file and writes data to
simple java program that reads
one
9 Write a

anotherfile
10. What are the benefits of using swing components? Explain.
11. Discuss different driver types
on JDBC.
12 What is servlet? Discuss its life cycle.
and write it into
13. Write a program that read data of employees from keyboard
the file emp.doc

MODEL SET 8

Section A
(2 x 10 20)
Attempt any TWO questions.
write multithreaded programs in
1. What is multithreading? How can you
java? Discuss with suitable example.
of using inheritance. Discuss
2. Define inheritance. Discuss the benefits
multiple inheritance with suitable example. events
we need event handling?
Discuss the process of handling
Why do class.
listener interface with adapter
with example. Differentiate event
Section B
(8 x 5 40)
Attempt any EIGHT questions.
RMI?
What is CORBA? How is it different from
use this APl to send email messages?
What is Java Mail API? How can you
file to display "B.Sc. CSIT 7th semester"
What is servlet? Write a simple JSP
ten times.
HBox and BBox layouts of JavaFX.
Compare JavaFX with swing. Explain
Describe about default layout manager.
What is the task of Layout manager?
of CSIT 7h Semester and Practice Sets
46.AComplete TU Solution
block is mandatory in while handling excepti
6 When does the finally
Describe with a suitable scenario.
the procedure to create it.
7. What is the task of manifest file? Write
called on array of all possibilities
8. A non-empty array A of lengthn is
inclusive. Write a met
contains all numbers between 0 and A.length-1
returns 1 if
named is All Possibilities that accepts an integer array and
otherwise it returns 0.
array is an array of all possiblities,
need adapter class ine
9. Define event delegation model. Why do we

handling?
breadth
cube having data member's length,
:

10. Write a program to model a

interest.
height. Use member functions of your own
method overloading with suita
11. What
is meant by overloading? Explain
example
five classes used if file handl-
12. Why file handling is important? Explain any
briefly.
13. Write down steps for writing CORBA programs with suitable example.
Prinelples of Management
New Syllabus

Principles o f Management

Full Marks: 80+ 20


Course
Title: Principles of Management Pass Marks: 32 +8
No: CSC
411
Course
Theory Credit Hrs:3
ofthe Course:
Nature
Semester: VI

Course Description:
ontains The Nature of Organizations, Introduction to Management,
Management,
This course

Environmental Context of
Tlation of Management Thought, Motivation,
and
Planning and Decision Making Organizing Function, Leadership, Context of
Plarning Control and Global
Quality Management,
C o m m u n i c a t i o n ,

Management, anagement Trends and Scenario in Nepal.

Course Objective: to
is to give a comprehensive
knowledge
of this course
The basic objective the major functions,
organization and help them understand
shidents about course deals
with basic functions
of management. The to
and techniques orientation
principles,
organizing, leading
and controlling with special business
ike planning, practices which are essential to manage
modern management
other organizations.
successfully and
CourseContents: (3 Hrs.)
Nature of Organizations and types.
Unit 1: The goals concept,
- purposes,
and
Organizational
organization. processes
Concept of
formulation
-

effective organizational
goals. Goal formulation.
Features of Problems of goal
succession and displacement.
Goal
approaches. (3 Hrs.)
of organization.
Changing perspectives Management of functions
Introduction to Process and
Unit 2: of management.
and principles skills and
Definition,
characteristics, Managerial
Types of managers.
Managerial hierarchy.
management.
management. (5 Hrs.)
roles. Emergingchallenges for and
Management
Thought Human relations
Unit 3: Evolution
of theory,
of Classical science
limitation
and Management
Introduction,
contribution
Decision theory,

theories, System
theory, workforce
concepts:
Behavioural science management
Emerging organization.
Contingency theory. learning
theory, and knowledge
management, (5 Hrs.)
outsourcing, internal and
diversity, Context of Management environment
-

Environmental business
Unit 4:
environment. Types of political, and
Concept of
business
of economic,
socio -cultural, business concept
-
and
Basic c o m p o n e n t s of
responsibility
external. environments.
Social ethics- meaning and
Business
Technological responsibility.

Pproaches.
Areas ofsocial environment
in Nepal. (5 Hrs.)
business
Emerging of planning.
giicance. Making and importance
and Decision Process SWOT
Unit 5: Planning hierarchy of planning. concept and
methods.

tools for
scanning -
Oncept, types,
Quantitative
Environmental

of strategic
plans.
decisions.
egiC
planning. implementation
approaches.
Types of
Formulation and and Problem solving
-

definition
alysis. making and uncertainty.
Decision of certainty
aning. conditions
strategies.
under solving
sion making Problem

oncepts, pes of problem.


Practice Set
Senmesterand
Solution of CSIT 7 Prineiples of Management
. . .
49
Complete TU
48.A

Unit 6: Oganizing
Function
organizing.
APproaches
anizing
to organizi
an
n
6Hrs.
- classical
TRIBHUVAN UNIVERSITY
Concept
and principles
of
contingency.
Proxess
structuring
of
Delegation of authority ganization.
mean
Institution of Science and Technology
behavioural,
and
meaning ánd
types.
Centrali7ation
and
decentralizatio
- ning
meanin Bachelor of Science in Computer Science && Information Technology
mechanisti
Departmentalization

barmiers.
ic and
features,
advantages,
and
Concept
of organic
structures
a
views
MODEL QUESTIONS-ANSWERS
disadvantages.
and
nd
orgarnizational

advantages
modern
organization.
Types of
Approaches to
(3 Hrs Time: 3 Hours
network Conflict to leadership Course Title: Principles of Management
Unit 7:
Leadership
&
Leadershup styles.
leadership.
Types and chara Pass Marks: 32
Concept and functions

and
situational.
Group
tion.
formation

onflicts
confl in organizatior
acteristics of Full Marks: 80
Semester: VII
trait,
behavioral,
and types.
Managing
Course Code: MGT 411
(3 Hrs.
-

meaning
Group A
-

Conflict
and Maiv.

throughtion-Hygien
groups
U n i t 8: M o t i v a t i o n Need Hierarchy,
thro Attempt any Three Question (3x10-30)
employe
-

motivation
of Motivation
Theories performance.
Concept.
managed teams present business operation
molivate
system
to
and selt-
Discuss The challenging Perspectives of organization in
Reward life, has to
The organization environment is always changing. So the organization
work
-

quality of 3 Hrs Ans:


pertorm distinct function according to the changes in environment. So these
participátion
Unit 9: Communication communication
formal
mal and informa
Iypes of
and process. Barriers ve
to effective communicatior changes are creating the challenges to the organization. The following are the
Concept,
structure,

and
nonverbal
c o m m u n i c a t i o r n .

tion. challenging or changing perspectives on present organizations:


Interpersonal
Enhancing effective communication a. Open system: Traditionally, organizations were viewed as a close

Control and Quality


Management
Characteristics of effort.
ctive o
Hrs system where there is no interaction with the environment. But all the
Unit 10:
of control systems. Maontro business organizations of the 21t century periorm their business in an
quality. Total Quality
and types
Concept, process,
systems
of
oncept techni.ent open system which has to interact with the environment. The
system. Quality control management principles and niques. organization nowadays has to feedback from environmental changes
tools. Deming
(TQM)
-

concept and and modify business dealings.


Context of Management
Unit 11: Global Effects of globali b. Organization as culture: Culture is the sum of values, norms, tradition,
Methods ot globalization. ization beliefs and assumptions of the organization. Organization's disputes
Concept of globalization. and disadvantages
Multinational companies
meaning types, advantages, and misunderstanding are resolved on the basis of cuiture. So every
Trends and Scenario in Nepal (3 Hrs. organization has to develop a sound culture.
Unit 12 Management manufachu
industries in Nepal -

Growth of business sector in Nepl. Major C. Globalization: Globalization is the free movement of goods, services
and service sector. Existing manao
agement and people across the worid in a seamless and integrated manner. It is
oriented, import-substitution,
export of businesses in Nepal,
business culture. Major problems making the world single market. Globalization has brought the
practices and competition. The manager have to work hard by considering the global
Recommended Books:
AITBS Publishers and Distributors, Delhi prospective. Managers must be innovative and adjustable according to
1 Gritin, Ricky W, Management, the globalized changing
environment
2 Hitt, Michael A., J. Black, Stweart, and Porter, Lyman N., Management d. Learning system: In this competitive environment, customers expet
Pearson, India. new
ideas, new things and creativity in product or service from any
Prentice-Hall of India
Robbins, Stephen P., and Coulter, Mary, Management, organization. To fulfillsuch expectation, manager has to accumulate
New Delhi. knowledge and ideas of all personnel involved in the organization.
And on the basis of requirement it is essential to hire new or up-to-date
knowledge. Inandsummary, Managers need to manage knowledge of
hire knowledge from outside source to fulfill social
subordinated
expectation.
Temporary Employment: The tendency of contract job and daily wage
system has been evolved. The concept of permarnent employment is
being terminated due to priority to work rather than job security
f.
Human resource management (workforce Diversity): Employee
working in the organization belongs to different age, gender and
ethnicity. The overall age of the worker is increasing. Without employee
organization can't work but managing diversified workiorce is tough job
to the management. Employee retention is also challenging.
Sete
Proctiee
Semester
and
ofCSIT
sent:7 The teani members are empower
Principles of Management.. 51
m e m b e r s

Solution
TU feam
50.. A
Complete
Thetheir job having authority to ed an
E m p o w e r m e n t :

the watchdog. It
Th Judiciary (court of law) serve a s
canPlan
activities
legislature.The
Ocau
p e r f o r m i n g

Team
in control k n o w l e y
for
and
And settles and carries out judicial review for jústice.
the
independent

coordinate logic
and
rol8e. the mar
theirown play the e of coordin
agn Political Philosophy: It can be democratic, totalitarian o r
resounes,

to and hourtionge
acvording
infomation
of twentv mix of both. Democracy vests power in the hands of people.
work
ur
only
communicate

Time
flexibility:
The
workers
concept
are
allowed to
been
ce
thei operation ha Totalitarian vests power in the hands of the state. A mix of
Work and to 5 has
evolved
hour
trom
10
both is based on power sharing
been
of
working àce Pressure Groups: They a r e special interest groups. They
are
concept
of mployees in
planning organized to use the political process to advance their
b y f l e x i b l e h o uC
Participative
r su
. lture: Participation

level management collects


cipative has
volved. Top
evolved

os before setting opinior


lects position on an issue of social concern. They pressurize and
lobby government to protect their interest through change in
subordinates
making
decision

and
suggestions
from

i m p l e m e n t a t i o n .
goals an the direction of laws, policies and practices.
views o n its
Technologi
dceacli s i

taking any
D oe
nv e l o p m e n t :
nological development is
Technological

Legal Environment Legal Environment refers to legal


in every
anization. I eVe surroundings. It consists of acts, rules, regulations, precedent,
their owvnsseManags
perspe
emerging
hnological change ir
growing
arnd a n
with any
techn Procedures etc. It defines what management can and cannot do. It
be in ntoucnhe
touch to make busi,
should

and grasp
the opportu
oPportunuty
n the
the basis ooff
basis
consists of following:
business

modify products
and
servces on
changing needs Laws: They consists of law enacted by the parliament. They
have to
Nepal
protects the right and interest of consumers, Labour,
the customers. environment in Business and societies.
business

the emerging onsists of broadly in


of broadly n two
two types intena Court of Law: Courts are institutions established to solve
2 Explain environment
consists
nal an
Ans: The
business legal disputes. Nepal has three-tier court system. They are
e x t e r n a l e n v i r o n m e n t .

It consists of factors within


tho
rithin the organization. district court, high court and Supreme Court.
Environment
Intenal
the organization.
ides strength
It provides strength and
veakness to t Law Administrators: Various law enforcement agencies
within
located controllable
hy the
by organizations. They consists of Goal ensure implementation of laws and judgments of the courts
It is of law. Government agencies, lawyers, police and jails play
organization. procedures, structure etc.
culture, resources,
poucies and
owners, consists outside the an important role in law administration.
sists of forces
Environment
It
vides opportunities and
organization.I ii. Economic Environment: Economic environment refers to the
.
Extemal
the organization.
It provides opportunities threats
located outside be controlled by the organization. It influena economic surroundings. It influence the business and
It cannot
the organization. the organization. management activities. It consists of following:
and is also by intluenced

the organization Economic Systems:


environment consists of
extern
Broadly the emerging business Free Market Economy: This system is based on Private
General Environment consists of (PEST
vironment components.
Political-Legal E n v i r o n m e n t :
sector ownership of the factors of production.

Forces in the political environmen a


Centrally Planned Economy: This system is based on public
Political Environment: ownership of the factors of production.
of public atfairs. Political environme
related to management Mixed Economy: this is a mix of free market and
consists of:
centrally
. Constitution of Country: It is the most important leg planned economy.
Nepal is based on mixed economy
which determines the fundament
document of the state Economic Policies:
the power limit of citizens
rights of people. It sets Monetary Policy: It is concerned with money supply,
politicalinstitution. Every organization must consider the interest rates and credit availability.
rights and constitutional provisional while making Fiscal Policy: It is concerned with the use of taxation and
organization strategies. government expenditure to regulate economic activities.
Political System: It consists of ideological forces, politi Industrial Policy: It is concerned with industrial
election procedures, and power centers. A stabl licencing
location, incentives, facilities, foreign investment,
parties, technology
essential for
efficient and honest political system is transfer and nationalization. It influences the investment climate.
growth of management. Economic Conditions: They indicate the health of the
Political Institutions: It consists of Legislature, Executi which management operates. economy in
and Judiciary. The legislature (parliament) forms the la
Income: The level and distribution of income affect
The executive (government) implements the decisions or
expenditure, saving and investment.
Proctice Sets ond

CSIT 7 Semester and


Semester
hdienolofCSIT
Complete TUSolution The stages of
business Principles of Management . 53
Cycles:
They affectcycles
5 2 A

recovery
B u s i n e s s

and time
the can changes over
reexsion

and country. It
within family, community
paserity,
o n g a n i z a t i o n .

level.
influences costs
health Culture consists of
Inflation: Itisrisein price Attitudes: Attitudes a way of thinking
mean
or behaving
profitof organization.
price towards a person, ideà o r activity. Work
object,
motivation,

Stage
of
Economic evelopment:
Deve An
economy can be
and developed
profit motivation, attitudes toward gift-giving meaning
of
culture to
.
vary from
developed,
ievelopot/ developing country.
developing
Nepal is l body gestures
culture.
and towards time

It is making
the whole world as one single
the
Values and beliefs: Values are basic conviction. Beliefs are

ountry operations through mar based on


slobalization:

descriptive thoughts held about something


brings trade and
t pramotes multi-cou

ndnd other restrictions. It


other co and
knowledge, opinion o r faith. Like faith
o n god. Culture

ving orld r ranization


ade. Other
trade.
(WIO)
Other regional promo
influences values and beliefs of business.
forces for shaping
through open Religion: Religion is a major influencing
giobaization
ASEAN,
EU etc. groups the attitudes, beliefs, motivations and values of culture. It
ii
SAARC Socio-Cultural Environment
influences the products business organizations
should

to all the social-cultural surroundings that influeno produce. The type of food people eat, beverages they drink, of
clothes they w e a r and materials they u s e for construction
refers
t
Tganization always
anganizational pertormance.

sider
conside the socio-cultural operates in houses. lt vary from religion to religion.

responsibility environme
so it hould
siety social communication. It is
concern
as increas Language: Language is the means of
Nowadays the growing Language also influence
to the business. Socio-cultural dependable o n cast and ethnicity.
the
additional

sists of (Demography,
pressure
Social institutions, social environme business.
iv. Technological Environment: Technology refers to knowledge
factors tools. Organization
Demography: Demography 1S concerned with h. Skills, ideas, procedures, equipment and
.
hum transforms inputs into outputs using technology. Technological
population and its distribution. Demographic forces environment refers to all the technological surroundings that
of the following influence organizational performance.
Size, distribution and growth of population
Level of Technology: level of technology can be labour
Age mix of population based or capital based. in labour based technoiogy human
Migration of population etc. labour is mainly used for the operations whereas machinery
Social Institutions: It consists of family, reference
grou or technology or automation is mainly used for operation.
and social class. The level of technology influences management.
Family: Two or more persons related by blo P'ace of Technology Change: Technology is a dynamic force.
marriage or adoption who reside together constitut Its pace of change is accelerating. In general labour based
family techrology is replaced by capital based technology.
Reference Group: They consists of group that have Managenment should adapt to the changing iechnological1
direct or indirect influence on the attitudes aa forces. It should also upgrade the skills of human resources
behavior of corsumers. to effectively cope with the demands of technological
Social class: t is the rank within a society. It can changes.
classified into upper, middle and lower. Technology Transfer: Technology transfer implies technology
Social Change: Social change implies modification imported from technologically advanced foreign countries. The
relationships and behavior patterns in a society. Life st speed of technology transfer is important. Technology transfer
and social values promote social change. Life style is can be done through globalization, projects, trade, technical
person's pattern of living reflected in his activities, inter assistance, training and publications.
and opinions. It affects product choice. Management shou Research and Development (R & D): R & D is the essence of
consider social change. innovation. Customers expect new products of superior quality
Cultural Factors: It refers which are safe, comfortable and environment friendly. This calls
nfiuence
to the cultural surrounding for increased research and development budget.
organizational performance and output. It is createu
society. It is transferred from generation to Government and industry collaboration in R & D efforts is also an important
generation. It is sia aspect of technological environment. Industries also collaborate with universities.
Sets
ster and Practice
Principles of Management ... 55
Semester

CSIT7
Selutienol
organizaio.
organizational
ture. It is
TU of modem
teams.
of of work
m o d e m

Complee
ypes off creating function, Team Structure: This structure
consists entirely
54A o b. innovations. The
3Descrbe
different
the s
the
plement
p r a s

plans
p lans and decisions structure of getting popular for n e w product
development and
synergy.
The team
of team produces
s t r u x t u r e

di
i m p l e m e n t

fo determin anhd collective performance members as


O r g a n i z a t i o n s
thhin of
raquied of deisionSibilito8
ioh is greater than the total performance
the tasks,
Ans paes

It s a
assignine performance
right
arganization

goak therr
limk, individuals. It consists of:
decisions. It creates skills
to make
and
to
sijons anuauthornty make
but complementarý
a r g a n i z a t i o n a l

organura job pasitions Group of members with multiple


creating
It
allaating ensures mplementation of
and alloanation.
and Specific team goals
tional resources to achieve organizatio and
posidion
posi -authority
resporsiilitn-auth
80als
Coordinated efforts
ofor
i naboutthe Writers
in classification of the
to make decisions
utilization

But for the simplicity we can


types of Authority
Shared leadership roles in problem solving
srategies

There is
no
uniformity

o r g a n i z a t i o n a l
st
s But
tr
ruuc
cttu
urre
e..
folle
Ihey a r e a s llows:
s t r u c r u r e
classify four Individual and mutual accountability.
moderm

organizathonal
structu on
superimposes

ne ofmodem Structure:
This structure
basic
o r g a n i z a t i o n

structure is nctional.
Matri 1he

functional
structure.
is superimnp ove unctional strue
T e m p o r a r yp r o j e c t s t r u c t u r e

are assigned
aeparunents
from functiona ma on
Speaialists wdely used
for project Figure: Work Team Concept

projects This
structure1S General] Advantages:
The collective performance is high
Manager Decision making is decentralized
There is no rigid chain of command
Performance evaluation is by members themselves
Manager Manager Manager Promotes creativity and innovation
Manager
ProjectsProduction| Marketing
Manager Finance Personnel
******************* ******* . . . . . . . .
Disadvantages:
www*ena
********
Effectiveness of the t situationally dependent.
Conflicts may arise between teams and departments.
ManagerProduction Marketing Finance Personnel Duplication of efforts of departments and team.
Group Group Group Group Network Structure: Network structure is a series of independent
Project A C.
eaeesreanznas*n**************************************************** ...
ruincuonal a n a project structure. Every
business units linked together by internet and computers in an
The matrix structure combines This is also called
information system that designs, produces and markets products. It is
projet is headed by a project manager. roject composed of a series of project groups or collaborations linked by
structure. Employees continuously work o n projects networks. Most activities are outsourced. The business functions are
management
Features of Matrix structure not located in a single building. The headquarter acts as "broker"
Hybrid structure electronically connected to completely owned divisions, subsidiaries
Functional managers and independent companies.
Project managers Packagers
Problem of unity of command
Specialization Designers Suppliers
Suitability for multi-project organization.
Advantages:
Environmental adaptation
Flexibility in organization Corporate
Facilitates efficiency in utilization of resources headquarter
Motivation and commitment through participation
Free time for
top.management
Employee development
Disadvantages: Manufacturers Distributors
Dual boss and
multiple command structure: Advertising
rower struggle between functional managers and project manage Agencies
Duplication in the efforts Figure: Network Organization Structure
The structure is
costly to implement.
ster o n d
o n

Practice Sets
a7 Semester
Seme
7
Principles of Management ... 57
of SIT
S e l u r i e n

TU
Complete

changing environment
5 6 A

to ch
adapl Disadvantages:
Advantei if
ntages
to
Prorides lheribilit lity toget, they are miles
ark togeunrt firms Process is very lengthy and complex
to
work
apart.
through effectively use the 360 degree
allows
peope
of eftic
in distinctive competencies
outsourcino
in ing Heavy effort to train the employee
to

which
a d v a n t a g e

T a k e
Aliowsconcentrationin organizing
c o m a n yd o e s h e s t . the .Overlapping and duplication
theory of
Maslow's need hierarchy
What is motivation? Explain
Diadvantages conflicts. motivation.
c a u s e

Ans: Motivation:
actors

with networked
firms can create
Intormabion sharingwith
Too
many
of techno. competitors Motivation is inducement for better performance toward goal
threats
due to
use of massive use
gy Achievement.
Saunity

S t r u c t u r e :
It is the act of stimulating, inspiring or energizing employee for higher
whichhich elaborates the effoe
d
60
Degree

new
way of
thinking Iveness of
performance.
Human resource is the only one resource of the organization
which
t is
to activate the
sIr manager takes the activates all the resources of the organization. In order
t e a m s t r u c t u r e

eac

Under
this
hlosopdecision
philosophy,

ma and feedba
decision making accountability human resource organization motivate the employees
which ultimateiy
and central
responsibility
shares
as, views
the ideas, feedback each membe
to activates all resources of organization.
Each
member

u n d e r the
structure
so that
s o that
increased.
the cooperation,
ordination and mutual "Motivation means a process of
desired goals"- William C. Scott.
stimulating people to action to achieve

can be
understandimg
standing ca ing from different persons combined
The different i
60 degree
assessment. provide # Features of motivation:

more
accurate
Psychological Process
:mostly focused on the contribution of emni
360degree
organizing8
balanced way to aploye
tencies. It is balanced
Complex and Unpredictable
The
skils along with the competencies. view the Continuous Process
and their
pertormance
of employee
in the area of teamwork, leadershin Situational
actual
mteraction, mterpersonal communic nication, mutual and

accountabulity
and sincerity of work habi ne Pervasive
contribution, muial the Goal Oriented
enmplovees.
Positive or negative
Productionn Intrinsic or Extrinsic
Manager
Theory of Human Needs (Abraham Maslow): This theory also called theory
of human needs. This theory advocated that human behaviour is motivated
BOD HR Manager by needs. The need of human being forms a hierarchy. People satisfy most
pressing needs first. Human needs are:
The basic premises of Maslow's Theory are:
X(CEO a) Man is a wanting Being: Man continrously wants more and more. Nó
need is ever fully satisfied. When one need is satisfied. Another
R&D Marketing
Manager Manager emerges. Needs activate individuals to work. They influence
behaviour. They motivate for greater efforts.
b) Satisfied needs do not motivate: This is a deficit
principle of
Finance Manager motivation. A satisfied need does not motivate.
c) Needs Have a hierarchy: Human needs are
arranged in a hierarchy.
Advantages Needs are satisfied in an order. This is the
Comprehensive View progressive principle of
motivation. People have set of five needs.
Ihe diferent ideas They are physiological
needs,
coming from different persons combined provie safety needs, social needs, Esteem needs and self-actualization needs.
more accurate 360 degree assessment. Physiological and safety needs are lower order needs. They are most
Feedback helps self
IncTease responsibilities and alertness of
development pressing. Social, esteem and self-actualization needs are higher order
employees needs. They are least pressing.
Farticipation of employees increases their motivation.
Practice Sets Management .. 59
and Principles of
and

ester
S e m e s e r

CT
7"
Sohution
of
TU
Maslow's Theory:
Strengths of
Complete

A motivation.
5 6 .

They
It is usefulguide for understanding understand.
and easy to
It is simple, practical
Self Weakness of Maslow's Theory: arrangement
of needs.
the hierarchical
Actualizatiorn

Research has failed to verity also by perceptions,


i
motivatednot by need but
only
i. People are
Hicher
Esteem expectations and experience. motivate people.
single need may
arder

Multiplicityof needs rather than a


not provide a
This theory does
Needs
ii.
Situational factors have been neglected.
Social iv.
with motivation.
******************g **
complete basis for dealing
Group B
Safety (10x5-50)
Lower TEN Question
order Attempt any Point out its advantages and
Needs 5. What do you mean by workforce diversity?
Physiological
disadvantages.
Ans: Workforce diversity: of
s: They iinclude basic survival needs for f Without human resources, we imagine the accomplishment
cannot
needs: They of plans and output
the lowest to implementation
Physiological

sex. They are


organizational goals. From planning at
water, dlothing shelter,
Salary and needs. evaluation, human resources are
essential for the various capacities

are
hodily
requirements.
wages satisfy different level. But,it is not to hire and manage homogenous
easy
set of

They
physiologicalneeds. Globalization and growing legal
concern for equal
human resources.

Needs They
consists of needs for protection1from physi opportunities at job position, the complexities
of work force variation i.e.
Provident
Prov fund, pension plan, health there are different
Diversity is increasing rapidly. In modern organizations,
harm.
emotional

workplace satisfy safety needs. in terms of age, gender, caste and race,
and
safetyin types of human resources (workforce) etc. They hold
insurance,
consist of needs for ffection, Belongin economic status, social status, geographical variation,
Needs: They In organizations infor challenge in order to
Social
social acceptance. different individual goals. Management is facing more
and
friendship
nends at work, employee clubs, refreshment fulfill the needs of human resources, to fulfill the basic legal formalities as
groups,
needs. well as to bear social responsibility. Getting synergy from diversity of human
programmes satisfy social resources is great challenge to the current management.
Needs): They can be internal self esteem
dEsteem Needs (Ego needs. Internal esteem
Benefits of workforce diversity:
needs. They can be extemal public-esteem Variety of perspectives:
advancement. Extemal
needs can be for self-respect, autonomy, Increased creativity
esteem needs an be for status, recognition, praise, prestige
Increased productivity
needs. Praise and greetings
Position titles, luxury cars satisfy such
Improved performance
from the subordinates is also desirable. Brand reputation
Self-Actualization Needs: They consist of needs for achievement
Better decision Making
utilization and sell
growth sel-development. creativity, Talent
fulillments. It is what
becoming one capable
is of becoming. Thee Higher employee engagement and reduced turnover
needs can neve be fully satisfied. Challenging jobs, Advices from
Improved hiring results.
Limitations of workforce diversity
employees and parbicipative decision making satisfy this need. Poor focus on leadership qualities
Implications of Maslow's Theory for Managers:
Chance of conflict
Motivation is need-based. Satisfaction of needs motivates people. A
Decrease in mutual trust
employes have needs.
Misted ned do not motivate. Only unsatisfied needs make peo
Creating communication problems
Increase in complaint
wILingto work The degree of need satisfaction is not rigid. t

from person to
person. 6.
Difficult to apply
Define business ethics.
)
augers should endeavor eds d Explain their significance.
to satisfy the unsatisfied net Ans: Ethics in
general means the acceptable principles,
employes for motivation morals. In' broad term, ethics is the situation of
beliefs, conscience, and
d) Higher order needs providepurposes. integrity on actions and
higher motivation.
and Practice Sets
Practice

Semesher
Principlesof Management ...
61
CS1 2"
TU
Selutlon of and
actions
a n d

set policie t
deals and measures,
Complete
Bthics in day lo day life
Ips to Ca with
classify, adulteration, cheating in weights
price hiking,
principles
0 . A

E unnatural false
products, promoting
and vahues.
and and harmful
8? tt
a c t i o n s

is right quality
sial

low business

others. Reells us to
bolets, and what
b efits of selling of natural resources, etc. of various
things for
of
is a d , efits abusive use
principles

what commitment, and the entire


rding
moral
and omg bad ght ppractices
roci in real sense suitabl Because of business ethics,
consumers

what is good and


avo1d
right orgarizations.
only
things adapting for their consumers and treating c o n s u m e r s

fair. society get benefits. of


do good their
have high level
doiness ehenn
ethics, lor
need to
b u s i n e s s
b e n e f i c i a l

the study of Improved confidence: Customers


Business ethics
the
their
c u s t o m e r s
are
Crane
"Bu Businwhere ssues
i of right
s s u e s of
right and ness confidence for making product purchase
decisions.
the business
Accardingto
Andrew
and
decisions
decisions

simple but
but broad vi wrong ar
helps make
decisions with
confidence
greater
as

very
simple terms of quality, utility,
business ethics treat fair in
ctivities,

organizations with
g+ves
s i t u a t i o n s ,

definition
of the business org Business ethics helps
to
This
Tns
ions and actions b e t w e e n ions .By etc. of the products.
addessd
addressed 4:fferentiate between the correct and
d i f t e r e n t i a t e
reliability, quantity, price,
increase the confidence
we
can
false is the foundation for
ethics,
Survival and growth of business: Business ethics
o r g a n i z a t i o n s .

business business

the busin.
ethics those organizations
ofthe the
"the as
business survival and growth. Consumers trust
husiness
activities

Raymond
C
B a u m h a r t
defines

man must ethics


promise that he will not b while follow business ethics absolutely
because of which consumer's
cannot trust to the
business
Likewisc

in
which the
the
Here,
business ethics one
step ahead, is arm retention c a n be maintained. But,
consumers
r e s p o n s i b i l i t y

t which once cheated to


them.
to the
society
knowingly.
benetits by the ganization. Here
organization. Here, business ethics
can
business organization
ethics prutects the righis of
to the soaial also to all oth
other components of Protection of c o n s u m e r s rights: Business
but
to choice, right to
ontribute
limited to
a o n s u m e

ness ethics
r s

ethics, the business organization m


the consumers such as right to information, right
be to redress,
to health and safety, right to be heard, right
onlr business
nat for st compensation, right
For
instance,
oods and services at reasonable these basic rights of the c o n s u m e r s .
of good quali
business

etc. Business ethics must safeguard


regular supply should avoid unfair Sociaily
This provides sufficient evidence of being socially responsible.
mers. Business organization
provide a a o n s u m e r s .
Busine
trade
prices to their
adulteration,
misleading
misleading neating in weights advertisements,
responsible organizations get ampie opportunity
for growth.
like
etc. For the employees, they provide follows the fair treatment
practices
black marketing, fair Develops good relations: Busiriess ethics
ortunities and fair consumers as well as with entire
business community.
and measures,

working
conditions, grOwth
opport treatment to principles to the
business society.
good business, organizations should avoid ans
This helps develop good and friendly relations between
their employees.
As ethical
channel members as well a s
the on PE of Being ethical in business, community takes the
business organization assa
the consumers,
maintain good profit and
exploitations to
fair business competition in the market. Thev must good organization. Thus, business ethics helps to business
Ther must encourage
societv. contribute
sustainable growth. Along with growing economy, ethical
the governmeit,
practice helps improve the standard of living of the society.
to
deposit taxes regularly
Features: Good organization image: Business ethics creates a good image of the
be
Code ofconducts organization. If the business follows all ethical rules, then they will
the The society always supports such
Framework for business activities fully accepted by society.
business and businessmen who follow the necessary business ethics
Moral and social values based
Focus on protection of stakeholders and avoids dishonest activities. If the business succeeds in creating
its goodwill in the society, it flourishes well even in the
and
maintaining
.Voluntary most competitive markets.
Comprehensive Protects employees and shareholders: Business ethics is required to
Comparatively new concept protect the interest of employees, shareholders, competitors, dealers,
Significance of Business Ethics suppliers, customers, government, etc. It protects them from exploiting
Business environment is being more challenging because of growing each other through unfair trade practices like cheatings or frauds.
compétition because of globalization. No matter the size and nature o Ethics compels each entity participating in the business activity to
business, none of the organizations can sustain their business with properly execute its role by adhering the established.code of conduct.
Benerosty of time, market situation, and its customers without ethica Since everyone is disciplined and functions appropriately, business
standards. Not only the customers, but grows well in the long run.
employees also pay high value to u Other points for
oganuationswith high business ethics in practice. So, business ethics is significance:
Supporting pillar for stability, and prosperity of business. More specna Healthy competition
business ethics has the Smooth functioning of business
following significance. Promotes consumer satisfaction
revents malpractices: Business ethics prevents business malpraactices Maintains the support from employee.
treating in unfair trade practices such as black-market
Semester and PracticesSots
luion of CST 7* Principles of Management... 63
planning.
of
6 2 .A Comple
importance
the Types o f Decisions:
Highlight

of
Planning

predeterminat
of future course of action On the basis of frequency of recurrence:
1. routine and
Concept
decisions are.
g o a l s and choosing the
#
Programed Decisions: Programed
Ans:

s of
Plannimgprocess
Planning
is the
of setting
setting goals
to actions achia
a.

repetitive in nature. If a particular


situation occurs, managers
will

It is the it. Decision makers


often, develop a routine procedure for handling
thosegoals.
ofaction.
about all
all WH
WH questions (like what t know in advance what decisions he/she in
has to take particular
blueprint about
the decisions are
than 90% of managerial
do, h
a d v a n c e

tis
in is to do it) situations. In practice, more
deciding it a n d
who
deal with such
tis
whern
to do course of action from the alternatives. of this ype. Middle and lower level managers worker
Example: payroll procedures, recruiting regular
cours

to do,
future
selects for allocating resources. It also decisions.
Planning
guidance
for a l l o c minimiz the in the factory.
It
erves
as
i Programmed decisions are
Non-
theeffective control mechar b. Non-Programmed decisions:
anduncertain
ism frequently. They deal with
standard

the unstructured and occur less


s e r v e s
as relatively is new
non-routine problems. Each problem
hat to do, ha
t also
what to d o how to do it, complex, novel and
about
and different from those experienced in the past. Managers apply
Definition: advance
in
be achieved.-S.P. Roben to d
ides the ends to
deciding
is There are no
Planning
to do
it.
provides
It judgment, intuition and creativity to solve problems.
level deal with
and whowhosis plannin nt: Planning facilitates
standard operating procedures for it. Top managers
rance of Planment Plan better
mobilizat non-programmed decisions.
allocation and coordinati
ation o f r e s o u r c e s .
Activities are pulled togeh
2. On the basis of nature of the decisions:
cooperation and coord
a. top level
Strategic Decision: Those decisions which are made by decisions.
interdepartmental

for achieving commitment of management for long term purpose are called strategic
anagers a
ensures
Plannin8 decisions.
Commitment: the organization is focused Long term goals, objectives, strategic plans are strategic
b)
employee.
Al people inthe towards b.
Tactical Decision: Tactical decisions are the decisions made by
achievement through planning. Such
the yard department level managers for their respective departments.
Planning
serves as the vardstick for the effective
contrl decision translate decision into departmental actions.
strategic
Con

which is compared
with the actual performano Operational Decision: Decisions taken to solve the problems regarding
C.
providesstandard Effective control corrects the deviations.
deviations. day to day operation are called operationa decision Authority is
find out the
Environmental factors: Organization operates in t delegated to lower level management to make such decisions.
Adaptation of factors are always ch
dynamic environment. Environmental
3. On the basis of Participants involved in decision making process:
to anticipate the future to adapt the in t changes d. Individual Decisions: The decision which is made by a single
Planning helps person is called individual decision. They are generally prevalent
environmental factors.
to focus on goals. It defines gu in small organizations.
e) Goal Focus: Planning helps managers e. Group Decisions: The decision which is made by a grouP of
courses of action to achieve them.
and determines persons is called Group decision. Under this method, group
facilitates efficient use of resourcs
Eficiency Promotion: Planning members participate in discussion and share their opinion, ideas
is a rational approach for goal achievement. It reduces cost and views to reach in decision.
eliminating waste and
avoiding duplication in efforts. 4. Other decisions:
environmental scanning
Uncertainty Reduction: Forecasting and Organizational and personal decisions
future uncertainties. Forecasting and environme Policy and operational decisions
anticipate
scanning helps to anticipate future uncertainty. Financial and non-financial decisions
Short term and long term decisions
Tool to remember CAGE to Reduce uncertainty 9. What is centralization? Explain its disadvantages.
8. State the types of decisions. Ans: Centralization:
Ans: Decision Making Centralization is the process of systematically retaining power and
decisio
Choosing the best alternative among the alternatives is call authority in the hands of higher level managers.
decision making). In centralization, all the decisions are made by the higher level managers.
Manager always performs through the decision making. Top Managers make allthe decisions. Subordinates simply carry them out.
It is a means to achieve ends. Disadvantages of Centralization:
a) Delay in decision: There is possibility of delay in decision making
5apath selected for moving the organization from existing
desired state. because the files need to move through bottom to top level for making
Au the
orgarizational problems are solved from the decision making P
a
Prgchi
P r a c t i c e Sets
an d
nd
S e m e s e r eser
Sehutien a
CS m a k e all all the decisic Principtos of Management .. 6 5
TU CANnot

C o m p h e

ability
one
xTM

lasing busnss
Gavacity opportunities
ot subontinates
b u s i n e s s

can
o p r
andickly
Profit
utilized dy. Thi
iaision

i n T E N S S
Only
the
chan.r
o losing

iess. Only one manager has to make


fitability. Leaders have position-based
obedience from
subordinates.
Authority.
Influence
They
flows
demand
from
tctal
leader to

all in
naking p o E s

diterent furtional
areas.

ay ot be
ingle person ma
Singl.
he followers as they like.
he decisions at quick run effer
effective Leaders give reward and punishment
d A 7 s o n

nen for n

iecisionsmaking al d
qualithus,in
or
d e T
nmaker may
s i o
may decrease the
n
maker
rease
Strong control by the leader
canaity
arerational plans
operational
plans and implementation Advantages of Autocratic Style:
which higher
imitad
strategies situations. Achieves
t
Effective in crisis and emergency
organization

of t h e
mance t of
n has to make all the decision
t o m u i a t i o n

in short r u n at factory floor.


pertormance

sut lon
resut low
As only One productivity
rk under overload. Work ove thus Chain of command is clear.
the
manager
should
always
decisian
making.
Thi also decreases the
This verload
quality Discipline is maintaincd in the organization
elay in
mayinder
hinder on
on
growth
8Towth a
and
nd
diversification of
Very useful style for small organization
deisions This of Disadvantages of Autocratic Style:
Orgarnizabon motivation:
e level
Middle level managers, supervis
m

Subordinate participation in decision making is ignored.


Low
morale
and
not involved in ecision making proc and
d
onerating
emplovees
are

sibility of job accomplishment but no Itdoesn't motivate employees.


Subordinates work by fear of punishment
respansib
have only decisions fr
a i t decisions
to wait from top
Thcv
for making
decisans.

decrease
Iney nave
n morale and motivation of the authority.
employes
It does not consider situational needs
It is not useful style for big organization.
These
causes
skilled and experienced employees
Tunover rate af qualified,
get Democratic: Power and Decision making is decentralized. Discussion,
mreased
make decisin. consultation and participation is encouraged. Its features are:
power
misuse: 1op level managers On the Leaders consult with subordinates about decisions. Subordinates
Chance for is centralized
el the authority
hasis ofthinks
maker s/hejudgnent
pesonal as authority of the organiza:ECISion
is the sole nis willingly cooperate with the leader. They are, encouraged
io

participate and give ideas.


ot power 1or personal benèfits.
incuases chance of misuse Authority is delegated to subordinates
Ladk of environmental
adaptation: n this system, decisions may
limited canab Influence flows both ways
because of work overload and
delaved and infleable Performance-based reward and punishment
Limited knowledge and experience of decision mäker may not k
ready to take any risk for new business ideas and practices. hus, Information is shared between leaders and subordinates.
on traditional way. Thus, there ho Advantages of Democratic Style:
manager takes decisions only can
problem for adaption of environmental changes. Subordinãtes involved in decision making. Promotes participation.
0 Explain the different types of leadership styles. Effective where team work is needed
Ane Ladership Styles: Leadership style deals with the way leaders influence the Result in high morale and productivity.
toliowers t can be boss-centered, subordinate-centered or relations- Motivates subordinates.
centered Leadership styles can be: Provides opportunities for development and growth of subordinates.
Autocratic, Democratic, Free Rein Styles: Disadvantages of Democratic Styles:
Managerial Grid Style It is time consuming and slow
Four Systems of
Management Style It can result in indiscipline
Stuational Style Leaders may avoid responsibility.
1.
Aulocratic, Democratic, Free Rein Styles: Free Rein (Laissez Faire): Leader Granis Authority and responsibility
Auwcratic Denocratic Free Rein to a group. The role of leader is to provide advice and direction as
requested by the subordinates. Power and Decision making is
entrusted to the subordinates. Features are:
Foiower FolowerFollower Follower Follower Follower Leaders use very little power and control. The serve as an

Aulocratic: Power and information center.


decision
making is centralized. Its features a Subordinates have complete freedom to make decisions with
Leaders make all the decisions. They order what to do ana no w to decentralized authority and responsibility. They have high degree of
do. Subordinates
are not
consulted. independence in decision making. Influence flows in all direction.
Subordinates set their own goals. Their potential is effectively utilized.
e n

octice Set
67
of Management..
Semestr

oSI Principles
U S o b i e n

Rein
Style
consulted. It is group
d
autonomy to work.
C o m h

and
ork. Thes
subordinatives
A afPr* f r e d o m

Three: Consultative;
Adrantes

have
They set
System
Followers has power
and control.
It is leader
and
the
S u h o r d i n a t e s

ervetorresearth-onenteN reative jobs centered. democratic leadership.


Four: Participative:
Onenek

System and control. leaders.


morae
s high followers have power are
successful
Style Likert, system for managers
Kein
According to
Emploype

f Frefarusstowardg
toward goals achievement. (Contingency) Style:
Situational situations.
D i s a d v a n t g g e s

lack
4. which is best for all
There is no one style
Subordinates

Fraduthvity
Sufers

situational.
be
avoidetd
It states that leadership
style is power
of leader
may
leader-led relations and position
Structure of task,
Respansiiliy

Caordinationispoar affect leadership style.


and Mouton):
and situation variables that communication.
(Blake are the of effective
barriers
GridStyle communication.
the Explain
Mangperial
Hugh9 Define
2 9.9 1. 'Communis'
the Latin word
A n s : C o m m u n i c a t i o n :

19 'Communication' is derived from to inform, to


.Theword 'common'. Literally,
communication means
so
the concerned people
means
which
and message to all
tell or to spread information
c o m m o n to them.
that it will be information on

Communication is the process


of Transferring/Transmitting
another.
interest from one person to other
common and
It is the exchange of facts, opinions, ideas, suggestion
information from one person to another.
information from one
9.1 "Communication is the process of transmitting
Low-Concern for Production
9 High to another"-R.W. Griffin
person
Communication:
Barriers to Effective
are the factors
which prevent effective
.11Manager (mpoverished Style) Very little concem fa Barriers to communication
in
obstacles that creates problems
producion or people. communication. Those are the
99 manager (Team Bilder Style): High concern for people transmission. They are as follows:
and barriers includes distance, noise
and
ideal style. Physical Barriers: Physical
production. Tnis is the
a.

.i5 manager (Midle of Roader Style): Balanced concem t physical arrangement.


Distance: lt is physical distance between
sender and receiver
production and people. For example physical distance of Taplejung and Bajhang.
91 manager (Task Manager Style; High Concern for Production minimizes the
Noise: It is the unwanted sounds or disturbance. It
and itle concem for people. sender and
effective transmission of messages. It distract the
19 manager (Country Club Style): High concern for people, litle
receiver.
concem for production. of office. For
3. Four Systems of
Management Style(Rensis Likert): Physical arrangement: It includes the layout
of same department working in different floor
example. People
yutem One System Two Bystem Three 8ystem Pour (for example top floor and ground floor). This obstruct the
communication
Authoritanan Paternalistic Consultative
Participative/
Democratic
b. Psychological Barriers:
Selective Perception: selective attention, distortion and
retention are selective perception
Follower's
caders Power and Control
Filtering: The sender filter the information which is favourable to
Power and Contro. receiver
************s M Lack of trust
ig: Lihor's Four Emotions: hate, anger, fear love etc also makes the
System of leadership Style
System One: Exploitive-authoritat autocratic leadership. tB communication less effective
leader-<centered. Leader has
System Twa: Benevolent-authoritati
power and control Work pressure: work pressure also creates adverse for the
also authoritative; Patronizing leadership. effective communication.
leader-centered Leaderhas
has power
pox and control.
o f CSIT
T 7 Se
Semesrer ana Practice
Soluion Sets
Complee
TU
684
Organizational B a r r i e r s

Poor Planning l'oor plannine of Th Principles of Management -. 69


selection creates sets standards for performance. Standards
encoding channel turbed comm Setting Standard: Planning
omplexity: omplex organizatioona essage a.
are starting point of control. They
a r e targets against
which actual
Structure

un-necessary
c o m m u n i c a t i o n
hierarchy serve as
barriers murchuricate performance is compared. Standards
quantity, costs, income and e .
can be in terms of quality,

Standard costs, standard operating


standards, kilometers per liter
time, sales goals per salesperson, quality
Influence Influence by supervisor or
efes are examples of standards.
Standards should be quantifiable.
affects communication
higher autho b. Measuring Performance: The second step in
control is measurement of
should be a continuous
Organizational Distance rty actual performance within a given period. It
observation can be a s o u r c e
on-going process to get feedback. Personal
Bad TimingE
lack of me for the of measurement. Interval reports relating to quantity, quality,
Costs,
the commurication. communication alse
also dish income and time provide information about
actual performance. They
be oral o r written. Measurement is
not possible without
Technological problem: disturbance on
can

electricity, telephone also cause disturbanc email, information.


of actual
It is related about the
inten C. Finding deviations: The third step in control is comparison
d Semantic Barriers: language relatedted prodla be
performance with standards. Performance can be equal to, c ahigher,
or

associated with communication. r u s e s and


identified. The
be lower than standards. The deviations are
for deviations is
Language: The meaning intended by the incidence of deviations are analyzed. Responsibility
different from the meaning sender
lerstood by receiver located.
du
can Corrective Actions: The performance is evaluated in terms of
differences in language. due tot d.
deviations. Corrective actions are taken to bring performance back on
argon: Unfamiliar Jargon or technical track. They can be:
communication. language disu Do nothing: If the performance deviations a r e within the
12 Explain the basic steps in the control process. allowable tolerance, no action is taken. Status quo is maintained.
Ans: Controlling Correct deviations: Actions are taken to correct the deviations.
Controlling is the process and measuring actual performance and com They can be more training, better raw materials, design
it with planned peformance and taking corrective actions if
there is devi improvements and greater motivation.
found in actual and planned performance. Planned Change Standards: Standards are revised to make the appropriate
performance s
known standard. Control is managerial
process. It ensures that at and realistic. Change in circumstances may require change in
activities conform to planned activities. So we can standards.
say that the controli Control should focus on critical control points. They are key performance
management hunction that focuses on the process of monitoring activite
ensure that
they being
are
accomplished
as
planned.
areas. They are the points where
de tions from standards will cause the
#Process greatest damage to the organization. They are critical to the survival and
of Control: Control is a continuous process. It exists int success of the organization. Corrective actions should be applied to such
organization til the organization exists. The Process of control
explained as follows: can critical control points.
13. What is total quality management? Explain the tools of rQM.
Ans: Concept of Total Quality Management:
Setting Total Quality management is a management philosophy of continuously
Standards
improving product quality through everyone's conumitment and
involvement to satisfy customers' need.
Quality is the perception towards effectiveness and utility of any goods
Corrective
Active Measuring and services to satisfy the needs. As the expectation of the people may
Control Performance change continuously, the same level of quality cannot satisfy all the
customers. So, the quality of the product must be improved
continuously. It is believed that there is no limited scope for quality
In this ground, management should also focus its efforts
improvement.
for the gradual and continuous improvement of quality. This concept of
Finding and gradual and continuous improvement in product quality is developed
Analyzingg as a management philosophy which is known as total quality
Deviations management.
Fig: Process of
Control
CT
S o m e

ets
S n

is a strategic commitmen
ement by
omanagement
Ce
ake
quality guiding
T o nu a i R ym a n g e m e

business
to
a
is
whole
apnoach
Principles of Menagement. 71
R.W.factGriorffinin
henge
tveytheneitdoes V. Statistical Quality Control: It includes a set of specific statistical tools
OM that can be used to monitor quality. This method extremely uses thee
ef
Toos
first
Hn Employees ensure quality
time
Employees
whi.
probability and other statistical techniques to control
D i e r e n t

Ri
for the
first result is time. The
the sampling
zero the quality. It is also one of the major tools used for quality
defect wot
i
chance to make
They enthave second
do
assurance. Benefits of Statistical Quality Control
conet Renchmarking is the proce
Benchnrking

from
bcess of
Benchmark

best practaces nizai


impression.
"OmD
of other
Basic
aring and
It identifies the bottlenecks and trouble spots.
It provide same ans of detecting error at inspection. It leads to
lstming
They exceptionally high aa
do
more uniform
pertarmance th roduce quality of production.
various
dimensionsthings.general
Such
superiar e in terms of
It helps increase the customer satisfaction through uniform
parison may
practices, sevies, product design, usiness proc as goods and services. SQC helps reduce inspection costs.
be done
administrative
processes. It can
internally o and/ It assists in reducing number of rejects and saves the cost of
the
Internal
benchnarking compares
employees, ete
department process,organization
erformance ernally,
with speciis
of
material.
It
promotes the understanding and appreciation of quality
unit thewithin where as
the best control.
performer Added
of external Value
w ith best vi. Analysis: It is comprehensive evaluation of all work
benchmarking
is the comparison
performer activities, material flows and paperwork
to determine the value
or similar business. Benchmarking tries to
dustry
ognize the nec
add for customers.
they
d determine what direction should be t
who have taken by
changed successfully. Benchmark vii. Just-in-time Inventory Management JIT): nventories are received
observingthose just-in-time to be used up by production. JIT is the management
used as a process of
introspection nd searchfor
s sucessfully believes in
the best practice in
totalquality management. Benchmarkin philosophy that right product at the right or just in time
the
of demand. JIT has two understandings as 1. customers cannot wait for
refered to as the processandby which an organization meeasures the long time. So, they should get the product at the time of demand, 2.
their products, services, actices against its most of the finished goods to serve the customers can
competitors, or those organizations recognized as leaders
diffi over inventory
increase the material handling and inventory cost. Thus, JIT is the
nt he
same industry. technique that assures the material, man and machinery at the ready
Ontsourcing t is suboontracting services and operations to outsida position at the optimal level so that inventory cost remains low and at
firm or person who can perform them cheaper and better. This the same time product delivery becomes effective. Just in Time (JIT) is
system pioneered by Toyota in the 1950s and adopted successfully all over the
of outsourcing improves efficiency, reduces cost, enhances
world. The philosophy demands eliminating waste and
productivity, and improves quality. It helps top management to focus improving
the attention only on core activities and strategic issues. product quality to maximize returns on investment. The basic JIT
Outsourcing of principles are to make only what is needed, when needed, and in the
operations in sectors that could provide a competitive advantage to amount needed.
small, medium and large enterprises is a completely new method that vii.
has emergedin recent years. The need to Speed: Speed is the time needed to get the activities accomplished. In
develop information and other words,Speed is the time required to the organization to gets
COmimunication technologies
in order to increase
competitive environment has led to the development of various IT and
performance within a something accomplished. It can be emphasized in any are including
developing, producing, promoting and distributing goods and
computer departments within firms. services. The organization can get competitive
SO on: They are set of quality standards created by Internationa advantages over
others only when it is better, smarter, and faster than their
Ohganization for Standardization (SO). Organization
Tom SO. SO Standards cover product testing,
obtain certihicabon
employee training "ecord
competitors. Thus, speed of operation is one of the major aspects in
managing total quality of products. TQM increases speed for
eeping supplier relations and revise policies and procedures.
The ISO 9000
developing making and distributing products. Speed become a part of
family contains following standards: organization culture.
'So 90012015: Quality management ix. Training: employees are provided continuous training in quality
systems-Requircals and
SOOD205: Quality management systems-Fundane 14.
matters. Quality circles serve as training
Define globalization. Explain the methods of
grounds for TQM.
vocabulary (definitions) Ans: Globalization: globalization.
IS09004: 2009:Qsuccess
sustained uality manageme
of
/stems-Managing for the

continuous
Globalization refers to the integration of economies and societies all
world. Globalization involves
over the

improvement) an organization technological, economic, political, and cultural


SO9O112011 Guidelines for exchanges made possible largely through
the advancement of
nanagement systems
auditing manage
Prineiples of Management
. 73
ester and
Semesh Practice Sets
7
investment
of
CSIT FDI is the
TU
Solurion
nrtation and infrastruct In simple or joint
venture of the domestic organization. investment of
Complee

(ommuniadn transpon
intenational
action of market land with hundred percent
capital
the
f word alternative in foreign country for
less an organizationa foreign
7 A

bo organizations in
It is
which promotgo des,s Multinational in
gnowang

investment
the the company.
wa ten and services do direct foreign
ö
the world. For
tazhnologV.

gohalitation

and ma manufacturing of goods The ownership


apital im an
of sing national cost of production and
transportation.

ndaries through
erit

sei
tre
entr
and

m e a n s
strategy

nefworks. boundaries
It is the mea
order to reduce
and complete
control over operations
and profit of new
established

It is the
nand markeing
the
company.
is limited with holding
eiohalizabon

foreign competitors
ee lird (subsidiary) company in China
phodu wel as the
Podusel
evel

a m p e t e
i nd o n e s
ations are being intluenced b quality o
commonly used method of globalization
since last 30 years
western countries and
their multinationals.
ting popularity throughout the world and Asian countries by the
a n dp e r o r m a n e M a d e m

eobal with
,

of sharing ownership
Venture: Joint venture is the process in
e t e t a nd
dh h u l Joint method of globalization
Methods
a f
Globalization

used forglobalization. These methods


for
globaliz

foreign companies. It is a very popular


the FDI is not possible.
being
zies. Some common method. those countries where
recent years especially to
are strategies

methoads entiry technical


for transferring the technologies,
Joint venture is effective
Difrernt
m a r k e t

countries with the joint


loreaign below
as
the most ideas, and capital to the developing
rertered

traditior.al and
d e s c n h e d

are It is knowledge,
Egporting
countries.
eficitcommon
globalua orting
n and and bp this method, the necessary capital investment from developed
g l o b a l i z a t i o n

i familiar
globalization

purchasedfrom other countries wherea


goods Merger and Acquisition: Merger of
and acquisition are
of
methodaf
aton a
exported in forei
are excess or globalization procedures. It is a process creating full ownership
for the aons of products can merge for making their
the firm. Two firms of different country
olves buying and selling
smus pronoring involves
In acquisition, a large and
Importing
and
exporing
establishin
without ctablishing manutacturingoducts
firm more commercial, bigger
from
facilities in
and global.
firm of foreign country. This
method
strong firm purchases a running
countnes
other can be done
and to
mtries Import and export direct 1980s.
is preferable
whoectly or
by is very effective forms of globalization until
bxporting
cost of business in Nepal.
ntermediaries.
me countries
is substantiall of 15. Explain the major problems in
Nepalese business in current days especialy
USTng
in the home of There countless problems
production
ts. For instances,
markets. USt Ans: are
Chinese companies are discussed below:
praducingguods
in foreign
world because of the after entering into global business. Major problems
are exporting
their products
througho
lowe a. Policy related problems: For effective growth of business, different
a toiproduction
is a process of policies like economic policy, fiscal policy, industrial policy, etc. are
and Franchising Licensing the most important. They assigning
should be clear and business friendly. But in
technical knowhow, design, intellectual business friendly.
nphts to
certain etc property,
Nepalese practice, such policies are not clear and
in retum of royalt Franchising is a form They are vague and conflicting to each other. Tax provisions and
to a foreign company

icensing m which parent


a company 1.e. the ranchiser grants the rieh criteria get changed frequently. In Nepal, the provision of
to do businessesin a prescribed manner to another independent
establishment of business takes longest time in the world.

organization called the


franchisee. When an organization negotiates a b. Capital and technology related problems: Most of Nepalese business
lcensing and franchising agreement, it is granting the right to produe
organizations are sufering badly from inadequacy of capital and
or sales the firm's product
in host country. This strategy is frequenty technoiogy.For business purpose, debt is not available easily and it
used for into less developed country having restricted or takes long procedure and hassles. interest rate is too high which
entry
regulated economy discourages the business to expand. Payback period of project becomes
the possibilities for long but because of flexible politicaB and economic situation, business
Stratepic alliances: Strategic alliances also open up
fim to expand its business globally. This is also known a does not make profit. Technology is traditional because of which cost
any
colaborative agreements, or global strategic partnerships. In this of production remains high. Nepalese organizations are laying behind
fwo hrms involve in an agreement for transterrn in quality management and uniformity. Old and outdated technologies
stralegy,
are transferred in the name of
lechnology, ideas, business success stories, etc. than the equity a technology transfer from foreign
OTership. Such types of alliances are increasing especially in ser countries.
and Infrastructure related problems: Road, electricity, transportation,
ktor ike airines, hotels, educational institutions, etc. Regional te communication, etc. are most important infrastructures for success of
globalgroups of developed countries areposing their strategiest
Jeveloping countries as well. IMF, World Bank, WTO, etc. are suo business. Poor infrastructural facility increases the cost of
orgarizations which provide facilities for supporting their trateg transportation and procurement. In Nepal such infrastructures are in
nies b poor condition.
osons Sky Chets has strategic alliances with airline CcO d. Labor related problems: In the current
sPply the fod items to the airlines days especially after the
Foreign Diret Investment (FDI;: FDI is new unm restoration of democracy, business organizations are
ap proach of entering suffering
from
oreipn country market through direct investment without the suppr
Sets
5emesor ond Procice Prineiples of Management..75
Souten of CSIT
7 4 . A Complere TU unions are being
stronoe
ger
problems. Labor even in TRIBHUVAN UNIVERSITY
labor related
and managing
facilities. Labor unions
guided by
manifesto of hiring
corresponfferen Institution of Science and Technolog
to the
employees

political
ideologies
which affects
give first prority
the business negatively.
Employees
There
es are bei nding
are lots of labour Bachelor of Sclence
in Computer Science & Information Technology
parties
ommitted for the organizational
benefits.
in Nepal.
less TUQUESTiONS-ANSwERS 2078
happening
strikes and pen down are
problems Raw materi for the Time: 3 Hours
Raw
meterial
related

vital input to satisfy the custome producti Course Title:


Principles of Management

whoneeds.
business is the Pass Marks: 32
related
depends
on either foreign supplier n Full Marks: 80

Nepal, such
business

low quality products


or for the char
ource with Course
Code: MGT 411
Semester: VII

rate for various.


because of low Group A
high
quality technology.
m a t e r i a l s may
At

not be
the same ime,
the right time. These factors
available at the reasons,r Attempt any
Three Question
(3x10-30)
formulated?
serious for up
gradation of
the business
Politcal ideolo8y sets the
ecan.
Define organizational goals. How are organizational goals
Politics related problems: These
mic,
policies need to
fiscal Ans: Organizational Goals:
future. Achievemernt of
f. want to achieve in
industrial policy of the country.For this, political stabilit clear, Goals are what organizations
and
stable and favorable
for the business. bility is must, a goal is the destination.
most latile
volat since
politics is being ong. In such . Goals guide the action of the organization.
But in c a s e of Nepal formulat long term strategies existence the organization.
of
gives the meaning, purpose and
cannot
business,organization Goal
situation, success.

and policies which hinders the business


market is small in
They are the focal point for using resources.
Demand related problems
neighborhoods.
Nepalese
Demand is unstable soibusiness organization cannot mparison to
com
They s e r v e as standards for measuring performance.
All activities are aimed at achievement of goals.
sales plan. At
nd, purchasing power of
the other hand, # Definition:
prepare the
cost of production becomes high
people desired state of affairs that organizations
such situation, "Goal may be defined as a
is too low. In of any product. So, it ie uch to realize."-Amitai Etzioni
leads to decreasing
competitive power
in foreign market with improved ality. urgent attempt
Characteristics of Goals:
toplan to exportthe product Goals have time frame
Mutual relaled problems: Business management, governm 1.
trust
should have good relationship. But. ent 2. Goals are various and multiple: Survival, growth, profit,
Efficiency,
and employees
does not trust to government as
well as employee
nio n
service, leadership, social responsibility.
management Tactical goals, Operational
At the same time govemment
does not. play supportive role t 3. Goals have hierarchy: Corporate goals,
for tax hidine Goals, Individual Goals
business and always suspects to business organizations
Labor union also makes plans and policies against the management. n Goals form a network: Goals form a network. They are
this way, fhese three components have poor mutual trust among them interconnected through Programmes.
goals lead to conflicts.
This also hinders the success of the business. 5. Goals might be conflicting: Multiple
There are a lot af problems in operating business in Nepal, we have to make Goal Formulation (Formation) Process:
Achievement of
Goals are what organizations want to achieve in future.
good environment as much as we can. It will make our country as a focal of
a goal is the destination.
business operation as best place.
Goals guide the action of the organization.
Goals should be SMART( Specific, Measurable, Acceptable, Realistic,
Time Bound)
environmental scanning, overall
The goal formulation process consists of
OD0 goal formulation and specific goal formulation.

1.
Envlronmental
Scanning

H Formation of
Overall Goals

Environmental Scanning: It is the process of accumulating and


analyzing information from the environment. It is essential to monitor
Formation of
specife goala

the development and change in the environment. Basically, both


internal and external environments are to be scanned to analyze their
Sets
ond Practice Principles of Management ... 93
TU Selution
ef CS/T 7* Semester
76 AComplete OT
pertormance. SWOT Analu
Analysis reasonable prices. We don't

Threats) is (the than that ofSamsung and with


organizational
impat on
Pportunities d
and Threats) study features
o r service, as w e can
find variouus
strengths
environment scanning.
Weaknesses,
helpful of fo have to rely
on o n e product
s o w e c a n buy products
that match o u r criteria.
of alternatives of product,
outcome internal
weaknesses a r e the where w e c a n s e e
Strengths and
and threats are the outcome of externale environments
environm
Globalization has brought
social-cultural trarnsformation,

result of globalization many


countries have been celebrating each
organizational goals, cultur
and o p p o r t u n i t i e s as a few decades
and traditions peacefully for the past
involves
Intenal envimnment
whereas
external vironment are political,
envi resources others culture, religion,
of information and technology
has brought various
The free flow
structure;
and and Technology.
environment In some extent, d) been helpful for flow
of
and
socio-ultural The u s e of technology has
internal environment is controllab to the management, while it has opportunities. search engines, where
w e have a n a c c e s s to
external environment. to information. For example, about
itself with changing to enhance o u r knowledge
be adjustedof
Formation Overall goals: Based on the analysis of ronmental w e can
find various reading materials
w e c a n transfer
field. Similarly, with the help of technology,
overall goals of the organization are :set a specific to another and can connect
trends and opportunities, ideas and knowledge from one place
determine misSSIor, strategy and overall goal in lop our
level managers
result areas. Example:
10% retum 20%
o n investment, 20% inc
increase Keyin beyond our borders.
the people's participation
to show support
Globalization has also increased
market share. e) inequality, and corruption. For example,
Goals: This is the final stage of the and raise voices against injustice, inequality o r
Formation of Specific western countries fighting against
3. oOal 80al when w e see people of here
invoives sub-divisions of the overall Nepal as well, as people
process and
corruption, it directly o r indirectly impacts
formation
In this tage,
coniribution of each department e activities to show participation.
is defined to fulfil the overall goals ofunit,
organization such
branch and individual #h raise their voices against
issues with help of
voice against global
and set for a day, a week, a month Globalization has enhanced the
organization. It is a short-term goals ) a r e coming forward
to raise their voices against
and so on. Middle and lower level management formulates it. The basi social media many people and
so on.
discrimination,
issues like climate change, terrorism, racial
purpose of this goal is to fix responsibility of departments an negative
also has some

individuals and allocate the resources. Apart from


above positive impacts, globalization
a r e as follows:
2 Staie and explain the emerging challenges faced by managers while impacts and they increased the gap
economic globalization has
managing organizations. First and foremost, countries
a) countries. As a result, least developed
Ans: Emerging Challenges for Management: Fo!lowing are the major challenges between poor and rich
to thrive because
like Nepal have s e e n
domestic businesses struggling
for management:
dominance.
1. Globalization: Globalization is the free movement of goods, services of multinational corporation
of workers in
and people across the world in a seamless and integrated manner. It is Globalization has also resulted in the exploitation
b) where the workers a r e paid just
a tiny fraction of
making the world singgle market. Globalization has brought the developing countries,
For example
workers in developed nations.
competition. The manager have to work hard by considering the global what would be paid to
paid less for foreign employment.
prospective Managers must be innovative and adjustable
the globalized changing environment
to according Nepalese workers are

of globalization is it empowers
multinational

c) Another negative impact their


2 Technology: Technology is changing day by day. The new economy when multinational companies open up
companies. For example,
will be based on digital revolution. they make s u r e to e a r n lots of profit and
Management will need to manage businesses in the host country,
back to their home nation, and
charging technology effectively. Managers have to grab the after work is finished, profits usually go
hands.
opportunity to make the business succeed. They have to modity the host nations are left with nothing in their
products and services continuously based cultural importance has been gradually vanishing
development
on
technological d) Due to globalization,
a r e m o r e attracted
3. in most countries, as a result of globalization, people
Quality: Managerment will need to with their lifestyles, cuisines, and so on. For exanmple, as
continuous
cope to western culture, to speak in
improvements product quality. Improving quality of work life also
poses a challenge.
in
w e c a n see in today's
context most youths in Nepal prefer
their friends,
visit pubs and clubs to have s o m e drinks with
Ethics and Social English, instead of
beliefs about what isresponsibility: Ethics is an individual's personal watch Hollywood movies, w e a r s western clothes at parties
right and what is wrong, Social their cultural dress.
set of
obligations
business ethics andmanager
a
has to fulfil in the responsibility 1s a
of globalization for
society. Maintaining e) Political influence is another negative impact
social
5.
organization. responsibility
is
challenging to he Nepal. The major world powers tend to intervene in the internal
affairs
nations to work for them
Empowerment: The and influence the laders of the respective
authority to employeesmanager
not
has to
provide resources and delega and for their self-interest, which is
not always in the favor of the
only in making work related decision but
emesre dha Practice Sets
TU Selutien of CSI
Principles of Managoment . 95
Cemalee

For exanmple, he
citizens ot these

tion
counties

(MCC) in Nepal
has been on the Millennium
ve
challen
e of controversi Group-B (10x5-50)
was proposed.
sine the dav it TEN Question

As a esult
Nepal has faced the
of globalization. jor problem Attempt
any
management? Explain the functions of Management.
drain as skilled manpower like doctors, engineers are mov bra 5. what is contribution made by FW.
Explain the major
theirhome country to abmad for better opportunities, which scientific management.
Define
lack of skilled manpower
for the country. fron Taylor.
in a with suitable examples.
resuts in the rapid circulation of diseasee the formal and informal groups
Glahahzation also Describe
For example, affected Nepal from one plaq
the coronavirus has /.
What is planning? Discuss the step involved in planning process.
to another.

Globalization has also brought some major challenges


significanty What are the barriers of effective communication in any organizations?

ie yber attacks,
conmunal riots,
acial around the
discrimination Explain
globe and goals?
environmental degradation, climate change, so on.
is motivation important to achieve organizational
10. Why features of delegation of
Conclusion:
Define delegation
of Authority. Explain major
be two sides to every story. In regards to ola.
11.
There will aways Authority.
people who are concept argue that globalization ha
in favor of this
ore
lization, What is business
environment.Explain the types of
business environment.

henefits than drawbacks, whereas, people, who opPPose this conce 12.
globalization? Explain the methods of globalization.
that. it has resulted in huge exploitation of workers, enviro argue What is
13.
degradation. and the huge gap between rich and poor coena Explain growth of business sectors in Nepal.
the
14. teams.
Globalization is trending and no country can resist it. So Nepal also e of work life and self managed
15. Explain about the Quality
focus to benefit more form the globalization through the
rease An
cooperation. production, skills, technology, information etc. MODEL SET 2

MODEL QUESTONS SETS FOR PRACTICE


Group-A (3x10-30)
Attempt any Three Question
function. With the statement;
1. Decision making is very important managerial Also explain the types
discuss the meaning and process of decision making.
MODEL SET 1 of decision making.
limitations. On the light of this
barriers and
2 Quality improvement has no and explain the
statement, explain the concept
of Total Quality Management
Course Title Principles of
Management Time: 3 Hours different tools of TQM.
Full Marks: 80
with suitable example.
leadership. Explain different style leadership
Pass Marks: 32 of
Course Code: MGT 411 3. Define
Semester: VII of Explain the problem-solving strategies.
4. What is problem and types problem.
Attempt ay Three
Group-A Group-B
Question (10x5-50)
(3x10-30) Question
Planning is head and
controlling is tail. Justify. Attempt any TEN

What 5. What is planning? Explain the different level of planning.


managerial skills? What skills are essential for a successful
are
State the various features of controlling.
3. Explain the concept of change in manager? b.
is useful for the business?
change organization? And
in organization. Why do
employees resist 7. Explain the concept of technology. Why technology
suggest various measures to the differences between
Define organizational structure. What
are
resistivity to change. overcome such 8.
centralization and decentralization?
Define
orgarizational goals. Explain the 9 Define communication and explain the various steps in the communication
process. Also explain the steps involved in goal formation
approached to goal formation. process.
10. What are the major techniques of control? Explain.
Practice Sets
Semester and
TU Solution ofCSIT "
96 A Complete
conditions or situations?
decision-making Principles of Management ...97
11hat is the Explain th
11.

12 11hat
linutations
is management
of management
science

scicce
theory?
theory. contribution and MODEL SET 4
examine the changi
13. Give the concept of globalization
and
lobal business
Senario.

companies/ Explain their


characteri.
What are the multinational Group-A
14 formation process. (3x10-30)
the group Three Question
15 1hat is group? Explain Attempt any in current
MODEL SET 3 Explain Theory X and Y. Also explain the relevance of this theory
1. business organization.
scenario of the
environment? Explain the impacts of business environment
What is business
the business.
on operating
structure and of allocation of
Organizing focuses attention o n the process
of the above
Group-A c o m m o n objectives can be achieved. In the light
jobs so that that would help in
statement, explain the principles of organization
Attempt any
Three Question
management regarding wo
or (3x10-30) achieving organizational objectives.
uses of social networking for making
1. Explain the emerging concepts force What is social networking. Explain the
outsourcing and learning organizati 4.
diversity, knowledge management, business successful.
conflict and its types. How the conflicts can
Explain the concept of be Group B
managed in the organization? TEN Question (10x5-50)
Centralization and Decentralization is opposite to each other." Do vou Attempt any
with this statement. Also mention the factor that are responsibleagree 5.
What are managerial roles? Explain.
for
Centralization and decentralization.
6.
What are the planning approaches? Explain
Explain the concept of organic and mechanistic views of organization. 7. What is strategic planning. What are the steps of strategic planning?
Transformational leadership.
Group B
8. Explain the transactional and
Attempt any TEN Question 9. Explain the approaches technology and organization.
to
(10x5=50) motivate employee.
L What is SWOT Stands for? Explain in detail about SWOT analysis. Explain 10. Explain about the reward system to
in Scientific Management
its importance 11. One best way is recommended by FW Taylor
achieved?
What is one best way and how can be one best way can be
2 What is the different structure of communication? theory.
What are managerial roles? Explain. 12.
Who is Manager? State Different types of Managers
'Planning is the blueprint about the future course ot action" Explain this 13. What are the characteristics of effective control system?
statement. Also explain about the Tools for planning. 14. Critically analyze the current scenario of management practices in Nepalese
5 What is organizing? Explain the process of organizing. industries.
6. Explain the concept and qualities of leadership. the problems of goal formulation faced by
15. What is goal formulation? Explain
What is communication? State and managenment
explain characteristics of communication.
Describe the major characteristics of
one best way" to
contingency theory. Why there is "no MODEL SET 5
manage
9 What is leadership?
Explain the different style of leadership.
10. Explain the problems of goal formulation.
11. Explain the political legal factors of business Environment. Group-A
12 Describe the major characteristics of Attempt any Three Question (3x10-30)
one best way" to
contingency theory. Why there is "no
its contributions and limitations.
manage. 1. What is Decision theory? Explain
13 What is
leadership? Explain the different style of 2. An organization's structure is a means to help management achieve its
14
Explain the problems of goal leadership. manager of a construction companv,
15. formulation
Explain the political legal factors
objectives. If you are appointed as a
what form of organizational structure and would you recommend? Explain
of business
Environment. with reasons.
TU Solution of CSIT 7* Semester
ond Proctice Sets
A Cemple
the linc and staff authority Pinciplos of Management.. 99
Whatauthority? Explain
is

multinational companies Explain


its types, What Kinds of sills required for successful manager?
advantages and
ad. Management?

What are 9 fine


Defin

structure? Explain the Team


diadvantages what are the different types of organizations
Group B
0. structure in details
ot authority? Explain the advantages and disadvantages
any TEN Question What is devolution
Attempt
5. What is organization and Management?
Explain. (10x5-50 1 o it in details
What are the emerging concept in organizing structure. W h a t is two
factor theory of motivation. Explain
what is managerial ethics. Why it is equred for long term suco of formal communication.
State the purpose
of th 13.
business?
w'hat is communication? Explain the various steps of communication. Explain the principles of Total Quality Management
and displacement.
List the 14 prinaiples of management and Explain any five principles, 15 What is goal succession
9.
10 Explain the different approaches of organizing.
MODEL SET 7
What is motivation? What are the importance of motivation?
1.
Justify the importance of communication in organization.
12
13 Explain the concept of organizational developmernt. State and evni
different characteristics of OD. in Group-A
Three Question (3x10-30)
14. Explain the uses of Technology in people management. Attempt any
emerging challenges
the of management.
15. What is multidivisional structure and geographic structure? State andexplain
2 What isorganizational architecture? Explain in details.
of
3. Explain about the system theory management.
MODEL SET 6 social responsibility of business is important for organization? Explain
4. Why of business.
approaches and areas of social responsibility

Group B
Group-A (10x5-50)
Attempt any Three Question Attempt any TEN Question
(3x10-30) 5.
What is leadership? Explain the different style of leadership.
Explain about the changing perspective of organization. contribution and linitations of
What is behavioural 6. What is bureaucracy Theory? Explain the
studies or theories.
perspective of management. Explain with different Bureaucracy Theory
distinctions between authority
3. . What is authority and responsibility. Give the
Control is amanagement function that focuses on the process of
monitoring and responsibility
activities toensure that
they are being accomplished as planned.
manager of
As a . What is need hierarchy theory? Explain in details.
an
organization, what types of control
system would you
recommernd to achieve
planned result? 9. What is control? Explain the importance of control.
What is motivation? What are the importance of
4. What is motivation?
globalization? Explain about the effect of globalization in details.
10
11. Justify the importance of communication in organization.

Group B 12 What are the decisionmaking conditions o r situations?


Attempt any TEN Question 13. What are the planning approaches? Explain
5 How can you motivate
the
(10x5=50)
a business organization. employees if you are the chief executive officer of 14. Explain the concept and qualities of leadership
b. State the
Explain with the help of techniques of motivation. 15. What is communication? State and explain characteristics
of communication.

7.
advantages and limitations of vertical communication.
What is
organizatiornal
organizational change. change? Explain the various characteristics Or
Explain the
concept of
development. organizational intervention in
organizatio
of CSIT 7 Semester and Practice Sets Network Seeurity
100. A Complete TU Solution

MODELSET 8 New Syllabus


Full Marks:60+20+20
Security +8+8
Pass Marks: 24
Network
Title:
Course
Course N o : C S C 4 1 6 Credit Hrs:3
Group-A Lab
of the
Course: 1heory +
Nature
Attempt any Three Question charactenstics of Managemen
Semester: VII
Describe the
Define management. security protocols,
CourseDescription:
. network
combination of
functional and project sth
the fundamental concepts of
Matrix structure is the
statement. Explain
the matrix structure in details. For ure. Ind
wh This course
covers

concepts,
basics of security in cloud
and loT.

light of this need to use matrix struchureture for


for organizain wireless security
of business organization Course Ohjectives:
of network security so
structure. of this courseprovide knowledge
is to
using
main objective network
architecture
that #h
activities to ensure The
will be able to implement
a secure
Control is a process of monitoring they are be
system.. that students
technologies.
and correctirng any significant protocols and
accomplished as planned he i different security
discuss the process and problems of control s
of the above statement,
theory in details.
system Course Contents:

Network Security
Fundamentals
(3 Hrs.)
4 Explain about the contingency Unit 1: Computer
Group B 1.1. Introduction

Network
the Computer
1.2. Securing
Attempt any TEN Question (10x5 1.3. Forms
of Protection
as a 'nerve Centre. Why thie
Explain the concept of manager role 14. Security Standards
(4 Hrs.)
important to organizational performance? Authentication

Define motivation. State, explain and compare Maslow's need hiera Unit 2: User
. rarch User-Authentication Principles
of motivation and Herzberg's two factor theory. 21. Remote
theory Using Symmetric Encryption
User-Authentication
Explain the concept of quality. What are the emerging issues 22. Remote Encryption
User-Authentication Using Asymmetric
2.3. Remote
managemenf?
2:4. Federated ldentity Management (6 Hrs.)
8. What is meant by goal succession? Explain different reasons for g
Unit 3: Transport
Level Security
succession.
3.1. Web Security
9. Why is management important in modern organization? Justify your
answers 3.2. Transport Layer Security (TLS)
3.3. HTTPS
10. What is business ethics? Explain the significance of business ethics fo
sucesful operation of business 3.4. Secure Shell (SSH)
(6 Hrs.)
11 Explain the socio-cultural environmental factor for business. Unit 4: Wireless Network Security
12 What is strategic planning? How the strategic planning is implemented in 4.1. Wireless Security
the organization? 4.2. Mobile Device Security
Overview
13. Explain the meaning of 4.3. IEEE 802.11 Wireless LAN
crisis. How the crisis can be handled?
14 How the communication can be 4.4. JEEE 802.11i Wireless LAN Security
enhanced inside the organization? (8 Hrs.)
15. What is deming Unit 5: Electronic Mail Security
management? Explain the principles and techniques of
deming management 5.1. Internet Mail Architecture
5.2. E-mail Formats
Email Threats and Comprehensive
Email Security
5.3
54. S/MIME
000 5.5. Pretty Good Privacy (PGP)
5.6. DNSSEC
Entities
5.7. DNS-Based Authentication of Named
and Practice Sets Network Security.. 103
102A Complete TU Solution of CSIT 7 Semester
Framework TRIBHUVAN UNIVERSITY
5.8 Sender Policy
Keys ldentified Mail Institution of Science and Technology
Domain
50
5.10 Domain-Based Message Authentication, Reporting, and Conforman.
ance
Unit 6:IP Security (6 Hrs.) MODEL QUESTIONS
6.1. IPSeurity Overview

6.2 PSecurity Policy Course Title: Network Security


Model Question)
SET 1 (CDCSIT
6.3 Authentication Header Pass Marks: 24
CSC 416
No: Time: 3 hours.
6.4. Encapsulating Security Payload Course
Sc CSIT Fourth
Year 7 Seventh Semester
Level: B.
6.5 Security Associations
Section A
6.6 Internet Key Exchange [2x10-20]
TWO questions.
Unit 7: Network Endpoint Security empt any Describe how Encapsulating
5 Hrs.) What security association in IPSec?
is
7.1. Firewalls and authentication in
security payload protocol provides confidentiality
Intrusion Detection System 3+7]
IPSec.
that appears in both the authentication
and confidentiality
Malicious Software A key concept
ns:
Ans:
association An association is a one-
(SA).
7.4 Distributed Denial of Service Attacks mechanisms for IP 1s the security receiver that affords security
connection between a sender and a
Unit 8: Cloud and Internet of Things (1OT) Security way logical is needed for two-
(7 Hrs.) carried on it. If a peer relationship
services to the traffic
8.1. Cloud Computing
secure exchange,
then two security associations a r e required.
way parameters.
8.2 Cloud Security Conceptss association is uniquely identified by following
A security identifier of the SA. For
a 32-bit cornnection
Security Parameter Index (SPI) and destination host, there is one SPI that
-

83. Cloud Security Risks and Countermeasures


84 Cloud Security as a Service each association between a s o u r c e information to the
the connection to provide
is used by all datagrams in
8.5 Open-source Cloud Security Module
receiving device on how process
to the incoming traffic.
8.6 Internet of Things (loT) address of a destination host.
IP Destination Address traffic is
to be used and specifying if
8.7 IoT Security Concepts and Objectives A Security Protocol (AH o r ESP) - the
with integrity and secrecy. The protocol also defines
8.8 Opern-source loT Security Module to be provided
lifetime, and the cryptographic algorithms.
Laboratory Works: key size, key
which defines the keys to be used.
The laboratory work includes
implementation and simulation of Network Security Secret key how encapsulation headers are
created
Protocols, Intrusion Detection Systems, DDoS Attacks, Cloud Encapsulation mode defining
traffic are protected during the
Security and loT and which parts of the header and u s e r
Security Systems. communication process.
Text Books: s o u r c e authentication
and
The AH protocol does not provide privacy, only
1. William Stallings, Cryptography and Network IPSec later defined a n alternative protocol, Encapsulating
Practice, 8th Edition, Pearson, 2020 Security: Principles and data integrity. s o u r c e authentication,
data integrity,
Security Payload (ESP), that providesESP the most used IPSec
2 Joseph Migga Kizza, Computer and confidentiality. This has made commonly
Network Security Fundamentals, 5th authentication data
Edition, Springer, 2020 Note thhat ESP's
header. ESP adds a header and trailer.
Reference Books: added at the end of the packet, which
makes its calculation easier. Figure
are
and trailer.
1 William Stallings, Network Security Essentials: below shows the location of the ESP header
6th Edition, Pearson, 2017 Applications and Standards,
Confidentiality
2 Sarhan M. Musa, Network
Security and Cryptography: A Self-Teaching
Introduction, Mercury Learning Protected Data EPS Trailer
and Information LLC, 2018 IP Header ESP Header

Authentication and Message Integrity

Figure: IPSec's ESP Protocol Protection


Network Security... 105
and Practice Sets
A Complete
TU Solution of CSIT7* Semester
104
carmies
an EsP header
and trailer the Application Data
hen an IP datagram
field in the IP
header is 50. A field inside the EsL value
e r (th
of
protocol value of the protocol f t
holds the original
header field)
datagram, such TCP The
UDP). Thetype
the iP as Fragement

being carried by
or
vload
tollows these steps:
praedure
is added to
the payload.
An ESP trailer Compress

and the trailer are encrypted.


The pavload
is added.
The ESP header
trailer Add MAC

The ESP header, payload, and ESP are


sed
used
to
authentication data. create th
The authentication data are added to the end of the ESP tra:iler.
The IP header is added after changing the protocol value to 50 Encrypt

and trailer are as follows:


The fields for the header
Security parameter index The 32-bit security paramete: index fn Append SSL
Record Header L
similar to that defined for the AH protocol field i
Sequence number The 32-bit sequence number field is similar to Figure: TLS/SSL Record Protocol Operation
is fragmented into
defined for the AH protocol. that is fragmentation. Each upper-layer message
The first step
o r less. Next, compression is optionally
Padding This variable-length field (0 to 255 bytes) of 0s serves as paddin blocks of 214 bytes (16384 bytes)
must be lossless and may not increase the
content
. Pad length: The 8-bit pad-length field defines the number of applied. Compression is
bytes. The value is between 0 and 255; the maximum value is rare. padding length by more than 1024 bytes. In TLSv2,
n o compression algorithm

Next header: The 8-bit next-header field is similar to that defined specified, so the default compression algorithm is null. The next step in
in t code o v e r the
is to compute a message authentication
AH protocol. It serves the same purpose as the protocol field in tho processing the compressed
data. TLS makes u s e of HMAC algorithm. Next,
header before encapsulation. compressed encryption.
plus the MAC s encrypted using symmetric
Authentication data: Finally, the authentication data field is the result o message
length by m o r e than 1024 bytes,
so
the content
applying an authentication scheme to parts of the datagram. Note the Encryption may not increase 214+ 2048. The following encryption
exceed
difference between the authentication data in AH and ESP. In AH, thetotal length may not
par algorithms are permitted:
of the IP header is included in the calculation of the
authentication data Stream Cipher
in ESP, it is not. Block Cipher
2 Differentiate TLS session from TLS connection. How TLS Record Algorithm Key Size Algorithm Key Size
Protocol AES 128,256 RC4-128 128
guarantees confidentiality and message integrity? Discuss its operations. [3+7
Ans: A TLS session is an assoiation between a client and a server.
Sessions are 3DES 168
is to prepare a header
created by the Handshake Protocol. Sessions define a set of The final step of TLS Record Protocol processing
cryptographic consisting of the following fields:
security parameters, which can be shared among multiple connections used to process the
Sessions are used to avoid the Content Type (8 bits): The higher-layer protocol
expensive negotiation of new security enclosed fragment.
parameters for each connection. Whereas TLS connection is a version of TLS in For TLSv2,
transport that Major Version (8 bits): Indicates major use.

provides a suitable type of service. For TLS, such connections are peer-to- the value is 3.
peer relationships. The connections are transient. Indicates minor version in For TLSv2, the
associated with one session. Every connection Minor Version (8 bits):
use.

The TLS Record Protocol value is 1.


provides two services for TLS connections. Compressed Length (16 bits): The length bytes of the in plaintext
Confidentiality: The Handshake Protocol defines a shared secret key fragment (or compressed fragment
if compression is used). The
that is used for
conventional encryption of SSL maximum value is 214+ 2048.
Message Integrity: The Handshake Protocol alsopayloads.
defines a shared secret 3. Discuss the security threats that might occur
in wireless networks.
key that is used to form a
message authentication code (MAC) Describe the IEEE 802.11i phases of operation. [4+6]
Figure below indicates the overall Ans: Wireless Network Threats
Record Protocol takes an operation of the TLS Record Protocol.
application message to be transmitted, fragmeI points to
LANs wireless access
Accidental association: Company wireless
or

he data into
manageable blocks, optionally wired LANs in close proximity may create overlapping transmission ranges.
MAC,
encrypts, adds a header, and compresses the data, apple LAN may unintentionally
lock on to a
transmits the resulting unit in a A user intending to connect to o n e
segment Received data are wireless access point from a neighboring network.
reassembled before decrypted, verified, and
decompressed,
being delivered to
higher-level users.
ond Practice Sets
06A Complete TU Solution of CST 7 Semester Notwork Socurity... 107
In this situation, a wireless devica AS End Station
Malicious association: is STA
appear to
be a legitimate access point, enabling the

passwords from legitimate


users and then penetrate a
configured
perator to t
wireless access point.
through a legitimate
ired networ
stea
Ad hox networks: These are peer-to-peer networks betwee. Phase 1-Discover
computers with no access point between them. n.
Such retworkseencanwireles
security threat due to a lack of a central point of control.
pose, Phase 2- Authentication
Nontraditional networks: Nontraditional networks and links
personal network Bluetooth devices, barcode readers, andhch
PDAs, pose a security risk in terms of both and
Identity theft (MAC spoofing): This occurs when an attacker spoo n
vesdropping andhela Phase 3-Key Management
eavesdropP on network traffic and identify the M able to MAC address of
computer with network privileges. a Phase 4-Protected Data Transfer
Man-in-the middle attacks: This attack involves persuading a t1s0s
an access point to believe that they are talking to each other and when
in f Phise 5-Connection Termination
the communication is going an
through intemediate
attacking
device
Wireless networks are particularly vulnerable to such attacks.
Figure: IEEE 802.11i phases of operation
Denial of service (DoS); DoS attack occurs
when an attacker
continuall. Section B
other accessible
bombards a wireless
access point some
or
wireless po Attempt any
EIGHT questions. 8x5-40
with various protoco! messages designed to consume
The wireless environment lends itself to this
system resources
of attack, What is network security? How it differs from computer and information
type because it security?
2+3
soeasy for the attacker to direct multiple wireless messages the target
at Information and systems and hardware
Ans: Network Security is the protection of
Network injection: A network injection attack targets wireless access and transmit that information. It is a set of rules and
that use, store,
points that exposed to nonfiltered
are

protocol messages or network management messages.


network traffic, such as
routin configurations designed to protect
the integrity, confidentiality and
of computer networks and data using both software and
The of IEEE 802.11i RSN be broken down into five
accessibility
operation an can
distinct hardware technologies. Every organization, regardless
of size, industry o r
phases of operation solutions in place to
infrastructure, requires a degree of network security
Discovery: An access point (AP) uses messages called Beacons and Probe of cyber threats in the wild today.
protect it from the ever-growing landscape different
Responses to advertise its IEEE 802.11i security policy. The wireless Network security typically consists of three
controls:
station (STA) uses these to
identify an AP for a WLAN with which it Physical Network Security: Physical security controls a r e designed to
wishes to communicate. The STA associates with the AP, which it uses to from gaining physical access to network
select the prevent unauthorized personnel
cipher suite and authentication mechanism when the Beacons components such as routers, cabling cupboards and
so on.
and Probe Responses present a choice. controls protect data
Technical Network Security: Technical security
Authentication: During this phase, the STA and AS prove their identities which is in transit across, into or out of
that is stored on the network or
toeach other. The AP blocks
non-authentication traffic between the SlJA the network.
and AS until the authentication
not
transaction is successful. The AP
does Administrative Network curity: Administrative security controls
participate in the authentication transaction other than forwarding that control u s e r behavior,
traffic between the STA and AS. consist of security policies and processes and also how
how authenticated, their level of access

Key generation and distribution: The including users are


infrastructure.
AP and the STA perform several TT staff members implement changes to the
operations
the AP and
that
cause cryptographic keys to be generated and placea Network security consists of the policies and practices adopted to prevent
the STA. Franes denial of a
only
are
exchanged between the AP and " and monitor unauthorized access, misuse, modification,
or

computer network and network-accessible resources. Whereas, Computer


Protected data
transfer: Frames.are exchanged between the STA the of computer systems from the theft of o r damage
to
end station
through the AP. As denoted by the shading
ana 5ecurity is the protection as from the disruption or
o r electronic data, as well
encryption module icon, secure data transfer and their hardware, software, And Information Security is
and the AP
only; security is not provided occurs between
the
misdirection of the services they provide.
end-to-end. the of unauthorized access, use, disclosure,
Connection termination: The AP and STA basically practice preventing
his destruction of information.
phase, the secure connection is exchange frames. During disruption,modification, inspection, recording or
torn down and the stored
to the
original state. connection is res Information can be physical or digital.
Sets
106A Complete TU Selutien of CSIT 7 Semester ond Practice
Network Security.. 109
user
authentication is done using symmetric e n e .
5. How remote 1ption
A to-lcvel hieranchy
of symmetric enyption keys can be S sets up a connection to the remote serveT.
Ans:
in
to
a distributed environn p The SSH client and configure SSH to
contidenthalit for communication
unused local port number, say 9999,
trusted key distribution centa. Select an
use ot a destined for port 110 the server.

Eaceral
on
this strategy involves the
part in the network
shares a ecret key,
known as a master L (KDC).
with
accept traffic
from this

SSH client intorms


port
the SSH server to create a connection to the
for generating keys to be used ffor The
port 110.
KDC. The KDC is responsible a
short the destination, in
this c a s e mail server

to the
local port 9999 and sends them
eys, andttim
known as session
oconnection betweem
two parties, takes any bits sent to
The client
over a
keys to protec decrypts the
distributing thase keys using
approach is quite o o m m o n .
The
the master
Kerberos system in an distribution.
exXa
example of it. This server inside
incoming
the encrypted SSH session. The SSH
bits and sends the plaintext to port
110.
server

figure below.
The received on port 110
of Kerberos is shown in direction, the SSH s e r v e r takes any bits
In the other
overview
2. As verifies users access nght in inside the SSH session back to the client, who decrypts
database, creates acket-granting ticket and sends them
and session key. Kesults are encrypted to the process connected to port 9999.
and sends them
using key derved rom user s passowrd. client acts o n the server's behalf. The
onece p *********** * remote forwarding, the user's SSH
user logon With the traffic
session Kerberos receives traffic with a given destination port number, places
client chooses. For
and sends it to the destination the u s e r
T e q u e s t t i c k e t

STanting ticket
port
on the correct wish home computer.
1 . User logs on to to a c c e s s a s e r v e r at work from your
ticketsession key
example, you
workstadon and
regests sevie
Authentication
server Because the
work server is behind a firewall, it will not accept an SSH request
SSH
T e q u e s t s e r v i c e

work you set up an


home computer. However, from
a n a n 8 h c k e t can
an hosst
from your
Ticket- remote forwarding. This involves the following steps.
icketsession key
granting tunnel using home
set up a n SSH connection to your
server (TGS) From the work computer,
********* computer.The firewall will allow this, because it is a protected outgoing
3 Workstation prompts Once pe 4. TGS-decrypts ticket and
users IoT passwod to desIpt type of ser
e
authenticator, venfies request
connection.
to deliver
ncoming message. theo thancreates tiCket tor
Configure the SSH s e r v e r to listen o n a local port, say 22, and
send uCket and
authentuctor that contans request service application server
requested
data the SSH connection addressed to remote port, say 2222.
across
User s name, nerwor

berce You can n o w go to your home computer,


and configure SSH to accept

aprutohviendtesicatsoerrver
andress and m e to TGS
traffic on port 2222.
for remote logon to the
Oace p 6. Host verifes that You now have a n SSH tunnel that can be used
5. Workstation sends service sessio icket and authenucator
taclet and authenticator work server.
Host/ match, then grants access
security, client/server traffic security, and barrier security
ost to service. If m u t u a l sets
application How device
server authenticauon mobile device security strategy?
1s
required, server
an authenticatobr.
returms
of a mobile device security strategy fall into three
Ans: The principal elements
What is port forwarding? How SSH
b.
provides local forwarding and remote
categories: device security, client/server traffic security,
and barrier security.
forwarding? [1+4 Device Security
Ans: One of the most useful features of SSH is port
forwarding. Port forwarding A number of will supply mobile devices for employee u s e and
organizations
provides the ability to convert any insecure TCP connection into a secure those devices to conform to the enterprise security policy.
SSH connection This is also referred to as SSH preconfigure
to
identifier of a user of TCP. So, any tunneling. Here, port is an However, many organizations will find it convenient o r even necessary
number.
application that runs on top of TCP has a adopt a bring-your-own-device(BYOD) policy that allows the personal
port Incoming TCP traffic is delivered to the apropriate mobile devices of employees to have access to corporate resources. 1T
application on the basis of the port number. An each device before allowing network
muliple port numbers. application may employ managers should be able to inspect
Local access. IT will want to establish configuration guidelines for operating
forwarding allows the
client to set up a
"hijacker" example, "rooted" "jail-broken" devices
intercept selected application-level
This
will
traffic and redirect it from an unsecured
process. systems and applications. For or are

TCP connection to a not permitted on the network, and mobile devices cannot store corporate
secure SSH tunnel. SSH
is configured to listen device is
selected
ports.
SSH grabs all traffic on contacts on local storage. Whether a
owned by the organization or
tunnel. On the other end, theusing selected port and sends it BYOD, the organization should configure the device with security controls
a
an SSH
SSH server sends the throug like: Enable auto-lock, enable password or PIN protection, enable remote wipe,
the destination
port dictated by the client incoming tratic
you have e-mail client on
an application. For example, suPP ensure that SSL protection is enabled, install antivirus software as it becomes
your desktop and use it to available and so on.
mail
server via the
Post Office Protocol get e-mail from y
PO3 is port (POP). The assigned port number
110. We can secure this traffic Traffic Security
in the
following way: Traffic security is based on the usual mechanisms for encryption and
authentication. All traffic should be encrypted and travel by secure means,
TU Solution ol CST 7* Semester
and Practice Sets Network Security...111
A me

pnvate networks (VPNs) Ca cipient


received
received the message. In essence, the recipient signs the entire
Ma lirtual
original (sender s) signature and appends the
ation'sconfigu
netwgureds
a
h
the mobile device and the organ message plus the
al trah between
authenticabon protocol should be used
original
to form a n e w S/ MIME message.

1 a \TN A strong to limnit new signature A security bel may be included in the authenticated
device to the
resoures of the organization Security l a b e l s :
as o m the
devicespecific authenticator, because it s
Often, a a SignedData
object. A security label is a set of security
i e has a single
the devie has onlv one user. A preferable strategy is to have assumedmobu attributes of
rmation regarding the sensitivity of the content that is protected by
h
a two-laye The labels may be used for access control, by
authentiatban mathanism which involves
user of the device.
authenticating tlhe device c/MIME encapsulation.
users are permitted access to an object.
then authenbcating the indicating which VWhen a message to multiple recipients, a
u s e r sends a
Cure
Secur mailing lists: is required, including the u s e of
Ramie urity of per-recipient processing
The arganizatian should have security mechanisms to protect certain amount relieved of this work by
the each recipient's publi key. The u s e r can be
unauthorized a c e s Ihe security strategy can also incls ewo An MLA can
om the services of a n S/MIME Mail List Agent (MLA).
olikies speific to mobile device traffic. Firewall policies can limit firewa employing the recipient-specific encryption
perform
data and application all mobile the take a single incoming message,
acoess for devices.
Similarly,
detection and intrusian prevention systems can be configured to ha..sio
int for each recipient,
and forward the message.
is bind a sender's
used to securely
service
have Signing certificates:
This
ruies for mobile derice traffic. tighte certificate to their signature through
a signing certificate attribute.
What is DNS Security Extensions (DNSSEC)? How DNsSEC is dec: of intrusion detection. [1+4]
DNS cients from accepting forged altered DNesigne What is intrusion? Discuss differcnt approachesto
compromise the integrity,
to or
protec
records? esource Intrusion is any set of actions
that attempts
Ans:
of
Ans: DNS Security Extensions (DNSSEC) are used by several protocols [1+4 confidentiality o r availability
a resource.

th Following approaches
are used for intrusion detection:
provide email security. It provides end-to-end protection through the use approach This of intrusion detection is
digital signatures that are created by responding zone administrators an Signature-Based Approach: or a known identity, of
"

verihed by recipient's resolver software. It also avoids the need


a
to true focused on searching for a "signature, patterns,
intermediate name servers and resolvers that cache or specific intrusion evernt.
It needs regular updates of what
or route the DNS intrusion
from the
record an
at the moment to ensure its database
originating responding zone
administrator before they reach the signatures or
identities are common

signature-based approach is only


as
soure of the query. It consists of current. This means
a set of new resource record
types and of intruders is
moment.
modifications to the existing DNS protocol.
good as given
how up to date its database is at a

DNSSEC is designed to protect DNS clients from detect the attacks whose pattern
accepting forged or altere Signature-based approach carn easily it is
DNS resource records. It does this
by using digital signatures to provide: (signature) already exists in system
but quite difficult to detect the
known.
Data origin authentication: Ensures that
data has originated new malware attacks as their pattern (signature) is not

correct source. from the In contrast to signature-based approach,


Anomaly-Based Approach:
Data kinds of unknown attacks
integrity verification: Ensures that the content of RR anomaly-based approach looks for the
been modified.
a
has no signature-based approach finds hard to detect. Due to the rapid growth
In uses machine learning
DNSSEC, trust in the public key of the source in malware and attack types, this approach
to athird party or a chain of third
is established not by going models of trustworthy behavior with n e w
parties, but by starting from a trusted approaches to compare
and establishing the chain of trust down to
the current source of
zone behavior. As a result, strange- o r unusual-looking anomalies o r behavior
through successive
verifications of signature of the response will be flagged. However, previously unknown,
but legitimate, behavior
its
parent. The public key of the trusted public key of a child by well and depending on the response, this
zone is called the trust anchor. can be accidentally flagged as
DNSSEC has four new DNS
resource records: can cause some problems.
DNSKEY: Contains a network behavior always
public key. addition, anomaly-based approach
assumes
In
RRSIG: A resource record to teil good traffic from bad.
But it
digital signature stays predictable and it c a n be simple and if a network is
NSEC: Authenticated looks at the behavior of traffic, not the payload,
denial of existence
DS: Delegation signer. record running on a non-standard configuration,
the it can have problems
9. Describe figuring out which traffic to flag.
the four
principal services mode and tunnel mode in
principal security services provided by S/MIME.
Ans: The four
What is the difference between transport
Signed receipts: signed provided by S/ MIME are as IPSEC? [5]
A
folloWs
Returning signed receipt receipt may be requested in a SignedData o
a
nS he differences between transport mode and tunnel mode in IPsec is
message and allows the provides proof of delivery to the of tabulated below:
originator to demonstrate to a third originato the
party ia
Semes
7h Semester and Practice
tion of
of CSIT7"
CSIT Sets
Soluhon
CompleTU
12 A
Transport mode
Tunnel mode Network Security.113
IPsec protection offered either
on premise
Here end
hosts do
IPsec
gateways
other hosts provide service. Web security
-

is real-time

via the cloud by proxying


through software /appliance in_tallation
data; in or

peer-to-peer
own
of their

don' t tunnel.
encapsulation
IPsec needs
to hence the end-hosts redirecting Web traffic to the CP.
or outbound email,
hence
need ID control o v e r inbound and
E-mail security provides
end-hosts

implemented
on each

More overhead required


IPsec protecting, the organization from phishing
malicious attachments,
and spam
than tunnel such a s acceptable u s e
polices
Lower overhead enforcing corporate
mode prevention.
third-part audits of cloud services.
IP header
The entire packet is Security assessments are

encrypted; IP headerhashed
No edits on or encompasses intrusion
detection, prevention,
is Intrusion management
packet during transit. applied the and response.
information and event management (SIEM) aggregates -
log
Security and
Used in securing communicationUsed to tunnel traffic from one . and real networks, applications,
and event data from virtual
device to another.
another
from one systems. data at rest
service that c a n be provided for
Encryption is a pervasive
-

It is good for ESP host-to-host


It is good for VPNs,
gateway-to- in the cloud; email traffic, client-specific
network management
traffic gateway security. information, and identity information.
m e a s u r e s and

Provides protection primarily


to Provides protection to Business continuity and disaster recovery comprise
entire IP resiliency in the event of any service
upper layer protocols packet mechanisms to e n s u r e operational
interruptions.
AH in transport mode AH in tunnel mode consists of security services that allocate access,
authenticates Network security
-

authenticates the IP payload and entire inner IP packet and the distribute, monitor, and protect the underlying
resource services.

selected portions of IP header.


selected
portions of the outer IP header.
ESP in transport mode encrypts ESP in tunnel mode
encrypts and
and optionally authenticates the optionally authenticates the entire
IP payload but not the IP header. inner IP packet, including the inner
IP
header.
12 Describe the services provided by a service provider under
as a service.
cloud securi
Ans: The term
security as a service (Secaas) has generally meant a
package of
security services offered by a service
provider that offloads much of the
security responsibility from an enterprise to the security service
provider.
Among the services typically provided are authentication, antivirus,
antimalware/spyware, intrusion detection, and security event management
In the context of doud
SecaaS, is a
computing, cloud security as a service, designated
segment of the SaaS offering of a CP.
The Coud
Security Alliance defines SecaaS as the provision of
applications and services via the cloud either to cloud-based secunty
5ottware or from the cloud to the customers' on-premise infrastructure and
Security Allance has identified the systems. The CIou
Ident and access
following SecaaS categories of service
dnd management (IAM) - includes people, proces
sy'stems that are used to
manage access to y
aug thal the identity of an entity is verified,enterprise
correct level
resou
and then granung he
of access based on this
Dal 1oss prevention (DLP) is assured the
identity.
protecting an
verntying monitoring
-

the
DLP security of data at in rest,
can be motion, and
implenented by the cloud client. u
Network Security... 115
CSIT 7h Semester and Practice
Sets
Solution of
114A Complete TU
IP connections, the network
TRIBHUVAN UNIVERSITY
I from
yer that in the usual network
OSI Laye
creates
and Technologv connectionless. However, with security associations, IPSec
Institution of
Science e P is
aylconnection-oriented channels at the network layer. This logical
TU QUESTiONS-ANSWERS 2078 oriented channel is created by a security agreement
established
nection- the sending
two hosts stating specific algorithms to be used by
Question) Course Title: Network Secu etween the integrity,
SET 1 (CDSIT Model confidentiality (with ESP), authentication, message
Course No: CSC 416
Seventh Semester
curity24
Pass Marks: arty to ensure
and anti-replay protection.

Level: B. S CSIT Fourth


Year /
Section A
Time: 3 hours. establishes a unidirectional ch£nnel, for a full duplex
Since each AS An SA is
between two parties, two SAs must be established.
communication
Attempt any TWO questions.
1. How do transport and
tunnel modes of operation differ in IPSec? n 12*10-20 defined by following parameters.
a 32-bit connection
identifier of the SA.
Security Parameter Index (SPI)
-

how security is provided by IPSec protocol. a s o u r c e and destination host,


there is o n e
two modes: transport
mode and tunnel mode. 4+6 For each association between
connection to provide
Ans: IPSec operates in datagrams in the
to higher layer pros
SPI that is used by all
host-to-host protection device o n how to process the incoming
Transport mode provides ocols in information to the receiving
between two hosts in both IPv4.and IPv6. In
the communication IPva traffic.
the IP address as show in figure below. In this
area is the area beyond IPv6, the address of destination host.
IP Destination Address
-

new extension to IPv4, the


protection incudes the upper
protocols,
lIP addresses of the two D P
the I Security (AH
Protocol ESP) or specifying if traffic is
-

to be used and
address, and any IPvó header extensions. The A
also defines the
hosts are in the clear because they are needed in routing the datag PSec to be provided with integrity
and secrecy. The protocol
through the network.
tagram key size, key lifetime,
and the cryptographic algorithms.

which defines the keys to be used.


Secret key
TCP/UDP Header Protected Data
-

IP Header IPSec ESP Trailer how encapsulation headers


are created
Encapsulation mode defining
-

during the
Figure: IPSec's Transport Mode
and which pårts of the header
and u s e r traffic a r e protected
Tunnel mode offers protection to the entire IP datagram both in AH and ESp communication process.
how the handshake protocol
between two PSec gateways. This is possible because of the added new
header in both IPv4 and IPvó as shown in figure below. Between the
Ip 2. What is the use of TLS protocol? Describe
TLS? 3+7]
two and change cipher spec works in
gateways, the datagram is secure and the original P address is also secure.
Ans: Transport Layer Security (TLS),
widely adopted security protocol
is a
However, beyond the the datagram may not be secure.
gateways, for communications o v e r
the
Such to facilitate privacy and data security
protection is created when the first IP'Sec gateway designed
encapsulates the datagram case of TLS is encrypting the communication
Internet. A primary u s e
including its IP address into a new shield
datagram with a new IP address of between web and servers, such as web
applications
browsers loading a
the receiving IPSec such as
gateway. At the receiving gateway, the new datagram is website. TLS can also be used to encrypt other
communications

unwrapped and brought back to the original datagram. This and voice o v e r IP (VolP).
based on its original IP address, can be datagram, email, messaging,
but
passed on further by the receiving three main components to what
the TLS protocol accomplishes
are

gateway, from this point


on
unprotected. There are

as follows:
IP IPSec IP third
TCP/UDP Protected ESP hides the data being transferred from parties.
Header Header Encryption: information are
Header Data Trailer Authentication: ensures that the parties exchanging
Figure: IPSec's Transport Mode who they claim to be.
In order to perform the verifies that the data has not been forged or tampered with.
security services that IPSec provides; IPSec must first Integrity:
get as much information as
possible on the security arrangement of the two Handshake Protocol
communicating hosts, Such security arrangements are called Handshake Protocol allows the
and client to authenticate each other
server
associations (SAs). A secury
security association is a unidirectional and to negotiate an encryption algorithm and cryptographic keys
and MAC
arrangement defining a set of items and securiy to be used to protect data. The
Handshake Protocol is used before any
between the two procedures that must be
shareu Protocol consists of a series
communicating
communication process. entities in order to protect e applicationdata is transmitted. The Handshake
of messages exchanged by client and server
of CSIT Th Semester and Practice Set Notwork Security...117
116 A Complete TU Solution
Server
Client messages have "nonce"
to prevent replay attack.
Both this
client helo Phase 1
Server
Phase 2, Ser Authentication and Key Exchange: The server begins
2,
Establish security capabilities, incl. its certificate if it needs to be authenticated.
protocol version, session ID, cinudin 1se by sending suite.
compressIon method, and Server sends chosen cipher
number initial Server may request
client certificate. Usually, it is not done.
random indicates end of Server_hello.
gortihcate
Server
Authentication and Key Exchange: The client should verify
Phase 3, Client if required and check that the
s e r v e rk e y _ e x c h a r g e

provided a valid certificate


Phase 2 hat the server
parameters a r e acceptable.
Server may send certificat.e key exch- server_hello
certificate equest.
and if
Client sends certificate, only requested
by the s e r v e r .
request certificate.
of hello message phase.
Server signak the Pre-master Secret (PMS) encrypted
with the server's
Sernver hello_done end It also sends
public key.
if certificate is sent by him
Client also sends Certificate_verify message
has the private key associated
with this certificate.
to prove he
certificate Phase 3 Basically, the client signs a hash of the previous nmessages.
client key_exchange Client sends certificate if Phase 4, Finish:
This phase completes the setting up
of a s e c u r e connection.
sends key exchange. Cliernt requested. Cio change_cipher _spec message and copies the pending
may send The client sends a

certificate veriy certificate verification


CipherSpec into the current
Protocol
CipherSpec
Change Cipher Spec which
Change cipher spec The Change Cipher Spec
Protocol consists of a single message,
the value 1. The sole purpose of
this message is
consists of a single byte with
current state, which updates
finished Phase 4
tocause the pending
state to be copied into the

Change cipher suite and finish the cipher suite to be used on this connection.
c h a n g e _ c h i p e r _ s p e c

handshake protocol 1 byte


Protocol
finished Figure: Change Cipher Spec
security
the services under 802.11i RSN specification? Briefly
3. What are
describe the five IEEE 802.11i phases of operation. 4+6]
Note: Shanded transfers under 802.11i RSN security specification:
Ans: Followings are the services
are
optional or situation-dependent Authentication: A protocol is used to define
an exchange between
a
message that are not always sent.
mutual authentication and generates
user and an AS that provides
to be used between the client
and the AP o v e r the
Figure: Handshake Protocol Action temporary keys
Figure above shows the initial wireless link.
connection between client and server.exchange needed to establish a logical Access control: This function enforces
the use of the authentication
The exchange can be viewed as and facilitates key exchange. It
four phases. having function, routes the messages properly,
Phase 1, Establish can work with a variety of authentication protocols.
Security Capabilities:
This phase is used MAC-level data (e.g., an LLC PDU)
initiate a logical connection and
to establish the
by the client to Privacy with message integrity:
security code that e n s u r e s that the
be associated with it. that willcapabilities are encrypted along with a message integrity
This phase data have not been altered.
comprises of exchange
of two down into five distinct
server_hello. messages client_hello and The operation of an IEEE 802.11i RSN can be broken
client_hello contains of list of phases of operation.
theclient, in decreasing order ofcryptographic algorithms supported by Discovery: An access point (AP) uses messages called Beacons and

server _hello contains the selectedpreference. Probe Responses to advertise its IEEE 802.11i security policy.
The
and a new
session_id. Cipher Specification (Cipherspec) wireless station (STA) uses these to identify an AP for a WLAN
with
The
CipherSpec contains fields like: which it wishes to communicate. The STA associates with the AP,
Cipher Algorithm (DES, 3DES, RC2, which it uses to select the cipher suite and authentication mechanism
MAC and RC4) when the Beacons and Probe Responses present a choice.
Algorithm (based on
Public-key algorithm (RSA) MD5, SHA-1) Authentication: During this phase, the STA and AS prove their
identities to each other. The AP blocks non-authentication traffic
Solution of CSIT 7 Semester
and Practice Sets Network Security...119
118. A Complete TU
As until the authenticatio of
the STA and must remain
unaltered during all
between
successful. The AP does
not participate in transactio retrieval, update,
operations by
and transfer. Data
u n a u t h o r i z e d entities.

transaction other
than forwarding traffic between the STA ticati these include hashing, data validation
Key generation and distribution: The AP and the STA perform ses
S. used to e n s u r e
data integrity
Methods controls. Data integrity
checks, and access

that cause crypkographic keys to be generated and nSeveal data consistency above.
checks, one or more of the methods listed
opera
exchanged between the.Placed. on the need
include
Frames are can
used to describe
the AP and the STA. P and STA systems
availability is the principle
Data times.
Availability: and services at all
only. availability of information systems
Frames exchanged between. he STA
are
to maintain to information
Protected data transfer:
access
c a n prevent
and system failures the
the AP. As denoted by the shadir and Cyber-attacks the availability of
the end station through For example, interrupting
encryption module
icon, secure data transfer occurs betweeng and the systems
and services.
down may provide a n advantage

is not provided end-to-end.


the STA website of a competitor by bringing it attacks threaten system
and the AP only; security These d e n i a l - o f - s e r v i c e (DoS)
Connection termination: The AP and STA exchange frame to its rival.
users from accessing and using
legitimate
connection is torn dowr and the connection 8 this availability and prevent
phase, the secure when needed.
to the original state. restored information systems
e n s u r e availability
include system redundancy,
system
AS End Station Methods used to maintenance, up-to-
STA increased system resiliency,
equipment recover
to
backups,
and software, and plans in place
date operating systems
unforeseen disasters.
quickly from Describe the identity management

Phase 1-Discoveen What is identity management? [1+4]


architecture.
automated approach to provide
centralized,
management is a
and other
authorized
Identity
Phase 2-Authentication
Ans:
enterprise-wide
access to resources by employees an identity for
management is defining
The focus of identity the identity, and
individuals. attributes with
each user (human or process), associating The central concept of
which a verify identity.
user can
Phase 3-Key Management enforcing a means by is the use of single sign-on
(SSO). SSOD
an identity management system authentication.
after a single
all network resources
enables a u s e r to a c c e s s
Phase 4-Protected Data Transfer ldentity
provider

Ph se 5-Connection Termination
Figure: 1EEE 802.11i phases of operation
Section B
Attempt any EIGHT questions. Data Principal
4 Define integrity, [8x5-40 Consumer
Ans: The CIA triad
confidentiality and availability.
concept in information
organization's efforts towards ensuring datasecurity
which guides an
security.
confidentiality, integrity and availability is also known CIA stands for
foundations of as three Attribute
information systems security. service
Confidentiality: Confidentiality prevents the
to unauthorized people, resources and
disclosure of information
confidentiality is privacy. Organizations processes. Another term for
only authorized restrict
ensure access to that
operatorscan
use data
example, a programmer should not or other network resources. For Administrator
information of all have access to the persona
Methods used to
employees.
ensure Architecture
confidentiality include data encryptio
authentication, and access control. Figure: Generic ldentity Management
and data flows in a generic identity
Integrity: Integrity is the Above figure illustrates entities
data during its accuracy, consistency, and A principal is a n identity
holder. Typically, this is
management architecture.
Another term for trustworthiness
entire life o the network.
undergoes numbercycle.
services
seeks access to r e s o u r c e s and
on
Data human that
operations such asintegrity
a a user
is
of qually Principals authenticate themselves to an identity provider. The identity
capture, storag
Network Security... 121
20 A Complete TU Solution of CSIT 7h Semester
and Practice Sefs
a TCP connection to
the This is done via the TCP
server.

lient establishes the


provder associates authentication information with a principal,
attributes and one or more identifiers.
principal, as
well as and
of Transport
first, tned is not part server
Layer Protocol. Once the connection is

exchange data, referred to as packets,


in the data
Increasingly, digital identities incorporate aftnbutes other than sins. proohed, the client format.
1dentifier and authentication information (such as passwords and b i y an TCP segment. Each packet is in the following
ofa
information). ges the creation and
An attribute servioce manages
such attributes. nent enables the user to
mainten iometric
tenance
field
Payload
ldentity managenmer provi of
information once, so that it is maintained in a single place and e this
data consumers in aocordance with
authorization and releaseto
privacy policies.
ay create some of the attributes to
be with their
assocaated Users
eir digital
digital
such as address. identity, cOMPRESss
Administrators provides attributes to users, such as roles,
permissions, and employee informnation. Data consumers are entitiesacc
obtain and employ data maintained and provided by identity
and attrih
Seq pktl pduCompressed payload,
providers, which are often used to support authorization decisions a t e
to
collect audit information. For example, a database server o r file ser
a
data consumer that needs a lient's credentials so as to know what acco
to
provide to that client
5. Describe the concept behind SSH transport ayer protocol
cket
exchanges. ENCRYPT MAC
Ans: Figure below illustrates the sequence of events in the SSH Transport La
ayer
Protocol
Client
Server Ciphertext

SSH Packet
the
the packet in bytes, not including
Establish TCP Connection Packet length (pktl): Length of
packet length and MAC fields.
random padding field.
Padding length (pdl): Length of the
ldentification string SSH-protoversion-softwareversion Payload: Useful contents of the packet. Prior to algorithm negotiation,
exchange is negotiated, then in
this field is uncompressed. If compression
SSH-protoversion-softwareversion subsequent packets, this field is compressed.
injection
and network
7. Describe how accidental association, MAC spoofing
Algorithm SSH_MSG KEXINIT security threats to wireless networks.
create
LANs or wireless access points to
negotation Ans: Accidental association: Company wireless
sSH_MSG_KEXINIT wired LANs in close proximity (e.g., in the same or neighboring buildings)

transmission ranges. A user intending to connect to


may create overlapping
one LAN may unintentionally lock on to
a wireless access point from a
Key Exchange network. the security breach is accidental, it
Although
neighboring
nevertheless resources of one LAN to the accidental user.
exposes
when an attacker is able to
End of
key exchange SSH_MSG_NEWKEYS MAC spoofing (ldentity theft): This occurs
eavesdrop on network traffic and identify the MAC address of a computer
SSH_MSG_NEWKEYS with network privileges
Network injection: A network injection attack targets wireless access pointss
Service SSH_ MSG_SERVICE_REQUEST that are exposed to nonfiltered network traffic, such as routing protocol
request of such an attack
messages or network management messages. An example
is one in which bogus reconfiguration commands are used to affect routers
Figure:5SH transpon layer protocol and switches to degrade network performance.
packets exchanges
Practice sets
122A Complete TU Solution of CSIT 7 Semester and Network Security... 123

of internet mail architects.


Discuss the key components the message
8 (MDA): Responsible for transferring
Ans: Mail Delivery AgentMS.
MHS to the
from the long-term MS.
An MS c a n
Store (MS): An MUA
cân employ a
the MUA4.
BMessege Transfer Message Transfer Message the same machine as

agent (MTA) agent (MTA)


SMIP
Message Transfer
agent (MTA) be located
on a

an MUA
remote s e r v e r o r o n

retrieves messages
a remote
from s e r v e r using
POP

Typically, Access Protocol).


IMAP (Internet Message
(Post Office Protocol)
or
services are
authentication and email compatibility
SMIT (SMTP How
confidentiality, 5]
local) provided by S/MIME?
encrypting messages.
provides confiderntiality by
Ans: Confidentiality: S/MIME with the cipher
block
Mai submission
MESSAGE HANDILING Maii delivery AES with a 128-bit key is used,
with RSA, a s
agent (MSA) agent (MDA) Most commonly also encrypted, typically
agent (MTA $YSTEMMHS) mode. The key itself is
chaining (CBC)
explained below.
referred to a s a content-encryption
key, is
ESMTP ESMTP each symmetric key, number for each
In S/MIME, random
(Submission) (Submission used only o n c e .
That is, a n e w key is generated
as a
content-encryption key
is
Because it is to be
used only once, the
the key, it is
Message user Message store message.
and transmitted with it. To protect
agent (MUJA) to' the message described as
(MS) bound The sequence c a n be
with the receiver's public key.
encrypted.
(IMAP, POP follows: message and random 128-bit
number to be
local) The sender generates
Message for this message only.
used a s a content-encryption key
author
the content-encryption key.
Message user The message is encrypted using RSA using the recipiene's
agent
(MUA) is encrypted with
The content-encryption key
attached to the message.
public key and is to decrypt and
r e c o v e r the
with its private key
The receiver u s e s RSA
content-encryption key.
Message is used to decrypt
the message.
recipient The content-encryption key m e a n s of a digital
Above figure illustrates the key authentication is provided by
components of the Internet mail
architecture, Authentication: In S/MIME The sequence is a s
follows:
which include the following. RSA with SHA-256 is used.
signature. Most commonly
Message User Agent (MUA): Operates on behalf of user actors and The sender creates a message. of the message.
a 256-bit message digest
user
applications. It is their representative within the email service SHA-256 is used to generate
with RSA using the sender's private
Typically, this function is housed in the user's computer and is referred The message digest
is encrypted is
the message. Also appended
to as a client result is appended to
email program ora local network email server. The author key, and the the for which will
signer,
enable the receiver to
MUA formats a identifying
information
message and performs initial submission into the MHS
via a MSA. The retrieve the signer's public key.
reciplent MUA processes received mail for storage RSA with the sender's public key to decrypt and
and/or display to the recipient user. The receiver uses

Mail Submission recover the message digest.


Agent (MSA): Accepts the message submitted by n e w message digest
for the message and
MUA and enforces
the policies of the an The receiver generates a
hash code. If the two match, the
requirements of Internet standards, This hosting domain and tne
function may be locates
compares it
with the decrypted
authentic.
together with the MUA or as a message is accepted
as
is used, at least part of the
block to be
case, the Simple Mail Transfer separate functional model. In the latte
Protocol (SMTP) is used between ue
E-mail Compatibility: When S/MIME
the signature service is used, then the
MUA and the MSA. transmitted is encrypted. If only the
sender's private key). If
is encrypted (with the
Message Transfer Agent (MTA): Relays mail for one message digest
used, the plus signature (if present) are

hop. It is like a packet switch or applicatiorn-level


routing assessments and to move IP router in that its job is to ma
confidentiality service is

encrypted (with a one-time symmetric


message
key). 8-bit
a stream of arbitrary
consists of
the message closer to all of the resulting block
Kelaying is performed by a the Thus, part or
sequence of MTAs until therecipe
of blocks
reaches a destination However, many electronic
mail systems only permit the use

MDA. An MTA also


message header. SMTP is used adds trace mesob
o the
octets.
ASCII text. To accommodate
this restriction, S/MIME provides
consisting of
and an MSA or
MDA. between informationTA
MTAs and between an MTA the service of converting the raw
8-bit binary stream to a stream of printable

ASCII characters, a process referred


to as 7-bit encoding.
124 A Complete TU Solution of CSIT 7h Seme ster ond Practice Sets Network Security. 125
the
10. Describe the key determination protocol Internet Key Exchange
in Internet
Bxchan. be accidentally tlagged
as well and depending on response,

IFSec. (IK ehavior can some


problems.
network behavior always
Hellman key exchanp
cause
Ans: IKE key determination is a
refinement of the Ditfie-Hellman kev this
can

f addition,
anomaly-based approach
assumes

to tell good traffic from bad.


But it
algorithm
The Diffie-Hellman algorithm has two attractive features: predictable
and it can be simple
and if a network is running
stays of
tratfic, not the payload, out
Secret keys are created only when needed. There is none looks at the behaviorconfiguration, the it can have problems figuring
a
non-standard
secret keys for a long period of hnme, exposing them to Sto on
traffic to flag.
in
mechanisms adapted
which issues and possible security
vulnerability.
The exchange requires no pre-existing infrastructure otho
reased Describe the security 51
12
agreement on the global parameters. than loT.
issues in IoT
Security s o m e a r e the followings:
loT security issues the
However, there are a number of weaknesses to Difie-Hellman such aS: Ans:
Among the many Users often deploy
IoT devices
without
It does not provide any information about the identities of the n a Lack of visibility: which makes it impossible to have a n

It is subject to a man-in-the-middle attack, in which a third.Es knowledge of IT departments, to be protected and monitored.
of what needs
impersonates B while communicating with A and impersonatesty accurate inventory and scale of loT
Because of the variety
communicating with B. Both A and B end up negotiating a kev A while Limited security integration:
into security systems ranges
fromn
them
which can then listen to and pass on traffic. devices, integrating
challenging to impossible. for loT
It is computationally intensive. As a result, it is Firmware developed
vulrnerable
toa cloeo
Open-source code
vulnerailities:
software, which is prone
to bugs
attack. in which an opponent requests a high number
of keys. The vis includes open-source
devices often
spends aonsiderable computing resources doing usel ss mod
exponentiation rather than real work.
nodular and vulnerabilities.
volume: The amount of data generated by loT
Overwhelming data and protection
difficult.
IKE key determination is designed to retain th. advantages of Diffi devices make data oversight, management,
security,
The IKE developers do not prioritize
Hellman while countering its weaknesses.
five features:
key determinatiom Poor testing: Because most loT
effective vulnerability testing
to identify
algorithmn is characterized by important they fail to perform
It employs a mechanism known as cookies to thwart clogging attacks. weaknesses in loT systems. have unpatched
devices
lt enables the two parties to negotiate a group; this, in essence, vulnerabilities: Many loT
specifies Unpatched
reasons, including patches
not being available
the global parameters of the Diffie-Hellman key for many
exchange. vulnerabilities

It uses nonces to ensure against replay


attacks and difficulties accessing and installing patches. to command-
a s entry points
a r e often used
It enables the exchange of Diffie-Hellman Vulnerable APls: APls launched, such as SQL
public key values. which attacks are
It authenticates the Diffie-Hellmam and-control centers from
exchange to thwart man-in-the-
distributed denial of
service (DDoS), man-in-the-middle
middle attacks. injection, networks
11 How intrusion detection is done
by signature based and anomaly-based (MITM), and breaching
Weak passwords: loT de es are commonly shipped
with default
approaches? fail tochange, giving cyber
criminals easy
Ans: Signature-Based Approach passwords that many
users

This approach of intrusion users create weak passwords that


can
be guessed.
detection is focused on access. In other cases,
"signature," patterns, or a known identity, of an intrusion searching for a Possible Security Measures can
cyberattacks. These
measures

intrusion event. It needs


or
specific device can be vulnerable to
regular updates of what signatures or identities are Any connected attacks.
common at the moment to ensure be adapted to prevent potential reduce
its database of intruders is current. This analytics c a n significantly
means
signature-based approach is only as good as how up to date its Use IoT security analytics: Security
vulnerabilities. Security analytics help security
database is at a given moment. loT security issues and and
Signature-based approach teams to identify and prevent
potential threats by collecting
(signature) already exists in systemeasily
can
detect the attacks whose
but pattern analyzing data from multiple sources.
teams
malware attacks as their it is quite difficultto detect the new (EDR): EDR allows security
pattern (signature) is not known. Endpoint Detection and Response and direct a c c e s s to devices
Anomaly-Based Approach to quickly identify malicious activity gain
Another key capability of EDR
is
In contrast to signature-based with real-time visibility and alerting.
the kinds of
unknown attacks approach, anomaly-based approach looks to that it can automatically block suspicious in real-time.
activity
Due to the signature-based approach finds hard to dete
rapid growth in malware Secure APls: loT devices often rely
on APl. to retrieve
data from other
machine and attack API security best
learning types, this approa r and share the data they collect. By adopting
with new behavior.approaches
As a
to
compare models of trustwortny
result, strange- or avior
systems
practices and continuous security testing, organizations
can be sure

behavior wil be
flagged. However, previously unusual-looking anon sate,of that hackers cannot break into their loT devices via weakly configured
unknown, but
leg or unauthenticated APls.
126A Complete TU Solution of CSIT 7 Semester and Practice Seta Network Security.. 127
Improve network visibility: IT teams need dedicatm d provided by PGP
detailedvisibility
field42
(NAC) to main services padding
like network access controls
all network-connected devices. NAC technology should inventony Explain
different

Watdoes IP security policy


hat
means?
operation?
Why does ESP
include

update the inventory


when a new device connects and automati ODiscuss
IEEE 802.111 phase shell
(SSH)? Explain.
by s e c u r e
of loT devices enablesVerify
mean
basis. Keeping track What do you security threats.
monthly of the main cloud-specific benefits of the IoT?
automatically respond
to security incidents andanizati
ationsn t Describe some
factors
would most
influence and accelerate the
compliance actions. What
communication: Attackers can
Encrypted access to devices. You have Promise MODEL SET 2
communication to gain to
communication between loT devices and interfaces like te encry the
mobile apps to prevent data breaches. Today, the mosi apps and
data transfer is SSL/TLS.
encryption protocol for common Section A
[2*10-20]
Authentication: Comprehensive device authentication can
vulnerability of loT devices because
hackers are always t uce t TWO questions.
principles. 5+5]
their hands on personal information. ying to ge
ere are various auther
Attempt any
issue? Describe
remote user
authentication
with
What are web security firewall configurations
mechanisms available for loT devices like multifactor auth cation 1. the various types of
[2+8]
digital certificates and biometrics. thentication 2. What is firewall?

relevant diagrams.
E>xplain
and security
services. [10
with its components
Describe IPSec protocol
3 Section B
oDEL QUESTONS SETS FOR PRACTICE 8x5-40]
EIGHT questions.
Attempt any systemn (2+3]
methods to protect computer
control?
What is a c c e s s
Explain the
and information security?
What is security
MODEL SET 1 5.
Explain security
various
mechanisms.

TLS protocols
7. Compare SSL and WLANN?
block of a n 802.11
8. What is the basic building content type
and MIME transfer
SET 1 (CDCSIT Model Question) Course Title: Network Security a MIME
is the difference between
Course No: CSC 416 9. What
Pass Marks: 24 (2+3]
Level: B. S CSIT Fourth Year /Seventh Semester encoding? of computer
viruses.
Time: 3 hours. | Define Virus. Explain different types
Section A 10. intruders.
different classes of
Attempt any TWO questions. 11. Explain the cloud computing
reference architecture.

1. Assume that you are [2x10-20 List the objectives of developing


of security
joining a telecommunication company for the post
new 12.
engineer. As a new member in the company, you observed that MODEL SET 3
there is privacy and
integrity issue.
a Suggest a model for network security. Describe each
briefly. [7
b. Which
security mechanism will you follow incomponent
your company to Section A
authenticate the legitimate users and
to preserve the data
integrity
[2x10-20]
Why? Attempt any TWO questions. have security plan the various views of
2 Assume an open
distributed network environment in 3 to despite
workstations wish to which users 1 Why it is important
access services on servers concerning its importance?
security experts the architecture of
network. Now discuss
how can you use distributed throughout intrusion detection system. Explain
Kerberos protocol for 2 Define intruders and (4+61
service comnunication
3 What do between users and servers in the secu intrusion detection system.
be the IPSec located on
you mean by one-time environment. [10 What the services provided by IPSec? Where can

agreement. password? Explain 3. are

Diffie-Helna4R a network?
Section B
Attempt any EIGHT Section B [8x5-40]
4 Explain firewall questions. 8 x5-40 Attempt any EIGHT questions. of IPSec.
in details. mode and transport mode
What is denial of 4. Differentiate between tunnel
service attack? PGP protocol.
6. Discuss five principal services provided by
provided byExplain.
What are the 5.
services authentication and non-repudiation.
VPN? 6. Differentiate between
Explain.
128A Complete TU Solution of CSIT 7 Semesher end Prectiee Sets Network Security... 129
What is cloud security service (Secaas)? Explain any
as a
any two service is a continuous process; what
are the state in

security
details
What are the principal elements of mobile device security strat. h e e n stated
It
h a sb e e n .
that
8.
What are the various advantages and disadvantages of NIDS2 LAN.
t h i sp r o c e s s ?

9. 802.11 wireless

10. Explain the characteristics of a good firewall mplementation. Discuss IEEEDomain Keys dentified Mail (DKIM) strategy. to
7.
Explain the
What precautions can be taken
techniques.
11. What is trojan horse? What is the principie behind
it? different intrusion
version 5?
S
12 What are the main features of Kerberos 9.
prevent intrusion.

DDoS attack? Explain.


What is of client-side vulnerabilities
that can be exploited by
NODELSET Give some examples
011. Gi benefits of the loT?
influence and accelerated the
m a l w a r e ?

would most
12.
What factors
Section A
MODEL SET 6
Attempt any TWO questions.
1. Explain IEEE 802.11i services
What are IDS? Discuss IDS limitations and counter measures.
2*10-20
2. Section A
3. Give an example fora situation that compromise in confidentiality 12x10-20]
compromise in integrity. Write about the usage of session keys, puh s to TWO questions.

private keys in PGP


keys, public and i Attempt any
similarities biological
between
virus and computer
virus?

What a r e the 4+6]


Section B (2-8 1.
Describe s o m e
malware c o u n t e r m e a s u r e s
elements.

for wireless network security. AH


Attempt any EIGHT questions Explain the techniques
mode and tunnel mode? Explain
about the scope of

4 Does information aanfidentiality infer information integrity? Explain your response


8x5-40 What is transport
modes.
4+6]
and ESP in these
What are the best security mechanísms to ensure information Section B
o. What are the content types provided by S/MIME? Explain.
confidentiality? [8x5-40
questions.
What are the different combinations of Security Association on a network? Attempt any EIGHT
Discuss DNS Security Extension (DNSSEC) operations. Discuss the forms of protections.
9 Explain how data is protected in cloud. Record Protocol in SSL/TLS? Explain
5. What is the role of the SSL firewall and a 'stateful inspection
10. Discuss the SSL record
protool in detail 6. Differentiate between a packet filtering
11 What is firewall? Explain its limitations. firewall.
12. Explain the counter measures for malicious the message and but before encryption?
codes. Why does PGP compress functionalities.
with its different
Explain S/MIME Authentication s e r v e r (AS)
and Ticket-granting
server

9. Explain the role of


MODEL SET 5 (TGS) in Kerberos.
of Network security.
10. Explain different aspects reference architecture.
11. Explain the cloud computing
Section A 12 Briefly describe the types of intruders.
Attempt any TWO questions.
1 What are the services [2x10-20] MODEL SET 7
provided by IPSec? Briefly explain
2.
Payload?
Discuss the cloud
encapsulating lle
4+6
Discuss briefly the security risks and
countermeasures.
working KERBEROS authentication
Section A

Section B protocol. Attempt any TWO questions.


12x10-20]
Attempt any EIGHT
4. In IDS
questions. 1. Explain IEEE 802.11i phase of operations
in details.
explain the methods 18x5-40)
"Security is insecurity" justify the Discuss the
statement.
5.
Differentiate between SSL used for statistical anomaly detection. 2 cryptographic
S/MIME. summary of
Session and SSL 3. What do mean by you
protocol provides 2+8
confidentiality and Connection. How SSL
message integrity. KeCO algorithms used by S/MIME.
130A Complete TU Solution of CSIT 7 Semester end Practie 5ets Warehousing and
Data Mining
Data
Section B
Syllabus
Attempt any EIGHT questions. 20 2 0
What is CIA triad?
8x540 Warehousing and
Data Mining Full Marks: 60
Pass Marks: 24
+
+

8+8
What is PKI? Why isExplain.
Course Title ritle: Data
it so important in informafion security?7 C o u r s e N o :C S C 4 1 0

What is the use of ide network security? Describe the Nature o fthe
th
Course: heory +
Lab Credit Hrs:3
elements of an identify management sy'sten SSL
security in Protocol?
incipa Semester: VII

How SSL Recond Potocol provides


What the pros and cons of
are
firewal
C o u r s e D e s c r i p t i o n :

and data mining


9. the four broad categories of payloads
that a malware
may ces advanced aspects of data warehousing
What application of the
o. This course introduces

10.
are
Discuss sender policy framework
carry? the principles, research results and
commercial
ompassing
modes operations of IPSec protocol.
of
e n c o m

Explain different with loT to society?


current technologies.

W h a t are the biggest risks associated Course Objective:


different data mining
of this course is to provide knowledge of
The main objective
oDEL SET 8 techniques and
data warehousing.
Course Contents:
5 Hrs.)
Warehousing
Introduction to Data
Unit 1: and data warehousing,
Section A of data, Data warehouse
Lifecycle of data, Types database and data warehouse, A
operational
Attempt amy TWO questions.
1. With the ubiquitous communication brought about by the IoT, [2x10-20 Differences
multidimensional data model,
between
OLAP operation in
multidimensional data model,
of data warehouse, Data
architecture data warehouse, Architecture
interoperability is critical Can the IoT guarantee
Conceptual modeling
of
warehouse, Need for
implementation, Data marts, Components of data
interoperability? warehouse
Explain Network-Based Intrusion Detection Systems. Draw the IP sect in data warehousing
data warehousing,Trends
authentication header and describe the functions of each field. ecurity Unit 2: Introduction to
Data Mining
(2 Hrs.)
Data mining
Discuss IEEE 80211 Network components and architectural model. Introduction to data mining system,
3 Motivation for data mining, Statistical description of
and attribute types,
Section B functionalities, KDD, Data object
data, Issues and Applications
Attempt any EIGHT questions.
4 How data integrity is differed from the system
185-40 Unit 3: Data Preprocessing
(3 Hrs.)
Data
integrity? Briefly discuss the Data cleaning, Data integration and transformation, Data reduction,
categories of security services.
Explain the authentication procedures defined by X.509 certificate. 1243 discretization and Concept Hierarchy Generation, Data mining primitives
5.
What is the relation between Unit 4: Data Cube Technology (4 Hrs.)
mechanisms and
security attacks?
Why does PGP compress the message? What are the reasons forExplain. Eficient method for data cube computation, Cube
materialization (Introduction to
the signature but before compressing Full cube, Iceberg cube, Closed cube, Shell cube), General strategies for cube
3. What are the core
encryption? induction for data characterization, Mining class
of Attribute oriented
components PKI? computation,
Explain the difference between a Briefly explain
9. each component.
keylogger and spyware with suitable comparison, Discriminating between different classes
example. Unit 5: Mining Frequent Patterns (6 Hrs.)
10. What do you mean by local forwarding in SSH? Describe about the Frequent patterns, Market basket analysis, Frequent itemsets, closed itemsets,
channel types possible
11 recognized
What is federated
in SSH connection
protocol specification. association rules, Types of association rule (Single dimensional, multidimensional,
identity management? Discuss. 23] multilevel, quantitative), Finding frequent itemset (Apriori algorithm, FP growth),
12
Discuss $SL record protocol in terms of Generating association rules from frequent itemset, Limitation and improving
encryption fragmentation, compressio d
Apriori, From Association Mining to Correlation Analysis, Lift
Unit 6: Classification and Prediction (10 Hrs.)
Definition (Classification, Prediction), Learning and testing of classification,
Classification by decision tree induction, ID3 as attribute selection algorithm,
O00 Bayesian classification, Laplace smoothing Classification by backpropagation,
Rule based classifier (Decision tree to rules, rule coverage and accuracy, efficient of
rule simplification), Support vector machine, Evaluating accuracy (precision,
and Data Mining . . 133
Data Warehousing

Semeskerand
Proctice Sets
A Complee
TU Solution of CSIT 7 TRIBHUVAN UNIVERSITY

132
derfit ing Ktoj
.

Overtitting and . .

classification, and Technology


Issues in (McNemaY's test) of Science
recal. f-measure), two
classifier Institution

cross
validation, Comparing

Unit 7: Cluster Analysis Similarityy


and dissimilari- (8 Hn MODEL QUESTIONS

in cluster
analysis,
K-means++, Mini R een
Types of data Partitioning (K-means,
- Batch
ha neans,
ojectsk Full Marks: 60
and DrVISIve), Density
Clustering techniques:
sed Pass Marks: 24
medoids),
Hierarchical

Outlier analvsis
(Agglomerative

Network Analysis
(DBSCAN arse
Title:
Data
Warehousing

410o
and Data
Mining

Semester
Time: 3 hours.

and Social CSC


C o u r

Unit 8: Graph Mining 5 Hrs No:


Year/
Seventh

mining algorithm R3eam.


Fourth Section A [2x10-20]
Course

graph mining nGrapn B. Sc CSIT


Graph mining, Why
Inductive logic programming),
Social ink nmin:.
e t w o r k analysis, Link

of struchs
mining, Friends search Ler
questions.

of data
warehouse.
How data
cube

5+5]
Sigmed network (Theory ired balang TWO
any components
friends, Degree assortativity, Attempt different

between the theory of balance and atus), Trusttinin a Explain


the Describe.
Conflict is performed?
Theory of status, Propagation of distrust, Iterative terative propagation precomputation
network (Atomic propagation, Access Tools
links
redicting positive
and negative Ans Central Database
Text and Web Data
Unit 9 Mining Spatial,
Multimedia,
(2 Hrs) ETL
data cube, Mining spatial association, Multimed a data
Spatial data mining, Spatial multimedia data, Mining ssociation in multi
search in
mining Similarity
data, An introduction to text mining natural
language processing and informanation
extraction Web mining (Web cortent mining web structure mining, Web 1a
usage
mining)
Laboratory Works:
The laboratory should contain all the features mentioned in a course, which
should inchude data preprocessing and cleaning implementing. classification
clustering association algorithms in any programing language, and data
visualization through data mining tools.
Text Book
1.
Data Mining Concepts
Kamber,
and Techniques, 3rd ed. Jiawei Han, Micheline Metadata

and Jian
Pei. Morgan Kaufmann Series in Data Management Figure: Components of data
warehouse
below:
Systems Morgan Kaufmann Publishers, July 2011. of data warehouse
are explained
Reference Books: of your data
The major four components database serves as the foundation

Central database:
A databases
1. Introduction to Data standard relational
Mining, 2nd ed
Pang-Ning Tan, Michael Steinbach, warehouse. Traditionally,
these have been the need for
Anuj Karpatne, Vipin Kumar Pearson Publisher, 2019. because of Big Data,
in the cloud. But
premise or of RAM,
Mining of Massive Datasets
by Jure Leskovec, Anand Rajaraman, Jeffrey D. running on

performance, and a drastic reduction in the cost

Ullman, 2014. true, real-time


are rapidly gaining in popularity.
in-memory databases from s o u r c e systems
and modified to
Data integration: Data is pulled using a variety of
for rapid analytical consumption
align the information such as ETL (extract,
transform, load) and
data integration approaches bulk-load processing, data
data replication,
ELT as well as real-time
and enrichment services.
transformation, and data quality the source,
Metadata: Metadata is data
about your data. It specifies
features of the datasets in your data warehouse.
usage, values, and other adds context to your data,
and
There is business metadata, which
which describes how to access data including
technical metadata,
structured.
where it resides and how it is
with
tools: Access tools allow users to interact
Data warehouse access
of access tools include:
the data in your data warehouse. Examples
query and reporting tools, application development tools, data mining
tools, and OLAP tools.
Semeserond Proctice
Set
TUSoutien of CST Date Werehousing and Date Mining .. 135
4A Ce
Diffevent cuhe ation (precomputation)
materializatio

includes: Full Given the objects P23)


limitation of Apriori algorithm.K-means algorithm (K 2
Shell cue
cube, Write t h e l i m
P4(60,55), P5(70,80), apply
=

a
Osdovke
and
R l ohe In order to ensure fast OLAP, it is sometimes c ber P2(4,5), PI(10,40),.

P(4efinal
show the final clusters after
2 iterations. Assume P1 and P3 as initial
2+8]
all
(i.e., the cells of all
the full cube of the c l u s t e r c e n t r o i d s .

precompute
ven data
This, however
cube).
is exponential
dimensions
to cuboids
n fo limitations
The Huge number of Apriori
of candidates:
algorithm are:

The candidate generation is the inherent

dimensions That is,


a data cube
ot n

consider concoontains 2
amber ofa A n s :

Algorithms,
cOst of the Apriori It is costly to handle a huge number of
no matter what implementation

cuboids
it we candidates
more cuboids
There are even
In addidon, the size of each cuboid erarchid technique is applied. 1-itemsets, the Apriori algorithm
ch dimensian. deperds 104 large
example, if there
a r e
1hus, precomputation of th ds on 2-itemsets. Moreover for
of its dimensions. on set. For than 10"
candidate

cube canthe
ality to generate
more
is approximately
and often excessive amounts of memorv will need more than 210 which
mquire huge 100-itemsets,
it must generate
those cuboid cells
lonbengcubetcontains only whose
measures candidates in total. mine large data sets for
1030 database so, to
egate ar iceberg
emirimum
condition The
support or a lower bound on average, min orimax.
satisfies
aggregate condition could Multiple
scans
not a good
of transaction
choice.
t is be this algorithm is large number
for creating Fx
a
icebeng cube because it contains only some oftthe cells of the full alled an long patterns scanned to check Ck k-itemset.
Database is not c o n t a i n any
When they do
The pupose of the
Iceberg-cube ube like will be scanned
even
the tip af an iceberg is to
be required identify and
of t r a n s a c t i o n s
annpurte onhy thase values that will most likely Numerical: K-means algorithm

port queries The ageregate condition specifies which csh ecision Given,
e nearinghul
and should therefore be stored. This is one
solution tothe
are Instance
P1
oblem ofaomputing versus storing data cubes
40
Closed cube: k consists of anly closed cells. A cell that has no
descendant P3
10
oell than it is dosed cell 55
P4 60
Shell cube: Another strategy for 80
partial materialization
pre is to P5
compute only portion and fragments of the cube shell created (K) =2.
involving smal no. of dimensions such as 3 to 5), based on the (cuboids
to be
Number of clusters P1 =
(2, 3)
of interest. For cuboids Centroid for first (C1) cluster
=

example, shell fragment cube ABC contains 7 cuboids: Centroid for second
cluster (C2)
=
P3 (10, 40)
=

A B,C AB, AC BC, ABC).


Iteration 1: distance measure as:

all Now calculating similarity by


using Euclidean
0-Dapex) d(C1, P2) =y4-2)2+(5- 3)2 2.828
35.511
d(C2, P2)
=
4 10)+ (5 40)2
Here, d(C1, P2) d(C2, P2)
<

to C1.
So, data point P2 belongs
(55 3)2 77.897
=

d(C1, P4) =V(60 2)2+ -

1-D cuboids 40)2 52.202


d(C2, P4) =V(60 10)2 (55
Here, d(C1, P4) d(C2, P4)
>

to C2.
So, data point P4 belongs
d(C1, P5) =V(70-2)2+ (80 3)2=102.728
AB d(C2, P5) =V(70 -10)2 + (80 - 40)2 72.111
BC Here, d(Ci, P5) > d(C2, P5)
2-D cuboids
to C2.
So, data point P5 belongs
The after first iteration is:
resulting cluster
P3, P4, P5
P1, P2
C2
ABC 3D (base) C1
Figureie cubolde
making up of 30 dete
cube with th Figure: Clusters after first iteration
nsions A, B, and C
Practice Sela
136. A Complete TU
Soluion of CSIT Semester and Data Warehousing and Data Mining 137

Iteration 2
cluster: aining dataset
to construct the Naíve Bayes classifier is as shown
centroid for each The
given
Now, calculating A n s :

intablebelow.
Attrib2 Attrib3 Class
Attrib1
cluster (C1) Tid No
Centroid forfirst Yes Large 125K
100K No

Centroid for swnd cluster (C) 3 +70 4D 4667 No


No Medium
Small 70K No
120K No
Now, again calculating similarity:
,583 Yes
No
Medium

Large 95K Yes


(3-4)2=1414 60K No
d(C, ) =V2-3)3+ b
No Medium
220K No
d(C2Pl)=y2-46.6672+(3-58.333) =71.112 Yes Large
Yes
Here, d(C1, PI) < d(C2, P) No Small 85K
Pl belongs to C1. 75K No
So, data point No Medium
d(C, P2) =4-3+(5-42 1414 1.414
= =

No Small 90K Yes


10
d(C2, P2)=V4-46.667)+ (5-58.333)2 68.300 classify are:
=

The new data tupie to be Atrib3 Class


Here d(C1, P2) < d(C2, P2) Attrib1 Tid Attrib2
So, data point P2 belongs to C1. Small 55K
Xi1 11 No
Yes Medium 80K
d(C, P3)=V10-3j+ (40-4) =
36.674
XI2
12
110K
d(C2 P) =(10-46.667)2 +(40-58.333)? = 40.995
X13 13 Yes Large
Small 95K
Here, d(C1, P3) < d(C2, P3) X14 14 No
So, data point P3 belongs to C1 15 No Large 67K
X15 classes Fail and Pass are present.
d(C1, P4)= V60-3)+(55-4? =76,485 Here, given training data set two
in the
of each class Ci as: P(Ci)= | Ci, D|/|D|, where
d(2 P4)=(60-46.667)2 +(55 -58.333)? = 13.743 Now, Calculating Probability
Ci in D.
Here, d(C1, P4) > d(C2, P4) Ci, D| is the number of training tuples of class
P(Class Yes) 3/10 =0.3
=

So, data point P4 belongs to C2


P(Class No) 7/10 0.7
= =

d(C1, P5)=V70-3+(80-4)2 =101.316


Compute P(XK |Ci) for each class:
d(C2,P5)-70-46.667)+ (80 -58.333)2 =
31.842 Compute P[XIC)for each class:
Here, d(C1, P5)> d(C2, P5) Compute P(XxJC) for each class:
PAtrib1 No |Class Yes) 3/3 =1 = =

So, data point P5 belongs to C2 Yes) 1x0.67x1= 0.67


The resuling cluster after P(Attrib1 No |Class No) 4/7 0.570.67
=
PIX11Class = =

second iteration is: X P(Atrib2 Small Class Yes) 1/7


= 2/3 = =

0.57x0.14x0.43
P(X11 Class No) =
0.14
PAttrib2 Small Class No)
= = =

Pi,P2,P3 P4, P5 PAtrib3-<100K [Class Yes) 3/3 =1 = =


0.03
C1 PAtrib3-<100K" |Class =No)= 3/7=0.43
C2
P(Atrib1 Yes (Class Yes) =0/3 0
=

P(Atrib1 Yes |Class =No) 3/7 0.43


=

P(X12IClass Yes) 0 =

Figure: Clusters after second iteration P(Atrib2 Medium (Class Yes) 0/3 0
= =

Consider the Xa
Tid
following training data set. P(Attrib2 Medium |Class No)= 4/7 =
0.57
P(X12 Class =
No) 0.43x0.57x043
=
=0.11
Attib Attrib
Atrb Class Now Classify the date Tid (10 P(Attrib3 "<100K" |Class Yes) 3/3 =1 = =

123 Attrib Attrib Atrib Clas5 P(Attrib3= <100K" |Class No) 3/7= 0.43 = =

1YesLarge 125K
No
2 No Medium |100K No 12 3 1 JNo Small 55K
P(Attrib1 Yes Class Yes) =0/3 0
P(Atrib1 Yas |Class No) 3/7 0.43 = =
=

=
0
PX13|Class= Yes) =

Smal 70K No 12 Yes Medium 8OK PAtrib2- Large |Class Yes) 1/3 =0.33 = =

4 Yes Medium 13 Yes Large 110K P(Atrib2 Large |Class =No) =


2/7 0.29
5 No 120KNo 0/3 = 0
PIX13/Class= No) =0.430.290.57-0.07|
Large 95 14 No Small 95K P(Atrib3 2100K"|Class =
Yes) =

6No Medium 60K Yes


No 15 No Large 67K P(Atrib3="2100K Class = No) =4/7=0.57
7 Yes|Large 1 No |Class Yes) = 3/3 =1

8 No Smal 220K No
P(Atrib1 No |Class No) 4/7 0.57 = = =

P(X14/Class Yes) 1x0.67x1= 0.67


9 INo Medium 85K
= =

Yes PIAttrib2- Small Class = Yes) =2/3 =0.67


10 No 75KNo 4PAttrib2 = Small Class = No) = 1/7 0.14
Smal 90K es P(X14 Class No)
= = 0.57x0.14x0.43=0.03
PIAtrib3-'<100K" |Class=Yes) 3/3= 1
JP(Atrib3=100K"|Class=No)=3/7=0.43
Data Werehousing and Date Mining ..139
Complee TU Solbtien el
CSIT 7 Semecte and Practice Set
138 A
data
in Multimedia
PADT ENODas Yes)=33=1 Association multimedia objects can be mined in image and
47=0.57
PAMD Noas=No): 10=03
POX15|Class Yes)= 10.331 ion
rules involving
can be observed:
At least three categories
PA Lae (Ciees=Yes) 27=029 POX15|Class No) =
databases.
image content.and non-image contentfeatures:
PArhLage (Cas No)
PAttd 0ON (Class
z

= Yes)= 33=1 0.07 0.570.29»0 4. video

A s s o c

like "If at
i a t i o
between
least 50% of the upper part
of the picture is blue, then
A rule this category since it links the
FAd KTOON" Cs=No]:37043 belongs to
to represent sky"
Q conditioned on Xas
of class is likely
Calculate the probubility content to the
keyword sky.
contents that are not
related to spatial
PC-PXC)*P{C) image
image
Class Yes) Associations among contains two blue squares, then
Xa)=PNu|Clas=Yes) *P{
=
=
07
Clas Ys relationships: A
rule like "fa picture
belongs to this category
(Maimum)
P{Class No) 0.03 x0.7x =
02 likely to
circle as
contain one red well
PClass NoXu)= PXu|Cass=No)
=
x0
O2 it is image contents.
associations are all regarding
P{Class Yes) 0 since the relationships: A
P(Clas Yes|Xu) =PX:|dass= Yes)
* = =
0 contents related to spatial
No)
=
No) =
0.11l Associations among image between two yellow squares, then it is
P(Cass No X)-P\a|Cass xF{dass x07
red triangle is
rule like "If a underneath" belongs to this category
0077 (Maximum) object is
P{ Cass= Yes) =0 x
ikely a big oval-shaped in the image with spatial relationships.
PClass Yes|Xa)-PMo|Cass=Yes) P{Class associates objects follows
web contentmining are as
No) 0.07 since it
* =

PIClas NoXs) =P»|Class=No)


=
x 07
web usage mining8 and Web Usage
0049(Maximum) Differences between Web Content
PIClass YesXu)=P%u|Clas= Yes)x P(Clas Yes) 0.67 x03
= =
erms
IR View DBView
Semi-structured o Interactivity
0.201 (Maximum)
PIClass No Xu) = P?%u|Cass No) x P{Class No) = 0.03 x 0.7=Do View of data Unstructured

o Structured lo WebsiteasDB o Server logs


P(Class YesXs) =PXs| Class= Yes) P{Class Yes) 0.33 x03
x = =

o Text documents o Hypertext


=0.099 (Maxamum)
Main data documents Browser logs
P(Class-No Xs)=P%s|Class =No) * P{ Class = No) = 0.07 x 07=004
o Hypertext documents o Machineleaming
Machine Leaming Proprietary
Method o Statistical
Therefore, the Natve Bayes classifier classify the new data tuple are: Statstical (ndiuding NLP) algoithm
O Association rules o AssociationRules
Tid Atrib1 Attrib2 Attrib3 Class o Relational Table
|No Small 55K
Representation o Bag ofwords, n-gram
o Edged labeled graph
tems
Yes Relational o Graph
Xz Yes Medium 80K No o Phrases, conoeps, oronitologyo
Yes Large 110K No o Relational o Site construction
o Finding frequent
| No Small 95K Yes Application o Categorization substructures o Adaptation and
Categories Clustering
No |Large 67K Yes
o Finding Extract
rules o Web site schema management
Section B discovery
lo FindingPattems in text 51
Attempt any EICHT questions in social network Explain.
How trust and distrust propagate
85-4 .
Social Network
List any two challenge of multimedia mining. Differentiate between web Ans: Trust Propagation in estimate the information is to
usage mining and web content mining. A natural approach to quality of a piece of
users. But this approach
suffers from the
of
Ans: Some challenges/issues in multimedia data mining contains content-based aggregate the opinions many it is easy for a
disinformation as the network at large:
same concerns around
retrieval,similarity search, dimensional analysis, classification, prediction a
user or coalition of users to adopt many
personas and together express
analysis and mining associations in multimedia data. Among them two are Instead, we wish ground
to our conclusions
explainedbelow large number of biased opinions.been built and maintained over time, much as
in trust relationships that have
Similarity Search in Multimedia data more likely to believe
Since, similaities can be searched either on the data individuals do in the real world. A user is much
than from a stranger. And
content of multimedia data. For description or the data statements from a trusted acquaintance
beliefs of her
main families of multimedia
similarity searching in multimedia data, two recursively, since a trusted acquaintance will also trust the
indexing and retrieval systems considered
are friends, trusts may propagate (with appropriate discounting) through the
Description-based retrieval systems: The system which build indics relationship network.
and períorm object retrieval based An approach centered on relationships of trust provides wo primary
on image
keywords, captions, size, and time of creation; and descriptions, such a
benefits. First, a user wishing to assess a large number of reviews,
Content-based retrieval systems: The from the
based on the system which support ieval judgments, or other pieces of information on the web will benefit
image content, such as color ability of a network of trust to present a view of the data tailored to the
image topology, and the histogram, texture, parte And
locations within the shape of objects and their layouts individual user, and mediated through the sources trusted by the user.

image. a second, users who are globally well-trusted may command greater influence
A Complete TU Solution
of CSIT7 Semester ond Practice Sete Data Warehousing and Deta Mining.. 141
140.. interactive access to formation. Since OLAPs9eTveTS
and serves. Such aa syster (ast, consistent, and
goods

encmags
d higher prices tor nultidimensional view of data, we will discuss OLAP operations in
and
higherdin atn
individuals to act
trustworthy
in a

constructs of
the we
manner,

the web. Indeed, social


lacing positive
plac
cial pressUTe om
work the
baerl on
maltidinerwlorul data.
| dar Here is the list ofOLAP operations:
Drill-down
evolving sxial this
facets of th
o n o m i c s have
considerad a variety
of
Network
general subject, Roll-up
Stice and dice
Pivot (rotate)
Distrust Proragation in Social which are to be performed on
operations
trust is
commonly OLAP
the
The "conditional transitivity" of scider
figure
data. The
data cubes for sales of a shop. The
shows
premiss that alled
consttutes the foundation and pivotal
in literature has been achieu ed as
upon nanda
rust metrics dimensional
ntains the
dimensions, location,
and time and item, where the

no consensus it to city values, time is aggregated with


regard
upon. However, with
transitivitv and the decay rate of trust. Mar approac
come tion is
aggregated
item is aggregatedrespect to item types.
with
the degree of and an
recommendation trust and
between recommen o quarters,
espectto time, product and location
theretore explicitly distinguish
the ansitive fraction
fraction of
transihveof Table: 3Dview ofsales data accordingto Location=
Location
trust inorder to keep apart trust from Table Location=
Hence, in these
works, only the ultimate
nate edge withi
Locatlon
"Kawasoti" Dhangadi Mahendranagar
nontransitive one.
Pokhara
the gto the trust target, eds to be
rect, while Product
trust chain. ie., one
recommendatons. For the Appleseod Product Product
supposed to be d
rust metri Product SSDTV PC AP SSD
others are
PCAP SSD TV PC AP
Rinte TV PCAP SSD TV 968 38 872 818 746 43 591 605 825 14 400
this distinction is made through the introductior of the global

factor d. However, the


conditional
The case of double
nsitivity property
negation
of trust
thro. does
spreadingng ot 854 882 89 623 1087
O7 943 890 64 698 1130|1024 41 925 894
769 52 682 680 952 31
1023 30
5121
501
equaly extend to distrust. considered.
Now ough distrus 45 1002 940 795 58 728 812 1038 38 580
03 1032 924 59 789 1034 1048 54
propagation has already
been suppOse, for
instand e, that 978 864 59 784 927
Cistrusts b, which trasts c Supposing distrust to propagate O41129 92 63 870 1142|1091 984
network, we come to make the following
may
inference: through the Location(Cities) Pokhara 854 882 89 623

distrustla, b} n trustb,c) |=distrustfa, c)


This imference is mare than questionable, tor a penalizes c simply for 872
or Kawasoti 38
trusted bv an agent that a distrusts. Obviously, this assumption is nof. being 1087 968

does not reflet expected rea-world behavior. We assume that distrust does and
allow to make direct inferenes of any kind. This conservat net Dhangadi 818 746 43 591 698

us stay on the "safe" side and is in perfect accordance with.


assumption makes 789
Mahendranagar 925
6. Why data preprocessing is mandatory? Justify.
Ans: Any type of data analysis, data science or Al development requires s 682
o 14 400
tvpe of data preprocessing to provide reliable, preciSe and robust Q1 605 825 1002 870
results or
enterprise applications
Real-world data is messy and is often created, processed and 728
stored by a 680 952 31 512 984
variety of humans, business processes and applications. As a result, a data Q2
set may be missing individual felds, contain manual
input errors, or
duplicate data or different names to describe the same thing. Humanshave
784

can 812 1023 30 501


often identifhy and rectihy these
problems in the data they use in the line of
business, but data used to train machine
algorithms needs to be automatically preprocessed.learning or deep learning
04 927 1038 38 580
Machine leaming and deep
learning
presented in a format that highlights thealgorithms
work best when data is
relevant aspects required to solve a TV PC AP SSD
problem Feature engineering
transformation, data reduction,practices
that involve data
feature selection
wrangling, data Product (types)
restructure raw data into a form and feature scaling heP Figure: Multidimensional Data Model (3D data cube of sales data)
suited for particular
Thus can
significantly reduce the types of algorithms
a new
machine learning or Al processing power and time required to train Roll-Up
In short, algorithm or run an inference against it.
real-world data is often
The roll-up operation (also known as drill-up or aggregation operation) performs
Certain behaviors or incomplete, inconsistent, and/or lackig
trends, and is
aggregation on a data cube, by climbing up concept hierarchies, i.e., dinension
reduction. Roll-up is like zooming-out on the data cubes. Figure shows the result
preprocessing is a proven method likely of
to contain
many erors. Data of roll-up operations performed on the dimension location. The hierarchy for the
preprocessing is mandatory. resolving such issues so, data
7 Describe any five location is defined as the Order Street, city, province, or state, country. The roll-
Ans Online types of OLAP up operation aggregates the data by ascending the location hierarchy from the
Analytical operations,
model It allows Prooesing Server (OLAP) is based on the nultidimensional data level of the city to the level of province. When a
roll-up
is performed by
managers, and analysts to get an dimensions reduction, one or more dimensions are removed from the cube. For
insight of the formation
TU Solution of CSIT Semesrer and Proctice Set.

142A Complete hvo dimer Data


consider a sales
data cube havng
the time d i ons Warehousing and Date Mining... 143
example,
be pertormed by
remóving
relatively tha imensions,locationand oerformed by climbing up a concept hierarchy for the dimensiorn
Koll-up may
gEregation of
the total sales
by
illustrates
localion,
h o w roi-up works wh
b
he
ocati
appearing .
locatsales
ion and by t Roll-up is nitially the concept hierarciy was "street <
jocationOn rolling up, the data is agTegated by ascending the location
city < province

rolled-up from ocat(Provinc


The following diagram

iom
cities to provin
Gandaki 1941 185
127
data a
country". On
rarchyfrom thei level of city to the level of province

prilldown operation (also called roll-down) is the reverse operation of


1495/
Sudurpashchip

.Drill-down is like zooming-in on data cube. It navigates from


the less
record to more tailed data. Drill-down can be performed by either
1423 1571 57 detailed a concept hierarchy for a dimension or addin additional
Q1 991 stepping down
how Drill-down works when
dimensions. The following diagram illustrates
to month:
1574 1574 172 83
1194 drill-down
cation(Cities
on time from quarters

1752|1752 1818 88 1229 Pokhar 854


Kawaso 1087 968
19051902 1902 97 1364 Dhangad818 43 591
TV PC AP Mahendranag 925
SSD
Product (types) 14 400
825
605 1002

ro
Rol-up on locationh 02 680 952 31 512
(from cities to
provinces) (Q3812|1023 30 501

o927 1038 38 580 drill-down on ime


(from quarters to
TV PC
Product AP
(types) SSD
months)
(Cities)
Pokhara854/882 89
623 Location(Cities) Pokhar
Kawasot/1087 96838872 Kawasot
Dhangad
Dhangad818746/ 43 591 698
Mahendranag
Mahendranag
925789 Jan 150
Feo
Q605 s25 14 400
1002870
Mar 150

May
680 952 31 512 728 Jun
Jul
AUg
Sep
B12 1023 30 501 Oct
NOV
Dec

04 927 1038 38 TV PCAP SSD


Product (types)
TV Figure: Illustration of drill-down operation on sales data
PC AP SSD is performed by stepping down a concept hierarchy for the
Product (types) Drill-down
dimension time. Initially the concept
hierarchy was "day < month <quarter
year." On drilling down, the time dimension is descended from the level of
Figure: llustration of
roll-up operations on sales data quarter to the level of month.
Practice Sets
144A Complee TUSolution of CSIT 7 Semester and Data Warehousing and Date Mining.. 145

Slice
The selects orne particular dimension from
slice operation
Location(Cities) Pokhara 854 882 89 623

that en
the following diagram cube
provides a new sub-cube. Consider am
shows hoand
38 872
Kawasoti/1087 968
slice works when sliced for first quarter i.e, Q1.

Location(Cities) Pokbara 854 882 89 Dhangadi818 746


591 698
623
Mahendranagar 9257899
Kawasoti1087 968 38
872
Dhangad818 46 43 591
698 Q 605 825 14 400
6821002870
Mahendranagar 728
925 789 680 952 31 512 984

Q2
14 400 682 784
Q1 605 825 3O 501
1002870 Q3 812 1023

728
Q2 680 952 31 512 984 1038 38 580
Q4 927

03 812 1023 30 501


Y84 TV PC AP SSD
Product (types)

o927 1058 38 580

TV PC AP SSD or
Dice for (location "Mahendranagar"
=

Product (types) o r "Q2")


"Dhangadi" and (time "Q1"
=

and (product = "TV" or "PC")

Dice for (location = "Mahendranagar" or


"Dhangadi and (time = "Q1" or a2")
and (product = "TV" or "PC")
Location(Cities)
Location(Citie
Dhangad818, 746

Mahendranagar
Dhangad818 746
Mahendranagar Q1 605 825 769

Q 605 825
769 680 952

2 680 952 TV PC
Product (types)
TV PC
Product (types) Figure: Illustration of dice operation on sales data

Figure: llustration of slice The dice operation on the cube based on the following selection criteria
operation
Here, Slice is performed for the dimension
on sales dat time involved three dimensions are
"time" using the criterio
Q.It
Dice
will form a new sub-cube
by selecting one or more dimerns (location "Mahendranagar" or "Dhangadi") and
Dce selects two more dimensions from a given cube and
or a
new (time "Q1" or "Q2") and

following diagram that shows the diceprov


sub-cube. Consider the
ope* (item" TV"or "PC").
Solution of CSIT 7 Semester
and Practice Sets Data Warehousing and Data Mining.. 147
46A Complete TU

Pivot as It rotatse,
rolation.
is also k n o w n below
The pivot operation alternative
esentation
the
of da data axe A n s
Minimum s u p p o r t = 3
:
G i v e n

itemset of the size of


1 i.e., Ci is as
order to provide an
1: Thecandidate Support Count Remarkss
in
showS the pivot operation beh Cone: Mini
following diagram
product dimension.
that
between location I t e r a o n

Item
se
A Infrequent_
854 882 89
Pokhara 623

Infrequent
1087 968 38 F}
Kawasoti 872 Infrequent
G Infrequent
(H Infrequent
818 746 43 591 Infrequent
Dhangadi
1.e., Ll is as below
(K}
of the size of
c a n d i d a t e list Remarks
pruning CL, the Support Count
Mahendranaga 605 825 14 400 After
Itemset 3

A}
TV PC AP
SSD B
Product (types)

F the size of 2
i.e., C2 is a s below
candidate itemset of Remarks
Pivot Iteration 2: The Support Count
Infrequent
Itemset
{A,B Infrequent
{A, D Infrequent
A, E
TV 854 1087 818 605 {A, F
B, D)
Infrequent
E
B,
PC 882 968 746 825 {D,E
Infrequent
{D,F
as below
E, F_ candidate list of the
size of 2 i.e., L2 is
the Remarks
AP 89 38 43 14 After pruning C2, Support Count
Item set
A, D
B, D
SSD 623 872 591 400 B, E
D, EJ
(D,F_ i.e., C3 is as below
Pokhara Kawasoti Dhangadi Mahendranagar itemset of thesize of 3
Iteration 2: Thecandidate Support Count
Remarks
Location (Cities) Item set
3
Figure: llustration of pivot operotion on sales data B,D, E) L3 is as below
Given the following data set, find the frequent itemset using priorn the size of 3 i.e.,
C3, the candidate list of
8.
RemarksS
After pruning Support Count
algorithm with minimum support 3. Itemset
JA, B, C, D, E, F_ B,D, E we cannot
further generate
candidate itemsets
2
B, C, D, E, F, G_ Form this frequent itemset
L3
itemset is L3 =
{B, D, E}
1A, D, E, H_ we stop here
and o u r final frequent
so
A, D, F, LJ
B, D, E, K_
148A Complete TU Selution of CSIT 7
Semester and Prectice Sets Dato Warehousing and Date Mining. 149
9 Illustrate the hierarchical clustering with an example. all data
Ans: Hierarchical method cluster is cluster containingmostgiveneimilar?points (1, 2, 3, 4, 5)
creates a hierarchical decomposition of top-level
ide
to decide
which point is As you noted, we
data points using some criterion such as
proximity measi the iven
tho
given *t we
have

points. So, just for example, for point 1


sures. Now, average distance

whiHicehrarics tidca
decomposition of data points results in tree-l
like structure,
called a dendrogram. A.d/L3+dl 4+d1.5)_(4+4+5+).
w ec o m p u t e

distances for all points are:


Similarly, the average distances
= 5.00
l average
For data point distances
= 3.50
2 average
For data point distances
=
5.00
3 average
For data point distances
= 3.75
For data point 4 averagedistances 4.75
=

5 average
dissimilar, we pick one of
these
For data point for the most
1 and 3 are tied 4, 5} and Cluster 2 =

TXX. points have Clusterl {2, 3, =


Since
arbitrarily. Let us use point 1. We
Figure: Mierarchical clustering cluster 2 than the other
1 that are closer to
On the basis of how the hierarchical decomposition is to any points
move
in cluster 1 we compute
formed, thera
there are two Now we want
cluster 1 into cluster
2. So for each point x
are
.

methods of hierarchical approach. They points in for point 2 we compute


Agglomerative Approach: This approach starts with each obiet 6. cluster 1-x) and d(x, cluster 2). For example,
dx, 10
a
separate group. It keeps on merging the bjects or formin d(2.3)+d24)+d25))_ d2 1)=4
all of groups
close to one another. It keeps on doing so until all
the
that are 3
cluster 1, all of the differences
are:

merged into one or until the termination condition holds. groups Similarly, we can calculate for other point in
Divisive Approach: This approach starts with all of the
same luster. In the continuous iteration, a cluster
objects in th For point3-
is
smaller clusters. It is down until each object in one split up in
cluster or he and
tenination condition holds For point 4-
This method is rigid, ie., once a merging or
splitting is done, it can never h For point 5 -3.
=

cluster 2. We now have cluster


1 =

undone. Typical examples of algorithms based on hierarchical so we move it to


approach are Only point 3 is positive We check any additional points should be
Diana, Agnes, BIRCH, CAMELEON, etc. 2, 4, 5 and cluster 2 {1, 3). cluster if d(x, cluster 2) for each point
Example Perform the divisive dlustering to create clusters of the followine moved. Again, we compute d(x, 1-x) -

data by using DIANA algorithm. in cluster 1. The differences are:


For point 2 = -1.0

For point 2=-2.5


For point 2= - 4.5

All are negative that is the remaining points


in cluster 1 are closer to cluster 1
this division and we have the two clusters (2, 4,
than to cluster 2, so we stop
1 5 and 1,3).
8 0 diameter that is the
Solution: Start with all points in a For the next step, we choose the cluster with the largest
single cluster. At each step, split the cluster with the greatest distance between two points in the cluster.
largest cluster (the one with the largest diameter) into two pieces. To divide Diameter (1,3|) = d(1, 3) =4
the data, start
by finding the single point which is the most dissimilar to the Diameter ((2, 4,5|) max (d(2, 4), d(2, 5), d(4, 5) max (3, 3, 2) 3
=
= =

rest of thecluster. Then


successively move points to the new cluster it they
are more similar to the new So, cluster [1,3) has the largest dia eter. Trivially, this will be split into (1)
cluster than the old one. and (3). So now we have clusters (2, 4,5, (1} and (3).
Forclustering given data points a method for computing the distance
point to a group of points is required. The method used in DIANAfrom
At the next step, we must split the cluster (2, 4, 5. As above, for each point
15 e we will find the point with the largest average distance to the rest of the
average of all the distances from the point to the
Throughoutthe process, we need the distance matrix. points in the
8r0u points. For example, we compute,

Point 2: (d(2.4)+2d2.5).0*)3
5 5 so point 2 is the most
The other averages are point 45 and point 5:

dissimilar. Wesplit |2, 4,5} into clusterl1= (4, 5) and cluster12= (2). We need
to check if sóme additional should
points be moved into the set cluster12.
and Data Mining 151
Data Warehousing
...

150 A Complete TU Solution of CSIT 7 Semesterand Practice Setss not use all cells
and precision does
d(4.5)-d(4, 2) 2-3-1 a
model
and using recall
usir
false negatives
Evaluating with true positives
Recall deals
d5,4)-d(5,2) =2-3 -1 Howeve
o ft h econtusion.
rix.
and false positives.
lse positives. Thus, using this
be moved. We split (2.4 true positives into
So, no additional points should nto 2) aand deals with
true negatives
are n e v e r
taken
full data set (1, (2}, 13), 14. where the
giving us the partition of the
a n dprecision

5). Fi used in situations,


measures,

should only
be
the last cluster to get (1) {2] (3) 14/ 15) Thus, thefull hierarchly, we
is
P a i o
r fp e r f o r n

recall However, precision


Ks
and ay a rrole.
does not play
like this Thus
precis
of the class 2
lentification
of o u r model.
the
correctness

affirm

when we
want to
DBSCAN
works? [2+3]
useful How
k-means? version of the
mini batch
ore
more.
modified
the
concept algorithm is time in
what is the k-means
clustering the computation

mini
batch
batc min-batches
to reduce of the clustering.
The It uses the result
optimize
k.means algorithm. to
inputs which
Ans:
attempts
addition, it
mini-batches as
In is takes
datasets.
batch batch k-means
k-means
4 large the mini The mini
S achieve this, randomly. datasets.
used for the large
To dataset,
the whole
Figure: Clusers obtained from DINA are
subsets of k-means and
it is normally
10. Discuss about overfitting and underfitting. How precision and faster than
considered
used to evaluate classifier? DBSCAN AJgorithm

Ans: When a model perfoms very wel tor training data but has 243 Input: n objects
set containing
performance with test data (new data), it is knoWn as overfittine poor D: a data and
case, the machine learming model learns the details and noise in tho this e:The radius
parameter,
density
threshold

data such that it negatively affects the pertformance of the model on trainin Minpts: the
neighborhood

Overfitting can happen due to low bias and high variance.


t data tesk A set of
density-based
clusters

Output
the
When a model has not learmed pattems in the
training data well nd Method: unvisited;
unable to generalize well on the new data, it is known as underfittino is 1 Mark
all objects as
unvisited
An object is
2. Do until
no
underfit model has poor performance on the training data and will result
unreliable predictions. Underfitting occurs due to high bias and low unvisited object p;
Randomly select
an

variance a.
Mark p as visited;
Actual Class1 Actual Class 2 b. of has at least Minpts
objects
If the e-neighborhood p to C
cluster C, and add p
c.
Predicted TP Ture Positive
TP FP i. Create a new e-neighborhood of p;
in the
i. Let N be the set of objects
Class1 TN= True Negative
Predicted
FN TN FP False Positive ii. each For p' in N point
Class2 FN False Negative
Ifp' is unvisited
Figure: Confusion Matrix
Precision: Precision refers to the measure of exactness that means mark p' as visited;
what has at least
percentage of test data tuples labeled as classl category are actually If the e-neighborhood of p'
Based on the classification such Minpts points,
report given in the form of confusion matrix it is Add those points to N;
calculated as
a member of any cluster,
add
Ifp' is not yet
PrecisionTP+TPFP p' to C;
Recal: Recall refers to the true
positive rete that means the
tupes that are correctly identified. Based on the proportion
0
classl test data iv. Output C;
report given in the form of confusion matrix it is classification d. Else mark p as noise
calculated as
IP
Recall TP+FN 12 How beam search and logic programming is used to mine graph? Explain. [51
Ans: Beam Search
The
precision and recall are useful metrics is A beam search is a heuristic search technique that combines elements of
mbalanced. lf classifier predict class 2 all the intimecasesandwhere99.5%
the recall
the
datataset breadth-first and best-first searches. Like a breadth-first search, the beam
and precision both will be 0. Because there are noget accura search maintains a list of nodes that represent a frontier in the search space.
classifier is not a true posives. 50,
it indications that good classifier. When the precision and recall both are.high Whereas the breadth-first adds all neighbours to the list, the beam search
the classifier is orders the neighbouring nodes according to some heuristic and only keeps
doing very well.
152. A Complete TU
Solvtion of CSIT 7 and Data Mining.. 153
Semester and Prectice Sets Data Warehousing
the n (or k or B) best, where n is the beam size. TRIBHUVAN UNIVERSITY

the ze. This


processing and
storage requirements for the can can
speech recognition, vision, planning, ma search. signifi
and Technology
are

and so on.
So me antapplicar
chine learming graph ly rethug Institution
of Science
TU QUESTIONS-ANSWERS 2078
Beam Seardh Algorithm Full Marks: 60

2
Let beam width = n.
Create two empty lists: OPEN and
mirimg Warehousing
and Data
Mining Pass Marks: 24
Data Time: 3 hours.
3. Start from the initial node
CLOSED. se Title: 410 Semester

(say N) and put it in the C o u r s e

No:
SC

Year/Seventh
5
Repeat the steps 5 to 9 until GOAL node is
fOPEN list is empty, then EXIT the reached.
'orderode ordered OPEN C o u r s e

Level:B S CSITT Fourth Section A


[2x10-20
6. Select the first/top node loop returning 'False over
ROLAP. Define
(N) in the OPEN of
MOLAP

CLOSED list. Also capture the information of list and


How beam
q u e s t i o n s .

IWO disadvantage not?


and balanced or
w h e t h e r it is
any
one advantage
7. IFN is a GOAL node, then move the the parent no to the
Afempt
Write down any
how do you
check
an example.
12+4+41
node to the network and Illustrate with o n e major

solution can be CLOSEDe


the loop retuming True'. The siened complexity? R O L A P and
the space than handles
the path. found by backtradnd eit search
reduces
of M O L A P
is fast response
scalable than
ROLAP as it

8. Else if, expand node N to


generate the 'immediate' next nodes rackimg AnS: One
advantage

disadvantages
MOLAP is
of
that it is
less

(e, ez . , enl
of edges E
=

node N and add all those to the Ii. of data.


OPEN list then sort inked to a set
amount

only a
limited
nm/ and is a
OPEN list by heuristic function. all nodes N
=
(n, nz ., network/graph
eleme ot Given a set of
nodes, e
=
(n, n). A signed E, and a
9. Nodes to be of a set of edges
expanded should not be greater than beam where each edge is a pair set of nodes N, there is
consisting of a network,
and update the OPEN list by best n successors. width n. Pm. <N, E, S> In the signed
Inductive Logic Programming (ILP)keeping Prune triple G which is a function S: E {+}. indicates friendship
mapping S between 2 nodes either t o r The+
sign
Inductive logic programming (LP) is between 2 nodes.
traditionally concerned with alwaysa sign the "sign
indicates enmity
separated into two
logical programs (as Prolog code). ILPdetectina
and be
patterns in data in form of between 2 nodes only if
nodes can
the
if and two nodes of
learning that uses first-order logic to is the
balanced
subfield of machine A signed graph
is link joins
such that each positive different subsets.
exclusive subsets
hypotheses and data. Because first-order
logic is expressive and declarative represent mutually
negative link joins
nodes from
friend"
inductive logic subset and each of my friend is my
programming specifically targets problems involvine
same
implies that "the friend
the sign of the
structured data and background Balance theory generally friend". Let sij represent
knowledge. Inductive logic is my -1 denote a
problems in machine leaming,programming and "the enemy of my
tackles a wide variety of enemy 1 and =
=

where sy
and the node jh Balance
classification, regression, clustering, and reinforcertent including link between the ih node
link are observed
between ui and u;.

"upgrades" existing propositional machine


of learning, often using positive link and a negative 1 and sa 1,
balanced if (1) s
=
=

triad (u, M, ue) is


ILP can be used to find patterns and hidden learning systems.
that a
theorysuggests -1 and sa =-1, then s
=1.
contrast to traditional regularities in relational data. In then sa 1; or (2) s
=
=

pattern mining assuming that the data is given in form


of attribute-value based on a
single relational table, relational data minings
able to analyze data in multi-relational
form. That means that examples can
possess a variable number of attributes, which can include other
properties. Within ILP these examples or objects can be describedobjects
with

programs. Inductive logic programming systems have been applied to


as Prolog

B:()
- C:( D: -77)
important applications in bio- and chemo-informatics, natural language A:()
and C
Triads A
processing sequence, graph mining and web mining. Figure: An illustration of balance theory. imbalanced.
The first motivation and most
important motivation for are balanced; while triads B and D are
using inductive loge Beam Search algorithm depends on the
programming is that it overcomes the representational limitations o The space complexity of the
attribute-value learning systems. Such systems following things, such as
representation where the instances correspond to
employ a
table-Das Beam Search's memory consumption is its most desirable trait.
tne
rows in the table,
attributes to columns, and Since the algorithm only stores nodes at each level in the search tree.
for each instance, a single value is assigneu
each of the attributes. This is The worst-case space complexity = O(Bxm) where, B is the beam width,
sometimes called the single-table single-tupe
assumption. and mis the maximum depth of any path in the search tree.
This linear memory consumption allows Beam Search to probe very deeply
into large search spaces and potentially find solutions that other algorithms
cannot reach. Example: Tracing of beam search algorithm
Mining
.

and Data
Warehousing

Date Generate
the
154
information?

where
A
.

Complete TU Solution of CSIT 7h Semester in


e x t r a c t ng
i n g

using
FP growth,

and Practice Sets is


used
data
d ata
set [2+81
Consider, start node
(N)= a, goal node g beam
hierarchy f o l l o w i n g

= the

CLOSE width (n) 2.


=
Howconcept
pattern
minimum51Upport=3
from

ITEMS

equent
H
D, F,
T I D
A, B, C,
F
A, D, E,
1
C,D,F
B, H
3

41 G, H
4 A, C F
G
5 C, D, E,
I
6 A, C, D, of
d i s c r e t i z a t i o n

defines a
attribute collecting
numeric

reduce
the data
for a given used to attribute
hierarchy can be for the
value
A concept
hierarchies
numeric
Ans: Concept as or senior).
attribute. (such
8
0 the
and replacirng
low-level
concepts
(such as young
middle-aged,

becomes
meaningful
and it
level concepts into it
higher generalization,
a r e organized
age) by detail is lost by such model, data
Step OPEN={ CLOSE 0 Although
m u l t i d i m

c o n t a i n s multiple
e

levels of
n s i o n a l

Remarks In the
to interpret. dimension
1 OPEN= (a) is easier and each
CLOSE { Starting from inita multiple
dimensions,
hierarchies.

node (N) a. abstraction


defined by concept algorithm
2 OPEN={d7, Cs, bo} using FP growth
CLOSE {a) Exploring children o Numerical: Frequent pattern

node a. Given,
3
each item set
=

Minimum support
3 OPEN= {d7, cs} CLOSE = {a} support count for
Prune bo keep Constructing 1-itemsets
and counting
n-2 successors).
best Support Count RemarkS
Itemset
4 OPEN=go, is, hs) CLOSE= {a, c, d
Exploring children
node c and d.
Intrequent

5 OPEN= ig» isl CLOSE (a, c, d Prune hs (keep best|| D


n=2 successors). Infrequent
6 goGOAL Success.
The resultant spanning tree traced Infrequent
by beam search algorithm is H
10 Intrequent
Discarding allinfrequent item sets:
Item set Support Count Remarks
8 A 4
C

D 5
F

() H
3
1S6 A
Compiete TU Solution of
CsIT 7
Sorting frequent Semester and
Proctice Set Data Warehousing and Dato Mining.. 157

Item set 1-itemsets in


descending
Support Count order ot their 2: D, A,
F

support. Transaction

D 5
Remarks count For null

D:1
Now, ordering each C:I

ID itemsets in D based
on frequent
ITEMS 1-itemsets aboue
above:
A,C, D, F, H ORDERED ITEMS D:1
A:1

A, D, F
C,D, A, F, H
3 D, A, F
4
CD, F C, D, F F:T
H
H
A, C, F, H
6 C, A, F, H
C,D,
C,D
A, C,D F:1,
Now C, D, A
drawing FP-tree by using ordered itemsets one
1 For Transaction 1: C, D, A, F, H by one:

null
For Transaction
3: C, D, F
3.

null
C:1

D:1
C:2
D:1

D:2 1

A:1
F:1

F:1
F:1

H:1 H
158. A Coimplele TU Solution of CSIT 7 Semester and Practice Set Warehousing and Data Mining.. 159
Data
4 For Transaction 4: H
Transaction
6: C, D

For
null null

D:1
C:2
D:1 :4

H:1 H:1
D.2 A:1
D:3 A:1

A:1
A:1 F:1
F:1 F:1
A:1 F:1

F1
FT
H:1

5. For Transaction 5: C, A, F, H
7. For Transaction 7: C, D, A

null null

C:3 D:1 5
:1
H:1 H:1
D:2
A:1 A:1
D4

F:1
A:1
Q
Q
F:1
F:1
F:T,

H:1
H:1

H:1 Now, to facilitate tree


traversal, an item
points to its occurrences in the tree via a header table is built so that each item
chain of node-links.
Complete TU
Solution Semester and Practice
of CSIT 7h Semester nnd s

160A Sets
Data Warehousing and Data Mining.. 161

u
MinPts
=
3
2.5and
Gven

C:5 Epsilon(9)
Data pOint
A

A C
F D
H F1
G 8
H distance
DBSCAN we need to first calculate the
To find the clusters by using Distance between data points
is
of given data point.
all pairs to calculate d(B, A).
among
after calculating distance d(A, B) no need data
Now we need to find conditional pattern base and symmetric so,
distance for all pairs of eight given
frequent patterns. For thisConditional FP T Euclidean
each item then generate the We calculate thedistance matrix becomes as shown in table below. Also
can
start with final
points and distance is <= 2.5
our

traverse onlylastthe ite


sorted order that is H, follow node pointers and
nd trave i.e., point whose
find allthe e-neighborhoods of a point
containing H, accumulate all of transtormed prefix paths of refix paths of that item
a conditional pattern base and so on
ot and A CDEFGH
Euclidean
tem set Conditional Pattern Base Conditional FP-Tree Frequent E
DIstance 5.83
Genie 2.83 4.24 5.66 5.83 6.40
H IC. D, A, F1,{C, AF:1}} 0 1.41
4.24 4.47 5.00 4.47
CO.A1.c.01 D:1), (C, A1, c:3), 03),A3
C.F3),D.FS 1.41 0
2.83 1.41 0
1.41 2.83
1.41 2.83 3.16 3.61 3.16
D.A1) 4.24 2.83 1.41 0 1.41 2.00 2.24 2.00
A KIC D2) C1, D:1) C:3), (0:3 C. A3) C, D3 1.41 0 1.00 1.41
5.66 4.24 2.83
D C4 C:4 C, D:4 5.83 4.47 3.162.00 141 1.00 2.83
In this way the frequent patterms are generated by FP-growth 1.00 0 2.24
the given transaction database.
algoit 6.40 5.00 3.61 2.241.00
4.47 3.16 2.00 141 2.83 2.24 0
5.83
3. How do you compare two classifiers? Given the -neighborhoods A,B A,B,C B.C.D C, D,E. D,E,
point A(3, 7, BA
C5, 5), D6, 4), E(7, 3), F(6, 2), G(7, 2), and H(8, 4), find the core poinb al of apoint E,G.H G.H D.E.p,E,F,G G.HH
outliers using DBSCAN. Take Eps = 2.5 and MinPts =3. Remarks Outier Core CoreCore Core Core Core Core
Ans: The McNemar test, introduced From the above calculation and after comparing the e-neighborhoods of a
by Quinn McNemar in 1947, is a m point with MinPts = 3, the core point and outliers are as follows:
parametric statistical test for paired comparisons that can be applid
Core Points = B, C, D, E, F, G and H
compare the performance of two classifiers. Often, McNemar's est s
reterred to as "within-subjects chi-squared test," and it is applied to pa Outlier A
nominal data based on a version of 2x2 confusion matrix Section B
that compaAttempt
predictions of two models to each other (not be confused with theh any EIGHT questions.
When a pattern is said to be [8x5-40]
confusion matrices encountered in machine learning, whicn interesting? List the issues of data mining. [1+4
are Ans: A pattern is
interesting if it is
positive, truepositive, false negative, and true negative counts of casily understood by humans,
model). The layout of the 2x2 confusion matrix suitable for McNemars
valid on new or test data with some
shown in Figure. degree of
potentially useful, and certainty,
Model 2 Model 2
Correct novel.
Wrong A
pattern is also
interesting if it validates
confirm. An interesting pattern hypothesis that the user sought to
a

Data mining is not an represents knowledge.


easy task, as the
available at onealgorithms
and data is not used can get
various
always place. It needs to be
very complex
Data heterogeneous integrated
data sources. These from
c mining factors also create some
systems face a lot of issues.
some of them are: challenges and issues in
today's world
Numerical: DBSCAN algorithm
7 mester and
Semeste

Practice Sets
Solution ofCSIT Data Warehousing and Data Mining. 163
TU
Complete
162A

fining methodologyanduuser interaction issues


Dat reduction strategies

Pertormane isues Data cube agETegation


of databas
of database types
to thediversity Dimensionality reduction
relating
esues Data Mining Issues
Data compression

Numerosity reduction

concept
and hierarchy generation
Discretization to replace raw
Data could also be discretized
, Data Discretization: levels. This step involves the reduction of a
Performance Issues values with interval the range
MiningMethodology

e n d U s e rInteraction
Diverse Data Types number of values of
a continuous attribute by dividing
lssues of attribute intervals.
Sometines, due to time, storage
or memory
Data Sampling to be worked with.
or too complex
Eficienicy and scalability constraints, a dataset is too big
Mrningdiferent
koindsof
ofdata mining algorthms Handing of relatonala Sampling techniques
can be used to
select and work with just a
Knoedgeindatabase

rteradive miningof Paralel, distribuled and complex types of dala subset of the dataset,
that it has approximately
provided
the same

knowledgeat
multple levels of| incremental mining
Mining infomaion fom properties of the original
one.

abstacdon

Incoporation ofbackground
algorithms hetanderoglobalgeneoUsinformationdatabas 6Definespatial mining.
data
with an example.
are the chalienges
What of multimedia
2+3]
systems mining? Describe of data mining techniques to
Data Mining (SDM) is the application
knowledge
Date mining query
languages Ans: Spatial the same mining, with the
functions in data
and ad hac data mning spatial data and follows along data
mining discovers
Presentation and visualzaton
end objective to find patterns in geography. Spatial
from explicit spatial datasets. Spatial data,
ofdate mining results patterns and implicit knowledge in geospatial data
Handing nasy or ncompee data in many cases, refer to geo-space
related data stored
Patlem evaluation raster" formals, or in the form of
repositories. The data can be in "vector" or data
imagery and geo-referenced multimedia. Recently, large geographic
warehouses have been constructed by integrating thematic and geographically
5Definedata discretization. Describe the tasks for data preprocestinn
referenced data from multiple scurces.
Ans Data disctetization is defined as a process of converting continuaue
Some challenges/issues in multimedia data mining contains conteni-based
attribute values into a finite set of intervals and associating with e
interval some specific data value. In other words, data discretizatiom
retrieval, similarity search, dimensional analysis, classification, prediction
analysis and mining associations in multimedia data
values of continuous data into a finie
method of converting attributes
intervals with minimum data loss.
stl Conient-based retrieval and Similarity search: Content-based retrieval in
multimedia is a stimulating problem since multimedia data is required for
Data goes through a series of tasks during preprocessing:
detailed analysis from pixel values. We considered two main families of
Data Cleaning Data is cleansed through processes such as fling
multimedia retrieval systems, ie, similarity search in multimedia data.
missing values or deleting rows with nissing data, smoothin d
Description-based retrieval system creates indices and object retrieval
noisy data, or resolving the inconsistencies in the data. Smouthiy
based on inage descriptions, such as keywords, captions, size, and
noisy data is particularly important for ML datasets, since machie
creation time.
cannot nake use of data they cannot interpret. Data can be cleaned
Content-based retrieval system supports image content retrieval, for
dividing it into equal size segmen: that are thus smoothed (binm
example, colour histogram, texture, shape, objects, and wavelet transform
by iting it to a linear or multiple reyression function (regressin
Use of content-based retrievul
by grouping it into clusters of similar data system: Visual features index images
(clustering) and promote object retrieval based on feature
Data Integration: Data with different representations are pur
desirable in various applications. These
similarity; it is very
and conficts within the data are
resolved. weather prediction, TV
applications include diagnosis,
Data Transformation:
Data is and generalun production and internet search
engines for
normalized pictures and e-commerce.
Notmalization isa process that ensures that no data is redu Multidimensional Analysis: To perform multidimensional
all stored in a single place, and all the ependencies are ogical multimedia databases, multimedia data cubes analysis of large
Data abasesa
constructed similarly to traditional data cubes may be designed and
Reduction: When the volun of data is huge, datstore1 from relational data. A
become slower, multinedia data cube has several dimensions. For
costly to acces and challengingsentation
reduction step aims to prese a reduced
to propery
of the
data n
image or video in bytes; the width and example, the size of the
data warchouse. height of the frames,
dimensions, the date on which image or video was creating two
created or last modified,
er and Practice
164. A Complete rU Selution of CST 7" Semester
and Practice Sets Data Warehousing and Date Mining... 165

image
of the e o r video, sequ
frame (Confide Yes, Studied Yes, Sick
X
= =

durs. be classify is
durat
the ion in seconds,
=

the format type


ng
reterencing the image to
data set two classes Fail and

imensi video,
tuple
Internet domain of pages data the given training Here, in
edge orientation dimension. each class Ci as: P(Ci)=ICi..
colour dimension
and A
for. keywords
multimedia
nmultinywoo esult =?).
ent. Now, Calculating
Probability of

ultimedia li
and measures Ci in D.
of training tuples of class
dimensions

data ike a
additional
have number
D| :is the
s sa r ep r e s e n t . .

can

Classification anddata, suchcuh


texture, and shape. where |Ci,
colour,
and alysis: Classifi
Prediction Analysis: D,
Fail)
=
2/5 = 0 4
Classification
used for mining data
multimedia as P(Result = 0.6

oscientificparticularly
analvsis has been Pass)=3/5

npredi
PResult class:
astrononmy, seismology, and scienific for each
analysis like
classification is an
important method for analysis. Decis
reported image fi Comp
P(Xk|C)
1/2 0.5
=
66.66 Yes
Result
| Result
=
Fail)
=
=

consider the sky image Pass) 2/3


=

datatree
=
PIConfident =

applications. For example, astron Yes | =


0.5
the training set. lt can create PIConfident Fail) 1/2
=

carefully classified as
for models Yes | Result =
66.66
=

and further stellar objects based PIStudied =2/3


Yes | Result Pass)
ecogniziike
=

galaxies, stars on
magnitudes, areas, intensity, image moments and orientation
classification and clustering
properties PIStudied=
PSick No
|Result Fail)
1/2 0.5
33.33
=
=

miningentific aal ining. Pass) 1/3


=

Image data mining scientific data


=

mining. The imaarefully ully PISick =No


|Result
=

image analysis and


large volumes and
need processing
substanttal
image data are
process power connected
as frequentl Compute
for each
PX|C)
class:
0.125
sis techn:such
distributed processing. Hence, many image analysis parallelently in PX|Result= Fail)
=
0.5 x 0.5 x 0.5

data analysis methods could be applied to image data minir techniques and scientificand P(X|Result= Pass)
of
=

0.125 x0.4
0.66
0.05 class C,
x 0.66
conditioned
x 0.33 0.144
on X as: P(G;|X)
=
P(X|C) x
P(C)
Mining Associations in Multimedia: Data Association
Calculate the probabilityP(X|Result Fail) x P(Result Fail)
=
=

rules involv?
=

0.144
multimedia objects have been
mined in and video image P(Result Fail |X) =

Pass)x P(Result
Pass)= =

databases
=

P(X|Result
categories c a n be
observed:
tabases. Three PResult Pass | X ) =

x0.6=0.0864 (Maximum)
=

conditioned o n X is 0.0864
Associations between mage content and non-image contens
of class Pass,
feat is found that the probability dataset.
Associations among image contents that are Here, it in the given training
not relatedres
ated to spatial which is highest among
all classes present
the new data tuple X
=

relationshiups classifier classify


Therefore, the Naive Bayes to class Result
No, Result =?) belongs
Associations among image contents related
to spatial relationch ps
First, an image contains multple objects, each with various feat (Confident= Yes,
Studied Yes, Sick =
=

= Pass. the strategies


colour, shape, texture, keyword, and spatial locations, so that such as the choices for data cube
materialization? Explain
many Po5sible
associations can be made. Secornd, a picture containing multinl 8. What are [2+3]
for cube computation. follows:
objecis is essential in image analysis. Ihe recurrence of
similar objects hr three choices for data cube
materialization and they are as

Ans: There are


not be ignored in association analysis. Third, to find the associations het of the "non-base" cuboids.
No Materialization: Do not pre-compute any
the spatial relationships and tween multidimensional aggregates on the
multimedia images can be used to discouas This to computing expensive
leads
object associations and correlations. With the associations between which can be extremely slow.
multimedia objects, we can treat every image as fly, cuboids. The resulting lattice
a
transaction and find Full materialization: Pre-compute all of the
commonly occurring patterns among different images. is referred to the full cube. This choice typically
of computed cuboids as
7. Consider the following data set. requires hugeamounts of in order to store all of the pre memory space
Confident Studied Sick Result computed cuboids.
No No Fail Partial Materialization: Selectively compute a proper subset of the
No Yes Pass whole set of possible cuboids. Alternatively, we may compute a subset of
Yes Yes Fail the cube, which contains only some user-specified criterion. It should
No Yes No Pass consider three factors:
Yes Yes Yes Pass identify the subset of cuboids to materialize;
Find out whether the object with attribute Confident
Sick No will Fail or
=
Yes, Studied =
Yes, the materialized cuboids during query processing; and
exploit
=
Pass using Bayesian classification. efficienthly update the materialized cuboids during load and refresh.
Ans: The given training dataset to construct the Nalve Bayes classifier is as shown The following are the strategies for cube computation:
in table below. Sorting, hashing, and grouping: Sorting, hashing, and grouping operations
Confident Studied Sick Result should be
applied to the dimension attributes in order to reorder and cluster
Yes No No Fail related tuples.
In cube computation,
Yes
aggregation is performed on the tuples
No Yes Pass (or cells) that share the same set of dimension values. Thus, it is
explore sorting; hashing and grouping operations to access andimportant
to
No Yes Yes
Fail
data together to facilitate group such
No Yes No Pass computation of such aggregates. For example, to
Yes
Yes Pass
Yes
CST * Semester a n d i
66A Comple rU Solewion of Practice Sets Data Warehousing and Data Mining .. 167

total sales dav, and duct,


by braich
po i
compute
or aells by
by dday, and
hen by
bnimdt, and then
is morethem
tuples then group
thepmdutname.

aggregation and cachine


etficie to
Simaltaneous

computation
table
previoush
t s ent
computed lower-level aggregates,
to

Moreover, simultaneous aggregationrathe


from
compute
r than
cached
Bgeo
intermediate
igher-level
intermediate
e
results:ac ordingo T13
T14

may lead to, the reduction afhed ithe abase TOma


cube T12
utation
computation results

operaoo resultsample conmputation of expensi


we ve disk
te sales
the
from the computa by branch,
intermediate results dernved
ded
sudh as sales instead of brandi, day and
by branoh and day instead
a
lower-leve
Aggregation from
the smallest child, when #anhd itemeve
item c
s: When there exist multiple child ds, it isicuboid, Tis
effcient to compute the destred parent (i.e., moro ultiple
usually child 15
Ti6
of eight types
T17
of acyclic signed
triads.

from the smalest, previously computed chid


cuboid. icalizo
illustration
Figure: An theory.
Ctrant» When there exist For exed) cuboid theory versus status T2 T23 T24
compute a sales cuboid two Table: Balance Tie T17 Tis Tza
Tis |
cuboids, Cprnch yor) and ramch, item it is obviou
ute Crandt from the former tnan from the
previously
mlously cPlet
comp
r e eftite
Tu T2Trs Ti4
more distinct items than distinct years. latter there icient StatusTheory
Balance Theory theory do
not always agree
are and balance
above table, status theory
networks
The Apriori pruning method can
be explored to many As shown in balance theory to
directed signed

efficiently: The Aprioi property, in the context of da compute iceberg with one
another. Note that we apply
links. Some triads satisfy
both theories such as the

the directions of such as the triad T12.


tollows: Ifa given cel aoes not satisy minimum support ubes, statcubes by ignoring status theory but
not balance theory
T21. Others do
ie., more specialized or detailed version) of the cell will triad T11. Some satisfy not status theory'such
as the triad
balance theory but
support either. Tnis property can be used to
sati Some satisfy

computation of iceberg cubes.


substantially sfyreduce
minimum
the
not satisfy either
in
such as the triad T24.
Apriori Algorithm
Showthe conflict between theory ot balance and status. How Improvement of the Apriori
efficiency
9 methods are available for improving the
Many folows:
Apriori? of them are as
algorithm some hash-based structure called
243 Technique: This method
uses a
Anc: When we consider positive and negative links
together, they Hash-Based count.
present o
a hash table for generating
the k-itemsets and its corresponding
properties, which can be explained by two inmportant social theories in the table.
networks, ie, balance theory and status theory. It uses a hash function for generating transactions
reduces the number of
Transaction Reduction: This method K-
transactions which do not contain
scanning in future iterations. The because such transaction cannot
items are marked or removed
frequent
contain (K+1) frequent itemsets.
database to mine the
Partitioning: This method requires only two scans

frequent itemsets. It says that for any itemset to be potentially frequent


in the database, it should be frequent in at least one of the partitions of
the database. In Scan 1 partition database and find local frequent
patterns and In Scan 2 consolidate global frequent patterns
T T2 random sample S from Database D and
Sampling: This method picks a
Figure: Possible triads in directed sociai network then searches for frequent itemset in S using Apriori. Scan database
once to verify frequent itemsets found in san ble S, only borders of
closure of frequent
instead of ab, ac,
patterns are checked. For example,
check abcd
etc. Scan database again to find missed
...,
frequent
patterns. It may be possible to lose a global frequent itemset. This can
be reduced by lowering the
min_sup.
Dynamic Itemset Counting: This
technique can add new candidate
itemsets at any marked start
T of the database. Find
point of the database
during the scanning
T3 longer frequent patterns based on shorter
Figure: An illustration of four types of cyclic signed triads.
frequent patterns and local database partitions.
and Proctice S
Sets
of CST 7 Semester
Data
16 . .
A Complee TU
Soution

and snowflake
schem
sa.

-Means algorithm Warehousing ond


Data
between
star
schema

List any
ApplyK/-2
(188, 77) up two
dat (185,
over the Mining 169
72),
..
Differentiate
(182, 72), (170,
10 normalization.

two , 68), two objects as initial con iterations and s


ions and show 70, 561
56),
methods for data
between starschema
and snowflake schema are as:
snowflake s e
ho0se first
ho clusters. (168, 60),
Ans: The
difterences

StarSchema Snowflake Schema Initially


the fact It's logical arra
A n sG: i v e n ,

fact Instance
a star
with
ent of X
It resembles

center with pointsà snowflake


ke pattern table
and is ini
P1 185
table at the
representing dimensiontables variation oft star schema a P2 170 2
Centralized
tor each fact 56
One dimension
table

store
related connected to tables
ultiple dimension
P3 168
60
dimension P4 179
attributes P5 68
tables are The dimension 182
The dimension normalized. tables P6 188
demoralized.
are
More joins betu Number of clusters to be created (K) =2.
Fewer joins between dimension

tables between dimensic Centroid for first cluster (C1) = P1 = (185, 72)
tables mean fast query response
times
ension
mean slow
qiery response Centroid for second cluster (C2) = P2 (170, 56)
times lteration 1:
Reguires more space to store NEuires less space space to store
dimension tables which results in dimension tables
which minimizes Now calculating similarity by using Euclidean istance measure as:
d(C1, P3) 20.809
data redundancy.
=

data redundancy. 4.472


d(C2, P3)
=

Less complex queries meaning they


More complex querioc Here, d(C1, P3) > d(C2, P3)
areeasy to understand
they are not easy to meaning
understand So, data point P3 belongs to C2.
normalization are:
Any two methods for data d(C1,P4) =7.211
Z-score Normalization: The Z-Score value is one of the Norm
d(C2, P4) = 15
Techniques in Data Mining that determines how much a data
point de viates
malization Here, d(C1, P4) < d(C2, P4)
from the mean. It calculates the standard deviations that are belov So, data point P4 belongs to C1.
the mean. It might be anywhere between -3 and +3 standard deviatOve ab
d(C1, P5) =3
score normalization techniques in data mining Is beneficial for
data analu d(C2, P5) = 20
that requires comparing a value to a mean (average) value,
such as test Here, d(C1, P5) < d{C2, P5)
br
surveyfindings So, data point P5 belongs to C1
Min Max Normalization: Which is simpler to
comprehend: the differanc
between 500 and 1000000 or between 0.5 and 1? The dala
d(C1, Pó) = 5.831

becomes more d(C2, P6) =27.659


understandable when the minimum and highest values is less. The min- Here, d(C1, P6) < d(C2, P6)
range
max
normalization method converts a dataset into a scale ranging from 0 to 1. So, data point P6 belongs to C1.
11. How do you evaluate the
accuracy of a classifier? Discuss the The resulting cluster
after first iteration is:
of using Kfold cross validation. advantages
Ans: After the data
gathering, cleansing, investigation, 243 and feature P1, P4, P5, P2, P3
but before starting to train models, it is
crucial to have method for
engineering P6 C2
evaluating models that doesn't involve the data used to a train
Training model and testing it on the same data is a model.
a model that
would just repeat the labels of methodological
the samples that it has
mistake: Figure: Clusters after first iteration
would have a
perfect score but would fail to classify/ just sen Iteration 2:
onyet-unseen data. This situation is called predict anything usetul Now, calculating centroid for each cluster:
methods include: overfitting. To avoid Common Centroid for first cluster (C1) (183.5, 72.25)=

Holdout method Centroid for second cluster (C2) = (169, 58)


Validation set Random Sampling Now, again
Cross-validation calculating
similarity:
The
Leave-one-out cross validation d(CI, P1) = 1.521
advantages of using K-fold cross validationBootstrapping and so on d(C2, P1) = 21.260
K-told are as
All of our
cross-validation works well on small and follows. Here, d(C1, P1) < d(C2, Pi)
data is used in large data ses So, data point Pl belongs to C1.
rounded evaluation metric. testing our model, thus gIVing well a d(C1, P2) = 21.126
a
&-told cross-validation may lead d(C2, P2) = 2.236
to more
eventually utilizing our data to build
are

accurate moaeis Here, d(C1, P2) > d(C2, P2)


our model.
ster ond Practice Sets
Semester o n d

TUSolution
ofCSIT7 Data
170A
Complete

to C2
Warehousing and Data
P2belongs
thearchitecture and
implementation of data Mining 171
So, data point
Eplaint h ea

the knowledge discover process in detail


warehouse witn
with neat example.
=
19.756
d(C1. P3) Describe

a
Section B
d(C2 P ) = 2 2 6

P3)> d(C2 P3) diagram.


Here. d(CI, EIGHT questions.
to C2 any
P3 belongs key features of data warehouse.
data point
So, d/C1 P4) =6.190
yrenpt
Explainthe
technique? Why need data
185-40
ispreprocessing
e
5
d/C2 P4) =14.142
What
strategies
ihe general str for cube transformation?
computation detail.
in [243
Here d(C1, P4)
<
dC2 P4) Explain
be use
ID3 algorithm can as attribute selection
So, data point P4
belongs to CI How

Construction? Explain. during decision tree51


1.521
dC, P5) for K-means
=

dC2 P5)=19.105 Write algorithm clustering and explain it with an 5


d{C2, P5) What do you
mean
ining? What are the example. (5
Here d(C1, P5)
P5 belongs to C1.
<

mining?
challenges of graph
So, point
data
6.543
nanning
0Trace spanning tree of following graph from node a to node j using 243
d(C1. Po)
=

search algorithm for beam width = 2. beam


d(2P6)=26.870
Here. d(CI, Po) d{C2, P6)
<
10
Se, data point P6 belongs to C
Second iteration is:
The resuling cluster after

P1,
P1,P4,P5, P2, P3 8 d
9
P6 C2

Figure: Clusters after second iteration [4


h

MODEL QUESTIONS SETS FOR PRACTICE


6

MODEL SET1 11. Define NLP.


Discuss the major
12 Write
short notes on application of NLP. 2+3
Course Title: Data a. PageRank Algorithm (ANY TWO 25-25
Course No: CSC 410 Warehousing and Data Mining Full Marks: b. Market Basket
Level: B.Sc CSIT
Fourth Year/ Seventh Semester
Pass Marks: 4 C. Cluster AnalysisAnalys
Time: 3 hous
Attempt any TWO questions. Section A
1. A database
has five 210-0
MODEL SET 2
min_confdence =75%.transactions. Consider the values as min_sup:- 50% and
TID Items
T Burger, Chicken, Milk
T
Burger, Chicken, Cheese Altempt any TWO Section A
T3
Burger, Chicken, Clothes, Cheese, Explain about questions.
mplementation
(2x10-20]
| T4
Chicken, Clothes, Milk Milk example and architectu of data warehouse with an

15 Chicken, Milk, xplain the


example FP-Tree
a.
Find the all Clothes lgorithm for generating the frequent patterns with an
b. List
all requent ilemsets using Consider the following transaction data set 'D shows 9 transactions and list
strong
association rules priori
with Algorithm
min_ suppo 502 and
of
min_confhdence =75%). items
threshold is using Apriori algorithm to find frequent itemset min_support
22%. Apr
Se and Practice Sets Data
TU
Solution
of CSIT 7 -
Warehousing and Data
172A
Complete

Tid
List of items Section B Mining.. 173
EIGHT questions.
Atributes. Briefly explain types of attributes
Mepl
any

e f i n

A
e .

warehouse architecture.
8x5-40
i n the data 14
ntiate between Data mart and Meta data.
plain data cube with example.
sociation rules are generated from frequent item sets.
H the decision tree algorithm with example.

Whatare
the types ofregression? Explain.
the contribution of spati
data mining in academic
T ain the data mining tasks performed on a text database. activities.
Section B

Attempt
EIGHT questions.
anyis data mining? Briefly explain the motivatins challeno
MODEL SET 4
What
of dap
mining.
OLAP and OLTP
Differentiate between
for multidimensional data models. Section A
Explain schemas TWO questions.
Explain
arious evaluation 4Mempt
methods are required? the any
7. Why evaluation 2x10-20
methods.
Describe the various phases in
knowledge discovery process with a neat
Explain briefly agglomerative hierarchical clustering with ev diagram.
8.
Diferentiate between data marts and data Outline the major ideas ofnaive Bayesian classification. Explain
9. cubes along with classification. Naive-Bayes
implementation
What are key issues in hierarchical clustering? 5+5]
10 Explain about prediction and regression.
Agglomerative Hierarchical clustering algorithm.
Explain about the basic
11 Explain the application of mining used in WWW. 5+5
Section B
12 What do you mean by multi-media data mining? What is the importar Aftempt any EIGHT questions.
data mining in medical and insurance field? 8x5-40]
2 Given two objects represented by the
tuples: (22, 1, 42, 10) and (20,0,36,8),
compute the Euclidean distance, Manhanttan distance, Minkowski distance
between the two objectsusing q=3.
MODEL SET 3 5. What are summery statistics?
Explain
6. Describe strengths and weaknesses of K-means.
Explain Functionalities of search engines
Section A Discuss about
mining the web link structure to identify authoritative web
pages.
Attempt any TWO questions. 9 What is outier detection?
Explain distance-based outlier detection.
1 Differentiate between Data-Warehouse and
of KDD Data-Mining. Write partitioning
Explain me s11. Compare around mediods algorithm.
OLTP and OLAP.
State K-means algorithm. Apply K-means algorithm with two ond oW to
compute support and confidence for an association rule X > I
form two
cluster by taking the initial cluster centers as terdu
subjects anu
I

Subject A B
1.0 1.0
MODEL SET 5
1.5 2.0
3.0 4.0
5.0 7.0 Aftempt
1. WhyanydataTWO questions.
Section A
(2x10-201
3.5 5.0
prep 15 important? Explain the role played by sourcing
4.5 5.0 acquisition,cleanupiand transformation tools in building adata warehouse. 2+8
3. What are the 3.5 4.5 2What cube materialization? Define full cube, iceberg cube, closed cube and
shell cube.
mining challenges of gra ung? Explain the applicabion
otg 2+8]
ST T Semester and Practice Sets Data
TUSolution
ofCS/IT Warehousing and Data Mining
174.A
Complee

algonthm discovering frequent Section B ..


175

value: item setss ttoo


Apriorni
4pply
the
0.3
O3 as
as theminimu support A M e m pa
t
ny EIGHT questions.
nyEIGHT

3. setusing
tollowing
data
T t e m sP u r c h a s e d ETL process in
detail. 85-40
TID Straw Berry
Explain
back propagation is used in classification.
Litchi Banana, ibe how
Describe

101 uitchi, PasionFruit ntiate operational


abase systems and data
102 PassionFruit,Tomato duction helps in data pre-processing?
Howdata reduc
warehousing.
103 Straw Berry plain the various prediction techniques.
prediction? Exp
Litchi,Banana, Whatis
104 Pears, Straw Berry What is the application of lustering in data mining? Why k-means ++ 14
105 algorithmis better than rmal K-means algorithm.
Pears
106 Pears, PasSion Fruit
advantages of FP-growth algorithm?
the 243]
107 Ber Whatare
Litchi, Banana, Water
Melon, Straw fine information retrieva What are the basic measures
1 Dehine
for the text
105 Water Melon, Tomato retrieval?

109
Litchi, Banana a small universe of five web pages: A, B, C, D and E.
243
110 Section B Calculate the
rank of following graph using google PageRank algorithm.
EIGHT questions.
Attempt any
4 How Support
Vector Machires are
Nonlinear data ?
applied for the
classification8 5
Linear and
Hierarchical clustering algorithm
5. Write Agglomerative
For the following vectors X and Y, calculate the cosine similaarity.
6.
whereX-3 20500020 0, Y =|1 0000 0 0 1 02
of cluster analysis.
7. Explain the requirements
How lassification plays significance role in data mining? Fml plain
Define dimension table and fact table. What makes the
the necessity
multidimensional data model?
10. Describe statical description of data.
11. Explain the link analysis page ranking algorithm.
12 What are the typical information extraction apPplications? Discuss. MODEL SET 7

MODEL SET 6
Section A
Atempt any TWO questions.
What is warehouse and data mart?
[2x10-20]
Section A Why do any organization need
Warehouse separately though it has transactional database
Attempt any TWO questions. with its application. system? Explain
1 A data warehouse can be
2410- [2+2+6]
modeled by either a star schema or a
schema". With relevant snomis What is the use of FP-Growth method in market basket analysis? Explain FP-
2 Explain ID3
examples discuss the two types of schemas growth method with a suitable example.
algorithm. Calculate TPR, FPR and Accuracy 1or 3 What is a decision tree 3+71
Confusion matrix. and how information gain is used for attribute
selection? Explain with
Actual+
example. [10
Actual- Section B
Predicted+ 100 40 Atfempt any EIGHT questions. [8x5-401
| Predicted - 60 pladin briefly the structure of data warehouse. How a data warehouse
3.
Explain Apriori algorithm in market basket 300 Derive ciation helps in better analysis of a business.
rom the
following analysis.
market basket transactions with 50ro minim
[3+2
support and ene Association rule mining two step processes. Explain
suppor
confidence respectively. confidence measures. 2+3
Transaction Itemsets eSCribe the difference between Hierarchical and partitioning clustering
How K-means clustering is 2+31
A, B,C What do you mean
applied
A,C by data discretization? Explain the concept hierarchy. |2+3]
A, D Explain variouso data miningiissues and functionalities in detail
B, E, F
and Practi.
and Practice Sets
176 A Complete
TU Solution of CSIT 7 Semester
Explaink-fold
k-i cross
validatio Software Projeet Management
W'hat is cross
validation?
with its
and disadvantages.
and negative link can be predicted.
Explain how positive in social network.
advantaaggs New Syllabus
10. network. Wha
the
11. Define balance theory
in signed network.
Discuss the tuno.
importance of distn e tle:
Title
Software Project Management
Full Marks: 60+20+20
What do you mean by web mining? web mining 24
12
Pass Marks: 24+8+8
p eN a rC S C 4 1 5

e cCourse:?Theory+ Lab
MODEL SET 8 whor
ofthe Credit Hrs.3
eimesterV I

dian:
Description: This course familiarizes students with
different concepts of
Section A management ainly focusing on project
hvare
project
analysis,
allocation, risk analysis, monitorir control and software scheduling,
Attempt any TWO questions. do we configuration
What kind of data preprocessing need before applvino uagement.

1
algorithm to any dataset. Explain binning method to handle nois data minin (yuseObjectives

2 What are outliers? Discuss the methods adopted for outlier detec data. (46 main objective of this course is to
provide knowledge of different
management concepts of
3 Applv Aprioi algorithmfor the folowing transaction database on
all frequentitem sets systematicallywith minsup = 0.3. entih stware proect
and id2ae various
that studernts will be able to
so

projects luding very high risky and


understand and
ndle innovative projects
Row |Transaction iferent project management skills. using
la, b Course Contents:
fb, c Iaht L: Introduction to Software Project Management (5 Hrs.)
a,b, c
d,e,f sotware engineering problem and software product, software
a,b,c Rinition of a Software Project ($P), SP Vs. other types of product attributes,
gvered by SPM, categorizing SPs, Project management cycle, projects activities
SPM framework,
c d,e, f ypes of project plan.
la, b, c, d, e
Unit 2Project Analysis (8 Hrs.)
Section B Intoduction, strategic assessment, technical
Atempt any EIGHT questions. Fresent worth, future assessment, economic analysis:
4. Describe Mult-way Array worth, annual worth, internal rate of return
Aggregation (Multi-way) method for computiny enefit-cost ratio analysis, including uniform gradient cash flow (IRR) method,
full cubes and
d
mutually exclusive alternatives. comparison
5 What is
visualization? Explain.
6.
Why evaluation methods are
methods with suitable required? Explain the various evaluate
Unit 3 Activity Planning and Scheduling
example.
What is Euclidean distance? When to use (7 Hrs.)
distance between data Euclidean distance to Ves of activity planning, Work breakdown structure, Bar chart, Network
8. Name the different of point? How it differs from cosine similaritymeauPlanning
measut model: Critical path method
(CPM), Program evaluation d
mining
data mining
techniques. Explain the scope d of thnique (PERT), Precedence gramming method
duration, Identifying critical (PDM), Shortening project
9 How data activities.
data mining
cleaning can be done? Explain the
importance of data
10. Describe
the Unit 4: Risk
advantages and disadvantages of data Management (4 Hrs.)
12
mining.
"gES of graph cube tion of gthe
mining? Explain the application of g24 heschod.drure
schedule using
Introduction,
and identification of risk, risk
analysis, evaluation of risk to
Explain tokenization and
how Z-values.
stem
emming is donein text mining Unt s:
Resource Allocation (4 Hrs.)
ldentiflying T
Tesource balancingerequirements, resource allocation, resourcesmoothening and
O00
Solution of CSIT 7" Semester and Practice Sots
178 A Complete TU Software Project
and Control (4 Hrs.)
Management . 179
Unit &: Monitoring
Ost TRIBHUVAN UNIVERSITY
Introduction collecting
data, visualizing progress,
analysis, project control.
cost
monitoring, earmed val Institution of Science and Technology
and people (5 Hrs.)
Unit 7 Managing
Contracts

contract, stages in contract, placement


MODEL QUESTIONS-ANSWERS
types of
Managing peopl typical term
Introduction
management, acceptance,
contract contract
and organizvof a rale Software Project Management Proia
Full Marks: 60+20+20
terms: Introduction, understanding
ehaviour, organizational Software

instruction behaviour
e Tle
ground, selecting the right person for
the job, back
best methods
e

Lab
Nor:CSC415

+
Pass Marks: 24+8-8
motivation, working in groups,
becoming team, decision
a
of the Course: Theory Credit Hrs. 3
conclusion, further exercises.
making, leaders krester:VIT
organizational structures,
ertionA

two questions. (2 x 10 20)


Unit 8: Software quality
assurance and
testing (5 Hrs.) ptany different
hat are steps of Project Planning? Describe activities.in each
Testing principles and objectives, test plan, types and levels of covers the various features of
the Project.
step.
us ect
Planning Usually
verification and validatio software sting, test be Project
Planningis believed process of estimatin scheduling and
to
strategies, program
activities, QA organization structure, SQA plan.
quality, SEL-CM a

d riects resources in order to bring an end product of assigning


proper quality.
Though, it is much more as it can assume a
very strategic role, which can
delermine the very success of the project. A Project Plan is one of the decisive
Unit 9: Software Configuration Management (3 Hrs.) deOS in Project Planning in General!. Typically Project Planning can contain
Introduction, need, basic configuration, marnagement function, basel the following types of Project Planning:
conriguration management responsibilities. Iseline, 1 Project Scope Definition and Scope Planning
Project Activity Definition and Activity Sequencing
Laboratory/ Project Work:
3. Time, Effort and Resource Estimation
4 Risk Factors Identification
Students should prepare a project report using different concepts of 5. Cost Estimation and
project management. The
software Budgeting
project can be done in groups with at
most four
6
Organizational
and Resource Planning
members in each group. Each group can select a Schedule Development
of software project
case study and apply the concepts
management focusing on project analysis, scheduling, risk Quality Planning
analysis, resource allocation, testing. 9. Risk
10.
Management Planning
Project Plan Development and Execution
11. Performance Reporting
Text Book:
1. Software Planning Change Management
Project Management by Bob Hughes and Mike Cotterell, Latet
13.
Project Rollout Planning
Publication We now
briefly study each of the above steps:
Toject Scope Definition and Scope Planning: In this step we
Reference Books: ONCUment
the project
work that would facilitate us to attain the project
goal. We document the supposition, constraints, business
ntroduction to Software Project Management & Quality Assurance, Da Cuurements, user expectations, technical requirements, project
Ince, I. Sharp, M. Woodman, Tata
2 "Software
McGraw Hill uectives, project deliverables and everything that describes the final
Project lanagement: A Unified amework", Walker Koyc POduct requirements This is the foundation for a successful project
Addison Wesley, an
Imprint of Pearson Education completion.
S.
"Managing the Software Process", Watts S. n-Wesley, an ality Planning: The pertinent quality standards are determined tor
Imprint of Pearson Education
Humphrey, Addison inect. Ihis is a significant aspect of Project Planning. Based on the
ReCaptured in the previous steps such as the Project Scope
rements, deliverables, etc. a range of factors intluencing ne
del t the final product are deternmined. The processes required to
t h e 'roduct as assured and as per the standards are defined.
Semester and Practice Set. Software Project Management
Complete TU Solution CSIT 7
of
180.A
181

Project Activity
Definition and Activity Seauen
ing Plan Development Execution: Project Plan
a
3.
describe all the specitic
activities that mustbe. In
ormed tothis step we
Project
the inputs collected from all the other Development
planning processes such
orables. The Projtheect
e m p l o y s

product by producing the various product deliverables V e finition, Activity identification,


as Scope defin
Activity sequencing recognizes interdependence of anning, etc. A Activity sequencing,
all the Quality
Management complete Work Break down
including of all the activities acknowledged
defined.
Time, Effort and
Resource Estimation: One tima. activities structur

cheduled based on the inputs captured in the


is used. The
tasks
interdependence is
defined and documentivied
evidently defin Scope, Act steps formerly
are

and Activity described. The Project Plan documents all the assumptions, activ
is to decide the etfort required and drives the project. Each of the
the next vital step to schedule, and
timelin
he activities. The Efort can be calculated usin mplete ed
monitored. The team and the Project tasks
tha ach of
the and activities are occasionally
techniques obtainable
Such as Function Poink e of
keholders are well-versed of the progress. This serves
Complexity of Code, Benchmarks, etc. This step clearl Lines of
estimatesCodeand
Co tstanding communication mechanism. Any delays are
documents the time, effort and resource required for ch the project plan may be adjusted consequently.
analyzed and
5. Risk Factors
ldentification:
xpecting the unexpectedaandactivity. Performance Reporting: As explained above the progress of each of
It is significant to recognize and document the risk factors facing it the tasks/activities illustrated in the Project plan is monitored. The
with the project based on the
etc.
associalo
assumptions, constraints, prog is compared with the schedule and timelines documented in
expectations, specific situation, user
Schedule Development: 1he time plan for the project the Project Plan. Different techniques are used to measure and report
can be the project performance such as EVM (Earned Value Management).
required forarrieach
ved ofat
based on the activities, interdependence and effort
them. The schedule may power the cost 12 Planning Change Management: Study of project performance can
estimates, the cost demand certain aspects of the project be changed. The Requests for
analysis and so on. Project Scheduling is one of the beneft
task of Project Planning and also the most
most s
Changes need to be analyzed cautiously and its impact on the project
complex tasks. In should be analyzed. Considering all these aspects the Project Plan may
projects it is possible that several teams work on very larg
project. They may work on it in equivalent. However theirr t developir be customized to accommodate this request for Change.
Change
Management is also essential to accommodate the implementation of
be mutually dependent: Again various factors
may impart
pad the project at present under development in the production
effectively scheduling a project
environment. When the novel product is implemented in the
Teams not directly under our control
production environment it should not negatively impact the
Resources with not enough experience
environment or the presentation of other applications sharing the same
7. Cost Estimation and Budgeting: Based on the
information compose hosting environment.
in all the
previous steps it is possible to estimate the cost concemed in 13. Project Rollout Planning: In Enterprise environments, the achievement
executing and implementing the project. A Cost Benefit can
inwards for the project. Based on the Cost Estimates Analysis ke
of the Project depends a huge deal on the success of its rollout and
is done for the project.
Budget allocation
implementations. Whenever a Project is rolled out it may influence the
8. technical systems, business systems and sometimes even the way
Organizational and Resource Planning: Based on the actions is run. For an application to be effectively implemented not
identified, schedule and
budget allocation resource types and resource business
only the technical environment should be ready but the users should
are
acknowledged. One of the primary goals of Resource planning ist accept it and use it efficiently. For this to happen the users may have to
ensure that the
project is run proficiently. This can only be achieved b be trained on the new
keeping all the project resources fully utilized as possible. The succes system. All this requires planning.
he table below is an example of project specification with estimated
depends on the correctness in predicting the resource demanas u activity duration and precedence requirements:
will be placed on the
project. Activity ctivity Duration Precedents
Kesource
planning is an iterative process and essential to optimize u" Name (Weeks)
use of resources throughout the
project life cycle thus makungources Hardware Selection
project execution more competent. There are various types or System Configuration
re
9.
-

Equipment, Personnel, Facilities, Money, etc. Install Hardware


Kisk
Management Planning Risk Management is pro a Data Migration
identifying, analyzing and responding
factors ldentified a Risk resolution
to a risk. Based on
Plan is formed. The plan analyss
Draft Office Procedures
Recruit Staff
each of the risk factors E, F
probs.
and their impact on the project. Theliletimed User Training
responses for each of them can be he Install and test system C,D
the planned. All throug" essenti
project these risk factors are monitored and acted path of the project and calculate the earliest completion
up time ofical
the
project.
182 A Complee TU Selution f CSIT Semester and Practice set Software Project Management 183
the networkdiagram for the
Ans First iet us construct given project. Ocined: The organization has defined the way that each
activities. WeW.
the arrows representing the Level3: task
time estimates along software velopment life cycle should be done.
following diagram:
2
obtain the 4 Quantitatively managed: The products and processes
involved in software development are subject to measurement and
Level

D
H ntrol

5:Optimizing: improvement in procedures can be


designed and
implemente using the data gathere from the measurement process.
features of the product
Start
End duct 1 ics measure the being developed, such
3 G rde reliability, time complexity, understandability, etc.
s i ssize,.
Section B

10
any eight
questions.
(8x 5 40)
ept
doyou mean by Software Project Management? In what ways
What
are projects are different from other types of projects?
in project management is edicated to the planning,
s Software
surce allocation, execution, tracking, and delivery of software and web
scheduling,
projects.
e might be many differences but according to my knowledge there are
Cansider the paths, beginning with the start node and four basic differences between software project and other projects.
node. There four such paths forthe given
are stopping
proje They are aswith the end Software project are based on logical work, while other are based on
PathI follows: physical work.
Start AD>H>End with a time of 6+4+2-12 weeks
Path II We can't measure complexity of software project until we actually
work on it.
Start BE>G>End with a time of 4+3+3=10
weeks There is invisibility of progress in software projects. Means customers
Path I 3)
of software project an't see the outcome in middle of
Start C>H>End witha time of 3 =3 weeks project, because
Path IV customers don't know about coding and other technical work and as
Start FG>End with we know an incomplete project will not
a time of 10-10 weeks give an outcome.
Consequerntly it becomes very difficult to satisfy customers of software
Compare the times for the four paths. Maximum of {12, 10, 3, project that actually their work is being done by team.
see that
path I has the maximum time of 12 weeks. Therefore, 10] 12 We
=

critical path. The critical activities are path I is the One good point of software projects is that, they are flexible. Customer
A, D and H. The
The project
completion time is 12 weeks.
project only wants final result, so rest of things are in control of programmer,
he can
For non- critical activities. modify software at any stage.
Whule this thing is not in other projects, as everything is in frornt of customer
Timefor path I- Time for path II =12-10=2 weeks. he is aware
about progress he
Time for path I- Time for path III 12-3 9 weeks. can view what work is being done by project
Time
for path I
Time for path IV 12- 10 2 weeks.
- manager and team so it is not in the hands of project team to make changes
at any stage of project development.
=

Why are process Capability Models more effective than Explain cost benefit evaluation techniques.
Describe 3any
capability models in product matrices
describes a strategy fordetail
Ans: This model Would consider proceeding with a project only where the benefits
o a De tollowed by moving through software processlevels.
5 different improv
Each level
that uweigh the costs. However, in order to choose among projects, we need to
l ofo t o account the timing of the costs and benefits as well as the benefits
maturity shows a process relative to the size of the investment.
1 capability level.
Level initial: The
procedures followed tend
haphazard. Soto be n g a r e the some common methods for comparing projects on the
projects may be successful, but
this tends to be basis of their cash flow forecasts:
because
parncular individuals, including project managers. Thereor islevel
no 0 Net profit
ana so any organization would be at this level default. net profit of a project is the difference between the total costs ana tie
Level 2
Managed: Organizations at this levelbywill total income over the life of
Payback period the project.
nanagement procedures in place. However, the way have al tasks
ae camied out will depend largely inu inve ack period is the time taken to break even or pay back the
initial
on the
person doing estment.
Normally, oject with the shortest payback period will be
the proj«
184A Complee TU Solution of
Software Project Manager
CSIT 7m Semester and Practice Sets .185
chosen on the basis that an organization will wish to min means
identifying and alloc resources for a
specific period
a project is 'in debt'.
The advantage of the payback is that it is
period
minimize
the
simpla to calculate timne that
ctheduling
various
types

needed
of

to
to
activities.
meet
Project manager estimate resource
meet the end results and resource allocation
is
these. Each project is an integration of several
. ewulrements
not particularly sensitive to small
casting errors. Its disa
based on

yield tangible results. It is up to the


skillsto
t
activities
is that it ignores theoverall certain niche
tormed

selection technique
Return on investment profitability
the of dvantaod is h ar
te q u i
and ensuring that the right resource is working on the right project
task at
The returm on investment (RO), also known as the acCoutn. ect. pro4S a nanage
right moment. If the resource's skills are not
aligned with the
ing rate of ight #he activity is being pertormed at the wrong project
(ARR), provides a way of comparing the net time, the quality
profitabilityto
he

required. retu c t v i t i e s ,

will be jeopardized and unsatisfactory results will be achi


The main difficulty with NPV for deciding between
appropriate discount rate. Some organizations have aa sta
investment af
t h ep r o j e c t

CHiciently
eating a work breakdow
scheduling project
resources include:
structure that defines all the essentiàl
where this is not the case, then the discount rate should bestandard rate selecting an ments of the project and outlines task dependencies alongside
available interest rates (borrowing costs here the but,
sen to reflect Once the details are sorted out, project managers or
equired skills. hedule resources with the right skills for the project
from loans) plus some premium to reflect the fact project must be coordinators can
that softw
ware funded
inherently more risky than lending money to
isnormally less important than ensuring that
a bank. The
exact
scount rate
projects are activities.
Resource optimization techniques to better manage projects. These
for all projects being compared. discount
rate is
used
might be, for example, resource leveling or resource smoothing.
Internal rate of return Centralize resource planning: in order to centralize resource planning
One disadvantage of NPV as a measure of there should be one schedule for the entire company from which each
profitability is that. ala. ugh it
may be used to compare projects, it might not be directly comn
from other
project manager can get information. This enables planning and
earnings investmernts or the costs of
borrowing capital with Scheduling to be performed in real time by multiple stakeholders and
The IRR is calculated as that
percentage discount rate that would prodtuce ensures that there is no double booking of a resource.
NPV of zero. It is most easily calculated as
Track skills in real time so you can assign the right people to the right
using a spreadsheet or other
computer program that provides functions for calculating the IRR. Microsoh tasks. Individuals are assigned to the right project based on skills,
Excel and Lotus, for example, both provide IRR
with an initial guess or seed value
functions which,
provided experience, qualifications, location, cost ratio, etc. This information
(which may be zero), will search for needs to be up-to-date at all times so that you have a clear and factual
retun an IRR and
6. Why is it necessary to plan the activities?
picture of the situation.
How do you visualize progress of the project? Explain any two types.
Ans: Great planning yields effective results in
every aspect of an organization or Aas Amanager needs some way of presenting that data to greatest effect. Some
individual's activities. A good plan has
clearly defined outcomes and
key
methods of presenting picture are,
milestones to reach that outcome. These
outoomes become an
clearly defined milestones and Gantt chart: tracking project progress .It is the simple and the oldest
integral part of the periodic review process. form of representing the progress of the project. It consists of activity
Necessary to plan the activities are listed below: bar that indicates the scheduled activity dates and the duration along
To understand the nature of the work with the activity floats.
To eliminate or reduce risk Slip chart visual indication of activities that are not progressing to
To ensure the right schedule. Alternative view of Gantt chart by providing a visual indication
employees are assigned to the work of those activities which are not on schedule. The more bend in the greater
To ensure
adequate safety strategies the variation in the project plan. If the slip line deviates more towards the
To develop a framework for monitoring and controlling the work
To improves decision-making non-achievement of project objectives then it has to be reconsidered
7. different types of resources? How do you schedule them in the Additional slip lines can be included at regular intervals
What are
project? Ball charts:
way of showing or not targets have been met or not. It is
Ans represented in the form of circles that indicate the start and the end
A resource is defined as any person or item that is required for the executo
o a project. There are generally seven types of resources in project Pont completion of activities. Circles of the ball chart mostly contain
only two dates the original and the revised one. An activity is denoted
management. by a red circle and green color denotes that the activity is ahead of its
Services Labor
ehedule. Slippage in the date but it is overcome by
project completion
Equipment Materials the timeline charts
Money Space imeLine: The timeline is a method of recording and displaying the way
Time n
which targets have changed throughout the duration of the project.
Practice Sets
1 8 6 A Complete TU
Solution of CSIT7* Semester ond Software Project
terms of a contract.
Management .187
9. Describe the typical S t a n d a r d s

contract document mav


Ans: The terminology
used in the need to be
ho s
the standards with which the goods and services should
by the words'client' and 'supplier
covers

This
example, who is meant
Form of agreement
of sale, a lease, or a licenco
defined, for For
example,

dard relating
a customer can
to the
require the supplier
softwar life cycle
to
and its
conform to
documentation
comply.
the IS0 12207
For cxample, is
it a contact
Also, can the sub-set ofthe standard). Within the (or, more
as a licence to use a software. ly, a customized European
of the contract,
such
application be suby customers with tracts for projects above a certain Union,
threshold
transfe
government
to another party?
Goods and services
to be supplied
software to be supplied includes
sferted value must by law, ensure that the work
conforms to certain standards.
Equipment and an actual list Some customers find that specially written or modified software
to be delivered, is not
individual pieces of equipment complete by the supplier pefore delivery. Sorne
model numbers
with the of thoroughly tested
suppliers seem to
s think that it is cheaper to get the customer to do the testing for them!
Services to be provided covers such things as: spechc
Documentation Project and quality management
Installation
Conversion of existing files The arrangements for ihe management of the project must be agreed.
Among
Mainternance agreements these would be frequency and nature of progress meetings and the progress
Transitional insurance arrangements information to be supplied to the customer. The contract could require that
appropriate ISO 9000-series standards be followed. The ISO 12207 standard
Ownership of the software provides for the customer to have access to quality documentation generated
Who has ownership of the software: Ihere are two internally by the supplier, so that the customer can ensure that there is
key issuee
whether the customer can sell the software to others and. son here firstly, adherence to standards.
the supplier can sell the software to others. Where
ncerned, the supplier often simply grants a off-the-sholc whether Timetable
software. Where the software is being written
software is
that customer will normaly wish to ensure specially a custom for Thisprovides a schedule of when the key parts of the project should be
they may object to software which
exclusive use of
the safthua customer, then completed. This timetable will commit both the supplier and the customer.
-they hoped are For example, the supplier might be able to install the software on the
competitive edge being sold to their rivals. They couldwould this
give thor
them a date only il the customer makes the hardware agreed
the copyright to the software do b platform
available at that
outright or by
exclusive use of the software. This wouldspecitying that they
need to be ha
have should point.
contract. Where a core system has been written into the Price and payment method
customized by
is less
scope for the customer to insist on exclusive
a
supplier, then ther
here
use. Obviously the price is very important! What aiso needs to be agreed is when
Environment the payments are to be made. The
Where physical
supplier's desire to be able to meet costs as
equipment is to be installed, they are incurred needs to be balanced by the customer's requirement to
the the demarcation
suppliers and customer's line between ensure that goods and services are
satisfactory before parting with their
accommodation and electrical responsibilities with regard to such
matters as money.
is being supply needs to be
specified. Where software
supplied,
hardware and
the
compatibility of the software Miscellaneous legal requirements
operating system platforms would need to bewith the existing
Customer commitments confirmed. This is the legal small print. Contracts often have clauses that deal with such
Even when work is matters the legal jurisdiction that will apply to the contract, what conditions
carried out by external contractors, would apply to the sub-contracting of the work,
project still needs the development
a liability for damage to third
to participation
provide accommodation of the customer. The
customer will have
parties, and liquidated damages. Liquidated damages are estimates of the
for the financial losses that the customer would suffer if the
as telephone lines. suppliers and perhaps other facilities sudn short of their
supplier were to fall
obligations. It is worth noting that under English law, the
Acceptance procedures penalties laid down in penalty clauses must reflect the actual losses the
customer would suffer and cannot be unrealistic and
Good practice would be to merely punitive.
ungergone user acceptance tests.accept
details as
delivered
This part of
a
system only after t 10. Describe Verification and Validation of the
Program.
the time the contract would Ans: Software testing is a
that the
customer wilI have to conductspecuy process of the exanmining functionality and behavior of
deliverables upon which tlhe software through verification and validation. Verification is
the a
process of
signing off the testing as acceptance tests depend and the f determining if the software is
designed and developed per the specified
completed. pio as
Software Project Manogement
.189
Solution of CSIT 7 Semester and Practice Sets
T88.A Complete TU uration is the functional and physical characteristics of a product as
of checking if ontigurati
requirements.
Validation is the process
and expectatione
the software (end figura specification and achieved through the deployment of project
true needs ns. in its
the client's ned
product) has met anagementp l a n s

is a necessary tool for managing


Verification ration
management complex
of determinin Contigu. of
configuration management can cause serious
Lack of
is the process ng if the are systems.
reliability, uptime, and the ability to scale a system. Many
ed according specified so
verification
As
As
mena designed
mentioned,

question Aesignedinputs
is
and
a for
developed
developmer
to
requiro in
oblems with
software development tools have configuration management
for the the sottware
Specifications act as
sood the
on the speciPOcess, ents, n t SO
curent

for any
is
software application
WTitten based on
specifications documeni
nent.
features builtin.

of configuration
management
check ifthe
software being developed has Purpose of configurati management is to identify,
Verification is done
at every stage
of the
development hered to Within a
ject, the purpose liverables or from unauthorized
these specifications ycle the project's products
1s in une with specifica nd protect
verification ensures
that thecode iogiC tions. The track

Configuration management is a discipline that gives precise control


if the software team is building product rieh allowing managers to:
change.

the ssets
venification checks the project's
of products in use and in existence and hold
Further, that begins well in advvance over

Verification is a
continuous process
of sDecify the versions
processes and
runs until
the software application is validated and validatio information on their status,
who owns them and relationships between

are:
eased. them
of the verification pieces
these of information
The main advantages record containing
at every stage of the softwaro maintain an up-to-date
It acts as a quality gateway
process.
teams to develop products that
development control changes to the products ensuring
the agreement
that changes
of appropriate named authorities
are made only

enables software with


It
customer needs.
meet design
me
that they contain the authorized products
audit the records to
ensure
specifications and
Itsaves time detecting the defects at the early
by stage of
and only these products
softwa management
development Benefits of configuration for the
eliminates defects that may arise at the is important in software engineering
It reduces or later stage of Configuration management
the
software development process. following reasons:

Reduced risk of outages and security


breaches through visibility and
Validation
Validation is often conducted after the completion of the entire software tracking of the changes to your systems. the elements of
development process. It dhecks if the client gets the product the Cost reduction by having detailed knowledge of all
are
avoiding wasteful duplication of your technology
expecting. Validation focuses only on the output; t does not concern itselr your configuration,
about the internal processes and technical intricacies of the development assets.
customers and internal
staff by rapidly
process. Improved experience for your that could negatively
configurations
Validation helps to determine if the software team has built the right detecting and correcting improper
impact performance. formal
product. Validation is a one-time process that starts only after verifications by defining and enforcing
Strict control of your processes identification, status
are completed.Software teams often usea wide range of validation methods asset
policies and procedures that govern
including White Box Testing (non-functional testing or
structural/ design monitoring and auditing
resolution, enabling you provide
to a
testing) and Black Box Testing (functional testing).
Greater agility and faster problem costs.
The main advantages of validation processes are: service and reduce software engineering
higher quality of baseline configuration,
It ensures that the expectations of all stakeholders are fulfilled. Efficient change management by knowing your
that avoid problems.
to design changes
and having the visibility
be able to recover
t enables software teams to take corrective action if there is a mismatch
restoration of service. In an outage, you'll
Quicker and automated.
between the actual product and the is documented
anticipated product. quickly as your configuration
It and clear status accounting
improves the reliability of the end-product. Better release management various stages a team
in a team? Explain
11. Whaf do you mean 12. What are different types of people
a software project.
by configuration management? Write its importantr passes through. is
the critical aspects
performance is based on many things but one of
Ans: Coniguration management encompasses the technical and administrautive Ans: Team team is comprised
members. A high performance
the composition of its team and each
respect
activities concerned with the creation, maintenance, controlled changand have to understand
of diverse team members that
come

quality control of the scope of work.


190. A Complete TU
Solution of CsIT 7 Semester and Proctice Sat Software Project Manogement
sometimes its not cas 191
other. However,
so
asy to
contribution towards the pertormance
maybe other feam
of the

memboers
am recognize
that the
N o r m t n gs t a g e

ards teamifterent
the table. And through the storming stage, confli is resolved and
bring to

vou play in
the team and
how you contribute tou.

for
don't impor
understand mehenlbery
me Aant
pertormance
(leamsget
et degree
merges. In the norming stage, consensus evelops around who
o fu n i l t yc m e r g e s
the
some

There are several ditterent


models understan.
ing differ or leaders are, and individual nember's roles. Interpersonal
members. A couple
of well-known ones include rde mder
to be resolved, and a sense of cohesion and
ecin to
types of tea ifferences
begin unity emerges.
Belbin's Team Roles: Shaper, Implementer Team performance increases during this stage as members learn to cooperate
vestigator, Complcter Finihe
Worker, Resource
Coordinator, Team cus on team goals. However, the harmony is precarious
Specialist and Plants
Stages of Team Development
This process of learning to work logether effective
Monitor
ively is known
-Evaluatoy if
disagreemen.
re-emerge the team

Performing stage
In the pertorming stage, consensus and cooperati
can slid back into

have been well-


storming

development. Research has shown that teams go


Juring development. Bruce 1uckman, an edtua through
definiti.
established and the team is mature, organized, and well-functioning. There is

development process that


stage psychologgteam
al psv clear and stable structure, and members are committed to the team's
become high performing- He caled the stages: ost slapes gion, Problems and conflicts still emerge, but they are dealt
formino teams with
performing and adjouming 1eam progress through
the
tol ow o constructively. (We will discuss the role of conflict and conflict resolution in
the next section). The team is focused on problem solving and meeting team
ihe foliowing diagram.
stages is showy
own ir goals.
Performing Adjourning stage
In the adjourning stage, most of the team's goals have been
accomplished.
forming norming adjourning The emphasis is on wrapping up final tasks and documenting the effort and
results. As the work load is diminished, individual members
may bee
reassigned to other teams, and the team disbands. There may be regret as the
stroming team ends, so ceremonial
a
acknowledgement
of the work and success of the
team can be helpful. If the team is a
Time standing comnittee with
ongoing
The five stages of team development in a responsibility, members may be replaced by new
people and the team can
goo
performing and adjourning. graph:
forming, back to forming or storming
a
stage and repeat the development process.
stages of teamdevelopment.
Most
high-performing teamsstormin.
go through
fie
no
13. Write short notes on:
Test Plan
Forming stage Ans: A Test Plan is
The forming detailed
document that describes the test strategy,
a
stage involves a period of objectives,
schedule, estimation, deliverables, and resources
Uncertainty
and
is
high during this stage, andorientation and getting acquainted for a software required to perform testing
authority. member
A people are product. Test Plan helps us determine the effort needed to
looked to take control. who asserts àuthority or is looking for leadersip validate the quality of the application under test. The test plan serves as a
Tean members are
does the team offer me?" "What knowledgeable may le
asking such blueprint to conduct software testing activities as a defined process, which is
interactions are social as is
expected questions as "Whal
of me?" "Will ninutely monitored and controlled by the test manager.
members get to kriow each I fit in?" Mo Test Plan is the most
Storming stage
The
other. important task of Test Management Process. Follow the
seven steps below to create a test
storming stage is the plan as per 1EEE 829
1S
period marked by most difficult and critical
a
Analyze the product
emerge. Team conflict and stage throug. to pass
competition as
enetgy 15 put intoperformance may actually decrease individual personai Design the Test Strategy
goals, and
areas of subgroups unproductive
and activities. Members
in this
stage De ecaue Define the Test Objectives
cliques may disagree on tean Define Test Criteria
Overcone agreenent. To get may form around
obstacies, through this stage, strong personal o
to Resource Planning
conflicting ideas on team individual differences, and toto must
this
accept ge, members work
Plan Test Environment
stage. Failure to tasks and oals. Teams work throug
wo down
address conflicts goa can get
bogged Schedule &Estimation
mayay result in long-t
-term oblems
Determine Test Deliverables
Software Project Management. 193
192 . A Complete TU Solution of CSIT 7h Semester and Practice Sets
TRIBHUVAN UNIVERSITY
Importance of Test Plan
Science and Technology
Making Test Plan document has multiple benefits Institution of
Help people outside the test team such as developers, busines
customers understand the details of testing. business managers, TU QUESTIONS-ANSWERS 2078
Test Plan guides our thinking. It is like a rule book, which no

followed. to be
Management Full Marks: 60 +20+ 20
Important aspects like test estimation, test scope, Test Stra. Software Project
Pass Marks: 24+8+8
ManagementStrategy are u r s e1Tille:
documented in Test Plan, so it can be reviewed by o u r s eN o : C S C
15
4 1 5

Credit Hrs. 3
+ Lab
and 1heory
re-used for other projects ( of the
Course:

b. Change Control Nature


gemester: V I
Section A
Ans: Project management change control is the system a team uses to maka questions.
(2x 10 20)
major
-

changes to a previously approved project. This can inclu two


(10)
lude budget ditions Aitem emptany
Earned alueAnalysis of the given project.
and subtractions, deadlines or goalposts, and
even new
hiring as Perform Duration (days) Precedence Cost/day (Rs.)
needs evolve over time. Project change control ensures that. proje
nat ali stakeholder Activity 200
have a say (or can at least agree on a process for someone else to carru 200
for how foundational project elements can be revised when
needed, It A, B 300
time, streamlines communication, and leads to a repeatable saves 400
process or B
effective change. follows:
end of 12th day is
as

Change control is of particular importance when the


project is part The progress after the Incurred Cost
of. % Completion
larger program or portfolio because the consequential effects of
unmanaoad Activity 1400
100
change may be far-reaching within the planned change environment and to A
400
business-as-usual activities. 100
1000
The project professional implements the following steps to control change: 75
U 1000
Log change request in a changeregister (orlog) Calculate SV, SPL, CV
and CPI respectively.
Initial evaluation where the change is reviewed.
Ans:
Detailed evaluation where the impact on baseline success
criteria,
benefits, scope, quality, time, resources, costs, risks, stakeholder
engagement or any other criteria important to achieving the business C
case are considered.
D
6
A recommendation is made to the
board to approve, reject or defer the
sponsor and/or wider
governance
1 2 3 0 1

change. Duration
The plan is
updated is a change approved.
is Reporting day
Implementation where the necessary actions are taken and monitored. Cost/day (Rs.) Total Cost
Activity Duration (days) Precedence 200 1600
200 800
A, B 300 1200
400 1600
B
SV
BCWP BCWSS CPICV SPI
ActivityACWP 1600
1400 1600
A 800 800
400
900 900
C 1000
1000 800 800
D 0.105 0
4000
Total 38000 4000
3400
194. A Complete TU Solution of CSIT 7 Semester and
CP-BCWP/ACWP = 0.105
Practice Sets
Proel
Sotware Project Management.. 195
CV BCWP- ACWP= 34000
P a y b a c kP e r i o d

SPl BCWP/ BCWS 1 Period shows how long it, takes for a business to recoup an
The yback
SV-BCWP - BCWS =
0 This type of analysis allows firms to
compare alternative
nent. lecide
Differentiate between progr.
investm
opporlunities project that returns its investment
and on a
2
Define Payback period. How can it management and invest
ment
time if thatcriteria is important to them.
ed as an
What are its advantages and disadvantages? ortfolio managemen in
the
shortest

firm may decide to invest in an asset with án initial cost of $1


(5+241 +2)evaluuatiu
ation a
exampl

Ans: Program Management, as name suggests, is a For


million. O v e r
the next five years, the firm receives positive cash flows that
manages programs, activities, similar projects over time. What is the payback period? As seen from the graph

coordimannatageedmenmat nnerha
diminish over

in a investment is fully offset by positive cash flows somewhere


gainbenefit that cannot be gained by the initial i
managing themem individually elow,
Portfolio Management, as name sug periods 2 and 3
ests, is a between

manages dissimilar projects, programs in a grouptype of ma exactly when payback occurs, the following formula can be used.
To find
objectives.
Major differentiate between them
agement
hieve main stra tha
-
Initial invest1nent
Opening cumulative Cash Flow
are
tabulated beloww: =

Program Management
avback period Closing Cumulative Cash Flow
It mainly focuses on management It
Portfolio Management - Opening CumulativeCash Flow

method is the easiest way of evaluating different


of program. mainly focuses on The payback
of each and manage Drojects/investments, and this is based on the Liquidity principle. The

Its main focus is


organization. every project within project is chosen, which provides a taster return
on investment. More

means more funds available to invest in more projects. The


on
strategy and Its main foCus
liquidity
implementatiorn and complete all focus is to management uses this to get a fast review of the project.
projects that are necessary. programs
together i.e.
brbring i Individuals use the payback approach to evaluate investment decisions, too.
among various coordima It is based on a fundamental need to at least recapture how much was spent.
that programs
to
ensure it simp Indeed, as individuals, when we invest in securities, our first concern about
towards reaching goal. is movie mutual funds is always about the time frame during which we can get back
It is
simply management of work t is to understand.
our invested capital. So, it is simple and easy
within each projects to ensure
that simply management of
more
right work is moving between portfolios i.e. retumone g
investments of individuals
Advantages and disadvantages of pay back method
right projects. Advantages
achieve strategic objectives The formula isstraighttorward to know and calculate
organization.
Goal of
program management is Payback Period Helps in Project Evaluation Quickly
Goal of
to make best use of
resources for to portfolio management i Helps in Reducing the Risk of losses
completion of project and reduce identify, prioritize project a
basis of benefits Disadvantages
friction that in turn each
efficiency and performance.increase then project
authorwl
This method
provide and It doesn't take Time Value of Money into consideration.
is valuable than
doesn't consider the fact that a dollar today
more
projects i.e. give
permission future. For instance,
way
$10,000 invested for a
a dollar promised in the
It
completion of projects. However, even though the
only manages similar period of 10 years will become $100,000.
projects. It amount of $100,000 may look profitable today,
it won't be of the same
Program management has smaller manages dissimilar projects. value a decade later.
scope and objective than Portfolio management
portfolio and
has biga additionally doesn't take into
The method
consideration the inflow of
management. scope objective than progrn cash after the payback period.
'rogram management also focuses management. 3. Suppose you have been assigned to develop Rankvoting
online system. List four
based on Risk
on Portfolio risks that might affect the success of the system.
the risks
checkmanagement budget and focuses onmanagement
of not o
for the highest ranked risk. (2+6+2)
risk but budget and risk a exposure. Develop contingency plan
level. only at program Various Ans: The main elements of an e-voting system are the following:
but programs also focuse
on future ballot
projects and overal The voter client -
The computer used by the voter in casting a
organization goal.
196 A Complete TU Solution of CSIT * Semesterand Practice Sets
and Proctico t

one or
The ballot receiving server
-

more Sotware Project Management


transmitting the
ballots cast by the voters mputer receiving 197
Section B
data network between the v o
A data line or a
rereiving server client and the and
oter
eight
questions. (8x 5 40)
any
A core system of one or more computers, uploa-
bal empt
ROI for the following project. (5)
pading the
the ballot receiving server and doing further proces Calculate
Project
Electronic voting solutions have obvious adyant- ballots from Year
0
50000
availability, procedural simplicity
and ages, such
counting 5000
they create a number
of chalenging problems. Baserd iency.
At the as wide 5000
demgratic principles, the folowing challenges are definthe fund same 20000
Ensure that the voter is able to cast a ballot nentl 40000
Ensure that only one ballot cast bya voter is counted 50000
Ensure the secrecy of the vote. Value of Investment= 70000
Current
Ans:
Ensure that the vote is not changed or falsified. investment cost =
50000
Total
Ensure that a cast ballot is not lost of investment "100%
Now ROI =profit/cost
2/5*100% =
2 20 % =
40%
Ensure that no fake ballots (votes that have
=

(70000-50000)/50000*100% 20000/50000*100%
=
not been cast =

voter)are inserted into the voting system by and hybrid-based approach


eligbe Differentiate between activity-based approach
5.
for identifying activities. (5)
based approach:
Ans: Activity
Voting of all the activities that the project is supposed
to
It consists of creatirng list
a
client c a n be done by using a brainstorming process
involve in its life cycle. It
team and analyzing of the past projects.
Secure which includes the complete project
computer Ballot Work Breakdown Structure (WBS)
is created for the s a m e purpose. It
network receiving
service involves dividing a complex and big scale project
into simpler, manageable,

and smaller tasks which can be completed in approximately


independent
Countrol boundary on the project.
few weeks by a single development team working
.
The technical solutions should be
designed to be The root of the project tree is labelled by the project n a m e itself. Each node

through different channels in controlled as well as easily adjustable to voti (activity) is recursively decomposed and divided into smaller sub-activities,
uncontrolled
tasks, removes theenvironme
This simplifies the audit and certification two weeks to
until at the leaf level, the activities require approximately
technical barriers against
changes if the problem develop and can be given to a single development
team. It follows top-down
technological or political conditin
change, and helps the voter feel confident under the new approach.
Incoming ballots should be registered on a conditions.
"write-once" Hybrid approach:
preclude deletions or overwriting of the ballots. medium b In this approach, an alternative work breakdown structure is constructed

Highly security sensitive software libraries, for based on:


purposes,
must be open, encryption and decrypin
generally available and certified A simple list of final deliverable.
Data
exchange among components must take by security éxperts that
For each deliverable, set of activities required to produce
specified in the EML code, with the place in a data fom a

voting client and the ballot exceptionserver.data transmissin


between the of product.
based work breakdown structure
Politically binding elections should notreceivingbe run on
The main problem with the purely activity
is after identifying all the activities, the task of sequencing them in proper
which is outside the
control of the electoral technical equipme order is always left out. Hence, hybrid approach gives us a moditied version
security level is not higher than at authorities as long as of the Work Breakdown Structure which includes some of the important
The voter
access to the
present. of the Product Breakdown Structure and as it includes the
voting properties
publicly apPproved PKI solutions atsystem should be regulated
level "Person by Sug important properties of both the approaches, it overcomes the disadvantages
credential should be issued High". No special vo of both of them.
for
voting purpose only. Why software project management is a challenging activity? (5)
software project management following major challenging may occur:
Software Project Management 199

198.A Complete TU Solution of CSIT 7 Semester and Proctice Sels

Unclear and undefined expectations: Defining goals is 10


successful project. However, sometimes the project manao crucial
agers
gather requirements clearily from the clients, which further c h t fait
for End
progress. The expectations and objectives become ambion.
output deviates from the actual results. The time and reso bus, and the
omplicates th to
Start

will be for nothing. More than that, it will affect your


urces
you spent
image and
in the market.

Time constraint: "Less time, more work." is typical in the softwam


reputation
process. But what makes this a common hallenge
is the
unrealistic elopment are
two possible
paths,
rom the clients sometimes, which leads to a race
against time. As a deadlines There

affects the quality of the software. Because of high competition and result, Path I:
Start A->B->D->End

technology, it has become even more challenging for the development ing 5+3+10-18
the project managers to cope with tight deadlines. and cost:
of total path
Changing project requirements and priorities: One of the s u . Path II:
challenges in software project management is
changing requirements A - C > D > E n d

priorities. The needs of the clients may change as the project and Start 5+5+10=20

when that happens, extra time, cost, and resources need progresses
cost:
. And Of total path II is a critical path.
which further impacts the project.
ala
to be allocated
I has more cost than path I so path
Since path
Maslow's hierarchy of
needs. (5)
Poor communication: Poor communication with Explain In teams, there a r e
clients, other stakehold. describes the of individual person.
needs
and the
development team affects the overall project. blders, Ans:
Maslow's theory
whose needs should
be satisfied. In order
to lead the team
individuals should
Skills managers
management: One of the biggest challenges of a project many successful project delivery, project
finding the right team with the skills and experience to finish themanager is ofindividuals to
members are not skilled job. If tha recognize that need.
enough, then the chances of failure increases. It puthe in Project Management
the project managers in a puts Self-actualizetion
risky situation. empower personal growth
and interests

Changing technologies: The IT industry is one of the


industries. So, rapid hange in
technologies isn't a new
fastest-growing Esteem in Project
Management

technology may not work tomorrow. So, it is essential to get thing. Today's empyee's achievernentand
companYs mission

the latest ones. acquainted with Management


Projectsmall
Socíalneeds incelebrale achievements

Project cancellation: One of the most One-to-onie meeling,


managers have toface is the cancellation of the
significant challenges the project
project mid-way. This is the Management
worst phase they have to face. And there can be Safety inProject realistic expeciaions
various reasons. ght PMol ensbreleanino
Estimation: It plays a crucial role in thesuccess of the Management
unrealistic estimation affecis the overall project. However, siological needsin.eroject
project as well as the performance of work no disiractions
the team. selary pieceto
Needs in Project Management are
High competition: If you have a great idea, there Physiological
hierarchy of
needs in project management
might be a chance another needs in Maslow's in these categories:
company has the same plan too. They Psychological
to your employees. They
can simplify

software. As project might have already developed the basic things to provide
managers, they should consider this. know their salaries.
team members ventilated, and
7 Draw precedence network
diagram for the following and
Salary: Let your
Comfortable place to
work at: Make s u r e the
office is clean,
for employees
critical path. the identify should be a suitable place
comfortable to work in. Also, there
Activity Duration (weeks) to eat and rest.
they don't perform
well
5 Precedence No distractions at work;
54% of workers
Once when a
cited that
worker is
distractions at work.
should because of
locused
minutes to get
as they
Gloria Mark, it
takes them 23
according to
distracted, use and unnecessary
D A technology for personal
10 again. Encourage limiting
B,C meetings.
200 AComplete TUSelutionof CSIT 7 Semesterand FPractice Sets
Software Project Management 201
Enough sleep: Don't send tasks or email out of workin.
Set clear goals: Everyone should know why the orking time or planning and Identification: The first step in the process is plannin
teams hol
Once you have communicated these categories, th and identification. In this step, the goal is to plan for the development
Every team member is provided with a them, m will folow ofthe software project and identity the items within the scope. This is
fulfilling psychological needs, there come safety
place, money, and
eeds. accomplished by having meetings and brainstorming sessions with
em
acco

Safety in Project Management your team to figure out the basic criteria for the rest of the project.
After you fulfill primary needs, there come Version Control and Baseline: The version control and baseline step
hierarchy of needs in project managemen such as econdary needs 2,
ensures the continuous integrity of the product by identifying an
Even though it seems easy, research has shown
Masl ty, in accepted version of the software. This baseline is designated at a
1 security,
that
trust their employer. To avoid
employeesthat, and
3 employee
should be sure trus specific time in the SCM process and can only be altered through a
salary and work conditions. formal procedure.
Social Needs in Project Management don The point of this step is to control the changes being made to the
Love and
theu
belonging needs in a business
environment are a product. As the project develops, new baselines are established,
than in private life. Even though the resulting in several versions of the software.
colleagues miohi little bi
interpersonal skills, all team members should feel
Moreover, building trust and motivating the
team are
people whoailfernt 3. Change Control: Change control is the method used to ensure that any
changes that are made are consistent with the rest of the project.
projectmanagers should have. To help your coworke Having these controls in place helps with quality assurance, and the
the team, there are a few things to do: feel oft skil approval and release of new baseline. Change control is essential to the
Esteem in Project Management belonging htin successful completion of the project.
Employees are more motiva work when
to 4. Configuration Status Accounting: The next step is to ensure the
their intermal team and the external they feel
feel competent and efficient inside public They are appreciat ed, bothb projectis developing according to the
plan by testing and verifying
Therefore,
their team. motivated when the
according to the predetermined baselines. It involves looking at release
to motivate them, a notes and related documents to ensure the software
meets all
Further, praising the suocoesses project manager should show functional requirements.
of employees will an
these needs are
gratified, we can expect more creativityakefrom
them appreciated. 5. Audits and Reviews: The final step is a technical review of
every stage in the
Self-actualization in Project Management team memh Ate software development life cycle. Audits and reviews look at the
process,
Humans have a natural nbers. configurations, workflow, change requests, and everything that has gone into
the rest of their needs aretendency
to
express themselves in developing each baseline throughout the projece's development.
personal interests with theirfulfilled, different waays.
work. there
are
Self-actual many ways they combine the The team performs multiple reviews of the application to verify its
9.
is using
creativity to improve your role alization
at work.
in
project managemet integrity and also put together essential accompanying documentation
Briefly explain different quality factors. such as release notes, user manuals, and installation
Ans: The various guides.
factors, which influence the 11. Different between Gantt chart
factors. They can software, are termed as and slip chart. (5)
the factors is of be broadly divided into two softwa Ans: A Gantt chart,
commonly used in project management,
those that can be categories. The categoryd
logical errors, and the second measured directly such as first
is one
popülar and useful ways of showing activities (tasks or events) displayed
of the most

measured only indirectly. category clubs those factors the number d


which can
against time. On the left of the chart is a list of the activities and along the top
McCall's Factor Model is a suitable time scale. Each
activity is represented by a bar; the position and
classifies all software
quality factors. The 11 factors length of the bar reflects the start date, duration and end date of the activity.
operation, product revision, andare grouped into requirements
three
into 11
softwan The chart identifies tasks that may be executed in
categories parallel and those that can't be
Product product transition
operation factors: Correctness, factors. -produt started or finished until others are complete. It can
help detect potential bottlenecks
Integrity, Usability. Reliability, Efficiency,
and identify tasks that
may have been excluded from the project timelirne.
Product revision A slip chart is
simply a chart of a product's schedule slips, connecting points
factors:
Product Maintainability, made by the pair of a ship date and the date it was announced.
10.
Explain the transition factors Portability, Flexibility, Testability.
-

For
example, on Day 0 of the project you announce you will ship in 90 days.
Ans: Software process of Software ConfigurationReusability, Interoperability On day 90,
computer configuration
you ship. Your slip chart consists of the point (0, 90) and (90, 90).
management (SCM) refersManagement
systems, servers, to a That is, you finished
exactly when you said you would up front, and your
ne sorware
and software in a
desired, process for maunaa graph is a horizontal line.
to track configuration consistent state 12
and
manage all management process is series of steps desigi
a
Write short notes on:
and
budgets throughoutthea defects, resources,s, codes, documents, a. Present worth:
nvolving people at project. SCM is an interdisciplinaryhardproces
every level,
Ans: Present value is the
concept that states an amount of mnor today is worth
managers/owners, SysAdmin and testers.including DevOps, developa proyect more than that same amount in the future. In other words, money received
in the
future is not worth as much as an equal amount received today.
202A Complete TU Solution of CSIT 7 Semester and
Software Project Management 203
Practice Sets
For
example, if an investor receives $1,000 today and Differentiate
between project life cycle. What do you mean by project
return of 5% per a. can eam
year, the $1,000 today is planning andscheduling
Teceiving $1,000 five certainly worth moro
from now. If an
years investor waited five Expla ware
the softwa configuration management with its roles and tasks.
$1,000, theere would be an an
the rate of returm for the opportunity
cost or the investor
five years. would lose Section B
b. PERT chart
Ans: A PERT chart is a Attem EIGHT
questions.
any EIG
8x5 40)
project
coordinate tasks within amanagement
tool used to involved in stepwise project planning?
schedule, organizo Explain the various steps
project. PERT stands for
process of nalysis
the cost benefit in project evaluation.
Review Technique, a
to
methodology developed by the U.S.Program Evalnd
Navy in +hon Explain the
application development.
manage the Polaris submarine missile program. A Explain rapid
the
the Critical Path Method similar methodals factors needed for allocating a
task? Explain.
(CPM) was tor developed project
.
What are the
the private sector at about the same time. managemenin Discuss
about control with example.
change
A PERT chart
presents person for the job.
selecting the right
a
graphic illustration
projert ot a
Explain about
the
diagram consisting of numbered nodes (either circles nehwo
work
as a
9. the process of effort estimation usingfunction point analysis
representing events, or milestones the project linked
in
or
rectanole Explain
(directional lines) representing tasks in the project. The by
labelled vect with example
and disadvantages of COCOMO?
arrows on the lines indicates the direction of thohe
sequence of tasks. For example: 11. What are the advantages
on:
Write short notes
12 b. SPM tools
5 d a y s
a. SQA plan
3 days
2 days 6 days
MODEL SET 2
3 days
3 d a y s

64days /2days

Section A
2 days 3 days (2 x 10 20)
Attempt any TWO questions. that a software project mnanager
activities
1. Explain the important
planning.
performs during software projectdifferent
is from other project. Explain the
2. How software
are the project
different phases of software project life cycle.
software project
MODEL QUESTIONS SETS FOR PRACTICE 3. Explain the different techniques
for enhancing the quality of

Section B
(8x5 40)
Attempt any EIGHT questions.
framework.
4. Explain about SPM
MODEL SsET 1 5. Differentiate between rapid application,
development and waterfall

model.
Course Title: Software Project contents list of projectplan.
Management Full Marks: 60+20+ 20 6. Explain the reduction.
Course No: CSC415 Differentiate between
risk planning and risk
7.
Nature of the Course: Pass Marks: 24 +8+8 major workflows
involved in software development.
Theory + Lab Credit Hrs. 3 8. Describe the
project?
Semester: VII How network
chart help scheduling
in a

the critical path with example.


10. Explain detail with practical example.
Section A progress in
11. Explain the visualizing with example.
Attempt any TWO questions. software configuration management
1 (2 x 10 20) 12 Explain the notes
Explain about software product attributes. Explain the 13. Write short
on:

SPM tools
management cycle and SPM framework. project SQA plan b.
Software Project
Z04A Complete TU Solution of CSIT 7 Management .
205
Semester and Practice Sets at least seven deliverables in a software project
M e n

MODEL SET 3 the


What are the four major activities involved in project management?
Explain.

Low
How can we do project monitoring and control? Explain.
Section A Discuss
the role ofcost estimation in software development project.
Attempt any TWO questions. 12
Write
s h o r t notes o n :
1. Outline the contents of Software Project (2 x 10 13
b Earned value
Management plan 20)
a Resource allocation
explain in detail. a.
and
2 Explain in detail about critical path
scheduling method
Explain the various maturity levels of SEl CMM and with examnla
key process areas for each level. also discuss the MODEL SET 5

Section B
Attempt any EIGHT questions. Section A
4 Explain the SPM framework. (8 x5 40)
5. Attempt any
TWO questions. (2x 10 20)
Differentiate between project life cycle and
Comparison between waterfall model with product
6. life cycle. Explain the software engineering problem. What do you mean by
7. Explain objectives of activity planning
the spiral model. software project management? Explain.
8. Explain the Gantt Charts in Scheduling with Diferentiate
9. example. What do you mean by rapid application development?
What are the roles of Software prototyping model.
models and
spiral
10 Explain the function of softwareEngineer
in a project? between
Explain. its tasks and roles.
configuration management.
11 Explain the three modes of the basic 3 Explain the software configuration management and
12 Explain the COCOMO model.
SQA plan with example. Section B
13. Write short notes on:
a. Charge Control b.
Attempt any EIGHT questions. (8x5 40)
Software Quality 4. What do you mean by SPM framework?
5. Explain the product life cycle.
MODEL SET 4 6. Explain the cost-benefit evaluation techniques.
7. Explain the network planning model with example.
What do you mean by resource allocation?
What do you mean by change control?
Section A contract? Mention the different types of
Attempt any TWO questions. 10. Explain the typical terms of
in the team in the software project management.
1. What is project? (2 x 10 20) people and validation? Explain with
Explain different phases of project 11 What do you mean by verification
2.
Explain in the cost benefit planning.
techniques of cost benefits. analysis
in details. example.
Explain the evaluation Write short notes on:
3. 12.
Explain SEI Capability Maturity Model
the Visualizing progress b. Test strategies
(CMM) and SQA plan. a.

MODEL SET 6
Section B
Attempt any EIGHT questions.
4. What do you (8x 5 40)
5.
mean by SPM framework?
Explain the product life cycle. Section A
b. What do you mean (2 x 10 20)
7.
by cash flow forecasting? Attempt any
TWO questions.
Discuss the concept of project management cycle. What are the five competencies
8 PERT/CPM in software project management. 1. Explain the
Explain the QA organizational structure. of project management
skills? Explain
Complete TU Solution of
CSIT 7h
Semester
What are
the
and Proctice Set
and managersfive maturity level of CMM? Seftwrare Project Manogement
207

Mention Dilferentiate betweo ftware quaitv and


its importance.
would require
at least five
examples of software dev etween leaders Detire

aboutSCM
tasks and tools.

development projects that


prototyping. Explain cach of then. Explain
visualiz1ng
Eiplain the vis progress in details with example
Jain the software contiguraion management and its roles
Explainthes
Attempt any ElGHT Section B
Define the terms:questions.
on
short notes
4. Write
Net profit value SPM sottware
and
Explain the role of cost pay-back
estimation in software period.
85 40 Critical Path
Why are
PERT/CPM used in sottware project proiectt development MODEL SET 8
Explain the software management?
quality factors. Explainn
Explain the SEl capabiliy
9. Write the maturity model
(CMM).
of goal software project Section A
10. What are the planning
stages of Team formation TWO questions.
11.
Explain the quality assurance model? Atempt any 21020)
plan What is risk management? Examine the various of risk
12
Explain the program verification components
management.
13 and
Write short notes validation with Explain the various problems with the software
(a) Project schedule
on:
example. explain the advantages and disadvantages of RUUP
project. In your words
(b) Test plan What are the problems encountered during the testing the application
compatibility on different browsers and on different
operating systems?

MODEL SET 7 Attempt any EIGHT questions.


Section B
Sx5 40)
What do you think the
Attempt any TWO Section A are common uses of PERT techrique?
1. What is software
questions. 5. Examine the impact of SWOT analysis on risk management.
from other projects?project
(2x 10 20 6. Make distinctions between CCPM and TPM.
management? How software
project differs
2 Differentiate between
What are the problems associated with traditional projet scheduling?

Explain the strategic


involved in costAssessment and
Examine the impact of project planning iterations on activity plarning
3 Explain the steps benefit analysis? technical assessment. 9 What do you think would be the main factors regarding projert
risk type and also
risks will. explain in details how scheduling?
you managing 10. An inaccurate estimate leads to infeasible plans Discuss

Section B each in detail


Attempt any EIGHT questions. 1. Project work estimation has three phases, explain
s said to e the procadure of
4 List out the activities Explain why program management
used in SPM. 8x 5 40) ongoing interdependent projatts
numerous
managing
. Explain the use of decision tree in Risk
b. Briefly explain about risk planning and Evaluation
7.
7.
Explain the process of collecting the data.controlling.
88. How you can select the right person for the job?
Explain.

You might also like