Mid2 Imp Qns
Mid2 Imp Qns
DESCRIPTIVE
1. Describe the importance of implementing security policies for mobile computing devices
within an organization.
2. a. Explain how phishing works and describe the measures that can be taken to prevent
phishing attacks.
b. Describe the steps involved in an SQL Injection attack and outline strategies to prevent
such attacks.
3. a. Explain the concept of insider threats and discuss why they pose significant risks to
organizations.
b. Define incident handling and explain why organizations need incident response systems.
2. a. Discuss the various types of DoS (Denial of Service) attacks and explain how organizations
can protect against DoS and DDoS attacks.
b. Explain the concept of buffer overflow attacks and discuss methods to minimize buffer
overflow vulnerabilities in applications.
3. a. Discuss the costs of cybercrimes on organizations and the associated intellectual property
rights (IPR) issues.
b. Provide examples of different types of cyber incidents and discuss the potential impact
each type could have on an organization.
OPEN BOOK
1. What are unconventional or stealth storage devices, and why do they pose a threat to
organizations?
2. Discuss the types of viruses, trojan horses, and backdoors, explaining how organizations
can protect their systems from these threats.
3. Analyze the importance of incident response systems in organizations and discuss how
implementing these systems can mitigate the impact of cybercrimes.
1. List and explain two organizational measures for handling mobile device-related security
issues.
2. Analyze the traditional techniques of attacks on wireless networks and describe the
measures required to secure wireless networks from internet theft and Wi-Fi-based frauds.
3. Evaluate the best practices organizations should adopt to enhance cybersecurity and
prevent privacy breaches, considering the organizational and societal impacts of these
practices.
GB IMPORTANT QUESTIONS FOR MID-II
UNIT-III
1. Briefly explain the methods for enhancing thermal performance of a wall in
building system.
2. Write about various ecological walling systems.
3. Discuss any two thermal insulation materials used for a building envelope.
4. How orientation and shading impact the energy performance of a building?
(OBE)
5. Mention some points to optimize the energy performance of a building? (OBE)
UNIT-IV
1. What is the daylight factor? Discuss various day lighting strategies used in green
buildings with a neat sketch.
2. Classify and explain any three passive cooling systems for a green building with
neat sketch.
3. What is Ventilation? Classify and explain the ventilation systems used in green
building.
4. Distinguish between passive and active cooling systems. (OBE)
b. For an activity in a network the normal duration is 12 days and the normal cost is 2000/-, For 4
the same activity the crash duration is 8 days with crashing cost as 3,200/-. Find the cost slope
of this activity.
4. a. In a municipality hospital Patients arrival are considered to be Poisson with an arrival interval 6
time of 10 mins. The doctors (examination and dispensing) time many be assumed to be
ED with an average of 6 mins, find:
a) What is the chance that a new patient directly sees the doctor?
b) For what proportion of the time the doctor is busy?
c) What is the average number of patients in the system?
d) What is the average waiting time of the system?
5. a. Two player A and B match coins. If the coins match, then A wins two units of value, if the coin 6
do not match, then B win 2 units of value. Determine the optimum strategies for the players and
the value of the game.
b. A pipeline is due for repairs. It will cost Rs.10,000 and last for 3 years. Alternatively, a new 6
pipeline can be laid at a cost of Rs.30,000 and lasts for 10 years. Assuming cost of capital to be
10% and ignoring salvage value, which alternative should be chosen?
a. A project consists of 8 activities named A to H. Construct a network so as to satisfy the 10
scheduling requirements shown in the table below.
6.
Find the least time required to complete the whole project and identify the critical activities.
How is the project completion time affected if? 1. activity F is delayed by 3 days 2. activity E is
delayed by 7 days 3. Activity G is finished 7 days early.
b. Explain the situation where and when we need to use dummy activities. 2
7. a. At public telephone booth in a post – office arrivals are considered to be Poisson fashion with 6
an average inter arrival time of 12mins. The length of the phone call is ED with a mean of
4mins. Determine:
(a) The probability that the fresh arrival will not have to wait for the phone.
(b) What is the probability that an arrival will have to wait for more than 10mins before the
phone is free.
(c) What is the average length of the queue that forms from time to time.
8. a. What are the underlying assumptions of game theory? 6
b. A person is considering to purchase a machine for his own company. Relevant data about 6
alternative machines are as follows:
Machine A Machine B Machine C
Present 10,000 12,000 15,000
investments (Rs)
Total annual 2,000 1,500 1,200
costs (Rs)
Life (Years) 10 10 10
Salvage value 500 1,000 1,200
(Rs)
As an adviser to the buyer, you have been asked to select the best machine, considering 12%
normal rate of return.
You are given that:
a) Single payment present worth factor (pwf) at 129% interest for 10 years (= 0.32).
b) Annual series present worth factor (Pwf) at 129% interest for 10 years (= 5.650).
9. a. A project consists of 4 activities. Their logical relationship and time taken is given along with 8
crash time and cost details. If the indirect cost is Rs. 2000/- per week, find the optimal duration
and optimal cost.
*****
1. Universal Bank is considering opening a drive-in window for customer service. Management estimates 2
that customers will arrive at the rate of 15 per hour. The teller whom it is considering to staff the
window can service customers at the rate of one every three minutes. Assuming Poisson arrivals and
exponential service, find:
(i) Average number in the waiting line.
(ii) Average number in the system.
(iii) Average waiting time in line.
(iv) Average waiting time in the system.
2. Briefly explain the important characteristics of the queuing system. 2
3. What do you understand from the term “theory of dominance” in game theory? 4
4. A certain transport company operating in Rajasthan has a fleet of 20 trucks. A truck costs Rs. 175000. 4
From last experience, the transporting company has the following information, what is the optimum
replacement period?
Age of truck in 1 2 3 4 5 6
Years
Operating Cost 15600 20000 27000 45000 85000 98000
(Rs.)
Salvage Value 110000 95000 88000 70000 60000 45000
(Rs.)
5. State the circumstances where CPM is a better technique of project management than PERT 4
6. The following table gives the activities in a construction project and other relevant information: 4
Fixed-cost data for the different project durations are given below:
Duration (in days) Cost in (Rs)
11 1100
10 1000
9 900
8 800
7 700
6 600
5 500
4 400
(a) Draw the network diagram for the project.
(b) Determine the project duration which will return in minimum total project cost.
IMPORTANT MODEL QUESTIONS IBD
1. Inspect the purpose of Shuffling and Sorting phase in the Reducer in Map Reduce
programming for Word count.
2. Illustrate “Map Phase” along with “Combiner Phase” with an example
1 Discuss about Hive Data types. Provide examples of how these data types are used in Hive
tables.
2 (a) Demonstrate the creating, dropping and altering databases ,tables using Apache Hive.
3 Explain in detail about Hive architecture and discuss its advantages over other components with
similar functionalities.
4. Describe the advantages and disadvantages of using RCFile as a storage format in Hive.
5. Compare and contrast Apache Pig and Apache Hive in terms of their use cases, query
languages, and strengths.
6. What are different types of Meta stores? Explain each of them with suitable examples.
*****