0% found this document useful (0 votes)
5 views6 pages

Mid2 Imp Qns

The document contains a series of important model questions across various subjects including cybersecurity, building performance, project management, and data processing with MapReduce and Hive. It covers topics such as security policies, phishing, insider threats, mobile device security, energy performance in buildings, and the principles of sustainable architecture. Additionally, it includes questions related to queuing systems, game theory, and the use of Pig and Hive in data processing.

Uploaded by

tejuteja2323
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views6 pages

Mid2 Imp Qns

The document contains a series of important model questions across various subjects including cybersecurity, building performance, project management, and data processing with MapReduce and Hive. It covers topics such as security policies, phishing, insider threats, mobile device security, energy performance in buildings, and the principles of sustainable architecture. Additionally, it includes questions related to queuing systems, game theory, and the use of Pig and Hive in data processing.

Uploaded by

tejuteja2323
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CS IMPORTANT MODEL QUESTIONS

DESCRIPTIVE

1. Describe the importance of implementing security policies for mobile computing devices
within an organization.
2. a. Explain how phishing works and describe the measures that can be taken to prevent
phishing attacks.
b. Describe the steps involved in an SQL Injection attack and outline strategies to prevent
such attacks.
3. a. Explain the concept of insider threats and discuss why they pose significant risks to
organizations.
b. Define incident handling and explain why organizations need incident response systems.

1. Discuss the security implications of managing diverse mobile devices within an


organization.
2. a. Differentiate between software keyloggers, hardware keyloggers, and anti-keylogger tools.
b. What is steganography, and how does steganalysis help in identifying hidden information?
3. a. Describe the key challenges organizations face in maintaining cybersecurity and
protecting privacy.
b. List and explain three best practices for organizations to protect against cyber threats.
1. Explain the threats posed by lost and stolen mobile devices to organizational security.

2. a. Discuss the various types of DoS (Denial of Service) attacks and explain how organizations
can protect against DoS and DDoS attacks.
b. Explain the concept of buffer overflow attacks and discuss methods to minimize buffer
overflow vulnerabilities in applications.
3. a. Discuss the costs of cybercrimes on organizations and the associated intellectual property
rights (IPR) issues.
b. Provide examples of different types of cyber incidents and discuss the potential impact
each type could have on an organization.

OPEN BOOK

1. What are unconventional or stealth storage devices, and why do they pose a threat to
organizations?
2. Discuss the types of viruses, trojan horses, and backdoors, explaining how organizations
can protect their systems from these threats.
3. Analyze the importance of incident response systems in organizations and discuss how
implementing these systems can mitigate the impact of cybercrimes.
1. List and explain two organizational measures for handling mobile device-related security
issues.
2. Analyze the traditional techniques of attacks on wireless networks and describe the
measures required to secure wireless networks from internet theft and Wi-Fi-based frauds.
3. Evaluate the best practices organizations should adopt to enhance cybersecurity and
prevent privacy breaches, considering the organizational and societal impacts of these
practices.
GB IMPORTANT QUESTIONS FOR MID-II
UNIT-III
1. Briefly explain the methods for enhancing thermal performance of a wall in
building system.
2. Write about various ecological walling systems.
3. Discuss any two thermal insulation materials used for a building envelope.
4. How orientation and shading impact the energy performance of a building?
(OBE)
5. Mention some points to optimize the energy performance of a building? (OBE)

UNIT-IV
1. What is the daylight factor? Discuss various day lighting strategies used in green
buildings with a neat sketch.
2. Classify and explain any three passive cooling systems for a green building with
neat sketch.
3. What is Ventilation? Classify and explain the ventilation systems used in green
building.
4. Distinguish between passive and active cooling systems. (OBE)

5. Define water conservation. How to minimize the wastage of water in a building


with green techniques? (OBE)
UNIT-V
1. Discuss about LEED and BREEAM with all of its criterions that to be
considered in a green building certification.
2. Explain about sustainable architecture and urban design with its principles. How
to achieve sustainable urban design?
3. Mention three primary rating systems for green buildings in India, Explain them
with their criterions.
4. What is the impact of energy-efficient building designs on reducing carbon
emissions and their contribution to environmental conservation? (OBE)
5. What are Ecohomes? Discuss how a building can be design as an eco friendly
building. (OBE)
OR MODEL QUESTIONS
1. a. A television repairman finds that the time spent on his jobs has an exponential distribution with 6
mean of 30 minutes. If he repairs sets in the order in which they came in, and if the arrival of
sets follows a Poisson distribution approximately with an average rate of 10 per 8-hour day,
what is the repairman’s expected idle time each day? How many jobs are ahead of the average
set just brought in?
2. a. Consider a modified form of " matching biased coins" game problem. The matching player is 6
paid Rs. 8.00 if the two coins turn both heads and Rs. 1.00 if the coins turn both tails. The non-
matching player is paid Rs. 3.00 when the two coins do not match. Given the choice of being
the matching or non-matching player, which one would you choose and what would be your
strategy?
b. A computer contains 10,000 resistors. When any one of the resistors fails, it is replaced. The 6
cost of replacing a single resistor is Rs.10 only. If all the resistors are replaced at the same time,
the cost per resistor would be reduced to Rs.3.50. The percent surviving by the end of month t
is as follows:
Month 0 1 2 3 4 5 6
% surviving by the end of 100 97 90 70 30 15 0
month
3. a. A company manufacturing plant and equipment for chemical processing is in the process of 8
quoting tender called by public sector undertaking. Help the manager to find the project
completion time to participate in the tender.

b. For an activity in a network the normal duration is 12 days and the normal cost is 2000/-, For 4
the same activity the crash duration is 8 days with crashing cost as 3,200/-. Find the cost slope
of this activity.
4. a. In a municipality hospital Patients arrival are considered to be Poisson with an arrival interval 6
time of 10 mins. The doctors (examination and dispensing) time many be assumed to be
ED with an average of 6 mins, find:
a) What is the chance that a new patient directly sees the doctor?
b) For what proportion of the time the doctor is busy?
c) What is the average number of patients in the system?
d) What is the average waiting time of the system?
5. a. Two player A and B match coins. If the coins match, then A wins two units of value, if the coin 6
do not match, then B win 2 units of value. Determine the optimum strategies for the players and
the value of the game.
b. A pipeline is due for repairs. It will cost Rs.10,000 and last for 3 years. Alternatively, a new 6
pipeline can be laid at a cost of Rs.30,000 and lasts for 10 years. Assuming cost of capital to be
10% and ignoring salvage value, which alternative should be chosen?
a. A project consists of 8 activities named A to H. Construct a network so as to satisfy the 10
scheduling requirements shown in the table below.

6.

Find the least time required to complete the whole project and identify the critical activities.
How is the project completion time affected if? 1. activity F is delayed by 3 days 2. activity E is
delayed by 7 days 3. Activity G is finished 7 days early.

b. Explain the situation where and when we need to use dummy activities. 2

7. a. At public telephone booth in a post – office arrivals are considered to be Poisson fashion with 6
an average inter arrival time of 12mins. The length of the phone call is ED with a mean of
4mins. Determine:
(a) The probability that the fresh arrival will not have to wait for the phone.
(b) What is the probability that an arrival will have to wait for more than 10mins before the
phone is free.
(c) What is the average length of the queue that forms from time to time.
8. a. What are the underlying assumptions of game theory? 6

b. A person is considering to purchase a machine for his own company. Relevant data about 6
alternative machines are as follows:
Machine A Machine B Machine C
Present 10,000 12,000 15,000
investments (Rs)
Total annual 2,000 1,500 1,200
costs (Rs)
Life (Years) 10 10 10
Salvage value 500 1,000 1,200
(Rs)
As an adviser to the buyer, you have been asked to select the best machine, considering 12%
normal rate of return.
You are given that:
a) Single payment present worth factor (pwf) at 129% interest for 10 years (= 0.32).
b) Annual series present worth factor (Pwf) at 129% interest for 10 years (= 5.650).

9. a. A project consists of 4 activities. Their logical relationship and time taken is given along with 8
crash time and cost details. If the indirect cost is Rs. 2000/- per week, find the optimal duration
and optimal cost.

b. Distinguish between PERT and CPM. What is Critical path? 4

*****

1. Universal Bank is considering opening a drive-in window for customer service. Management estimates 2
that customers will arrive at the rate of 15 per hour. The teller whom it is considering to staff the
window can service customers at the rate of one every three minutes. Assuming Poisson arrivals and
exponential service, find:
(i) Average number in the waiting line.
(ii) Average number in the system.
(iii) Average waiting time in line.
(iv) Average waiting time in the system.
2. Briefly explain the important characteristics of the queuing system. 2

3. What do you understand from the term “theory of dominance” in game theory? 4
4. A certain transport company operating in Rajasthan has a fleet of 20 trucks. A truck costs Rs. 175000. 4
From last experience, the transporting company has the following information, what is the optimum
replacement period?
Age of truck in 1 2 3 4 5 6
Years
Operating Cost 15600 20000 27000 45000 85000 98000
(Rs.)
Salvage Value 110000 95000 88000 70000 60000 45000
(Rs.)
5. State the circumstances where CPM is a better technique of project management than PERT 4

6. The following table gives the activities in a construction project and other relevant information: 4

Fixed-cost data for the different project durations are given below:
Duration (in days) Cost in (Rs)
11 1100
10 1000
9 900
8 800
7 700
6 600
5 500
4 400
(a) Draw the network diagram for the project.
(b) Determine the project duration which will return in minimum total project cost.
IMPORTANT MODEL QUESTIONS IBD
1. Inspect the purpose of Shuffling and Sorting phase in the Reducer in Map Reduce
programming for Word count.
2. Illustrate “Map Phase” along with “Combiner Phase” with an example

3. Explain the role of a partitioner in MapReduce, and why is it important


1. Describe PIG Philosophy & Anatomy of PIG.

2. Apply the following in Pig Latin:


i)Tuple ii) Map iii) Filter iv) Distinct
3. Discover the key design principles of Pig Latin.

4. Relate two modes for running scripts in Pig.

5. With a neat diagram explain the Pig architecture in detail?

6. Discuss the Relational Operations of PIG with example.

1 Discuss about Hive Data types. Provide examples of how these data types are used in Hive
tables.
2 (a) Demonstrate the creating, dropping and altering databases ,tables using Apache Hive.

3 Explain in detail about Hive architecture and discuss its advantages over other components with
similar functionalities.
4. Describe the advantages and disadvantages of using RCFile as a storage format in Hive.
5. Compare and contrast Apache Pig and Apache Hive in terms of their use cases, query
languages, and strengths.

6. What are different types of Meta stores? Explain each of them with suitable examples.

*****

1. Discuss a real-world use case where MapReduce-based searching is beneficial?


2. Explain how matrix multiplication can be represented as a series of Map and Reduce tasks in
MapReduce.
3. Consider the student Relation with the following fields Student (Sid:int, name:chararray,
branch:chararray, CGPA:float) and Apply the following Pig operations for the above relation.
i.LOAD
ii.FILTER
iii.FOREACH
iv DUMP
4. Provide a step-by-step explanation of how to perform a word count using Apache Pig. What are the
components of the Pig script for this task?
5. Discuss the significance of file formats in Hive. What are some commonly used file formats in Hive
tables?
6. Create the following using HQL:
i.Create a database
ii.Create a relation Employee (EID, FName, LName, DOB, Salary, Address) with DB properties
Create a static partition on the above relation based on salary.

You might also like