M.C.A (2020 Pattern)
M.C.A (2020 Pattern)
:
P-3339 [Total No. of Pages : 5
[6027]-11
M.C.A. (Management)
IT 11 : JAVA PROGRAMMING
(2020 Pattern) (Semester - I)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates :
1) Attempt all questions.
2) Figures to the right indicate full marks.
Q1) Each multiple choice question carries half marks. All questions are compulsory.
[10]
i) In java, array elements are stored in __________memory locations.
a) Random b) Sequential
c) Sequential and Random d) Binary search
ii) __________method simply return a string that appropriately describes
on object of your class.
a) getchars( ) b) to string( )
c) to Char Array( ) d) getstring( )
iii) Package P1 contains the following code
package 1;
public class student
{Body of student)
class Test
{Body of Test}
Import P1.*;
Class Result
{student S1;
Test t1;}
This code not compile because.
P.T.O.
a) Class result should be declared public
b) Student class is not available
c) Test class is not available
d) Result body is not fully defined
iv) Which of the following class in Java. io package defines a method to
delete a file.
a) Stack b) File
c) String d) Vector
v) For a valid file object reference, we can create a new file using the following
classes defined in Java. io package
i) File output stream ii) Random Access File
iii) Data Input
a) i and ii only b) ii and iii only
c) i and iii only d) All i ii and iii
vi) What type of servlet use these methods doGet(), doPost(), doHead(),
doDelete(), doTrace()?
a) Generic servlet b) Http servlets
c) All of the above d) None of the above
vii) ITERATOR and LISTITERATOR can traverse over?
a) lists b) HttpServlets
c) All of the above d) None of the above
e) Set
viii) By convention, java packages begin with______ letters while all the class
names begin with an _________ letter.
a) uppercase, uppercase b) lowercase, lowercase
c) uppercase, lowercase d) lowercase, uppercase
ix) An ___________is an incomplete class that requires further specification.
a) Abstract class b) Final class
c) Static class d) Super class
[6027]-11 2
x) Which of the following sub-classes are included in object class in Java:
i) Dictionary ii) Date
iii) Label iv) Thread
a) i, ii and iii only b) ii, iii and iv only
c) i, iii and iv only d) i, ii and iv only
xi) Which of these is a mechanism for naming and visibility control of a
class and its content?
a) Object b) Packages
c) Interfaces d) None
xiii) Which of this access specifiers can be used for a class so that its members
can be accessed by a different class in the same package?
a) Public b) Protected
c) default d) No modifier
xiii) Order of enecution of constructions in Java Inheritance is
a) Base to derived class b) Derived to base class
c) Random order d) None
xiv) Which of the following is/are true statements?
a) A class can extend only one class but can implement many interfaces.
b) An interface cannot extend many interfaces.
c) An interface can implement another interface.
d) An interface can implement a class
xv) Which of the following is false statement about package in java?
a) Package are used for preventing naming conflicts.
b) Providing controlled access : Protected and default have package
level access control.
c) Packages cannot be considered as data encapsulation.
d) None of these
xvi) Which of the following code is used to get an attribute in a HTTP session
object in servlets
a) session. get Attribute (String name)
b) session. alter Attribute (string name)
c) session. update Attribute (string name)
d) session. set Attribute (string name)
[6027]-11 3
xvii) Which of the following are/is advantages of packages?
a) Classes, even though they are visible outside their package, can
have fields visible to package only.
b) Packages avoid name classes
c) We can have classes that are used by the packages, but not visible
outside
d) All statements are correct
xviii)The Java ________ specification defines an application programming
interface for communication between the web server and the application
program.
a) Servlet b) Server
c) Program d) Randomize
xix) What happen in case of multiple catch block?
a) Either super or subclass can be caught first.
b) The super class exception must be caught first.
c) The super class exception cannot caught first
d) None of these
xx) Order of execution of constructors in Java inheritance is
a) Base to derived class b) Derived to base class
c) Random order d) None of these
Q2) a) Write a panel class Eyepanel and any other classes you need, such as
event depending on whether the mouse cursor is above, inside, or below
the eyes. The following three screen shots show the eyes in each of three
positions ; [7]
[6027]-11 4
b) Write a program to draw a house in Java. [3]
OR
a) Write a swing program for designing notepad and performing relevant
actions like cut, copy, select all and etc. [6]
b) Write a program to design login form with proper validation. [4]
Q3) a) Design a following phone book application in JSP for accepting employee
details like: first name, last name, city name and email Id and save it in
database. Perform following operations :- [8]
i) record in database
ii) retrieve all records in database
iii) update a record from database
iv) delete a record from database
b) Differentiate between JSP and servlet. [4]
OR
a) Write a servlet program for accepting student detail. Display proper/
message if invalid data is intered like name left blank and negative phone
number, using MgSQL store the values in the table stud (Name, Address,
Phone, Email) if valid data is entered for all the fields and perform the
various operations like Add, Delete, Next and previous. [8]
b) Explain types of driver in java. [4]
[6027]-11 5
Total No. of Questions : 5] SEAT No. :
P.T.O.
f) What is the type of the algorithm used in solving the 8 Queens Problem?
i) Back tracking ii) Dynamic
iii) Branch & Bound iv) None of these
g) Popping is an act of
i) Adding values
ii) Taking off values from stack
iii) Transferring values from stack
iv) None
h) The optimal data structure used to solve Tower of Hanoi is ________
i) Tree ii) Heap
iii) Priority Queue iv) Stack
i) For a given array, there can be multiple ways to reach the end of the
array using minimum number of jumps.
i) True ii) False
j) Depth First Search is equivalent to which of the traversal in Binary
trees?
i) Pre order ii) Post order
iii) Level order iv) In order
k) A graph in which all vertices have equal degree is known as ________.
i) Complete graph ii) Regular graph
iii) Multi graph iv) Simple graph
l) The time complexity of quick sort is __________.
i) O (n) ii) O (log n)
iii) O (n2) iv) O (n log n)
m) To represent hierarchical between elements which data structure is
suitable?
i) Dequeue ii) Priority Queue
iii) Tree iv) Graph
n) An algorithm in which we divide the problem into sub problem and
then we combine the sub solutions to form solution to the original
problem is known as ________.
i) Brute force ii) Divide and conquer
iii) Greedy algorithm iv) None of these
[6027]-12 2
o) The complexity of linear search algorithm is __________.
i) O (n) ii) O (log n)
iii) O (n )
2
iv) O (n log n)
p) In a Max-heap, element with greatest key is always in the which node?
i) leaf node
ii) first node of left subtree
iii) root node
iv) first node of right subtree
q) In general Backtracking can be used to solve?
i) Numerical problem ii) Graph coloring problems
iii) Exhaustive search iv) Combinational problem
r) In how many directions do Queens attack each other?
i) 4 ii) 3
iii) 2 iv) 1
s) If a problem can be broken into sub problems which are reused several
times, the problem possesses __________ property
i) Overlapping subproblem ii) Optimal substructure
iii) Memorization iv) Greedy
t) Which of the following problems is NOT solved using Dynamic
Programming?
i) 0/1 knapsack problem
ii) Matrix chain multiplication problem
iii) Edit distance problem
iv) Fractional knapsack problem
[6027]-12 3
OR
a) Draw Binary Search Tree for following data. [4]
35, 89, 43, 76, 29, 55, 87, 65.
b) Apply the BFS algorithm to traverse the following graph. [4]
Q4) a) Sort the following data using Mergesort [22, 57, 31, 05, 99, 14, 24].
[4]
b) Apply Prim's Algorithm to obtain minimum cost spanning tree for the
following graph [4]
Q5) a) Find the largest common subsequence for the following string using
Dynamic Programming. [7]
X = [a, b, a, a, b, a]
Y = [b, a, b, b, a, b]
b) Explain fast powering. [3]
OR
a) Consider the given instance of 0/1 knapsack problem.
N = 5, M = 11, P = (1, 6, 18, 22, 28), W = (1, 2, 5, 6, 7)
Using dynamic programming determine the optimal profit and the
solution vector. [7]
b) Explain unique path with suitable example. [3]
[6027]-12 5
Total No. of Questions : 5] SEAT No. :
P.T.O.
vi) ______ combine the features of waterfall model & prototype model.
A) 4GL B) Iterative
C) RAD D) Spiral model
vii) Which phase of RUP is used to establish a business case for the system?
A) Inception B) Transition
C) Construction D) Elicitation
viii) The incremental model is
A) a reasonable approach when well-defined requirements
B) good approach when a working core product quickly
C) not used for commercial projects
D) approach to use projects with large development teams
ix) RAD model has ________ phases.
A) 2 B) 3
C) 5 D) 6
x) RUP stands for _______.
A) Rational Unified Process B) Related Ultrasonic Process
C) Rapid Unified Process D) None of the above
xi) Requirements elicitation means __________
A) Gathering of requirement
B) Understanding of requirement
C) Getting the requirements from client
D) All of the mentioned
xii) Requirement Engineering process includes which at these steps?
A) Feasibility study
B) Software requirement specification
C) Requirement Gathering
D) All of the mentioned
xiii) Which is not a step of requirement engineering?
A) Analysis B) Elicitation
C) Design D) Documentation
[6027]-13 2
xiv) Which of the following is not a type of user interface?
A) Command language based B) Menu based
C) Efficiency based D) Direct manipulation based
xv) Which of the following is golden rule for interface design?
A) Place the user in control B) Reduce user's memory load
C) Consistances D) All of the mentioned
xvi) What are the characteristics of ASD life cycle?
A) Feature based B) Iterative
C) Risk driven D) All of the mentioned
xvii) In Agile model SDLC is carried out in the form of ________.
A) Documents B) Phases
C) Sprints D) Modules
xviii) Agility refers to _______.
A) Allotment B) Advancement
C) Analysis D) Activeness
xix) Spike solution is used to design which part of story card
A) Complex B) Simple
C) First D) Last
xx) _________ is included in SRS?
A) Staffing B) Cost
C) Delivery Schedule D) Design Constraints
Q2) "All about Bikes" is a company dealing in spare parts, would like to change
the existing system to a webbased application. The company has their products
listed on the website through which they receive enquiries. These enquiries
are processed online. The delivery note and invoice are sent by mail.
Write SRS for above case as per IEEE format. [8]
OR
UG college conducts lectures through Learning Management System (LMS)
which has facility to add notes & reference material. College authority has
decided to upgrade LMS by adding new features for conducting examination
& generating result.
Write SRS in IEEE format for the above case. [8]
[6027]-13 3
Q3) a) SPPU has decided to conduct online entrance exam for M.Sc. Following
activities are carried out in this process.
Student has to enrolled on website with their personal and
educational details.
Centers are allotted to students.
Students appear for test at their allocated centers.
Interview schedule is prepared per selected students.
Shortlisted students have to take admission by paying fees &
submitting necessary documents.
Draw use case & class diagram for the above case. [20]
OR
b) i) Draw state transition diagram for semiautomatic washing machine.
[10]
ii) Draw activity diagram for ordering food through zomato. [10]
Q5) Draw a UI for feedback form of 1 day technical workshop on Big data.[4]
OR
Draw a UI for booking CAB to travel within city. [4]
[6027]-13 4
Total No. of Questions : 5] SEAT No. :
P-3342 [Total No. of Pages : 4
[6027]-14
M.C.A. (Management)
IT 14 : OPERATING SYSTEM CONCEPTS
(2020 Pattern) (Semester - I)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates :
1) All questions are compulsory.
2) Draw neat diagrams wherever necessary.
[6027]-14 2
xiii) The loading mechanism in which a certain part of the program is loaded
into the main memory only when it is called by the program, the mechanism
is called as ________.
a) Static loading b) Dynamic loading
c) Random loading d) None of the above
xiv) In the computer system after completion of program execution; an executed
program is known as _________.
a) Program b) Interrupt
c) Process d) None of the above
xv) Which of the following is not an application of real-time operating system?
a) Air traffic control system b) RADAR System
c) Anti Lock Brake Systems d) None of the above
xvi) Which of the queue maintains the list of the processes that are residing in
main memory and are ready and waiting for execution?
a) Device queue b) Ready queue
c) Job queue d) None of the above
xvii) The address of the next instruction to be executed for the current process
is stored in _________.
a) Program state b) CPU registers
c) Program counter d) None of the above
xviii)The characteristics of a distributed file system includes _________.
a) Haring single centralized data repository
b) Service activity is not carried out across the network
c) Users, servers and storage devices are dispersed
d) None of the above
xix) Which of the Linux Ubuntu Command used to delete file
a) erase b) delete
c) rm d) dm
xx) The name of the directory that contains the configuration files in Linux.
a) /bin/ b) /root/
c) /dev/ d) /etc/
[6027]-14 3
Q2) a) What is memory management? [4]
[6027]-14 4
Total No. of Questions : 5] SEAT No. :
P.T.O.
vi) In a peer-to.-peer process, layer 4 on machine A communicates with
layer _________ on machine B.
a) 1 b) 2
c) 3 d) 4
vii) _______________ increases the likelihood of detecting burst enors.
a) Simple parity check b) Two-dimensional parity check
c) CRC d) Check-sum
viii) ARQ stands for ________.
a) Automatic repeat quantization
b) Automatic repeat request
c) Automatic retransmission request
d) Acknowledge repeat request
ix) If the data unit is 101000, the divisor 1001, what checksum to be
appended?
a) 111111000 b) 10000
c) 011 d) 1111111011
x) ___________ is default subnet mask for Class C address
a) 255.0.255.255 b) 255.255.255.0
c) 0.255.255.255 d) None of the Mentioned
xi) A RIP table entry consists of __________.
a) destination network address
b) the hop count to that destination
c) IP address of the next router
d) All of the mentioned
xii) If subnet id is 255.255.255.0 for class B address, then how many bits
are reserved for subnetwork?
a) 2 bits b) 8 bits
c) 6 bits d) 0 bit
[6027]-15 2
xiii) In link state routing, each router receives information directly from
________.
a) Every router on the network
b) Every router less than two units away
c) A table stored on the network hosts
d) Its nearest neighbors only
xiv) Electronic mail uses which Application layer protocol?
a) SMTP b) HTTP
c) FTP d) SIP
xv) FTP is built on _________ architecture.
a) Client-server b) P2P
c) Data centric d) Service oriented
xvi) Caesar cipher is an example of
a) Asymmetric key cryptography
b) Symmetric key cryptography
c) Both Asymmetric and Symmetric key cryptography
d) None of the mentioned
xvii) RSA algorithm is an example of
a) Public key encryption
b) Symmetric key cryptography
c) Both Asymmetric and Symmetric key cryptography
d) None of the mentioned
xviii) Which of the following is not Passive attacks?
a) Modification of message b) Obtaining information
c) Release of message content d) Eavesdropping
xix) In statement “int count\=send(sockid,msg,msgLen,flags);”, count is
a) bits transmitted b) bytes transmitted
c) data transmitted d) None of the mentioned
[6027]-15 3
xx) Server announces willingness to accept the connection using _______
command
a) accept() b) read()
c) write() d) listen()
Q2) a) The received Hamming code word is 101101010. Using odd parity locate
and correct the bit in error.
b) Find the transmitted frame, if a series of 8-bit message blocks - 11100110
is to be transmitted across a data link using CRC for error detection.
The generator polynomial 11001 is to be used.
[10]
OR
a) Generate CRC code for the data word 1010001011 using the divisor
11101.
b) Detect and correct the single error in the received Hamming code word
1011001011 using even parity.
[10]
[6027]-15 4
Q4) a) Explain SMTP protocol in detail.
b) Explain OSPF routing protocol in detail.
[10]
OR
a) Explain DHCP scope resolution protocol in detail.
b) Compare POP3 and IMAP email protocols.
[10]
[6027]-15 5
Total No. of Questions : 5] SEAT No. :
P3344 [Total No. of Pages : 5
[6027]-21
First Year M.C.A (Management)
IT 21-PYTHON PROGRAMMING
(2020 Pattern) (Semester - II)
P.T.O.
f) The command that is used to install a third-party module in Python
is
i) pip ii) import
iii) py iv) install
g) To include the use of functions which are present in the random
library, we must use the option.
i) random.h ii) import.random
iii) import random iv) random.random
h) Which of the following statements can be used to check, whether
an object “obj” is an instance of class A or not
i) obj.isinstance(A) ii) A.isinstance(obj)
iii) isinstance(obj, A) iv) isinstance(A, obj)
i) The members of a class, by default are
i) Public ii) Private
iii) Protected iv) Static
j) What is the syntax to lookup the maruti attribute in an object stored
in the variable car?
i) car → maruti ii) car : : maruti
iii) car. maruti iv) car [‘maruti’]
k) Which character stand for starts with in regex?
i) & ii) $
iii) ^ iv) #
l) Which of the following special characters matches a pattern only at
the end of the string?
i) \B ii) \X
iii) \Z iv) \ A
m) What is the method name to retrieve the list of all active threads?
i) enumerate() ii) threads()
iii) getlist() iv) getThreads()
[6027]-21 2
n) Command to keep thread in sleep mode?
r) The object that is returned after reading CSV file in pandas is ______
[6027]-21 3
Q2) a) Write a program to check if the input year is leap year or not. Validate the
input. [3]
b) Write a program to find the factorial of a number using recursion. [3]
c) What is inheritance? Explain the concept of multiple inhertance with the
help of suitable example. [4]
OR
a) What is tuple? What is the difference between list and tuple? Explain with
example. [3]
b) Write a program to print the sum of natural numbers using recursion.[3]
c) What is inheritance? Explain the concept of multilevel inheritance with the
help of suitable example. [4]
[6027]-21 4
Q4) a) Write a program to validate email address using regular expression. Also
explain the meaning of each and energy special character of the regular
expression used by you in this program. [4]
b) Write user defined exception program in python which will except age as
an input from the user and check whether the user is eligible for voting or
not. If age<18 it should raise the exception as ‘Not eligible for voting’.[4]
c) Write a Note on : Modules and packages in Python. [2]
OR
a) Write a program to validate URL using regular expression. Also explain
the meaning of each and every special character of the regular expression
used by you in this program. [4]
b) Write multithread program, where one thread prints square of a number
and another thread prints cube of numbers. Also display the total time
taken for execution. [4]
c) Explain anonymous function with example. [2]
Q5) a) Create a 5×5 2D numPy array and retrieve bottom right corner 2×2 array
from it. [4]
b) Given a dataFrame df in Pandas as below: [4]
City MaxTemp MinTemp RainFall
Delhi 40 32 24.1
Bengaluru 31 25 36.2
Chennai 35 27 40.8
Mumbai 29 21 35.2
Kolkata 39 23 41.8
Write commands:
i) to compute sum of every column of the dateFrame.
ii) to compute mean of column rainFall.
iii) to compute Median of the MaxTemp column.
iv) to display all column names.
c) Explain constructors in Python. [2]
OR
a) Create a 4×3 numPy array and find it’s column-wise mean. [2]
b) Create a series from a numPy array and find frequency count of unique
items of a series. [2]
c) Create a pandas dataFrame using CSV file and perform a following:
i) Display first 10 rows.
ii) Display list of all columns. [4]
d) Explain operator overloading in Python. [2]
[6027]-21 5
Total No. of Questions : 5] SEAT No. :
P3345 [Total No. of Pages : 5
[6027]-22
F.Y.M.C.A. (Management Faculty)
IT-22 : SOFTWARE PROJECT MANAGEMENT
(2020 Pattern) (Semester - II)
P.T.O.
e) Which of the following option is used to measure the size of a user story
for an Agile project?
i) Story points ii) Function points
iii) Velocity points iv) Work breakdown points
[6027]-22 2
m) Which one of the following can help you in creating a Schedule for the
project even with the provided constraints?
i) MS Word ii) MS Excel
iii) MS Project iv) MS PowerPoint
p) Git is a _________.
i) Localized version control system
ii) Distributed version control system
iii) Centralized version control system
iv) None of the above
q) In Risk management process what makes a note of all possible risks that
may occur in the project?
i) Identification ii) Categorize
iii) Manage iv) Monitor
t) Select the option that suits the Manifesto for Agile Software
Development:
i) Working software ii) Individuals and Interactions
iii) Customer collaboration iv) All of the above
[6027]-22 3
Q2) a) Write Risk Management Process by considering any project you came
across w.r.t. Risk Identification, Risk Analysis and Risk Mitigation. [6]
Q3) a) A new project with estimated 325 KLOC system has to be developed.
For the development of the project following things also required. [6]
i) Volatility of the virtual machine environment is low (0.87)
ii) Product Complexity is High (1.15)
iii) Virtual machine experience is high (1.07)
iv) Complexity of the product is Extra High (0.90)
v) Use of software tools is very high (0.83)
vi) Remaining all drivers are treated as Nominal.
Calculate ;
1) Effort
2) Development time
3) Average staff size
4) Productivity of the product
Q4) a) Explain the roles of scrum master, product owner and development team.
[6]
b) Write a short note on GitHub. [4]
OR
a) Demonstrate value-driven development with suitable example. [6]
b) “Team management drives productivity by getting employees to work
better”. Justify. [4]
Q5) a) Explain the process to plan and execute iteration in agile with suitable
example. [6]
b) Highlight upon Project Management Process. [4]
OR
a) Explain the process of Retrospective, Making Team Decisions and Clos-
ing out Retrospective. [6]
b) “CMM strives to assist organizations in improving the quality of their
software development through implementation of processes”. Comment.
[4]
[6027]-22 5
Total No. of Questions : 5] SEAT No. :
P.T.O.
vii) What does the fs module stand for?
a) File Store b) File Service
c) File System d) None of the above
Viii) Which NodeJS object specifies the name of the directory which contains
the code?
a) _dirname b) Buffer
c) _filename d) None of the above
ix) Which of the following is the correct syntax for writing Angular
expressions?
a) (expression) b) {{expression}
c) {{{expression}}} d) [expression]
x) How to start Node REPL on command line?
a) $ node start b) $ node
c) $ node repl d) $ node console
xi) What is the use of Angular Controllers in the application?
a) Angular controllers are used for controlling the data.
b) Angular controllers are used for displaying the data.
c) Both of the above are correct.
d) None of the above is correct.
xii) Which command will show all the modules that are installed globally?
a) $ npm ls-g b) $ npm ls
c) $ node ls-g d) $ node ls
xiii) Which statement is commonly used for printing the PHP output?
a) write b) php.write
c) log d) echo
xiv) Which is not a valid variable name in PHP?
a) $age b) $_age
c) $PersonAge d) $1age
[6027]-23 2
xv) What is the difference between Indexed array and Associative array in
PHP?
a) Index array has numeric index while associative array has named
keys
b) Index array has numeric index while associative array has named
keys and numeric index both
d) Index array has numeric index while associative array has one or
more arrays
a) array() b) arr()
c) new_array() d) _array()
xvii) Which PHP global variable is used to collect form data after submitting
an HTML form with method="post"?
a) $_GET b) $_REQUEST
c) $_POST d) $_ENV
xix) Which variable is used to collect form data sent with both the GET and
POST methods?
a) $_BOTH b) $REQUEST
c) $_REQUEST d) $BOTH
a) count($variable) b) len($variable)
c) strcount($variable) d) strlen($variable)
[6027]-23 3
Q2) a) Explain types of CSS? Elabourate using external CSS example. [5]
b) Write a program using <SVG> tag to draw line, rectangle and triangle
shapes. [5]
OR
c) Describe <video> tag with all its properties of with example. [5]
d) Write CSS for paragraph tag: border 1. color-blue, font size-20, font
name- arial, padding 50px. [5]
[6027]-23 4
Total No. of Questions : 5] SEAT No. :
P-3346 [Total No. of Pages : 5
[6027]-24
M.C.A. - I (Management)
IT - 24 : ADVANCED DBMS
(2020 Pattern) (Semester - II)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates :
1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q1) Write the correct option or fill in the blanks of the following questions
(each ½ mark) [20 × ½ = 10]
i) If in redundant file common fields are not matching then it result in ______.
a) Inconsistency b) Duplication
ii) Ability to change the internal schema without affecting the conceptual
schema to achieve ________ data Independence.
a) Logical b) Physical
c) Analytical d) Conceptual
a) Transition Dependency
b) No Transition Dependency
c) Relational Dependency
d) No Relational Dependency
viii) The Transaction can be read as well as the writes the data item with a
_______ lock.
a) Shared b) Exclusive
c) Read d) Write
ix) NoSQL database are is used mainly for handling large volume of _____
data.
a) Unstructured b) Structured
[6027]-24 2
x) Which of the following is not NoSQL database?
a) Cassandra b) Mongi DB
c) SQL server d) None of the above
xi) The Architecture that is easy to load balance is
a) Shared disk Architecture
b) Shared Nothing Architecture
c) Shared Memory Architecture
d) None of the above
xii) The core principle of NoSQL is
a) High availability
b) Low availability
c) Both high and Low availability
d) None of above
xiii) The method of synchronizing concurrent task is
a) Synchronization b) Locking
c) Speed up d) None
xiv) 2 phase Locking which includes growing phase and ________.
a) Shrinking phase b) Release phase
c) Commit phase d) Aquire phase
xv) A sql query with location transparency needs of specify ______.
a) Fragment b) Location
c) Loctal formats d) All of the above
xvi) Roll back of transaction is normally used to
a) recover from Transaction failure
b) update the transaction
c) retrieve old records
d) repeat a transaction
[6027]-24 3
xvii) In log based recovery, the log in sequence of _________.
a) filter b) records
c) block d) numbers
xviii)Which of the following in not a recovery Technique _______.
a) Deferred updates b) Immediate updates
c) Two phase commit d) Recovery Management
xix) In cryptograph, what is cipher
a) Algorithm for performing encryption & decryption
b) Encrypted manage
c) Both (a) and (b)
d) Decrypted Manage
xx) A Schedule in which each transaction in Execution automatically is called
a _______.
a) Non-serial schedule b) Serial schedule
c) Parallel schedule d) Non parallel schedule
OR
[6027]-24 4
Q3) a) What are the problems of traditional file system? How it is overcome by
using DBMS. [5]
OR
a) What is Data Independence? Explain it's type with proper diagram. [5]
OR
a) What is Log based recovery? Discuss the deferred and immediate database
modifications. [5]
Q5) Explain Inter-operational and Intra - operational parallelim with suitable example.
[10]
OR
State two phase commit protocol. Discuss the implications of a failure of the
coordinator of some Participants. [10]
[6027]-24 5
Total No. of Questions : 5] SEAT No. :
P3347 [Total No. of Pages : 7
[6027]-25
F.Y.M.C.A. (Management)
MT - 21 : OPTIMIZATION TECHNIQUES
(2020 Pattern) (Semester - II)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Use of statastical table and non programmable calculator is allowed.
3) Figures to the right indicate full marks.
j) Which of the following criterion is not used for decision making under
uncertainty
i) Maximin ii) Minimax
iii) Maximax iv) Minimize expected loss
n) Total time required to complete all the jobs in a job sequencing problem
is known
i) elapsed time ii) idle time
iii) processing time iv) processing order
[6027]-25 2
o) Shortest possible time in which an activity can be achieved under ideal
circumstances is known as_______.
i) Pessimistic time estimate ii) Optimistic time estimate
iii) Expected time estimate iv) Most likely time estimate
p) The difference between expected profit under conditions of risk and ex-
pected profit with perfect information is called________.
i) EvPI ii) EMI
iii) EV iv) None of these
q) Game theory models are classified by the
i) no. of players ii) sum of payoff
iii) no. of strategies iv) all of these
r) The condition that system can be in only one state at any point in time is
known as
i) Transient state ii) Absorbent condition
iii) Mutually exclusive condition iv) Collectively exhaustive condition
s) Objective function of linear programming problem is
i) Constraint ii) Function to be optimized
iii) Relation between variables iv) None of these
t) Full form of PERT is
i) Program evaluation & Rate technology
ii) Program evaluation & Robot technique
iii) Project evaluation & robot technology
iv) Program evaluation & review technique.
Q3) a) Small project consist 7 activities whose time estimates are as follows[6]
Activity Estimated Duration (weeks)
(i-j) Optimistic Most likely Pessimistic
(1-2) 1 1 7
(1-3) 1 4 7
(1-4) 2 2 8
(2-5) 1 1 1
(3-5) 2 5 14
(4-6) 2 5 8
(5-6) 3 6 15
Determine:
i) Draw network diagram & identify critical path.
ii) Identify critical activities & duration of project.
iii) Determine probability of completing project in 13 weeks.
Acceptance
Product Full Partial Minimal
Good 8 70 50
Fair 50 45 40
Poor –25 –10 0
Determine optimal decision under
i) Maximax
ii) Maximin
iii) Minimax regret criteria
OR
[6027]-25 4
Q3) a) The time & cost estimates of different activities are as given below. [6]
Activity Time(weeks) Cost (Rs.)
(i-j) Normal CRash Normal Crash
(1-2) 3 2 300 400
(2-3) 3 3 30 30
(2-4) 7 5 420 580
(2-5) 9 7 720 810
(3-5) 5 4 250 300
(4-5) 0 0 0 0
(5-6) 6 4 320 410
(6-7) 4 3 400 470
(6-8) 13 10 780 900
(7-8) 10 9 1000 1200
Indirect cost is Rs. 50 per weeks.
i) Draw the net work & identify critical path.
ii) Crash relevant activities systematically & find optimal project dura-
tion & cost.
b) Market share of brands A, B & C are 50%, 30% & 20% customers shift
their brands in matrix as below. [4]
From To
A B C
A 50% 30% 20%
B 20% 70% 10%
C 20% 20% 60%
Find:
i) Transition matrix for brands.
ii) Find share at the end of period 1 & 2.
[6027]-25 6
Q5) a) Distribution of demand for books has been found following information.
[4]
Demand 15 16 17 18 19 20 21 22
No. of Copies 0.05 0.08 0.20 0.45 0.10 0.07 0.03 0.02
a) A confectioner sells items past data of demand per week is given below.
[4]
Demand in (kg) 0 5 10 15 20 25
Probability 0.04 0.22 0.16 0.42 0.10 0.06
Generate demand for next 10 weeks & average demand per week using
random numbers-
78, 99, 43, 62, 44, 2, 67, 32, 54, 75
b) Explain the terms: [4]
i) Degenerate solution.
ii) Float.
[6027]-25 7
Total No. of Questions : 5] SEAT No. :
P3348 [Total No. of Pages : 4
[6027]-31
Second Year M.C.A. (Management)
IT-31 : MOBILE APPLICATION DEVELOPMENT
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicates full marks.
Q1) Multiple choice Questions. For each of the multiple type questions, choose
the correct answer. [10]
a) Which section provides a key component called Dalvilc virtual machine.
i) Libraties ii) Android Runtime
iii) Application Framework iv) Application
b) Android is based on which kernel?
i) Linux ii) Windows
iii) Mac iv) Redhat
c) Choose the correct option regarding activity in android
i) An activity is a window that contains the user interface of your
application
ii) An Application can have zero or more activities
iii) An application can have only one activity
iv) Option i & ii are correct
d) Which of the following is a dialog class in android
i) Alertdialog ii) Datepicker Dialog
iii) Progress Dialog iv) All the above
e) What is manifest xml in android
i) It has information about layout in an application
ii) It has all information about an application
iii) It has information about activities in an application
iv) It has information about Java classes in an application
f) What does ES6 stands for ?
i) ECMAScript 6 ii) ECMA 6
iii) ECMA JavaScript 6 iv) E Javascript 6
P.T.O.
g) Which of the following is built in database of android
i) SQLite ii) MySQL
iii) Oracle iv) Mango Db
h) Which of the following class in android displays information for a short
period of time and disappean after sometime
i) Toast class ii) Log class
iii) Maketest class iv) Main class
i) Which method is called when SQLite database needs to be upgraded
i) on update () ii) onupgrade ()
iii) onupgrade Data () iv) UpdateAll ()
j) _____means it will occupy the complete space available on the display
of the device
i) wrap-content ii) match-content
iii) match-parent iv) wrap-parent
k) What method you should override to use Android menu system?
i) On create option Menu () ii) On create Menu ()
iii) On create context Menu () iv) On Menu created ()
l) What is Dart?
i) Both ii and iii
ii) Dart is a object-oriented programming Language
iii) Dart is used to create a frontend user interfaces
iv) None of the above
m) Which of the following command is used to create a react app?
i) Install -g create-react-app
ii) npm install create-react-app
iii) npx create-react-app veactapp
iv) None of the above
n) The method that is called to clean up any Resources used by service is
_____
i) Stopself ( ) ii) Onstop ( )
iii) On Destroy () iv) Stop Service ()
[6027]-31 2
o) RPC in web services stands for
[6027]-31 3
Q2) Explain window Architecture with a neat diagram [6]
OR
Explain Android Architecture with a neat diagram [6]
[6027]-31 4
Total No. of Questions : 5] SEAT No. :
P3349 [Total No. of Pages : 5
[6027]-32
Second Year M.C.A. (Management)
IT-32 : DATA WAREHOUSING AND DATA MINING
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Draw neat labelled diagrams wherever necessary.
Q4) a) Apply FP-Growth tree algorithm to construct FP-Tree & find the frequent
item sets. Consider following data set with minimum support 30%. [5]
TID List of Items
1 Apple, Mango, Cocount, Banana
2 Banana, Berries, Coconut, Mango, Chikoo
3 Berries, Coconut, Dates, Grapes
4 Watermelon, Coconut, Mango
5 Apple, Banana, Chikoo, Dates
6 Apple, Berries
7 Apple, Coconut, Grapes, Banana
8 Mango, Watermelon, Coconut
9 Banana, Mango, Coconut
b) Consider the data set from Q4) a) and calculate support & confidence
of following item sets. [5]
i) { Apple, Coconut }
ii) { Apple, Coconut, Banana }
iii) { Mango, Watermelon }
iv) { Coconut, Berries }
v) {Banana, Mango, Coconut }
OR
[6027]-32 4
Q4) a) Consider following data set and find the frequent item sets with minimum
support count 2 using Apriori Algorithm. [5]
TID Items
T1 Hot Dogs, Buns, Ketchup
T2 Hot Dogs, Buns
T3 Hot Dogs, Coke, Chips
T4 Chips, Coke
T5 Chips, Ketchup
T6 Hot Dogs, Coke, Chips
b) Consider same data set in Q4) a) & generate association rules
[minimum 3] [5]
Q5) a) Write K-mean clustering algorithm and apply on the following data set to
group it into two clusters. [5]
D = ( 0.5, 0.7, 0.9, 0.6, 0.4, 0.3, 0.10, 0.12, 0.14, 0.16, 0.35, 0.36, 0.11,
0.45, 0.58)
b) How KNN algorithm work? [5]
OR
Q5) a) D = { 14, 13, 15, 16, 16, 19, 20, 35, 37, 39, 40, 41, 50, 56, 72, 17, 18, 12,
24, 22, 21 }
K = 3 C1 = 13, C2 = 20, C3 = 50
Apply K-mean clustering. [5]
b) Explain Agglomeratire and divisive clustering mechanism. [5]
[6027]-32 5
Total No. of Questions : 5] SEAT No. :
P3350 [Total No. of Pages : 2
[6027]-33
M.C.A. - II (Management)
IT - 33 : Software Testing and Quality Assurance
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q1) a) Write a detailed test plan for online grossary ordering mobile application.
The application functionalities are registration, login, check items, price,
delivery time etc. [6]
b) Write the test cases for above application. [4]
Q2) a) Write the test cases for testing username and password to use email
account. [5]
b) Write data flow control analysis for following. [5]
i) var i, x, sum
ii) i=0
iii) sum = 0
iv) Input (x)
v) while (x ! = 0)
vi) sum = sum + x
vii) i=i+1
viii) Input x
ix) End while
x) print (sum)
Q3) What do you mean by software quality assurance? Explain SQA activities.[10]
OR
Explain s/w quality factors and software quality metrics. [10]
P.T.O.
Q4) a) Explain verification and validation in software testing. [5]
b) What are levels of testing? Explain in detail. [5]
OR
a) What is Test Driven Development (TDD)? How TDD is performed? [5]
b) Compare Black Box and White Box testing. [5]
[6027]-33 2
Total No. of Questions : 5] SEAT No. :
P3351 [Total No. of Pages : 5
[6027]-34
Second Year M.C.A. (Management Faculty)
IT - 34 : KNOWLEDGE REPRESENTATION
AND ARTIFICIAL INTELLIGENCE : ML , DL
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) For MCQ select appropriate choice from options given.
3) From Q.2 to Q.5 having Internal choice.
4) Figures to the right indicate full marks.
[6027]-34 2
m) The most common Neural networks consist of_______ network layers.
i) 1 ii) 2
iii) 3 iv) 4
n) Which layer is the most important layers where features extraction take
place, and adjustments are made to train faster and function better.
i) Input layer ii) Output layer
iii) Hidden layer iv) None of these
o) Which strategy does not prevent a model from over-fitting to the training
data?
i) Early stopping ii) Dropout
iii) Data Augmentations iv) Pooling
Q4) a) Explain the use of Long Short Term Memory (LSTM). [4]
[6027]-34 5
Total No. of Questions : 5] SEAT No. :
P3352 [Total No. of Pages : 4
[6027]-35
S.Y. M.C.A. (Management)
IT - 35 : CLOUD COMPUTING
(2020 Pattern) (Semester -III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q1) Write correct option (or) filling the blanks of following questions.[each ½ Mark]
a) Broadly divide the cloud Architecture into?
i) 2 ii) 3
iii) 4 iv) 5
b) Which of the following is Type - 1 Hypervisor?
i) Windows River simics ii) Virtual server 2005 R2
iii) KVM iv) Lynx secure
c) Which of the following runs on Xen Hypervisor?
i) Azure ii) AWS E2
iii) AWS EC3 iv) All of the mentioned
d) Which of these is Identity in I AM?
i) Groups ii) Users
iii) Roles iv) All of the mentioned
e) Which of the following services that need to be negotiated in service
Level Agreement ?
i) Logging ii) Auditing
iii) Regulatory compilance iv) All of the mentioned
f) The technology used to distribute service requests to resources is referred
to as ______.
i) CND ii) CDN
iii) CWD iv) All of the mentioned
[6027]-35 1 P.T.O.
g) IAM group :
i) Is same as IAM users
ii) Can be used to specify permission for a collection of users
iii) Is truly an identity
iv) All of these
h) Which of the following is more sophisticated load balancer ?
i) Workload managers ii) Workspace managers
iii) Rackspace managers iv) None of these
i) Which of the following service provider provides the least amount of
built in security.
i) SAAS ii) PAAS
iii) IAAS iv) All of the mentioned
j) Which of the following combination is possible in websphere ESB?
i) XML/JMS ii) SOAP/JMS
iii) SOAP/HTTP iv) Governance
k) What is the correct formula to calculate the cost of a cloud computing
development
i) Cost CLOUD = (unit cost CLOUD/ Revenue + cost CLOUD)
ii) Cost CLOUD = (unit cost CLOUD/ Revenue – cost CLOUD)
iii) Cost CLOUD = (unit cost CLOUD× Revenue – cost CLOUD)
iv) None of the mentioned.
l) What are the features of docker
i) Easy Modeling ii) Version control
iii) Placement /Affinity iv) All of the mentioned
m) Docker was developed in ____ .
i) 2012 ii) 2014
iii) 2013 iv) 2015
n) How many different protocol types are required for message passing in
SOA.
i) 2 ii) 4
iii) 1 iv) 3
[6027]-35 2
o) What ports does Docker registry use ?
i) Port 3000 ii) Port 5000
iii) Port 8000 iv) None of the mentioned
p) An application that provides for transaction overflow in a reservation
system is an example of _____.
i) Cloud computing / bursting ii) Cloud provisioning
iii) Cloud servicing iv) All of the mentioned
q) Which of the following software can be used to implement load balancing?
i) Apache mod - balancer
ii) Apache mod-proxy- balancer
iii) F6’s BigIP
iv) All of the mentioned
r) Which of the following essential object in WSDL is used to support
messag transfer?
i) Bus ii) Type
iii) Binding iv) None of the mentioned
s) Data stored in _____ domains doesn’t require maintenance of a schema.
i) “Simple DB” ii) SQL server
iii) Storage iv) Hardware
t) Implementing ___ scanner is a tool that can scan an entire system for
known vulnerabilities.
i) Malware ii) Vulnerability
iii) Worm iv) Virus
Q2) Describe in detail about cloud service Models & Deployment models
with example’s. [10]
OR
Describe in detail about cloud computing, cluster computing & Grid
computing with suitable example. [10]
[6027]-35 3
Q3) a) What is Hypervisor & explain its types with example. [5]
[6027]-35 4
Total No. of Questions : 5] SEAT No. :
P3353 [Total No. of Pages : 5
[6027]-41
Second Year M.C.A. (Management)
COMPUTER MANAGEMENT
421 : IT41-DevOps
(2020 Pattern) (Semester - IV)
P.T.O.
c) Iaas stands for?
i) Internet as a solution
ii) Infrastructures as a solution
iii) Infrastructure as a service
iv) Internet as a service
d) IaC stands for.
i) Infrastructure as a Code
ii) Infrastructure as a Commit
iii) Infrastructure as a Concept.
iv) Infrastructure as a Configuration
e) Which of the following is not a hypervisor provider
i) VM Ware ii) Oracle virtual Box
iii) Virtual win iv) Microsoft virtual pc
f) Which of the following is a DevOps toolset?
i) Docker, Chef, Maven, Git
ii) MS-Office, Windowns10, Power DVD.
iii) Mozilla FireFox, Thunderbird, Outlook
iv) Tor, Bitwarden, Ubuntu10.10
g) The Creater Git its :
i) Dennis Ritchie ii) Benjamin Franklir.
iii) Steve jobs iv) Linus Torvalds
h) Linux architecture consist of
i) Unix, Core, Mantle, Shell
ii) Hardware, Kernel, Shell, Applications
iii) Os, User, Input device, Output device
iv) DB, Backend, Frontend and Load Balancer
i) This linux command tells the name of the user currently logged in?
i) Who are you ii) Whoami
iii) What is your name iv) Username
[6027]-41 2
j) The Command “PWD” is used to:
i) Reset the password of the user
ii) Display the passwords of the user
iii) Password protect a file
iv) Print working directory.
k) Which of the following OS does Docker run on ?
i) Linux ii) Windows
iii) Mac OS iv) All of the above
l) Which Maven plugin creates the project structure?
i) Dependency ii) Properties
iii) Archetype iv) Execution
m) What are the useful plugins in Jenkins?
i) Maven 2 Project ii) Amazon EC2
iii) HTML Publisher iv) All of the above
n) Which of the following types of version Control Systems?
i) Local Version Control Systems
ii) Distributed Version Control System
iii) Centralized Version Control Systems
iv) All of the above
o) Which of the following statements Defines feature flags?
i) Feature flags define which part of an app are deployed during
the build process.
ii) Feature flags define the capabilities for various versions of an
application.
iii) Feature flags are place holders for future functionality for an
app.
iv) Feature flags allow you to show or hide features in an app
[6027]-41 3
p) Indentify the methodologies does least impact the establishment of
DevOps methodology?
i) Waterfall software delivery
ii) Lean Manufacturing
iii) Continuous Software Delivery
iv) Agile Software Delivery.
q) Who is known as the father of DevOps?
i) Liam Debois ii) Patrick Debois
iii) Walter Dandy iv) None of these
r) Which of the following is not a part of develops life cycle_______.
i) Code ii) Plan
iii) Build iv) Operating
s) _______ is something that is used for streamlining the development
and deployment process.
i) Continuous Delivery ii) Continuous Integration
iii) Continuous test iv) Continuous Intervention
t) ______ is a combination of multiple pieces working together to
become an automation tool.
i) Bugzilla ii) Chef
iii) Ansible iv) Git
Q2) a) Explain SDLC Models, Lean, ITIL and Agile in details. [6]
b) Write a short note on configuration management. [4]
OR
a) Write the RPM and YUM installation in details. [6]
b) Differenciate between DevOps & Agile. [4]
[6027]-41 4
Q3) a) What is the difference between Git and Gittlub? [4]
b) Explain: [6]
i) Creating the branches
ii) Switching the branches
iii) Merging the branches of git
OR
a) Differentiate between CVCS and DVCS. [4]
b) Explain 7C’s of DevOps with suitable diagram. [6]
[6027]-41 5
Total No. of Questions : 6] SEAT No. :
P-3354 [Total No. of Pages : 4
[6027]-42
M.C.A. (Management)
422 : BM - 41 : PPM AND OB
(2020 Pattern) (Semester - IV)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates :
1) Draw neat diagrams wherever necessary.
2) Q.2 to Q.6 carries 8 marks each.
P.T.O.
vi) The worst approach to conflict resolution is :
a) to want to win
b) to week a win
c) to asses your own mind set first
d) to see yourself as a team
vii) ____________ is known as “the father of scientific management”.
a) Fredrick W. Taylor b) Henry Fayol
c) Robert Owen d) None of the above
viii) The perceptual component of attitude is called ______.
a) cognition b) conation
c) affect d) all of the above
ix) Organizational behavior is_______.
a) A science b) An art
c) A science as well as an art d) None of the above
x) Who said, “Management is a multiple purpose organ that manages a
business, manages a manager and manages workers and work”?
a) Harold Konntz b) Peter Drucker
c) Anonymous d) Kenneth O ‘Donell
xi) The factor(s) coming under philosophy of scientific management is (are):
a) Co-operation b) Maximum output
c) Harmony d) All of the above
xii) ________, weakness, threats, opportunities are the long form SWOT
analysis
a) Strength b) Weakness
c) Threats d) Opportunities
xiii) Whose feelings and difficulties should the manager know for direction to
become effective?
a) Subordinates b) Family
c) Society d) Management
xiv) Non programmed decisions are most likely to be made by:
a) middle management b) lower management
c) top management d) supervisory management
[6027]-42 2
xv) What does situational theory of leadership emphasize?
a) Personality traits b) Events
c) Environment d) Political situation
xvi) “Planning is theoretical whereas controlling is practical”
a) True b) False
xvii) The ________ leadership style is an expression of the leader’s trust in
the abilities of his subordinates.
a) Participative b) Delegative
c) Authoritarian d) All of the above
xviii)Following is (are) the assumption(s) of Theory X.
a) Workers hate to improve their efficiency
b) A worker prefers to get directed by others
c) No worker is ready to accept any responsibility
d) All of the above
xix) _______ emphasizes the importance of workers in the accomplishment
of enterprise objectives.
a) Theory X b) Theory Y
c) Theory Z d) None of the above
xx) Herzberg’s Theory of work motivation is also known as
a) Maintenance theory of motivation
b) Motivation-Hygiene theory
c) Two factor theory of motivation
d) All of the above
[6027]-42 3
Q3) Define Decision making with its environment under certainty and under
uncertainty with suitable diagram. [8]
OR
Compare Scientific Management by Taylor and Administrative Management
by Foyle with suitable example in detail.
Q4) As a Project Manager in one of the reputed MNC IT companies how you can
create an effective team and resolve the issues/conflicts among the team
members? Also being a leader discuss Qualities of Leadership. [8]
OR
As Project Manager of multinational company how you elaborate about the
organizational structure and how it should be discuss it with suitable example.
Q5) What is Stress Management? Describe various sources and types of stress.
How Yoga and Meditation is useful for stress management explain it with
example. [8]
OR
Ms. Vandana got a job in an IT organization. Her co-workers knew a little
about her and in this context the unknown and hidden areas will be larger and
the open area will be small. As the others don’t know much about her the blind
spot also will be smaller. Design the Johari window for the same and explain it
in detail with suitable diagram
[6027]-42 4