Mbaebooks.de

Mba Notes , Articles , Books , Projects

sales@mbaonlinepapers.com sales@mbaonlinepapers.com

sales@mbaonlinepapers.com sales@mbaonlinepapers.com

Sunday, 06 December 2015 04:59

REFRIGERATION and AIR CONDITIONING

REFRIGERATION & AIR.CONDITIONING


1 Answer any two of the following :
(a) List some 
applications of air conditioning .
(b) With a simple sketch explain 
the working of a vapour compression refrigeration system.
(c) Explain briefly some applications for reciprocating and centrifugal compressors.

2 Answer any two of the following :
(a) What is the significance of the Carnot 
refrigerator ?
What are the practical difficulties in devising a Carnot refrigerator ?
(b) What is a Cascade Refrigeration System ? Compare this system with multistorage compression and 
evaporation

3 What is the working substance in air conditioning? Would you call it a pure substance ? How do you 
calculate its molecular mass ?

4 Answer any two of the following:
(a) Define
(i) Dew point temperature
(ii) Dry bulb temperature
(iii) Wet bulb temperature
(b) What do you understund by marine relrigeration and how is it different from truck refrigeration ?
(c) It is proposed to use a reversed Carnot engine as a refrigerator. The unit consumes
10 kW power. If the COP is 3.5, determine the refrigeration capacity of the unit.

5 Answer any two of the following::
(a) What are the important Factors Which govern the choice of a r?frigerant?
(b) How do tho following two.factors inflicnco 
the performance of a vapour-compressioni refngeration system?
(1) Suction vapour- superheat
(2) Liquid subcooling

6 What are the difierent types of compressors ued in industry ? write in short working system of any one type of compressor?

7 Define refrigerant. State desirable chemical propeeties of a good refrigetant?

8 What are the differences between:
(i) Refrigertion and Heat pump system
(ii) Natural convection condenser and Forced air circulation condenser
(iii) Primary and secondary refrigerants

9 Write in brief on 
Comfort Air-conditioning?

10 What do you understand by martine refrigeration and how is it different from truck refrigeration?

11 What are the parameters required to be controlled for air conditioning ?

12 How is summer air conditioning different from winter air conditioning ?

13 What is the function of condenser in refrigeration system ? Write short notes on 
air cooledcondenser.

14 Define primary refrigerant. State thermodynamic properties of a good refrigerant?

15 What are the factors contributing to food spoilage ?

16 What are the different types of refrigeration systems used for refrigeration trucks and trailers ?

17 How do the parts of an ammonia absorption system compare with those of a vapourcompression system ?

18 What is ton of refrigeration ? List some applications of air conditioning.

19 What do you understand by transport refrigeration ? What types of refrigeration systems are used for transport refrigeration ? Explain with examples.

20 What are the various factors which are contributing to food spoilage ? List the
causes of food spoilage.

21 What is refrigerating effect ? How refrigeration helps in the preservation of
food products ?

22 What are the 
temperature and humidity conditions required for the comfort air
conditioning ? Explain.

23 What is condenser ? What are the various types of condensers ? Explain working principle of water cooled condenser.

24 What is a refrigerant ? List some common refrigerants. Also describe the various desirable properties of Refrigerants.

25 What is a ceased refrigeration system ? Compare this system with multistage compression andevaporation systems.

26 What are the conditions for Highest COP. Explain the effects on P-h diagram?
27 What are different types of condensers used in refrigeration ? Explain the working of Evaporative condenser.

28 What are the different types of Evaporators ? Explain in short any one type of Evaporator.

29 Discuss the desirable thermodynamic, chemical and 
physical properties of
refrigerants.?

30 What are different steps in food preservation ?

31 Describe various types of Freezers.?

Saturday, 05 December 2015 11:33

Financial market

EQUITY MARKETS

1. Discuss the role of Securities and Exchange Board of India (SEBI) in regulating the Financial markets in India. Also briefly explain the major achievements of SEBI since its inception.

2. What is a 'financial market' ? Discuss the components of Indian Financial Markets and

explain how are they interlinked with each other ?

3. What is meant by Book Building process of Public Issues ? What are the different steps involved in the issuance of equity shares through this process ? Discuss its advantages also.

4.Explain the process of order execution in a stock exchange. Discuss the different types of order execution followed in Stock Exchanges in India.

5.What is meant by dematerialisation of securities ? Explain the process of dematerialisation of securities and the benefits of the 'Depository System'.

6.What are 'Generally Accepted Accounting Principles (GAAP) ? Identify the major internationally accepted principles for accounting norms. Briefly, discuss the institutions and organisations which are associated with the development of the Indian GAAP.

7.What do you mean by 'Fundamental Equity Valuation' ? Explain briefly the Discounted Cash Flow techniques used in such valuation.

8. What is the importance of an investment philosophy ? Discuss different investment styles that are adopted by the investors while investing in stock market.

9.Describe the types of derivatives. Discuss the features of OTC derivatives markets. What are the uses of these derivatives ?

10. What are swaps ? Differentiate between different types of swaps with the help of suitable examples.

11. What are call and put options ? Illustrate with an example. Discuss the different factors which determine the movement of option prices.

12. What is the need and purpose of hedging ? Explain the different types of option strategies for hedging.

13. What is a Commodity Derivatives Exchange ? Describe briefly the different commodityderivatives Exchanges in Asia.

14.Discuss briefly various types of orders placed by exchange members based on price related conditions and time related conditions in a commodity exchange.

15. What are the basic characteristics that have to be met by an article or a product in order to qualify as a commodity for future trading ? Discuss the various benefits of trading in commodityderivatives.

16. Briefly discuss the different base metals in the world. What are the factors that impact the prices of base metals ?

17.Explain the structure of sugar industry in India and discuss the importance of sugar as a major agricultural commodity.

18.. Explain the following with suitable examples :

Contango and Backwardation

Basis and Basis risk

19. What do you mean by 'Arbitrage' ? Explain the concepts of cash and carry Arbitrage and Reverse cash and carry Arbitrage with the help of examples.

20. Why are 'Warehouse Receipts' dematerialised ? Briefly explain the process of dematerialisation of warehouse receipts of commodities and mention the entities that are involved in this process ?

21. Explain the different types of demat accounts opened by the depositors of commodities ?

22. What are the features of foreign exchange markets and how do they compare with otherfinancial markets ?

23. Explain spot and forward rates and the factors determining forward margins.

24.What is a currency option ? What are its types ? What are the factors that impact the pricing of an option ? Discuss.

25. Discuss the various techniques of currency exposure management.

26. What do you mean by Repo ? What are its uses ? How is it priced ? What are the different types of Repos ?

Saturday, 05 December 2015 11:31

Investment management

What is Investment management

Investment management involves first making an 
investment decision and next protecting and promoting the Capital value of such investments. In this process, there is need for makinginvestment analysis at two levels namely at macro level- market analysis.

Market analysis involves the analysis of the market 
trends of some indicators like prices, volume of trade etc. Company analysis comprises of the study of companys fundamentals in terms of its operational and financial results. Then the analysis should extend to comparison of the companys performance with that of the industry to which it belongs and the market as a whole.

Components of Investment Management

Chart I shows what is investment and its components namely:


(a) Investment analysis,
(b) Investment decision making
( c ) review and monitoring of investment based on research.

The study of fundamentals will reveal the industry and the 
companies to invest in while the study of technicals will tell us the timing of purchase and sale decisions.

There are four types of decisions which an investors can make , which are explained below briefly:

(a) Buy Decision :
When investment analysis shows that a 
company share price is undervalued in terms of the fundamentals and expectations of the company relative to other companies in the same industry, its share recommended to be bought.
(b) Sell Decision: When investment research reveals that a company share is overvalued in the market, relative to its fundamentals, and expectations based on some norms like P/E 
multiple, book value or present value of discounted cash flows etc. then that share is recommended to be sold.


( c ) Hold decision : when research shows that a companys future performance is uncertain and fundamentals and the market do not reveal any reliable trend, then a hold decision has to be taken.
(d) Average Up/Down : when the market trend is against your position, say you want to sell, when the market price is falling then small doses of purchase have to be effected to average down your price per share. On the reverse side, if you want to buy, but the market price is countinuing to rise, instead of falling as expected by you, then slow doses of sales have to be made to average up your price per share.

Saturday, 05 December 2015 11:28

Options trading

OPTIONS TRADING 

What is Options

It is a 
derivative security used for the purpose of risk management in the investment market, based on some security. Futures, forwards, swaps, options etc., are all examples of hedge against risk. Investors are risk averse and want to reduce the risk. Individuals and corporations have a strong urge to reduce or manage risk and this is secured by trading in derivative markets.

The volatility in share prices require to be hedge. Thus, the larger the volatility the larger is the hedging demand. This is secured through the options and futures. Thus the volume of futures or options can cause higher or lower volatility in underlying share/securities. These are all tools for risk management and no correlation is empirically found for options to increase or reduce volatility of shares prices


Characteristics of Options

Derivatives have many distinctive characteristics.

1. Their origin is from some other security, commodity or reference point, (such as indexes.)
2. They are instruments of hedge against risk of undue volatility.
3.They are leveraged instruments for risk management based on original security or instrument.

Calls and puts

The two major type of stock options are calls and puts. A call gives the investors the right to purchase 
100 shares of a particular stock at a fixed price until a specific date. An investor who purchases a call option locks in a price on 100 shares of stock for a predetermined time. A put option gives an investor the right to sell 100 shares of a particular stock at a fixed price until a specific date. A put in a price at which to sell stock rather than a price at which to buy stock. Both puts and c alls provide the investor with the right, but not the obligation, to use the option. Stock options are created, or written, by other investors who wish to earn income from selling the options. The writers then become obligated to sell (if a call has been sold) or purchase (if a put has been sold) the stock if and when the owner of the option decides to exercise the put or call.

Puts and calls derive their values from the values of the stock that they can be used to sell or purchase. Stock options pay no dividends or interest and expire without any value if not used by the expiration date. The value of call option is directly related to the value of the underlying stock(i.e. the option value increase when the stock value increase) and the value of a put is inversely related to the value of the underlying stock (i.e., the option value increase when the stock value decrease ). Option values are also affected by the time remaining until expiration, the price volatility of the underlying common stock and the market rate of interest.


Types of Derivatives

The security or 
asset classes on which the derivatives depend are :

(1) Debt or Bonds, (2) Equities ,(3) Indexes, (4) Commodities, (5) Currencies.

Options vs. Badla 

The age old method of badla financing facilities the carry forward transactions in the stock market and serves almost the same purpose of helping speculation and imparting greater volume and better liquidity , as in the case of options. In both methods, no delivery of securities is envisaged and both depend on some underlying securities traded on cash/delivery basis. Then why do SEBI and other influential sources advocate the substitution of badla by options in India? Their perception is that badla adds to spec ulation and it is better to separate the speculative market from real investment market, so that genuine investors are protected from the effect of excessive speculation. Options would have the same effects and objectives as badla trading. Both increase liquidity, cater to the instinct of speculation and provide a hedge against risk. Both are tools of risk management and based on some rules and regulations, margins and other terms.


The differences between them and the advantages of options over Badla may be set out as follows:

The risk can be limited and kept with in a range both in upward and downward direction in the case of options. Transparency in operations is possible due to well organized trading in contrasts in options. No manoeurvrability of terms, margins, expiration dates and no flexibility in operations are possible. Cash outlay is limited to the premiums paid and risk taken can be kept in limits. But once the contract period is over the right to nexercise option ceases and no advantage can be taken of any favourable change in price. But in the case of badla, money lending is used as a tool. There is flexibility of margin fixation, and in fixation of carry forward prices. Badla terms can be bargained and the trader has the chance to adjust his purchase and sale position depending on the price movements after settlement, which is not possible for the option purchaser once the contract period is over.

Thus, options and badla have both 
advantages and disadvantages. The edge of options over badla will come in due to electronic trading possible through the use of computer network and this will also ensure greater transparency to trading in options. Otherwisw the time tested method of badla is by itself not inferior as a method of facilitating speculative trading and to increase the volume of trade and liquidity in the securities markets.

Saturday, 05 December 2015 11:12

COMPUTER FUNDAMENTALS

COMPUTER FUNDAMENTALS

1. (a) Convert the following decimal numbers to binary equivalent :

(i)  39.37

(ii)  206.66

Add the numbers given in (i) and (ii) and convert the result into hexadecimal.

(b) Simplify the following Boolean function using four variable Karnaugh's map in

product of sum form :

F(A, B, C, D)=1;(0, 1, 3, 5, 7, 11, 15).

Also, draw the logic circuit for the simplified expression.

(a)Assume rotational speed of a disk is 3600 rpm, the disk has 125 sectors/track

and 512 bytes/sector. What is the data transfer rate and average latency time of the disk system.

(b)What makes the cache memory fast ? Explain different types of mapping techniques used incache memory organisation.

(e) Write the contents of the conditional flags  of the flag register of the 8086 microprocessor after subtraction of A and B is performed. Assume value of two 8 bit

numbers A and B are 11001100 and 00111001 respectively.

2. (a) Draw the logic diagram of 3 bit synchronous counter. Also, explain its working.

(b) Define the following terms :

(i)  Instruction Register

(ii)  Interrupts

(iii)  Interface

(iv)  Fetch cycle

(v) Multiplexer

(c) Which of the categories of Flynn's 3 classification suits parallel processing. Explain.

3. (a) What are Bit - Slice ALUs ? What is a main advantage of such ALUs.

(b) Explain the following Mnemonics of 8086 Instruction set, with an example of each.

(i)  XLAT

(ii)  DA A

(iii)  CMPS

(iv)  ROL and RCL

4. (a) Explain any four addressing modes with the help of an example each.

(b)  Explain the functioning of R-S flip-flop. How does J-K flip-flop overcome the

problem of RS flip-flop ?

(  c  )  Design and Explain an arithmetic pipelining 6 for floating point addition or subtraction. Show with a flow chart.

5. (a) Give at least three differences between each of the following :

(i)  Static dataflow and dynamic dataflow computers.

(ii)  Multiprocessors with crossbar switch and Multiprocessors with multipost

memory.

(iii)  Horizontal micro instructions and Vertical micro instructions.

(b)  Explain the problem of cache coherence in  multiprocessor system.

(  c  )  How does synchronisation take place in the  multiprocessor system ?

5 .What is the purpose of error detection  and correction code ? Explain the process of error correction through Hamming code.

 Explain function of following commands :

(i) XLAT

(ii) LEA

(iii) xcHG

(iv) POP

6   . (a) What is meant by assembler directives ? Explain the function of the following directives:

      (i) EQU

      (ii) ASSUME

       (iii) END

      (iv) DUP

8. (a) Make diagram and explain pipeline processor.

(b) What is the purpose of addressing modes ? Explain modes in detail.

 9. Write a short note on each of the following :

(i) Microprogramming

(ii) Microprogramcounter

(ii| Microinstruction sequencer

(iv) Bit-slice CPU

(v) Hardwired control unit

9  .  (a) Write an assembly program to reverse a 6 string stored in data segment. The reversed string should be stored at the same location where the original string was stored.

 (b)  Convert the BCD number 732.58 to the 4 following :

 (i)  Binary number

 (ii)  Octal number

 (iii)  Decimal number

 (iv)  Hexadecimal number

(  c  )Design a combinational circuit that accepts a 4-bit binary number and generates an output '1' only when the input number has odd number of Ts otherwise the output is '0'.

(d) Explain the use of 'IDIV' and 'AAS' 5 instructions with the help of an example of each for 8086microprocessor.

(e) What is the role of a stack in handling the 5 interrupts ? What is the difference between the stack and normal read/write memory.

(f) Explain the Flynn's classification of 4 computers.

10  .  (a) Show that NAND gate is a functionally 5 complete set of gates.

(b)  Explain the difference between memory 4 mapped I/O and I/O mapped I/O.

(c  )  Give an example of the addition of two 6]  floating point operands using an arithmetic pipelineshow all the steps involved.

11.  (a) What is the need of many addressing modes 5 in a machine ? Give four addressing modes that must be present in a machine. Justify your selection.

(b) What is the need of a control unit ? Explain 6 the basic structure of this with the help of a diagram. Also, give one disadvantage of a hard wired control unit.

(c  ) Draw the logic diagram of a master-slave 4 flip flop using R-S flip flop and explain its working.

12.  (a) Explain the basic functioning of multiplexer 8 and demultiplexer. Design a circuit of 3 x8 demultiplexer using two 2 x 4 demultiplexer.

(b) Explain any four characteristics of a RISC 7 processor. What are the advantages of using largeregister file ? Explain this with the help of a diagram.

13 .  (a) What is a vector instruction ? Explain briefly the need of an array processor in the execution of a vector instruction.

(b) What is cache coherence ? Why is it important for shared memory

multip'rocessor systems ?

( c  )  List the differences between :

(i)  Constant Angular Velocity and Constant Linear velocity disk.

 14.. (a) Perform following subtraction using 2's compfement t

 (i) 1101100 - 1011001

(ii) 1100011 - 1100r0

(b) Differentiate between direct and indirect address instruction. How many memory references are required for each type of instruction to bring an , operand into a processor register ? E:<plain.

(c) Write an 8086 assembly language program to contJert a twodtgit BCD number passed in

Aecumulator (AX) to its binary equivalent. I

(d) Simplify the following expression using K-maps in sum of product form :

F (w, x, y, z) = n (5, 10, 12, 13, 14) Also, draw the logic circuit for the simplified

expression.

(e) Convert (3333)n to her<adecimal number.

(fl Draw the logic diagram oI Gbit a.len pari$ checker. Explain its operation with the help of truth table.

15  . (a) How is a RISC processor better than a CISC processor ? Justify 5our answer.

(b) What is the difference between control flour and data flow computers ?

(c) What is the purpose of making data flow graph ? Mahe data flow graph for U = ( A * ( A + B ) - ( A + B ) , z B

(d) Give two differences between decoder and demultiplexer.

16. (a) An 8-bit register Rl contains 10101010. What should the value of the register R2 be such that the most signiticant 4-bits of Rl are

(i) selectivelycleared

(ii) selectively set

(iii) masked

(iv) selec6vely complemented ?

Show the resulting operations.

(b) List {our zubctcles of an instruction cycle. Also list the 'arious micro-operations of these subcycles.

(c) Compare Static RAM with Dynamic RAM.

16. (a) Find the length of SEC code and SEC DED code for the follorvtng 15 bit data sequence :

1010 0101 1010 0101

h) Draw the diagram and explain the working of a JK master slave flipflop. How does its working differ from simple JK flipflop ?

(c) How is an index register related to the auto-increment mode of addressing

17. (a) Why does DMA have priorig over ihe CPU when both requesi a memory transfer ?

(b) Make the logic diagram of a 4-bit serial shift register  using JK flipflops. Show the steps to shift the binary number 1101, through this register'

(c) Give an example of the addition of two floating point operands using an arithmetic pipeline'Show all the stens involved.

18  . (c) Write an assembly language (8086) . 7 program to find the total number of

occurrences of the characters 'rsrr and rrrnrl in an array of characters stored in the

memory.

(d) An 8-bit data 1100 1010 is transmitted to a distant location. It is received as 1.110 1010. Explain how SEC code would detect this error.

(e) 'Perform following subtraction using L's complement :

(i) 11001010 10101101

(ii) 10011011 11000111

(f) What are the problems which prevent RISC pipetining to achieve maximum speed?

19. Explain the working of Ripple Counter. Also, draw a 3 bit ripple counter using a

suitable flip flops.

(b) Consider the following code  : 

a - b - d

b - d * e

c : b + f

Draw the data flow graph for the above equations.

(c) Explain the following addressing modes with an example of each.

(i) Base addressing scheme

(ii)   Index addressing

(iit) Stack addressing

(iv) Register addressing

20  (a)   Explain the use of 'AAA'&'DAA' instructions with the help of an example

eackr, for 8086 microprocessor.

(b) Draw any two DMA configurations and explain the advantages and disadvantages of these configurations.

.

(c) Design a floating point number format as

per following specifications :

Base : Binary

Mantissa : 20 bit long

Exponent : Cah hold 1gt2a

Find the maximum and minimum value for the proposed presentation. How will zero

be represented in the format propose d by you ? Make suitable assumptions, if any.

21  (a)  .Compare any four features of a RISC processor to a CISC processor ?

(b) List four subcycles of an instruction cycle. Also, list the various micro-operations of

any two of these sub cycles.

( c  )  Why ROM is considered as a combinational circuit although it is a permanent memory ? How is a ROM will different from that of RAM ?

22.(a) Write a program in 8086 assembly language to multiply two 16 -bit integers.

(b) What is bus arbitration ? Explain the Daisy Chaining and Polling Bus Arbitration

methods with the help of diagrams for each.

(c) What is the need of an interrupt in a computer system ?

23.  (a) Simplify the following expression using Karnaugh's map in product of sum form :

F (W, X, Y , Z',)= I (0, 1, 2, 3, 4, 6, 7 , g, g,11, 15) Also, draw the logic circuit for the simplified

expression.

(b)  Subtract 1010100 - 1000011 using 2's complernent.

(c) Convert 2222in hexadecimal number.

(d) Write an 8086 assembly language program to convert a 4-digit octal number to its decimal

equivalent

(e) List the registers that are used by the ALU to ,perform various tasksAlso, explain how these registers are used.

(f) What is a cache memory ? Explain about multiple levels of cache.

(g) Differentiate between RISC and CISC architectures.

24. (a)   Explain the DMA controller with block diagram. What is meant by a block transfer ?

(b)  What are the various phases of an instruction cycle ? Give the micro operation of :fetch and decode phases

Compare Static RAM with Dynamic RAM.

25 .(a)  Using NAND gate generate the AND and NOR functions.

(b) What is meant by "addressing mode" ? Explain why the different addressing modes are required. Explain any two addressing modes that need no address field at all. Givg suitable example for each.

(  c )  Explain the principles of vector processing. Also, explain various types of vector instructions and their execution.

26.  (a) Explain the direct and associative cache mapping.

(b)   Write a program in 8086 assembly language to find the user specified number in a list of 15 numbers which is stored in a specific location.

(  c  )  Write down the method of converting a binary number into its Gray Code equivalent. Also, give an example.

27.  (a) Design a 4-bit shift register, which is capable of shifting its binary information in both the directions aloqs with the facility of parallel loading.

(b) Diifferentiate between a hardwired control unit and a micro programmed control unit.

(c) What is the difference between a memory mapped I/O and a peripheral mapped l/O ?

(d) Draw the circuit diagram of RS flip flop and explain its working.

(e) Di fferentiate between MISD and SISD classification of computers as suggested by Flynn.

28.  (a)  Draw the logic circuit only after simplifying ? the following expression using K-Map:

 (b) Convert (1224)s to octal number .

 (c) Write an assembly language (8086) . program to find the total number of

occurrences of the characters 'rsrr and rrrnrlin an array of characters stored in the

memory.

(d) An 8-bit data 1100 1010 is transmitted to a 7 distant location. It is received as 1.110 1010. Explain how SEC code would detect this error.

(e) 'Perform following subtraction using L's complement :

(i) 11001010 10101101

(ii) 10011011 11000111

(f)  What are the problems which prevent RISC pipetining to achieve maximum speed?

29  .  (a) Explain the working of Ripple Counter. Also, draw a 3 bit ripple counter using a

suitable flip flops.

(b) Consider the

a - b - d

b - d * e

c : b + f

Draw the data flow graph for the above equations.

(c) Explain the following addressing modes

with an example of each.

(i) Base addressing scheme

(ii)   Index addressing

(iii)   Stack addressing

(iv)   Register addressing

30  .  (a)  Explain the use of 'AAA'&'DAA' instructions with the help of an example

eackr, for 8086 microprocessor.

 (b) Draw any two DMA configurations and explain the advantages and disadvantages

of these configurations.

 (c) Design a floating point number format as per following specifications :

Base : Binary

Mantissa : 20 bit long

Exponent : Cah hold 1gt2a

 Find the maximum and minimum value for the proposed presentation. How will zero

be represented in the format propose d by you ? Make suitable assumptions, if any.

31.  (a)    Compare any four features of a RISC  processor to a CISC processor ?

 (b) List four subcycles of an instruction cycle. Also, list the various micro-operations of

any two of these sub cycles.

( c ) Why ROM is considered as a combinational circuit although it is a permanent

memory ? How is a ROM will different from that of RAM ?

 32.  (a)  Write a program in 8086 assembly language to multiply two 16 -bit integers.

 (b) What is bus arbitration ? Explain the Daisy Chaining and Polling Bus Arbitration

methods with the help of diagrams for each.

(c) What is the need of an interrupt in a computer system ?

Saturday, 05 December 2015 11:03

INTRODUCTION TO SOFTWARE

INTRODUCTION TO SOFTWARE.

 1. (a) Design an algorithm and draw a 6 corresponding flow chart to convert binary

number to hexadecimal number.

(b)Write a shell program to find Greatest 6 Common Divisor (GCD) for the two given

numbers.

(  c  ) Compare and contrast the disk space management methods, the linked list with

Bitmap method.

(d) Construct context-free grammar for conditional expression in "C" language.

(Example : x = (y < z) ? y : z;)

(e) Explain the differences between internal and external fragmentation.

 2. (a) Explain the differences between the following :

(i) Third generation and fourth  generation languages.

(ii)  Function and subroutine.

(iii) Compiler and Interpreter.

(iv)  Discuss the functionality and 4 implementation of two pass assemble:.

3. (a) Discuss the similarities and differences  between paging and segmentation.

(b) What is the basic philosophy of X-Windows ? How is it different from the

rest of GUIs ?

 4. (a) Define UNIX command for the following :

(i)  To count the number of users who are currently logged in.

(ii)  To change the password.

(iii) To shut down the system at a particular time.

 (iv) To print the file names and their file

sizes in the current directory.

(v) To terminate the particular process.

 (b) List the major activities performed in the development of a software product. Also

mention the limitations of the development cycle.

 5. (a) Explain the important features of CASE tools.

(b) What are conditions that characterize deadlock ? Explain the occurrence and

avoidance of deadlock graphically among 3 processes and 3 resources.

 6 . (a)  Write a shell program to find the greatest prime number less than L00.

 (b) Consider the following processes in the ready queue; assuming that all processes

entered the queue at the same time

Calculate the average turnaround time and average waiting time by using :

(i)  Round Robin (quantum:2) algorithm

(ii) SIF scheduling algorithm.

( c  ) What is Compiler ?   Explain the Compiler design phases in brief.

(d) Explain the qualities of software product and process in brief.

(e)Write a brief note on demand paging and segmentation

(b) Write qualities and key attributes that are essential for a system analyst. What is a

CASE tool and how it is relevant in software engineering ? Give examples.

 

 8.  (a) What is loader? Explain different loading schemes in brief.

 (b)  Give features of UNIX environment.

 

9.  (a) Explain the following UNIX commands :

(i)  tee

(ii) cat

(iit) comm

(i") pwd

(b) Explain the file and directory structure in UNIX. Draw diagrams in support of your

answer.

 10.  (a)  Write a short note on 4GL. What are its limitations ?

 (b) Write short notes on nny two of the following :

(i) Access lists for file protection

(ii) System maintenance

(iii) Integration testing

( c  )  Suggest (with examples) any 2 requirement gathering techniques.

10 . (a) Explain Prototyping model in detail. What 8 is the difference between unit testing and integration testing ? Explain with the help of suitable examples

(b) Write a shell program to calculate the  average marks and percentage of a student in five subjects.

(  c  ) Explain different types of operating systems  and give one example for each.

(d) Explain the steps and tasks performed by a  two - pass assembler. Write one advantage of single - pass assembler over two – pass assembler and vice - versa.

 11 .(a)  What is the criteria to select a CASE tool ? Explain any two CASE tools.

 (b) What do you mean by feasibility analysis ?  Explain different categories of feasibility analysis in brief.

 12 . Write down UNIX commands for the following operations :

(i) To save the output of a command in a file

(ii)  To change the password of a user.

(iii) To kill a running process.

(iv) To list down the files and directions.

(b) What is dynamic memory allocation ? What  is the advantage of dynamic memory allocation over static memory allocation and vice - versa ?

(  c   )  Explain UNIX file system in brief.

13. (a) Draw the architecture and explain any four key features of X - WINDOWS.

(b) How is a directory in WINDOWS  categorised in terms of its file structure ? Give diagrams.

14. . (a) Write an algorithm and draw a flowchart to find the greatest prime number less than 512.

(b) What is a deadlock ? Explain essential  requirements or conditions for deadlock to occur.

15  .   (a) Design an algorithm and draw a corresponding flow . chart to check whether a given year is a leap year or not. 7

(b) Ust the conditions that characterize a deadlock. Explain the occurence and avoidance of deadlock

   graphically among 3 processes and 3 resources

(d) What is a debugging system ? Describe the functions and capabilities of an interactive debugging sysiem.

16  . (a) Define the main differences between Network operating system and Distributed operating system.

 (b) Construct a Context Free Grammar for the following

'C' statements : 6

(i) fuithmeticExpression

(ii)   For Loop

 17  . "[n multiprogramming environment, sharing of code and data can greatly reduce the real storage needed by a group of process€s to run efficiently." For each of the following gpes of systems, outline briefly how sharing can be implemented :

(i) Partition

(ii) Paging

(iii) Segmentation

18 .   (a) What is a system call ? Give four different examples  of system calls in UNIX operating system

. (b) Write a shell program to display the alternate digits in a 4 digit decimal number. 5

(example:5694

- 5, 9 are altemite digns

 6, 4 are alternate digits)

 19  .  (a)  What is the basic purpose of program control ? Explain the significance of Gantt chart and PERT charts with an example for each

(b) What is the basic philosophy of X-Windows ? How is it different from rest of the Guls

 20. (a)   Describe with the help of an example, the macro facility and its implementation

within an assembler.

(b) Consider the following processes in the ready queue (at the same time).

C-alculate the average tumaround time and average waiting time for the processes given by:

(i) FCFS

(ii) RR (quantum=2)

 (c) Explain the principle of the following Non-contiguous Allocation schemes :

(i)  Linked allocation

(ii) Indexed allocation

(d) Write a shell program to find the average marks secured by a student in 5 subjects.

(e) Give notes (in brief) on :

(i) vi editor

(ii) Next software

21  .   (a) Give UNIX commands for :

(i)  to kill the last background job ?

(ii) delete all files in the current directory and subdirectory.

(iii) to go to end of line in vi editor.

(b) What is the role of a System Analyst in Software Engineering ?

(  c  )   Describe the role of 4GUs in the applications development.

 22.  (a) Write an algorithm and draw a corresponding flowchart to reverse a given

4diglt number.

(b) With the help of a neat diagram, explain the address translation scheme in a

segmented system.

23  . (a) Explain various mechanisms (atleast two) to protect a file in a multi-user environment.

With the help of a suitable example for eactu explain the features and objective of the

following:

(i)  Gantt chart

(ii) PERT chart

24  .  Give a brief note on file and directory  structure in UNIX.

Write short notes on a?ry tuto of the following:

(i)  Virtual Memory

(ii) Pipes and Filters in UNIX

(iii) X-Windows

25 . (a)

Design an algorithm and draw a corresponding flq,v chart to generate the fibonacci series.

(b) Write a shell program directorie s / files existing us€r. to count the number of in a gir,ren directory by the us€r.

(c) Explain the concept of Demand paging. Also, discuss the implementation of demand paging scheme with

the help of a diagram.

(d) Mention the general principles of systems investigation and also explain all the stages of systems

investigation.

26.  . (a) Write context free grammar (CFG) for a "Goto statement" and "For loop" in C language.

(b) What is meant by Segmentation ? With the help of a diagram, explain the address translation scheme in

a segmentation system.

27  .  . (a) Explain the use of the following UNIX commands, their syntax and an example for each :

(i) nohup

(ii) cp

(iii) mv

(iv) rmdir

(v) cal

(b) What are Fourth Generation Languages (4GL's) ? How do thny help to solve the problems ? Also, mention their limitations.

28  .(a)   Write a shell program to check whether the given substring' is existing in the string or not

(b) Exlain the following  Disk scheduring argorithms with

(i) FCFS

(ii) Shortest seek time first scheduling

(iii) Scan scheduling

29  .  (a)   Explain the functional overview of the Macintosh toolbox. List any two applications which can be run on this O/S.

(b) With the help of an example application, explain the client /server model.

30  .   (a) Explain the working of a 2-pass assembler in detail .

(b) Write a shell program to copy the contents of fileT to anothe r f ileZ. Also write an algorithm for it.

(c) Explain the client-server model with the help of an example application

(d) Explain the following concepts in UNIX with an example for each :

 (i) filters

(ii) pipes

(iii) file permissions

(e) Explain various stages of systems investigation

 31  .  (a)  Explain the concept of 'Bufferins' with the help of a digram.

(b) How can compaction be a solution for the external fragmentation problem in memory management ?

Illustrate with the help of an example.

33. (a)   Explain with suitable examples r :

(i) inodes

(ii) file structure in UNIX

(b) What do you understand by syntax and sernantic analysis ? Explain in detail.

34. (a) What is 4GL ? What are its limitations ? How can 4GLs help in solving the software problems ?

 (b) Define the following I.JNIX commands

(i) echo

(ii) cat

(iii) ls

(iv) cc

(v) admin

35. (a) List and explain the mechanism to support the file protection in multiuser environment.

(b) Lisl and explain any five important qualities of a software product.

36  . (a) The contents of four 8-bit registers AL, BL, CL and DI- in hexadecimal notation are F2, Fn 89 and EA respectively. What will be the values of these registers after executing the following

micro-operation sequence :

Note  :  If you haue taken any ossum ptions, mention them

(b) * Write a program in assembly language (8086) that calculates the sum of and storeS the sum of the above series in a user defined data item.

(c) What is a multiplexer ? Design and explain the functioning of a 4 x 1 multiplexer by giving its truth table, logic diagram and block diagrarn.

(d) Design a 4 bit arithmetic circuit using 4 full adders and 4 multiplexers for carrying, out the frollowing micro-operations

(i) Add

(ii) A,Cd with carry

(iii) Subtract

(iv) Subtract with borrow

(v) Transfer

(vi) Increment

Note :  Mention the ossum ptions made, if any.

37. (a)  Draw the block diagram of INTEL 8086 microprocessor and explaln the two functional units

(Bus Interface Unit and the Execution Unit).

(b) With the help of a block diagram explain the polling implementation of a system bus.

38.  ( a  )  Define Vector processing and Vector computers. Mention at least 4 applications of vector processing. Explain the vector instruction format with the help of an example.

(b) Write a program in 8086 assembly language to sort a given list of 'n' integers.

 39 . (a) With the helP of an example,explain  RISC  Pipelining.

 (b) with the help of the truth-table and logic diagram, explain the functioning of a D-flip-flop.

 39. Explain the following along with their usage :

 (i) HYPercube interconnection

(ii) Cache coherence

(iii) SPARC architecture

(iv) Wilkes Control Unit

(v) Decoder

Operating System Concepts and Networking Management

  

(1) What are the Goals of Computer Security'?

(2) Justifj, the following statement.  There is no confidentiality without integrity"

(3) ldenitify computer assets in your organisation.

(4) Identify threats to assets listed in progress 1 above.

(5) Identify the impact of security attack listed in 2 above.

(6) Distinguish between vulnerability and threat.

(7) List any three recent computer security failures.

(8) Do you currently apply any computer security control measures? If so,what?Against what  attacks are you trying to protect?

(9) Discuss various security systems and facilities.

(10) What is computer-security classification?

(11) What do you understand by symmetric and asymmetric cryptography?

(12)  Give the default order of group policy implementation through Active Directory service hierarchy.

(13) Is it possible to set up encryption on a compressed folder?

(14) When should security groups be used instead of distribution groups?

(15) If the domain mode is switched over from mixed mode to native mode, what are the   implications?

(16) If a remote access client wants to connect to RAS server but connection is not allowed how         will this error be solved?

(17) Write the purpose of VPN and name VPN technologies supported by Windows 2000?

(18) What is the purpose of a directory service in Windows 2000?

(19) In what mode does the console run?

(20) How does a domain differ from a workgroup?

(21) In a multi-user environment while printing, how can the possibility of a user ending up with a       wrong document be avoided?

(22) Can a single document be redirected on a network?

(23) When do DCHP clients try to renew their leases?

(24) Can moving and copying files and folders between disk volumes change their compression   state?

(25) What type of data is replicated by FRS?

(26) What is the default permission when a partition is formulated with NIFS?

(27) Name various methods of authentication available in windows operating system.

(28) Describe kerberos management in windows operating system.

(29) Describe policy inheritance.

(30) What do you understand by VPN? Discuss IPSec security ?

(31)  Discuss in detail EFS (Encrypting File System) ?

(32) What do you understand by a null session? How null session can be disabled?

(33) List the steps for disabling the Last username option.?

(34) What are limitations ofthe domain model?

(35) What do you understand by PDC and BDC?

(36)  What is Active Directory?

(37) How will you secure guest account?

(38) What do you understand by Windows 2000 DNS?

(39) What are the Goals of Computer Security'?

(40) Justifj, the following statement:  There is no confidentiality without integrity?

(41) ldentify computer assets in your organisation.?

(42) Identify threats to assets listed in progress 1 above.?

(43) Identify the impact of security attack listed in 2 above.?

(44) Distinguish between vulnerability and threat.?

(45) List any three recent computer security failures.?

(46) Do you currently apply any computer security control measures? If so, what?Against what   attacks are you trying to protect?

(47) Discuss various security systems and facilities.?

(48) What is computer-security classification?

(49) What do you understand by symmetric and asymmetric cryptography?

(50) Find liow to force a file system consistency check.

(51) What happens if a user logs out after you have started writing to him?

 


(52) What is meant by being in invisible mode in Yahoo Messenger?

(53) How do you being chatting with a friend?

(54) What would you want to buzz a friend?

(55) What are the different status massages that you can show others?

(56) How can you save a transcript of the conversation you have had with a friend?

(57) What happens if you try to cat a non-existent file?

(58) Can you look at tlie listing of a directory if you do not liave search permission on it? Why?

(59) Which of the commands you have learnt so far are filters?

(60) How will you count the number of all files in a directory?

(61) Write a shell script that prints out the contents of some fixed file in upper case.?

(62) Discuss the advanthges and d~sadvantages of Bus & Mesh Topologies.?

(63) What are the roles of protocols in a computer network?

(64) What happens if you type in your login name all in upper case?

(65) Try using your mouse just after logging in at the console when you are in text mode.What          appens? Are you able to perform any operation with the mouse?

(66) What are the characters you need to use to correct typing mistakes while logging in? How do         you correct typing mistakes while entering the password?

(67) How many previous commands can you invoke by using the arrow keys?

(68) How will you enter a '\' in the command that you invoke?

(69) How can you get the,calendar for some other month in some other year?

(70) Find out how to set the system date. Why do you think only the super user is allowed        to do this?

(71) What does Linux have to say about choosing passwords? Find out from the documentation.?

(72) How mucli control does the "S command allow you over the output? Can you read a long          file in sequence easily by this method?

(73) What would happen if your home directory did not exist and you tried to login?

(74) How would you put a space into a filename?

(75) How can you control whether you see different file types in different colours?

(76) Find out how to sort the output on time rather than alphabetically.?

(77) What happens if you try to cd to a non-existent directory?

(78) Can there be a file under a directory with the same name? Why?

(79) What is a system call?

(80) What are the basic design issues in the distributed operating systems.?

(81) What is the basic difference between Network operating systems and Distributed        operating systems.

(82) What are the features of Memory Management subsystem?

(83) What are the different states of a Linux operating system?

(84) What is the purpose of a file system?

(85) What is GUI and what are its features?

(86) What is the difference between Bitmapped and character based displays?

(87) What are the four major components of GUI? Explain the functioning of any one

     component.?

(88) How does MS-Windows enhance DOS environment?

(89) How are graphics supported in MS-Windows?

(90) What types of utilities are provided in Toolbox? Explain their features.?

(91) Explain the function~ng of Resources Manager and Menu Manager of Toolbox.?

(92) What is the basic philosophy of X-windows? How is it different from the rest of GUIs?

(93) What are the major components of NeXTSTEP? How do these elements?

(94) How are applications written in NeXTSTEP environment?


Saturday, 05 December 2015 10:49

WEBSITE MANAGEMENT


WEBSITE MANAGEMENT 
1. Write an HTML code to generate the study centre name, study centre 
coordinator,
place and 
the state where you are studying your BIT programme. use frame based
approach. Make 
necessary assumptions and indicate them.

2.What is JSP ? Write at least five advantages of JSP

3. Design a feedback form for any of the Universitys websites. Use HTML. Your form

should have basic formatting features. Make necessary assumptions and indicate
them.
4. Design a 
home page for any movie theatre. Use HTML. Use frame-based approach.
.Assumptions can be made wherever necessary.

5.. Design an Order-form for any 
online store (for an E-commerce website). Appropriate
controls are to be placed for various inputs and events. Write necessary code for the
above problem using ASP or CGI program using PERL.


6)Design a web page similar to any of the user-registration for a free email account.
The form should consist of all the details with appropriate controls on them. VI should
be user-friendly.
Implement using ASP
OR
CGI programming using PERL.

7) Design a web page for any 
Computer Institute for the students' registration into a
particular course./programme/module. Design the user interface with appropriate
controls.
Implement using ASP
OR
CGI programming using PERL.

8)Write HTML code to generate the home page of any Educational Institute. It should watch all the essential features on the home - page. Assumption can be made wherever necessary.

9) Explain the role of ASP in the web page design. Illustrate with an example.

10) Design a 
registration form for an e-mail account. Use ASP/CGI using PERL to make it functional. Draw the sample layout of the form.

11) Design a homepage for a news-website. Use HTML, ASP/CGI using PERL.

12) Explain at least five main menu options of any of the web - browses.

13) Write HTML code to generate the UNIVERSITY NAME, ADDRESS and a logo at the
left corner of the page- Use frame based approach to add the options like About
university, For students, Regional Centres, Divisions, schools and Recruitments to the
left' side of the page and corresponding text should be displayed on the right
frame/main frame.

14) What is the role of the VBScript in HTML pages ? Explain with' the help of an example.

15) Design an online Examination form for the students to apply for the exams of theory as well as practical courses. Try to place appropriate controls on the form. Write necessary code for the above problem using ASP or CGI using PERL.

16) Design a home page for an enterprise which has E-Commerce application launched on it. Use HTML. Use frame-based approach

17) Design an online-poll application. The application should consist of a question(s) and
3 answers (YES, NO and CANT' SAY). Depending upon the selection of the choice, it
should display the results in a Bar chart form.

Write the necessary code for the above problem using ASP or CGI using PERL.

18) write atleast five advantages of use of Javascript in HTML documents'

19) Design a suggestion feedback form for any of the review of the product whose information is placed online. Assumptions can be made wherever necessary .

20) Design an order-form for an online electronics store Appropriate controls should be
placed for various inputs and events' Write necessary code for the above problem Use ASP or PERL 

21) Design a webpage that consists of a form whose title and heading is FIND ADDRESS. It should consist of a text box labelled as 
ENROLLMENT NUMBER. It should also consist of SUBMIT and RESET buttons. On clicking SUBMIT button, the address of student whose enrollment number is input in text box should be displayed.
Make necessary assumptions. Implement using ASP or CGI programming using PERL.

22) Design a web page similar to any of the on-line polling applications (in the form of
objective questions) and display the statistics as per the result (YES, NO' CAN'T SAY)'
UI should be user-friendly.

Saturday, 05 December 2015 10:47

Computer NETWORKING

COMPUTER NETWORKING 
1) A 
software company named "Hindsoft" wants to design its network. The company has three departments at different locations in India, like Administration in Bangalore, sales in Bombay and Development at Delhi. Each Department has 30 computers, 4 printers and 2 FAX machines whileadministration department is working as the central office to maintain all databases and main server. The main server is connected with the servers of other two departments. Give answers of the following, based on the network specification defined above : 

(a) Draw and explain the best suited physical and logical topology.
(b) Justify the need of each network device you may use in the network.
( c ) Which cable is best suited for this all the available cables to justify your answer.
(d) Which 
operating system is best for this 4 company ? Justify your answer.
(d) Explain the best hardware and software you should use in the network to implement the security.

2) (a) Explain any two functionalities of each of the following :
(i) Data link layer of OSI model
(ii) Internet layer of TCP/IP model
(iii) Session layer of OSI model

(b) What are print servers ? Why do we need them ? Explain the print queue management.

3) Write three difference between each of the following pairs : 
(a) 
Fiber optics and Coaxial cable
(b) Bridge and 
Gateways
(c) Connection Oriented and Connectionless Services
(d) Peer to Peer and 
Client-Server Networking
(e) ATM and Frame Relay

4) (a) What are the main difference between proxy server and Firewall ? Explain different types of firewalls that use different strategies for protecting network resources.

(b) What is meant by Trust Relationship ? 7 Explain the Domain Trust Relationship and Alternative Domain Trust Relationship.

5) (a) What is Token Ring ? How does it work ? In what way is it different from Ethernet ? Also, explain the purpose of fields in Token Ring frame header.

(b) Explain the "Resource Password Security Model".

6) (a) Why disk administration is an important part of network Management ? Does it provide security and reliability ? Also, explain the important options provided by
disk administrator in Windows NT.
7) Assume you are designing a LAN for library, which has three departments in the 
library buildinglike Administration, Purchase unit and Maintenance. purchase unit and Maintenance department have 25 computers, o printers each, while Administration department, which is functioning as the Central department has 38 computers, 4 printers and 2 FAX machines Administration department maintains all databases and the main server. The main server is connected with the servers of other departments. Give answers of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the above network specification.

(ii) Justify the need of each hardware device you may use in the network at different t of all

(iii) Which cable is best suited for this library ? Compare merits and demerits of all the available cables to justify your answer.

(iv) Which operating system is best for this network ? Justify your answer.
(v) Explain the best hard wares and soft wares you should use in the network to implement the securitv.

8) (a) Explain the importance of User Access security model. Also, Recursive Password security model, with their advantages and
(b) Explain different aspects of print queue management.

(c) Explain the importance of disk administration in networking.

9) (a) Explain, how windows NT manages the domains. Also, explain the trust relationship domain with the help of an example.

(b) What is the role of Network Interface Card NIC) ?

( c ) How does Stateful Inspection Technique provide security in networks ?

10 )(a) What is a difference between Viruses' and' Trojan Horses' ? Explain the possible precautions an administrator has to take for controlling Viruses and Trojan Horses.

(b) Explain the different file systems explain the NTFS master file table supported by Windows NT. Also, draw and structure and define its components'

11) Assume you are designing a network for a university, which has 25 Lecture rooms' ,Administration department, 20 Teachers rooms and one management department' Each Lecture room and Teacher room is having a computer, while administration and managernent department has 20 computers, 10 printers and 2 FAX machines each. Administration is working as the central office which maintains all databases and main serverThe main server is connected to all computers and servers of other departments.
Give answers of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the network
specification
(ii) justify. the need of each hardware device you may use in the network at different locations.

(iii) Which cable is best suited for this company ? Compare merits and demerits of all
the available cables to justify your answer.

(iv) Which operating system is best for this company ? Justify your answer.

(v) Explain the best hard wares and soft wares that can be used in the network to
implement the security

12) Explain. any two functionalities of each of the following : 
(i) Physical layer '
(ii) Data link layer
(iii) Transport layer

(b) What is Token Ring ? How does it work ? In what way is it different from Ethernet ? Explain the fields in a Token Ring frame header..


13) write three differences between each of the following pairs : 
(a) IEEE 802.6 and IEEE 802.4
( b) Iterative and Recursive name resolution
(c) Coaxial cable and Fiber optics
(d) Centralized computing and Distributed computing
(e) Internet and Intranet

14) (a) How does Windows NT manage file system ? Explain different systems supported by Windows NT. Write two advantages and two disadvantages of each model. 

(b) Explain the 'flow control' and 'error control' mechanism in X.25 protocol.

15)(a) What are print servers? Why do we need them ? What do you understand by -
print queue management ?
b) Explain the "Resource Password Security Model


16) Assume you are designing a network for a hospital, which has four departments in the hospital building like administration, OPD, Lab, and Maintenance. Each department has 20 computers, 4printers and 1 FAX machine, while Administration department is working as the Central department which maintains all databases and the main server. The main server is connected with the servers of other departments.
Give answers of the following, based on the network defined above :

(i)Draw and explain the best suited physical and logical topology for the network specification

(ii) Justify the need of each hardware device you may use in the network at different locations.

(iii)Which cable is best suited for this company ? Compare merits and demerits of all
the available cables to justify your answer.

(iv) Which operating system is best for this company ? justify your answer.

(v) Explain the best hard wares and soft wares you should use in the network to.
implement the security. 


17) Assume you are designing a network for a Gargent manufacturing and distribution
company. The company has 3 departments at different locations in India like Administration, Manufacturing and Distribution departments at New Delhi, Gujarat and Mumbai respectively. Further, distribution department has .4 sub distribution departments in Mumbai at different locations.

Each department has 25 computers, 2 printers and one FAX machine, and each sub-department has 10 computers and 2 printers while Administration department is working as the central office which maintains all database, transactions and main server.
The main server is connected with servers of other departments and sub-departments. Give answer of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the network specification.
(ii) justify the need of each hardware device you may use in the network at different locations.
(iii) Which cable is best suited for this company ? Compare merits and demerits of all
the available cables, to justify your answer.
(iv) Which operating system is best for this company? Justify your answer.
(v) Explain the best hard wares and soft wares you should use in the network to implement the security

18) Explain any two functionalities of each of the following : (i) Presentation layer
(ii) Data link layer
(iii) Internet layer of TCP/IP
(b) Explain, how the microwave communication works. In what ways is it different ' from the satellite communication ? Give at least three differences.
(c) In OSI model, how does the transport layer ensure the complete reliability of the
message and the proper ordering of the message ?

19) Write three differences between each of the following pairs
(a) Token ring and Token bus
(b) Message switching and Packet switching
(c) Connection oriented and Connection-less services
(d) 10 Base 2 and 100 Base T cable
(e) Gateway and Router

14)(a) What is the importance of mirroring ? How do we mirror a disk partition on : I server ? can we establish the mirror of boot partition ? If yes, how f If no, why not ?
(b) How does NTFS file system provide the 'recoverability' and 'compression' of files ? Explain your answer with the help of suitable examples for each.

15) (a) What is disk stripping ? What are the differences between strip set with parity
and. without -parity ? .Explain, how you can create and remove strip set with parity and without parity.

16) (a) What are the different types of activities that could be administrator in the security policy ? Also, explain addressed by the network why these activities are included in the security policy.

(b) How are the configuration of a Explain with suitable diagram. local printer and a network printer different ?

Page 15 of 78
You are here: Home Question bank Mba Questions and answers sales@mbaonlinepapers.com sales@mbaonlinepapers.com