Friday, December 30, 2016

BCA-203 Fundamental of Operating System 2016 Question Paper

BCA-203 Fundamental of Operating System 2016 Question Paper
Mohanlal Sukhadia University BCA Degree Examination II Year BCA-203 Fundamental of Operating System 2016 Previous Year Question Paper
BCA-203
B C.A II Year Examination, 2016
( Fundamental of Operating System )
Time: Three Hours
Maximum Marks : 100

PART - A      [  Marks: 20 ]
Answer all questions(50 words each). All questions carry equal marks.

PART -B      [  Marks: 50 ]
Answer five questions(250 words each). selecting one from each unit. All questions carry equal marks.

 PART - C        [ Marks: 30 ]
 Answer any two questions(300 words each). All questions carry equal mark

PART-A

UNIT - I

1. Explain multiprocessor system.

2. What are system calls ?

UNIT- II

3. Definition of process ?

4. What do u mean by CPU scheduling ?

UNIT - III

5.  Write the usage of semaphore.

6.  What is the deadlock situation ?
               
UNIT - IV
                 
7. What is paging ?

8. Write the two key techniques of virtual memory segmentation.

UNIT - V

9. What is file system in linux operating system ?

10. Explain process management in Linux  Operating system .

 
PART - B
   
UNIT - I

11. Describe clustered and distributed system. What are the advantages of multiprocessor system ?

12. Write down different system calls for performing different kind of tasks .

UNIT - II

13. What do u understand by operating processes ? What are the issues in scheduling such processes?

14. what is the requirement of CPU scheduling ?  Describe round robbin scheduling with example.

UNIT - III

15. Explain essential condition to occur deadlock. How do you detect deadlock ?

16. Describe the process synchronization and its classical problems.
   
UNIT-  IV

17. Describe continuous memory allocation technique. compare it with any one other possible technique.

18. What is thrashing? why it occur?  Once it occurs, what can the operating system do to eliminate it?
   
UNIT-  V

19. What is linux Kernal ? Explain the three main components of a linux system.

20. Write a short notes on :

( a ) Input and output in linux

( b ) security mechanism in linux

                       
PART - C
     
UNIT - I
         
21. What are the goals of an operating system ? Describe about various services provided by an operating system ?

UNIT - II

22. Describe the cooperating process and inter process  communication.
                         
UNIT - III

23. What are semaphores ? How they help us in handling process synchronization problems ? Write and describe algorithm for deadlock avoidance.

UNIT - IV

 24. Describe the step to perform page replacement. Explain LRU page replacement algorithm and demand paging.
 
UNIT - V

25 . Describe about various modules of a kernel . Discuss the network structure of Linux operating system.

Tuesday, October 25, 2016

Kerala University BCA Internet Technology 2015 Question Paper

Kerala University BCA Internet Technology 2015 Question Paper
Looking for University of Kerala Model Question Papers from the past university examinations? You can here see and download BCA degree exam Internet Technology 2015 Question Paper. The paper is attached in the form of plain text here. Copy and save a copy of the question paper to use it for your future exams.
BCA DEGREE FIFTH SEMESTER EXAMINATION JANUARY 2015
SUBJECT: INTERNET TECHNOLOGY
KERALA UNIVERSITY- Previous Years Question Paper

Section A
(Objective Type Questions) 25 questions of 1 marks each
1. What is SSL used for?
a)Encrypt data as it travels over a network
b)Encrypt passwords for storage in a database
c)Encrypt files located on a Web server
d)Encrypt digital certificates used to authenticate a Web site

2. You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, and passwords). What do you do?
a) Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands
b) Encrypt the information before sending it through e-mail
c)Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands.
d) None

3. According to the FBI and the Computer Security Institute, most information security breaches occur due to what?
a)External Hackers
b)Poor Programming
c)Internal Employees
d)Bad Firewall Settings

4. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database?
a)X-mail harvest
b)Directory harvest attack
c)Spambot attack
d)Email validator

5. Typo-squatting is?
a) A typo in operating system code that gives malware easy entry
b)A malicious website using a URL similar to a real one
c) The process of patching vulnerabilities
d) What online grammar-police complain about

6.The entire hostname has a maximum of
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters

7. Which is not a domain name extension
A) .mil
B) .org C) .int D) .com

8. The __________ prevents unlawful access to voice communications by wire.
A) Electronic Communications Privacy Act
B) Freedom of Information Act
C) USA Patriot Act
D) Privacy Act of 1974

9. Which of the following will not protect you from spam?
A) spam blockers
B) e-mail rules
C) popup blocker
D) filters

10. A __________'s main purpose is to prohibit unauthorized access to your computer via the Internet.
A) popup blocker
B) firewall
C) spyware blocker
D) spam assassin

11. Before discarding a financial document, you should __________.
A) copy it
B) shred it
C) file it
D) post it

12. A __________ is anything that can cause harm.
A) vulnerability
B) phish
C) threat
D) spoof

13. A hacker contacts you my phone or email and attempts to acquire your password.
A) spoofing
B) phishing
C) spamming
D) bugging

14. The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack scripts.
A) malware
B) spam
C) phish
D) virus

15. Hackers often gain entry to a network be pretending to be at a legitimate computer.
A) spoofing
B) forging
C) IP spoofing
D) ID theft

16.A digital signature is
(A)scanned signature
(B) signature in binary form
(C) encrypting information
(D) handwritten signature

17. Kerberos is an encryption-based system that uses
(A)Secret key encryption
(B)Public key encryption
(C) Private key encryption
(D) Data key encryption

18. DNS is
(A)The distributed hierarchical naming system
(B)The vertical naming system
(C) The horizontal naming system
(D) The client server system

19. LDAP stands for
(A)Light weight Data Access Protocol.
(B)Light weight Directory Access Protocol.
(C) Large Data Access Protocol.
(D) Large Directory Access Protocol.

20. Which of the following methods does spyware use to install on an end user's machine?
A. Bundling with free peer-to-peer programs
B. Social engineering
C. Search toolbars
D. All of the above

Section B
(Fill in the blanks) 5 questions of 1 mark each
21. Many organization find that their most valuable assets are their ……..…
22. When an attacker conceals its true identity and adopts some other identity, this is known as ………
23. Unsolicited commercial e-mail is also called …………..
24The foremost goal of the information security function should be to ______.
25. ICANN stands for ……………

Section C
(True/False) 5 questions of 1 marks each
1. Keeping software up-to-date helps avoid viruses.
2. All of your passwords should be the same.
3. If someone has gained access to your email the first step is to change your password.
4. You always know when you have a virus.
5. You should never log on to an account on a public computer.

Section D
(Short questions) 4 questions of 05 marks each
31. What is cyber crime?What are the different types of cyber crime?
32. Explain the concept of digital signature certificate in detail
33. What is cyber squatting and reverse hijacking?
34. Explain S-65 and S-74 from IT ACT 2000. 

Saturday, August 6, 2016

Uttarakhand Open University BCA Discrete Mathematics 2015 Question Paper

Uttarakhand Open University BCA Discrete Mathematics 2015 Question Paper
Uttarakhand Open University Question Papers
Roll No. ....................................
Bachelor of Computer Application/ Bachelor of Science in Computer Science
Second Semester Examination-2015
BCA-05/B.SC.(CS)-03
Discrete Mathematics
Time : 3 Hours Maximum Marks : 60
Note : This paper is of sixty (60) marks divided into three (03) sections A, B, and C. Attempt the questions contained in these sections according to the detailed instructions given therein.
Section - A
(Long Answer Type Questions)
Note : Section 'A' contains four (04) long-answer-type questions of fifteen (15) marks each. Learners are required to answer any two (02) questions only. (2×15=30)
1. Prove that A X (B U C) = (A X B) U (A X C).
2. If f : A--> B and g: B --> C be one to one onto function, then prove that (gof) is also one to one onto.
3. Prove by induction that the sum of the cubes of 3 consecutive integers is divisible by 9.
4. Define Ring. Show that: a ( b - c ) = ab - ac is a ring R.

Section - B
(Short Answer Type Questions)
Note : Section 'B' contains eight (08) short-answer-type questions of five (05) marks each. Learners are required to answer any four (04) questions only. (4×5=20)
1. Define a commutative ring with unity.
2. Negate the following statements :
• All Students live in hostel.
• Some boys can run faster than girls.
3. State and prove pigeonhole principle.
4. Prove that the statement (p -> q) <--> (~q -> ~p) is a tautology.
5. Suppose that two distinguishable dice are rolled. In how many ways we get the sum of 6 or 8.
6. State and prove DeMorgan's Law.
7. Prove that the complement of the union of two sets is the intersection of their complements.
8. Define Group. Explain the difference between Finite and Infinite Group.
Section - C
(Objective Type Questions)
Note : Section 'C' contains ten (10) objective-type questions of one (01) mark each. All the questions of this sectionare compulsory. (10×1=10)
1. If every element of a group G is its own inverse, then G is
a) finite b) infinite
c) cyclic d) abelian
2. A one to one function is also known as
a) injective function b) surjective function
c) bijective function d) none of these
3. The number of substrings of all lengths that can be formed from a character string of length n
a) n b) n2
c) n(n-1)/2 d) n(n+1)/2
4. Let S={ 1,2,3 ,4}.A relation R defined on set s
as, R={(1,2),(4,3),(2,2),(2,1),(3,1)} is
a) transitive b) symmetric
c) anti-symmetric d) none of these
5. Which of the following is a subgroup G=( 0,1,2,3,4,5) under addition module 6
a) {0,3} b) {0,4}
c) {0,l} d) {0,2}
6. If D30= {1,2,3,6,10,15,30} determine least upper bound of 10 and 15
a) 1 b) 2
c) 6 d) 30
7. There are three identical red balls and two identical blue balls in a bag.Three balls are drawn.The number of different color combinations is
a) 20 b) 35
c) 40 d) 30
356/81/170 4
8. A vertex of degree one is called as
a) rendent b) isolated vertex
c) null vertex d) coloured vertex
9. An act in a connected graph which includes every vertex of the graph is known as
a) euler b) universaI
c) Hamilton d) cheque
10. In any undirected graph, the sum of degree of all the vertices
(a) must be even
(b) is twice the number of edges
(c) must be odd
(d) both (a) and (b)

Saturday, July 16, 2016

University of Calcutta BCA COMPUTER GRAPHICS 2010 Question Paper

Name of University: University of Calcutta
Term of exam : Semester 5
Year of exam : 2010
Course : BCA
Paper Name : COMPUTER GRAPHICS
Maximum marks : 75
Time : 3 hours

Attachments:


University of Calcutta BCA OPERATION RESEARCH 2010 Question Paper

University / Board: University of Calcutta
Term of Exam : Semester 3
Year of exam : 2010
Course : BCA
Paper Name : OPERATION RESEARCH
Maximum marks : 75
Time : 3 hours

Attachments:




Search Everything Here