Professional Documents
Culture Documents
Papers
Papers
- 2.Aa) what is community cloud? Differentiate between Private and Public Cloud.
Discus Various essential characteristics of cloud computing.
(c) (i) Whct is the availability of cloud services, if capacity period is 9760 and
server failure and it takes 30 hours to íix it? you have 40% chance of
(ii) What is availability of cloud services, if you have 30% chance of your
20 hours to fix it and the capacity period is 9790? llustrate other server failing and it tekes
with four cable outage in three hours. points of failure in the syste1
Write your Roll No. on the top immediately on recejpl of the question paper.
Attempt ALL questions by selecting any TWO parts. All questions carry equal marks.
1.
Write down description with example of at leant four new features introduced in Java 10. Also write at
(a)
least twO most serious deficiencies in Java.
What is the role of rt.jar file in Java? Explain the functions of the following Java command-line tools:
(b)
javap, javadoc jar.
Ltc) What are the ciasses to handle Big Numbers in Java? Explain any one with example.
2
What do you mean by Autoboxing? Write down few applications of Cosmic Super class 'Obiect' with
example(s).
Differentiate between an absiract class and an interfacA. What is Reflection?
Design a cless Registration in Java consisting of loginlD, password, name, address, city, mobile,
(c)
email with recessary parameterized constructors end getter methods. The policy for the passwore! is as
follows
i) at least 8 ch.aracters in length
i) no space
ii) at least orre Upper character, and number.
implemein! e pessword vai:daticn policy vithin constructors. D::rnonstrate the workir g oi hc cizss in
the man program.
3. Gcmpare and rortraat anon; stringEu£fer, Stzinc3us ldar and stringTol.er.i.er sting
inia th n:es ia nrnnrar, ri,nc Iang:2^as fro: the
following sentence: "Pythoin, Ma iab, R, Java, Google GO, Visuai Basic"
What are the benefils cf gene:is programming? Aiso write down the restricttons and imiiatuons rf generic
programming.
(c) Define a genetic class to maintain a two-dimensional array of generic types. The size of the aray is
passed through constructor, which also performs necessary memory allocation. The c.:ss contains a
method genericAverage () that reiurns the average of the array. Test the working of the above class
in the main program on diíferent types of data (such as integer, floating point).
4. ta What are the advantages of Collection framework? How a Map is different from Co!lecüon interface?
What is a daemon thread? How can we aiter the priority of Java thread? Describe with example(s).
(c) Write a Javaprogram to creaie a thread which gererates a serial nunber starting from 1and goes up to
5,000. If an upper limit is reached, the counter is reset to one. Demonstrate the working of the thread in
the main program.
5 What are different swing components? Explain the working of Mouse Ever: with example(s).
What is a Callable Statement in JDBC? Explain the process of executing a SQL query using JDBC APIs.
(c) A librarian wanted to digitize the book stock register and willing to store information such as
AccessionNo, Title, Authors, Publishers, Price and NoOfCopies to a database. Write a
Java prOgram which accepts these information from the user, connect to the database and store it to a
database table. Assume that table scheme already exists within the database. Make necessary
assumptions about database driver.
Roll No. IMCAOSo
MCA(Ii-Sem) Second Sessional Examination, 2022
CSC34: Analysis and Design of Algorithms
Dated: Wednesday, November 16, 2022 Time: 10:00AM - 11:00AM
Time: 1 hour Max. Marks: 20
Instructions:
(1) Write your Roll Number and Name on top of Question Paper.
(ii) Answer any TWO questicns. A!l questions carry equa! marks.
Q-1 Write steps that are used to develop adynamic programming algorithm for a given problem. Write äynamic (3-7)
programming algorithm (using 2 array of maximu1a size i.. B[0:n, ...] where ith row has i+l columns) to
compute binomial coefficient "Ck.
Q-2 Write dynamic programming aigorithm for traveling sales person problem and also compute its time (ó+4)
complexity.
Q-3 Write the theorem that is used in dynamic programming algorithm for computing longest common sub- (5+5)
sequence oi two given sequences. Also compute the prefix X, for i-0, 1, 2, .., 7 of the sequence
X=<A,B,C,B,D,A,C.
Code: CSC34
MCA (II|-SEM) RollNo. l.MeAO5O
EXAMINATIONS - 2022
Analysis an: Design of Algorithms
Time: 3 Hours
Write vour Roll no. on the top immediately o receipt of the question paper. Max Marks: 60
Attempt ALL questions by selectng any Tvv parts. Alquestions carry equal marks.
1. (a) Write an algorithm decimalToBasek(M, ) (SU that r<10) that convert positive decimal integer n to base r.
In this conversion the resultant value should stored in 1D char type array as string. Also computer the
nunber of mod and division operations neede in this algorithm.
(b) VWhat is legularity condition in master s theoref i Solve the
recurrence equation T(n) = T(n/2) + n(2 - cos n)
usingmaster theorem.
(c) Let Z. a = [2, 1, 4, 3, 5, 6, 7, 8] be a list of 8 int gers, z is the i"
random variable associated with event that z, a.iü Z are Compared. smallest integer of this list, and X, is indicator
variables X, for i=1 to 7 and j= i+1 to 8, when th given list of integerCompute the value of this indicator random
is sorted using bubble sort.
2./(aAWrite steps that are used to develop a dynamit: programming
algorithm for a given problem. Write dynamic
programmingalgorithm using single one dimens :nal array of minimum size to compute binomial coefficient "C..
(b) Write dynamic programming algorithm for the hain matrix multiplication problem and also
coiplexity. compute its time
Let a travelling sales person problem is represei ied by the diagraph K4, where V={1,2, 3, 4},
<1,4>, <2,1>, <2,3>, <2,4>, <3,1>, <3,2>, <3,4> <4,1>, <4,2>, <4,3>}, and 2, 5,,20,,1, 3,2, 1,E=(<1,2>,
2, 5, 2, 3,
<1,3>,
2 are
weights of these edges respectively. Soive thisp Tblem using dynamic programming algóritim. S9
Let G=(\V, E) be an undirected wcighted graph, 'rere V={1, 2, 3, 4, 5}, E={(1, 2), (1, 3), (1, 4), (2, 3), (3, 4), (3,
5), (4. 5)} ard 1,2, 3, 3, 5, 4, 2 are weights of th saedges respectively. Compute the
using Kr iskele algorithm. minimum spanning tree by
The leiters and their frequency of a text file are J:30, A:5, M:25, K:20, N:15, D:25. Compute the
for each of these letters. llustrate the encoding and decoding of text "DAM" using Huffman's code
these codes.
(c) Solve the following 0-1 knapsack problem using refined dynamic
programming algorithms.
Pi (Rs.) 50 30 40 10
WË (kg) 6 4
W=12 kg
4.a) Describe the n-queen problem and write backtracking algorithm for same.
S{b) What is m-coloring problem? Write backtracking algorithm for the same.
(c) Solve the 0-1 knapsack problem of question 3(c) by using backtracking algorithm.
5. (a) Write best first search branch and bound algorithm for 0-1
knapsack problem.
(b) Determine the number of internal and leaf nodes in the state-space tree and
compute bound values or iniei
nodes and length of tour corresponding to leaf nodes when travelling sales person problem given in quesuo
2(c) is solved by branch and bound algorithm.
c Show that clique decision problem is NP-complete. Transform the CNF Boolean
into graph. How many cligques of size three this graplh has? expressions (AVB)ADv
DEAPARTMENT OF COMPUTER SOIENCE
NOTE: ATTEMPT ANY two QUESTIK NS. ALL QUZSTIONS CARRY EQUAL MARKS.
M. Describe the critical characteristics of information. How are they used in the study
of computer security?
2. Discuss various attack replication vectors used by the viruses and worms.
3. Discuss four common softvare-based communications attacks designd to
intercept and collect information in transit.
DEAPARTMENT OF COMPUTER SCIENCE
NOTE: ATTEMPT ANY two QUESTIONS. ALL QUESTIONS CARRY EQUAL MÁRKS
J. Brieîydesct ibe the components of an enterprise information secuity policy.
2. Briefly discuss any five protection mech.anisns in a trusted computing base.
3. What are the five elernenmts of a business impact analysis? Briely iscuss each.
Code: CSC33 Roll No..?MAOsOo..
MCA (|-SEM) EXAMINATIONS, 2022-23
Information Security
Time: 3 Hours Max Marks: 60
Write your Roll no. on the top immediately on receipt of the question paper.
Attempt ALl questions by selecting any TWO parts. All questions cary equal marks.
1. (a) ldentify the six components of an information system. Briefly explain each in terms of information
security.
b) llustrate the various methods asocial engineering hacker use to gain information about a user's
credentials.
Yc) What are the various forces of nature? Briefly discuss each with respect to different organizations.
2. a) Write down the policies, practices, standards, guidelines and procedures for password
management.
(b) An organization supports routine operations by executing various technologies and processes. How
and which type of security policy needs to be implemented by the organization.
(c) An organization wants to implement or improve its risk management and information security
programs. Briefly explain the steps according to the NiST framework.
3. (a) What is security architecture? Explain its key components.
( iitü a iuieciiuri imecnanisris in a trustec conmpuing base.
(c) Describe the common criteria in terms of its purpose along with supported security functional
requirements.
4. (a) llustrate substitution cipher method of cryptography with a suitable example.
b A typical PKI solution protects the transmission and reception of secure
several components. Briefly discuss each.
information by integrating
(c Using the transposition technique with a symmetric key, explain how
operates. encryption and decryption
5. a) To ensure operations security, the individual in charge of
information security must keep a number
of actions in consideration. Specify these actions.
(b) Determine what the features of a good access control system with
reference to MAC.
V (c) Discuss the problems with passwords and the techniques to
alone. authenticate users than passwords
Department of Computer Science,Jamia Millia lslamia, New Delhi-110025
MCA (SEM-II1) MID TERM EXAM-I|- 2022
Code: CSC31: Data Communication and Computer Networks
Time:1 Hour Max Marks:20
Attempt all questions. Marks are indicated against each question. Your answer should be rele vant, precise and
Complete.
What is CRC? Which layer does CRC work? (2]
Which layer combines bits into bytes and bytes into frames, uses MACaddressing, and provides errOr
detection?
[1]
Le3. Is it possible to use two different types of routers on the same network? If yes, then how?
[2]
- 4. Name the types and usage of frames in HDLCProtocol.
14/rite your Roll No on the top immeiately on receipt of the question paper.
Attempt all questicns. Marks are indicated against each question. Your answer should be relevant, precise and
Complete.
1 Give any two differentiating point between the Internet, Intranet, and Extranet? [2]
4. Define fiber optic communication principle and light propagation through fiber optic cable. (3]
8. How Data break down oneach iayer frorn op to bottom? Briefly explain vith neat diagram. 3]
S. VWrite a.yfour advantages of packet switc ing over circuit switching. [(2)
Codn: CSC31
Roll No. 2 MLAOBC).
MCA(|||-SEM) EXAMINATIONS, 2022-23
DataCommunication and Computer Networks
Tie: 3 Hours
Max Marks: 60
irite your Roll No. on the top immediately on receipt of the queslionpaper.
Atteot ALL questions by selecting any TWO parts. l questions carry equal marks.
1. (a) IWht are the isSues that should be consid sre 1 in designing
different layers in the net:"ok
mc Is? Explain
b) Uocr what conditions would circuit switching be a better network
sching?
design than pecket
Dferentiate between TCP/IP and ISO/OSI reference Model. Why do we use TCP/IP model
instead of ISO/OSI reference Model?
2. (a) A bit stream 10011101 is transmitted using the
standard CRC methcd. The gcneratcr
Dolynomial is x+1. Show the actual bit string transmitled. Suppose that
ieft is inverned during transmission. Show that this error is detsctcd al the the third bit from tie
an exanple of bit errors in the bitstring tranSmiited that will not be receiver's end. Give
detected by he receiver.
(b)Define HDLC. What are the different communicaion modes in HDLC? Explain.
(c1 Give three reasons why network might use arn er:or c . c code
and retransmis sion? instcad of error de'ecion
Train aMcCulloch and Pitts model of neural network for learning P-Q logic
gate function.Ássume
random initial weights as (Wo, Wi, W:) = (1, 0, 1) where Wo is bias. Show training upto 6 steps only. (3)
Given aKohonen self-organizing map with weig.s as ticwn in the followiug diagran.
0.3 07 06
0.6 0.9 Ú.
0.3 0.8
Use the square of Euclidean distance to find the wir. ing neuron (let say C)
for the inputvector
(0.5, 0.2).
Using a learning rate of 0.2, find the new weights of unit Cj.
If units Cnand C-: are part of radius of neighborhond-i of this winn.ng
neuron C, find their nev
weights to0.
D etheorv of memory. Wlich neural ne:wor nnodei you know which is used for
pattera
oagead ieLeiling?pluin it with anexanpBe
M.C.A.(SEM-1II) Minor IEXAMINATION, 2022
CSC 32: Artificial Intelligence
Time: 1Hour (10AM to 11 AM) Date: October 10, 2022 Maximum Marks: 20
Attempt questions. Use of Scientific Calculaior is permitted.
all
Consider the unbounded version of the regular 2D grid shewn in
(0,0). and the goal state is at (x. y). Figure I below. The start state is at the origin.
ta) What is the branclhing factor bin this state space?
How manv distinct states are there at depth k (for
k>0)?
(c) What is the mavimum number of nodes expanded by
Is h= u -x
breadth-first search?
(d) v an admissible heuristic for a state at (u, v)? Explain.
(e) How many nodes are expanded by A* graph search
using h)
(f Does h renain adnissible if some links are
removed?
(g) Does h remain ad1missible if some linksare added
between nonadjacent siates?
k| (6)
P.T.O.