Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Networking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

MCS-022- 2010j.

pdf
MCS-022-2014j.PDF
MCS-022-2014d.PDF
MCS-022-2013J.pdf
MCS-022-2013 d.PDF
MCS-022-2012j.pdf
MCS-022-2012 D.pdf
MCS-022-2011j.pdf
MCS-022-2011d.pdf
MCS-022-2010d.pdf

No. of Printed Pages : 2

MCS-022I

MCA (Revised)
Term-End Examination
7t.

June, 2010
MCS-022 : OPERATING SYSTEM CONCEPTS

AND NETWORKING MANAGEMENT


Maximum Marks : 100

Time : 3 hours

Note :

Question No. 1 is compulsory. Answer any three


questions from the rest.

(e)

MCS-022

What is a Computer Network ? Discuss its


advantages and disadvantages in detail.
Differentiate between Multiprogramming
and multithreading.
Discuss layered architecture of Windows
2000 operating system.
Discuss the important features of LINUX
operating system.
Write a shell script in LINUX to count the
number of words in a given file.

10

Explain in detail two computer security


mechanism.
Explain the logical and physical structure
of active directory with reference to
Windows 2000.

10

10
10
5

10

P.T.O.

3.

(a) What are wild cards ? Discuss their


importance with examples.

(b) Mention the usage of following LINUX


commands with an example of each :
2x4=8
(i)

tail
grep
chmod
sort

(c) What happens if you try to "cat" a


non-existing file ? Explain the steps taken
by OS to handle this.
4.

(a) Explain in detail various types of guided 10


transmission media.
(b) Explain FTP and TELNET. Discuss their 10
importance and uses.

5.

Write short notes on the following :

5x4=20

Domain Name System.


Peer-to-Peer Network.
(c) Virtual Private Network remote access in
Windows 2000.
(d) Firewall.

No. of Printed Pages : 3

MCS-022

MCA (Revised)/BCA (Revised)


Term-End Examination

C.)\
c\I

June, 2014
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT

Time : 3 hours

Maximum Marks : 100


(Weightage 75%)

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.

1.

(a) Write the steps to configure a Windows 2000


computer to ensure that users can log-on to
the server only during the specified times.

(b)

Differentiate the role and responsibilities of


user mode and kernel mode of
Windows 2000 system.

(c)

Explain the various file access control


mechanisms provided by LINUX operating
system. Also, give the suitable example for
each.

(d)

List the important components of domain


name server. Also, explain how the domain
name server is configured in LINUX
operating system.

MCS-022

P.T.O.

2.

3.

(e)

How is print server configured in


Windows 2000 ? Also, explain the
importance of print queue management.

(f)

What is kerberos ? Explain the complete


process of client authentication through
kerberos.

(a) Write the use of following LINUX


commands, with an example for each :

(i) cmp

(ii) sort

(iii) grep

(iv) chmod

(b)

Describe the addressing scheme used in the


Network layer and Transport layer of
TCP/IP model.

(c)

Differentiate between coaxial cable and


optical fiber cable.

(a) What is Virtual Private Network (VPN) ?


Describe the mechanism to create a virtual
private network. Also, explain the
significance of VPN in security.

10

(b)

Explain the principle of Token Ring


protocol. Also , explain its working with the
help of a suitable example.

(c)

List the functions of Network Interface Card


(NIC).

MCS-022

4.

5.

(a) Write a shell script which will generate the


list of users along with details of files those
are created /modified by the respective user
during the specified time. Also, draw the
flow-chart of this shell script.

10

(b) Differentiate between LAN, MAN and


WAN in terms of size, protocols, access
mechanism, hardware devices and
switching methods.

10

Write short notes on the following (any four) :


5x4=20

(a)

NTFS

(b)

Packet switching

(c)

IPsec

(d)

EFS services

(e)

Firewall

MCS-022

No. of Printed Pages : 3

MCS-022

MCA (Revised) I BCA (Revised)


Term-End Examination
December, 2014
MCS-022 : OPERATING SYSTEM CONCEPTS AND
NETWORKING MANAGEMENT
Time : 3 hours

Maximum Marks : 100


(Weightage 75%)

Note : Question no. 1 is compulsory. Answer any three


questions from the rest.
1. (a)

(b)
(c)

(d)

(e)

Explain the collision avoidance mechanism


of CSMA/CD. Also, differentiate between
CSMA/CD and token passing access
methods.

Describe the concept and advantages of


using EFS services in Windows 2000.

What option in Registry Management will


be useful in tracking who accessed the
registry, from where, and when ? Also,
write the steps for enabling this option.

How does Windows 2000 manage the


domains ? Also, explain how the trust
relationship is created and managed
between domains.

Explain the steps for configuring the Local


Area Network (LAN) in LINUX system.

(0 List the IPv4 class formats and its uses.


MCS-022

4
P.T.O.

2.

(a)

(b)

(c)

3.

(a)

(b)

(c)

4.

(a)

(b)

(c)
MCS-022

Explain the built-in groups supported by


Windows 2000. Also, discuss the group
policies of each group.

Explain the process of encryption and


decryption in symmetric key, asymmetric
key crypto systems.

Write the advantages of Virtual Private


Network.

Compare and contrast between Network


operating systems and Distributed
operating systems. Also, list the
advantages of Distributed operating
systems over Centralized operating
systems.

Write a Shell script which will delete the


temporary files from all local users after
24 hours of their creation/modification.
Also, make the flow chart of this Shell
script.

10

Differentiate between bridges and


gateways.

Explain the file systems supported by


LINUX systems. Compare these file
systems with NTFS.
Compare and contrast the 'Mandatory
Access Control' and 'Discretionary Access
Control' mechanisms in Windows.
What is print server ? Write the steps to
configure a print server in LINUX system.
2

5
7

5. Write short notes on the following (any four) :


4x5=20
(a)

Proxy Server

(b)

DNS

(c)

RAID

(d)

Network Topologies

(e)

TCP/IP

MCS-022

10,000

No. of Printed Pages : 2

MCS-022

MCA (Revised)
Term-End Examination
June, 2013

cJ

MCS-022 : OPERATING SYSTEM CONCEPTS


AND NETWORKING MANAGEMENT
Time : 3 hours

Maximum Marks : 100

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.
1.

(a) What is an operating system ? Explain the


component of computer system with a neat
diagram.

(b)

Describe the evolution of operating


system.

(c)

What are the characteristics of modern


operating system ?

(d)

Explain the various topologies for a


networking system.

(e)

Explain the detail about the OSI layers.

(0 Give the differences between LAN and


WAN.

(g) Write down the purpose of the repeater.

MCS-022

P.T.O.

2.

(a)

List down the application layer protocols.

10

Explain each one of them in detail.

3.

(b)

Explain the Architecture of Simple Network


Management protocol (SNMP) with a neat
diagram.

10

(a)

Discuss about the various component of


Linux Operating System.

10

(b)

What are the file manipulation commands.

Briefly explain them with the Syntax.

4.

(c)

What are called filters ?

(a)

Explain about windows 2000 domains,


workgroups and trusted relationships.

(b)

Discuss in detail about user account


administration.

(c)

How do you configure TCP/IP protocol

setting for windows XP ?


5.

Give a brief note on the following :


(a)

System Access Control

(b)

Password Management

(c)

Intrusion Detection

(d)

Firewall

(e)

Windows NT Domain Management

MCS-022

20

No. of Printed Pages : 2

MCS-022

MCA (Revised)
Term-End Examination
December, 2013
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT
Time : 3 hours
Note :

1.

Question No. 1 is compulsory. Answer any three


questions from the rest.

(a)
(b)
(c)
(d)
(e)
(f)
(g)

2.

Maximum Marks : 100

What are the functionalities of Graphical


User Interface ?
Write a note on Batch Processing.
What is a Distributed Operating system ?
Explain in Detail.
Describe the different types of Networks.
What are the different types of Modems ?
What is Optical fibre ? List the Advantages
of Optical fibre.
Write the advantages and disadvantages of
Infrared Transmission.

6
6
6
6
7
6

(a)

With reference to ISO-OSI Reference model,


explain the different types of connecting
devices in detail.

10

(b)

Explain about the TCP/IP Related


protocols.

10

MCS-022

P.T.O.

3.

(a)

Discuss about shell scripts in detail.

(b)

Write the short notes on Network File

10
6

Server.

4.

(c)

Explain about Backups and Restoration.

(a)

Describe briefly about Group Accounts

Administration.
(b)

How will you enable the offline file

features ?
(c)

5.

Give the steps how to use the Mapped Drive.

Write the short notes on the following :


(a)

Instrusion Detection System (IDS)

(b)

Fault Tolerant Systems

(c)

Packet Filters

(d)

Trust Relationships in Windows 2000

(e)

NTFS File System

MCS-022

20

MCS-022

No. of Printed Pages : 2


MCA (Revised)
Term-End Examination

O
O
O

June, 2012
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT
Maximum Marks : 100

Time : 3 hours
Note :

1.

Question No. 1 is compulsory. Answer any three


questions from the rest.

(a) Discuss the functionality of User and Kernel


modes of Windows 2000 operating system.

10

Explain the process and thread


management in LINUX o/s.
With the help of Architecture diagrams
explain the Simple Network Management
Protocol (SNMP) and User Datagram
Protocol (UDP).
What is the use of Transmission media in
Networking ? List and explain various
guided and unguided transmission media
with their advantages and disadvantages.

10

(a) Explain the abstract model of Virtual


memory in Linux o/s with the help of a
address mapping diagram.

10

(b)
(c)

(d)

2.

MCS-022

10

10

.P.T.O.

3.

(b) Explain how NTF's, FAT 16 and FAT 32 file


systems are supported in Windows
2000 o/s.

10

(a) Explain various User Authentication


methods that the computer system uses.

10

(b) Discuss Registry Management in 10


WINDOWS.
4.

5.

(a) Write the purpose of VPN and name VPN


technologies supported by WINDOWS
2000.
(b) Write the procedure to use the mapped
drive in WINDOWS 2000 o/s.
(c) Explain the Backup and Restoration
procedures in LINUX.
Write short notes on the following :

5
10

(b)

5x4=20
Kerberos management in WINDOWS
2000 o/s.
Distributed o/s

(c)

Trivial File Transfer Protocol (TFTP)

(d)

Pipes and filter commands in LINUX.

(a)

MCS-022

MCS-022

No. of Printed Pages : 3

MCA (Revised)
Term-End Examination

tr)

December, 2012

C
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT
Maximum Marks : 100

Time : 3 hours

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.
1.

(a) Explain the following with reference to 10


WINDOWS 2000 0/S :
(i)

Trust Relationships and Work Groups

(ii)

Remote Access

(iii) IP Sec
(iv) User mode
(b)

Explain the memory management concepts 10


in LINUX 0/S.

(c)

List and explain the various Networking 10


topologies.

(d)

Explain the various computer-security 10


classifications recognised by Trusted
Computer System Evaluation Criteria
(TCSEC)

MCS-022

P.T.O.

2.

(a)

List and explain the characteristics of


Modern Operating Systems.

10

(b) Explain the following with reference to 10


Domain Name System(DNS) :
(i) DNS Architecture
(ii) DNS Zones
3.

(a) With the help of an example for each, write


the usage and syntax for the following
LINUX commands.
4x21/2=10
(i) Cat
(ii) diff
(iii) Sort
(iv) Cmp
(b) Write a shell script to convert all the lower 10
case letters of a (text) file to upper case.

4.

(a) Write the basic purpose and name the OSI


layer where the following devices will be
operating:
5x2=10
(i) Repeater
(iii) Bridge
(v) Gateway

(ii) Hub
(iv) Router

(b) Explain the following with reference to


"Hardening" in WINDOWS 2000 0/S : 4x21/2=10
(i) Hardening the 0/S and application
code
(ii) Hardening the file system security
(iii) Hardening the local security policies
(iv) Hardening the services
MCS-022

5.

Write short notes on the following :


(a) Fire Wall
(b)
(c)
(d)

MCS-022

Packet Switching
Unguided Transmission Media
Multi threading

4x5=20

No. of Printed Pages : 3

MCS-022

MCA (Revised)
c\1

Term-End Examination

-14

June, 2011

O
MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT
Maximum Marks : 100

Time : 3 hours

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.
1.

(a)

What is a fire wall ? How does it secure the


system ? Explain the limitations of firewall.

(b)

Explain two approaches used to improve


system performance by overlapping input,
output and processing in CPU.

(c)

What is packet switching ? What are the


two approaches for packet switching ?

(d)

What is meant by trust relationship ?


Explain the importance of Kerberos and
Domain Controllers in maintaining trust
relationships.

(e)

What are the standard user groups in


windows 2000 ? Explain the access
privileges of each.

MCS-022

P.T.O.

(f) Write the Linux/ Unix commands for the


following :
(i)

List all the files in a directory that have


3 characters in their name.

(ii) Show if a user is logged on, their real


name and mail status
(iii) Tell the system to continue running a
process, even if the user logs out.
(iv) To allow a user to communicate with
another user logged on by splitting the
screen and providing two way
communication.

2.

3.

(g) Differentiate between absolute and relative


path names, along with an example of each.

(a) List and explain the three file systems


supported by windows 2000 ? What is file
replication service ?

10

(b) Which application layer protocal is used by


network management frame-works to
manage and monitor network devices ?
Explain its architecture and working.

10

(a) Explain the abstract model of virtual


memory used in Linux operating system.
Give a suitable diagram to explain its
working.

10

MCS-022

4.

5.

(b)

Assume we want to display a logon warning


message, stating that "unauthorized access
to this system is punishable" if an
unauthorized user tries to log in. Write the
steps to create the above mentioned logon
warning message.

(c)

Explain the characteristics of multiprocessor


operating system.

(a) What is stored in the Registry of Windows


XP ? Explain the various components of a
registry. Also, list the utilities that can be
used to manage registry in windows.

(b)

Explain SNMP architecture with the help


of a diagram.

(c)

Which topology has a dedicated point to


point link to every other node ? Write its
three advantages and three disadvantages
of this topology.

Write short notes on the following :


(a)

Hubs

(b)

Optical fibre

(c)

Domain Name System

(d)

Pipes and Filters in Linux

(e)

Offline and Online communication

MCS-022

20

No. of Printed Pages : 3

MCS-022

MCA (Revised)
Term-End Examination
December, 2011
CD MCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT
Time : 3 hours

Maximum Marks : 100

Note : Question No. 1 is compulsory. Answer any three


questions from the rest.
1. (a) What are the two modes in which Windows 3+5
2000 system works ? Explain its
architecture with the help of a diagram.
(b)

What is the default networking protocol in 3


Windows 2000 ? What are its features ?

(c)

What are the different states of a process in

Linux ?
(d)

How does a Token Bus Network Work ? In 6


what ways is its working different from
token ring ?

(e)

Explain the process used by Kerberos to 6


authenticate network clients logging onto a
Windows 2000 domain.

MCS-022

P.T.O.

(f) Write the Linux/Unix commands for the 6


followings :
(i)

List all files have 3 or more characters


in their name.

(ii)

Symbolically link two files in a


directory.

(iii) To communicate to another user


logged on by writing to the bottom of
their terminal.
(iv) To change the priority of a process.
(g)

Explain the characteristics of multimedia 5


operating system.

2. (a) What is the role of transmission media in 6


networking ? Differentiate between guided
and unguided media with suitable
examples.
(b)

What is a repeater ? At which level of OSI 6


model is it used ? How ?

(c)

What is a protocol ? List and explain two 8


application level protocols.

3. (a) Write a shell script which will redirect the 10


output of the data command without the
time into a file. Also, make the flow chart
of this shell script.
MCS-022

(b) What are the security services provided by


the IP Sec ? Explain the Window 2000 IP
Sec components. Also, explain the policy
options for IP Sec implementation.

10

4. (a) Explain the principle of CSMA/CD 8

protocol. Also, explain its working with the


help of a suitable example.
(b)

Describe the process (step by step) of sharing 9


files, folders and devices in Windows XP.

(c)

Write the steps to map (assign) a drive letter 3


to a network computer or folder.

5: Differentiate between the following :

(a)

Simplex, Half duplex, and Full Duplex


Communication.

(b)

Symmetric and asymmetric Cryptography

(c)

LAN, MAN and WAN

(d)

Packet Filtering Gateways and Stateful


Packet nFiltering

MCS-022.

20

You might also like