Upload
preethika-kottary
View
110
Download
4
Tags:
Embed Size (px)
Citation preview
MCA (Revised)
Term-End Examination' June, 2006
MCS-022 : OPERATING SYSTEMCONGEPTS AND NETWORKING
MANAGEMENT
Time : 3 hours Mqximum Marks: 700
Note : Question number f. is compulsory. Answer anythree questions t'rom the rest.
l. (a) Describe the structure of 5 classes of IP addresses. 5
(b) Differentiate between the following concepts : 6
(i) Multiprogramming
(ii) Multitasking
(iii) Multiprocessing
(c) Write a shell script that prints a list of every uniqueword in a file, in reverse alphabetical order. 6
(d) Explain the function of the following : 4
( i ) L S - L
(ii) /etc/shadow Iile
MCS-022 P.T.O.
(e) Define the concepts of domains, workgroups and
trusted relationships in the context of Windows
2000.
(f) What is Kerberos ? Describe Kerberos management
in the Windows operating system.
k) Describe two types of back-ups.
(h) Differentiate between virtual circuit and datagram
approaches to packet switching.
2. (a) Explain four basic design issues in a multimedia
operating system.
(b) Differentiate between theTCP/lP and OSI relerence
models, and map the layers between the two
approaches.
(c) How would you set the IP address of a LAN card in
Lintx ?
3. (a) Describe the various security features in the Windows
2000 operating system. Further, explain the
difference between the security features of an OS and
of a network. 10
(b) Describe the steps needed to configure the network
file sewer in the LINUX operating system; .- 5
(c) Explain the drawback of LINUX. 5
6
5
MCS-022
4. (a) Describe the GUI features of Linux. Also explain the
corresponding GUI features of Windows 2000.
Further, compare the usefulness of these features. 10
(b) Describe two features of the Intrusion Detection
5System (lDS).
(c) What are the requirements for a user to be able to
kill a process in Linux ? Write the necessary
commands. 5
5. Describe the following : 20
(i) Fault tolerant system
(i i ) sNMP
(iii) IPSec
(iv) Architecture of the Windows 2000 operating system
MCS.O22 5,000
MCA (Revised)
Term-End F,rramination
December, 2006
MCS -022 : OPERATING SYSTEMCONCEPTS AND NETWORKING
MANAGEMENT
Time : 3 hours MaximLtm Msrks : 704
Note r Qu estion number 1 is compulsory. Answer qny
three questions from the rest.
l . (a) A computer has a monitor that consumes 60 W of '
power. The CPU requires 100 W. What should be
the minimum power rating of a UPS used for
5supplying power to this computer ?
What is the basic difference between Network
operating system and Distributed operating system ? 5
I carry a CD containing 600 MB (megabytes) of data
from my house to yours. If it takes me 30 minutes to
drive down to your house, what is the data
transmission rate ? 5
(b)
(c)
(d) What are the different
System ?
MCS-022 1
states of Linux Operating5
P.T.O.
(e) Write a shell script to accept upto 5 numbers as
arguments and print out their arithmetic mean. 5
(f) List some of the duties of a system administrator. 5
(g) How does a domain differ from a workgroup ? 5
(h) What are the goals of Computer Security ? 5
2. (a) What is Computer-Security classification ? Explain . 8
(b) Describe the strategy for hardening your Windows
2000 operating system . I
(c) What is a computer virus ? Describe the different
types of viruses. 4
3. (a) Distinguish between virtual and physical addresses.
List the various data structures required for address
mapping from virtual to physical addresses and
describe the process. 1 0
(b) Draw the logical netwo-rk layout of a Windows 2000
\ctive Directory and describe its components, 10
4. (a) Name various authentications available in Windows
operating system and describe any one of them. 5
(b) E*pand the following :
(i) RADTUS
(ii) NAT
(iii) rcs(iV) RRAS
(v) EFS
MCS-022
(c) ' Discuss IPSec implementation in the Windows 2000
operating system.
(d) What are input and output restrictions, filtering andpipelining of instructions in Linux ?
5. Describe the following :
(i) Policy Inheritance
(ii) Fault Tolerant System
(iii) Kerberos
(iv) Confidentiality and Integrity
20
MCS-022 7,000
MCA (Revised)
Term-End F,xamination
June,2OO7
MCS -022 : OPERATING SYSTEMCONCEPTS AND NETWORKING
MANAGEMENT
Time : 3 hours Maximum Marks : 7AA
Note r Qu estion number 7 fs compulsory. Ans wer anythree questions from the rest.
i
1- (a) what are the goals of computer security ? s
(b) Describe the microkernel approach in modernoperating systems. Also write the advantages of thisapproach i 5
(c) What is a repeater and what are its uses andcharacteriptics ? s
(d) What are ithe offline file features in Windows XP andhow would you enable them and disable them ? 5
(e) How can you change the password in Linux ? Whatare the iprecautions that should be taken whilechoosingapassword? s
l
MCS-022 1 P.T.O.
(f) Write a Unux shell script to shift all characters in a
file forward by 3 characters. (Thus 'a' becomes 'd',
while 'z' becomes 'c'.)
(g) What are the different principles of user
authentication and how are they used ?
(h) Describe the available security features while
managing pointers in Windows 2000.
2. (a) Describe the various kinds of transmission media
with their characteristics, advantages and
Idisadvantages.
(b) How does the remote access mechanism in Windows
2A00 work and how can it be configured ? I
(c) What is a UPS and why is it used ? Describe the
different kinds of UPS systems. 4
3. (a) Describe the working and usage of the vi editor in
Linux with the help of Add, Delete, Copy, Find and
Replace commands. 10
(b) Show how to configure the Apache web server for
the Linux operating system
(c) What are the security controls that should be
implemented for access to a computer system ? 4
4. (a) Describe the structure and usage of Active Directory
in Windows 2000. ,
MCS-022
(b) How would you use an instant messaging applicationlike Yahoo Messenger in Linux ? Explain with thehelp of commands.
(c) What is a gateway ? Describe its purpose andworking;
i
5. Describe the following with suitable examples :
(i) The three types of data flow
(ii) Structure of Unix operating system
(iii) Features of "Write" command in Linux
(iv) Domains in Windows 2000
20
MCS-022 1 1 ,000
MCA (Revised)
Term-End Examination
December, 2OO7
MCS-022 : OPERATING SYSTEMCONCEPTS AND NETWORKING
MANAGEMENT
T'ime : 3 hours Maximum Marks : 700
Note r Qu estion number 1 is compulsory. Ans_wer anythree quesfions from the rest.
l ' (a) Iixplain the characteristics of the Modern OperatingSystems. 1 0
(b) Explain the basic purpose of the followingconnecting devices in computer networks : 10
(i) Repeaters
(ii) Hubs
(iii) Bridges
(iv) Routers
(v) Gate ays
(c) Describe the layering structure of the TC p /Ipprotocol suite rc
MCS-O22 P . T . O .
(d) Write a LINUX shell script that accepts an arbitrarily
long list of file names as arguments and replaces all
digits in them with a "*". 5
(e) Explain the responsibilities of User and Kemel
modes of WINDO1 /S 2000 sYstem' 5
2. (a) Explain the following with teference to WINDOWS
2 0 0 0 : L 2
(i) Distributes file sYstem
(ii) File RePlication service
(iii) FAT16 and FAT32
(b) Explain the usage of the following for authenticating
a u s e r : I
(0 Hardware token '
(ii) Software token
3. (a) Describe the file system in LINUX'
(b) Explain Trivial File Transfer Protocol (TFTP) and
mention where it can be used.
(c) Discuss the page replacement algorithrn used by
LINUX.
4. (a) Discuss the mesh topology and list its advantages7and disadvantages
(b) Explain the role of NAME SERVERS and
RESOLVERS in DNS Architecture' 7
MCS -O22
(c) Mention the usage of the following LINUX
commands, with an exarnple for each :
(i) cat
(ii) cmp
(iii) diff
(iv) wc
(v) sort
(vi) chmod
5. Describe the following and also explain their usage : 4x5:20
(i) Vi Editor
(ii) Mapped Drive in WINDOWS 2000
(iii) Virtual Private Network remote access in WINDOWS
2000
(iv) IPSec
MCS-,O22
t
12,OOO
f^4.-*, IMCA (Revised)
Term-End Enamination
June, 2OO8
MCS-022 : OPERATING SYSTEM
CONCEPTS AND NETWORKINGMANAGEMENT
Tlme : 3 hours Maximum Marks : 700
Note : Question number 7 ls compulsory' Answer any
three questions trom the rest
1. (a)
(b)
(c)
Describe the auditng facilities of Windows 2000'
What sieps can one take to enhance the physical
security of a comPuter ?
Why is it important to disable the NULL session on
a computer in a network ? How can you do this in
Windows 2000 ?
What is ihe general format of a Linux command ?
How would you handle special characters in an
argument to a command ?
(d)
MCS-O22P.T.o .
(e) What are the advantages of Linux as an operatingsystem over those of the Microsoft family ?
How wordd 5,ou harden a Windo',Vs 2000 system toreduce the vr.rlnerability of a guest account ?
How can a Windows 2000 machine be assigned anIP address at starhip ?
How does a thread differ from an operating systemprocess ?
Describe the File Transfer protocol (FTp) and theusage of the ftp utility. What are its securityIoopholes ?
You have a file in Linux on which you do not havewrite permission. If you do haw write permisslon onthe directory in which the ftle is located, how canyou change the contents of the ftle ?
What are the characteristics of the 7 RA|D levels ?
Describe the wo*ing of the lpsec framework forpnvate bansmission over an Ip network.
What are the standard input, standard output andstandard error in Linux ? How are they used inpipelines and filters ?
Describ€ the cal command and its important options.
(s)
(h)
2. (al
(c)
3. (a)
(b)
I U
(b)
1 0
6
o
4tc,
MCS-022
4. (a) What is symmetrlc multiprocessing ? Describe its
architecture and benelits. I
(b) How does one set up a domain in Windows 2000 ?
How are trusi relationships between domains
established ? I
(c) How does the shadow password file enhance security
in Linux ? 4
5. Describe the following with examples where needed :
(a) Dynamic IP address allocation
(b) Full, incremental and dilferential backup
(c) we command in Linrx
(d) Windows Explorer
4x5=20
MCS-0?2 12 ,000
MCA (Revised)
Term-End Examination
Decritnber, 2OO8
MCS-022 : OPERATING SYSTEMCONCEPTS AND NETWORKING
MANAGEMENT
Time :3 hours Maximum Marks : 700
Nofe : Question number 1 is compulsory. Answer
any three questions from the rest.
l. (i) Write a shell script in Linux to input the marks
obtained (out of 100) bV a student in English,
Mathematics, Science, Computers and Biology'
Print out the aggregate percentage and the
result and division, where 600/o or more is a
first division, 450/o or more upto 60%o is second
division and 3570 or more upto 450/o is third
dMsion. Irrespective of the aggregate
percentage, a student is considered to have
failed if the marks in any subject are less than
35 . 10
MCS-022 P . T . O .
(ii) Describe two features of lntrusion Detection
system.
(iii) Draw a diagram of SNMP architecture and
show how it is used to manage network
devices. 10
(iv) List and describe the various security features in
Windows 2000 O.S.
(v) What is the purpose of distributed file system ?
2. (a) List the four computer system vulnerabilities. 4
(b) Discuss the various criteria for selecting a UPS
for your system.
(c) Discuss and list output of following LINUX
commands :
(i) $date, who
(ii) $diff firstjile second_file
(iii) $man who
(iv) $ls-a
(v) pwd
3. (a) Explain drive mapping facility in Windows2000 with suitable examples.
5
1 0
5
MCS-022
(b) Explain the following concepts of Windows
I2000 operating system :
(i) Global groups
(ii) Domain Local groups
(iii) Local groups
_ (iv) System groups
(c) Explain following facilities of Windows XP
operating system :
(il Sharing of files and folders in Windows XP 3
(ii) File Encryption 4
4. (a) With help of a diagram, explain the Windows
2000 layered structure. 10
(b) What do you understand by a fault tolerant
system ? Explain. 10
5. Describe the following and also explain their usage :1U2
(i) diff command in Linux
(ii) chmod command in Linux
(iii) vi editor
(iv) DHCP
(v) VPN (Virtual Private Network)
MCS.O22 P.T .O .
(vi) IPSec
(vii) Goals of Computer Security
(viii) Firewall
(ix) Intrusion Detection
(x) TFTP
MCS-022 1 1 ,000
ro
s.\
MCA (Revised)
Term-End Examination
Iune, 2A09
: OPERATING SYSTEM CONCEPTSNETWORKING MANAGEMENT
MCS-022AND
Time : 3 hours Maximum Marks : 100
Note : Question Nuntber 1, is compulsory. Answer any three
questions fro* the rest.
L. (a) \A/hat is symmetric multiprocessing ? Write
the important advantages of symmetric
mult iprocessor over uniprocessor
architecture.
(b) How can a coll ision be avoided on a
CSMA/CD network ? Also, compute
CSMA/ CD and token passing access
methods.
(.) Write a shell program to find the Greatest
Common Divisor (GCD) for any two given
numbers.
(d) What is a f i l ter in Linux ? Give two
examples of filters with the effect of each.
(") Describe the concept of encrypting using
EFS services.
MCS-022 P.T.O.
(f)
(g)
(h)
List any five services provided by Windows
2000 Server for network management.
Compare and contrast the 'Mandatory
Access control' and 'Discretionary Access
control' mechanisms in Window.
What option in registry management will
be useful in tracking who accessed the
Registry, from where, and when ? Also,
write the steps for enabling this option.
Ident i fy the classes of TCSEC for the
fol lowing cases. Also, explain the
specifications of each class :
(i) Labeled security protection
(ii) Security Domain
(iii) Controlled Access protection
How does a Token Bus network work ? In
what ways is its working different from
token Ring ?
Differentiate between absolute and relative
pathnames. Also, give an example for each.
(u) What is on-line conununication and off-line
communication in LINUX ? Give at least
two commands to carty out each of these
communication in LINUX.
(u)2 .
(b)
(")
3.
MCS-022
(b) What are the main components of DNS
architecture ? Explain them with their role
in address resolution and mapping. Also,
give a mechanism to be used for optimrzing
the search cost.
Write the main steps for configuring the
Local Area Network in Window XP.
(a) What is domain in network ? How does
Windows 2000 manage the domains ? Also,
explain how the trust relationship is created
and managed between domains ?
(b) Explain the limitations of packet filtering
gateways. How are these overcome by
stateful packet filtering firewall.
(.) Give the advantages and disadvantages of
Star, Mesh and Ring topologies.
Describe the following with illustrative examples
(.)
4.
J .
or diagrams as needed :
(u) X-Window system
(b) Network file server
(") RAID
(d) Virtual Private Network
- o O o -
3
4x5=20
MCS-022
I MCS-022I
MCA (Revised)
Term-End Examination
•7r December, 2009
OMCS-022 : OPERATING SYSTEM CONCEPTS
AND NETWORKING MANAGEMENT
Time : 3 hours Maximum Marks : 100
Note : Question Number 1 is compulsory. Answer any three
questions from the rest.
1. (a) How distributed operating system is better 4than network operating system ? Explain.
Explain the different methods used in LAN 6data transmissions.
Which protocol is used by TFTP at the 5transport layer ? Also, give any twoadvantages of TFTP over FTP.
List the different file systems supported by 5windows 2000 ? Why the new versionNTFS provided by windows 2000 has betterperformance and reliability.
Write the steps in window 2000 for creating 5a group called "Programmer" and foradding a user named "Rajeev." Assume useris already a member of guest account.
MCS-022
1 P.T.O.
List any five standard control features those 5should be implemented for user passwords.
What is "Backup Domain Controller" in 5Window NT ? Explain its importance inSecurity Management.
(h) Write a shell program to 'Reverse' an Input 5string.
2. (a) What is the kernel approach of operating 8system design ? How does this differ fromclient-server approach ? Explain itsadvantages.
What is X-Window system ? Explain the 5X-windows library and X-Toolkit.
Give an advantage and a disadvantage ofenabling offline files in windows XPenvironment. Also mention some usefuloption that can be set for users with anunreliable network connection.
3. (a) Explain the method to change the file 5permissions using octal mode and rwxmode, in LINUX. Give an example for eachcase where we want to change thepermission of a file called nay.txt such thatonly the owner may have all the permissionson this file and others will have only readpermission.
MCS-022 2
List the important components of domain 9name server. Also, explain how the DomainName Server is configured in LINUX.Explain the importance of pipes, filters and 6
redirection commands in LINUX. Give anexample for each.
4. (a) What are print servers ? How are these 7configured ? Also, in Windows explain theimportance of print queue management.What is Kerberos ? How is it used inwindow 2000 network for clientauthentication ? Explain the completeauthentication process.What are the functions and purpose 6repeater ? Which layer of OSI model doesit operate in ? Can we use repeaters to jointwo cable segments using different accessmethods ? Justify your answer.
5. Describe the following with illustrativeexamples or diagrams as needed : 4x5=20
Wide Area Network
SNMP ArchitectureFault Tolerant SystemWindows 2000 layered Architecture
- o 0 o -
MCS-022 3
No. of Printed Pages : 2 MCS-022I
MCA (Revised)
Term-End Examination7t.
June, 2010
MCS-022 : OPERATING SYSTEM CONCEPTSAND NETWORKING MANAGEMENT
Time : 3 hours Maximum Marks : 100
Note : Question No. 1 is compulsory. Answer any three
questions from the rest.
(e)
What is a Computer Network ? Discuss itsadvantages and disadvantages in detail.
Differentiate between Multiprogrammingand multithreading.
Discuss layered architecture of Windows2000 operating system.
Discuss the important features of LINUX
operating system.
Write a shell script in LINUX to count thenumber of words in a given file.
Explain in detail two computer security
mechanism.
Explain the logical and physical structureof active directory with reference toWindows 2000.
10
5
10
10
5
10
10
MCS-022
1 P.T.O.
3. (a) What are wild cards ? Discuss their 8importance with examples.
(b) Mention the usage of following LINUXcommands with an example of each : 2x4=8
(i) tail
grep
chmod
sort
(c) What happens if you try to "cat" a 4non-existing file ? Explain the steps takenby OS to handle this.
4. (a) Explain in detail various types of guided 10transmission media.
(b) Explain FTP and TELNET. Discuss their 10importance and uses.
5. Write short notes on the following : 5x4=20
Domain Name System.
Peer-to-Peer Network.
(c) Virtual Private Network remote access inWindows 2000.
(d) Firewall.
MCA (REVISED)
Term End Examination December – 2010
MCS-022 : OPERATING SYSTEM CONCEPTS AND NETWORKING MANAGEMENT
Note : Question No. 1 is compulsory. Answer any three question form the rest.
Q.1. (a) Explain the following : 5X2=10 (i) RAID (II) UPS
Q.1. (b) Explain the broad classifications of Advanced Operating System? 05
Q.1. © Differentiate between :- 05 Simplex, Half-Duplex and Full Duplex Mode of Data Flow.
Q.1. (d) Differentiate between :- 05 Gateways, Routers and Switches.
Q.1. (e) Explain the following with reference to Windows-2000 : 5X2=10 (i) Concept of Domain. (ii) Trust Relationship.
Q.1. (f) Write shell script in Linux for country the frequency of a given word in a given file. 05
Q.2. (a) Discuss abstract model of virtual to physical address mapping with reference to LINUX operating system. 07
Q.2. (b) Differentiate between absolute and relative pathnames with the help of examples. Explain how to specify absolute and relative pathnames in LINUX operating system. 08
Q.2. © With reference to LINUX operating system explain what will happen if we try to unmount a file system when users are working on it? 05
Q.3. (a) Explain the following with reference to windows-2000: 5x3=15 (i) When security groups should be used instead of distribution groups? (ii) User Administration (iii) Network Protocols
Q.3. (b) Explain the basic purpose of enabling the offline features in windows XP 05
Q.4. (a) Explain in details various type of Computer Networks as classified according to geographical area. (Types of Networks) 05
Q.4. (b) Explain SNMP protocol in detail. 10
Q.4. © Describe Kerberos management in Windows-2000 O/S. 05
Q.5. (a) Write Short Notes on the following: 5x4=20 (i) Cryptography (ii) IP Securities (iii) Concept of pipes, filters and redirection in LINUX operating system. (iv) Backup and Restoration in Linux