Sem3 Question
Sem3 Question
Roll No.!MRo
MCA (III-SEM) EXAMINATIONS, 2022-23
Data Communication and Computer
Time: 3 Hours Networks
Max Marks: 60
" Write your Roll No. on the top
immediately on receipt of the question paper.
Attempt ALL questions by selecting any TWO parts. All
questions carry equal marks.
1. (a) What are the issues that should be
models? Explain. considered in designing different layers in the network
(c) Prove that a receiving station can get the data sent by
data on the channel by the sender's chip code and thena specific sender if it multiplies the entire
divides it by the number of stations.
4. (a) What are the network support layers and the user support
layers? Briefly Explain.
(b) List the order of various extension headers used in next
Explain. generation internet protocol. Briefly
(c) Explain the strategies for transition from IPV4 to IPV6.
5. (a Differentiate between TCP and UDP protocols.
(b) What is Domain Name System? Explain its
working mechanism.
(c) What is extended service set in a WLAN? Write any two
networks. features of ad-hoc and infrastructure
Code: CBCSS39.1
Roll No.
MCA (SEM-I) EXAMINATIONS, 2022-23
Data Analytics with HADOOP
Time: 3 Hours
Max Marks: 60
" Write your Roll No. on the top immediately on receipt of the question
paper.
Attempt allquestions by selecting any twO parts. Al questions carry equal marks.
1. (a) What is Cloud Computing? Discuss various services model of Cloud.
(b) The scenario given below:
0.26 Rs/CPU-hour: One load balancer
0.50 Rs/CPU- hour: 4 appli cation Servers
0.91 Rs/CPU-hour: 4 database servers
Find the cost of cloud use for two days for the above scenario.
(c) () What is the availability of cloud services, if capacity period is 9760 and you have 40% chance of
server failure and it takes 30 hours to fix it?
(ii) What is availability of cloud services, if you have 30% chance of your server failing and it takes
20 hours to fix it and the capacity period is 97902 Ilustrate other points of failure in the
with four cable outage in three hours.
system
(b) How is problem solving with MapReduce? Explain Hadoop 2.x MapReduce Components.
(c) Explain MapReduce Job Submission Flow. The document contains the following statements as
given below:
"Department of Computer Science is very good department. Computer
Science department in Jamia Millia Islamia. M
Find the overallword count using MapReduce Techniques.
Code: CSC33
Roll No...2021o2/1
MCA (I|-SEM) EXAMINATIONS, 2022-23
Information Security
Time: 3 Hours
Max Marks: 60
Write your Roll no. on the top immediately on receipt of
the question paper.
Attempt ALL questions by selecting any TWO parts. Allquestions carry
equal marks.
1. (a) ldentify the six components of an information
security. system. Briefly explain each in terms of information
(b) Illustrate the various methods asocial engineering hacker use to gain
credentials. information about a user's
(c) What are the various forces of nature? Briefly discuss each with
respect to different organizations.
2. (a) Write down the policies, practices, standards, guidelines and
management. procedures for password
(b) An organization supports routine operations by executing various
and which type of security policy needs to be implemented by the technologies and processes. How
organization.
(c) An organization wants to implement or improve its risk management and
programs. Briefly explain the steps according to the NIST framework. information security
3. (a) What is security architecture? Explain its key components.
(b) illustrate protection mechanisms in a trusted computing base.
(c) Describe the common criteria in terns of its purpose along with supported security functional
requiremnents.
4. (a) ilustrate substitution cipher method of cryptography with a suitable example.
(b) Atypical PKI solution protects the transmission and reception of secure information by integrating
several components. Briefly discuss each.
(c) Using the transposition technique with a symmetric key, explain how encryption and decryption
operates.
5. (a) To ensure operations security, the individual in charge of information security must keepa number
of actions in consideration. Specify these actions.
(b) Determine what the features of a good access control system with reference to MAC.
(c) Discuss the problems with passwords and the techniques to authenticate users than passwords
alone.
Roll No"CDOYG
Code: CSC32
M.C.A. (1-SE/ 1) EXAMINATIONS, 2022-23
Arificial lntelligence
Max Marks: 60
Time: 3 Hours
Write your RollNo. on the top immedie aly on receipi of the question paper.
Attempt ALL questions by selecting an WO parts. All questions carry equal marks.
Use of Scientific calculator is permitted.
(a) Explain how Al is applicable for any one of the following case studies:
(i) Al can look at food photos and uess recipes.
(ii) Lip-reading Al to aid those with hearing loss.
(b) Consider a hypothetical game tre with branching factor 3 and depth 3. Assume the
evaluation of leaf node fromi left to riynt order is: 8, 7, 2,0, 1, 6, 2, 4, 1, 1, 3, 5, 3, 9, 2, 5, 5, 2,
1, 2, 3, 9, i, 2, 16, 6, 4. Suppose firsi player is maximizer,
(i) What is the optimal strategy usinç MiniMax algorithm?
(ii) Which all nodes will be cut off usig alpha-beta cut-off algorithm? Explain why this cut-off
process ensures non-removal of the optimal strategy altogether.
(iüi) What do you mean by perfect orieringof nodes below a MIN or MAX node? Assuming
nodes are following perfect orderi :g, how many nodes will be evaluated using alpha-beta
cut-off algorithm?
Will all of the above answers change. in case you start generating and evaluating nodes from
right to left order instead of leít to rig!::? Give reasons for your answer.
(c) (i) Compare Iterative deepening search and Uniforn-cost search with respect to
completeness, time and space ccplexity, and optimality.
(ii) Solve the variant of 8-puzzle shov:) below using A* search by sugnesting a suitabie
heuristic function.
Current Sat Goal State
1|2 1
56
4 | 7 | 7Si
2. (a) Give output of íoilowing Froiugprogrem by drawng proot ree:
pred( [], 0).
pred( [X|T], (X| Result] ):- X > 10, pred (T, Result).
?-pred( (12,3,14, 5,8), Result).
(b) Assume the following facts: "l married a widow (let's call her W) who has a grown-up daughter
(Call her D). My father (F), who visited us quite often, fell in love with my step daughter and
married her. Hence my father became my son in law and my step daughter became my
mother. Some months later, my wife gave birth to ason (S1), who became the brother-in-law
of my father, as wellas my uncle. The wife of my father, that is, my step daughter, also had a
son ($2).
() Using predicate calculus, create a set of expressions that represent the situation in the
above story.
(i) Use Predicate logic to prove conclusion: "l am my own grandfather"
(c) domains
Explain the purpose of Prolog library Constraint Logic Programming (CLP). For which
it is available? How can it be used efficiently for solving Al puzzles: Cryptarithmetic
or Sudoku
Roll No: A
CBCSE38.4
PG-CBCs (Semester-lI) Examinations, 2022-23
Computer Forensics
Time: 3 Hours Max Marks: 60
Write your RollNo. on the top imnediately upon receipt of the question paper.
Answer precisely any tWo parts from each of the questions.
1 (a) What does the term "Six Forensics Ws" mean? Illustrate cach with particular examples in an
investigation into a typical case ofa sensitive data breach and abuse scenario.
(b) What are the common forensic principles pertaining to "Exchange, Individuality, and
Probability"? Illustrate, using specitic cases for each, how a typical data concealment method
can jeopardize each of them.
(c) Asuspect has erased vital Windows HDDdata that cannot be recovered from the Recycle Bin.
Describe two potential recovery approaches along with their respective mechanism3,
practicability, and forensic validity.
2 (a) Enlist the differences between latent and archived data with regard to computer forensics.
Explain categoricaly, how typical latent data are produced, what causes them, and how useful
they could be in forensic investigations.
(b) Describe the concepts and exclusive significance of stripping, mirroring, and parity. Compare
RAID 10 and 4 with regard to inherently associated mechanisms, minimum disk requirements,
and forensic values/concerns - along with a precise statement on justification.
(c) At a murder scene, you have started 1naking an image of a suspect's windows-laptop. You're
in the back bedroom of the house, and a small fire has started in the kitchen. If the fire can't
be extinguished, you have only a few minutes. Outline your options and approach
categorically as Plans A&Bfor forensic acquisitions and preservation of the data.
3 (a) What are typical Windows resilient file systems and registries? Describe their respective
significance, and list the two important pieces of information that a forensics examiner may
obtain from an investigation of each of them.
(b) An employee suspects that his password has been compromised. He changed it two days ago,
yet it seems someone has (mis)used it again. What might be going on, what may be the
inculpatory and exculpatory pieces of evidence, what may be their respective locations, and
how will you acquire them?
(c) Compare the Windows forensics tools namely - Encase and FTK by highlighting the exclusive
functionalities, the feasibility of typical acquisitions, advantages and drawbacks of each.
4 (a) What are virtual machines and hypervisors? Compare type-1 and type-2 hypervisors
categorically with regard to virtualization, scalability, performance, security, and forensic
values/concerns.
(b) In which critical situation, do live acquisitions become important and play a critical role in
computer forensics? Compare RAM, temporary files and archival media on associated order
of volatility, exemplar forensic data, ad feasible means of forensic acquisitions.
(c) Your company wants to send customers a working Virtual Machine with a sample of its new
software, but you are worried about the security of the software and data. In the context of
forensics, identify and list three specific precautions you will take, and explain why you are
taking them.
5 (a) Describe the role of e-mail headers during a forensic examination of a case involving e-mails.
What useful information do e-mail headers and logs may be generally revealed as digital
evidence?
(b) Amother calls you to report that her 1S-year-old daughter has run away from home. She has
access to ber daughter's e-mail account and says her daughter has e-mails in her inbox
Suggesting she has run away to be wiih a 35-year-old woman. Her daughter has also made
related posts on Snapchat. How you should examine and retrieve the piece of evidence, and
how will you assure itsforensic soundness and admissibility in a court of law?
(C) What are social media sources and assoelated torensics? List the typical pieces of evidence
that could be gathered from them, Wo ledsible means/tools, and traceability by direct and/or
remote acquisitions.
Code: CSE35.15 Roll No.C04E
MCA (SEM-III) EXAMINATIONS - 2022
Elective II: Programming with Java
Time: 3 Hours
Max Marks: 60
Write your Roll No. on the top immediately on receipt of the question paper.
Attempt ALL questions by selecting any TWO parts. Al questions carry equal marks.
1. (a) Write down description with example of at least four new
features introduced in Java 10. Also write at
least twWO most serious deficiencies in Java.
(b) What is the role of rt.jar file in Java? Explain the functions of the
following Java command-line tools:
javap, javadoc, jar.
(c) What are the classes to handle Big Numbers in Java? Explain any one with example.
2 (a) What do you mean by Autoboxing? Write down few applications of Cosmic Super class 'Object' with
example(s).
Differentiate between an abstract class and an interface. What is Reflection?
(c) Design a class Registration in Java consisting of loginlD, password, name, address, city, mobile,
email with necessary parameterized constructors and getter methods. The policy for the password is as
follows
i) at least 8 characters in length
ii) no space
ii) at least one Upper character, and number.
Implement the password validation policy within constructors. Demonstrate the working of the class in
the main program.
3
(a Conipare and contrast among StringBuffer, stringBuilder and stringtokenizer string
t:snding ceeses Wite a program to tokenize the namee of the programming lYnguages from the
following sentence: "Python, Matlab, R, Java, Google GO,Visual Basic"
What are the benefits of generic programming? Also write down the restrictions and limitations of generic
programning.
(c) Define a genetic class to maintain a two-dimensional array of generic types. The size of the array is
passed through constructor, which also performs necessary memory allocation. The class contains a
method genericAverage () that returns the average of the array. Test the working of the above class
in the main program on different types of data (such as integer, floating point).
4. (a) What are the advantages of Coliection framework? How a Map is different from Collection interface?
What is adaermon thread? How can we alter the priority of Java thread? Describe with example(s).
(c) Write a Javaprogram to create a thread which generates a serial number starting from 1and goes up to
5.000. If an upper limit is reached, the counter is reset to one. Demonstrate the working of the thread in
the main program.
5. (a) What are different swing components? Explair: the working of Mouse Event with example(s).
(b) What is a Callable Statement in JDBC? Explain the process of executing a SQL query using JDBC APis.
(c) A librarian wanted to digitize the book stock register and willing to store information such as
AccessionNo, Title, Authors, Publishers, Price and NoofCopies to a database. Write a
Java program which accepts these information from the user, connect to the database and store it to a
database table. Assume that table scheme already exists within the database. Make necessary
assumptions about database driver.
DEPARTMENT OF COMPUTER SCIENCE
JamiaMillia Islamia
SESSIONAL TEST -||
(Odd Semester, 2022-23)
Use the square of Euclidean distance to find the winning neuron (let say C) for the input vector
(0.5, 0.2).
Using a learning rate of 0.2, find the new weights of unit C.
If units G1 and C1are part of radius of neighborhood=1 of this winning neuron G, find their new
weights too.
6. fine thecr of memory. Which neural network model you know which is used for pattern (2)
storage and Jccalling? Explain it with an example.