You are on page 1of 16

P.T.O.

IV Semester M.Sc. (I.T.) Examination, December 2009/January 2010


EMBEDDED SYSTEMS
(Repeater)
Time : 3 Hours Max. Marks : 75
Instruction : Answer all questions from Part A, and answer any five
questions from Part B.
PART A (122+11=25)
1. What is deadline ? List different types of deadlines.
2. Write the different constraints in the embedded system.
3. Write the block diagram of microcontroller.
4. What is the difference between RISC and CISC ?
5. What do you mean by machine cycle ?
6. Draw the voneumann structure and Harvard structure block diagram.
7. What is TPU ?
8. Define linker and start upcode.
9. List the advantages of simulator.
10. List the applications of RTOS.
11. Define pooled loop structure.
12. Define senaphore.
13. What is scheduling point ?
PART B
Answer any five : (510=50)
1. Discuss the different implementation types of embedded system.
2. Explain the performance characteristics of RTOS.
3. Explain the working of microprocessor based system. List its advantages.
4. Explain in detail the bits associated with ALU.
5. a) Write the features of Vx works.
b) Write a note on classification of embedded systems.
6. What is the role of compiler and loader ? Explain.
7. What is emulator ? Explain the advantages of ROM emulator.
8. Briefly explain the following :
i) Scheduling points
ii) Readylists
iii) Idletask
iv) Context switching.
____________________
IV Semester M.Sc. (IT) Examination, Dec. 2009/Jan. 2010
CYBER LAWS
(Repeater)
Time : 3 Hours Max. Marks: 75
PART A
1. Answer all of the following : (102=20)
a) Define Cyberspace.
b) What is common law ?
c) What are the Institutions of Judicial system ?
d) What are the principal remedies for branch of contract ?
e) Explain different types of Injunctions.
f) Explain Cyber Privacy.
g) Explain P3P.
h) Explain WCT and WPPT.
i) Explain importance of patent.
j) What are the different branches of law ?
2. Fill in the blanks : (51=5)
a) The Internet has been called a ___________.
b) The Judges of the Supreme Court are appointed by the ___________.
c) Document filed by the plaintiff and defendant are called ___________ of the
parties.
d) Software piracy means ___________.
e) Rights Management Information providing legal support to ___________.
P.T.O.
PART B
Answer any 5 questions : (510=50)
1. Explain Processing of Bills and Government Function.
2. State and discuss the primary assumptions of a legal system.
3. a) Describe the procedure in a criminal case.
b) Explain what you understand by public interest Litigation.
4. List and discuss the current form of computer crimes.
5. List out the essentials of a valid contract. Explain each one in brief.
6. Explain different issues arises in unfair competition.
7. Write a note on the Information Technology Act 2000.
8. Discuss the adjudicatory processes incorporated in the Act.
_______________
P.T.O.
IV Semester M.Sc. (I.T.) Examination, December 2009/January 2010
APPLICATION SERVERS
(Repeater)
Time : 3 Hours Max. Marks : 75
Instructions : Answer all questions in Part A. Answer any five questions
in Part B.
PART A (102+51=25)
1. Define Throughput.
2. With diagram, show the architecture of two-tier with Network.
3. What is Bean ?
4. Define CORBA.
5. List the limitations of application server.
6. Define objects.
7. What is JDBC ?
8. List the limitations of application server.
9. What is object synchronization ?
10. What are the properties of WebSphere ?
11. Briefly explain the following terms :
a) RAD
b) EJB
c) CMP
d) JAAS
e) CORBA.
PART B (510=50)
1. Discuss about the three-tier architecture with diagram. Explain its limitations.
2. List some of the component models and related technologies that can be used to
sign and implement business applications in an server.
3. Discuss briefly about : a) Persistence b) Applets c) JSP.
4. Explain the limitations of application server.
5. List some of the categories of middleware architecture, Explain any 2 in brief.
6. What is ORB ? Explain the use of ORB in clients and server communication.
7. Discuss J2EE application components and routine 5M environments. Explain the
concept on CGI.
8. Discuss briefly about the following :
a) Inheritance
b) Classes
c) Polymorphism.
____________________
IV Semester M.Sc. (I.T.) Examination, Dec. 2009/Jan. 2010
LINUX INTERNALS
(Repeater)
Time : 3 Hours Max. Marks : 75
Instruction : Answer all questions from Part A and answer any five questions
from Part B.
PART A
1. Write the functions performed by the Kernal. (102+51=25)
2. List the benefits and limitations of shell.
3. What are the different modes of vi ?
4. Describe the ls command with different options.
5. Explain the cd command in Linux.
6. What is pid ? What is it used for ?
7. Explain the two modes on which processes run.
8. What is #! use for ?
9. What are the steps to create a new used account ?
10. Write the difference between home directory and working directory.
11. Define the following :
i) directory tree
ii) absolute path name
iii) man
iv) fork
v) grep.
P.T.O.
PART B
Answer any five questions of the following : (510=50)
1. Explain the different directories at /usr/scr/linux.
2. Explain the following in Linux :
a) date
b) .erase
c) .expr
d) patch.
3. Explain the following commands with its general format :
a) ping
b) tr.
c) passwd
d) join.
4. With a diagram explain a process virtual memory.
5. Explain the different looping statements in linux with suitable examples.
6. With the help of a diagram explain the physical layout of the ext2 file system.
7. Explain any 5 text processes commands of linux.
8. Explain the partition utility fdisk with its different options.

P.T.O.
IV Semester M.Sc. (IT) Examination, Dec. 2009/Jan. 2010
COMPUTER COGNITION
(Repeater)
Time : 3 Hours Max. Marks : 75
PART A
Answer all questions.
(Question 1 carry 1 mark and question 2 to 13 carries 2 marks each). 25
1. What is sampling ?
2. List any two simulated tools for Computer Cognition.
3. List any three different alternate names for Neural Networks.
4. What is the capacity of a Perceptron ?
5. What do you mean by learning in an ANN ?
6. What are the limitations of Back propagation algorithm ?
7. What is a use of Laplacian operator ?
8. What is function approximation ?
9. What are the parameters of the Gaussian function ?
10. What is an illposed problem ?
11. What is unsupervised learning ?
12. What are dynamic learning algorithms ?
13. Explain genetic algorithms.

PART B
Answer any five questions : (510=50)
1. Derive the expression for the error co-efficients used in the update of the weights
in a MLP network.
2. Explain the K-means algorithm for obtaining the optimal centers for the RBF units.
3. What is convex hull ? Can a three-layer BP network solve any classification problem ?
Explain.
4. Discuss how growing cell structures overcome the drawbacks of Kohonen network.
5. a) What are the differences between uni-modal and multi-modal functions ?
b) Explain structure of a simple genetic algorithm.
6. Discuss the advantages and disadvantages of Evolution Programming and Evolution
Strategy.
7. Write pseudo code for learning CFS and non-learning CFS.
8. Explain Genetic Program and Classifier System in detail.

P.T.O.
IV Semester M.Sc. (I.T.) Examination, December 2009/January 2010
IMAGE PROCESSING
(Repeater)
Time : 3 Hours Max. Marks : 75
PART A
Answer the following : (210+51=25)
1. Name any 4 applications of Image processing.
2. Define digital image.
3. What is a pixel ?
4. Define sampling.
5. List different levels of data representation.
6. Give the equation of Discrete Fourier Transform pair.
7. List the categories of Image processing.
8. Name the types of data redundancies in image processing.
9. What is image segmentation ? Name the different techniques available for image
segmentation.
10. What is false contouring ?
11. Briefly explain the following :
i) thresholding
ii) histogram
iii) image restoration
iv) sobel operator
v) quantization.
PART B
Answer any five : (510=50)
1. Explain the steps involved in Digital Image Processing.
2. Explain Digital Image properties.
3. Describe the different topological data structures.
4. Show that the Fourier Transform of the convolutes of two functions is the product
of their Fourier transform.
5. How do you restore images from degradation ? Explain.
6. Explain lossy predictive encoder and decoder with block diagram.
7. Explain the different boundary descriptors.
8. Explain split and merge algorithm.

IV Semester M.Sc. (I.T.) Examination, Dec. 2009/Jan. 2010


DISTRIBUTED DATABASE
(Repeater)
Time : 3 Hours Max. Marks : 75
Instruction : Answer all questions from Part A, and answer any 5 questions
from Part B.
PART A (102+51=25)
1. Write any two difference between LANs and WANs.
2. What is Hybrid model ?
3. What is Distributed Processing ?
4. What is a query ?
5. What is the concept of redundancy ?
6. State vertical partitioning and clustering problem.
7. Write a note on query processing problem.
8. Define commit point site.
9. What do you mean by a distributed transaction ?
10. State Happended-before relation.
11. Briefly explain the following :
a) Distributed Operating System (DOS)
b) DDBMS
c) Query optimization
d) Deadlock
e) Synchronization
P.T.O.
PART B (510=50)
Answer any 5 questions :
1. Describe the seven-layer architecture suggested by ISO.
2. Explain Distributed Computing Environment.
3. Explain the reference architecture for distributed databases.
4. Describe Top-Down and Bottom-Up approach with an example.
5. Explain the different characteristics of query processor.
6. Explain the recovery techniques in centralized database with an example.
7. Explain global optimization and local optimization with an example.
8. Write a note on:
a) Berkley algorithms
b) Cristians method.

IV Semester M.Sc. (IT) Examination, Dec. 2009/Jan. 2010


COMPONENT TECHNOLOGIES (Repeater)
Time : 3 Hours Max. Marks : 75
PART A
Answer the following : (122+11=25)
1. What are 2 types of entity beans ?
2. What are stateful beans ?
3. What is Remote Interface ?
4. What is COM ?
5. List any 4 Active X-Services.
6. Mention the 4 features of MTS.
7. Define Integrity and Authenticity.
8. What is Digital signature ?
9. Define encapsulation.
10. Define symmetric cryptography.
11. What is COM+ ?
12. What is Active X conferencing ?
13. Expand the following term : JDBC.
P.T.O.
PART B
Answer any five : (510=50)
1. Write down the steps involved in the development of DCom.
2. Explain Remote and Host interfaces.
3. Explain Enterprise Java Bean container.
4. Write an explanatory note on stateless session beans.
5. Give a detailed step by step process of cyber cash transaction.
6. What are different parts of an exchange topology ? Explain in brief.
7. Define UDT. Explain its use in main areas.
8. Explain basic types of cryptography system in detail.

You might also like