Sei sulla pagina 1di 29

MCA (Revised) Term-End Examination ' June, 2006 MCS-022: OPERATING SYSTEM CONGEPTS AND NETWORKING MANAGEMENT

Time : 3 hours Note : MqximumMarks: 700

Question number f. is compulsory. Answer any three questionst'rom the rest. Describethe structureof 5 classes IP addresses. of Differentiatebetweenthe following concepts: (i) (ii) Multiprogramming Multitasking

l.

(a) (b)

5 6

(iii) Multiprocessing (c) Write a shell script that prints a list of every unique word in a file, in reversealphabetical order. Explain the function of the following : (i) (ii) LS-L /etc/shadow Iile

6 4

(d)

MCS-022

P.T.O.

(e)

Define the concepts of domains, workgroups and trusted relationships in the context of Windows

2000.
(f) What is Kerberos ? Describe Kerberos management in the Windowsoperatingsystem. Describe two types of back-ups. Differentiate between virtual circuit and datagram to approaches packet switching. 2. (a) Explain four basic design issues in a multimedia operating system. (b) Differentiate betweentheTCP/lP and OSI relerence models, and map the layers between the two approaches. (c) How would you set the IP addressof a LAN card in Lintx ? 3. (a) Describethe various securityfeaturesin the Windows 2000 operating system. Further, explain the differencebetweenthe securityfeaturesof an OS and of a network. (b) Describe the steps needed to configure the network file sewer in the LINUX operatingsystem; .Explain the drawback of LINUX. 10

6 5

k) (h)

5 5

(c)

MCS-022

4.

(a)

Describethe GUI featuresof Linux. Also explain the corresponding GUI features of Windows 2000. Further, comparethe usefulness thesefeatures. of 10

(b)

Describe two features of the Intrusion Detection System(lDS). What are the requirements a user to be able to for kill a process in Linux ? Write the necessary commands.

(c)

5 20

5.

Describethe following : (i) (ii) Fault tolerant system sNMP

(iii) IPSec (iv) Architectureof the Windows2000 operatingsystem

MCS.O22

5,000

MCA (Revised) Term-End F,rramination December, 2006

MCS -022 : OPERATINGSYSTEM CONCEPTSAND NETWORKING MANAGEMENT


Time : 3 hours Note r MaximLtmMsrks : 704

Qu estion number 1 is compulsory. Answer qny three questionsfrom the rest. '

l.

(a) A computer has a monitor that consumes60 W of power. The CPU requires 100 W. What should be the minimum power rating of a UPS used for supplyingpower to this computer ? (b) What is the basic difference between Network operating system and Distributed operating system ? of I carry a CD containing600 MB (megabytes) data from my houseto yours. If it takesme 30 minutesto drive down to your house, what is the data transmissionrate ? What are the different states of Linux Operating System ? 1

(c)

(d)

MCS-022

P.T.O.

(e)

Write a shell script to accept upto 5 numbers as argumentsand print out their arithmetic mean. List some of the duties of a systemadministrator. How does a domain differ from a workgroup ? What are the goals of Computer Security ? ? What is Computer-Security classification Explain. Describe the strategy for hardening your Windows 2000 operatingsystem . What is a computer virus ? Describe the different types of viruses.

5 5 5 5 8

(f) (g) (h) 2. (a) (b)

(c)

3.

(a)

Distinguish between virtual and physical addresses. List the various data structuresrequired for address mapping from virtual to physical addresses and 10 describethe process. Draw the logical netwo-rklayout of a Windows 2000 \ctive Directory and describeits components, Name various authenticationsavailablein Windows operating systemand describeany one of them. E*pand the following : (i) (ii) RADTUS NAT

(b)

10

4.

(a)

(b)

(iii) rcs
(iV) RRAS (v) MCS-022 EFS

(c) ' Discuss IPSec implementation the Windows 2000 in operatingsystem. (d) What are input and output restrictions,filtering and pipelining of instructions Linux ? in

5.

Describethe following : (i) (ii) Policy Inheritance Fault Tolerant System

20

(iii) Kerberos (iv) Confidentiality and Integrity

MCS-022

7,000

MCA (Revised) Term-End F,xamination June,2OO7 MCS-022 : OPERATING SYSTEM CONCEPTS AND NETWORKING MANAGEMENT
Time : 3 hours Note r Maximum Marks : 7AA

Qu estion number 7 fs compulsory. Ans wer any three questionsfrom the rest.
i

1-

(a) (b)

what are the goals of computer security? Describe the microkernel approach in modern operating systems.Also write the advantages this of approach i

(c)

What is a repeater and what are its uses and characteriptics ? What are ithe offline file featuresin Windows XP and how would you enablethem and disablethem ? How can you change the passwordin Linux ? What are the iprecautions that should be taken while choosingapassword?
l

(d)

(e)

MCS-022

P.T.O.

(f)

Write a Unux shell script to shift all charactersin a (Thus 'a' becomes'd', file forward by 3 characters. 'z' 'c'.) while becomes What are the different principles of authenticationand how are they used ? user

(g)

(h)

Describe the available security features while managingpointersin Windows 2000. Describe the various kinds of transmission media with their characteristics, advantages and disadvantages. How does the remote access mechanismin Windows 2A00 work and how can it be configured? What is a UPS and why is it used ? Describe the different kinds of UPS systems.

2.

(a)

(b)

(c)

3.

(a)

Describe the working and usage of the vi editor in Linux with the help of Add, Delete, Copy, Find and 10 Replacecommands. Show how to configure the Apache web server for the Linux operating system What are the security controls that should be implemented for accessto a computer system ? Describethe structureand usageof Active Directory in Windows2000. ,

(b)

(c)

4.

(a)

MCS-022

(b)

How would you use an instant messaging application like Yahoo Messengerin Linux ? Explain with the help of commands. What is a gateway ? Describe its purpose and working; i

(c)

5.

Describethe following with suitableexamples: (i) (ii) The three types of data flow Structure of Unix operating system

20

(iii) Featuresof "Write" command in Linux (iv) Domains in Windows 2000

MCS-022

11 , 0 0 0

MCA (Revised) Term-End Examination December, 2OO7

MCS-022 : OPERATINGSYSTEM CONCEPTSAND NETWORKING MANAGEMENT


T'ime: 3 hours Note r Maximum Marks: 700

Qu estion number 1 is compulsory. Ans_wer any three quesfions from the rest.
Iixplain the characteristics of the Modern Operating Systems. basic purpose of the following connecting devices in computer networks : (i) (ii) (iii) (iv) (v) Repeaters Hubs Bridges Routers Gate ays the TC p /Ip rc Explain the

l '

(a)

10
10

(b)

(c)

Describe the layering structure of protocol suite

MCS-O22

P.T.O.

(d)

Write a LINUX shell script that acceptsan arbitrarily long list of file names as arguments and replaces all digits in them with a "*". Explain the responsibilities of User and Kemel modes of WINDO1/S 2000 sYstem'

(e)

2.

(a)

Explain the following with teference to WINDOWS L2 2000: (i) (ii) Distributes file sYstem File RePlicationservice

(iii) FAT16 and FAT32 (b) Explain the usage of the following for authenticating auser: (0 (ii) 3. (a) (b) Hardware token ' Software token I

Describethe file systemin LINUX' Explain Trivial File Transfer Protocol (TFTP) and mention where it can be used. Discuss the page replacement algorithrn used by LINUX.

(c)

4.

(a) Discuss the mesh topologyand list its advantages


and disadvantages (b) Explain the role of NAME SERVERS and RESOLVERSin DNS Architecture'

M C S- O 2 2

(c)

Mention

the

usage of

the

following

LINUX

commands, with an exarnple for each : (i) (ii) (iii) (iv) (v) (vi) cat cmp diff wc sort chmod

5.

Describethe following and also explain their usage : (i) (ii) Vi Editor Mapped Drive in WINDOWS 2000

4x5:20

in (iii) Virtual Private Network remote access WINDOWS 2000 (iv) IPSec

MCS-,O22

12,OOO

I f^4.-*,
MCA (Revised) Term-End Enamination June, 2OO8 SYSTEM MCS-022: OPERATING AND NETWORKING CONCEPTS MANAGEMENT
Tlme : 3 hours
Note :

MaximumMarks: 700
Answer any

Question number 7 ls compulsory' three questions trom the rest

1.

(a) Describethe auditng facilitiesof Windows 2000' (b) What sieps can one take to enhance the physical
security of a comPuter ? sessionon Why is it important to disablethe NULL you do this in a computer in a network ? How can Windows 2000 ? ? What is ihe general format of a Linux command in an How would you handle special characters argument to a command ?

(c)

(d)

MCS-O22

P.T.o.

(e)

What are the advantages of Linux as an operating system over those of the Microsoft family ? How wordd 5,ou harden a Windo',Vs2000 system to reduce the vr.rlnerabilityof a guest account ?

(s)
(h)

How can a Windows 2000 machine be assignedan IP addressat starhip ? How does a thread differ from an operating system process?

2. (al Describe the File Transfer protocol (FTp) and the


usage of the ftp utility. What are its security Ioopholes? (b) You have a file in Linux on which you do not have write permission.If you do haw write permisslonon the directory in which the ftle is located, how can you change the contents of the ftle ?
(c)
IU

What are the characteristics the 7 RA|D levels? of

3.

(a) Describe the wo*ing of the lpsec framework for


pnvate bansmissionover an Ip network.

10

(b) What are the standard input, standard output and


standard error in Linux ? How are they used in pipelinesand filters ? tc, Describthe cal commandand its important options.
o 4

MCS-022

4.

(a)

What is symmetrlc multiprocessing? Describe its architectureand benelits. How does one set up a domain in Windows 2000 ? How are trusi relationships between domains ? established

(b)

(c)

How does the shadowpasswordfile enhancesecurity in Linux ?

5.

Describe the following with examples where needed :

4x5=20
(a) (b) (c) (d) Dynamic IP addressallocation Full, incrementaland dilferentialbackup we command in Linrx Windows Explorer

MCS-0?2

12,000

MCA (Revised) Term-End Examination Decritnber, 2OO8 SYSTEM MCS-022: OPERATING AND NETWORKING CONCEPTS MANAGEMENT
T i m e: 3 h o u r s Nofe : Maximum Marks : 700

Question number 1 is compulsory. Answer any three questionsfrom the rest. Write a shell script in Linux to input the marks obtained (out of 100) bV a student in English, Mathematics,Science,Computersand Biology' Print out the aggregate percentage and the result and division, where 600/oor more is a is or first division, 450/o more upto 60%o second division and 3570 or more upto 450/ois third the aggregate Irrespective of dMsion. percentage, a student is considered to have failed if the marks in any subjectare less than 35. 10 P.T.O.

l.

(i)

MCS -0 2 2

(ii) Describe two features of lntrusion Detection system.

(iii) Draw a diagram of SNMP architecture and show how it is used to manage network 10 devices. (iv) List and describethe various security features in Windows2000 O.S. (v) What is the purpose of distributed file system ?

10 5
4

2.

(a) List the four computer systemvulnerabilities. (b) Discussthe variouscriteria for selectinga UPS for your system. (c) Discuss and list output of following LINUX commands : (i) $date, who

(ii) $diff firstjile second_file (iii) $man who (iv) $ls-a (v) pwd 3. (a) Explain drive mapping facility in Windows 2000 with suitableexamples.

MCS-022

(b) Explain the following concepts of Windows 2000 operating system : (i) Global groups

(ii) Domain Local groups (iii) Local groups _ (iv) System groups (c) Explain following facilities of Windows XP operating system : (il Sharing of files and folders in Windows XP 3 4

(ii) File Encryption 4.

(a) With help of a diagram, explain the Windows 10 2000 layeredstructure. (b) What do you understand by a fault tolerant 10 system? Explain.

5.

Describethe following and also explain their usage :

1U2
(i) diff command in Linux (ii) chmod command in Linux (iii) vi editor (iv) DHCP (v) VPN (Virtual Private Network)

MCS.O22

P.T.O.

(vi) IPSec (vii) Goals of Computer Security (viii) Firewall (ix) Intrusion Detection (x) TFTP

MCS-0 2 2

11 , 0 0 0

MCA (Revised)

ro

Term-End Examination

s.\

Iune, 2A09

MCS-022: OPERATING SYSTEM CONCEPTS AND NETWORKING MANAGEMENT


Time : 3 hours Note : Maximum Marks : 100

QuestionNuntber1,is compulsory.Answer any three questions fro* the rest. \A/hatis symmetric multiprocessing? Write the important advantagesof symmetric multiprocessor architecture. over uniprocessor

L.

(a)

(b)

How can a collision be avoided on a CSMA/CD network ? Also, compute CSMA/ CD and token passing access methods.

(.)

Write a shell program to find the Greatest Common Divisor (GCD) for any two given numbers. What is a filter in Linux ? Give two examples of filters with the effect of each. Describe the concept of encrypting using EFSservices. P.T.O.

(d)

(")

MCS-022

(f) (g)

List any five servicesprovided by Windows 2000 Server for network management. Compare and contrast the 'Mandatory Accesscontrol' and 'Discretionary Access control' mechanisms in Window.

(h)

What option in registry management will the be useful in tracking who accessed Registry, from where, and when ? Also, write the steps for enabling this option.

2.

(u)

Identify the classesof TCSEC for the following cases. Also, explain the specificationsof each class : (i) (ii) (iii) Labeled security protection Security Domain Controlled Accessprotection

(b)

How does a Token Bus network work ? In what ways is its working different from token Ring ? Differentiate between absolute and relative pathnames. Also, give an example for each.

(")

3.

(u)

What is on-line conununication and off-line communication communication in LINUX in LINUX. ? Give at least two commands to carty out each of these

MCS-022

(b)

What are the main components of DNS architecture ? Explain them with their role in address resolution and mapping. Also, give a mechanism to be used for optimrzing the search cost.

(.)

Write the main steps for configuring the Local Area Network in Window XP.

4.

(a)

What is domain in network ? How does Windows 2000managethe domains ? Also, explain how the trust relationship is created and managed between domains ?

(b)

Explain the limitations of packet filtering gateways. How are these overcome by stateful packet filtering firewall. Give the advantagesand disadvantagesof Star, Mesh and Ring topologies.

(.)

J.

Describethe following with illustrative examples 4x5=20 or diagrams as needed : (u) (b) (") (d) X-Window system Network file server RAID Virtual Private Network

-oOo-

MCS-022

I MCS-022I
MCA (Revised) Term-End Examination 7r O December, 2009 MCS-022 : OPERATING SYSTEM CONCEPTS AND NETWORKING MANAGEMENT Maximum Marks : 100

Time : 3 hours questions from the rest. 1.

Note : Question Number 1 is compulsory. Answer any three

(a) How distributed operating system is better than network operating system ? Explain. Explain the different methods used in LAN data transmissions. Which protocol is used by TFTP at the transport layer ? Also, give any two advantages of TFTP over FTP. List the different file systems supported by windows 2000 ? Why the new version NTFS provided by windows 2000 has better performance and reliability. Write the steps in window 2000 for creating a group called "Programmer" and for adding a user named "Rajeev." Assume user is already a member of guest account.

4 6 5

MCS-022

P.T.O.

List any five standard control features those should be implemented for user passwords. What is "Backup Domain Controller" in Window NT ? Explain its importance in Security Management. (h) Write a shell program to 'Reverse' an Input string. 2. (a) What is the kernel approach of operating system design ? How does this differ from client-server approach ? Explain its advantages. What is X-Window system ? Explain the X-windows library and X-Toolkit. Give an advantage and a disadvantage of enabling offline files in windows XP environment. Also mention some useful option that can be set for users with an unreliable network connection. 3. (a) Explain the method to change the file permissions using octal mode and rwx mode, in LINUX. Give an example for each case where we want to change the permission of a file called nay.txt such that only the owner may have all the permissions on this file and others will have only read permission. 2

5 5

MCS-022

List the important components of domain name server. Also, explain how the Domain Name Server is configured in LINUX. Explain the importance of pipes, filters and redirection commands in LINUX. Give an example for each.
4.

(a) What are print servers ? How are these configured ? Also, in Windows explain the importance of print queue management. What is Kerberos ? How is it used in window 2000 network for client authentication ? Explain the complete authentication process. What are the functions and purpose repeater ? Which layer of OSI model does it operate in ? Can we use repeaters to join two cable segments using different access methods ? Justify your answer.

5.

Describe the following with illustrative 4x5=20 examples or diagrams as needed : Wide Area Network SNMP Architecture Fault Tolerant System Windows 2000 layered Architecture -o0o-

MCS-022

No. of Printed Pages : 2

MCS-022I

MCA (Revised) Term-End Examination


7t.

June, 2010
MCS-022 : OPERATING SYSTEM CONCEPTS

AND NETWORKING MANAGEMENT


Time : 3 hours Maximum Marks : 100

Note :

Question No. 1 is compulsory. Answer any three questions from the rest.

(e)

What is a Computer Network ? Discuss its advantages and disadvantages in detail. Differentiate between Multiprogramming and multithreading. Discuss layered architecture of Windows 2000 operating system. Discuss the important features of LINUX operating system. Write a shell script in LINUX to count the number of words in a given file. Explain in detail two computer security mechanism. Explain the logical and physical structure of active directory with reference to Windows 2000.

10
5

10 10 5

10 10

MCS-022

P.T.O.

3.

(a) What are wild cards ? Discuss their importance with examples.

(b) Mention the usage of following LINUX commands with an example of each : 2x4=8 (i) tail grep chmod sort (c) What happens if you try to "cat" a non-existing file ? Explain the steps taken by OS to handle this. 4. 4

(a) Explain in detail various types of guided 10 transmission media. (b) Explain FTP and TELNET. Discuss their 10 importance and uses.

5.

Write short notes on the following : Domain Name System. Peer-to-Peer Network.

5x4=20

(c) Virtual Private Network remote access in Windows 2000. (d) Firewall.

MCA (REVISED) Term End Examination December 2010 MCS-022 : OPERATING SYSTEM CONCEPTS AND NETWORKING MANAGEMENT Note : Question No. 1 is compulsory. Answer any three question form the rest. Q.1. (a) Explain the following : (i) RAID (II) UPS Q.1. (b) 5X2=10

Explain the broad classifications of Advanced Operating System?

05

Q.1. Differentiate between :- 05 Simplex, Half-Duplex and Full Duplex Mode of Data Flow. Q.1. (d) Differentiate between :- 05 Gateways, Routers and Switches. Q.1. (e) Explain the following with reference to Windows-2000 : (i) Concept of Domain. (ii) Trust Relationship. Q.1. (f) 5X2=10

Write shell script in Linux for country the frequency of a given word in a given file.

05

Q.2. (a) Discuss abstract model of virtual to physical address mapping with reference to LINUX operating system. 07 Q.2. (b) Differentiate between absolute and relative pathnames with the help of examples. Explain how to specify absolute and relative pathnames in LINUX operating system. 08 Q.2. With reference to LINUX operating system explain what will happen if we try to unmount a file system when users are working on it? 05

Q.3. (a) Explain the following with reference to windows-2000: 5x3=15 (i) When security groups should be used instead of distribution groups? (ii) User Administration (iii) Network Protocols Q.3. (b) Explain the basic purpose of enabling the offline features in windows XP 05

Q.4. (a) Explain in details various type of Computer Networks as classified according to geographical area. (Types of Networks) 05

Q.4. (b) Q.4.

Explain SNMP protocol in detail.

10 05

Describe Kerberos management in Windows-2000 O/S.

Q.5. (a) Write Short Notes on the following: 5x4=20 (i) Cryptography (ii) IP Securities (iii) Concept of pipes, filters and redirection in LINUX operating system. (iv) Backup and Restoration in Linux

Potrebbero piacerti anche