Java programs cannot access arbitrary addresses in memory by 2GqnDOP9

VIEWS: 0 PAGES: 10

									                      Institute of Human Resources Development
                      Second Semester PGDCA Examination, June 2006
                           Scheme 2005 - Regular/Supplementary

       PGDCA 201 SYSTEM ANALYSIS AND VISUAL PROGRAMMING
Time:3Hrs.                                                                Maximum: 100 Marks.
                                              PART A                                               .
                      ( Answer all questions. Each question            carries 1 mark)

1. .......................are the limits that identify the system components, processes and
interrelationships
      a) integration                b) control           c) feedback.              d) boundaries

2. The main contribution of......................................quality documentation.
    a) analyst             b ) DBA                          c) user .       d) technical writer

3 ............................model is a two dimensional chart depicting system elements and their
linkages
    a )schematic                   b )f1ow     c)static        d)dynamic

4.............................observation is set by the observer in a place like a laboratory
   a )Contrived                 b)Obtrusive            c )Unobtrusive            d)Indirect

5.Verifying and studying software errors and failures based on simulated user
  requirements is called.......testing.
   a)Alpha                     b )Beta            c) Stress          d)Volume

6 .........................in DFD represents process .
   a)square                  b )open rectangle      c )circle                      d) rectangle

7 ..............................refers to the relationship among elements within a module
  a)cohesion                   b ) coupling          c ) linking d) none of the above

8 ...............................refers to proper function of hardware anq software
  a )system integrity b )system reliability c )system security d) system portability

9. The process of transforming data to produce acryptogram or ciphertext is called
a)conversion         b )epcryption             c )Back up d)change over

10.VB is a..............................type of language
a )Event driven programming b ) Object Oriented c ) Procedure Orientedd) None of these
Fill in the blanks

l1 ....................is the suprasystem within which an organization operates

12 .................is single representation of the relationships between conditions and actions

13 ..................maintenance means changing program function.
   .
14. Data structuring is refined through a process is called --------

15 ........................is a single form prepared manually or by a machine and printed on any grade
of paper.

16. CASE stands for -----------

17 .................means restoring something to its original condition

18 ..................uses check digit to check the validity of the code

19 ..................is a sample program used for evaluating different computers and their software

20. IDE stands for -------------

                                                      PARTB
                            (Answer any FIVE questions. Each question carries 4marks)

21. Define system. Explain its characteristics

22. What are the different quality assurances factors in systems life cycle

23. Explain briefly the different change over methods

24 .What is a code? List the common types of codes.

25. What is a fonn? Explain the classification of forms

26. What are the interpersonal skills needed for a system analyst.
                                        PARTC
               (Answer any THREE QUESTIONS. Each question carries 20 marks)

27. a)What is structured analysis? Explain the tools available for structured analysis (10)

    b) What is feasibility analysis? Explain the key considerations involved in the      feasibility
study                                                                 (10)


28. a)Explain different types of system testing.                                     (10)

   b )Explain the different control measures to ensure system security                (10)

29, a)Discuss the fact finding techniques for information gathering                   (10)

   b )Explain the different criteria for software selction                            (10)

30. Write short notes on the following                                              (4*5)

         a )HlPO b ) Break Even analysis c ) Object Oriented Analysis d) Maintenance

31. Write short notes on                                                         (4*5)

         a) Event Driven Programming b ) Data types in VB c) Control Structures in VB d)
         Loop statements in VB


===============================================================
                         Institute of Human Resources Development
                    Second Semester PGDCA Examination, December 2006
                                      Scheme 200 I - Supplementary
                    PGDCA 202 JAVA & WEB TECHNOLOGY

Time:3Hrs                                                                       Maximum: 100 Marks


                                                  PART-A
                      (Answer all questions from 1 to 20. Each question carries 1 mark)
                s
Fill up the blanks
                                            .

   1. Java program is compiled to an intermediate form called ....................

   2. ................ is a specific instance of a class with particular values for the fields.

   3. The process of reclaiming memory used by an object is ........................

   4. The Java program that is launched from a web document is.......................
   .
   5. The mechanism that servlets use to maintain state about a series of requests from the
      same user is...................

   6. The process of transforming information unintelligible to anyone except the intended
       recipient is....................

   7. The Listener interface that traps events on a Button object is.........................
   .
   8. The HTML tag that is used to take user input from a web page is ...................

   9. Every applet must define a subclass of the........................class.

   10. HTTP stands for.......................
Choose correct answer.

     11. The method that puts the thread in a runnable state is

         a) putsO b)joinO        c) startO          d)setPriorityO

     12 Which of the following IS an abstract class.

         a) InputStream b) Data InputStream           c) File lnputStream-------- d)FileWriter

     13. Which of the following is not a method o fOutputStream class?

          a) writeO     b) closeO            c) flushO               .   d) available

     14. Which of the following is not a wrapper class?

          a) String b) Short    c) Double     d) Byte

     15. The method used to continue a thread which was

          a) resumeO b ) notifyO c) awakeO             d) none of these
,.
State whether TRUE or FALSE.

     16. Java programs cannot access arbitrary addresses in memory.

     17. A class can extend only one other class.

     18. A function in Java can be a non-member of a class.


     19. Throwing an exception always causes programe termination
     20 The length of a string objects m 1 can be obtained using the expression m 1 length.
                                PART-B
             (Answer any TEN questions. Each question carries 4 marks)

21. Explain how a user defined exception is defined and used in Java.

22. What is an interface? Explain how it helps in implementing moltiple inheritance.

23. What is Java Virtual Machine?
               "

24. Explain the use of Socket and ServerSocket classes.

25. How cookies help in session tracking?
26. Write short notes on E-Commerce.

27. Distinguish between Generic servlets and HTTP servlets.

28. Write short notes on break and continue statements in Java.

29. Explain the general format of <APPLE1> tag in HTML.

30. Write a program to accept an sentence and count the number of words using
    StringTokenizer class.

31. Explain the life cycle of an applet.

32. What is a package? Explain how it can be accessed by a program.


                                       PART - C
                    (Answer any TWO questions. Each question carries 20 marks.)


33. a) Explain the data types in Java.                                           (8)

     b) What is multithreading? Explain thread life cycle.                          (12)

34 a) Explain the features of jawa, which make it suitable for web    Technology       (10)

    b) An ODBC data source named 'mydata' contains a table 'book' with the following fields.

BookNo (Integer), Title (String), Author (String), Publisher (String). Write a JDBC program to

accept the name of author from user and display the details of                   All his/her books.

(10)
........
35. a) Explain the different layout managers used in Java GUI programming.             (10)
- ............ ..
~~~.."- ".
     b) Write an applet program to display a message ''welcome'' on a text field when a

       button labeled 'show' is clicked.                                           (10)

===============================================================
                         Institute of Human Resources Development
                     Second Semester PGDCA Examination, December 2006
                                Scheme 2005 - Regular/Supplementary

          PGDCA 203 COMPUTER COMMUNICATION & NETWORKS

Time:3Hrs                                                                 Maximum: 100 Marks

                                                           PART A
                                        (Answer all. Each question carries 1 mark)
Fill up the blanks

1. PING stands for...................

2 .Fiber with the property that many different rays will be bouncing at different
  angles is called..........................

3. The technique of temporarily delaying outgoing acknowledgements so that they
   can be hooked onto the next outgoing data frame is known as..................

4. The strength of a signal falls off with distance over any transmission
   medium is called..................

5. In............... encoding the signal is decoded by comparing the polarity of adjacent
  signal element rather than determining the absolute value of a signal element.

6. DES encryption uses..................bit data block.

7. 192.168.0.1 is an IP address of.....................class

8. The IP addresses 255.255.255.255 is used for.......................


9.IPv6 addresses are.........................bits in length

10. Packet routing is the major function of ................layer




Choose the most appropriate answer
11. The layer concerned with the syntax anq semantics of the information transmitted is

    a) session       b )datalink          c )application        d)presentation

12.Which of the following is a connectionless protocol

    a) TCP                 b) FTP                  c) UDP           d) SMTP.

I3.ATM cells are of...............................bytes long

   a)53           b) 48             c) 43            d) 5

14.IEEE standard for MAN is
    a) 802.Il        b ) 802.6                   c ) 802.4           d) 802.5

IS.Which of the following is not a public key encryption algorithm

    a) RSA             b) KnapSack             c) IDEA         d) ECC

16. Which of the following is not an Email protocol

     a) SMTP              b) POP3           c) IMAP4           d) MMTP

17. The TCP segment header size is

      a) 40 bytes          b) 20 bytes           c )48 bytes            d) 25 bytes

I8.Which of the following cabling is popularly known as thick Ethernet.

      a) 10Base-T           b) 10Base2              c) 10BaseS           d) 10base-F

19. Bridge operates in the..............................layer of ISO-OSI modal

        a ) physical           b ) datalink           c ) network             d) transport

20.Telnet port id is
      a) 25          b )23             c) 80        d) 21




                                                                 PART B
                       Answer any FIVE questions. Each carries 4 marks

21. What do you mean by encoding? Explain anyone scheme.

22. Explain with an example how CRC is used for error detection.

23. What is a proxy server? What are its major functions?

24. What are digital signatures?

25. Explain anyone public key encryption algorithm.

26. What are the major cyber threats?


                                                  PARTC
                    Answer any THREE questions. Each question carries 20 marks

27. a)What is multiplexing? Explain the TDM and FDM                      (12)

    b )Explain the concept of polling and handshaking                        (8)

28. a) Explain the sliding window protocol                                    (10)

   b) Explain with an example how the hamming code can be used. for
      error detection and correction                                  (10)

29. a)Explain the TCP/IP reference modal                              (12)

    b )Explain the major application layer protocols                               (8)

30 .a) Explain the ATM model and ATM LANs                                     (12)

    b) Distinguish between private key and public key enlcryption                  (8)

31. Write short notes on any four of the following                       (4*5=20)

     a) Routers

     b) ISDN

     c) CDMA

    d) FDDI

    e) URLs

								
To top