Top Banner
MCA (Revised) Term-End Examination ' June, 2006 MCS-022 : OPERATING SYSTEM CONGEPTS AND NETWORKING MANAGEMENT Time : 3 hours Mqximum Marks: 700 Note : Question number f. is compulsory. Answer any three questions t'rom the rest. l. (a) Describe the structure of 5 classes of IP addresses. 5 (b) Differentiate between the following concepts : 6 (i) Multiprogramming (ii) Multitasking (iii) Multiprocessing (c) Write a shell script that prints a list of every unique word in a file, in reverse alphabetical order. 6 (d) Explain the function of the following : 4 (i) LS-L (ii) /etc/shadow Iile MCS-022 P.T.O.
29
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: MCS-022 June2006-Dec2010

MCA (Revised)

Term-End Examination' June, 2006

MCS-022 : OPERATING SYSTEMCONGEPTS AND NETWORKING

MANAGEMENT

Time : 3 hours Mqximum Marks: 700

Note : Question number f. is compulsory. Answer anythree questions t'rom the rest.

l. (a) Describe the structure of 5 classes of IP addresses. 5

(b) Differentiate between the following concepts : 6

(i) Multiprogramming

(ii) Multitasking

(iii) Multiprocessing

(c) Write a shell script that prints a list of every uniqueword in a file, in reverse alphabetical order. 6

(d) Explain the function of the following : 4

( i ) L S - L

(ii) /etc/shadow Iile

MCS-022 P.T.O.

Page 2: MCS-022 June2006-Dec2010

(e) Define the concepts of domains, workgroups and

trusted relationships in the context of Windows

2000.

(f) What is Kerberos ? Describe Kerberos management

in the Windows operating system.

k) Describe two types of back-ups.

(h) Differentiate between virtual circuit and datagram

approaches to packet switching.

2. (a) Explain four basic design issues in a multimedia

operating system.

(b) Differentiate between theTCP/lP and OSI relerence

models, and map the layers between the two

approaches.

(c) How would you set the IP address of a LAN card in

Lintx ?

3. (a) Describe the various security features in the Windows

2000 operating system. Further, explain the

difference between the security features of an OS and

of a network. 10

(b) Describe the steps needed to configure the network

file sewer in the LINUX operating system; .- 5

(c) Explain the drawback of LINUX. 5

6

5

MCS-022

Page 3: MCS-022 June2006-Dec2010

4. (a) Describe the GUI features of Linux. Also explain the

corresponding GUI features of Windows 2000.

Further, compare the usefulness of these features. 10

(b) Describe two features of the Intrusion Detection

5System (lDS).

(c) What are the requirements for a user to be able to

kill a process in Linux ? Write the necessary

commands. 5

5. Describe the following : 20

(i) Fault tolerant system

(i i ) sNMP

(iii) IPSec

(iv) Architecture of the Windows 2000 operating system

MCS.O22 5,000

Page 4: MCS-022 June2006-Dec2010

MCA (Revised)

Term-End F,rramination

December, 2006

MCS -022 : OPERATING SYSTEMCONCEPTS AND NETWORKING

MANAGEMENT

Time : 3 hours MaximLtm Msrks : 704

Note r Qu estion number 1 is compulsory. Answer qny

three questions from the rest.

l . (a) A computer has a monitor that consumes 60 W of '

power. The CPU requires 100 W. What should be

the minimum power rating of a UPS used for

5supplying power to this computer ?

What is the basic difference between Network

operating system and Distributed operating system ? 5

I carry a CD containing 600 MB (megabytes) of data

from my house to yours. If it takes me 30 minutes to

drive down to your house, what is the data

transmission rate ? 5

(b)

(c)

(d) What are the different

System ?

MCS-022 1

states of Linux Operating5

P.T.O.

Page 5: MCS-022 June2006-Dec2010

(e) Write a shell script to accept upto 5 numbers as

arguments and print out their arithmetic mean. 5

(f) List some of the duties of a system administrator. 5

(g) How does a domain differ from a workgroup ? 5

(h) What are the goals of Computer Security ? 5

2. (a) What is Computer-Security classification ? Explain . 8

(b) Describe the strategy for hardening your Windows

2000 operating system . I

(c) What is a computer virus ? Describe the different

types of viruses. 4

3. (a) Distinguish between virtual and physical addresses.

List the various data structures required for address

mapping from virtual to physical addresses and

describe the process. 1 0

(b) Draw the logical netwo-rk layout of a Windows 2000

\ctive Directory and describe its components, 10

4. (a) Name various authentications available in Windows

operating system and describe any one of them. 5

(b) E*pand the following :

(i) RADTUS

(ii) NAT

(iii) rcs(iV) RRAS

(v) EFS

MCS-022

Page 6: MCS-022 June2006-Dec2010

(c) ' Discuss IPSec implementation in the Windows 2000

operating system.

(d) What are input and output restrictions, filtering andpipelining of instructions in Linux ?

5. Describe the following :

(i) Policy Inheritance

(ii) Fault Tolerant System

(iii) Kerberos

(iv) Confidentiality and Integrity

20

MCS-022 7,000

Page 7: MCS-022 June2006-Dec2010

MCA (Revised)

Term-End F,xamination

June,2OO7

MCS -022 : OPERATING SYSTEMCONCEPTS AND NETWORKING

MANAGEMENT

Time : 3 hours Maximum Marks : 7AA

Note r Qu estion number 7 fs compulsory. Ans wer anythree questions from the rest.

i

1- (a) what are the goals of computer security ? s

(b) Describe the microkernel approach in modernoperating systems. Also write the advantages of thisapproach i 5

(c) What is a repeater and what are its uses andcharacteriptics ? s

(d) What are ithe offline file features in Windows XP andhow would you enable them and disable them ? 5

(e) How can you change the password in Linux ? Whatare the iprecautions that should be taken whilechoosingapassword? s

l

MCS-022 1 P.T.O.

Page 8: MCS-022 June2006-Dec2010

(f) Write a Unux shell script to shift all characters in a

file forward by 3 characters. (Thus 'a' becomes 'd',

while 'z' becomes 'c'.)

(g) What are the different principles of user

authentication and how are they used ?

(h) Describe the available security features while

managing pointers in Windows 2000.

2. (a) Describe the various kinds of transmission media

with their characteristics, advantages and

Idisadvantages.

(b) How does the remote access mechanism in Windows

2A00 work and how can it be configured ? I

(c) What is a UPS and why is it used ? Describe the

different kinds of UPS systems. 4

3. (a) Describe the working and usage of the vi editor in

Linux with the help of Add, Delete, Copy, Find and

Replace commands. 10

(b) Show how to configure the Apache web server for

the Linux operating system

(c) What are the security controls that should be

implemented for access to a computer system ? 4

4. (a) Describe the structure and usage of Active Directory

in Windows 2000. ,

MCS-022

Page 9: MCS-022 June2006-Dec2010

(b) How would you use an instant messaging applicationlike Yahoo Messenger in Linux ? Explain with thehelp of commands.

(c) What is a gateway ? Describe its purpose andworking;

i

5. Describe the following with suitable examples :

(i) The three types of data flow

(ii) Structure of Unix operating system

(iii) Features of "Write" command in Linux

(iv) Domains in Windows 2000

20

MCS-022 1 1 ,000

Page 10: MCS-022 June2006-Dec2010

MCA (Revised)

Term-End Examination

December, 2OO7

MCS-022 : OPERATING SYSTEMCONCEPTS AND NETWORKING

MANAGEMENT

T'ime : 3 hours Maximum Marks : 700

Note r Qu estion number 1 is compulsory. Ans_wer anythree quesfions from the rest.

l ' (a) Iixplain the characteristics of the Modern OperatingSystems. 1 0

(b) Explain the basic purpose of the followingconnecting devices in computer networks : 10

(i) Repeaters

(ii) Hubs

(iii) Bridges

(iv) Routers

(v) Gate ays

(c) Describe the layering structure of the TC p /Ipprotocol suite rc

MCS-O22 P . T . O .

Page 11: MCS-022 June2006-Dec2010

(d) Write a LINUX shell script that accepts an arbitrarily

long list of file names as arguments and replaces all

digits in them with a "*". 5

(e) Explain the responsibilities of User and Kemel

modes of WINDO1 /S 2000 sYstem' 5

2. (a) Explain the following with teference to WINDOWS

2 0 0 0 : L 2

(i) Distributes file sYstem

(ii) File RePlication service

(iii) FAT16 and FAT32

(b) Explain the usage of the following for authenticating

a u s e r : I

(0 Hardware token '

(ii) Software token

3. (a) Describe the file system in LINUX'

(b) Explain Trivial File Transfer Protocol (TFTP) and

mention where it can be used.

(c) Discuss the page replacement algorithrn used by

LINUX.

4. (a) Discuss the mesh topology and list its advantages7and disadvantages

(b) Explain the role of NAME SERVERS and

RESOLVERS in DNS Architecture' 7

MCS -O22

Page 12: MCS-022 June2006-Dec2010

(c) Mention the usage of the following LINUX

commands, with an exarnple for each :

(i) cat

(ii) cmp

(iii) diff

(iv) wc

(v) sort

(vi) chmod

5. Describe the following and also explain their usage : 4x5:20

(i) Vi Editor

(ii) Mapped Drive in WINDOWS 2000

(iii) Virtual Private Network remote access in WINDOWS

2000

(iv) IPSec

MCS-,O22

t

12,OOO

Page 13: MCS-022 June2006-Dec2010

f^4.-*, IMCA (Revised)

Term-End Enamination

June, 2OO8

MCS-022 : OPERATING SYSTEM

CONCEPTS AND NETWORKINGMANAGEMENT

Tlme : 3 hours Maximum Marks : 700

Note : Question number 7 ls compulsory' Answer any

three questions trom the rest

1. (a)

(b)

(c)

Describe the auditng facilities of Windows 2000'

What sieps can one take to enhance the physical

security of a comPuter ?

Why is it important to disable the NULL session on

a computer in a network ? How can you do this in

Windows 2000 ?

What is ihe general format of a Linux command ?

How would you handle special characters in an

argument to a command ?

(d)

MCS-O22P.T.o .

Page 14: MCS-022 June2006-Dec2010

(e) What are the advantages of Linux as an operatingsystem over those of the Microsoft family ?

How wordd 5,ou harden a Windo',Vs 2000 system toreduce the vr.rlnerability of a guest account ?

How can a Windows 2000 machine be assigned anIP address at starhip ?

How does a thread differ from an operating systemprocess ?

Describe the File Transfer protocol (FTp) and theusage of the ftp utility. What are its securityIoopholes ?

You have a file in Linux on which you do not havewrite permission. If you do haw write permisslon onthe directory in which the ftle is located, how canyou change the contents of the ftle ?

What are the characteristics of the 7 RA|D levels ?

Describe the wo*ing of the lpsec framework forpnvate bansmission over an Ip network.

What are the standard input, standard output andstandard error in Linux ? How are they used inpipelines and filters ?

Describ€ the cal command and its important options.

(s)

(h)

2. (al

(c)

3. (a)

(b)

I U

(b)

1 0

6

o

4tc,

MCS-022

Page 15: MCS-022 June2006-Dec2010

4. (a) What is symmetrlc multiprocessing ? Describe its

architecture and benelits. I

(b) How does one set up a domain in Windows 2000 ?

How are trusi relationships between domains

established ? I

(c) How does the shadow password file enhance security

in Linux ? 4

5. Describe the following with examples where needed :

(a) Dynamic IP address allocation

(b) Full, incremental and dilferential backup

(c) we command in Linrx

(d) Windows Explorer

4x5=20

MCS-0?2 12 ,000

Page 16: MCS-022 June2006-Dec2010

MCA (Revised)

Term-End Examination

Decritnber, 2OO8

MCS-022 : OPERATING SYSTEMCONCEPTS AND NETWORKING

MANAGEMENT

Time :3 hours Maximum Marks : 700

Nofe : Question number 1 is compulsory. Answer

any three questions from the rest.

l. (i) Write a shell script in Linux to input the marks

obtained (out of 100) bV a student in English,

Mathematics, Science, Computers and Biology'

Print out the aggregate percentage and the

result and division, where 600/o or more is a

first division, 450/o or more upto 60%o is second

division and 3570 or more upto 450/o is third

dMsion. Irrespective of the aggregate

percentage, a student is considered to have

failed if the marks in any subject are less than

35 . 10

MCS-022 P . T . O .

Page 17: MCS-022 June2006-Dec2010

(ii) Describe two features of lntrusion Detection

system.

(iii) Draw a diagram of SNMP architecture and

show how it is used to manage network

devices. 10

(iv) List and describe the various security features in

Windows 2000 O.S.

(v) What is the purpose of distributed file system ?

2. (a) List the four computer system vulnerabilities. 4

(b) Discuss the various criteria for selecting a UPS

for your system.

(c) Discuss and list output of following LINUX

commands :

(i) $date, who

(ii) $diff firstjile second_file

(iii) $man who

(iv) $ls-a

(v) pwd

3. (a) Explain drive mapping facility in Windows2000 with suitable examples.

5

1 0

5

MCS-022

Page 18: MCS-022 June2006-Dec2010

(b) Explain the following concepts of Windows

I2000 operating system :

(i) Global groups

(ii) Domain Local groups

(iii) Local groups

_ (iv) System groups

(c) Explain following facilities of Windows XP

operating system :

(il Sharing of files and folders in Windows XP 3

(ii) File Encryption 4

4. (a) With help of a diagram, explain the Windows

2000 layered structure. 10

(b) What do you understand by a fault tolerant

system ? Explain. 10

5. Describe the following and also explain their usage :1U2

(i) diff command in Linux

(ii) chmod command in Linux

(iii) vi editor

(iv) DHCP

(v) VPN (Virtual Private Network)

MCS.O22 P.T .O .

Page 19: MCS-022 June2006-Dec2010

(vi) IPSec

(vii) Goals of Computer Security

(viii) Firewall

(ix) Intrusion Detection

(x) TFTP

MCS-022 1 1 ,000

Page 20: MCS-022 June2006-Dec2010

ro

s.\

MCA (Revised)

Term-End Examination

Iune, 2A09

: OPERATING SYSTEM CONCEPTSNETWORKING MANAGEMENT

MCS-022AND

Time : 3 hours Maximum Marks : 100

Note : Question Nuntber 1, is compulsory. Answer any three

questions fro* the rest.

L. (a) \A/hat is symmetric multiprocessing ? Write

the important advantages of symmetric

mult iprocessor over uniprocessor

architecture.

(b) How can a coll ision be avoided on a

CSMA/CD network ? Also, compute

CSMA/ CD and token passing access

methods.

(.) Write a shell program to find the Greatest

Common Divisor (GCD) for any two given

numbers.

(d) What is a f i l ter in Linux ? Give two

examples of filters with the effect of each.

(") Describe the concept of encrypting using

EFS services.

MCS-022 P.T.O.

Page 21: MCS-022 June2006-Dec2010

(f)

(g)

(h)

List any five services provided by Windows

2000 Server for network management.

Compare and contrast the 'Mandatory

Access control' and 'Discretionary Access

control' mechanisms in Window.

What option in registry management will

be useful in tracking who accessed the

Registry, from where, and when ? Also,

write the steps for enabling this option.

Ident i fy the classes of TCSEC for the

fol lowing cases. Also, explain the

specifications of each class :

(i) Labeled security protection

(ii) Security Domain

(iii) Controlled Access protection

How does a Token Bus network work ? In

what ways is its working different from

token Ring ?

Differentiate between absolute and relative

pathnames. Also, give an example for each.

(u) What is on-line conununication and off-line

communication in LINUX ? Give at least

two commands to carty out each of these

communication in LINUX.

(u)2 .

(b)

(")

3.

MCS-022

Page 22: MCS-022 June2006-Dec2010

(b) What are the main components of DNS

architecture ? Explain them with their role

in address resolution and mapping. Also,

give a mechanism to be used for optimrzing

the search cost.

Write the main steps for configuring the

Local Area Network in Window XP.

(a) What is domain in network ? How does

Windows 2000 manage the domains ? Also,

explain how the trust relationship is created

and managed between domains ?

(b) Explain the limitations of packet filtering

gateways. How are these overcome by

stateful packet filtering firewall.

(.) Give the advantages and disadvantages of

Star, Mesh and Ring topologies.

Describe the following with illustrative examples

(.)

4.

J .

or diagrams as needed :

(u) X-Window system

(b) Network file server

(") RAID

(d) Virtual Private Network

- o O o -

3

4x5=20

MCS-022

Page 23: MCS-022 June2006-Dec2010

I MCS-022I

MCA (Revised)

Term-End Examination

•7r December, 2009

OMCS-022 : OPERATING SYSTEM CONCEPTS

AND NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100

Note : Question Number 1 is compulsory. Answer any three

questions from the rest.

1. (a) How distributed operating system is better 4than network operating system ? Explain.

Explain the different methods used in LAN 6data transmissions.

Which protocol is used by TFTP at the 5transport layer ? Also, give any twoadvantages of TFTP over FTP.

List the different file systems supported by 5windows 2000 ? Why the new versionNTFS provided by windows 2000 has betterperformance and reliability.

Write the steps in window 2000 for creating 5a group called "Programmer" and foradding a user named "Rajeev." Assume useris already a member of guest account.

MCS-022

1 P.T.O.

Page 24: MCS-022 June2006-Dec2010

List any five standard control features those 5should be implemented for user passwords.

What is "Backup Domain Controller" in 5Window NT ? Explain its importance inSecurity Management.

(h) Write a shell program to 'Reverse' an Input 5string.

2. (a) What is the kernel approach of operating 8system design ? How does this differ fromclient-server approach ? Explain itsadvantages.

What is X-Window system ? Explain the 5X-windows library and X-Toolkit.

Give an advantage and a disadvantage ofenabling offline files in windows XPenvironment. Also mention some usefuloption that can be set for users with anunreliable network connection.

3. (a) Explain the method to change the file 5permissions using octal mode and rwxmode, in LINUX. Give an example for eachcase where we want to change thepermission of a file called nay.txt such thatonly the owner may have all the permissionson this file and others will have only readpermission.

MCS-022 2

Page 25: MCS-022 June2006-Dec2010

List the important components of domain 9name server. Also, explain how the DomainName Server is configured in LINUX.Explain the importance of pipes, filters and 6

redirection commands in LINUX. Give anexample for each.

4. (a) What are print servers ? How are these 7configured ? Also, in Windows explain theimportance of print queue management.What is Kerberos ? How is it used inwindow 2000 network for clientauthentication ? Explain the completeauthentication process.What are the functions and purpose 6repeater ? Which layer of OSI model doesit operate in ? Can we use repeaters to jointwo cable segments using different accessmethods ? Justify your answer.

5. Describe the following with illustrativeexamples or diagrams as needed : 4x5=20

Wide Area Network

SNMP ArchitectureFault Tolerant SystemWindows 2000 layered Architecture

- o 0 o -

MCS-022 3

Page 26: MCS-022 June2006-Dec2010

No. of Printed Pages : 2 MCS-022I

MCA (Revised)

Term-End Examination7t.

June, 2010

MCS-022 : OPERATING SYSTEM CONCEPTSAND NETWORKING MANAGEMENT

Time : 3 hours Maximum Marks : 100

Note : Question No. 1 is compulsory. Answer any three

questions from the rest.

(e)

What is a Computer Network ? Discuss itsadvantages and disadvantages in detail.

Differentiate between Multiprogrammingand multithreading.

Discuss layered architecture of Windows2000 operating system.

Discuss the important features of LINUX

operating system.

Write a shell script in LINUX to count thenumber of words in a given file.

Explain in detail two computer security

mechanism.

Explain the logical and physical structureof active directory with reference toWindows 2000.

10

5

10

10

5

10

10

MCS-022

1 P.T.O.

Page 27: MCS-022 June2006-Dec2010

3. (a) What are wild cards ? Discuss their 8importance with examples.

(b) Mention the usage of following LINUXcommands with an example of each : 2x4=8

(i) tail

grep

chmod

sort

(c) What happens if you try to "cat" a 4non-existing file ? Explain the steps takenby OS to handle this.

4. (a) Explain in detail various types of guided 10transmission media.

(b) Explain FTP and TELNET. Discuss their 10importance and uses.

5. Write short notes on the following : 5x4=20

Domain Name System.

Peer-to-Peer Network.

(c) Virtual Private Network remote access inWindows 2000.

(d) Firewall.

Page 28: MCS-022 June2006-Dec2010

MCA (REVISED)

Term End Examination December – 2010

MCS-022 : OPERATING SYSTEM CONCEPTS AND NETWORKING MANAGEMENT

Note : Question No. 1 is compulsory. Answer any three question form the rest.

Q.1. (a) Explain the following : 5X2=10 (i) RAID (II) UPS

Q.1. (b) Explain the broad classifications of Advanced Operating System? 05

Q.1. © Differentiate between :- 05 Simplex, Half-Duplex and Full Duplex Mode of Data Flow.

Q.1. (d) Differentiate between :- 05 Gateways, Routers and Switches.

Q.1. (e) Explain the following with reference to Windows-2000 : 5X2=10 (i) Concept of Domain. (ii) Trust Relationship.

Q.1. (f) Write shell script in Linux for country the frequency of a given word in a given file. 05

Q.2. (a) Discuss abstract model of virtual to physical address mapping with reference to LINUX operating system. 07

Q.2. (b) Differentiate between absolute and relative pathnames with the help of examples. Explain how to specify absolute and relative pathnames in LINUX operating system. 08

Q.2. © With reference to LINUX operating system explain what will happen if we try to unmount a file system when users are working on it? 05

Q.3. (a) Explain the following with reference to windows-2000: 5x3=15 (i) When security groups should be used instead of distribution groups? (ii) User Administration (iii) Network Protocols

Q.3. (b) Explain the basic purpose of enabling the offline features in windows XP 05

Q.4. (a) Explain in details various type of Computer Networks as classified according to geographical area. (Types of Networks) 05

Page 29: MCS-022 June2006-Dec2010

Q.4. (b) Explain SNMP protocol in detail. 10

Q.4. © Describe Kerberos management in Windows-2000 O/S. 05

Q.5. (a) Write Short Notes on the following: 5x4=20 (i) Cryptography (ii) IP Securities (iii) Concept of pipes, filters and redirection in LINUX operating system. (iv) Backup and Restoration in Linux