Tuesday, January 8, 2013

Text book for SYBCom - Sem 4 - Computer Programming (University of Mumbai)

My latest book for SYBCom - Sem 4, 
Published by Sheth Publishers (December 2012)

ISBN 978-93-82429-71-5

Sunday, November 4, 2012

Linux Question Bank

1.  Explain the grep command used for searching a pattern with any 4 options.
2.. How to start and stop OpenSSH?
3. Discuss the privileges of Linux administrator.
4. Explain the standard file descriptors with suitable commands.
5. Describe the following commands: chown, chmod, expr.
6. Explain the cut command.
7. Write a note on commands for disk space management in linux.
8. Write a shell script to accept a filename. Check if the file exists and display the number of lines, words, and characters in the file. Display an appropriate message if the file is not present.
9. Explain the pipe feature in Unix with examples.
10. Write a note on the contents of the etc/passwd file.
11. Explain sort command with any three parameters.
12. What is the role of linux kernel in linux OS?
13. Explain the system memory management function in Linux.
14. What is a boot loader? Write a note on Grub or LILO.
15. Which commands are used for creating and maintaining user accounts in Linux? Explain with examples.
16  What are the duties of a system administrator?
17. What is meant by "monitoring and tuning performance" of a linux system?
18. Explain the following commands with examples: ls, rm, cp, mv, chown, chmod.
19. Which are the different file systems supported by Linux? Which feature of Linux makes this support possible (Virtual File Systems Layer)?
20. What are memory and virtual file systems? Explain any three (CRAMFS, RAMFS, PROC).
21. Write a short note on linux file permissions.
22. What is meant by Linux disk management? How can the user see the current file system and disk partitioning details on a Linux system? (fstab)
23. Write a note on system shell configuration scripts. What purpose do they serve? Explain the following: BASHRC, CSH, CSHRC.
24. What are CRON files?
25. What is the SYSLOG.CONF file?
26. Write a short note on Network File System. What are its advantages? What are its disadvantages?

TCP/IP Networking
1. Is IP address of a device the same as its MAC address? What are the differences between these two addresses?
2. What are network classes? State their IP number range. Explain the role of router.
3. Explain how a network interface card (NIC) is setup on a Linux system. Explain the ifconfig command.
4. Explain the purpose of the following files: /etc/hosts.conf,  /etc/hosts,  /etc/resolv.conf
5. How are IP addresses extended through subnetting?
6. Explain the Dynamic Host Configuration Protocol (DHCP).

Connecting to Microsoft Systems
1. How can computer systems using Windows operating system communicate with Linux systems? Explain the role of Samba in this process.
2. How is Samba installed on a Linux system?
3. What is SMB? Which OS uses this?

Internet Services:
1. What is an Internet Service? Name 5 commonly used services.
2. Write a note on ssh (secure shell), scp (secure copy) and sftp (Secure File Transfer Program).
3. Write a note on telnet, ftp, rsync, and rsh. Why are these services called insecure services?
4. Write a short note on finger, talk and ntalk. Are these services secure or unsecure?
5. Which are the common server protocols available on Linux?
6. Write a note on xinetd. How is it different from inetd?

Domain Name System
1. What is DNS? Why is it necessary? What are top level domains? Give 3 examples of TLDs.
2. What are the different types of domain name servers?
3. Explain the following terms: mail user agent, mail transfer agent, and local delivery agent.
4. Write a short note on SMTP, POP3, and IMAP4.
5. What steps can be taken to maintain email security?

Configuring a Web Server
1. State the features of  Apache  web server.
2. Explain how web servers work.
3. What is SSI? What are the advantages of using SSI? How is SSI enabled on Apache web server?
4. What is a secure web server? What are its components? Which packages are needed to create a secure web server?

Thursday, October 4, 2012

Building a Modern Computer from First Principles

The official companion web site of Nand2Tetris courses

And of the book The Elements of Computing Systems, MIT Press, By Noam Nisan and Shimon Schocken
The site contains all the software tools and project materials necessary to build a general-purpose computer system from the ground up. We also provide a set of lectures designed to support a typical course on the subject.
The materials are aimed at students, instructors, and self-learners. Everything is free and open-source; as long as you operate in a non-profit educational setting, you are welcome to modify and use our materials as you see fit.

Learn FOSS at almost no cost, at your pace, at your place! 

Earn knowledge, earn certificate and earn honorarium too...
Department of Computer Science, University of Mumbai takes pride in continuing with the very
successful launch of the training programme in the following Free and Open Source Software:
Pk1. UBUNTU – World’s famous and efficient operating system
Pk2. Python – Latest choice of the programmers in Industry and research
. Scilab—Compatible with the proprietary Matlab
. MySQL—PHP – World’s most popular database and Scripting language
. LaTeX—A better option to MS Word when you are creating scientific literature
. Libreoffice—FOSS alternative to Microsoft office


Wednesday, September 19, 2012

TYBSc Computer Science - Software Engineering

1. State the activities of project management process and explain them in brief. How are these activities grouped? (Oct 2012-Mumbai University)
2. Explain the concept of LOC with example. How is it useful in estimation process?
3. What is risk management? Explain the activities involved.
4. State the principles of software testing. Explain any two.
5. State the tools used in project scheduling and explain them in brief.
6. Explain the stages in static testing.
7. Explain white box testing technique.
8. 'Estimation using use-case is problematic'. Explain this statement.
9. What is cyclomatic complexity? Give one example.
10. Explain the terms error seeding and test plan.
11. Discuss the advantages and disadvantages of blackbox testing.
12. How the results of Testcase execution and analysis are useful?
13. Explain the concept of basis paths in white box testing.
14. Explain bottom-up integration testing.
15. Write a short note on random testing.
16 What is the use of charts like Gantt and PERT/CPM (Oct 2012-Mumbai University)
17 State metrics from CK metrics suite. Explain two of them. (Oct 2012-Mumbai University)
18 Explain principles of Agile development (Oct 2012-Mumbai University)

My book for TYBCom - containing C, Word, Excel, FoxPro and published in 2000.

My book for SYBCom Computer Programming - 2012

TYBSc - Operating Systems - Important Questions

1. Write short notes on: starvation, preemptive process scheduling.
2. Explain the concept of virtual memory using simple paging technique.
3. Describe the activities of the process management module of an operating system.
4. Write a note on  services provided by an OS.
5. Define multiprogramming. Explain how multiprogramming increases CPU utilization.
6. Explain how mutual exclusion is implemented using a semaphore.
7. What are the benefits of multiprogramming? Bring out any two differences between a thread and a process.
8. Write a note on functions of a scheduler.
9. Explain thrashing, its causes and effects.
10. Describe Scan and C_Scan disk scheduling techniques.
11. Explain the direct memory access method of performing I/O.
12. Explain demand paging .
13. Write a short note on Unix architecture.
14. Explain awk editor with any three keywords used to edit a file.
15. What are shell metacharacters? Explain with an example.
16. Explain grep command with any four options.
17. What is paging? Explain the basic method used for paging.
18. Define the terms worm, virus and DOS.
19. What is monitor? Explain its usage.
20. Define a thread. Explain the three common ways of establishing the relation between user level and kernel level thread.
21. Describe the conditions for which deadlock situation occurs.
22. Explain the various operations that can be performed on a directory.
23. Explain any four OS services.
24. Explain the need for context switching.
25. Discuss Peterson's algorithm.
26. Write a short note on types of system calls.
27. Write short note on safe and unsafe states.
28. Explain round-robin scheduling algorithm. Use an appropriate example.
29. Describe the produce-consumer (Bounded buffer) problem and write the semaphore based algorithm for the same. Explain the steps of the algorithm and assumptions made in the algorithm.
30. For the following page reference string  9,0,1,0 8,1,8,7,8,7, 1,2,8,2, 7,8,2,3,8,3  determine the number of page faults for the given page replacements algorithms with 3 frames :
(i) OPT (optimal)
(it FIFO
(iit LRU

31. Consider the following set of processes, with the length of the CPU burst time given in milliseconds :
Process     Burst Time
P1                9
P2              10
P3              12
P4                8
P5              13

All five processes arrive at time O, in the order given. Draw Gantt charts illustrating the execution of the processes using FCFS, SIF and RR (quantum=l) scheduling. What is the turnaround time of each process for each of the scheduling algorithms ? Also find the average waiting time for each algorithm.

TYBSc Computer Science and IT - ASP.Net - Important Questions

1. List and explain the various primitive data types used in .Net.
2. Write a short note on metadata.
3. What are the highlights of .Net framework?
4. Give an overview of CLR.
5. What is MSIL? What is PE file?
6. What do you mean by value type and reference type?
7. What is an assembly? Explain structure assembly diagrammatically.
8. List and describe the objectives of .Net framework.
9. Explain the types of applications that are built with .Net.
10. Describe CLS. Explain the term "cross language operability".

TYBSc Computer Science - DBMS and RDBMS

1. State and explain briefly the ACID properties.
2. Write a note on serializability.
3. What do you understand by transactions and schedules? State the different types of errors arising due to interleaving transactions.
4. What is a transaction? Why does a DBMS interleave the actions of different transactions instead of executing transactions one after the other?
5. What must a user guarantee with respect to a transaction and database consistency? What should a DBMS guarantee with respect to concurrent execution of several transactions and database consistency?
6. Explain the strict two-phase locking protocol.
7.Explain the following terms briefly:  (a) attribute,  (b) domain,  (c) entity,  (d) relationship, (e) entity set, (f) relationship set, (g) one-to-many relationship, (i) many-to-many relationship, (j) participation constraint, (k) overlap constraint, (l) weak entity set, (m) aggregation, and (n) role indicator
8.Define these terms: atomicity, consistency, isolation, durability, schedule, blind write, dirty read, unrepeatable read, serializable schedule, recoverable schedule, avoids-cascading-aborts schedule.
9. What is a system catalog? What information is stored in system catalog? OR What is a data dictionary or catalog table?
10. Describe three techniques commonly used when developing algorithms for relational operators. Explain how these techniques can be used to design algorithms for the selection, projection, and join operators.  OR  Explain the evaluation algorithms for relational operators of selection, projection and join.
11. What is the goal of query optimization? Why is optimization important?
12. What is a transaction? In what ways is it different from an ordinary program (such as a C program)?
13. Explain the general forma of loops in PL/SQL.
14. State and explain cursor attributes (PL/SQL).
15. State the properties of decomposition. Explain any one.
16. What does the lock manager do? Explain the types of locks offered by the lock manager.
17. Explain the functioning in Redo plan in ARIES.
18. Write a short note on deadlocks.
19. What is closure set of functional dependency?
20. Explain FDs in third normal form.
21. What is transaction in Oracle? Explain transaction management commands in SQL.
22. With respect to schedule, define the terms: conflict equivalent, and conflict serializable.
23. State the different relational operators and explain any two.
24 Explain the concept of transaction and schedule with examples. (Oct 2012-Mumbai University)
25 Write in brief about analysis phase of ARIES (Oct 2012-Mumbai University)
26 What is the need for decomposition? Explain lossless property of decomposition. (Oct 2012-Mumbai  University)

TYBSc Computer Science - Paper IV - Software Engineering

1.       Write a short on testing strategy
2.       Write a short on six sigma
3.       What is the difference between stress & volume testing
4.       Explain equivalence partitioning.
5.       Explain Cause & Effect graphing with example.
6.       What are the contents of test case specification document?
7.       What is the need of s/w metrics?
8.       What are differences between LOC & FP estimation?
9.       Explain the steps involved in Project Scheduling.
10.     What are the components of PERT/CPM charts?
11.     What are the components of GANT chart?
12.     What is ARIES algorithm? Advantages, Explain 3 steps in ARIES?
13.     Write about COCOMO model in detail.

TYBSc IT - ASP.Net and C#

1. Write a note on significance of metadata.
2. Give the advantages of web controls.
3. What is a web service?
4. Explain different types of assemblies.
5. Write a short note on CLR.
6. Enlist the different goals of .Net.
7. Diagrammatically explain the .Net architecture.
8. How are different languages integrated under .Net?
9. Write a short note on metadata. What is PE file?

TYBSc Computer Science - Paper II - Advanced Java - Important Questions

1. What is a servlet? What are the various types of servlets? Explain  the lifecycle of a servlet.
2. What is the role of HttpServletRequest and ServletContext? Explain some important methods of these classes.
3. What is EJB? Explain various types of EJB.
4. Differentiate between cookies and sessions.
5. How is a JSP file executed by a web server?
6. Describe the lifecycle of a JSP page.
7. Differentiate between stateless and stateful session beans.
8. Write a note on Type-1 driver.
9. Explain the use of JCheckBox and JTable. Giv examples.
10. Explain the role of Action interface.
11. Write a note on JTabbedPane? How is it created?
12. Explain the following functions - run(), sleep() and wait(). Give suitable examples.
13. Explain the steps to use JDBC.
14. Explain different ways  of session tracking in servlets.
15. Explain gridlayout with an example.
16. Explain the following classes: DriverManager and GenericServlet.
17. Write a JDBC program that accepts a table name and displays the total number of records present in it.
18. How are JavaBeans accessed in JSP?
19. Differentiate between GET and POST request.
20. State the differences between cookie and HttpSession.
21. Write a note on Java archive files.
22. What is persistence in the context of Java Beans?
23. What is design pattern? Explain design patterns for simple and boolean properties.
24. What is JavaBeans? What are the advantages of creating JavaBeans?
25. Write a note on RMI Architecture
26. Explain DriverManager Class and its Methods.
27. Write a short note on the following:
       a.       ResultSet
       b.      ResultSetMetaData
28. Discuss the “synchronization“  issues in servlets.
29. Explain Session Tracking in Servlet? What are the two ways of session tracking in servlet?
30. Explain the Java Servlet Architecture.
31. Explain in detail Introspection feature of Java Beans.
32  Explain Bound property of Java Beans with example.
33  Explain Constrained property of a Bean giving example.
34 What is a Java Bean? What are the advantages of using Java Beans?
35 What is a JAR file? What are the options available with the JAR files? List any five.
36 Explain Java Server Pages (JSP). What are the advantages using JSP over Servlets?
37 What are the various JSP tags available?
38 Explain JSP Access Models and Session Management using JSP.
39 Describe various Implicit objects of the JSP. What is the scope of those objects?
40 What are the major differences in comparison between JSP and ASP?
41 Write a note on JColorChooser class. (Oct 2012-MU)
42 Write a note on RMI Registry service (Oct 2012-MU)
43 What factors should be considered before giving local or remote access to beans? (Oct 2012-MU)
44 Write a web service method that accepts a number n and returns the value of 1+2+3...+n (Oct 2012-MU)

TYBSc Computer Science - Paper I - Data Communications and Networking - Important Questions

1. Differentiate between periodic and aperiodic signals.
2. How can transmissions be impaired? What ate the different types of transmission impairments?
3. What is multiplexing? When is multiplexing useful?
4. Describe the characteristics of ring / bus / mesh topology.
5. What is CSMA/CD?
6. Explain the synchronous and asynchronous modes of transmission.
7. Describe line configuration with suitable example.
8. Explain statistical TDM.
9. Differentiate between baseband and broadband transmissions.
10. What is meant by cyrptography? Explain affice cipher.
11. Highlight the differences between OSI and TCP/IP models.
12. Discuss the functions of the following layers of the OSI model: Network layer, transport layer.
13. What is the function of SMTP? What is the difference between the user agent (UA) and mail transfer agent (MTA)?
14. Explain the term media access control.
15. Describe the characteristics of start topology.
16. Describe the time domain view of signal propagation.
17. Explain the relation between data rate and bandwidth.
18. Explain FDM with suitable diagram.
19. What is a  bridge? What functions does it perform?
20. Describe the OSI model and indicate the functions performed by each layer.
21. Differentiate between circuit switching and packet switching.
22. Write a note on polling controlled access.
23. Write a shortnote on bluetooth.
24. Write a short note on coaxial cable and fibre optic cable.
25. Describe the terms 'sliding window' and 'piggy backing'.
26. What is UDP? Explain the UDP packet frame format.
27. What is a firewall/ Sate the design goals of firewall. What are the limitations of firewall?
28. What i a digital signature? Explain its working. Give two examples where digital signatures are used nowadays.
29. Explain the working of DES.
30. Explain the role of DHCP.
31. What are the advantages of IPv6?
32. What is authentication? Explain the reasons for authentication failure.
33. Explain cipher text, caesar cipher and Verman cipher techniques.
34. What is encryption and decryption of messages? Explain in detail. What is their importance in transmitting information over the Internet?
35. What is meant by public key and private key in cryptography? Why are two keys required to pass information?
36. What is meant by plain text and cipher text? What are the possible methods to convert plain text into cipher text?
37. What is meant by brute force attack? Explain its concept with the example of D-Hellman key exchange algorithm.
38. Distinguish between unipolar encoding and polar encoding. Explain NRZ and Manchester encoding.
39. Explain the terms data rate and error rate. State Shannon's formula for maximum channel capacity and explain how the terms in the formula affect the actual data rate.
40. Explain RIP.
41. What is congestion? What do you mean by open-loop congestion control? Explain any two types of open-loop congestion control.
42. What is HDLC? State the different types of frames of HDLC.
43. State and explain the various classes in classful addressing.
44. Explain any three network connectivity devices.
45. Explain the method of checksum error detection.
46. Explain the different types of DNS servers and explain their role.
47. Write a note on symmetric key encryption.