Question Papers of MSc IS I Yr. II sem.

1.Cryptography

2.Information Systems Control And Audit

3.DataWare Housing and Data Mining

4.Wireless Application Protocol

5.Software Project Management





Vishweshwar Rao M's Site





















Date: 06-11-2002
FACULTY OF SCIENCE
M.Sc. I year II semester (Information System/PGDIS) Examination
CRYPTOGRAPHY AND NETWORK SECURITY
Paper I

Time-Three Hours]
[Maximum Marks-100

Note :-- (1) Answer all questions.
                               (2) All Questions carry equal marks.

1. Answer all the following in brief:--
     (a)Digital Signature.
     (b)Firewall.
     (c)Pseudo Random Numbers.
     (d)Encryption Functions.
     (e)Hash Function.
     (f)Discrete Logarithms.
     (g)Authentication.
     (h)Hierarchical Key Control.
     (i)Secret Keys.
     (j)Key Ring.

2.  (a)Differantiate between attacks, services and mechanisms.
     (b)Explain S-DES functioning.

OR
     (c)Define conventional encryption and describe any classical encryption and describe any classical encryption techniques in detail.
     (d)Discuss the concepts of diffusion and confusion.

3.  (a)Differentiate between Link and End to End encryption.
     (b)Briefly explain key distribution.
OR
     (c)Describe RSA algorithm.
     (d)State and prove Euler's Theorem.

4.  (a)Explain Elliptic curve cryptography.
     (b)Explain message authentic functions.
OR
     (c)Explain message authentication code based on DES.
     (d)Explain the Digital Signature standard approach.

5.  (a)What are MIME content types? Explain briefly with some examples.
     (b)Explain the benefits of IP Sec.
OR
     (c)Explain Authentication Header.
     (d)Discuss the characteristics of Firewalls and their typical uses.
TOP
















Date: 11-11-2002
FACULTY OF SCIENCE
M.Sc. I year II semester (Information System/PGDIS) Examination
INFORMATION SYSTEMS CONTROL AND AUDIT
Paper II

Time-Three Hours]
[Maximum Marks-100

Note :-- (1) Answer all questions.
                               (2) All Questions carry equal marks.

1. Answer all the following in brief:--
     (a)Computer Error Costs.
     (b)Evidence collection.
     (c)Privacy Control.
     (d)Change Over Plan.
     (e)Prototyping Approach.
     (f)Cryptographic Control.
     (g)Recovery Plan.
     (h)Response Time.
     (i)Data Input.
     (j)Report Collection Controls.

2.  (a)What is "sub-system factoring" ? On what basis should an auditor do subsystem factoring?
     (b)What types of security threats are involved in security of information assets?

OR
     (c)What is the importance of Quality Assurance? Explain its need.
     (d)What are the types of Audit Procedures? Explain briefly.

3.  (a)Explain input methods for good source documents.
     (b)Explain the importance of communication controls.
OR
     (c)Explain the database controls for achieving a good DBMS.
     (d)What are inference controls regarding outputs? How should they be monitored?

4.  (a)What is utility software? Explain.
     (b)What are the factors that lower program quality? Briefly explain.
OR
     (c)Explain the role of interviews and questionnaires in evidence collection.
     (d)Briefly discuss the importance and types of test data.

5.  (a)What are the measures of asset safeguarding and data integrity?
     (b)Explain how a system's effectiveness is evaluated.
OR
     (c)What are cost effectiveness considerations for evaluating asset safeguarding and data integrity?
     (d)How do you evaluate system quality?
Top
















Date: 14-11-2002
FACULTY OF SCIENCE
M.Sc. I year II semester (Information System/PGDIS) Examination
DATAWAREHOUSING AND DATA MINING
Paper III

Time-Three Hours]
[Maximum Marks-100

Note :-- (1) Answer all questions.
                               (2) All Questions carry equal marks.

1. Answer all the following in brief:--
     (a)HOLAP.
     (b)OWB.
     (c)Fact tables.
     (d)Metadata.
     (e)Triggers.
     (f)RI(Reference Integrity).
     (g)Bitmap Indexes.
     (h)Index-Organized Tables(IOTs).
     (i)Table Spaces.
     (j)MOLAP.

2.  (a)Write a note on Bill Inmon description of Data Warehouse.
     (b)Discuss the process of normalization.

OR
     (c)Discuss the methodology for developing a Data warehouse.

3.  (a)What is a dimension table of star shema? What is its necessity? Discuss its properties.
     (b)Write a note on SQL* Loader.
OR
     (c)Discuss CBO and SQL analysis facilities of Grade.
     (d)Explain the tools available in Oracle to load data.

4.  (a)Explain why we need OLAP? Discuss different types of OLAP.
     (b)What is indexing ? Discuss the rules followed for indexing columns in Oracle-8i.
OR
     (c)Explain the concept of multidimensional databases.
     (d)Write a note on Partition mechanisms available in Oracle-8i.

5.  (a)Explain clustering.
     (b)Dicision Tree Approach vs other approaches of Data Mining - Explain.
OR
     (c)Discuss the difference between data mining and statistics.
     (d)Define and explain Data mining.
Top














Date: 18-11-2002
FACULTY OF SCIENCE
M.Sc. I year II semester (Information System/PGDIS) Examination
WIRELESS APPLICATION PROTOCOL
Paper IV

Time-Three Hours]
[Maximum Marks-100

Note :-- (1) Answer all questions.
                               (2) All Questions carry equal marks.

1. Answer all the following in brief:--
     (a)WML skeleton.
     (b)Binary Extensible Markup Language.
     (c)Push Messaging.
     (d)Mobile Internet.
     (e)WTAI.
     (f)Bit Error Rate.
     (g)Value Chain.
     (h)Content Provider.
     (i)Task and Link tags.
     (j)MIME.

2.  (a)Where does Mobile Internet actually fit in a daily life and how ? Explain.
     (b)Explain the Mobile Internet value chain.

OR
     (c)Explain the uses and limitations of wireless Network.
     (d)Explain the different drivers which has enabled the convergence.

3.  (a)Describe WAP Architecture.
     (b)Explain various components of WAP standard.
OR
     (c)Discuss about evolution factors of WAP protocol.
     (d)Write a note on Network Infrastructure services supporting WAP clients.

4.  (a)Compare WML with Binary WML.
     (b)Write a note on various design phases of a website.
OR
     (c)Explain about different standard libraries used in WML script.
     (d)Discuss about the type of operators in enhanced WML.

5.  (a)Explain different protocols used in push messagin technology.
     (b)Write a note on encoding process from WML to WBXML.
OR
     (c)Explain how PPG communicates with WAP clients.
     (d)Explain the structure of a CC/PP document.
Top
















Date: 21-11-2002
FACULTY OF SCIENCE
M.Sc. I year II semester (Information System/PGDIS) Examination
SOFTWARE PROJECT MANAGEMENT
Paper V

Time-Three Hours]
[Maximum Marks-100

Note :-- (1) Answer all questions.
                               (2) All Questions carry equal marks.

1. Answer all the following in brief:--
     (a)Stakeholders.
     (b)RAD.
     (c)Parkinson's Law and Brook's Law.
     (d)Activity Float.
     (e)Group Desicion making.
     (f)Frame work.
     (g)Cost monitoring.
     (h)Contractors.
     (i)Leadership.
     (j)Decision making.

2.  (a)Explain about stepwise overview of project planning.
     (b)Discuss software projects verses other types of projects.

OR
     (c)Explain the issues in Management Control.
     (d)Discuss about cost benefit Analysis.

3.  (a)What is meant by successful project? Discuss the difficulties faced during effort estimation.
     (b)Explain Spiral Model with neat diagram.
OR
     (c)Discuss about Network Planning Techniques CPM?
     (d)Explain the COCOMO parametric model.

4.  (a)What is a resource? Explain about the different resource categories.
     (b)Explain about monitoring and control.
OR
     (c)Explain about the Gantt charts, Slip Chart and Ball Chart.
     (d)Explain about cost Schedules.

5.  (a)Explain about the different types of contract used on payement to suppliers.
     (b)Explain the importance of software quality.
OR
     (c)Explain the different stages on contract placements.
     (d)Explain the techniques for enhancing software quality.
Top