Anda di halaman 1dari 6

Last Minute Study for MCA Semester-3(2013)

LastMinuteStudy.blogspot.in

Questions compiled from all the Previous Years Question Papers


Join us on Facebook for MCA Notes!

SPM Questions

What are different Organizational Structures? Diagram. Project Implementation and explain its different approaches. Role of Project Manager in an IT project. What skill sets are required? Outsourcing? Different reasons for outsourcing? System's view of project? Explain three sphere models for system's management. Processes involved in Project Procurement Management? Explain its components. Different steps in Project Risk Management? Explain. 5 Practices of exemplary Leadership? Explain Leadership styles and approaches. Project Communication Plan? What are different things addressed in it? Implementation of Performance Reporting? Different ways of it? What are different types of Contracts? Explain. Project Management Framework? Diagram? Importance of Ethics in Project? Administrative Closure? Stakeholders Management. Project Life Cycle? Diagram Change Process Concept of Make-or-buy decision process using Decision Tree? Advantage and Disadvantage. Gantt Chart, CPM, PERT, Critical Chain Scheduling. Explain with examples. 4 Frames of Organization? Importance of Project Communication Management? "Network Diagram helps in Project Scheduling and Resource Allocation." How? Project Metric? E.g of any 1 Project Metrics to measure cost and schedule. "Project can be an Organization Failure even if it is a technical success" Why? What steps can be taken to prevent this? Different approaches to do Risk Analysis & Assessment? Compare & Contrast! Steps taken for Project Closure? Emotional Intelligence. Polarity Mapping Cost Mgt, Profits, life-cycle costs, tangible/intangible cost & benefits, Direct & Indirect costs reverses & so on... Information Distribution. Risk Management Process? RMMM plan? How change management affects a system? Difference between Monitoring and Controlling. Payback period, Earned value analysis, Project Estimation, Matrix Organization. Explain.

Submitted by- Abhilash Ruhela

LastMinuteStudyARN@gmail.com

Last Minute Study for MCA Semester-3(2013)

LastMinuteStudy.blogspot.in

NETWORK SECURITY QUESTIONS


Network Security? Principles? Different types of attack on it? How Key Distribution work with multiple KDC domains? How KDC differs from CA? Digital Signature? Issued how and by whom? How is asymmetric key algorithm RSA used to get Digital Signature? Firewall? Different configuration in which Firewall can be set up? Different types of Firewall? Digital Certificate? In what circumstances could it be revoked? Explain Process of Revocation of Certificate? PKIX or PKCS Infrastructure? Mutual Authentication? Is it required? Why? Pitfalls? Explain possible attack on Mutual Authentication i.e. Reflection Attack. Methods taken to foil such an attack? Explain Security Mechanism used in Electronic Transaction? Kerberos? Difference between K4 and K5? Authentication? How can it be achieved with help of tokens? Explain Symmetric Encryption Algorithm- DES. Broad-level steps and DES Round? What are weak and semi-weak keys used in DES? Security Policy? Explain different Security Policies? Hash? Discuss SHA1 and compare with MD5, MD4 and SHA. Steganography Biometric Authentication. Smart cards Man in the middle attack Discuss SET process. Key principles of Security? Difference: Active and Passive attacks. Different modes of algorithm? Explain. E-mail Security IDEA Vernam Cipher Certificate Revocation/Broad level difference between CRL, OCSP and SCVP. SSL Different methods used for Authentication. Explain 1. Methods used for encrypting large messages? Explain 1. How MD2 Checksum is computed? What is maximum and minimum padding required? Deffie-Hellman Crypto system? Example. IP Security. Advantages/Disadvantages of Symmetric & Asymmetric algorithm? Discuss how advantages of both techniques can be combined to ensure secure key exchange? Discuss security provided at IP layer in TCP/IP protocol suite. Different types of attacks a communication system is vulnerable to. Security policy, Virus, Packet Sniffing. Difference: SSL and SET. LastMinuteStudyARN@gmail.com

Submitted by- Abhilash Ruhela

Last Minute Study for MCA Semester-3(2013)

LastMinuteStudy.blogspot.in

Intrusion OFM Difference: renewable and Postdated Tickets Smart Cards How tokens can be used to authenticate an entity? NOTE: Solve all the RSA numericals as that's the only numerical that comes in QP.

Submitted by- Abhilash Ruhela

LastMinuteStudyARN@gmail.com

Last Minute Study for MCA Semester-3(2013)

LastMinuteStudy.blogspot.in

Database Management System Questions:


BCNF? Its difference with 3NF. Query Optimization and Query Processing. Hash based indexing? Discuss use of Hash function in identifying a bucket to search. Locking protocol? 2-phase locking protocol, strict 2-phase locking protocol and rigorous 2-phase locking protocol. Deadlock? wait-die & wound-wait protocols for deadlock prevention? Compare Deadlock detection & Prevention technique. Check pointing? 3 steps in crash recovery in Aries. Lossless join decomposition & Dependency preserving decomposition. Serializability? 2-schedule conflict equivalent? Conflict serializable schedule. ACID properties, Triggers, DBA and responsibilities, Dynamic Hashing, Shadow Paging, Strong entity. Differences: Clustered vs Unclustered index, B tree vs B+ tree, tree-structured indexing and Hash based indexing, Physical vs logical data independence, triggers vs stored procedure, ER model vs Relational model, Dense index and Sparse index, FD vs MVD, Aggregation vs Association. Bell-LaPadula model. Normalization? 2 required conditions for Normalization through decomposition of data. Functional dependency? How is it used to remove the redundancy in database? Explain Closure and minimal set of Functional dependency. Indexing technique speeds up query processing. Justify? And explain how does multilevel indexing improve the efficiency of searching an index file. Explain. Various steps of processing a high-level query. Data model? Network model- its advantages and disadvantages. Aggregation, 2PL, Views, Weak entity. Architecture of Database system. How different it is from conventional file system? What is an index on file of records? Search key for index? Why we need indexes? Recoverable schedule? Recoverability of schedule desirable? Relational Data model? Data independence? How DBMS supports it? why are Locks in DBMS used? write-ahead logging? why used? Transaction? State diagram, draw and explain. Candidate key, Closure of set of FD, RAID.

Submitted by- Abhilash Ruhela

LastMinuteStudyARN@gmail.com

Last Minute Study for MCA Semester-3(2013)

LastMinuteStudy.blogspot.in

Computer Graphics Theory Questions:


Discuss any two algorithms for hidden surface removal. Compare and contrast B-spline and Bezier curves, floodfill and boundary fill algorithms, parallel and perspective projection. Explain various steps required to be performed to design an animation sequence. What are projections? How are they useful? Explain different types of projections with e.gs. Deduce the Mid-point Ellipse Algorithm Explain different methods of character generation. Explain the cohen-Sutherland algorithm for Line Clipping. Give suitable e.gs. Explain the construction and working of CRT's and DVST's. Discuss various Colour models used in graphics system. Develop a 2D rotation matrix with respect to a arbitrary point. Short notes:- Frame buffer, Even-odd method, text clipping, viewing pipeline, homogeneous coordinates, Kinematics and Dynamics, morphing, Phong shading, character generation. Devise generalized Bresenham's line drawing algorithm. Explain window to view port mapping. Explain Midpoint Subdivision algorithm. Adv/Disadv. Prove that it works successfully with lines that are partially inside and partially outside the viewing window. Derive 2D rotation and scaling transformations matrices with respect to fixed point(Xp, Yp) How does a raster scan system work? How is it different from Random scan system? What are display files? explain with e.gs, how are polygons and characters represented in Display file. Deduce the midpoint circle algorithm. What are Homogeneous co-ordinates? Explain its significance with e.gs Explain Polygon and its representation in display file. Also write the algorithm for entering the polygon into display file. Difference: Vector scan systems and raster-scan systems. Properties of curve. What is 2D viewing transformations. Derive the window to viewport transformation equation. Explain Liang-bersky Line clipping algorithm. Explain the relevance of normalized device coordinates. Explain the concept of Display file. How are they useful in storing the image definitions? Discuss the process of rotating an object about an arbitrary axis. Discuss any 2 methods for visible surface detection. Devise a procedure to rotate a rectangle by n degree in clockwise direction and reduce it to 2/3rd of its size by keeping the midpoint fixed. Short notes on: Ray tracing, Shear transformation, Random scan system, diffuse illumination, HSV colour model.

Submitted by- Abhilash Ruhela

LastMinuteStudyARN@gmail.com

Last Minute Study for MCA Semester-3(2013)

LastMinuteStudy.blogspot.in

Operation Research Theory Questions


Inventory problem Branch and Bound algorithm & Hungarian method to solve Traveling Salesman problem. Short Notes with e.g.- Redundant constraints in LPP, Pure strategy in game theory, Dual of a Primary LPP, Feasible region. Artificial variables? Explain 2-phase method of solving LPP. Deterministic inventory problem. What is "two person zero sum game"? Explain pure and mixed strategies in game theory? Pay-off matrix with saddle point and without saddle point.

NOTE: If anyone feels that the notes he/she has is in a very easy language on any topic, you can send it to LastMinuteStudyARN@gmail.com. It will be published on the site with your name. And the solved numerical problems will also be uploaded on the site lately. Thanks!!! -Last Minute Study LastMinuteStudy.blogspot.in

Submitted by- Abhilash Ruhela

LastMinuteStudyARN@gmail.com