Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
MCS021

MCS021

Ratings: (0)|Views: 42|Likes:
Published by kktamang09

More info:

Published by: kktamang09 on Apr 13, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

02/09/2011

pdf

text

original

 
MCS-022 - Operating System Concepts And Networking Management - MCA(2)/022/Assign/09 Posted On:2/16/2010 11:45:34 AMQuestion 1:a) Describe the structure of 5 classes of IP address. Also draw the network configuration of your studycentre/organisation showings IP addresses assigned your organization by ISP. How do these classes differ? Howdo you identify a particular classes?(5 Marks)b) How does DNS improve the name resolution?(5 Marks)c) What is real time OS? How it is different from the traditional OS.(5 Marks)Question 2:a) Write the Linux command for the followings :i) to display the information about LS commandii) to sort all the files in ascending order in IGNOU directoryiii) to kill a particular processiv) to run any process in a backgroundv) to list the users currently logged on to the system (5 Marks)b) What are the different kinds of file systems available to Linux operating system ? Discuss.(5 Marks)c) How would you set the IP address of a LAN card in Linux ?(5 Marks)
 
Question 3:(i) How do you share files, folders and drive in Window XP? Why is sharing an entire drive is not recommended ?(5 Marks)(ii) Describe the role of the primary and backup domain controller in enhancing security in windows 2000. (5Marks)(iii) What are the shared folders in windows and why are they used?(5 Marks)(iv) Write the purpose of VPN and name some VPN protocols supported in windows 2000.(5 Marks)Question 4:(i) What is a Instruction Detection system (IDS)? (5 Marks)(ii) What are the two general methods of implementing network security by firewalls?(5 Marks)(iii) Distinguish between Symmetric and Asymmetric Cryptography? (5 Marks)(iv) List different types of malicious codes and describe their features.(5 Marks)Question 5:i) Write a Linux Shall Script to shift all characters in a file forwarding five characters i.e. ‘a’ become ‘f’. (5 Marks)ii) How does information flow from the top layer to the bottom layer in the OSI model.
 
(5 Marks)ankita banerjeeRe: MCS-022 - Operating System Concepts And Networking Management - MCA(2)/022/Assign/09 PostedOn: 2/16/2010 12:18:27 PMQuestion 1:a) Describe the structure of 5 classes of IP address. Also draw the network configuration of your studycentre/organisation showings IP addresses assigned your organization by ISP. How do these classes differ? Howdo you identify a particular classes?b) How does DNS improve the name resolution?c) What is real time OS? How it is different from the traditional OS.Answer 1 :a) In the original Internet routing scheme developed in the 1970s, sites were assigned addresses from one of three classes: Class A, Class B and Class C. The address classes differ in size and number. Class A addressesare the largest, but there are few of them. Class Cs are the smallest, but they are numerous.Classes D and E are also defined, but not used in normal operation.To say that class-based IP addressing in still used would be true only in the loosest sense. Many addressingdesigns are still class-based, but an increasing number can only be explained using the more general concept of CIDR, which is backwards compatible with address classes. Suffice it to say that at one point in time, you couldrequest the Internet NIC to assign you a class A, B or C address. To get the larger class B addresses, you mighthave to supply some justification, but only the class

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->