This action might not be possible to undo. Are you sure you want to continue?
Time : 3 Hours Max. Marks : 100 Instructions : 1) Part – A Compulsory. 2) Answer any FIVE full questions from Part B. PART – A Answer all FIVE full questions: (5x5-25) 1. What is POP ? Explain the working of POP ? 2. What is the purpose of time out timer ? 3. Discuss in detail the architecture of WWW ? 4. What is cryptography ? List the different cryptographic algorithms. 5. Explain IEEE 802.11 standard ? PART – B Answer any FIVE full questions : (15x5=75) 1. a) With suitable example explain DNS. 10 b) What is iterative solution ? 5 2. a) Explain the client and server side events when user click on a URL. 10 b) What is routing ? 5 3. a) Explain any one routing algorithm with the help of an example. 10 b) Discuss IR RIP packet format. 5 4. Discuss the various features of WLAN and its protocol architecture. 15 5. What is Multimedia ? What is streaming server ? Explain audio streaming process. 15 6. Explain any one cryptographic algorithm with suitable example ? 15 7. What is video ? List and explain the drawback of the current internet to drive the multimedia data. 15 8. Write short notes on (5x3-15) a) RTSP b) SMTP c) CSMA/CA mechanism.
Net Programming ? 3. Give an example each. a) Write a program in C# to calculate factorial of given number and explain the program. What is the use of attributes in . 5 2. a) What is operator overloading ? Explain with an example.BASIC OF . 5 3. 10 b) What is the functions of CTS ? Explain the classification of types of CTS with a diagram. 10 b) Explain different types if constructors used in C# program.Net remoting applications. 4. Marks : 100 Instructions : 1) Answer all questions from Part – A. 10 . 10 b) What is data provider ? Explain.B.NET Time : 3 Hours Max. a) What us . 5 5. How does C# supports multiple inheritances ? PART – B 1. a) Mention the different preprocessor directives of C#.Net (5x5=25) 2. 7 b) Explain the following with an example i) Structs ii) Enums. (4x2=8) 6.Net frame work ? Explain. Explain different features of . What is the importance of atomatic memory management ? Explain with example. 10 b) How does C# supports multilevel inheritance ? Explain 5 4. 2) 2) Answer any FIVE full questions from Part . a) Explain different types of arrays present in C#.Net programming ? 5. 10 b) What is the use of multiple threading ? Explain. 5 7. a) Explain the steps or phases involved in implementing . PART – A 1. a) What are methods in C# ? Explain methods with passing value and by passing references. How window programming is different from .
T. 15 7. a) Explain the impact of internet on the economy of the country and the society at large. COMPUTER ETHICS AND CYBER LAWS Time : 3 Hours Max. What is a digital signature certificate ? 8 b) What is cyber privacy ? Explain 7 6.3. Define computer ethics and give classification of ethical issues. the evolution of computer ethics.T. Explain principles of computer ethics. 10 b) Discuss the impact of globalization on computer ethics. Act – 2000 ? 8 b) Discuss the essentials of a valid contract. Explain with the help of historical milestones. What is meant by unauthorized access to a computer under the provisions of the I.A 2) Answer any FIVE full questions from Part .b) Explain remoting architecture. 15 2. Explain the following : (5x3=15) i) Unsafe code ii) Exception Handling iii) JIT compiler. a) What are the amendments to the Indian penal code 8 b) Explain how computer ethics is related with internet. a) Explain the term digital signature. Explain the different sources of law. a) What ae the fundamental conceptions regarding the evaluation of individual actions ? 10 b) How do professional code address issues from the view point of computing profession ? 5 4. 7 5. a) Discuss the classification of crimes under the I. 7 8. What are the essentials of a cyber contract ? (5x5=25) PART – B 1. 5 3. Marks : 100 Instructions : 1) Answer all questions from Part . Act 2000 ? 5. 5 8. Write short notes on : (3x5=15) . How is professional code distinguished ? 4. 2.B PART – A 1.
Write short notes on the following : i) Kinds of shopping ii) Unix security ii) Viruses and worms . What is meant by integrityw of data ? PART – B 1. 7 b) Explain horizontal and vertical organization.B. a) Why are information brokerage and management needed ? Explain. 5 4. a) Explain reason for information security ? 8 b) Explain different security tools 7 8. a) Explain any four components of E. E-COMMERCE Time : 3 Hours Max. Explain. Explain basic goals of electronic security. 8 b) What are the desirable characteristics of E-commerce ? 7 2. a) Explain different categories of operations comes under Ecommerce. a) What are the normal constraint put on e-cash ? 7 b) Name any four issues addressed in a e-payment system ? 8 5. 4.a) Source of law b) Cyber crimes c) Electronic governance. 10 b) Explain software agent and middleware. PART – A (5x5=25) 1. Name any two areas which are reasons of worry in e-commerce ? 2. Define e-commerce. a) Explain the primary elements of SCM. 8 6. 7 b) List the advantages and disadvantages of Internet.I. 2) 2) Answer any FIVE full questions from Part . implementation. 8 7.D. Name a few operations performed by e-commerce. Marks : 100 Instructions : 1) Answer all questions from Part – A. a) Explain the architecture frame work of E-commerce ? 10 b) List the OMC’s [Order Management Cycle] generic steps ? 5 3. 5. List three basic banking activities ? 3.
NET ? List the advantage of . 2009 (Directorate of Distance Education) BASICS OF .Sc.Sixth Semester B. 7 b) Define the following : 8 CLR.] [Max.NET Time: 3 hrs.NET architecture. PART . 7 4) With the help of an example explain the following: 15 i) Jagged arrays ii) Static constructors iii) Passing arrays using ref and out. 2) a) Mention the important features of C#. 7 b) What are events? Give an example to demonstrate its usage. 5) a) What is operator overloading? Explain with the help of an example.NET architecture. CTS. 5) Explain backward compatibility. (5x5=25) PART . 8 . 3) Define the following :i) Delegates 4) With the help of an example list the different types of arrays supported by C# programming. Part A is compulsory./Dec. Answer all the questions: 1) With the help of a diagram explain the .Marks: 100 Instructions: 1. CLS.NET frame work. Nov. (IT) Examination. 2) With the help of an example differentiate struct and class. 2. Answer any FIVE full questions from Part-B. Answer any FIVE full questions : 1) a) What is .A I. 7 b) What is IIS server? Why it is used ? 8 3) a) What is the role of the following : 8 i) System·object ii) System·collection iii) System·string iv) System·drawing b) Explain ADO.B II.
a) What are the two basic types of physical data security? Explain. 8 7) a) Explain ASP. 7 b) Why information brokerages are needed ? Explain with the help of an example. PART . 7 b) What are interfaces ? Explain the use of interfaces with the help of an example. 8 2. Answer all the questions of Part -A 2. What is digital signature ? Explain its importance5. a) What is the role of encryption in data transfer? List the various encryption techniques. 7 b) Explain JIT-compiling. 7 . a) What is E-Banking ? List the banking services. PART B 1. 8 8) Write a short notes on: (5x3=15) i) Data Provider ii) XML iii) Inheritence E-COMMERCE Time: 3 hrs. What is E-Commerce ? List the various activities carried out in ECommerce. 7 b) What is e-purse ? Who is liable if an EDI network fails to deliver the message? 8 3. 8 5.6) a) What is threading ? List the advantages of using threading. 2. Answer any FIVE full questions from Part-B. 8 4.NET architecture. What is digital signature ? Explain its importance in E-commerce. 3.Marks: 100 Instructions: 1. b) With the help of a diagram explain horizontal and vertical organisation. List the different layers of EDI implementation. 7 b) How does the commerce and E-commerce are related ? Explain. a) List the various issues in e-payment system. What is E-cash ? Give its properties.A Answer all the questions: (5x5=25) 1.] [Max. What are software agents ? 5. 4. a) What is SCM? Explain the primary elements of SCM.
What is the purpose of timeout timer ? 2 5. Explain the advantages and disadvantages of wireless LAN. 8 . a) Explain audio streaming process. Write a note on Cryptography PART-B 1. 7 3. 8 b) Explain BGP. What are its limitations ? 7 2. a) Discuss MAC layer of WLAN. 8 7. Explain the five basic functions supported by E-mail System. 8 6. Write short notes on : (5x3=15) i) Security tools ii) Viruses and worms iii) OMC’s ADVANCED COMPUTER NETWORKS Instructions: 1. Answer any FIVE full questions from Part-B. 7 b) Explain public key and secret key cryptography techniques.b) Describe the VAN pricing system. 8 b) Discuss the features of Real Time Protocol. a) What is the purpose of Kerberose ? 7 b) Explain the secure socket layer in detail. PART . 5 7. 5 3. SMTP stands for ______________ 1 2. a) Briefly explain the WLAN architecture. 2. 4 8.What is an audio? What is a video ? 2 6. 8 b) Discuss the working of POP3 in an E-mail System. a) What is Routing ? Discuss direct and indirect Routing. List the drawbacks of the current internet to drive the multimedia data. Part A is compulsory.A 1. a) With the help of a neat diagram explain the architecture of WWW. 7 5. 7 4. 8 b) Compare Infrared and Radio Transmission. a) What is spoofing ? Explain with the help of an example. 8 8. OSPF stands for ______________ 1 4.
There is no nexus between cyber space and real space . 802. What is common law? How it is differ from codified law? .11 g and blue tooth. 7 6. 2. Explain real-time streaming protocol.11 b.A Answer all the questions: (5x5=25) 1. 802. 15 7. 7 COMPUTER ETHICS AND CYBER LAWS PART . a) Explain cryptographic algorithms.Comment. a) Explain why audio and video need to be compressed. 8 b) Explain conventional encryption model. 8 b) What is a streaming server? 7 8.b) Compare 802.11 a.
This action might not be possible to undo. Are you sure you want to continue?