Professional Documents
Culture Documents
(2%IJours)
[Total Marks: 75]
15
1. Attempt anY three of the following:
a. Explain BCo-.*."e and Internet Connectivity Module
b. Wiite short note on Network Checklist
c. Write short note on Data Center and Virtualization
e"ftuin hierarchical network models and state advantages of it.
d. i
e. nxptain Load Balancing.
f. List and explain Project Deliverables.
15
,,
Attempt onv three of the following:
What is edge distribution? What are the security measures
provlided by edge distribution
a.
against threats?
b. Explain Data center cooling.
c. Explain steps of STP switch Ports
d. Explain the devices used in LAN designs
e. Write a short note on SDN.
f. Explain Gigabit ethernet types.
15
3. Attempt onv three of the following:
,4. Explain W-C components and types of WLC interface'
b. Write a short note on ISDN.
c. Explain different types of Queuing Methods.
d. expUin Full mestr-topology, Partial Mesh topology and Point to point topology
e. Explain DMZ ConnectivitY.
f. what do you mean by redundancy? Explain N+I wLC redundancy, N+N WLC
redundancy, N+N+l WLC redundancY.
15
4. Attempt anv three of the following:
a. Write a short note on IPV6 Neighbour Discovery Protocol
b. Write a short note on Route Summarization.
c. Define following BGP attributes: i)Next-Hop Attribute ii)Local Preference Attribute
iii) Origin Attribute iv)Weight v)MED Attribute
d. Define internet Protocol version a[Pva). Explain lpv4 Header
e. Explain OSPF LSA Types.
f. What is DNS? Explain process of DNS name resolution.
15
5. Attempt snv three of the following:
a. Write short note on SNMP Protocol.
b. Write a short note on Risk Assessment.
c. What are different methods to check and authorize identity credentials?
d. Explain different types of attacks that can impact the security of IT systems?
e. Explain Errcryption Keys rl detait..
f. Explaih the guidelii'res for firewall.
29526 Page 1 of I
EACF5F28 I 543488 I 537E4 A1407 7E6437
Paper / Subject Code: 88706 / I. T. Service Management
(Time: 2% hours)
Total Marks: 75
lConld...
29532 Page 1 of2
15
IJ
a. Explain benchmarking in CSI with respect to its procedure, cost and
Explain
, value to the
:" i,
b. Fwnloi- +ha D A rrr *^.r^r
Explain '\*. ,:"." "'' .
, ,'
'o "i*t:
..
il:,"
.
-i,r:r
:<.
...,..
-a'1,ii
?..:
':.i
',. :,
29532 2 of2
Paper/SubjectCode:88704/Principlesorc"o.g;;pnicnir6imutioq..i;t"ms.i.,j,
,'.1' ,)-.:' :t: l.:
:: -*r:
:' 1:-...
(2% {O.nrs)
[,Tntal Marks: 75
N. B.: are computsoq,vr,
- ,..:-
#,::tions
IIJ Make
(2)
.r! j
wherwe_1.ecessaryj
(3) Answers toG-" made.
..'.
(4) Numbers to the@I1
(5) Draw neat labet-ia a;;
(6)useorNoo@".rrffi,_l
{-.: -
1. Attempt nv th r ee of th,C,:idtowi
.a
a.
15.
b. ffitj:,: *::1^1";^1.,9*_*".i:6?iv,teffi crs epiication.. i
vre,sr ruorysrs, Dxplam u.srng suifhble
c. Iffi Model. B*oia.
Define 'o;"'J"1i'll,.r":;tif:.f*i-lFif,,1-r.i;i"1#r1il'JihL,*u*pr".examp
help"in representing rJalrpbrld
d. Reoresenr the d,,.-.; _f_:^"y^.fl:dels in GfJ,
*:*::::1''11giielithr"",ril;;,#,ffi ;Hi?H:'"1.,1"I
tr'- Forest Land-j
I-IndustrialA:iea ,..:'"'
R- Residqntial Area ,."" .,
I I "I.iI R=
,-R
I r
ri .., I tr- I I R R E {
F ir I tr!:
'R R
R: R
,F" F Fi ;F, R R; R R
.,F F F-.:i
i-il
F F. ,'r r'
F F r I I-
E' F F "F
L.-:
F F, F F R R R R
:..i..
{-
e.
4'. iF F ..8-
propel.tibs of g eoSitri c
R R k R
lr
f:
1.:d.
15
b.
c.
d.
i
e..
f'
fContd...
29s38
Page I of2
.-'i .i
4.
i:4"
a .-!
,{'
,+,
b
c
d
''-7=
Rl - Grorjii.tl
Groun.tl W
7 8
,5
4 3, 3 *^ {\'
,:,).:
6 4i' t2 5 4 4
7 10 t2 & 7 4
.4'8 9"' -8 7 4.
I I o-. 3 0 t-0'
I 0i :0 7 0: '0
e Write a short no!e'6n Netrroft anat
f How Error ProBi!;ates in GiS? Expl
:r' , tj "l
'r.
5. Attempt of,ihe followihg
a4-v',three
a. Explain usiig suitab.lsdiagrarl{Ai; \
b. Define the followinb terrnc. \"'
.t_.
.
=;
,..\
.4 r"
i'."' .>"
29538 Page2 of 2
(2Yz.Hours) .'
{Total Marks: 751
.. . i
(2) Make suitable assumptions wherever necessary and state thb assumptibns made,
1ry eot*"@.rrt.ti.*ritt"olibs"tffi . i''
(5) Draw neat labeled diasrams *ni u"r neqessary. ' rl
(6) Use of Non-prosrammable calculatorc ii ullowed.
1. Attempt onv three of the following: 15
a. Explain the prin6iples of TQM in detail. :
b. What do you mean by quality? Explain customer's view on quality.
c. Write a short note on continual improvement cycle.
d. What are the.constraints:of product quality assessment? , ' .'
e. Explain r-elationship between quality and productivity.
f. Explain quality assurance elements in detail. ., .1,:l,r'
lContd...
2952I Pagel of 2
a.
-_-
5. lnl^pt"nv tt ru o
?. Explain the different
b. Describe lO tustrng.
I5
code
9.
d.
Write short notes on
lxplain the concept,
e. Why do software orsa A) in detail.
/ _ eY vsrr. .
.1."ij
,i:-'
,\oi''
q . 'ij' '
.i-'r
Er' ,t:i'
i-i "
'",r"v .-t{
..\i"
..i14..
,ii.
+' ^,$r
i
.,"i-' ./-T'*,). ;.i'l;'
;.\
,;i'\ ,.q;: rf)
,,d)" ;\'.i#" -?1
",j'
,,,^::
"i
;r i 1 rl ':
29521
., J-L,
otrt
1tr
:f
t
- i..... .".:.,
Paper / Subject Code: 88702/ Secqfity in Coni.$uting
,,:
:.],1
N. B.:
t"':
ki
;i!
1. 15
a.
c.
d.
-
-<", , ".,,
, :,. ,'j
f.
-3;
.:, 15
,.#j
i*-b.
c.
d. :'rl!rat iq"ririeant by;;i. tensiufe': ir,."tffiii*-p.s r (BAp*)r B*pruiiii, different
Explain role ofPKl_(Pubha Key Infrastructure) in iecurit-yin Computing ana
'' Structure
and Function of PKI.
'Each layer of security is designed for a.specific purpose and can be used to provide
authgrizaJion rules". Explain this statemenf with r.f...n.r to
Daiabase s...rriryiuy.r,
and its types.
lContd...
e s"",.itv1,fiE;1,..M;;1;;n-oi;11,i:il;iff
ffi:;;trffi
Monitor in detail.
-qi,qu
J.
a.
Explain,'Why it 15
ls, necessary..to
b.
c.
d.
e.
!.1
r.\
1n
\::r
1^!'
.,"}.
",i
:1r
i. ..,
Ir.
ir
t\Psc{f %qf
Paper / Subject Code: 88703 / Business Intellit[ence sE:;' lqld"?a
'i
29518
h ..r' Page 1 of 1
2 I CE34FF8FB6 I B93CCBDFA6AD95E9D I 9
Paper / Subject Code: 88707 /,Cyber Laws
N.
1. 15
a.
b.
c.
d.
e.
f.
2. 15
a.
b.
c.
d.
e.
f.
15
t. A.
b.
C.l,
..r{.
e.
f.
4.
15
a:
b.
c.
d.
e.
f.
15
a.
b.
c.
d.
e.
f.