You are on page 1of 11

Paper / Subject Code: 88705 / Enterprise Networking

(2%IJours)
[Total Marks: 75]

N. B.: (1) All questions are pEqpg!ry,'


aSSumntiq.ps made'
(2) Make suitable assumptions wherever necessary and state the
(3) Answer, @ must be written tosether.
(+1 Nrr-U..s to the rieht indicate mryks'
(5) Draw ne,at labeled diaq.ngrirs whereler necessflrv'
(6) Use of Xor alculators is qlloived'

15
1. Attempt anY three of the following:
a. Explain BCo-.*."e and Internet Connectivity Module
b. Wiite short note on Network Checklist
c. Write short note on Data Center and Virtualization
e"ftuin hierarchical network models and state advantages of it.
d. i
e. nxptain Load Balancing.
f. List and explain Project Deliverables.
15
,,
Attempt onv three of the following:
What is edge distribution? What are the security measures
provlided by edge distribution
a.
against threats?
b. Explain Data center cooling.
c. Explain steps of STP switch Ports
d. Explain the devices used in LAN designs
e. Write a short note on SDN.
f. Explain Gigabit ethernet types.
15
3. Attempt onv three of the following:
,4. Explain W-C components and types of WLC interface'
b. Write a short note on ISDN.
c. Explain different types of Queuing Methods.
d. expUin Full mestr-topology, Partial Mesh topology and Point to point topology
e. Explain DMZ ConnectivitY.
f. what do you mean by redundancy? Explain N+I wLC redundancy, N+N WLC
redundancy, N+N+l WLC redundancY.

15
4. Attempt anv three of the following:
a. Write a short note on IPV6 Neighbour Discovery Protocol
b. Write a short note on Route Summarization.
c. Define following BGP attributes: i)Next-Hop Attribute ii)Local Preference Attribute
iii) Origin Attribute iv)Weight v)MED Attribute
d. Define internet Protocol version a[Pva). Explain lpv4 Header
e. Explain OSPF LSA Types.
f. What is DNS? Explain process of DNS name resolution.

15
5. Attempt snv three of the following:
a. Write short note on SNMP Protocol.
b. Write a short note on Risk Assessment.
c. What are different methods to check and authorize identity credentials?
d. Explain different types of attacks that can impact the security of IT systems?
e. Explain Errcryption Keys rl detait..
f. Explaih the guidelii'res for firewall.

29526 Page 1 of I
EACF5F28 I 543488 I 537E4 A1407 7E6437
Paper / Subject Code: 88706 / I. T. Service Management

(Time: 2% hours)
Total Marks: 75

N. B.: (1) All questions are gl4pglsgg.


(2) frrfake suitable assumotions wherever necessary and state the assumptions made.
(3) Answers to the same question must be written together.
(4) Numbers to the g!g[! indicate marks,
(5) Draw neat labeled diasrams wherever 4gSSSsly.
(6) Use of Non-nrosramnable calculators is allowed.

1. Attempt any threeof the following: 15


a. Explain in brief about business processes.
b. Write a short note on processes and functions across service lifecycle of ITSM.
c. Explain type I and type III service providers in detail.
d. Explain four P's of Service Strategy with a neat labelled diagram.
e. How are markets defined in service strategy? Explain.
f. What is risk? Explain the phases and different types of risk in detail.

2. Attempt anv three of the following: 15


a. Write a short note on balanced service design.
b. What is service design model? List and explain differ'ent aspects required during its
assessments
c. Explain any six components of service availability management process.
d. Explain service level management process in detail.
e. Explain in detail supplier management process of service design.
f. What are the challenges associated for achieving successful iervice design process?
Explain in brief.

3. Attempt anv three of the following: 15


a. Describe service transition. Explain its objectives, purpose and goal.
b. How to align service transition plans with the business needs? Explain.
c. What is Change? What are the different types of Changes? List and explain Seven R
(7 R's) of ITIL Change management.
d. Explain in detail service validation and testing process.
e. Explai4 the factors affecting the approaih to service transition.
f. Write a detail short note on critical success factors of service transition phase

4. Attempt anv threeof the following: t5


a. Define service operation. Explain the principles of service operation stage.
b. State reasont *t y service operation itaff strould be involved at serviie design and
transition stage?
c. What are different ty-pes of meetings conducted in organization as mode of
communication? Explain.
d. Write short note on Incident Management Lifecycle activities.
e. Explain in detail access *unagern*t process.
f. List and explain the challenges and risks in service operation phase.

lConld...
29532 Page 1 of2

7EBFA357FDC656 I 3COBA3 832FC9A2BCO


Paper / Subject Code: 88706 ll.T.Seryice
. vvr v rlw Management
rvrcucSEtttt;lttr

15
IJ
a. Explain benchmarking in CSI with respect to its procedure, cost and
Explain
, value to the
:" i,
b. Fwnloi- +ha D A rrr *^.r^r
Explain '\*. ,:"." "'' .

c. With a neat improV€inent process of CSI;


d. Write short no theLe vafious
variOus stases,
stage$, ,,. '
,-'. ..'
e. Explain the
.:

f. What are the factors to Ue coniiAered-w-hen preparing a

, ,'

'o "i*t:

..
il:,"

.
-i,r:r

:<.

...,..

-a'1,ii

?..:

':.i

',. :,

29532 2 of2
Paper/SubjectCode:88704/Principlesorc"o.g;;pnicnir6imutioq..i;t"ms.i.,j,
,'.1' ,)-.:' :t: l.:
:: -*r:

:' 1:-...

(2% {O.nrs)
[,Tntal Marks: 75
N. B.: are computsoq,vr,
- ,..:-

#,::tions
IIJ Make
(2)
.r! j

wherwe_1.ecessaryj
(3) Answers toG-" made.
..'.
(4) Numbers to the@I1
(5) Draw neat labet-ia a;;
(6)useorNoo@".rrffi,_l
{-.: -
1. Attempt nv th r ee of th,C,:idtowi
.a
a.
15.
b. ffitj:,: *::1^1";^1.,9*_*".i:6?iv,teffi crs epiication.. i
vre,sr ruorysrs, Dxplam u.srng suifhble
c. Iffi Model. B*oia.
Define 'o;"'J"1i'll,.r":;tif:.f*i-lFif,,1-r.i;i"1#r1il'JihL,*u*pr".examp
help"in representing rJalrpbrld
d. Reoresenr the d,,.-.; _f_:^"y^.fl:dels in GfJ,
*:*::::1''11giielithr"",ril;;,#,ffi ;Hi?H:'"1.,1"I
tr'- Forest Land-j
I-IndustrialA:iea ,..:'"'
R- Residqntial Area ,."" .,
I I "I.iI R=
,-R
I r
ri .., I tr- I I R R E {
F ir I tr!:
'R R
R: R
,F" F Fi ;F, R R; R R
.,F F F-.:i
i-il
F F. ,'r r'
F F r I I-
E' F F "F
L.-:
F F, F F R R R R
:..i..
{-

e.
4'. iF F ..8-
propel.tibs of g eoSitri c
R R k R
lr
f:

a' Delrne GIS' Exolaur-irts ranse orcafiaultitiesto I5


b' Exphin thb Grs^ As.hi;;;;?"ij"ffirio*rity handle georeferenced data.
r.ty,i.iffi;,{i#,i,r usine suitabre diagram.
i: R #,.;**
d'whataietr,e'eafr ns".sffi;"'tffi data reprssentation
_
Efi iEjf; i,"1xl?,.
:.
f. Ilf,i11i1"oteortr,:xlrultior"J,tuoModet
the jlrocess
1

.,Explain "frfieirg Art:, #;ffi'#ff

1.:d.
15
b.
c.
d.
i
e..
f'

fContd...
29s38
Page I of2

EACF5F28 I5 434B8tsi7E4A l4077DACC


I
Paper / Subject Code: 88704 / Principles of Geographic Inftirmation.Systems.
..
,^

.-'i .i
4.
i:4"
a .-!
,{'
,+,
b
c
d
''-7=

Rl - Grorjii.tl
Groun.tl W
7 8
,5
4 3, 3 *^ {\'
,:,).:

6 4i' t2 5 4 4
7 10 t2 & 7 4
.4'8 9"' -8 7 4.
I I o-. 3 0 t-0'
I 0i :0 7 0: '0
e Write a short no!e'6n Netrroft anat
f How Error ProBi!;ates in GiS? Expl
:r' , tj "l
'r.
5. Attempt of,ihe followihg
a4-v',three
a. Explain usiig suitab.lsdiagrarl{Ai; \
b. Define the followinb terrnc. \"'

.t_.
.

and is it effective?), with re&.&nce to map

=;
,..\
.4 r"
i'."' .>"

29538 Page2 of 2

EACF5F28 I 543,t88 I 537E4A I 4077DACC I


Paper / Subject Code: 88701 / Quality Assurance

(2Yz.Hours) .'
{Total Marks: 751
.. . i

(2) Make suitable assumptions wherever necessary and state thb assumptibns made,
1ry eot*"@.rrt.ti.*ritt"olibs"tffi . i''
(5) Draw neat labeled diasrams *ni u"r neqessary. ' rl
(6) Use of Non-prosrammable calculatorc ii ullowed.
1. Attempt onv three of the following: 15
a. Explain the prin6iples of TQM in detail. :
b. What do you mean by quality? Explain customer's view on quality.
c. Write a short note on continual improvement cycle.
d. What are the.constraints:of product quality assessment? , ' .'
e. Explain r-elationship between quality and productivity.
f. Explain quality assurance elements in detail. ., .1,:l,r'

2. Attempt anv tlree of the following: 15


a. What is a defect? What ire the categories of defects?
b. Explain the basic principles on which the testing is based.
c. Write a qhort note on mutation testing.
d. Explain the process of developing by test methodology.
e. Explain types of prototyping software development model in detail.
f. \Vhat are the challengesfaced by tester?

3. . Attem p!,gnv threg;;iiU. fot.liiving: '-


r:' 15
a. What do you mean by random testing? Explain lts advantages and tlisudvantages in
detail. r'r .j.
b. Explain equivalence class testing concept with example and its types.
c. What do you mean by decision tuUt"Z Explain with examples.
d. What is path testing? What are the features of path testing?
e. Write-a.short note bir slice based testing.
f. What do you mean by define/use testing? Explain du and dc path.

4. Attempt gnv three of the following: 15


a What are the different entities involved in verification?
b., Explain the concept of validation workbench in detail.
c' Explain testing during requirement stage.
d Explain the V model for software.
e ,..What arelhe critical.roles and responsibilities in verification and
validation?
f Explain types of reviews on the basis of stageiphase during development life cycle.

lContd...

2952I Pagel of 2

0Er B80B4D6l I sD6 I 782 I B92FDD75DF3 i

a.
-_-

5. lnl^pt"nv tt ru o
?. Explain the different
b. Describe lO tustrng.
I5
code
9.
d.
Write short notes on
lxplain the concept,
e. Why do software orsa A) in detail.
/ _ eY vsrr. .

Explain COTS featurei of rhe:shelf software


f.^ liallV (COTSj?
What is regression testil ;. .',
2nce in rlp+oil
.".:,.'

.1."ij

,i:-'
,\oi''
q . 'ij' '
.i-'r
Er' ,t:i'
i-i "
'",r"v .-t{
..\i"
..i14..

" 't *}''


..r,;,il;r" ,3"$' r-:':*
rr-.: . \'
^,1,tt
.l
.l
,',5

,ii.
+' ^,$r
i
.,"i-' ./-T'*,). ;.i'l;'
;.\
,;i'\ ,.q;: rf)
,,d)" ;\'.i#" -?1
",j'
,,,^::
"i

;r i 1 rl ':

29521
., J-L,

otrt

1tr
:f
t
- i..... .".:.,
Paper / Subject Code: 88702/ Secqfity in Coni.$uting
,,:
:.],1

Maa 201-3 (2% Hoiirs)


[Totzil Marks: 75]

N. B.:
t"':
ki
;i!

1. 15
a.

b. exploit directed,at the

c.
d.
-
-<", , ".,,

, :,. ,'j

of Zo-he of Tnr$t for

f.

-3;
.:, 15
,.#j
i*-b.
c.
d. :'rl!rat iq"ririeant by;;i. tensiufe': ir,."tffiii*-p.s r (BAp*)r B*pruiiii, different
Explain role ofPKl_(Pubha Key Infrastructure) in iecurit-yin Computing ana
'' Structure
and Function of PKI.
'Each layer of security is designed for a.specific purpose and can be used to provide
authgrizaJion rules". Explain this statemenf with r.f...n.r to
Daiabase s...rriryiuy.r,
and its types.

l6e-mpt the following: .'


i3.
a.
Wof
Elplain diffriient l ay grs o f tvro-tier iretwork.fu ndamentars.
15

b. ,;'With referehce to OrU model in which fayq j".r-nqut*-operate?


Explain the working

€; Writp=i short noie'on diffefent generatibn of Fire.Walls


a. :l 1gr',r, sNup iJEinc; h ;#;dardening.
'e. IT*,-,"'gt
the helfi'of diagram, protocol
lv_ith explain working of bluetooth Stack.
f. -what
is meant by Wircless Intr,usion Detegtion and Prevention? Explain
working of it.
::.,.",'.-a-''...."'
.:

lContd...

29533 page t dfZ


8454A I F I 383 I 0B680E3409E2495BAA4B
Paper / Subject Code: ggl}Zf
Securii in Co4rpnfing

4. Attempt.onU three of the following: ,,:,,.


a 15
H5,: *:.*:S_: :*: 6d; fisr,Gdneratiof ibrief. d ,:
#.*:*,'m:"*lr* er,#iffiffi{#;i, *,
b "r ".*;:r
...
IH be securiiri
L",I#ffi l.BT#3""::11"il;,Tiiddjiii#Hhs,::fi
tists (DACLs)? Explain. ,:## accesS'
d :onlrgl
$lljlfi ffIl|1r""j-:,Y-ar wjf:l crassic s-ecurity rraou},. .: ,",,'

e s"",.itv1,fiE;1,..M;;1;;n-oi;11,i:il;iff
ffi:;;trffi
Monitor in detail.
-qi,qu

Explain main problems of Tepflp,s


--;a"'
!';",oilerereqee
lack of security.
..1:., .'--1:

J.
a.
Explain,'Why it 15
ls, necessary..to
b.
c.
d.
e.

!.1

r.\
1n

\::r
1^!'

.,"}.
",i

:1r

i. ..,

29s33 page 2 of2


E454A IFI 383 I 0B680E3409E2495BAA4B

Ir.
ir
t\Psc{f %qf
Paper / Subject Code: 88703 / Business Intellit[ence sE:;' lqld"?a
'i

f ''' l,:'i' ;t'-,


(z%He-urs) ,qr.,,r {:,i;, .:i.,.t
,*.i'.

'tt' ttTPJ"l Mark'si 751


N. B.: (l) All questions are compulsory. i 1" .''':'"t' .
(2) Make suitable assumptions wherever necessary and Sirite the aq ptions.$ade.
(3) Answers to the same questio$iirnust be Written toegther. . ','
(4) Numbers to the right indicate marks. , '-.'
(5) Draw neat labeled diagrag-iS wherever nocessary.
(6) Use of Non-grgslam$pDie calculatbrs is allqwed.
;"h
1. Attempt anvthreeof tnelfiirowing: "

a. What is the difference between data, information and knowledge?


b. Draw and explain architecture ofbusiness intelligence.
c. Describe different phases in the development of a decision support system (DSS).
d. Describe the extended architecture of decision support systems.
e. Explainstructurdd,unstru9triiedandseini-structu.rbddbcisions...l..
f. wha:arethe.factorsthat.affectrationa1choiceofthedecision-making1

2. Attempt inv three,otihe foiloiving: ,-1, , ::.1' ,.,.r" .:)''' 15 .;


a. WhatisaEoa.t{pescribethephasesinadevelopmentofthpmathematicalmodelfor

b. Explain predictive and optimization models.


c. Describe catElorical and numerical attribute's'with exar-iipie for q,ach one of-ittiem.
d. ' Describe.aiffient tryiniformation techniques for standariization (normalizaiion).
e. 'Writ. short note on principal component analysis (PCA).
f. . List and explain uuriou, applications of data mirring.

3. Attempt anv:three of the following: 15


a. Write short note on confusion matrix.
b. What is classification? Write a short note on Bayesian Method of classification.
c. Writq.ashortno!9'.'onlogistic.regression.usedforp1e,diction.
. Write k-means algorithm for clustering.
',
e. Draw and explain a structure of classification tree with a suitable example.
f. ,,Explain ag$iomeratiye hierarchical clusteling method. ' :

4, Attempt anv three of the following: 15


a Explain a lifetime of a cusq'omer in a Cjrcle of relational marketing.
b What do you understand !y markeqbasket analysis?
c What is sgppiy chain manag"*"nii Give an eilmple of global supply chain.
d List and exirlain basiC principles'of revenud management?
e I Explain'data envqlipment an-dlysis (DEA)? How efficiency is measured?
f' Wriushort note oh CCR (Charnes-Cooper-Rhodei) model.

5. Attempt a4i'three of the follorving: 15


a. 'What ilq,,thb differences between the process approach and the practice approach in a
knowledge manageFnent system (KM)?-
h. How does Inforn-itition Tectinblogy(IT) contribute to the management of knowledge?
c: Desgribe ditrerent phasesin the Knoviledge Management systems (KMS) cycle
d. Who is chiefknowledge.officer (QI(O)? What are the responsibilities of the CKO?
e. Differentiate beMeqn ionventionhl system and expert systems
f. what is gv+ert systern? How it is different from Decision Support System (DSSX

29518
h ..r' Page 1 of 1

2 I CE34FF8FB6 I B93CCBDFA6AD95E9D I 9
Paper / Subject Code: 88707 /,Cyber Laws

N.

1. 15
a.
b.
c.
d.
e.
f.

2. 15
a.
b.
c.
d.
e.
f.

15
t. A.
b.
C.l,

..r{.
e.
f.

4.
15
a:
b.
c.

d.
e.
f.

15
a.
b.
c.
d.
e.
f.

29528 Page I ofl


7EBFA357FDC656 I 3COBA3 832FC977DFF

You might also like