Mca (Management) 2020 Pattern
Mca (Management) 2020 Pattern
:
PA-2551 [Total No. of Pages : 4
[5948]-101
M.C.A. (Management)
JAVA PROGRAMMING
IT - 11 : Faculty of Commerce and Management
(2020 Pattern) (Semester - I)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Figure to the right indicate full marks.
Q1) Each multiple choice question carries half marks. All questions are Compulsory.
[10]
a) Platform independent code file created from source file is understandable
by
i) JRE ii) JVM
iii) Applet iv) Compiler
b) Which of the tool is used to compile Java Code.
i) Jar ii) Javac
iii) Javadoc iv) Java
c) Byte variables are declared by used of the ______ keyword, (Using
Prinitive Data type)
i) Bytes ii) byte
iii) Byte iv) bytes
d) An _______ statement can be used to access the classes and interface
of a different package from the current package.
i) instance of ii) import
iii) extends iv) implements
e) Which of this access specifiers can be used for a class so that its members
can be accessed by a different class in the same package?
i) Public ii) Protected
iii) No modifier iv) All of the mentioned
f) Which of the following is false statement about package in Java?
i) Packages are used for preventing naning conflicts
ii) Providing controlled access protected and default have package
level access control
iii) Packages cannot be considered as data encapsulation
iv) Both (ii) and (iii)
[5948]-101 1 P.T.O.
g) Which of these keywords must be used to monitor for exceptions?
i) finally ii) throw
iii) catch iv) try
h) When do Exception in Java arise in code sequence
i) Run Time ii) Can Occur Any Time
iii) Compilation Time iv) None of the mentioned
i) When an exception in a try block is generaled, the Java treats the multiple
_______ statements like cases in switch statement
i) throw ii) catch
iii) finally iv) try
j) The _________ statemat can be used to handle an exception that is not
caught by any of the previous catch statements.
i) throw ii) catch
iii) finally iv) try
k) Exception classes are available in the _________ package
i) Java. lang ii) Java. awt
iii) Jave. io iv) Java. applet
l) When a ________ block is detined, this is guaraute to execute, regardless
of whether or not an exception is thrown
i) thrown ii) catch
iii) finally iv) try
m) We can calculate the length of an array using ________
i) size of (array) ii) array. len
iii) array. lenyth iv) array. size of ()
n) Which of the following is used to declare construct and initialize an array?
i) int arr[ ][ ] = {1, 2, 3, 4} ii) int [ ] arr = (1, 2, 3)
iii) int [ ] arr = { } iv) int arr [ ] = {1, 2, 3}
o) Consider the following code.
String S = new string ( ) will create an instance of string with
i) at least one character ii) a default character
iii) no characters in it iv) no.of characters in it
[5948]-101 2
p) _______ method simply return a string that appropriately describes an
object of your class
i) get chars ( ) ii) tostring ( )
iii) to Char Array ( ) iv) get string ( )
q) What is the listener used to handle the events or a text field?
i) java. awt. Actionlistener interface
ii) java. awt. event. Action Listener
iii) awt. event. Action Listener interface
iv) java. awt. event. Action Listener Interface
r) Getlabel ( ) method used to retrieve the label of a button
i) Yes ii) No
iii) Can be yes or no iv) Can not say
s) The Java. Sal and javax. sal are the primary packages for JDBC 4.0
i) Yes ii) No
iii) Can be yes or no iv) Can not say
t) ________ are small programs that are downloaded into a Java Enabled
Web Browser.
i) Applets ii) Servlets
iii) HTML iv) Java Script
[5948]-101 3
Q3) a) Write a JDBC application to insert, update and delete record from
company share holder’s Table. Given the structure: SHAREHOLDER :
Holderid, H name, Address, No.of shares, sharesr From (Share serial
from Number), ShareSrTo (Share Serial upto Number), Facevalue, cost.[8]
b) What is Request Dispatcher? [4]
OR
a) Write servlet to accept student information from HTML page, and store
the details in a database. [Note: Take suitable fields. [8]
b) Explain servlet life - cycle. [4]
Q4) a) What is the difference between the Enumeration and Iterator interface?[5]
b) Differentiate between method and constructor. [3]
OR
a) What is difference between Iterator and List Iterator? [5]
b) Explain ‘this’ keyword [3]
[5948]-101 4
Total No. of Questions : 5] SEAT No. :
PA-2552 [Total No. of Pages : 4
[5948]-102
M.C.A. (Management)
IT - 12 : DATA STRUCTURE AND ALGORITHMS
(2020 Pattern) (Semester - I)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) From Q2 to Q5 having internal choices.
3) Figure to be right indicate full marks.
[5948]-102 1 P.T.O.
g) The Breadth first search traversal of a graph will result into?
i) Linked List ii) Tree
iii) Graph with back edges iv) None
h) Time complexity of DFS is (V-number of vertex, E-number of edges)
i) O (V+E) ii) O(V)
iii) O (E) iv) None
i) Heap can be used as ________
i) Priority queue ii) stack
iii) A decreasing order array iv) Normal array
j) What is the Best case for linearsearch
i) O(nlog n) ii) O(logn)
iii) O(n) iv) O(1)
k) In linear search with array, how many comparsions are needed in best
case?
i) 0 ii) 1
iii) n iv) n/2
l) Backtracking algorithm is implemented by constructing a tree of choice
called as ________
i) state - space tree ii) Back tracking tree
iii) state - chart tree iv) Node tree
m) What is meant by the power set of a set?
i) subset of all sets ii) set of all subsets
iii) set of particular subset iv) emptyset
n) What is the other name of Dijkstra Algorithm?
i) Single source shortest path
ii) multiple source shortest path
iii) multiple destination
iv) single destination shortest path problem
o) Which of the following standard algorithms is not a Greedy algorithm.
i) Dijkstra algorithm ii) Prim’s
iii) Kruskal iv) Bellment Ford stortest path
[5948]-102 2
p) What is the worst case complexity of quick sort?
i) O(n logn) ii) O(logn)
iii) O(n) iv) O(n2)
q) Which of the following method is used for sorting in merge sort.
i) merging ii) partitioning
iii) selection iv) exchanging
r) In dynamic programming the output to stage n become the input to
i) stage n – 1 ii) stage n itself
iii) stage n + 1 iv) stage n – 2
s) Choose the recursive formula for Fibonacci series (n > = 1)
i) F(n) = F(n + 1) + F(n + 2) ii) F(n) = F(n) + F(n – 1)
iii) F(n) = F(n – 1) + F(n – 2) iv) F(n) = F(n – 1) – F(n – 2)
t) The algorithm like auick sort does not require extra memory for carrying
out
i) in-place ii) stable
iii) unstable iv) in-partition
[5948]-102 3
Q3) a) Apply Rain Terrace algorithm to following problem
Input : [4, 2, 0, 3, 2, 5] Draw the figure and find solution. [4]
b) Write on algorithm for knight’s Tour. [3]
c) Discuss use of Priority queve. [3]
OR
a) Apply the maximum subarray algorithm to the
Input : arr = [–2, –5, 6, –2, –3, 1, 5, –6] and find sum of maximum
subarray. [4]
b) Give the explicit and implicit constraints in 8 queen’s problem. [3]
c) Discuss Hamiltonian Cycle. [3]
Q4) a) Sort the following data using Mergesort [38, 27, 43, 3, 9, 82, 10]. [4]
b) Consider the following array [1, 3, 5, 8, 9, 2, 6, 7, 6] what is minimum
number of jump required to reach the end of the array? [4]
c) Explain need of circular queve. [2]
OR
a) Write an algorithm of Kruskal’s algorithm. [4]
b) Explain Rules for Tower of Hanoi with an suitable example. [4]
c) What is the purpose of Linked List. [2]
[5948]-102 4
Total No. of Questions : 5] SEAT No. :
PA-2553 [Total No. of Pages : 6
[5948]-103
M.C.A. - I (Management)
IT - 13 : OBJECT ORIENTED SOFTWARE ENGINEERING
(2020 Pattern) (Semester - I)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) For MCQ select appropriate choice from the given options.
3) Figures to right indicates full marks.
4) Draw neat diagrams and quote examples the wherever necessary.
5) Use of any type of calculator is not allowed.
Q1) Attempt the following Multiple Choice Questions. Each question carries half
mark. [10]
a) If you were a lead developer of a software company and you are asked to
submit a project within a stipulated time frame with no cost barriers,
which model your select.
i) Waterfall ii) Spiral
iii) RAD iv) Incremental
b) From the following, which software has been characterized by ‘Number
Crunching’ Algorithms?
i) System Software
ii) Artificial Intelligence software
iii) Embedded Software
iv) Engineering and Scientific Software
c) Project risk factor is considered in which model?
i) Water fall ii) Spiral
iii) RAD iv) RUP
d) Which phase of the RUP is used to establish a business case for the
system?
i) Transition ii) Construction
iii) Elaboration iv) Inception
[5948]-103 1 P.T.O.
e) The _______ model is preferred for development when the requirements
are not clear
i) RAD ii) RUP
iii) Evolutionary iv) Water fall
f) Software Engineering primarily aim’s on building
i) reliable software
ii) cost-effective software
iii) reliable and cost-effective software
iv) Sustainable software
g) The _______ approach involves building a small version of the intended
system proor to building the proposed completed system
i) Water fall ii) Spiral
iii) RAD iv) Prototyping
h) What does the RAD process stand for?
i) Rapid Application Development
ii) Recent Application Design
iii) Recent Application Development
iv) Rapid Application Design
i) What is the major advantage of using Incremental model?
i) Customer can respond to each increment
ii) Easier to test and debug
iii) Get a product to the market early
iv) Easier to test and debug and get a product to the market early
j) Choose an internal software quality
i) scalability ii) usability
iii) resuabilitiy iv) rehability
k) The SRS is said to be _________ if and only if no subset of individual
requirements described in it conflict with each other
i) correct ii) consistent
iii) unambignous iv) veritiable
[5948]-103 2
l) Consider a system where, “a heat sensor detects an intrusion and alerts
the security company”. What kind of a requirement the system is
providing?
i) Functional
ii) Non-functional
iii) User Interface
iv) Internal Software Quality
m) ________ is the understanding of software product limitations, learning
system related problems or changes to be done in the existing system
before hand, identifying and addressing impact of project on organisation
and personnel
i) Software Design ii) Software Analysis
iii) Feasibility study iv) Requirement Gathering
n) When a company plans to develop a generic product, who among the
following is usually the source of the requirement?
i) Development Team Members
ii) Project Manager
iii) Marketing Personnel
iv) Personnel from Finance Management
o) In user Interface Design, tools are used to,
i) make a prototype and implement the design model
ii) get qualitative results
iii) get quantitative results
iv) make a prototype and implement the design model and get qualitative
results
p) What does Designing consistent interfaces means?
i) using the same design patterns
ii) using the same sequence of actions
iii) using the same design patterns and sequence of actions
iv) using excisting designs of similar applications
[5948]-103 3
q) Who is responsible for ensuring that the scrum values and pillars are
adhered to all times?
i) Product Owner ii) Scrum Master
iii) Development Team iv) Each Member
r) DSDM originally sought to provide some discipline to the ______ method
i) Scrum ii) Spiral
iii) RAD iv) RUP
s) Which method is used for prioritizing product features in DSDM
methodology?
i) MoSCoW ii) PaRiS
iii) LoNDoN iv) BeRLiN
t) During which scrum ceremony does the team inspects it’s processes to
adapt during subsequent sprints?
i) Sprint Retrospective ii) Daily standup
iii) Story Grooming iv) Sprint closure
Q2) Write a Software Requirement Specification as per SRS IEEE temptate for the
scenario. [8]
OR
[5948]-103 4
Q3) Institute of Management studies (IMS) has organised an International conference
with various subject tracks. The conference details are uploaded on the web
site developed by the institute. A participant has to register online under category
student, Faculty member, Research scholar and corporate. He/She has to
upload an abstract of his/her paper. If It gets selected he/she has to upload
final paper along with the registration fee. The registration fee varies according
to the category of the participants. The payment should be done online. The
paper presentation schedule will be displayed on the website under the defined
tracks. After the conference, the presented papers get published in online
journal and particapants can give his/her feedback on line.
OR
i) When the Robot is SWITCHED ON, it should greet as per the time
(Morning, Afternoon etc)
ii) It should behave as per your order - “Walk Straight” ‘Run”, and
“Stop”.
[5948]-103 5
Q4) a) Elaborate on the artefacts in Scrum. [4]
b) Enumerate the attributes of web-based systems and Applications. [4]
OR
a) Explain the four values of Agile Manifesto with its meaning. [4]
b) Elaborate on any four Extreme Programming Practices. [4]
Q5) Draw the User Interface Screen to lodge a grievence against noise pollution in
your neighbourhood on the government noise pollution grievance redressal
and monitoring system. [4]
OR
Draw the user Interface Screen to generate vistors Gate pass. [4]
[5948]-103 6
Total No. of Questions : 5] SEAT No. :
PA-2554 [Total No. of Pages : 4
[5948]-104
M.C.A. - I (Management)
IT - 14 : OPERATING SYSTEM CONCEPTS
(2020 Pattern) (Semester - I)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Draw neat diagrams wherever necessary.
Q1) Attempt the following multiple choice questions. Select one best option from
the choices given. [20×½=10]
a) Multiprogramming of the computer system
i) Increase computing speed ii) Reduces memory utiolization
iii) Increase CPU utilization iv) None of the above
b) Which are of the following is a synchronization tool
i) Thread ii) Pipe
iii) Semaphore iv) Socket
c) Scheduling of threads are done by ________
i) Operating system ii) Input
iii) Output iv) None of the above
d) For real time operating systems, interupt latency should be _________
i) minimal ii) maximum
iii) zero iv) dependent on the schedule
e) Virtual memory in memory hierarchy consists of
i) RAM and Hard disk ii) Cache and Hard disk
iii) Cache and RAM iv) All of the above
f) When external fragmentation will not occur?
i) First fit is used
ii) No matter which algorithm is used it will always occur
iii) Worst fit is used
iv) Best fit is used
[5948]-104 1
P.T.O.
g) Which of the following is not an operating system?
i) Windows ii) Linux
iii) Ms office iv) DOS
h) Logical memory is broken into blocks of the same size called ______
i) Frames ii) Pages
iii) Stores iv) None of the above
i) Which of the following cannot be scheduled by the kernel?
i) Process ii) User Level thread
iii) Kernel level thread iv) None of the above
j) Youtube live streaming system is an example of the following:
i) Hard RTOS ii) SOFT RTOS
iii) Firm RTOS iv) None of the above
k) In hard real time systems there is gurantee that _____
i) All critical task are completed in time
ii) Some critical tasks are allowed some delay
iii) Some critical tasks are given tolerance
iv) None of the above
l) Which are of the following is a real time operating system?
i) RT Linux ii) Windows CE
iii) VX works iv) All of the above
m) What command is used to count the total number of lines, words, and
characters contained in a file?
i) Count W ii) W count
iii) WC iv) Count P
n) What a virtual memory miss is called?
i) l tit miss ii) Page hit
iii) Page fault iv) Page miss
o) The interrupt latency should be _______ for real time operating systems.
i) maximum ii) zero
iii) minimum iv) None of the above
[5948]-104 2
p) In Unix which system call creates the new process?
i) Create ii) Fork
iii) New iv) None of the mentioned
q) The address of the next instruction to be executed for the current process
in stored in _______
i) Program state ii) CPU registers
iii) Program counter iv) None of the above
r) What is common problem found in distributed system?
i) Process synchronization
ii) Communication Synchronization
iii) Deadlock problem
iv) Power failure
s) What is the output of the following code OS = Unix
ect
1) 40S
2) “$OS”
3) ‘$OS’
4) $OS
i) 1. Unix 2.Unix 3. Unix 4 Unix
ii) 1. Unix 2. Unix 3. $OS 4.Unix
iii) 1. Unix 2. Unix 3. Unix 4. $OS
iv) 1. Unix 2. $OS
t) Which command is used to print a file
i) Print ii) Ptr
iii) 1pr iv) None of the above
[5948]-104 3
Q3) a) What is PC 3? [4]
OR
Q5) a) Write a steel script for adding two numbers and storing the result in a
variable. [6]
b) Explain loops in Linux steel scripting. [4]
OR
[5948]-104 4
Total No. of Questions : 5] SEAT No. :
PA-2555 [Total No. of Pages : 4
[5948]-105
M.C.A. - I (Management)
IT - 15 : NETWORK TECHNOLOGIES
(2020 Pattern) (Semester - I)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) All questions carry equal marks.
3) Draw neat diagrams wherever necessary.
[5948]-105 1 P.T.O.
g) Which error detection method uses is complement arithmetic?
i) Simple parity check ii) Two dimensional parity check
iii) CRC iv) Checksum
h) Which error detection method consists of one redundent bit per data
unit?
i) Simple parity check ii) Two dimensional parity check
iii) CRC iv) Checksum
i) The IPV4 addresses are ______.
i) unique ii) universal
iii) unique and universal iv) common
j) IPV6 addresses are represented using.
i) decimal notation ii) binary notation
iii) dotted-decinal notation iv) hexadecimal notation
k) The address space of IPV6.
i) 8 bits ii) 32 bits
iii) 64 bits iv) 128 bits
l) _______ protocol allows the administrator to assign a cost called the
metric to each route.
i) RIP ii) OSPF
iii) BGP iv) None of the mentioned
m) In OSPF, each router that is connected to two or more areas is called
________.
i) back bone router ii) area border router
iii) internal router iv) as boundary router
n) DHCP provides _______ to the client.
i) IP address ii) MAC address
iii) URL iv) None of the mentioned
o) A DNS client is called ________.
i) DNS updater ii) DNS resolver
iii) DNS Handler iv) None of the mentioned
[5948]-105 2
p) SMTP uses which of the following TCP port?
i) 31 ii) 43
iii) 25 iv) 27
q) Which of the following is not a form of DOS Attack?
i) Vulnerability attack ii) Bandwidth flooding
iii) Connection flooding iv) Trojan Horse
r) Which methods are commonly used in serversocket class?
i) public outputstream getoutputstream
ii) public socket accept ( )
iii) public synchronized void done ( )
iv) public void connect ( )
s) The _______ class is used to creat Datagrampacket?
i) Data grampacket ii) Datagramsocket
iii) Both of these iv) None of the mentioned
t) ________ is responsible for establishing a connection.
i) Socket ii) Serversocket
iii) Clientsocket iv) None of the mentioned
Q2) a) Encode a binary word 11001 into the even parity hamming code
OR
b) Generate the hamming code for the data 111011011 with odd parity. [5]
[5948]-105 3
Q3) a) Determine the network address for the following IP-addresses [5]
i) 87.52.26.71
ii) 77.12.133.86
iii) 193.56.77.22
iv) 128.76.44.37
v) 100.77.44.13
b) Explain IP addressing with network masks and network addresses. [5]
OR
a) Draw and explain IPV4 packet format. [5]
b) Determine the network, subnetwork and host addresses if IP address is
27. 54. 19.33 and subnet mask is 255.255.224.0. [5]
Q5) a) What are security attacks? Explain passive attacks in detail. [4]
b) WAP for establishing termination of connection between clinet and server
using TCP. [6]
OR
a) Explain OSI model in detail. [4]
b) Write a program for implementing the sliding window protocol of window
size 5. [6]
[5948]-105 4
Total No. of Questions : 5] SEAT No. :
PA-2556 [Total No. of Pages : 6
[5948]-201
M.C.A. - I (Management )
IT - 21 : PYTHON PROGRAMMING
(2020 Pattern) (Semester - II)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Answer all sub questions at one place.
[5948]-201 2
m) When will the else part of the try-except-else be executed?
i) When an exception occurs
ii) Always
ii) always
o) Which of the following is not a valid attribute of the file object file-handler.
p) Which of the following command is used in mango shell to show all the
databases.
q) The function that returns its arguments with a modified shape and the
method that modifies the arry itself respectively in Numpy are
[5948]-201 3
s) Which of the following statement is false?
i) ndarray is also known as the axis array
ii) in numpy, dimensions are called axes
iii) numpy main object is the homogeneous multidimensional array
iv) ndarry dataitemsize is the buffer containing the actual elements of
the array
t) The method used in pandas to return top 5 rows
i) top ( ) ii) top - rows (5)
iii) row (5) iv) head ( )
Q2) a) Write a program that accept the string from user and display the same
string after removing vowels from it. [3]
b) Explain possitional and keyword arguments in function. Use suitable
example. [3]
c) Describe instance variable, static variable and local variables in python
object oriented programming with example. [4]
OR
a) Compare List and tuple with suitable example. [3]
b) Explain lambda with example. [3]
c) Create class called, library with data attributes like Acc-number publisher,
title and author, the methods of the class should include [4]
i) Read ( ) - Acc- number, title, author, publisher.
ii) Compute ( ) - to accept the number of day late, calculate and display
the fine charged at the rate of Rupees 5/- per day.
iii) Display the data
Q3) a) Develop a program to print the number of lines, words and characters
present in the given file? Accept the file name from user. Handle necessary
exceptions. [2]
b) Illustrate CRUD operations in MongoDB with example [3]
c) Compare SQL Database with No SQL Database. [2]
d) Write aprogram to check whether entered string & number is palindrome
or not. [3]
OR
[5948]-201 4
a) Develop a pythan program to remove the comment character from all the
lines in the given file. Accept the file name from user [2]
b) Write a pythan program to perform following operations. on MongoDB
Database. [5]
i) Create collection “EMP” with fields:
Emp-name, Emp- mobile, Emp, sal, Age
ii) Insert 5 documents.
iii) Find the employees getting salary between 5000 to 10000.
iv) Update mobile number for the employee named as “Riddhi”
v) Display all employees in the order of “Age”
c) Write a pythan program to find the factorial of a given number using
recursion [3]
[5948]-201 5
a) Write a program for synchronization of threads using RLOCK. Accept
the two numbers from user and calculate factorial of both numbers
simultaneonly [4]
b) Write a pythan program [4]
i) To remove all leading ‘zeros’ from an IP address
ii) To find all 5 character long words in a string Accept string from
user.
c) Explain decorators in pythan with suitable example [2]
Q5) a) Explain numpy integer indexing, array indexing. boolean array indexing
and slicing with example. [4]
b) Draw bar graph using matplotlib and decorate it by adding various elements
[2]
c) Prepare the pandas dataframe from csv file. [2]
perform following operations.
i) Fill all ‘NaN’ values with the mean of respective column.
ii) Display last 5 rows.
d) Explain constructors in pythan with example. [2]
OR
a) Write a program to illustrate numpy array attributes/functions. [4]
i) ndarray. shape
ii) np. zeros ( )
iii) np. eye ( )
iv) np. random. random ( ) [4]
b) Read data from csv five and create dataframe. Perform following
operations.
i) Display list of all columns.
ii) Display data with last three rows and first three columns [2]
c) Draw line graph using matplot lib and decorate it by adding various
elements. Use suitable data.
d) Explain multiple inheritance in python with suitable example. [2]
[5948]-201 6
Total No. of Questions : 5] SEAT No. :
PA-2557 [Total No. of Pages : 4
[5948]-202
M.C.A. -I (Management)
IT - 22 : SOFTWARE PROJECT MANAGEMENT
(2020 Pattern) (Semester - II)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Draw neat labeled diagrams wherever necessary.
[5948]-202 1 P.T.O.
i) According to Agile manifesto_______
i) Individuals & interactions over people & technique
ii) Individuals & interactions over project & tools
iii) Individuals & interactions over processes & tools
iv) Individuals & interactions over products & tools
j) The product backlog is ordered by_______
i) Small items at the top to large items at the bottom
ii) Safer items at the top to riskiea items at the bottom
iii) Least Valuable items at the top to most valuable at the bottom
iv) Whatever is deemed most appropriate by the product owner
k) You can define agile team as “scrum team” & “technical team”______
i) True ii) False
iii) Can not determine iv) None of these
l) In scrum, when is sprint over?
i) When all the sprint backlog items are completed
ii) When the product owner suggests
iii) When the time box expires
iv) When the final testing is completed
m) Which of the following is considered in a story point estimate?
i) Only time to develop & test ii) Only effort to develop & test
iii) Only time to develop iv) Time & effort to develop
n) _____enables team to learn from the mistakes done in the previous
iteration.
i) Pair grooming
ii) Estimation during release planning
iii) Estimation during iteration planning
iv) Retrospective
o) What is an burn down graph?
i) A sprint plan which is burn to celebrate successful completion of
sprint
ii) Produce review meeting
iii) A graph to measure human Burnout effort due to fast pace of sprint
iv) The trend of work remaining across time in a sprint, a release or a
product.
p) In order to______the scope, project managers should compare
performance reports with the project requirements.
i) Fix ii) Control
iii) Manage iv) Settle
[5948]-202 2
q) The reason for holding regular Retrospective is________
i) It allows the team to take necessary break from work
ii) It gives management information to use in team member’s
performance reviews
iii) It allows learning which can be used to improve team performance
during project
iv) It prevents deviation from the process which the team has been
following
r) Git is a______
i) Localized version control system
ii) Distributed version control system
iii) Centralized version control system
iv) None of the above
s) What is the main purpose of imposing limits on work in progress?
i) To optimize through put ii) To minimize resource allocation
iii) To visualize lead time iv) To balance workflow
t) Tracking project issues in an Agile project is the primary responsibility of
the_______
i) Tester ii) Project leader
iii) Functional Manager iv) Developer
[5948]-202 3
Q3) a) Consider a project with the following functional units. [6]
i) Number of user inputs = 15
ii) Number of user outputs = 12
iii) Number of user equiries = 07
iv) Number of user files = 20
v) Number of external interfaces = 05
In addition to the above, system requires significant.
- Data communication (5)
- Performance is very critical (4)
- Designed code may be moderately reusable (2)
Other complexity factors are treated as Average.
Compute the functional point for the project.
b) What are the various agile principles? [4]
OR
Differentiate agile project management Vs traditional project management.
[4]
Q4) a) Explain the roles of Scrum Master, produce owner, and development
team in agile. [6]
OR
What are the various techniques to estimate story points in agile? [6]
b) Write short note (any one) [4]
i) Agile tools
ii) Git hub
Q5) a) Explain the process to plan & execute iteration in agile. [6]
OR
How to facilitate retrospective process in agile management with suitable
example. [6]
[5948]-202 4
Total No. of Questions : 5] SEAT No. :
PA-2558 [Total No. of Pages : 4
[5948]-203
M.C.A. - I (Management)
IT - 23 : ADVANCED INTERNET TECHNOLOGIES
(2020 Pattern) (Semester - II)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Draw neat and labeled diagram wherever necessary.
[5948]-203 1 P.T.O.
sh) Which command will show all the modules installed globally?
i) $ npm ls- g ii) $ npm ls
iii) $ node ls- g iv) $ node ls
i) REPL is for
i) Research Eval Program Learn ii) Read Eval Print Loop
iii) Read Earn Point Learn iv) Read Eval Point Loop
j) What is the use of angular controllers in the application?
i) angular controller are used for controlling the data
ii) angular controller are used for displaying the data
iii) Both of the above are correct
iv) None of the above
k) Which of the following is an advantages of Angulars JS?
i) AngularJS code is unit testable
ii) AngularJS provides reusable components.
iii) AngularJS uses dependency injection and makes use of seperation
of concerns.
iv) All of the mentioned
l) AngularJS is a________framework.
i) HTML ii) Java
iii) Javascript iv) SQL
m) On which of the architectural pattern AngularJS is based?
i) Observer pattern ii) Decorater patteren
iii) MVC architecture pattern iv) MVVM architectural pattern
n) Select the directive which hide or shows the HTML element.
i) ng- list ii) ng- hidi
iii) ng- copy iv) ng- open
o) In PHP array index starts with position_______
i) 1 ii) 0
iii) 2 iv) –1
p) _______is not a variable scope in PHP.
i) Extern ii) Local
iii) Static iv) Global
q) What is tue use of isset ( ) function in PHP?
i) It is used to check whether variable is set are not
ii) It is used to check whether variable is free or not
iii) It is used to check whether variable is string or not
iv) None of the mentioned
[5948]-203 2
r) Which of the following is the correct syntax to add comment in php?
i) &------& ii) // ---------
iii) / * ------ */ iv) both b & c
s) Which of the following is the correct way of defining a variable in PHP?
i) $ Variable name = value;
ii) $ Variable _ name = value;
iii) $ Variable = name = value;
iv) $ Variable name as value;
t) Which of the following is tue use fo strlen( ) function in PHP?
i) It returns the type of string
ii) It returns the lengtu of string
iii) It returns the value of string
iv) It returns both value & type of string
Q3) a) What is NPM? How packages installed locally and globally? [5]
b) Write a program using NPM which will convert entered string into lower
case & upper case. [5]
[5948]-203 3
Q4) a) Explain <audio> and <canvas> tags in HTML5 with suitable examples.
[4]
Q5) a) What are selectors in CSS? Explain with suitable example. [4]
b) Write a PHP script & insert at least 5 records into it & update specific
record in database. Assume student table with required fields in database.
[6]
[5948]-203 4
Total No. of Questions : 5] SEAT No. :
PA-2559 [Total No. of Pages : 4
[5948]-204
M.C.A. - I (Management)
IT - 24 : ADVANCED DBMS
(2020 Pattern) (Semester - II)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q1) Write correct option or fill in the blanks of following questions (each ½ marks)
[10]
a) Part of entire database is shown by______level of abstraction.
i) Physical ii) Conceptual
iii) View iv) Logical
b) Schema Definition is written by_____
i) Database Administration ii) Application Developer
iii) Storage manager iv) Database manage
c) What is the aim of NOSQL_____
i) Not suitable for storing structured data
ii) Allow storing non-structured data
iii) New data format to store large datasets
iv) An alternative to SQL database to store textool data
d) Normalization is a process of restructuring a relation to________
i) Minimize duplication of data in a database
ii) Maximize duplication of data in a database
iii) Make it of uniform size
iv) allowaddition of data
e) Arelation is said to be 3-Nf if which of the following is/are ture______
i) No partial key dependencies
ii) All attributes are atomic
iii) No presence of transitive dependencies
iv) All of the mention
f) What are the ACID properties of a transaction______
i) Atomicity, consistency, Isolation, Database
ii) Atomicity, consistency, Isolation, Durability
iii) Atomicity, consistency, Inconsistence, Durability
iv) Atomatically, concurrency, Isolation, Durability
[5948]-204 1 P.T.O.
g) Which of the following are the simplest NOSQL database______
i) Key-Value ii) Wide Column
iii) Document iv) All of the mention
h) The initial State of a transaction is known as______
i) Active ii) Failed
iii) Aborted iv) Partial committed
[5948]-204 3
Q4) a) What do you mean by log-based recovery. Explain with example. [5]
Q5) a) What is Distributed database system? Explain the data Replication &
Data fragementation. [10]
OR
[5948]-204 4
Total No. of Questions : 5] SEAT No. :
PA-2560 [Total No. of Pages : 8
[5948]-205
M.C.A. (Management )
MT - 21 : OPTIMIZATION TECHNIQUES
(2020 Pattern) (Semester - II)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Use of statistical table and non-programmable calculator is allowed.
3) Figures to the right indicate full marks.
Q1) Attempt the following multiple choice questions (0.5 marks each) [10]
a) _______are expressed in the form of in equities or equations.
i) Constraints
ii) Objective function
iii) Both (i) and (ii)
iv) None of the above
b) Time required by each job and each machine is known as_______time
i) Elapsed ii) Idle
iii) Processing iv) Average
c) Another term commonly used for activity slack time is
i) total float ii) free float
iii) independent float iv) all of the above
d) Which of the following criterion is not used for decision-making under
uncertainty?
i) Maximin ii) Maximax
iii) Minimax iv) Minimize expected losses
e) A two-person-zero-sum-game means that
i) the sum of losses to one player is equal to the sum of gains to other.
ii) the sum of lossses to one player is not equal to the sum of gains to
other.
iii) no any player gains or losses
iv) none of the above
f) In markov analysis the likelihood that any system will change from one
peroid to the next is revealed by the
i) identity matrix
ii) transition elasticities
iii) matrix of state probabilities
iv) matrix of transition probabilities
[5948]-205 1 P.T.O.
g) The variable whose coefficient vectors are unit vectors are called as_____
i) Unit variables ii) Basic variables
iii) Non-basic variables iv) None of the above
h) Time between starting of the first job and completion of last job in
sequencing problem is known as_________
i) total time ii) elapsed time
iii) assigned time iv) idle time
i) If an activity has zero slack, it implies that
i) it lies on the critical path ii) it is a dummy activity
iii) the project is progressing well iv) none of the above
j) Decision theory is concerned with
i) Methods of arriving at an optimal decision
ii) Selecting optimal decision in a sequential manner
iii) Analysis of information that is available
iv) All of the above
k) The size of the pay- off matrix of a game can be reduced by using the
principle of
i) game inversion ii) rotation reduction
iii) diominance iv) game transpose
l) In assigning random numbers in a Monte Carlo simulation it is important
to
i) Develop cummulative probability distribution
ii) Use random numbers from a random number table
iii) Use only a single set of random numbers
iv) Use excel spreadsheets
m) The first step in formulating the LP problem is
i) Graph the problem
ii) Understand the managerial problem being faced
iii) Identify the objective and the constraints
iv) Define the decision variables
n) If the problem is a 3- machine problem, we have to convert it
into_____machine problem.
i) 1 ii) 2
iii) m iv) none of the above
o) The activity that can be delayed without affecting the execution of
immediate succeeding activity is determined by
i) total float ii) free float
iii) independent float iv) none of the above
[5948]-205 2
p) The______can be referred to as a graphical model of a decision process.
i) Expected Opportunity Loss(EOL)
ii) Decision Tree
iii) Expected Value of Perfect Information (EVPI)
iv) Expected Monetary Value (EMV)
q) The pay- off value for which each player in a game always selects the
same strategy is called the
i) saddle Point ii) equilibrium point
iii) both (i) and (ii) iv) none of these
r) Cummulative probabilities are found by
i) Summing all the probabilities associated with a variable
ii) Simulating the initial probability distribution
iii) Summing all the previous probabilities upto the current value of the
variable
iv) Any method one chooses
s) The maximization or minimization of a quantity is the
i) goal of the management science
ii) decision for decision analysis
iii) Constraint of an LPP
iv) Objective of linear programming
t) A dummy activity is used in the network diagram when
i) two parallel activities have the same tail and head events
ii) the chain of activities may have a common event yet be independent
by themselves
iii) both (i) and (ii)
iv) none of the above
[5948]-205 3
b) Solve the game for the given pay-off matrix [4]
Player B
B1 B2 B3
A1 30 40 −80
Player A A 2 0 50 −20
A 3 90 20 50
OR
a) Solve the following LPP [6]
Maximize Z = 3x1 + 2x2
Subject to
x1 + x2 ≤ 4
x1 – x2 ≤ 2
x1, x2 ≥ 0
b) Solve the game for given pay- off matrix [4]
Player B
B1 B2 B3 B4
A1 3 5 4 2
A 5 6 2 4
Player A 2
A3 2 1 4 0
A4 3 3 5 2
Q3) a) The following table shows the jobs of a network along with their time
estimates [6]
Activity Immediate Time (days)
Predecessor Optimistic Most Likely Pessimistic
A – 4 6 8
B A 5 7 15
C A 4 8 12
D B 15 20 25
E B 10 18 26
F C 8 9 16
G E 4 8 12
H D, F 1 2 3
I G, H 6 7 8
[5948]-205 4
i) Draw the network diagram.
ii) Find the expected duration and variance for each activity. What is
the expected project length and variance of the project.
iii) Find the probability that the project is completed in 44 days.
b) A retailer purchases cherries every morning at Rs. 50/- a case and sells
them for Rs. 80/- a case. Any case remaining unsold at the end of the day
can be disposed off next day at a salvage value of Rs. 20/- per case. Past
sales have ranged from 15 to 18 cases per day.
The following is the record of the sales for the past 120 days.
Cases sold 15 16 17 18
No. of days 12 24 48 36
Find how many cases the retailer should purchase per day to maximize
the profit. [6]
OR
a) For the data given in the table below, draw the network. Crash the activities
systematically to determine the optimal project duration and cost. [6]
Activity Time (weeks) Cost is Rs. (000)
Normal Crash Normal Crash
1-2 2 1 10 15
1-3 8 5 15 21
2-4 4 3 20 24
3-4 1 1 7 7
3-5 2 1 8 15
4-6 5 3 10 16
5-6 6 2 12 36
i) Draw the network diagram.
ii) Determine the critical path and the normal duration and associated
cost.
iii) Crash the activities so that the project completion time reduces to 9
weeks with minimum additional cost.
b) Suresh find the probability of demand distribution of luxury car ‘s’ as
follows: [6]
Probability of Demand 0.2 0.4 0.1 0.3
Demand for each car each day 1 2 3 4
[5948]-205 5
The selling price of the car is Rs. 10,00,000/- and it costs to Suresh
Rs.6,00,000/- Suresh has always followed a rule for initial purchase,
purchase 3 cars.
Find the expected daily profit under the decision rule of buying three cars
each morning. If the fees for perfect information is Rs. 1,00,000/- calculate
the expected monetary value of the venture with perfect information (EVPI)
Q4) a) We have 5 jobs each of which must go through the machines A, B and C
in the order ABC. The processing times are as follows: [6]
Job 1 2 3 4 5
Machine A 8 10 6 7 11
Machine B 5 6 2 3 4
Machine C 4 9 8 6 5
i) Find the optimal job sequence.
ii) Find idle time for machine A, B and C
To
Village Town City
Village 50 30 20
From Town 10 70 20
City 10 40 50
What will be the proportion of population in village, town and city after 2
years, given that the present population has proportion 0.7, 0.2 and 0.1 in
the village, town and city respectively?
OR
[5948]-205 6
a) A company has to process five items on 3 machines A, B and C.
Processing times are given in the following table. [6]
Item Ai Bi Ci
1 4 4 6
2 9 5 9
3 8 3 11
4 6 2 8
5 3 6 7
i) Find the sequence that minimizes the total clapsed time
ii) Find the idle times for all the machines.
b) A market research organization studied the car purchasing trends in a
certain region, with a conclusion that a new car is purchased on an average
once every 4 years. The buying pattern of the customers is as follows:Of
the current small car owners 80% will replace the car again with a small
car and 20% with a large car. Similarly 60% of the large car owners will
replace it with a small car, while 40% with another large car. Assuming
that the market and preferences remain the same, [4]
i) Construct the transition matrix.
ii) If there are currently 40,000 small cars and 20,000 large cars in the
region, what will be the distribution in 8 years from now
Q5) a) Over 100 days period, the daily demand of a certain commodity shows
the following frequency distribution pattern. [4]
Daily Demand 0 1 2 3 4 5
No. of days 10 20 40 20 6 4
Simulate the demand for 10 days using the random numbers
67, 84, 01, 77, 90, 14, 15, 74, 44, 77
Also find the average demand.
b) Explain the following terms [4]
i) Unbounded solution
ii) Pessimistic Time
OR
[5948]-205 7
a) A bakery keeps stock of a popular brand of cake. Previous experience
shows the daily demand pattern for the item with associated probabilities
as given below:
Daily Damand 0 10 20 30 40 50
Probability 0.01 0.20 0.15 0.50 0.12 0.02
Use the following random numbers to simulate the demand for next 10
days.
25, 39, 65, 76, 12, 05, 73, 89, 19, 49
Also estimate the daily average demand for the cakes on the basis of the
simulated data. [4]
[5948]-205 8
Total No. of Questions : 5] SEAT No. :
PA-2561 [Total No. of Pages : 4
[5948]-301
M.C.A.- II
IT - 31 : MOBILE APPLICATION DEVELOPMENT
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Draw neat labeled diagram wherever necessary.
[5948]-301 2
r) An android_______is an abstract description of an operation to be
performed. It can be used with Start Activity to launch Activity.
i) Filters ii) Intent
iii) Service iv) Broadcast Receiver
s) Which of the following is a dialog class in android
i) AlertDialog ii) DatePickerDialog
iii) ProgressDialog iv) All the above
t) The method that is called to cleanup any resources used by services
is_________
i) Stopself ( ) ii) Onstop ( )
iii) OnDestroy ( ) iv) Stopservice ( )
[5948]-301 3
Q5) a) Explain React Native Geolocation API [6]
OR
[5948]-301 4
Total No. of Questions : 5] SEAT No. :
PA-2562 [Total No. of Pages : 6
[5948]-302
M.C.A. (Management )
IT - 32 : DATA WAREHOUSING AND DATA MINING
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Draw neat & labelled diagrams wherever necessary.
[5948]-302 1 P.T.O.
h) K-means squared error function is related with which of the following?
i) Manhattan distance ii) Hamming distance
iii) Euclidean distance iv) Minkowski distance
i) _______collects all the information and the subjects about an entire
organization.
i) Data Mart ii) Virtual warehouse
iii) Data warehouse view iv) enterprise warehouse
j) A star schema has which types of relationship between dimentional and
fact tables?
i) Many to many ii) One to one
iii) One to many iv) All of the mentioned
k) _______maps the core warehouse metadata to business concepts, familiar
and is useful to end users.
i) Application level metadata ii) User level metadata
iii) End user level metadata iv) Core level metadata
l) Which of the following is not a component of a data warehouse?
i) Metadata ii) Current detailed data
iii) Lightly summarized data iv) Component key
m) Which is NOT a basic conceptual schema in Data warehouses?
i) Star schema ii) Tree schema
iii) Snowflake Schema iv) Fact constellation schema
n) The Extract process is________
i) Capturing all of the data contained in various operational system
ii) Capturing sub set of the data contained in various operational system
iii) Capturing all of the data contained in various decision support
systems
iv) Capturing of sub set of the data contained in various decision support
systems.
[5948]-302 2
o) An array in which data is stored are characterized by multiple dimension
is a________
Q2) a) Discuss the schemas is Data warehousing with the help of employee
database example. [5]
b) Give 5 difference between transactional data and ware house data based
on there characteristic. [5]
OR
a) Explain the architecture of a Data warehouse with a neat diagram. [5]
b) Name the different OLAP architectures. Pick any two (2) and describe in
detail with advantage. [5]
[5948]-302 3
Q3) a) What are Discretization and concept Hierarchy generation process? Give
an example for each. [5]
b) Explain the tools used for data warehouse development. [5]
OR
a) Explain the different data sources for data warehouse and methods of
data collection. [5]
b) Explain the different steps of creating on OLAP, with examples. [5]
Q4) a) Consider the data set given below, compute the support for item sets
{e}, {b, d} and {b, d, e} [5]
customer ID Transaction ID Items Brought
1 0001 {a, d, e}
1
1 0024 {a, b, c, e}
2 0012 {a, b, d, e}
2 0031 {a, c, d, e}
3 0015 {b, c, e}
3 0022 {b, d, e}
4 0029 {c, d}
4 0040 {a, b, c}
5 0033 {a, d, e}
5 0038 {a, b, e}
b) Using the result from problem a, above, compute the confidence for the
association rules {b, d}→{e} and {e} → {b, d} [5]
OR
[5948]-302 4
a) A consultancy wants to categories MCA students into classes as Excellent,
Good, and Average. The data collected from students are their average
percentage in MCA- I year and result of the apptitude test conducted by
the consultancy.
Solve the problem using decision tree Algorithm. [5]
Q5) a) Construct a FP-Tree Algorithm, to find frequency patterns for the given
data. [5]
Transaction ID Item Bought
100 {f, a, c, d, g, i, m, p}
200 {a, b, c, f, l, m, o}
300 {b, f, h, j, o}
400 {b, c, k, s, p}
500 {a, f, c, e, l, p, m, n}
b) Explain Hierarchical clustering using examples. [5]
OR
[5948]-302 5
a) Perform K. means clustering and show all the calculations at each iteration,
to form the final cluster. Assume the initial clusters are A, E and H. [5]
Points X1 X2
A 3 3
B 8 5
C 4 4
D 2 4
E 7 7
F 5 8
G 3 5
H 4 8
I 6 9
J 9 6
b) What are agent based and database based approaches in web mining?
Explain with example. [5]
[5948]-302 6
Total No. of Questions : 7] SEAT No. :
PA-2563 [Total No. of Pages : 1
[5948]-303
M.C.A.
IT - 33 : SOFTWARE TESTING AND QUALITY ASSURANCE
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) Q.1 and Q.7 are compulsory.
2) Solve any four questions from Q.2 to Q.6.
Q1) a) Write a detailed test plan for university result declaration system, which
provides the facility to view students result (Sem/year) wise, system should
have facility to apply for rechecking/re-evaluation with payment. Your
plan should include the desaired test document. [8]
b) Design suitable test cases for above application. [4]
Q3) An OTP number which contains only six digits, less or more than six digits
will not accepted and the application will redirect the user to the error page.
Using Equivalence partitioning write valid and invalid test cases. [8]
Q4) Explain different types of computer Aided software Testing Tools (CAST).
What are the benefits in using testing tools. [8]
[5948]-303 1
Total No. of Questions : 5] SEAT No. :
PA-2564 [Total No. of Pages : 4
[5948]-304
M.C.A. (Management Faculty)
IT - 34 : KNOWLEDGE REPRESENTATION & ARTIFICIAL
INTELLIGENCE : ML, DL
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) For MCQ select appropriate choice from options given.
3) From Q2 to Q5 having internal choice.
4) Figure to right indicate full marks
[5948]-304 2
p) ANN used for
i) Pattern Recognition ii) Classification
iii) Clustering iv) All
q) GAN stands for
i) Generative Advert Networks
ii) Generative Adversarial Networks
iii) General Advert Networks
iv) General Adversarial Networks
r) ReLU stand for
i) Rectified Linear Unit Function
ii) Rectified Linear Unit Formula
iii) Rectified Loss Unit Function
iv) Reverse Linear Unit Function
s) What are the devices that sense the physical environments
i) Control Unit ii) Sensors
iii) CPU iv) Firmware
t) Chat bot is based on which AI Technique
i) Big data ii) Variance
iii) Dispersion iv) Bias
b) Show that “If I look into the sky and I am alert then, I will see a dim star
or if I am not alert then I will not see a dim star” is valid. [6]
[5948]-304 3
Q3) a) Differentiate between supervised and un supervised learning. [4]
b) The values of independent variable x and dependent variable y are given
x 0 1 2 3 4
y 2 3 5 4 6
Find the least square regression line y = ax + b. estimate the value of y
when x is given 10. [6]
OR
a) State the mathematical formulation of SVM. [5]
b) How SVM can be used for classification of Linearly separable data? [5]
Q4) a) Explain the use of Long Short Term Memory (LSTM). [5]
b) Why do we use pooling layers in CNN. [5]
OR
a) Explain uses and application of Deep learning. [4]
b) Why we need Back propagation? Explain Back propagation algorithm.[6]
[5948]-304 4
Total No. of Questions : 5] SEAT No. :
PA-2565 [Total No. of Pages : 4
[5948]-305
M.C.A. (Management Faculty)
IT - 35 : CLOUD COMPUTING
(2020 Pattern) (Semester - III)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicates full marks.
[5948]-305 1 P.T.O.
f) The technology used to distribute service requests to resources is referred
to as ________
i) load performing ii) load scheduling
iii) load balancing iv) all of the mentioned
g) Which one of the following options can be considered as the cloud?
i) Hadoop ii) Intranet
iii) Web Applications iv) All of the mentioned
h) Which of the following describes a message-passing taxonomy for a
component-based architecture that provides services to client upon
demand?
i) SOA ii) EBS
iii) GEC iv) All of the mentioned
i) Which of the following is repeatable task within a business process?
i) Service ii) Bus
iii) Methods iv) Process
j) What is cloud computing replacing?
i) Corporate data centers
ii) Expensive personal computer hardware
iii) Expensive software upgrades
iv) All of the above
k) In this type of cloud, an organization rents cloud services from cloud
providers no-demand basis?
i) Private ii) Public
iii) Protected iv) Hybrid
l) Which of these is not a major type of cloud computing usage?
i) Hardware as a service ii) Platform as a service
iii) Software as a service iv) Infrastructure as a service
m) Cloud services have a _______ relationship with their customers.
i) Many-to-many ii) One-to-many
iii) One-to-One iv) One-to-All
n) Which of the following factors might offset the cost of offline access in
hybrid application?
i) Scalability ii) Costs
iii) Ubiquitous access iv) All of the mentioned
[5948]-305 2
o) What are Microsoft Hiper-V predecessor called?
i) System center virtual machine manager
ii) Window server 2008
iii) Virtual server 2005
iv) Hyper - V
p) APIs and Deployment are second level application attributes in accordance
with:
i) Application ii) Costs
iii) Maintenance iv) User interface
q) which of the following is a common means for losing encrypted data?
i) lose of keys ii) lose the encryption standard
iii) lose the account iv) None of these
r) Which of the following model allows vendor to provide security as part
of the Service Level Agreement?
i) SaaS ii) PaaS
iii) IaaS iv) None of these
s) Who provide GUI (Graphical User Interface) to interact with the cloud?
i) Client ii) Application
iii) Server iv) Client Infrastructure
t) Which of the following characterstics should you consider when deciding
whether to deploy on application or service to a virtual machine?
i) Hardware Requirement
ii) Software support and compatibility
iii) Licensing
iv) All of the above
Q2) What is cloud computing and write down the characteristics of cloud computing.
[10]
OR
[5948]-305 3
Q3) a) What is VM wate? Explain the benifits of virtualization [5]
b) Explain cloud Governance. [5]
OR
a) Explain SOAP Service. [5]
b) Explain vertual machine [5]
[5948]-305 4
Total No. of Questions : 5] SEAT No. :
PA-2566 [Total No. of Pages : 4
[5948]-401
S.Y. M.C.A.
COMPUTER MANAGEMENT
IT - 41 : DEVOPS
(2020 Pattern) (Semester - IV)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicates full marks.
[5948]-401 3
Q3) How do you configure a Git repository to run code sanity checking tools right
before making commits and preventing them if test fails? [10]
OR
Write and explain different phases of maven build life cycle. [10]
[5948]-401 4
Total No. of Questions : 5] SEAT No. :
PA-2567 [Total No. of Pages : 4
[5948]-402
M.C.A. - II
BM - 41 : PRINCIPAL AND PRACTICES OF MANAGEMENT
AND ORGANIZATIONAL BEHAVIOUR
(2020 Pattern) (Semester - IV)
Time : 2½ Hours] [Max. Marks : 50
Instructions to the candidates:
1) All questions are compulsory.
2) All question carries equal marks.
[5948]-402 3
Q4) a) What is Theory X and Theory Y? And how it is important. [5]
b) Explain different types of team in organization. [5]
OR
a) Elaborate five different styles of leadership with example. [5]
b) As a project manager, you have been asked to create team suitable for
your project. List and explain different stages of team development that
well help you to built good team. [5]
[5948]-402 4