0% found this document useful (0 votes)
54 views11 pages

5th Sem B.C.A.

Uploaded by

Yashasvi rana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views11 pages

5th Sem B.C.A.

Uploaded by

Yashasvi rana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

\

<r

Roll No.

• TBC-501
B. C. A. (Fifth Semester)
Mid Semester EXAMINATION, 2017
WEB TECHNOLOGY
Time: 1:30 Hours] [Maximum Marks: 50
'Note: (i) This question paper contains two Sections.
(ii) Both Sections are compulsory. ~

Section-A
1. Write TruelFalse: (lxS=S Marks)
(a) All HTML tags have end tag.
(b) IMAP stands for Internet Mail Access
Protocol.
(c) Ordered List is also known as bullet list.
(d) Apache is a Web Server.
(e) E-mail is a Protocol.
2. Attempt any five parts: (3xS=IS Marks)
(a) What do you understand by ISP ?
(b) What is Server?
(c) Write down the difference between inline
and internal CSS.
(d) What are the HTML features?

8-36 P.T.O.

JA
[2]

(e) Write down the services ofInternet.


(t) What is the role of alternate text in image
map?
Section-B
3. Attempt any two parts of choice from (a), (b)
and (c). (5x2=10 Marks)
(a) Explain load balancing technique.
(b) What are the advantages and disadvantages
ofCSS?
(c) Write a HTML code to show the use of row
span and colspan attribute in a table.
4. Attempt any two parts of choice from (a), (b)
and (c). - (5x2=10Marks)
(a) What do you mean by Pseudo Element? ..
Explain with example.
(b) Explain e-mail server architecture.
(c) What is form tag? Write an HTML code to
show the working of 6 input controls of form
tag.
5. Attempt any two parts of choice from (a), (b)
and (c). . (5x2=10 Marks)
(a) What are lists in HTML ? Explain them with
suitable example.
(b) What is CSS Selector? Write a code to show
the working of each selector.
(c) Write short notes on Web server and
Application server.
TBC-501 120

8-36


JI
Roll No.·

TBC-502
B. C. A. (Fifth Semester)
Mid Semester EXAMINATION, 2017
JA VA PROGRAMMING
Time: 1:30 Hours] . [Maximum Marks: 50
Note: (i) This question paper contains two Sections.
'"
(ii)' Both Sections are compulsory.
Section-A
1. Fill in the blanks: (l x5=5 Marks)
(a) Default value of double is .
(b) Final methods can be overloaded in .
.(c) String class can be extended in any class
is .
(d) Super class of Exception is .
(e) Jre stands for .

2. Attempt anyfive parts : (3 x 5= 15 Marks)


(a) Define multidimensional arrays with
examples.
(b) Define and explain use of final keyword in
java,

8-36 P.T.O.

~ ,.
[2] TBC-502
[3] TBC-502
(c) What is method overloading and overriding? "
5. Attempt any two parts of choice from (a), (b)
Explain properly.
and (c). . (5x2=lO Marks)
(d) What are the. different types of access
specifiers ? (a) Define and explain thread life-cycle. How to
(e) Differentiate String and StringBuffer. create thread class using runnable interface?

(f) Explain different uses of super keyword. (b) What are Exceptions in java ? Write a
Section-B program to handle an exception under
3. Attempt any two parts . of choice from (a), (b) checked category.
and (c). (5x2=10 Marks)
(c) What is the difference between throw and
(a) What are the use of command line throws? Write a program to show the use of
arguments ? Write a program to print all the finally keyword.
command line arguments in reverse order.
(b) What are the .features of java ?. Define and
.

explain inheritance .by ·the help of proper


example
(c) How we can create array of objects? Write a
program to override any of method of Object
class.
4. Attempt any two parts of choice from (a), (b)
and (c). (5x2=10 Marks)
(a) What is upcasting and downcasting in java ?
Explain by the help of proper example.
(b) What is the use of package ? Write all the
steps to create and use of a package class.
(c) What is the use of interface and abstract class
,. injava ? Explain property. me-S02 120
8-36
B-36

..
'-=-C---C='=:C::-C-:, _" _

Roll No.

TBe-503
B. C. A. (Fifth Semester)
Mid Semester EXAMINATION, 2017
,OPTIMIZATION TECHNIQUES

Time: 1: 30 Hours] [ Maximum Marks: 50 '


.•...
- Note: (i) This question paper contains two Sections.
,(ii) Both Sections are compulsory.
Section-A

1. Write TruelFalse : ' (1 x5=5 Marks)


(a) Operations Research has, -replaced
management by personality.
(b) Max. z == 3xI - 2x2 subject to Xl + x2 =s; 1,
Xl +X2 ~ 2 and xI,x2 ~o has no solution.

(c) If I1j = CBXj -Cj and alll1/?O~ then


'solution is not optimal.
(d) In Big-M method, M> 0.-
(e) Assignment problem is special cas-e of
transportation problem.

8-35 p~T. O. •
~
!)
[2J TBC-503 [3J TSC-503

2. .
Attempt any five parts : (3. x5=15 Marks) Section-B
(a) Write the role of computers in operations 3. Attempt any two parts of choice from (a), (b)
research. and (c). (5x2=10 Marks)
(b) Show that.: (a) Explain the nature and meaning of OR.
Max.: (b) Write the. main features of operation
Z=3XI +2~2 . research.
Subject to: (c) Write in brief the scope of operations
XI-X2 ~ 1 research.

xl +X2 ~3 4. Attempt any two parts of choice from (a), (b)


and (c). (;;x2=10 Marks)
and xI,x2 ~O
(a) Formulate the following problem as LPP :
has unbounded solution.
"A firm can produce three types of 'cloth,
(c) Express the following LPP in the matrix
form : say : A, B and C~ Three kinds of wool are
required for it, say : red, green and blue
Max :
wool. One unit length of type A cloth needs
Z=2XI + 3x2 + 4x3
..2 metres of red wool and 3 metres of blue
. Subject to :
wool; one unit length of type B cloth needs 3
Xl +X2 +X3 ~5
metres of red. wool, 2 metres of green: wool
Xl +2x2 =7 and 2 metres of blue wool; one unit length of
5xl-2x:z +3x3 ~9 type C cloth: needs 5 metres of green wool
and xl' X2' X3 ~ 0 and 4 metres of blue wool. The firm has a
. . .

(d) Write mathematical formulation of stock of 8 metres of red wool, 10 metres of


assignment problem. green wool and 15 metres of blue wool. It is
(e) Write mathematical formulation of assumed that the income obtained from one
Transportation Problem. unit length of type A cloth. is ~ 3, of type
(f) Write in brief the travelling salesman B cloth is 5 and type C cloth is ~ 4."
problem.

8-35 8-35 P. T. o.


- ._----- ---

[5] TJ3C-503
[4] TBC-503
(b) Solve the minimal assignment problem
(b) Solve the following LPP graphically:
)' whose effectives matrix is :
Min. :
1 2 3 4
z = 1.5xI + 2.5x2
I 2 3 4 5
Subject to:
II 4 5 6 7
Xl +3X2 ~3
III 7 8 9 8-
Xl +X2 ~2
IV 3 5 8' 4
and XI'~ ~O.
(c) Using Simplex method, solve the following (c) Using Vogel's approximation method, find
LPP: the initial basic feasible solution of the
Max: following transportation problem:
Z=3XI +2x2 Available
""'- WI W2 W3 W4
Subject to:
l) 19 30 50 10 7
Xl +X2 ~4
XI-X2 ~2 F2 70 30 40 60 9
and xI,x2 ~O. 40 8 70 20 18
F3
5. Attempt any two parts of choice from (a), (b)
Requirement 5 8 7 14
and (c). (5x2=10 Marks)
(a) Using Big-M method, solve. the following
LPP:
Max. :
Z =xI +2x2 +3x3 "":'X4
Subject to:
xl +2X2 +3X3 == 15
- 2XI+X2+5x3=20
xl +2x2 +X3 +X4 = 10
and xI,X2,x3,X4 ~O. TBC-S03 120

8-35 B-35
Roll N o, L--L---1._..L-.-..L..--..A:l"""",,,,~,---,

q
.reriql

T
B. C. A. (Fifth Semester)
'Mid Semester EXAMINATION, 2017
iJ, l. NETWORK SECURITY
\, Time: 1:30 Hours'J [Maximum Marks: 50
Note: (i) This question paper contains two Sections.
(ii) Both Sections are compulsory.
Section-A
..
I. Fill in the blanks: (lx5=5 Marks)
(a) An attacker impersonates somebody else,' is
known as ..... ~....
(b) A. symbol is replaced by another symbol to
create the ciphertext, it is known as .
(c) DOS is alan .
(d) When plaintext is divided. into groups of
characterslbits of certain length, it is known
as .
(e) When the sender/receiver of a message later
denies that he has sent/received the message,
known as .

8-36 P.T.O.


JI
l>
[2] TBC-504 TBC-504
[3)

2. Attempt anyfive parts : (3xS=lS Marks) ,


(b) Encrypt and decrypt the message
(a) Differentiate poly alphabetic and mono "MESSAGE IS VERY SE,CURE" using
alphabetic ciphers. Affine cipher, where key (15, 10).
(b) Differentiate symmetric and asymmetric
(c) Explain the first and final thought of Fiestel
techniques.
design.
(c) Explain the Block cipher' modes of
operations. S. Attempt any two parts of choice from (8), (b)
(d) What 'is the multiplicative inverse of 39 in and (c). (5x2=10 Marks)
ZIOI. Also find the two variables s and t such (a) Encrypt and decrypt the message
that s * a + t * b = gcd (a, b). "\ r "BALLOON. IS BLACK", using Playfair
(e) Explain the concept ofP-Boxes and S-Boxes. .1 (.
cipher.
(f) Explain the Double transposition cipher (b) Explain the S-DES structure with its
technique. complete architecture.
~
Section-B
(b) Explain the concept of HILL cipher with the
3. Attempt any two parts of choice from (a), (b) help of an example .
. and (c). (Sx2=10 Marks)
(a). What are the goals of network security ?
Explain.
(b) Define and explain at least five security
services.
(c) Differentiate Specific and Pervasive security I

mechanisms. Explain at least three


mechanisms of each category.
4. Attempt any two parts of choice from (a), (b)
and (c). (Sx2=10 Marks)
(a) What various t attacks are possible on
network? Explain each.
TBC-504 120
. 6-36
6-36


-- - - --- ----

,
Roll No•
.i L-.......L_...1.---L_--L---''----'-----J

,
.~ i


TBe-505
B. C. A. (Fifth Semester)
Mid Semester EXAMINATION, 2017
PROJECT MANAGEMENT AND QUALITY
ASSURANCE
Time: 1:30 Hours] [ Maximum Marks: 50
Note: (i) This question paper contains two Sections. '"
(ii) Both Sections are compulsory.
Section-A
1. Fill in the blanksfTrue-False : (l x5=5 Marks)
(a) DFD stands for _
(b) During the design phase, analysts begin to
define a computer-system solution. , \
. (True/False)
(c) In Waterfall model, output of one phase is
input to next phase. (True/False)
(d) In incremental model, requirements do not
need to be prioritized. (True/False)
(e) Component-Based Software Engineering
allows faster delivery. (True/False)
2. Attempt any five parts: (3x5=15 Marks)
Explain the following terms :
(a) Process

8-43
P.T.O. •
-.D II
[2] TBC-50S [3]
_. . I

\
:

(c) Explain Risk Management. Also explain risk


(b) Project '
-, mitigation techniques.
(C) Product
(d) Interview
., . -I 5. Attempt any two- parts of choice from (a), (b)
(e) ERD and (c). I (5x2=10 Marks)

(f) Coupling (a) Write in detail about Work Breakdown


Structure (WBS). Discuss with the help of
Section-B
suitable example.
3. Attempt any two parts of choice from (a), (b) (b) What do you mean by cost-benefit analysis?
and (c). (5x2=10 Marks) What are the various categories of cost
(a) What do you understand by the term required to estimate the cost of the software
"Software Project Management" ? Explain in product?
your own words. What approaches are used (c) What are the various dimensions of Project
to manage a Software Project? Monitoring and Control? Explain 'n detail.
(b) Explain the term Software Project Planning.
What are the various objectives-of planning? ""
.Why the planning.is called as the primary
function of the management?
(c) Write - in detail about "Software Project
Management Spectrum". Explain the concept
-of 4 P's in SPM.
4. Attempt any two parts of choice from (a), (b) • I

and (c). (5x2=10 Marks) I

(a) What are the traditional activities of a


software engineering process ? -Explain in
your own words. I

(b) Explain Evolving role of software. Also


.' i

elaborate the recent software development "



now-a-days. Also explain why the software
is called as vehicle to run the software. TBe-505 120

6-43 6-43

You might also like