5th Sem B.C.A.
5th Sem B.C.A.
<r
Roll No.
• TBC-501
B. C. A. (Fifth Semester)
Mid Semester EXAMINATION, 2017
WEB TECHNOLOGY
Time: 1:30 Hours] [Maximum Marks: 50
'Note: (i) This question paper contains two Sections.
(ii) Both Sections are compulsory. ~
Section-A
1. Write TruelFalse: (lxS=S Marks)
(a) All HTML tags have end tag.
(b) IMAP stands for Internet Mail Access
Protocol.
(c) Ordered List is also known as bullet list.
(d) Apache is a Web Server.
(e) E-mail is a Protocol.
2. Attempt any five parts: (3xS=IS Marks)
(a) What do you understand by ISP ?
(b) What is Server?
(c) Write down the difference between inline
and internal CSS.
(d) What are the HTML features?
8-36 P.T.O.
•
JA
[2]
8-36
•
JI
Roll No.·
TBC-502
B. C. A. (Fifth Semester)
Mid Semester EXAMINATION, 2017
JA VA PROGRAMMING
Time: 1:30 Hours] . [Maximum Marks: 50
Note: (i) This question paper contains two Sections.
'"
(ii)' Both Sections are compulsory.
Section-A
1. Fill in the blanks: (l x5=5 Marks)
(a) Default value of double is .
(b) Final methods can be overloaded in .
.(c) String class can be extended in any class
is .
(d) Super class of Exception is .
(e) Jre stands for .
8-36 P.T.O.
•
~ ,.
[2] TBC-502
[3] TBC-502
(c) What is method overloading and overriding? "
5. Attempt any two parts of choice from (a), (b)
Explain properly.
and (c). . (5x2=lO Marks)
(d) What are the. different types of access
specifiers ? (a) Define and explain thread life-cycle. How to
(e) Differentiate String and StringBuffer. create thread class using runnable interface?
(f) Explain different uses of super keyword. (b) What are Exceptions in java ? Write a
Section-B program to handle an exception under
3. Attempt any two parts . of choice from (a), (b) checked category.
and (c). (5x2=10 Marks)
(c) What is the difference between throw and
(a) What are the use of command line throws? Write a program to show the use of
arguments ? Write a program to print all the finally keyword.
command line arguments in reverse order.
(b) What are the .features of java ?. Define and
.
Roll No.
TBe-503
B. C. A. (Fifth Semester)
Mid Semester EXAMINATION, 2017
,OPTIMIZATION TECHNIQUES
8-35 p~T. O. •
~
!)
[2J TBC-503 [3J TSC-503
2. .
Attempt any five parts : (3. x5=15 Marks) Section-B
(a) Write the role of computers in operations 3. Attempt any two parts of choice from (a), (b)
research. and (c). (5x2=10 Marks)
(b) Show that.: (a) Explain the nature and meaning of OR.
Max.: (b) Write the. main features of operation
Z=3XI +2~2 . research.
Subject to: (c) Write in brief the scope of operations
XI-X2 ~ 1 research.
8-35 8-35 P. T. o.
•
- ._----- ---
[5] TJ3C-503
[4] TBC-503
(b) Solve the minimal assignment problem
(b) Solve the following LPP graphically:
)' whose effectives matrix is :
Min. :
1 2 3 4
z = 1.5xI + 2.5x2
I 2 3 4 5
Subject to:
II 4 5 6 7
Xl +3X2 ~3
III 7 8 9 8-
Xl +X2 ~2
IV 3 5 8' 4
and XI'~ ~O.
(c) Using Simplex method, solve the following (c) Using Vogel's approximation method, find
LPP: the initial basic feasible solution of the
Max: following transportation problem:
Z=3XI +2x2 Available
""'- WI W2 W3 W4
Subject to:
l) 19 30 50 10 7
Xl +X2 ~4
XI-X2 ~2 F2 70 30 40 60 9
and xI,x2 ~O. 40 8 70 20 18
F3
5. Attempt any two parts of choice from (a), (b)
Requirement 5 8 7 14
and (c). (5x2=10 Marks)
(a) Using Big-M method, solve. the following
LPP:
Max. :
Z =xI +2x2 +3x3 "":'X4
Subject to:
xl +2X2 +3X3 == 15
- 2XI+X2+5x3=20
xl +2x2 +X3 +X4 = 10
and xI,X2,x3,X4 ~O. TBC-S03 120
8-35 B-35
Roll N o, L--L---1._..L-.-..L..--..A:l"""",,,,~,---,
q
.reriql
T
B. C. A. (Fifth Semester)
'Mid Semester EXAMINATION, 2017
iJ, l. NETWORK SECURITY
\, Time: 1:30 Hours'J [Maximum Marks: 50
Note: (i) This question paper contains two Sections.
(ii) Both Sections are compulsory.
Section-A
..
I. Fill in the blanks: (lx5=5 Marks)
(a) An attacker impersonates somebody else,' is
known as ..... ~....
(b) A. symbol is replaced by another symbol to
create the ciphertext, it is known as .
(c) DOS is alan .
(d) When plaintext is divided. into groups of
characterslbits of certain length, it is known
as .
(e) When the sender/receiver of a message later
denies that he has sent/received the message,
known as .
8-36 P.T.O.
•
JI
l>
[2] TBC-504 TBC-504
[3)
•
-- - - --- ----
,
Roll No•
.i L-.......L_...1.---L_--L---''----'-----J
,
.~ i
•
TBe-505
B. C. A. (Fifth Semester)
Mid Semester EXAMINATION, 2017
PROJECT MANAGEMENT AND QUALITY
ASSURANCE
Time: 1:30 Hours] [ Maximum Marks: 50
Note: (i) This question paper contains two Sections. '"
(ii) Both Sections are compulsory.
Section-A
1. Fill in the blanksfTrue-False : (l x5=5 Marks)
(a) DFD stands for _
(b) During the design phase, analysts begin to
define a computer-system solution. , \
. (True/False)
(c) In Waterfall model, output of one phase is
input to next phase. (True/False)
(d) In incremental model, requirements do not
need to be prioritized. (True/False)
(e) Component-Based Software Engineering
allows faster delivery. (True/False)
2. Attempt any five parts: (3x5=15 Marks)
Explain the following terms :
(a) Process
8-43
P.T.O. •
-.D II
[2] TBC-50S [3]
_. . I
\
:
6-43 6-43