Code No: 56
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) Explain the functional overview of information storage and retrieval system?
b) Does a private index file differ from a standard database management system
(DBMS). What problems need to be addressed when using a DBMS as part of an information retrieval system?
2.a) Explain browse capabilities?
b) Are thesauri a subclass of concept classes? Justify.
3.a) Explain indexing process.
b) Does high specificity always imply high exhaustivity? Justify.
4.a) Explain porter stemming algorithm.
b) Discuss hypertext data structure.
5.a) Discuss hypertext linkages.
b) Discuss the problems with weighting schemes.
6.a) Explain term clustering using single link algorithm.
b) Discuss about hierarchy of clusters.
7.a) Explain similarity measures.
b) Discuss information visualization technologies.
8. Write short notes on
a) Hardware text search algorithms
b) Text streaming architecture
c) Recall and Precision
Tuesday, November 23, 2010
Jawaharlal Nehru Technological University, Hyderabad MCA-V Semester Supplementary Examinations July/August 2010 SOFTWARE TESTING METHODOLOGIES Question paper
Code No: 57
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) What is meant by a Test Design? Explain the goals of Software testing.
b) With a neat illustration explain a model for testing.
2.a) Explain the various kinds of loops and show how loop testing is performed.
b) Explain the steps involved in heuristic procedures for sensitizing paths.
3.a) Clearly explain the various steps involved in transaction-flow testing techniques.
b) Compare and contrast static and dynamic anomaly detection.
4.a) Enumerate the various ugly domains with suitable examples.
b) Explain the terms related to domain testing:
i) Domains ii) Paths
iii) Predicates iv) Domain dimensionality
5.a) Explain the algorithm with an example, how a flowgraph is reduced into a path
expression.
b) Write about the flow anomaly detection.
6.a) Describe the use of decision tables in performing the logic-based testing.
b) Explain clearly the testability tips for logic-based testing.
7.a) Write about the following:
i) States ii) State graphs iii) State tables
b) Explain with suitable examples the good and bad state graphs.
8.a) What is Graph matrix? Explain how graph matrices are helpful in software testing.
b) Explain how matrix representation in software is done.
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) What is meant by a Test Design? Explain the goals of Software testing.
b) With a neat illustration explain a model for testing.
2.a) Explain the various kinds of loops and show how loop testing is performed.
b) Explain the steps involved in heuristic procedures for sensitizing paths.
3.a) Clearly explain the various steps involved in transaction-flow testing techniques.
b) Compare and contrast static and dynamic anomaly detection.
4.a) Enumerate the various ugly domains with suitable examples.
b) Explain the terms related to domain testing:
i) Domains ii) Paths
iii) Predicates iv) Domain dimensionality
5.a) Explain the algorithm with an example, how a flowgraph is reduced into a path
expression.
b) Write about the flow anomaly detection.
6.a) Describe the use of decision tables in performing the logic-based testing.
b) Explain clearly the testability tips for logic-based testing.
7.a) Write about the following:
i) States ii) State graphs iii) State tables
b) Explain with suitable examples the good and bad state graphs.
8.a) What is Graph matrix? Explain how graph matrices are helpful in software testing.
b) Explain how matrix representation in software is done.
Jawaharlal Nehru Technological University, Hyderabad MCA-V Semester Supplementary Examinations July/August 2010 SOFTWARE PROJECT MANAGEMENT Question paper
Code No: 54
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1. "Conventional Software management does not perform satisfactorily", Justify your
answers with appropriate reasons?
2.a) What are the key practices that improve the overall Software quality.
b) How can good teams be built? How can you continue to have a team that works effectively and efficiently?
3.a) Explain the four phases of Software Lifecycle?
b) Describe the Engineering Artifacts?
4.a) Explain the Software architecture from a technical perspective?
b) What are the seven workflows in the lifecycle?
5.a) Explain immovable and movable deadlines in a project?
b) How are the checkpoints (or) synchronization points decided? Explain with an example?
6. With a neat block diagram, describe the default roles in a Software line-of -business
organization?
7.a) Explain the priorities for tailoring the process framework?
b) Explain the purpose and perspectives of seven core metrics?
8. What was the purpose of the concept definition (CD) and full Scale development
(FSD) in the project CCPDS – R?
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1. "Conventional Software management does not perform satisfactorily", Justify your
answers with appropriate reasons?
2.a) What are the key practices that improve the overall Software quality.
b) How can good teams be built? How can you continue to have a team that works effectively and efficiently?
3.a) Explain the four phases of Software Lifecycle?
b) Describe the Engineering Artifacts?
4.a) Explain the Software architecture from a technical perspective?
b) What are the seven workflows in the lifecycle?
5.a) Explain immovable and movable deadlines in a project?
b) How are the checkpoints (or) synchronization points decided? Explain with an example?
6. With a neat block diagram, describe the default roles in a Software line-of -business
organization?
7.a) Explain the priorities for tailoring the process framework?
b) Explain the purpose and perspectives of seven core metrics?
8. What was the purpose of the concept definition (CD) and full Scale development
(FSD) in the project CCPDS – R?
Jawaharlal Nehru Technological University, Hyderabad MCA-V Semester Supplementary Examinations July 2010 OBJECT ORIENTED ANALYSIS AND DESIGN (using U M L) Question paper
Code No: 53
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) What are the principles of modeling?
b) Explain Modeling systems architecture with a neat diagram.
2.a) What are the different kinds of relationships? Explain with examples.
b) Clearly bring out the difference between structural diagrams and behavioral diagrams.
3. Explain class diagrams and object diagrams with examples.
4.a) What is the purpose of Interaction diagrams?
b) What is the difference between Forward and Reverse engineering?
5.a) Write a notes on Activity diagrams.
b) Draw the Activity diagram for the following case:
A person buys a plot and constructs a house in it.
6.a) Define Event and Signal.
b) Explain synchronization concept in processes and Threads.
c) Write short notes on State chart diagrams.
7.a) What are the differences between nodes and components?
b) Write notes on organizing nodes and connections.
c) Briefly explain Component diagrams with examples.
8. Draw the necessary UML diagrams for the following case:
A student borrowing a book from the university library.
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) What are the principles of modeling?
b) Explain Modeling systems architecture with a neat diagram.
2.a) What are the different kinds of relationships? Explain with examples.
b) Clearly bring out the difference between structural diagrams and behavioral diagrams.
3. Explain class diagrams and object diagrams with examples.
4.a) What is the purpose of Interaction diagrams?
b) What is the difference between Forward and Reverse engineering?
5.a) Write a notes on Activity diagrams.
b) Draw the Activity diagram for the following case:
A person buys a plot and constructs a house in it.
6.a) Define Event and Signal.
b) Explain synchronization concept in processes and Threads.
c) Write short notes on State chart diagrams.
7.a) What are the differences between nodes and components?
b) Write notes on organizing nodes and connections.
c) Briefly explain Component diagrams with examples.
8. Draw the necessary UML diagrams for the following case:
A student borrowing a book from the university library.
Jawaharlal Nehru Technological University, Hyderabad MCA-V Semester Supplementary Examinations July/August 2010 MIDDLE WARE TECHNOLOGIES Question paper
Code No: 55
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) Explain the benefits of Client Server Computing.
b) Explain the pitfalls of Client Server Computing.
2. Explain the details of the statement interface and its two derived interfaces.
3. Explain the multiple interfaces that have the same method name and signature with an example.
4. Explain how the data Sources you can access through ADO.NET.
5. Write a program that the Client and Server Sides of the Servlet Count Program.
The Client is an applet and the Server is a Servlet. The applet runs inside a
NetScape communicator browser, the Servlet runs inside Netscape's Enterprise
Server 3.0.
6. Write a program to illustrate Corba/Java introspection.
7.a) Describe the Introspection of Java Beans.
b) Compare Java Bean and Corba Bean with an example.
8.a) Explain the EJB container Frame work.
b) Explain the Client/Server Development process.
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) Explain the benefits of Client Server Computing.
b) Explain the pitfalls of Client Server Computing.
2. Explain the details of the statement interface and its two derived interfaces.
3. Explain the multiple interfaces that have the same method name and signature with an example.
4. Explain how the data Sources you can access through ADO.NET.
5. Write a program that the Client and Server Sides of the Servlet Count Program.
The Client is an applet and the Server is a Servlet. The applet runs inside a
NetScape communicator browser, the Servlet runs inside Netscape's Enterprise
Server 3.0.
6. Write a program to illustrate Corba/Java introspection.
7.a) Describe the Introspection of Java Beans.
b) Compare Java Bean and Corba Bean with an example.
8.a) Explain the EJB container Frame work.
b) Explain the Client/Server Development process.
Jawaharlal Nehru Technological University, Hyderabad MCA-V Semester Supplementary Examinations July/August 2010 INFORMATION SECURITY Question paper
Code No: 59
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) Explain the Model for Internetwork Security.
b) Explain about Format String Vulnerabilities.
2.a) Explain the DES Algorithm in detail.
b) Write about the location of Encryption devices.
3.a) Explain about RSA Algorithm in detail.
b) Draw the format of X.509 Certificate.
4. Explain about S/MIME in detail.
5.a) Explain about AH Header in detail.
b) Explain about Key Management in IP Security.
6. Explain about SET protocol in detail.
7.a) Explain about SNMP V1
b) Write about Intruders.
8. Explain about Firewall Design principles.
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) Explain the Model for Internetwork Security.
b) Explain about Format String Vulnerabilities.
2.a) Explain the DES Algorithm in detail.
b) Write about the location of Encryption devices.
3.a) Explain about RSA Algorithm in detail.
b) Draw the format of X.509 Certificate.
4. Explain about S/MIME in detail.
5.a) Explain about AH Header in detail.
b) Explain about Key Management in IP Security.
6. Explain about SET protocol in detail.
7.a) Explain about SNMP V1
b) Write about Intruders.
8. Explain about Firewall Design principles.
Jawaharlal Nehru Technological University, Hyderabad MCA-V Semester Supplementary Examinations July 2010 E – COMMERCE Question paper
Code No: 51
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) Discuss about the anatomy of E – Commerce applications?
b) What are the advantages of E – Commerce?
2. Give a detailed description of Mercantile Process Models?
3.a) Give a note on Smart Cards and Credit cards?
b) What are the risks in Election Payment Systems?
4. What are Value added networks? Explain?
5. Explain in detail about Supply Chain management?
6. Give a brief note on the following:
i) Digital document types
ii) Information based marketing
iii) On – line marketing process
7. Discuss the following in brief
i) Commerce Catalogues
ii) Information filtering
8.a) Give a brief note on Key multimedia concepts.
b) Explain about Desktop Video Processing.
Time: 3hours Max.Marks:60
Answer any Five questions
All questions carry equal Marks
1.a) Discuss about the anatomy of E – Commerce applications?
b) What are the advantages of E – Commerce?
2. Give a detailed description of Mercantile Process Models?
3.a) Give a note on Smart Cards and Credit cards?
b) What are the risks in Election Payment Systems?
4. What are Value added networks? Explain?
5. Explain in detail about Supply Chain management?
6. Give a brief note on the following:
i) Digital document types
ii) Information based marketing
iii) On – line marketing process
7. Discuss the following in brief
i) Commerce Catalogues
ii) Information filtering
8.a) Give a brief note on Key multimedia concepts.
b) Explain about Desktop Video Processing.
Subscribe to:
Posts (Atom)