PROMOTE MY BLOG: JUST CLICK BELOW BUTTON

Search Any Paper On This Blog

Sunday, January 30, 2011

CS610- Computer Network Complete Final Term Paper

FINALTERM  EXAMINATION
Fall 2008
CS610- Computer Network
Time: 120 min
Marks: 70
Question No: 1      ( Marks: 1 ) Please choose one


The number of connections needed for N computer in direct point to point communication is equal to:


       (N2 –N)/2

       N(N- 1)

       N2

       None of the given


Question No: 2      ( Marks: 1 ) - Please choose one


When an application--------------- data, it makes a copy of the data available to all other computers on the network.


       Broadcasting

       Multicasting

       Unicasting

       None of the given



Question No: 3      ( Marks: 1 ) - Please choose one


Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.


       64

       48

       32

       8


Question No: 4      ( Marks: 1 ) - Please choose one


A system with redundant bridges might have a problem with_______ in the system.


       Loop

       Filters

       Spanning Trees

       All given choices


Question No: 5      ( Marks: 1 ) - Please choose one


The product of delay and throughput measures the _____ of data that can be present on the network.


       Area

       Volume

       Length

       None of the given



Question No: 6      ( Marks: 1 ) - Please choose one


Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary interaction and operating system independent are the characteristics of _____________


       TCP

       UDP

       IP

       None of the given



Question No: 7      ( Marks: 1 ) - Please choose one


Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________

       None of the given

       TCP

       UDP

       IP


Question No: 8      ( Marks: 1 ) - Please choose one


The process of using a routing table to select a next hop for a given datagram is called_________


       Encapsulation

       Reassembling

       Routing or forwarding

       None of the given


Question No: 9      ( Marks: 1 ) - Please choose one


____________ uses distance vector approach to define routing


       BGP

       OSPF

       RIP

       None of the given



Question No: 10      ( Marks: 1 ) - Please choose one


A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called__________


       Distance Vector Multicast Routing Protocol (DVMRP)

       Core Based Trees (CBT)

       Protocol Independent Multicast_ Sparse Mode (PIM-SM)

       Protocol Independent Multicast _ Dense Mode (PIM-DM)



Question No: 11      ( Marks: 1 ) - Please choose one


One repeater _______, two repeaters ________ the maximum cable length limitation.

       doubles, cancel

       doubles, triple

       square roots, cude roots

       and, triple


Question No: 12      ( Marks: 1 ) - Please choose one


Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.

       postfix, Infix

       non of these

       Infix, prefix

       prefix, suffix


Question No: 13      ( Marks: 1 ) - Please choose one


Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

       True

       False


Question No: 14      ( Marks: 1 ) - Please choose one


ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

       32, 48

       24, 32

       32, 64

       32, 128


Question No: 15      ( Marks: 1 ) - Please choose one


End-to-end delivery service is connection oriented.

       True

       False


Question No: 16      ( Marks: 1 ) - Please choose one


A single networking technology is best for all needs.

       True

       False


Question No: 17      ( Marks: 1 ) - Please choose one


In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.


       False

       True


Question No: 18      ( Marks: 1 ) - Please choose one


Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?


       T

       C

       D

       C, D


Question No: 19      ( Marks: 1 ) - Please choose one


In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

       T

       D

       C

       T, C


Question No: 20      ( Marks: 1 ) - Please choose one


We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

       routing path

       routing metric

       routing

       switching


Question No: 21      ( Marks: 2 )


Is there a comparision between  TCP/IP reference model and ISO reference model.


Question No: 22      ( Marks: 2 )


Does OSPF only share information within an area or does it allow communication between areas?



Question No: 23      ( Marks: 2 )


What are the implimentations of Network Address Translation?


Question No: 24      ( Marks: 3 )


Describe the difference between static and dynamic routing?


Question No: 25      ( Marks: 3 )


What is the first address in the block if one of the addresses is 140.120.84.24/20?


Question No: 26      ( Marks: 3 )


Write three new features of IPV6.


Question No: 27      ( Marks: 5 )


What is the difference between an interior gateway protocol and an exterior gateway protocol? Name an example of each.


Question No: 28      ( Marks: 5 )


As the Internet grew, the original Classful addressing scheme became a limitation, what is was the designed solution.


Question No: 29      ( Marks: 5 )


What are IPv6 ADDRESS NOTATION?


Question No: 30      ( Marks: 10 )


LIST SOME CHARACTERISTICS OF A CLIENT.


Question No: 31      ( Marks: 10 )


With help of the diagram below, explain TCP Segment Format:


CS605- Software Engineering II Complete Final Term Paper 2008

FINALTERM  EXAMINATION
Fall 2008
CS605- Software EngineeringII (Session - 1)
Ref No:
Time: 120 min
Marks: 70
Question No: 1    ( Marks: 1 )    - Please choose one
 The purpose of earned value analysis is to

       determine how to compensate developers based on their productivity

       provide a quantitative means of assessing software project progress

       provide a qualitative means of assessing software project progress

       set the price point for a software product based on development effort

   
Question No: 2    ( Marks: 1 )    - Please choose one
   The RMMM plan assists the project team in developing strategy for dealing with risk. In this context, an effective strategy must consider:

       Risk avoidance

        Risk monitoring

        Risk management and contingency plan

        All of the given choices

   
Question No: 3    ( Marks: 1 )    - Please choose one
 The component-based development model is

       only appropriate for computer hardware design.

       not able to support the development of reusable components.

       dependent on object technologies for support.

       not cost effective by known quantifiable software metrics.


   
Question No: 4    ( Marks: 1 )    - Please choose one
 In ___________ representation of CMMI model, consideration is given to improve all the defined processes areas.

       Staged

       Continuous
   
Question No: 5    ( Marks: 1 )    - Please choose one
 If you know the relationship between the use cases, classes, GUIs, Test cases and other artifacts then we can say that requirements are traceable in that project.


►True

►False
   
Question No: 6    ( Marks: 1 )    - Please choose one
 There could be multiple GUIs to satisfy one requirement

►True

►False


   
Question No: 7    ( Marks: 1 )    - Please choose one
 Check in and Check out is actually one and the same process with two different names



►True
►False
   
Question No: 8    ( Marks: 1 )    - Please choose one
 If a new version of a product is released by fixing the bugs in the previous release then it is termed as _________________
►Product Update

►Product Upgrade

►Defect Removal


►Product Performance
   
Question No: 9    ( Marks: 1 )    - Please choose one
 When an Item is baselined, it becomes frozen, here frozen means, that the item can be changed only by creating an old version

►
►
   
Question No: 10    ( Marks: 1 )    - Please choose one
 Configuration Item identification involves:

►Identifying the structure of the s/w system

►Uniquely identify individual components

►Uniquely identifying various revisions

►All of the given

   
Question No: 11    ( Marks: 1 )    - Please choose one
 Incomplete Configuration identification documents may result in:

►Schedule Product

►all of the given choices are correct

►Defective Product

►Higher Maintenance Costs

   
Question No: 12    ( Marks: 1 )    - Please choose one
 If Configuration item identification is not identified, it is possible to control changes and establish records.

       ► True
       ► False
   
Question No: 13    ( Marks: 1 )    - Please choose one
 Availability and Reliability are concerned with

       Perceived quality

       Quantitatively measured quality

   
Question No: 14    ( Marks: 1 )    - Please choose one
 Software Availability can be calculated by the following equation:

       Availability = (MTTR/MTTF) x 100


       Availability = (MTBF/MTTR) x 100

       Availability = (MTTF/MTBF) x 100

       Availability = (MTBF/MTTF) x 100

   
Question No: 15    ( Marks: 1 )    - Please choose one
 Phase Index can be calculated by the help of the following formula, where
Ei – the total number of errors uncovered during the ith step in the SE process
Si – number of serious errors
Mi – number of moderate errors
Ti – number of minor errors
PSi – product size at the ith step
ws, wm, wt – weighting factors for serious, moderate, and minor errors

       PIi = ws(Si/Ei) + wm(Mi/Ei) + wt(Ti/Ei)
       PIi = ws(Si/Ei) + wm(Mi/Mi) + wt(Ti/T)

       PIi = ws(Si/Ei) + wm(Mi/Mi) + wt(Ti/Ei)

       PIi = ws(Si/S) + wm(Mi/M) + wt(Ti/E)

   
Question No: 16    ( Marks: 1 )    - Please choose one
 The higher the Error Index, the higher will be the Defect Removal Efficiency

       True

       False

   
Question No: 17    ( Marks: 1 )    - Please choose one
 The goal of quality assurance is to provide management with the data needed to determine which software engineers are producing the most defects.

       ► true
       ► false
   
Question No: 18    ( Marks: 1 )    - Please choose one
 From the following listed software development Model, which one is an object oriented model

       Classical life cycle model
       Fountain model

       Spiral model
       Waterfall model

   
Question No: 19    ( Marks: 1 )    - Please choose one
 The prototyping model of software development is

       a reasonable approach when requirements are well defined.
       a useful approach when a customer cannot define requirements clearly.

       the best approach to use for projects with large development teams.

       a risky model that rarely produces a meaningful product.

   
Question No: 20    ( Marks: 1 )    - Please choose one
 ___________________is a team organization where there is no permanent leader and task coordinators are appointed for short duration. Decisions on problems and approach are made by group consensus and communication among team is horizontal.





       ► Democratic decentralized (DD)
       ► Controlled decentralized (CD)
       ► Synchronous paradigm (SP)
       ► Controlled centralized (CC)
   
Question No: 21    ( Marks: 2 )
 Discuss the role of program restructuring in software reengineering?

   
Question No: 22    ( Marks: 2 )
 Differentiate Change Control Authority (CCA) and Change Control Board (CCB)?

   
Question No: 23    ( Marks: 2 )
 Give the uses of Time Boxing?

   
Question No: 24    ( Marks: 3 )
 Differentiate between organizational maturity and process area capability?

   
Question No: 25    ( Marks: 3 )
 What would you understand by the conventional numbering of the product release?

   
Question No: 26    ( Marks: 3 )
 What would this model depict?

   
Question No: 27    ( Marks: 5 )
 How we schedule a project with the help Critical Path Method (CPM)? Give only key points.

   
Question No: 28    ( Marks: 5 )
 What problems can be caused by following bad smells in code?
·       Large class
·       Short gun surgery


   
Question No: 29    ( Marks: 5 )
 Briefly explain the following graph




   
Question No: 30    ( Marks: 10 )
 What are the difficulties in maintaining the Legacy System?

   
Question No: 31    ( Marks: 10 )
 If we have collected the historical data of our organization, how the data related to errors help in assessing the quality of the present project?