University of Mumbai Institute of Distance and Open Learning

Size: px
Start display at page:

Download "University of Mumbai Institute of Distance and Open Learning"

Transcription

1 Page 1 University of Mumbai Institute of Distance and Open Learning T.Y.B.Sc. (IT) Semester - V SUBJECT: INTERNET SECURITY 1 Explain Diffie Hellman key exchange algorithm and problem associated with it. 2 Explain IP Sniffing and IP Spoofing in detail. 3 Write a note on Denial of Service Attack. 4 What is digital signature? Explain in detail 5 What are 'BUGS' and 'BACKDOORS'? What prevention mechanisms can be used for them? 1 Explain in detail different kinds of Firewall Configurations. 2 What is VIRUS? Explain in detail different types of viruses. 3 State And explain different security models. 4 Explain the term security policy. Also enumerate its characteristics and components. 5 Explain the term Packet Filter and explain the circuit level filter with SOCKS implementation. 1 What is Message Digest? Explain any message digest algorithm in detail. 2 Explain the filtering services for Telnet. 3 Distinguish between the following:-traditional Firewall and Distributed Firewall 4 Distinguish between the following:-active and Passive attack 5 Distinguish between the following:-symmetric and Asymmetric cryptography 1 Explain the strategies for secure network in detail. 2 Explain what you mean by Plain Text, Cipher Text, Encryption and Decryption. 3 Write a note on Digging of Worms. 4 Explain : Protocol Failures. 5 What are application gateways? Why are they known as proxy servers? Explain their working in detail. How are they different from circuit gateways? ASSIGNMENT NO 5 1 Explain :Key Wrapping. 2 Explain the concept of Social Engineering. What methods are used by the hackers for this purpose? Also mention the countermeasures. 3 Discuss in detail the classification of attacks. 4 Explain : Authentication Failures 5 History of Virus.

2 Page 2 SUBJECT: VISUAL BASIC What does cmdpush_click mean? What does cmdpush in cmdpush_click refer to? What does Click in cmdpush_click refer to? 2 What are compile, run-time and logic errors, when do they occur and what might cause them? 3 Answer the following a. What is the purpose of key-board access keys? How do they operate at run-time? b. What is a ToolTip? How can you make a ToolTip appear? 4 How are the With and End With statements used? Give an example 5 What do you mean by scope of a variable? Explain Procedure level, Module level and Global variables. If you want two groups of option buttons (five option buttons in each group) on a form, how can you make the 1 groups operate independently? 2 Distinguish between variables, constants, and controls. Explain the following functions i. FormatCurrency ii. FormatNumber 3 iii. FormatPercent iv. FormatDateTime 4 Explain the purpose of relational and logical operators. 5 Explain If...Else construct and nesting. What does the term common dialog box mean? Name and explain atleast three types of common dialog boxes. 1 What is the name of extension of the file in which common dialog box control is stored? 2 Explain the differences between ByRef and ByVal. When would each be used? Discuss the difference between declaring a variable in the General Declarations section of a standard code 3 module and declaring a variable in the General Declarations section of a form code module. 4 How do we declare a global variable and global constant? 5 Explain the following properties a. ListCount b. ListIndex c. List d. AddItem e. Clear f. RemoveItem g. Sorted 1 Explain the differences between a Do/Loop and a For/Next loop. 2 What is the purpose of Printer.Print? How do you control the horizontal spacing of printer output? 3 What actions trigger the Initialize event and the Terminate event of an object? 4 What do you mean by file organization? What are the different types of file organization? 5 Explain the function and use of the Err object. Explain its Source, Number and Description properties. ASSIGNMENT NO 5 1 Explain the difference between a data control and a data-bound control List all controls that can be data bound or data aware. 2 How can you check for the user deleting the only record in a Recordset? 3 What is SQL, and how is it used in Visual Basic? 4 Explain the methods FindFirst, FindLast, FindPrevious and FindNext

3 Page 3 SUBJECT: SQL 2 1 Explain hierarchial and network databases 2 What are subquerries? Explain existence test with an example 3 Explain aggregate functions in SQL 4 What are views? What are its advantages and disadvantages? Can we perform DML actions on views? 5 What are triggers? Explain its advantages & disadvantages 1 What is data integrity explain the different types of data integrity constraints in sql2 2 What are the different types of Joins? Explain outer joins with examples 3 What is a transaction? What are the problems that can occur due to concurrent transactions? 4 What is a deadlock? How can it be avoided? 5 What are co-related sub-querries? Explain with example 1 Explain Codds 12 rules 2 What are the drawbacks of file management systems 3 Differentiate between horizontal and vertical views 4 Explain the priviliges that are defined in SQL standard 5 What is a Foreign Key? How is a foreign key created during table creation and after the table is created

4 Page 4 Subject : Advanced Java Assignment No. 1 1 Differentiate between Light weight and Heavy weight components. 2 Explain the Life Cycle of the Applet. 3 Write a short note on following controls: a. Labels b. Buttons c. Combo Box d. Radio Buttons 4 Explain what is Swing? List the advantages of the swing. 5 Explain in details JTree covering following topics: a. Purpose b. Methods c. Listeners d. Interface Assignment No Write a short note on the following: a JDBC Driver Models b. Types of JDBC Driver 2. Explain DriverManager Class and its Methods. 3. What are the seven basic steps for using JDBC to access a database? Explain briefly with syntax. 4. Write a short note on the following: a. ResultSet b. ResultSetMetaData Assignment No What is a servlet? Explain the life cycle of the servlet. 2. Discuss the synchronization issues in servlets. 3. Explain Session Tracking in Servlet? And what are the two ways of session tracking in servlet. List atleast 3 methods in HttpSession? 4. Explain the Java Servlet Architecture. Assignment No. 4 1 Explain in detail Introspection feature of Java Beans. 2 Explain Bound property of Java Beans with example. 3 Explain Constrained property of a Bean giving example. 4 What is a Java Bean? What are the advantages of using Java Beans? 5 What is a JAR file? What are the options available with the JAR files? List any five. Assignment No. 5 1 Explain Java Server Pages (JSP). What are the advantages using JSP over Servlets? 2 What are the various JSP tags available? 3 Explain JSP Access Models and Session Management using JSP. 4 Describe various Implicit objects of the JSP. What is the scope of those objects? 5 What are the major differences in comparison between JSP and ASP?

5 Page 5 Subject : Web Designing 1 Explain with example <LINK> tag 2 Explain with example<object>tag 3 State and explain the methods of Response Object of ASP 4 What do you mean by IMAGE MAP? Explain with example how to create server side IMAGE MAP. 1 Explain the differene between <IFRAME> and <FRAME SET> with examples. 2 With the help of examples explain session object and its methods. 3 Explain conditional statements of VBScripts with examples 4 Explain SERVER object of ASP with its methods 1 Write a VBScript code to accept a character. Display if it s a vowel or a consonant 2 What are style sheets? What are the different approaches to style sheets? 3 Explain <A> tag. How is it used for navigation within the same page? 4 Explain the locking methods provided by the RecoredSet Object 1 What is server side include? What are the advantages of giving it? Give example. 2 Explain the different operators in VBScript 3 Why should the creation of unnecessary session variables be avoided? 4 Explain the <BODY> tag and its attributes

6 Page 6 Subject : ERP 1 How DSS differs from MIS? 2 Give the importance of package evaluation in the ERP implementation life cycle 3 What is business modelling? 4 Explain the concept of Supply Chain Management. Explain its benefits 1 Explain General Ledger in detail 2 Why does ERP implementation Fail? 3 Explain any two software modules for Oracle 4 Write Short notes on OLAP 5 Explain Business Process Reengineering 1 Explain faster implementation methodologies used in ERP implementation 2 Why is end user training important 3 Write a note on Quality management module 4 Differentiate between Data Mining & Data Warehousing 1 Explain ERP System is superior to any other legacy system 2 Explain the four sub modules of material management 3 Write short note on Executive information system 4 Explain the direct and indirect benefits of ERP ASSIGNMENT NO 5 1 What are the drawbacks of in-house development of ERP? 2 Write a note on Quality management module 3 How does data warehousing improve the efficiency of ERP Implementation? 4 Why is it important to have consusltants in ERP Implementation Team?

7 Page 7 Subject : MIS 1 Explain organization Culture 2 Define Organizations? What organizations need periodic reviews? 3 Define Manager. What are the functions of manager? 4 Define Rational decision making 1 Why is strategic business planning necessary? 2 Distinguish between open system and close system 3 What is the nature of IT decision? 4 Define the following : missions, objectives, goals, targets 1 What is system? What are its types? 2 What is information? Discuss various methods available for its collection having impact on its quality 3 What is the bias in information? 1 What do you mean by Law of requisite variety? 2 Describe the principles of Operational management 3 Why is an organization called socio-technical? 4 what is the basis for ascertaining the class of information?

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK 2017-18 Course / Branch : M.Sc.(CST) Semester / Year : VIII / IV Subject Name :

More information

BCA (Part III) Examination, 2010 E-Commerce Time allowed: Three Hours Max. Marks: 50 Attempt any five questions. All questions carry equal marks.

BCA (Part III) Examination, 2010 E-Commerce Time allowed: Three Hours Max. Marks: 50 Attempt any five questions. All questions carry equal marks. 1 E-Commerce 1. What do you understand by E-commerce Framework? Explain different advantages and disadvantages of E-commerce in an enterprise. 2. What is Mobile Computing? Explain different applications

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME All Rights Reserved Index No No. of Pages - 13 No of Questions - 07 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME YEAR II SEMESTER I (Intake II/III Group

More information

Java- EE Web Application Development with Enterprise JavaBeans and Web Services

Java- EE Web Application Development with Enterprise JavaBeans and Web Services Java- EE Web Application Development with Enterprise JavaBeans and Web Services Duration:60 HOURS Price: INR 8000 SAVE NOW! INR 7000 until December 1, 2011 Students Will Learn How to write Session, Message-Driven

More information

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking

More information

Java.. servlets and. murach's TRAINING & REFERENCE 2ND EDITION. Joel Murach Andrea Steelman. IlB MIKE MURACH & ASSOCIATES, INC.

Java.. servlets and. murach's TRAINING & REFERENCE 2ND EDITION. Joel Murach Andrea Steelman. IlB MIKE MURACH & ASSOCIATES, INC. TRAINING & REFERENCE murach's Java.. servlets and 2ND EDITION Joel Murach Andrea Steelman IlB MIKE MURACH & ASSOCIATES, INC. P 1-800-221-5528 (559) 440-9071 Fax: (559) 440-0963 murachbooks@murach.com www.murach.com

More information

IT6503 WEB PROGRAMMING. Unit-I

IT6503 WEB PROGRAMMING. Unit-I Department of Information Technology Question Bank- Odd Semester 2015-2016 IT6503 WEB PROGRAMMING Unit-I SCRIPTING 1. What is HTML? Write the format of HTML program. 2. Differentiate HTML and XHTML. 3.

More information

Chapter 2 FEATURES AND FACILITIES. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 FEATURES AND FACILITIES. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 FEATURES AND FACILITIES SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: JDeveloper features. Java in the database. Simplified database access. IDE: Integrated Development

More information

Foreword by Katie Moussouris... Acknowledgments... xvii. Introduction...xix. Chapter 1: The Basics of Networking... 1

Foreword by Katie Moussouris... Acknowledgments... xvii. Introduction...xix. Chapter 1: The Basics of Networking... 1 Brief Contents Foreword by Katie Moussouris.... xv Acknowledgments... xvii Introduction...xix Chapter 1: The Basics of Networking... 1 Chapter 2: Capturing Application Traffic... 11 Chapter 3: Network

More information

Peers Techno log ies Pv t. L td. Core Java & Core Java &Adv Adv Java Java

Peers Techno log ies Pv t. L td. Core Java & Core Java &Adv Adv Java Java Page 1 Peers Techno log ies Pv t. L td. Course Brochure Core Java & Core Java &Adv Adv Java Java Overview Core Java training course is intended for students without an extensive programming background.

More information

Call: JSP Spring Hibernate Webservice Course Content:35-40hours Course Outline

Call: JSP Spring Hibernate Webservice Course Content:35-40hours Course Outline JSP Spring Hibernate Webservice Course Content:35-40hours Course Outline Advanced Java Database Programming JDBC overview SQL- Structured Query Language JDBC Programming Concepts Query Execution Scrollable

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

COURSE SYLLABUS. Complete JAVA. Industrial Training (3 MONTHS) PH : , Vazhoor Road Changanacherry-01.

COURSE SYLLABUS. Complete JAVA. Industrial Training (3 MONTHS) PH : , Vazhoor Road Changanacherry-01. COURSE SYLLABUS Complete JAVA Industrial Training (3 MONTHS) PH : 0481 2411122, 09495112288 E-Mail : info@faithinfosys.com www.faithinfosys.com Marette Tower Near No. 1 Pvt. Bus Stand Vazhoor Road Changanacherry-01

More information

Borland Application Server Certification. Study Guide. Version 1.0 Copyright 2001 Borland Software Corporation. All Rights Reserved.

Borland Application Server Certification. Study Guide. Version 1.0 Copyright 2001 Borland Software Corporation. All Rights Reserved. Borland Application Server Certification Study Guide Version 1.0 Copyright 2001 Borland Software Corporation. All Rights Reserved. Introduction This study guide is designed to walk you through requisite

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

Type of Classes Nested Classes Inner Classes Local and Anonymous Inner Classes

Type of Classes Nested Classes Inner Classes Local and Anonymous Inner Classes Java CORE JAVA Core Java Programing (Course Duration: 40 Hours) Introduction to Java What is Java? Why should we use Java? Java Platform Architecture Java Virtual Machine Java Runtime Environment A Simple

More information

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how

More information

Introduction... xv SECTION 1: DEVELOPING DESKTOP APPLICATIONS USING JAVA Chapter 1: Getting Started with Java... 1

Introduction... xv SECTION 1: DEVELOPING DESKTOP APPLICATIONS USING JAVA Chapter 1: Getting Started with Java... 1 Introduction... xv SECTION 1: DEVELOPING DESKTOP APPLICATIONS USING JAVA Chapter 1: Getting Started with Java... 1 Introducing Object Oriented Programming... 2 Explaining OOP concepts... 2 Objects...3

More information

Table of Contents. Introduction... xxi

Table of Contents. Introduction... xxi Introduction... xxi Chapter 1: Getting Started with Web Applications in Java... 1 Introduction to Web Applications... 2 Benefits of Web Applications... 5 Technologies used in Web Applications... 5 Describing

More information

[Course Overview] After completing this module you are ready to: Develop Desktop applications, Networking & Multi-threaded programs in java.

[Course Overview] After completing this module you are ready to: Develop Desktop applications, Networking & Multi-threaded programs in java. [Course Overview] The Core Java technologies and application programming interfaces (APIs) are the foundation of the Java Platform, Standard Edition (Java SE). They are used in all classes of Java programming,

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR ADVANCED JAVA PROGRAMMING CIS1870 3 Credit Hours Student Level: This course is open to students on the college level in either freshman

More information

1 OBJECT-ORIENTED PROGRAMMING 1

1 OBJECT-ORIENTED PROGRAMMING 1 PREFACE xvii 1 OBJECT-ORIENTED PROGRAMMING 1 1.1 Object-Oriented and Procedural Programming 2 Top-Down Design and Procedural Programming, 3 Problems with Top-Down Design, 3 Classes and Objects, 4 Fields

More information

13. Databases on the Web

13. Databases on the Web 13. Databases on the Web Requirements for Web-DBMS Integration The ability to access valuable corporate data in a secure manner Support for session and application-based authentication The ability to interface

More information

Advanced Java Programming

Advanced Java Programming Advanced Java Programming Length: 4 days Description: This course presents several advanced topics of the Java programming language, including Servlets, Object Serialization and Enterprise JavaBeans. In

More information

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.). Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the

More information

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory COMPUTER MCQs 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory 4)virtual memory 5) None of the above 2. The component is used by the data analyst to create

More information

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Total No. of Questions : 09 ] [ Total No.of Pages : 02 CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

Tilak Maharashtra University

Tilak Maharashtra University Tilak Maharashtra University Bachelor of Computer Applications Second Year BCA 321- C++ INTRODUCTION C++ programming Basic Object Oriented programming, Characteristics, Advantages of object Oriented programming

More information

Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10

Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10 Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10 RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY, KIRUMAMPAKKAM-607 402 DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING QUESTION BANK

More information

This page intentionally left blank

This page intentionally left blank This page intentionally left blank arting Out with Java: From Control Structures through Objects International Edition - PDF - PDF - PDF Cover Contents Preface Chapter 1 Introduction to Computers and Java

More information

foreword to the first edition preface xxi acknowledgments xxiii about this book xxv about the cover illustration

foreword to the first edition preface xxi acknowledgments xxiii about this book xxv about the cover illustration contents foreword to the first edition preface xxi acknowledgments xxiii about this book xxv about the cover illustration xix xxxii PART 1 GETTING STARTED WITH ORM...1 1 2 Understanding object/relational

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

Database Processing. Fundamentals, Design, and Implementation. Global Edition

Database Processing. Fundamentals, Design, and Implementation. Global Edition Database Processing Fundamentals, Design, and Implementation 14th Edition Global Edition Database Processing: Fundamentals, Design, and Implementation, Global Edition Table of Contents Cover Title Page

More information

Fast Track to Java EE 5 with Servlets, JSP & JDBC

Fast Track to Java EE 5 with Servlets, JSP & JDBC Duration: 5 days Description Java Enterprise Edition (Java EE 5) is a powerful platform for building web applications. The Java EE platform offers all the advantages of developing in Java plus a comprehensive

More information

JAVA MICROSERVICES. Java Language Environment. Java Set Up. Java Fundamentals. Packages. Operations

JAVA MICROSERVICES. Java Language Environment. Java Set Up. Java Fundamentals. Packages. Operations Java Language Environment JAVA MICROSERVICES Object Oriented Platform Independent Automatic Memory Management Compiled / Interpreted approach Robust Secure Dynamic Linking MultiThreaded Built-in Networking

More information

Application Development in JAVA. Data Types, Variable, Comments & Operators. Part I: Core Java (J2SE) Getting Started

Application Development in JAVA. Data Types, Variable, Comments & Operators. Part I: Core Java (J2SE) Getting Started Application Development in JAVA Duration Lecture: Specialization x Hours Core Java (J2SE) & Advance Java (J2EE) Detailed Module Part I: Core Java (J2SE) Getting Started What is Java all about? Features

More information

Spring & Hibernate. Knowledge of database. And basic Knowledge of web application development. Module 1: Spring Basics

Spring & Hibernate. Knowledge of database. And basic Knowledge of web application development. Module 1: Spring Basics Spring & Hibernate Overview: The spring framework is an application framework that provides a lightweight container that supports the creation of simple-to-complex components in a non-invasive fashion.

More information

JAVA & J2EE UNIT -1 INTRODUCTION

JAVA & J2EE UNIT -1 INTRODUCTION JAVA & J2EE UNIT -1 INTRODUCTION 1. List and explain the java buzzwords 2. Explain different access specifires in java,with example [6 marks] 3. Explain any 5 object oriented features supported by java,

More information

- Information Security : Overview, need for information security, objectives of Information security.

- Information Security : Overview, need for information security, objectives of Information security. Semester-IV Paper-I : Information Security and Cyber Law Unit-I : - Information Security : Overview, need for information security, objectives of Information security. - Global information systems and

More information

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. Distributed Systems 1 06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Distributed Systems. Lecture 14: Security. 5 March,

Distributed Systems. Lecture 14: Security. 5 March, 06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Page 1

Page 1 Java 1. Core java a. Core Java Programming Introduction of Java Introduction to Java; features of Java Comparison with C and C++ Download and install JDK/JRE (Environment variables set up) The JDK Directory

More information

Courses For Event Java Advanced Summer Training 2018

Courses For Event Java Advanced Summer Training 2018 Courses For Event Java Advanced Summer Training 2018 Java Fundamentals Oracle Java SE 8 Advanced Java Training Java Advanced Expert Edition Topics For Java Fundamentals Variables Data Types Operators Part

More information

Java Programming Course Overview. Duration: 35 hours. Price: $900

Java Programming Course Overview. Duration: 35 hours. Price: $900 978.256.9077 admissions@brightstarinstitute.com Java Programming Duration: 35 hours Price: $900 Prerequisites: Basic programming skills in a structured language. Knowledge and experience with Object- Oriented

More information

A- Core Java Audience Prerequisites Approach Objectives 1. Introduction

A- Core Java Audience Prerequisites Approach Objectives 1. Introduction OGIES 6/7 A- Core Java The Core Java segment deals with the basics of Java. It is designed keeping in mind the basics of Java Programming Language that will help new students to understand the Java language,

More information

UNIT I Java Bean, HTML & Javascript

UNIT I Java Bean, HTML & Javascript SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : Web Technologies (16MC820) Year & Sem: II-MCA & II-Sem Course & Branch:

More information

Contents. More Controls 51. Visual Basic 1. Introduction to. xiii. Modify the Project 30. Print the Project Documentation 35

Contents. More Controls 51. Visual Basic 1. Introduction to. xiii. Modify the Project 30. Print the Project Documentation 35 Contents Modify the Project 30 Introduction to Print the Project Documentation 35 Visual Basic 1 Sample Printout 36 Writing Windows Applications The Form Image 36 The Code 37 with Visual Basic 2 The Form

More information

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This

More information

Watch Core Java and Advanced Java Demo Video Here:

Watch Core Java and Advanced Java Demo Video Here: Website: http://www.webdesigningtrainingruchi.com/ Contact person: Ranjan Raja Moble/Whatsapp: +91-9347045052 / 09032803895 Dilsukhnagar, Hyderabad Email: webdesigningtrainingruchi@gmail.com Skype: Purnendu_ranjan

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

Come & Join Us at VUSTUDENTS.net

Come & Join Us at VUSTUDENTS.net Come & Join Us at VUSTUDENTS.net For Assignment Solution, GDB, Online Quizzes, Helping Study material, Past Solved Papers, Solved MCQs, Current Papers, E-Books & more. Go to http://www.vustudents.net and

More information

SYLLABUS JAVA COURSE DETAILS. DURATION: 60 Hours. With Live Hands-on Sessions J P I N F O T E C H

SYLLABUS JAVA COURSE DETAILS. DURATION: 60 Hours. With Live Hands-on Sessions J P I N F O T E C H JAVA COURSE DETAILS DURATION: 60 Hours With Live Hands-on Sessions J P I N F O T E C H P U D U C H E R R Y O F F I C E : # 4 5, K a m a r a j S a l a i, T h a t t a n c h a v a d y, P u d u c h e r r y

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

10EC832: NETWORK SECURITY

10EC832: NETWORK SECURITY 10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to

More information

1Z Oracle. Java Enterprise Edition 5 Enterprise Architect Certified Master

1Z Oracle. Java Enterprise Edition 5 Enterprise Architect Certified Master Oracle 1Z0-864 Java Enterprise Edition 5 Enterprise Architect Certified Master Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-864 Answer: A, C QUESTION: 226 Your company is bidding

More information

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description

More information

KINGS IT2042 INFORMATION SECURITY. Batch : Staff Name : NALAYINI P & AMBIKA J. Academic Year. Page 1. Kings College of Engineering

KINGS IT2042 INFORMATION SECURITY. Batch : Staff Name : NALAYINI P & AMBIKA J. Academic Year. Page 1. Kings College of Engineering KINGS COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK IT2042 INFORMATION SECURITY Branch / Year / Sem : B.E / IV /VIII Batch : 2010-2014 Staff Name : NALAYINI P & AMBIKA

More information

Curriculum for B.Sc. in Business Information Systems

Curriculum for B.Sc. in Business Information Systems Business Information Systems Department King Abdullah II School for Information Technology (KASIT) University of Jordan 2005/2006/2007/2008/2009/2010/2011/2012 Curriculum for B.Sc. in Business Information

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step.

1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step. (DMCA 301) ASSIGNMENT - 1, MAY - 2016. PAPER- I : ARTIFICIAL INTELLIGENCE 1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill

More information

Strategic Infrastructure Security

Strategic Infrastructure Security Strategic Infrastructure Security Course Number: SCPSIS Length: Certification Exam There are no exams currently associated with this course. Course Overview This course picks up right where Tactical Perimeter

More information

Java SE7 Fundamentals

Java SE7 Fundamentals Java SE7 Fundamentals Introducing the Java Technology Relating Java with other languages Showing how to download, install, and configure the Java environment on a Windows system. Describing the various

More information

Contents Introduction 1

Contents Introduction 1 SELF-STUDY iii Introduction 1 Course Purpose... 1 Course Goals...1 Exercises... 2 Scenario-Based Learning... 3 Multimedia Overview... 3 Assessment... 3 Hardware and Software Requirements... 4 Chapter 1

More information

CS6302- DATABASE MANAGEMENT SYSTEMS- QUESTION BANK- II YEAR CSE- III SEM UNIT I

CS6302- DATABASE MANAGEMENT SYSTEMS- QUESTION BANK- II YEAR CSE- III SEM UNIT I CS6302- DATABASE MANAGEMENT SYSTEMS- QUESTION BANK- II YEAR CSE- III SEM UNIT I 1.List the purpose of Database System (or) List the drawback of normal File Processing System. 2. Define Data Abstraction

More information

J2EE Technologies. Industrial Training

J2EE Technologies. Industrial Training COURSE SYLLABUS J2EE Technologies Industrial Training (4 MONTHS) PH : 0481 2411122, 09495112288 Marette Tower E-Mail : info@faithinfosys.com Near No. 1 Pvt. Bus Stand Vazhoor Road Changanacherry-01 www.faithinfosys.com

More information

Table of Contents (CISSP 2012 Edition)

Table of Contents (CISSP 2012 Edition) Table of Contents (CISSP 2012 Edition) CONTENT UPDATES... 6 ABOUT THIS BOOK... 7 NETWORK INFRASTRUCTURE, PROTOCOLS AND TECHNOLOGIES... 8 OPEN SYSTEM INTERCONNECT... 8 LAN NETWORKING...10 ROUTING AND SWITCHING...13

More information

UNIT -I PART-A Q.No Question Competence BTL

UNIT -I PART-A Q.No Question Competence BTL VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur-60303. Department of Information Technology Academic Year: 06-07 QUESTION BANK- ODD SEMESTER Name of the Subject Subject Code Semester Year Department

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define

More information

Question No: 1 (Marks: 1) - Please choose one. For which of the following we need to know the classification of E-commerce?

Question No: 1 (Marks: 1) - Please choose one. For which of the following we need to know the classification of E-commerce? MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6) Solved Asslam O Alikum 100% solved papers of it 430 (2010) with reference by Afaaq and Shani bhai (7) Remember Us In Your Prayers Best regard

More information

(800) Toll Free (804) Fax Introduction to Java and Enterprise Java using Eclipse IDE Duration: 5 days

(800) Toll Free (804) Fax   Introduction to Java and Enterprise Java using Eclipse IDE Duration: 5 days Course Description This course introduces the Java programming language and how to develop Java applications using Eclipse 3.0. Students learn the syntax of the Java programming language, object-oriented

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A

UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION 2008 080250049-PERVASIVE COMPUTING PART A 1. Mention the characteristics of pervasive computing. Minimal user distraction Collaborative interaction User

More information

Course 834 EC-Council Certified Secure Programmer Java (ECSP)

Course 834 EC-Council Certified Secure Programmer Java (ECSP) Course 834 EC-Council Certified Secure Programmer Java (ECSP) Duration: 3 days You Will Learn How To Apply Java security principles and secure coding practices Java Security Platform, Sandbox, JVM, Class

More information

Full Stack Java Developer Course

Full Stack Java Developer Course T&C Apply Full Stack Java Developer Course From Quick pert Infotech Learning Process Java Developer Learning Path to Crack Interviews Full Fledged Java Developer Spring & Hibernate (Framwork Expert) PL

More information

Master of Business Administration- MBA Semester 3. MB0050 Research Methodology - 4 Credits. (Book ID: B1206) Assignment Set - 1 (60 Marks)

Master of Business Administration- MBA Semester 3. MB0050 Research Methodology - 4 Credits. (Book ID: B1206) Assignment Set - 1 (60 Marks) Master of Business Administration- MBA Semester 3 MB0050 Research Methodology - 4 Credits (Book ID: B1206) Assignment Set - 1 (60 Marks) Note: Each question carries 10 Marks. Answer all the questions.

More information

Rizvi College of Arts, Science & Commerce Bandra (W), Mumbai Teaching Plan Academic Year

Rizvi College of Arts, Science & Commerce Bandra (W), Mumbai Teaching Plan Academic Year Academic Year 17-18 Subject: ADVANCE JAVA Class : T.Y.B.Sc. (IT) DIV: Faculty: ARIF PATEL Months JUNE JULY AUGUST Topics to be covered Understanding Layout Manager. Swing: JColorChooser, JComboBox, JFileChooser,

More information

Why Firewalls? Firewall Characteristics

Why Firewalls? Firewall Characteristics Why Firewalls? Firewalls are effective to: Protect local systems. Protect network-based security threats. Provide secured and controlled access to Internet. Provide restricted and controlled access from

More information

JAVA COURSES. Empowering Innovation. DN InfoTech Pvt. Ltd. H-151, Sector 63, Noida, UP

JAVA COURSES. Empowering Innovation. DN InfoTech Pvt. Ltd. H-151, Sector 63, Noida, UP 2013 Empowering Innovation DN InfoTech Pvt. Ltd. H-151, Sector 63, Noida, UP contact@dninfotech.com www.dninfotech.com 1 JAVA 500: Core JAVA Java Programming Overview Applications Compiler Class Libraries

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

CS/IT321. Hall Ticket Number: April, 2017 Sixth Semester Time: Three Hours Answer Question No.1 compulsorily. Answer ONE question from each unit.

CS/IT321. Hall Ticket Number: April, 2017 Sixth Semester Time: Three Hours Answer Question No.1 compulsorily. Answer ONE question from each unit. CS/IT321 Computer Networks 1. Answer all questions (1X12=12 Marks) a. Differentiate WAN & MAN. b. What is meant by Packet Switching? c. How multicasting is different from Broadcasting? d. Define a subnet.

More information

DEPARTMENT OF COMPUTER APPLICATIONS CO 2009 REGULATION

DEPARTMENT OF COMPUTER APPLICATIONS CO 2009 REGULATION DEPARTMENT OF COMPUTER APPLICATIONS CO 2009 REGULATION Subject Code MC9211 MC9212 MC9213 MC9214 I YEAR I SEM / Subject Name Course Outcome Computer Organization Problem Solving And Programming DATABASE

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Call: Core&Advanced Java Springframeworks Course Content:35-40hours Course Outline

Call: Core&Advanced Java Springframeworks Course Content:35-40hours Course Outline Core&Advanced Java Springframeworks Course Content:35-40hours Course Outline Object-Oriented Programming (OOP) concepts Introduction Abstraction Encapsulation Inheritance Polymorphism Getting started with

More information

Oracle 10g: Build J2EE Applications

Oracle 10g: Build J2EE Applications Oracle University Contact Us: (09) 5494 1551 Oracle 10g: Build J2EE Applications Duration: 5 Days What you will learn Leading companies are tackling the complexity of their application and IT environments

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

JAVA. Duration: 2 Months

JAVA. Duration: 2 Months JAVA Introduction to JAVA History of Java Working of Java Features of Java Download and install JDK JDK tools- javac, java, appletviewer Set path and how to run Java Program in Command Prompt JVM Byte

More information

Acknowledgments Introduction. Chapter 1: Introduction to Access 2007 VBA 1. The Visual Basic Editor 18. Testing Phase 24

Acknowledgments Introduction. Chapter 1: Introduction to Access 2007 VBA 1. The Visual Basic Editor 18. Testing Phase 24 Acknowledgments Introduction Chapter 1: Introduction to Access 2007 VBA 1 What Is Access 2007 VBA? 1 What s New in Access 2007 VBA? 2 Access 2007 VBA Programming 101 3 Requirements-Gathering Phase 3 Design

More information

"Charting the Course... Mastering EJB 3.0 Applications. Course Summary

Charting the Course... Mastering EJB 3.0 Applications. Course Summary Course Summary Description Our training is technology centric. Although a specific application server product will be used throughout the course, the comprehensive labs and lessons geared towards teaching

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

Discipline : MCA. Semester : IV. Subject : Advanced Java Programming. Lesson Plan Duration : 15 weeks (from January 2018 to April 2018)

Discipline : MCA. Semester : IV. Subject : Advanced Java Programming. Lesson Plan Duration : 15 weeks (from January 2018 to April 2018) Name of the Faculty : Ms. Urvija Raina Discipline : MCA Semester : IV Subject : Advanced Java Programming Lesson Plan Duration : 15 weeks (from January 2018 to April 2018) Work Load (/ ) per week(in hours)

More information

Course Syllabus. Course Title. Who should attend? Course Description. ASP.NET ( Level 1 )

Course Syllabus. Course Title. Who should attend? Course Description. ASP.NET ( Level 1 ) Course Title ASP.NET ( Level 1 ) Course Description ASP Stands for Active Server Pages it s the most secure robust server side technology. It s used to create dynamic web applications, ASP.NET is a unified

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the

More information

WEB DEVELOPMENT COURSE

WEB DEVELOPMENT COURSE WEB DEVELOPMENT COURSE Genesys Preparing Students For Success In A Changing World. About Genesys Genesys is a career program designed to equip students with the professional skills required to secure successful

More information

This course is intended for Java programmers who wish to write programs using many of the advanced Java features.

This course is intended for Java programmers who wish to write programs using many of the advanced Java features. COURSE DESCRIPTION: Advanced Java is a comprehensive study of many advanced Java topics. These include assertions, collection classes, searching and sorting, regular expressions, logging, bit manipulation,

More information