(DMSIT21) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - I : Software Engineering Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Discuss in detail the capability maturity model integration. 2) How do you initiate requirement engineering process and explain requirement elicitation format. 3) Explain in detail various design elements in design model. 4) Explain black box testing technique in detail. 5) Explain the following : a) CK metrics suite b) Metrics for testing Section B (5 5 = 25) Answer any five questions 6) Discuss about different software myths and their corresponding realities. 7) Describe the prototyping process model. 8) Explain the communication practices of software engineering practice. 9) Explain the system engineering hierarchy. 10) Describe class Responsibility collaborator modeling of analysis model.
11) Develope different levels of DFD for safe home security function. 12) Discuss about the art of debugging. 13) Explain the function based metrics for the analysis model. Section C (5 1 = 5) Answer all questions 14) What is legacy software? 15) What do you mean by computer based system? 16) What is refactoring? 17) What are the factors of ISO 9126 quality factors? 18) What are cohesion metrics?
(DMSIT22) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 (Second Year) INFORMATION TECHNOLOGY Paper - II : Programming With C++ Time :.03 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Describe the following : a) Variable scope b) Dynamic memory allocation 2) Explain about call by value, call by reference and call by constant reference with suitable example. 3) What is pointer? How to create pointers in C++? Give the advantages of pointers. 4) What is operator overloading? Write a C++ program to overload +, operators for addition, subtraction of complex numbers respectively. 5) What is class template? What is its syntax? Explain class templates with multiple parameters. Section B (5 5 = 25) Answer any five questions 6) Explain about type casting is C++. 7) What is the syntax of switch structure? Write a program to accept a month number and display the maximum number of days in the month. 8) Describe any five string handling functions in C++. 9) What is constructor? Give the characteristics of constructors.
10) Explain about multiple inheritance with suitable example. 11) Explain how a single try block can be associated with multiple catch blocks. 12) Write a program to find number of characters, words and lines in a given text. 13) Briefly write about container classes. Section C (5 1 = 5) Answer all questions 14) What is a relational expression? 15) Differentiate between while loop and do-while loop. 16) What are formal arguments? 17) What is pointer? 18) What is function overriding?
(DMSIT23) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - III : TCP/IP Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Explain in detail about TCP/IP protocol with neat diagram. 2) Explain Network technologies and Internetworking in detail. 3) Describe ARP and RARP in detail. 4) Explain routing protocols in detail. 5) Explain client Server model in detail. Section B (5 5 = 25) Answer any five questions 6) Differentiate between Classless and classful addressing in detail. 7) Discuss about different categories of networks. 8) Describe routing IP datagram. 9) Write about user Datagram protocol. 10) Discuss about error and control messages. 11) Describe about ICMP. 12) Describe Socket Interface. 13) Write about DHCP.
Section C (5 1 = 5) Answer all questions 14) What is Internet? 15) Define protocol. 16) What is IP? 17) Define Datagram. 18) What is subnetting?
(DMSIT24) M.Sc. (Final) DEGREE EXAMINATION, DEC. 2014 (Second Year) INFORMATION TECHNOLOGY Paper - IV : Data Mining & Techniques Time : 3 Hours Maximum Marks : 75 Section - A (3 x 15 = 45) Answer any Three of the following 1) Briefly discuss about architecture of a typical Data Mining System. 2) Explain about Descriptive Data Summarization Model. 3) Discuss in detail about Bayesian classification. 4) Differentiate between Parallel and Distributed Algorithms clearly. 5) Explain score functions of Predictive Models. Section - B (5 x 5 = 25) Answer any Five of the following 6) Explain the components of Data Mining Algorithms. 7) What are different types of measurement for Data? 8) Describe about Multidimensional Scaling. 9) Explain CART algorithm for building tree classifiers. 10) Discuss about Fundamentals of Modeling. 11) Explain about different patterns for strings.
12) What is Multivariate Parameter optimization? 13) What are special-purpose Algorithms for Disk Access. Section - C (5 x 1 = 5) Answer all questions 14) What is snooping? 15) What are forms of Data? 16) What is classification? 17) Define Regression. 18) What is OLAP?
(DMSIT25) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - V : Cryptography and Network Security Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions 1) Describe DES encryption algorithm with an example. 2) Write extended Euclidean algorithm and use it to find the multiplicative inverse of 24140 mod 40902. 3) Explain in detail the key distribution techniques. 4) Describe RSA algorithm with an illustrative example. 5) Discuss about firewall design principles. Section B (5 5 = 25) Answer any five questions 6) Explain the transposition cipher with an illustrative example. 7) Describe the evaluation criteria for AES. 8) Explain the difference between the AES decryption algorithm and equivalent inverse cipher. 9) Explain the RC4 algorithm. 10) Discuss about different approaches to generate random numbers. 11) Explain the Miller- Rabin algorithm to test a large number for primality.
12) Explain the mutual authentication technique. 13) Discuss about UNIX password protection scheme. Section C (5 1 = 5) Answer all questions 14) What is symmetric cipher? 15) What is the purpose of the state array? 16) What is a nonce? 17) Define Euler s totient function? 18) What is a honeypot?
(DMSIT26) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 (Examination at the end of Second Year) INFORMATION TECHNOLOGY Paper - VI : Artificial Intelligence Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three of the following 1) What is state space approach? Explain about watering problem through state space approach. 2) a) Differentiate Depth first search and breadth first search technique. b) Describe various approaches and issues in knowledge representation. 3) Explain about the steepest Ascent Hill climbing technique in detail. 4) Explain about the characteristic features of expert systems in detail. 5) Explain about the semantic nets. Suggest a semantic net to describe the main organs of the human body. Section B (5 5 = 25) Answer any five questions 6) Explain about the applications of AI. 7) Write a short notes on heuristic search technique. 8) Discuss about back propagation training 9) Explain about monotonic and non-monotonic reasoning problem. 10) Explain about semantic analysis. 11) Explain about symbolic based learning techniques.
12) Explain the memory organization of commonsense behaviour. 13) Write a short notes on Dempster shafer theory. Section C (5 1 = 5) Answer all questions 14) What is AI? 15) What is frame? 16) Define predicate. 17) What is crypt arithmetic problem? 18) Define an Expert system.