Saturday 14 April 2018

SYSTEM MANAGEMENT ISBM MBA EXAM ANSWER SHEETS PROVIDED WHATSAPP 91 9924764558

SYSTEM MANAGEMENT ISBM MBA EXAM ANSWER SHEETS PROVIDED WHATSAPP 91 9924764558

CONTACT:DR. PRASANTH MBA PH.D. DME MOBILE / WHATSAPP: +91 9924764558 OR +91 9447965521 EMAIL: prasanththampi1975@gmail.com WEBSITE: www.casestudyandprojectreports.com


System Management
Section A: Objective Type (20 marks)
 This section consists of Multiple Choice Questions & Fill in the blanks / True & False.
 Answer all the Questions.
 Each Question carries 1 Mark.
Part One:
Multiple choices
1. TCP stands for
a. Translate Control Protocol
b. Translate Cable Protocol
c. Transmission Control Program
d. Transmission Cable Program
2. Why we do not tap into a 10Base2 or 10BaseT cable in the same way as we tap with 10Base5 cable?
a. Because the cable is so thin.
b. Because the cable is so strong.
c. Because the cable is so thick.
d. Because the cable is so fat.
3. The Ethernet has its roots in an early packet radio network called
a. SMA
b. PARC
c. RWS
d. ALOHA
4. ___________is the second major class of Intra Domain Routing protocol.
a. Reliable Flooding
b. Link State
c. Route Calculation
d. Implementation
5. A Network that provides a constant band width for the complete duration of message transfer is a
a. Cell switched Network
b. Packet switched Network
c. Circuit switched Network
d. None of the above
Examination Paper of Information System Management
2
IIBM Institute of Business Management
6. A router :-
a. Forwards a packet to all outgoing links upto which the packet originated.
b. Determines on which outgoing link a packet is to be forwarded
c. Forwards a packet to the next free outgoing link
d. Forwards a packet to all outgoing links
7. What is the maximum speed of 10Base5 Ethernet Cable?
a. 100 Mbps
b. 500 Mbps
c. 50 Mbps
d. 10 Mbps
8. What is the maximum number of addressable stations on a 10BaseT Ethernet network?
a. 1024
b. 2500
c. 200
d. 512
9. A device that encodes analog voice into a digital ISDN Link is called
a. DSL
b. GSM
c. CODEC
d. AMPS
10. One of the small difference between the IBM Token Ring specifications and 802.5 is that
a. The former actually requires the use of MSAUs.
b. The former actually requires the use of MAC.
c. The former actually requires the use of TTRT.
d. None of the above
True & False
11. The sliding window protocol is the best known algorithm in computer networking.
12. One of the issues that faces a network designer is how to make this decision in a fair
manner.
13. Multicast addresses area used to send messages to subset of the hosts on an Ethernet.
14. 802.11 can support collision detection.
15. A Network Interface card operates at the Network Layer of the OSI model.
16. TCP port 5432 is the well known server part.
17. CPU is directly responsible for moving data between two networks.
18. Classless inter domain routing is a technique that addresses four scaling concerns in the
Examination Paper of Information System Management
3
IIBM Institute of Business Management
Internet.
19. LAN is a connection oriented packet-switching technology.
20. Ethernet addresses are configured into the network adaptor by the manufacturer.
Section B: Short Questions (20 marks)
 This section consists of Short Questions.( Answer should be in 5 lines)
 Answer all the questions.
 Each Question carries 5 marks.
1. What are the benefits of Packet Switching?
2. What is an Internetwork?
3. What protocols are there in the TCP/IP internet Layer?
4. What is difference between Virtual circuit Switching and Cell Switching?
Section C: Long Questions (30 marks)
 This section consists of Long Questions.(word limit 100 words)
 Each Question carries 10 marks.
 Attempt any 3 Questions.
1. Write a short note on Classless Inter Domain Routing (CIDR)?
2. What distinguish a computer network from other type of networks?
3. What are the Salient features of Global Internet?
4. Distinguish between Reverse-Path Multicast (RPM) and Protocol Independent Multicast?
END OF SECTION A
END OF SECTION C
END OF SECTION B
Examination Paper of Information System Management
4
IIBM Institute of Business Management
Section D: Applied Theory (30 marks)
 This section consists of Applied Theory Questions.
 Answer all the Questions.
 Each Question carries 15 marks.
 Detailed information should form the part of your answer (Word limit 200 to 250 words).
1. The Sliding window protocol is perhaps the best known algorithm in computer Network. Describe however is that it can be used to serve different roles.
2. Explain, how the Sliding Window Algorithm works in Direct Link Network?
END OF SECTION D
Examination Paper of Information System Management
5
IIBM Institute of Business Management
IIBM Institute of Business Management
Examination Paper MM.100
Operating Systems
Section A: Objective Type (20 marks)
 This section consists of Multiple Choice Questions & Fill in the blanks / True & False.
 Answer all the questions.
 Each Question carries 1 mark.
Part One:
Multiple Choices:
1. The PCD data is allocated using a data Structure is called______________
a. Heap
b. Object Module
c. Tag
d. Head
2. Process is
a. Language of programme
b. Name of a computer software
c. An execution of programme
d. None of the above
3. Streaming tape can store record
a. Without a break irrespective of its size
b. With a break in size of record
c. Of size 10 kb
d. Both (a) & (c)
4. _______________is a policy decision based on the page reference information available in the page table.
a. Memory Allocation
b. Shared Pages
c. Page Replacement
d. Memory Mapping
5. Remote procedure call (RPC) is used by an application execute
a. To execute a procedure in the system
b. To execute a procedure in another compute in the distributed system
c. Name of a software
d. None of the above
Examination Paper of Information System Management
6
IIBM Institute of Business Management
6. Multiprocessor computer system provides
a. Slow performance by serving several processes simultaneously
b. High performance by serving several processes simultaneously
c. High performance by serving one process
d. None of the above
7. Remote procedure call (RPC) is used by an application execute
a. To execute a procedure in the system
b. To execute a procedure in another compute in the distributed system
c. Name of a software
d. None of the above
8. A distributed transaction is also called
a. Single-site transaction
b. Two –site transaction
c. Multi-site transaction
d. Both (a) & (b)
9. File control block (FCB) contains all information concerning
a. A file processing activity
b. Execution activity
c. Both (a) & (b)
d. None of the above
10. Non-uniform memory architecture system consists of number of nodes and each node consists
a. Monitor
b. Register
c. Both (a) & (b)
d. 1 or more C.P.Us
True & False:
1. CPU helps in effective memory management by an OS.
2. High reliability in distributed file systems can be ensured through sharing semantics.
3. The compatible time sharing system for the IBM 7094 was one of the first time sharing systems.
4. The Processors of multiprocessors are divide into processor sets.
5. A resource rank is associated with each resource class.
6. A cached directory is a copy of directory that exists at a primary site.
7. A cluster of nodes is a section of the distributed system that contains sufficient hardware and software resources.
Examination Paper of Information System Management
7
IIBM Institute of Business Management
8. A cycle is a sufficient condition for a deadlock in MISR system
9. File system integrity implies correctness and consistency of control data and operations of the file system.
10. A mathematical model consists of three components model of the server
Section B: Short Questions (20 marks)
 This section consists of Short Questions (Answer should be in 5 Line).
 Answer all the questions.
 Each Question is of 5 marks.
1. What do you mean by “Authentication”?
2. Distinguish between File System and IOCS.
3. Define “Segmentation with Paging”.
4. Describe the Deadlock characteristics for different resource system.
Section C: Long Questions (30 marks)
 This section consists of Long Questions (Word Limit 100 words)
 Each question carries 10 marks.
 Attempt any three Questions.
1. Write a Short Note on “Structure of an Operating System”.
2. Define Request-Reply-Acknowledgement Protocol and Explain a Blocking version of RRA Protocol.
3. Explain how starvation is avoided the UNIX and Window system?
4. Discuss influence of disk scheduling algorithms on effectiveness of I/O buffering?
END OF SECTION B
END OF SECTION A
Examination Paper of Information System Management
8
IIBM Institute of Business Management
Section D: Applied Theory (30 marks)
 This section consists of Applied Theory Questions.
 Answer all the Questions
 Each question carries 15 marks.
 Detailed information should form the part of your answer (Word limit 200 to 250 words).
1. Describe why authentication is important for file protection?
2. Show actions of the basic and control parts of a process to important Ricart-Agrawala Algorithm?
S-2-301012
END OF SECTION D
END OF SECTION C

No comments:

Post a Comment