Sie sind auf Seite 1von 9

Thiru Seven hills Polytechnic College

Maduravoyal,Chennai-95

Mobile computing

Part-A

Answer any Fifteen questions. Each question carries 1 mark.

1. List any two dimension of multiplexing

2. Expand the term FDMA

3. List any two terminology of mobile computing.

4, Define cell.

5. Expand SMS

6. What is a piconet?

7. What frequency the Bluetooth operate?

8.. What do mean by L2CAP?

9. List any two advantages of WAP.

10. What is WML script?

11. write down the language supported by WAP 2.0.

12. List any two feature of WML

13. what is fast retransmit?

14. Define Reverse tunneling

15. List any four TCP supported by Mobile Transport Layer.

16. What is congestion?

17. Name two wireless application languages

18. Mention any two feature of 4G.

19 Expand DSL.

20.Mention the uses of XML.

Part-B

Answer all questions choosing elther A or B from each question. Each question carries 12 Marks

21 A L Explain the architecture and function of moblle computing ll. What are the difference between

I
Infrared and Radio transmission. [OR]

B. l, Explain in detail the different types of communication technologies used in mobile

li. Explain the concept of Wi-FI

22 A 1.with a neat diagram explain Bluetooth Protocol II) What are limitations of GPRS? Explain. ORl

B Explain SMS architecture in detail ii Explain GSM architecture with neat block diagram

23 i. Explain the main architectural components of wAP 2.1. II)6 What do you mean by wAE? Explain
brlefly OR

B I)Explaan spread spectrum technology In detail li. State the differences between CDMA and GSM.

24 A 1. Briefly explain about Adaptive routing H. List down the steps for processing of IP packet delivery
OR

B i. Explain tunneling and encapsulation in Mobile iP ii. Write briefly snooping TCP and Mobile TCP

25 A. l. Explain how wireless application are created using J2ME ii. Explain briefly about Android
Mobile operating system[OR]

B. l. What are enhanced message service in mobile? ii. Explain about 4G features in Mobile system

I
Thiru Seven hills Polytechnic College

Maduravoyal,Chennai-95

Computer networks and security

Part-A

Note: answer 5 out of 8.Each carry two marks .8 is compulsory.

1. Define data communication

2. Give the full form of VSAT.

3. Define protocol

4. What is switching

5. Define subnetting

6. Define HTTP

7. Define cryptography

8. What is hacking?

Note: answer 5 outopology

ach carry three marks .16 is compulsory.

9, Explain ring topology

10 Give any four needs for computer networks.

11 Explain standard.

12 Explain the ISDN services.

13, Explain connection oriented and connection less service.

I
14. Give the important needs for security.

15. Write short notes on digest function.

16, Write short notes on virus.

PART C[Note: (1) Answer all questions from 17 to 21 either A or B.

(2) Each question carries 10 marks

17 A. Briefly explain about any three topologies De[or]

B. Briefly discuss about(a) switch(b) router

18. A. Explain the function of OSI layers. [or]

B. Explain ISDN and explain its services.

19. A. Expal in TCP or

B. With example explain subnetting.

20. A. Explain RSA algorithm. (or)

B. Explain the working of kerberos encryption,

21 A. Explain historical hacking techniques and open sharing. [or]

B. Explain honey pots.

Thiru Seven hills Polytechnic College

Maduravoyal,Chennai-95

Advanced Java Programming

Model Exam

Time: 3 Hrs PART-A Marks 15 x 1 15

I
Note Answer Questions carry equal marks any 15 Questions All

1 Expand the term URL

2. Define the term Socket

3. What Is the length of lPve address?

4, which class is used to create TCP server?

5. ust out the Constructors for Label dass

6. Which package is used to create GUI based application?

7, What are the uses of Frame class?

8. What is the role of panel class?

9. Give the types of JDBC drivers

10. What is the result set?

11. Write the names of JDBC drivers.

12. Last out JDBCadvanced data types.

13. What is the HTTP Utils?

14. Define: cookies.

15. Which method is used for Response Redirection?

16. Define the term Session.

17. Give the usage of Bean Jar files.

18. Which interface is implemented to give bean properties?

19. Expand: BDK

20. What is a method descriptor?

Note:Answer all questions

21.A.Explain URL and URI classes. or

B.Describe Server socket classes.

22. A. List and explain any 3 AwT components(OR)

B. Explain any three swing components

23. A. Explain JDBC and Compare JDBC with oDBC. (OR)

B. Explain basic datatypes in JDBC.

I
24. A. Explain servlet life cycle with neat diagram(OR)

B. Explain Database access with JDBc inside servlet.

25. A. Explain Beanlnfo interface, with its methods(OR)

B. Explain the Property editor.

I
Thiru Seven hills Polytechnic College

Maduravoyal,Chennai-95

Information security

Model Exam

1. Define information security.

2. What is CIA Triangle?

3. What is spoofing.

4. What is worm?

5. What is residual risk.

6. What is content filter.

7. Define firewall.

8. Name any two physical security controls.

9. Explain history of information security.

10. Explain NSTISSC security model.

11. Define threats and its characteristics.

12. How will you determine the risk.

13. Explain IDPS.

14. What is man trap? .

15. Explain risk control cycle with flowchart.

16.Write any one cryptographic algorithm.

17. A.Describe the components of information system.(or)

B. Explain about sdlc.

18. A.Explain 1. malicious code 2. denial of service.(or)

B. Discuss the ethical concept of information security.

19.A. explain any two risk control strategies.(or)

I
B. Explain the different data classification schemes.

20.A. write short notes on 1. packet filtering firewall 2. state full inspection firewall.(or)

B. Explain VPN.

21. A.Discuss about physical security controls.(or)

B. Discuss about power management and air conditioning.

Das könnte Ihnen auch gefallen