(COMMON TO COMPUTER SCIENCE, COMPUTER SCIENCE &
is meant by Distributed system, Give some examples.
b) Explain about the architecture of distributed applications.
2. a) Explain various forms of computing.
b) Explain about peer
3. a) Explain about RPC Model.
b) Explain ho
w to choose a paradigm for an application.
a)Explain the advantages and disadvantages of distributed computing systems.
b) Briefly explain the Operating System concepts relevant to distributed computing.
5. Briefly explain the following Distributed
a) Object Space Paradigm
b) Mobile Agent Paradigm
c) Network Services Paradigm
d) Groupware Paradigm
6.a) Compare and Contrast between RMI and Remote Procedure Calls (RPC).
b) Explain in details the comparison of RMI
and Socket API.
7.a)Explain about different forms of computing.
b) Explain about strengths & weaknesses of Distributed Computing
8.a) Explain operating system concepts relevant to distributed computing.
b) Explain the Client
Explain the Distributed objects paradigms in detail
a) Compare & contrast the features of distributed databases Vs centralizeddatabases?
b) Briefly discuss about
es of data fragmentations.
With the help of neat examples explain how the global queries are translated into
Elaborate the objectives in query processing optimization
Discuss in detail the technical aspects of database administration in a distributed environment.
a) Describe the classification of optimization algorithm.
b) Discuss a model for query optimization.
Explain multi database concurrency contro
l algorithms in detail
ADVANCED COMPUTER ARCHITECTURE
Name some most important functional requirements that need to be considered in
a new machine along with features required to take care of the needs.
b) How the performance of computer systems are measured? Describe methodology.
. List out the data addressing modes that have been used recently in computers along
instruction, meaning and usage of these instructions
a) Discuss the challenges faced by the computer architect of ISA.
b) Give a short note on implementation technologies for computer.
.a) Explain various data addressing modes.
between packed decimal and unpacked decimal.
.a) Discuss the implementation of five
b) Explain advanced optimizations of cache performance
ADVANCED COMPUTER NETWORKS
.a) What are the reasons for using layered protocols?
b) List the five key differences between OSI reference model and TCP/IP reference model.
) Briefly explain the coaxial cable, optical fiber, twisted pair and their applications.
b) A bit stream 10011101 is transmitted using the standard CRC method. The generator polynomial is x
show the actual bit string transmitted. Suppose th
e third bit from left is inverted during transmission show
that this error is detected at receiver’s end.
.a) Give the HDLC frame format and explain bit stuffing scheme. Also give and explain the control field
format of different types of frames u
b) Explain in detail about the access method and frame format used in Ethernet
INFORMATION RETRIEVAL SYSTEM
) What is the impact on precision and recall in the use of Stop Lists and Stop Algorithms?
b) What is the difference between the concept of a “Digital Library” and an Information Retrieval System?
a) What are the similarities and differences b
etween use of fuzzy searches and term masking? What are the
potentials for each to introduce errors?
b) What problems does multimedia information retrieval introduce? What solutions would you recommend
to resolve the problems?
. a) What is indexin
g? Explain its objectives.
b) Under what circumstances is manual indexing not required to ensure finding information? Postulate an
example where this is true.
. a) What is the impact on precision and recall in the use of stop lists a
b) What is difference between the concept of Digital Library and an Information Retrieval Systems?
a) What are the similarities and differences between use of fuzzy searches andterm masking?
b) Brief note on Browse Capabilities.
a) What are the objectives of an Indexing?
b) Trade off the use of precoordination vs. postcoordination
) Explain the model for Network Security.
b) What are the different types of Security Attacks? Give the mechanisms to counter them.
a) Explain DES Algorithm, and security of its s
b) Show that Inverse of DES algorithm is again DES.
Explain the RSA Algorithm Completely.
b) In a public key system using RSA, you intercept the cipher text c=10 sent to a user whose public key is e=5,
n=35. What is the plaintext M?
a) Explain about various security service
s and attacks in detail?
b) Give a brief note on Buffer overflow & format string vulnerabilities? [6+6]
. a) Give a detailed description of various cipher block modes of operation?
b) Discuss in detail SHA algorithm? [6+6]
. a) Distinguish betw
een RSA and DSA algorithms?
b) Explain the various fields of X.509 V3 digital certificate, giving its format?