#1
July 19th, 2014, 07:55 AM
| |||
| |||
Please provide me question paper for Diploma in Computer Engineering examination of Maharashtra State Board of Technical Education ? Here I am giving you question paper for Diploma in Computer Engineering examination of Maharashtra State Board of Technical Education..... The following subjects are covered in the second semester of Diploma in Computer Science. Subjects: Applied Mathematics Applied Physics Applied Chemistry Basics of Electronics & Mechanical Engineering Basics of Electrical & Civil Engineering Applied Mechanics Concepts in Information Technology 1. a) Attempt any THREE of the following: 12 (i) Explain the need of security. (ii) Explain Active and Passive attacks. (iii) State four types of problems due to translation of unauthorized software. (iv) Explain password management in details. b) Attempt any ONE of the following: 6 (i) Explain secure code technique and buffer overflows. (ii) Describe operation system hardening. 2. Attempt any TWO of the following: 16 a) Explain DES. b) Describe SSL protocol in web security. c) How digital signature works in security explain in detail. 3. Attempt any FOUR of the following: 16 a) What are the threats to security? b) Explain VPN with diagram. c) Explain physical security. d) Which are individual user responsibilities in security. 4. a) Attempt any THREE of the following: 12 (i) Explain detail of service attack with example. (ii) Explain man in middle attack. (iii) Describe how secure electronic transaction works. (iv) Write eight good practices for software development. b) Attempt any ONE of the following: 6 (i) Explain working of IDS in detail? (ii) Explain role of biometrics in security. MSBTE Diploma Computer Engineering 5th Semester Paper Instructions – (1) All Questions are compulsory. (2) Figures to the right indicate full marks. (3) Assume suitable data, if necessary. (4) Mobile Phone, Pager and any other Electronic Communication devices are not permissible in Examination Hall. Marks 1. a) Attempt any THREE of the following: 12 (i) Explain the need of security. (ii) Explain Active and Passive attacks. (iii) State four types of problems due to translation of unauthorized software. (iv) Explain password management in details. b) Attempt any ONE of the following: 6 (i) Explain secure code technique and buffer overflows. (ii) Describe operation system hardening. Marks 2. Attempt any TWO of the following: 16 a) Explain DES. b) Describe SSL protocol in web security. c) How digital signature works in security explain in detail. 3. Attempt any FOUR of the following: 16 a) What are the threats to security? b) Explain VPN with diagram. c) Explain physical security. d) Which are individual user responsibilities in security. e) Explain hot fix and patch. 4. a) Attempt any THREE of the following: 12 (i) Explain detail of service attack with example. (ii) Explain man in middle attack. (iii) Describe how secure electronic transaction works. (iv) Write eight good practices for software development. b) Attempt any ONE of the following: 6 (i) Explain working of IDS in detail? (ii) Explain role of biometrics in security. 5. Attempt any TWO of the following: 16 a) Explain E-mail security in details. b) Describe Deffie - Hellman algorithm with example. c) How IPSee works in security? Explain in detail. Marks 6. Attempt any FOUR of the following: 16 a) Describe piggybacking and phishing. b) Explain firewall in detail. c) Explain the general step for security windows operating system. d) Explain Caesar’s Cipher with example. e) Explain the concept of Hashing. Instructions – (1) All Questions are compulsory. (2) Illustrate your answers with neat sketches wherever necessary. (3) Figures to the right indicate full marks. (4) Mobile Phone, Pager and any other Electronic Communication devices are not permissible in Examination Hall. Marks 1. a) Attempt any THREE of the following: 12 (i) What is software? What are its characteristics? (ii) Define software testing. What do you mean by a good test and successful test. (iii) What is project scheduling and tracking? (iv) What is software reliability and software availability? Explain in brief. b) Attempt any ONE of the following: 6 (i) What is RE? (Requirement Engineering) What is its need? What are different subtasks included in it? (ii) Explain DFD with example? Marks 2. Attempt any FOUR of the following: 16 a) What are different analysis modeling approaches and explain them in brief. b) What do you mean by testing strategy? What is test plan, test case and test data? Explain with example. c) Explain six sigma strategy. d) Explain the utility of incremental model. e) What are communication principles. Explain their meaning. f) What are different types of testing? What is their purpose. 3. Attempt any FOUR of the following: 16 a) Explain CPM. How is it different from PERT ? b) Explain software verification and validation. c) What do you mean by software risk? What are reactive and proactive risk strategies? d) What are the principles used for project scheduling and explain their meaning. e) Explain different decomposition techniques. 4. a) Attempt any THREE of the following: 12 (i) Explain COCOMO II Model. (ii) Explain different approaches of integration testing. (iii) What are different data design elements and architectural design elements? (iv) Compare White-Box and Black-Box testing. Marks b) Attempt any ONE of the following: 6 (i) Explain CMMI. (ii) Explain waterfall model with diagram. 5. Attempt any TWO of the following: 16 a) Explain analysis modeling and design modeling in brief. b) Explain RMMM strategy in detail. c) Explain evolutionary process models. 6. Attempt any FOUR of the following: 16 a) Explain alpha and beta testing. What is the difference between the two. b) What are PSP and TSP framework activities? Explain their meaning. c) What is SCM? What is its need? What are its features? d) Write in brief on ISO 9000 quality standard. e) What are different debugging strategies? Explain any one in brief? Last edited by Anuj Bhola; October 19th, 2019 at 02:20 PM. |
|