Showing posts with label job. Show all posts
Showing posts with label job. Show all posts

Monday, August 6, 2007

Examination Fees Applicable from DEC2007

Important Notice! IGNOU finally has declare examination fees from TERM END DEC2007 for all its courses. And also change the schedule of submission of form. Now its Rs. 50/- per paper. So if you want to give 10 papers then you have to submit Rs. 50*10= Rs. 500 as examination fees. In their website give it details. They also have change the format of examination form, so now this time when you are filling the examination form be sure that it is new one.
DATE OF SUBMISSION OF EXAMINATION
FORMS FOR DEC TEE---------------------------LATE FEE

1ST SEPTEMBER TO 30TH SEPTEMBER------------NIL
1ST OCTOBER TO 20TH OCTOBER-------------------RS.100/-
21ST OCTOBER TO 15TH NOVEMBER-----------------RS.500/-
16TH NOVEMBER TO 28TH NOVERBER----------------RS.1000/-

Term-End Examination JUNE, 2007 ( CS-09 )

Term-End Examination JUNE, 2007

CS-09 : DATA COMMUNICATION AND NETWORKS

Time : 3 hours Maximum Marks : 75

Note : question number 1 is compulsory. Answer any three questions from the rest.

1.(a) Draw the waveforms of (i) ASK, (ii) FSK and (iii) PSK for the data 110101100. [ 6 ]

(b) What is the prupose of multiplexing? Differentiate between time division multiplexing and frequency division multiplexing. [ 4 ]

(c) Compare Ethernet, token ring and FDDI on following parameters : [ 4 ]
(i) access method
(ii) Signalling
(iii) Data rate
(iv) Error control

(d) Discuss the functioning of Internet Control Message Protocol. [ 4 ]

(e) Explain distance vector routing algorithm with the help of suitable examble. [ 4 ]

(f) For what purpose is leaky bucket algorithm used? Explain any other algorithm used for the same purpose. [ 4 ]

(g) An analog signal is limited to 4 KHz. It is converted to a PCM signal using 8 bit/sample. What is the bit rate on the transmission line? [ 4 ]


2.(a) Differentiate between Baseband Signal and Broadband Signal. [ 5 ]

(b) Explain the following terms with respect to TCP : [ 10 ]
(i) stream data transfer
(ii) Reliable service
(iii) Window size
(iv) Urgent pointer
(v) Checksum


3.(a) At what layer is sliding window protocol used? Explain the protocol and also discuss the issues which are considered while deciding the window size. [ 9 ]

(b) Construct a systematic (7,4) cyclic code using generator polynomial
g(x)=x^3 + x^2 + 1
consider the data vector d=1010. [ 6 ]

4.(a) Enlist the parameters to measure the efficiency of the network and explain in brief. [ 4 ]

(b). What are various signal encoding techniques, used at physical layer of LAN? [ 4 ]

(c). Calculate the number of networks that can exist in class A, B, C IP addresses. Also calculate the number of hosts a network in each class can have. [ 7 ]


5.(a) Explain using diagrams, how the process of formation and pruning of a spanning tree takes place in multicast routing. [ 5 ]

(b). What is the application of Network Address Translation Box? Also explain its operation. [ 5 ]

(c). If signal to noise ration is 7 dB and bandwidth is 10 kHz, find [ 5 ]
(i). the capacity of a channel.
(ii). What should the signal to noise ratio be in dB to increase the capacity by 20% f calculated capacity.

Friday, August 3, 2007

Term-End Examination JUNE, 2007 ( CS-15 )

Term-End Examination JUNE, 2007

CS-15 : RELATIONAL DATABASE MANAGEMENT SYSTEM

Time : 3 hours Maximum Marks : 75


Note : Question number 1 is compulsory. Answer any three questions from the rest.

1.( a ) In an organization several projects are undertaken. Each project can employ one or more employees. Each employee can work on one or more projects. Each project is undertaken on the request of a client. A client can request for several projects. Each project has only one client. A project can use a number of items and an item may be used by several projects. Draw an ER-diagram and convert it into a Relational Schema. [ 8 ]


( b ) Describe the multi-version technique for Concurrency Control. [ 7 ]

( c ) How is the check-pointing information used in the recovery operation following a system crash ? [ 7 ]

( d ) Describe two phase commit protocol in distributed databases. [ 8 ]


2.( a ) ( i ) The following relations are used to store data about students, courses and enrolment of students in courses and teachers of courses. (Primary key in relation is marked by *)
Students (rollno*, sname, saddr)
Enrol (rollno, cno*, grade)
Teach (tno*, tname, cno*)
Write Create Table statements for defining the above tables.
Further write SQL statements to get rollno and names of students who have got an ‘A’ grade in a course taught by “Rohan”. [ 9 ]

( ii ) What is QBE ? [ 3 ]

( b ) Why are certain functional dependencies called “trivial functional dependencies” ? Explain. [ 3 ]


3.( a ) Consider the following relations :
ITEM (I#, INAME)
ORDER (O#, ONAME, CNAME)
ORDERITEM (I#,O#)
Write the relational algebra queries for the following :
(i ) Get the details of items ordered by the customer “Sohan”.
( ii ) Get the Item Nos. of items which are included in all orders. [ 6 ]

( b ) Discuss “Wait-die” and “Wound-wait” approaches of deadlock avoidance. Compare these approaches of deadlock avoidance with a deadlock avoidance approach in which data items are locked in a particular order (according to their rank). [ 9 ]


4.( a ) What are the relative advantages and disadvantages of Record-level logging. Page level logging and Query language logging ? [ 9 ]

( b ) describe normalization using join dependency with the help of an example. [ 6 ]


5. Explain the following terms : [ 15 ]
( i ) Physical data independence
( ii ) Sequential data retrieval in hierarchical model
( iii ) Content dependent access control
(iv ) Distributed locking
( v ) Domain integrity

 

Subscribe in a reader

Add to Technorati Favorites