www.studentyogi.com
        Code No: RR421203
                                                                            ...
www.studentyogi.com
        Code No: RR421203
                                                              Set No.1
     ...
www.studentyogi.com
        Code No: RR421203
                                                                            ...
www.studentyogi.com
        Code No: RR421203
                                                                            ...
www.studentyogi.com
        Code No: RR421203
                                                                            ...
www.studentyogi.com
        Code No: RR421203
                                                                            ...
www.studentyogi.com
        Code No: RR421203
                                                                            ...
www.studentyogi.com
        Code No: RR421203
                                                                            ...
Upcoming SlideShare
Loading in …5
×

Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}

1,743 views

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,743
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
49
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}

  1. 1. www.studentyogi.com Code No: RR421203 Set No.1 www.studentyogi.com IV B.Tech. II Semester Regular Examinations, May -2007 CLIENT SERVER COMPUTING (Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) Describe the characteristics of all client/server systems. (b) Explain what a client needs from an operating system. [10+6] 2. (a) What do es transparency mean? (b) What are the di erent types of transparencies the NOS middle ware is expected to provide? (c) How does the NOS address the problem of distributed time? [3+8+5] 3. (a) Explain the process-per-client Data base server architecture. (b)Give exa mples of data base servers that implement the process-per-client ar- chitecture. (c) Explain the JDBC 2-Tier plus and JDBC 2-Tier(simple) architectures. (d) What is the di erence between a Decision support system and an Executive information system. [5+2+6+3] 4. (a) What is meant by a transaction? (b) Discuss brie y the ACID properties that make transactions desirable com- modities in client/server computing. (c) What is a TP monitor? What are its functions? (d) Compare the database requirements of OLTP and DSS. [2+4+4+6 ] 5. (a) Why is Group ware important? (b) How is Group ware di erent from SQL Databases? (c) Explain brie y how a Notes application is built. (d) What are the bene ts of using client/server oriented TP Monitors.[3+3+4+6] 6. (a) What makes Transactional communications di erent from traditional commu- nication models? (b) Discuss brie y the Group ware constituent Technologies. [6+10] 7. (a) What kind of services does a Domino Mail server provide? (b) Compare the messaging (MOM) and RPC architectures. (c) What are the limitations of the two-phase commit protocol? [5+7+4] 8. Write notes on the following: 1 of 1 www.studentyogi.com www.studentyogi.com
  2. 2. www.studentyogi.com Code No: RR421203 Set No.1 www.studentyogi.com (a) Security sockets Layer (SSL) (b) Proxy Firewalls. (c) The Five Axes of client/server Tools. [4+4+8] 2 of 1 www.studentyogi.com www.studentyogi.com
  3. 3. www.studentyogi.com Code No: RR421203 Set No.2 www.studentyogi.com IV B.Tech. II Semester Regular Examinations, May -2007 CLIENT SERVER COMPUTING (Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) Explain in detail what makes client/server di erent from other forms of dis- tributed software. (b) Compare 2-tier and 3-tier client/server architectures. [8+8] 2. (a) What is a Digital certi cate? (b) What information does an X.509 certi cate contain? (c) Compare MOM(messaging) and RPC architectures. (d) What mechanisms NOSS provide for dealing with tampering and confidentiality of in-transit-data. [2+3+6+5] 3. (a) Explain the Hybrid Database server Architecture. (b) Give examples of data base servers that implement this Architecture. (c) Explain brie y the elements of a Dataware housing system. [4+2+10] 4. (a) Explain the extended services the server programs can expect to get from their opetrating systems. (b) Discuss the following clustering Architectures: i. shared-disk ii. shared-nothing. 5. (a) What is TP-lite? What is TP-Heavy? (b) What are the di erences between Process-oriented work ows and Ad hoc work ows? (c) What are the functions provided by the combined Notes/Domino client/server application development and run-time environment? [4+4+8] 6. (a) Discuss the JDBC 2-Tier and JDBC 2-Tier plus Architectures. (b) What are the bene ts of JDBC 2-Tier plus Architecture? (c) Compare the programming e orts for DSS and OLTP. [6+6+4] 7. (a) Discuss the following Internet Mail protocols: i. SMTP ii. IMAP4 iii. POP3. 1 of 1 www.studentyogi.com www.studentyogi.com
  4. 4. www.studentyogi.com Code No: RR421203 Set No.2 www.studentyogi.com (b) Discuss the various operations allowed to be performed by the Lotus Notes API. (c) What is data mining? What searching methods are generally used by data mining tools? [6+6+4] 8. Write notes on the following: (a) Rapid proto typing metho dology. (b) Summary of the features that distinguish OOUIs from GUIs. (c) Virtual Private Network. [4+9+3] 2 of 1 www.studentyogi.com www.studentyogi.com
  5. 5. www.studentyogi.com Code No: RR421203 Set No.3 www.studentyogi.com IV B.Tech. II Semester Regular Examinations, May -2007 CLIENT SERVER COMPUTING (Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) Explain the following client/server models: i. Fat server mo del ii. Fat client model. (b) How does 3 tier client/server system compare with 2 tier client/server system. (c) Give examples of 2 tier client/server systems. [6+8+2] 2. (a) Explain the shared private key approach to encryption with the help of a suitable diagram. (b) Explain with a simple application how the RPC mechanism works. [6+10] 3. (a) Explain the Multithreaded Database server architecture. (b) Give examples of data base servers that implement this architecture. (c) Explain the JDBC2-Tier plus architecture. What are the benifits of JDBC 2 Tier plus architecture? [6+2+8] 4. (a) What is meant by a Flat Transaction? (b) Explain the mechanism of OSI TP Two-phase commit Proto col. (c) What are the limitations of the Flat Transactions? [3+8+5] 5. (a) What are the functions of a TP monitor? What is funneling? (b) Explain how the TP monitor performs its Funneling act. (c) What is Groupware? How is it di erent from SQL Databases? [5+6+5] 6. (a) Explain how the following internet mail protocols work: i. POP3 ii. IMAP4 iii. SMTP. (b) Explain the two types of client/server conferencing technologies-realtime and anytime. (c) What are the di erences between Process-oriented and Ad ho c work ows? [6+5+5] 7. (a) Explain brie y the functions provided by the combined Notes/Domino client/server application development and run-time environment. 1 of 1 www.studentyogi.com www.studentyogi.com
  6. 6. www.studentyogi.com Code No: RR421203 Set No.3 www.studentyogi.com (b) Give a simple model that breaks the client/server tool market around ve axes. [8+8] 8. Write notes on the following: (a) Web security (b) Symmetric and Asymmetric multi pro cessing. (c) ACID properties. [4+6+6] 2 of 1 www.studentyogi.com www.studentyogi.com
  7. 7. www.studentyogi.com Code No: RR421203 Set No.4 www.studentyogi.com IV B.Tech. II Semester Regular Examinations, May -2007 CLIENT SERVER COMPUTING (Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) What are the bene ts of designing the middle tier in 3-tier applications as a collection of components? (b) Give examples of 3-tier client/server systems. (c) Explain what server programs expect from their operating system. [6+2+8] 2. (a) Explain the public/private key approach to encryption with the help of a suitable diagram. (b) Explain how MOM (message-oriented Middleware) allows clients and servers to communicate across a network. (c) What are Named pipes? What are its bene ts? [5+7+4] 3. (a) Discuss the advantages and disadvantages of the following data base server architectures: i. Pro cess-per-client architecture ii. Multithreaded architecture iii. Hybrid architecture. (b) Explain with a diagram the 3-tier JDBC architecture. (c) What are the four levels of data base transactions de ned by IBM’s DRDA (Distributed Relational Data base Architecture)? [7+4+5] 4. (a) What is a Data ware house? (b) What are the various elements of a Data ware housing system? (c) What is Data mining? What searching methods generally the data mining tools use? (d) List the ACID properties. [2+6+4+4] 5. (a) Give the di erences between Transactional and Non-Transactional communi- cation mechanisms. (b) What are the bene ts of using the client/server oriented TP monitors? (c) Give the steps in an OLAP client/server interaction. [5+7+4] 6. (a) What is Groupware? Why is it important? How is it di erent from TP Monitors? (b) What is meant by work ow? Explain the Action work ow mo del with suitable diagrams. 1 of 1 www.studentyogi.com www.studentyogi.com
  8. 8. www.studentyogi.com Code No: RR421203 Set No.4 www.studentyogi.com (c) What is Lotus Notes/Domino? [6+7+3] 7. (a) Explain how Domino allows to replicate databases across servers(and clients). (b) List the operations that can be performed using the Lotus Notes API. (c) What kind of services does a Domino Mail server provide? [6+6+4] 8. Write notes on the following: (a) The Five Axes of client/server Tools. (b) TP-Lite and TP-Heavy systems. (c) Bene ts of JDBC 2-tier plus architecture. [6+5+5] 2 of 1 www.studentyogi.com www.studentyogi.com

×