This document contains questions for an examination on Software Testing. It is divided into two parts with multiple questions in each part. The questions cover various topics related to software testing including test metrics, defect management, test generation strategies, data flow testing, adequacy criteria, integration testing and system testing. Testing techniques like category-partition method, cause-effect graphing and predicate testing are also discussed in detail with examples.
Cloud computing introduction and concept as per the RGPV, BE syllabus. PPt contains the material from various cloud Draft (NIST) and other research material to fulfill the Syllabus requirement.
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
IFSM 310 Software and Hardware Infrastructure Concepts
Computer and Number Systems
1.
(10 pt)
You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.
2.
(2.5 pt each)
In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.
(c) Convert the following decimal number to binary:
21842
(d) Convert the following binary number to decimal:
11000111011.101
(c) Convert the following hexadecimal number to decimal:
CA97
(d) Convert the following binary number to hexadecimal:
1110011111011010100
CPU and Memory
3.
(10 pt)
ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?
(HINT: Decode the sequence reading from left to right then write the corresponding binary sequence, leaving a space between each binary sequence.)
4.
(10 pt)
Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.
Input / Output
5. Answer the follow questions about interrupts.
a.
(5 pt)
Describe in detail the steps that occur when a system receives an interrupt.
b.
(5 pt)
Describe how these steps differ in the case when a system receives multiple interrupts
Computer Systems
6. Answer the following questions about clusters.
a.
(5 pt)
Describe how you might use a cluster to provide fault-tolerant computing
b.
(5 pt)
Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.
Networks
7. Answer the following questions about communication protocols.
a.
(5 pt)
Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.
b.
(5 pt)
If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why
.
8. In the context of network security,
a.
(3 pt)
exp.
1102/159.334 CP
ALB
Internal
- Page 1 of 7 -
MASSEY UNIVERSITY
ALBANY CAMPUS
EXAMINATION FOR
159.334 Computer Networks
Semester Two - 2011
Time allowed: THREE (3) hours
Attempt ALL 6 (six) questions.
All questions are of equal value.
This examination contributes 60% to the final assessment.
Calculators permitted – no restrictions.
1102/159.334 CP
ALB
Internal
- Page 2 of 7 -
Question 1:
a) Name four socket functions (C functions) used to create client/server applications.
[4 marks]
b) Name the five layers in a typical TCP/IP computer network.
[2 marks]
c) What are the services provided by TCP?
[2 marks]
d) The source and destination port numbers are included in the packet header. Which
layer needs to be able to read these port numbers?
[2 marks]
1102/159.334 CP
ALB
Internal
- Page 3 of 7 -
Question 2: (The Application Layer)
a) If an FTP client is in active mode, what are the two FTP commands (protocol
commands) issued by the client when the user issues:
ftp> ls
[2 marks]
b) If an FTP client is in passive mode, what are the two FTP commands (protocol
commands) issued by the client when the user issues:
ftp> get
[2 marks]
c) The command netstat is used by a system administrator. Explain the difference
between LISTEN and ESTABLISHED states.
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 localhost:1234 *:* LISTEN
tcp 0 0 localhost:43000 it046500:20 ESTABLISHED
[2 marks]
d) How many simultaneous connections does HTTP needs in order to download a single
file?
How many simultaneous connections does FTP needs in order to download a single file?
[2 marks]
e) Briefly explain what is a DNS (Domain Name Service) iterated query. Explain why this
method is important to keep the scalability of the DNS.
[2 marks]
1102/159.334 CP
ALB
Internal
- Page 4 of 7 -
Question 3: (The Transport Layer)
a) A distributed system uses UDP to transfer files between nodes. You are asked to design
a simple reliable protocol to replace it. What are the essential elements that you need to
include in such a protocol? Your solution should focus on possible lost and damaged
packets, not performance.
[4 marks]
b) Explain the difference between Go-Back-N and Selective Repeat. Given a choice, which
one is better for the performance of the network?
[3 marks]
c) Explain the difference between “Congestion Control” and “Flow Control” from the view
point of a transport protocol.
[3 marks]
Question 4. (Network Layer)
a) What are the two important functions provided by the network layer protocols?
Emphasize the importance of the difference between the two functions.
[3 marks]
b) The network administrator checks an Ethernet card configuration using the command
ipconfig. He extracts the values for the IP address and for the Mask:
IP address 192.123.
Engineering Mathematics [Y
Q P Code: 60401
Additional Mathematics - II
Q P Code: 604A7
Analysis and Design of Algorithms
Q P Code: 60402
Microprocessor and Microcontroller
Q P Code: 60403
Object Oriented Programming with C++
Q P Code: 60404
Soft skills Development
Unix and Shell Programming,
Q P Code: 60305.
Additional Mathematics I
Q P Code: 60306
Computer Organization and Architecture
Q P Code: 62303
Data Structures Using C
Q P Code: 60303
Discrete Mathematical Structures
Q P Code: 60304
Engineering Mathematics - III
Q P Code: 60301
Soft Skill Development
Q P Code: 60307
Unix and Shell Programming,
Q P Code: 60305.
Additional Mathematics I
Q P Code: 60306
Computer Organization and Architecture
Q P Code: 62303
Data Structures Using C
Q P Code: 60303
Discrete Mathematical Structures
Q P Code: 60304
Engineering Mathematics - III
Q P Code: 60301
Soft Skill Development
Q P Code: 60307
Unix and Shell Programming,
Q P Code: 60305.
Additional Mathematics I
Q P Code: 60306
Computer Organization and Architecture
Q P Code: 62303
Data Structures Using C
Q P Code: 60303
Discrete Mathematical Structures
Q P Code: 60304
Engineering Mathematics - III
Q P Code: 60301
Soft Skill Development
Q P Code: 60307
Unix and Shell Programming,
Q P Code: 60305.
Additional Mathematics I
Q P Code: 60306
Computer Organization and Architecture
Q P Code: 62303
Data Structures Using C
Q P Code: 60303
Discrete Mathematical Structures
Q P Code: 60304
Engineering Mathematics - III
Q P Code: 60301
Soft Skill Development
Q P Code: 60307
Unix and Shell Programming,
Q P Code: 60305.
Additional Mathematics I
Q P Code: 60306
Computer Organization and Architecture
Q P Code: 62303
Data Structures Using C
Q P Code: 60303
Discrete Mathematical Structures
Q P Code: 60304
Engineering Mathematics - III
Q P Code: 60301
Soft Skill Development
Q P Code: 60307
Unix and Shell Programming,
Q P Code: 60305.
Additional Mathematics I
Q P Code: 60306
Computer Organization and Architecture
Q P Code: 62303
Data Structures Using C
Q P Code: 60303
Discrete Mathematical Structures
Q P Code: 60304
Engineering Mathematics - III
Q P Code: 60301
Soft Skill Development
Q P Code: 60307
Unix and Shell Programming,
Q P Code: 60305.
Additional Mathematics I
Q P Code: 60306
Computer Organization and Architecture
Q P Code: 62303
Data Structures Using C
Q P Code: 60303
Discrete Mathematical Structures
Q P Code: 60304
Engineering Mathematics - III
Q P Code: 60301
Soft Skill Development
Q P Code: 60307
Unix and Shell Programming,
Q P Code: 60305.
Additional Mathematics I
Q P Code: 60306
Computer Organization and Architecture
Q P Code: 62303
Data Structures Using C
Q P Code: 60303
Discrete Mathematical Structures
Q P Code: 60304
Engineering Mathematics - III
Q P Code: 60301
Soft Skill Development
Q P Code: 60307
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
1. ( C i/ 1,USN
Time: 3 hrs.
Eighth Semester B.E. Degree Examination, June/July 2013
AD-HOG Networks
O6CS/I5841
Max. Marks:100
(08 Marks)
(08 Marks)
(05 Marks)
networks.
(05 Marks)
(10 Marks)
(14 Marks)
(14 Marks)
E
I
=6-*t
.=A
Et4
9^
'=o
9'=
o'"
aE
:9
A;:
()<
-i ..i
z
E
Note: Answer FIVE full questions, selecting
atleast Tll/O questions from each part.
PART_A
I a. Give the classification ofdifferent wireless networks. (04 Marks)
b. What are the major challenges a routing protocol faces in ad-hoc wireless networks?
c. Explain the security threats that exist in wireless networks.
2 a. Mention any five design goals oia MAC protocol for ad-hoc nelr'rorks.
b. With a neat diagram, explain hidden and exposed terminal problems in wireless
c. Explain in detail. D - PRMA protocol.
3 a. Write a short note on :
i) Distributed laxity based priority scheduling scheme
ii) Directional busytone based MAC protocol.
4a.
b.
b. Give the brief explanation of working of a MAC protocol using directional antennas.
(06 Marks)
Explain any three design issues ofa routing protocol for ad - hoc networks. (06 Marks)
With an example, discuss the working of
D DSDV routing protocol
ii) DSR routing protocol.
5a.
b.
C-
PART - B
What are the advantages and disadvantages ofCEDAR protocol? (03 Marks)
Explain zone routing protocol. (07 Marks)
Give brief explanation of power aware routing metrics of ad-hoc wireless networks.
(10 Marks)
6 a. Explain any five major reasons for throughout degradation of TCP when used in ad-hoc
wireless networks. (10 Marks)
b. Discuss the operation of feedback based TCP, with a suitable example. (10 Marks)
7 a. Briefly explain the network security requirements for ad-hoc wireless networks. (04 Marks)
b. Give the classification ofsecurity attacks on ad-hoc wireless networks. (06 Marks)
c. List and give brief explanation of network layer attacks. (10 Marks)
8 a. Explain the design choice for providing QoS supporl for ad-hoc wireless networks.
,.ia{-t,''. .. (10 Marks)
6. Explain Ticket -Based QoS routing protocol. .). ,..'.-
'" (10 Marks)
'i' ",,,t:t{,*
:
2. USN 06cs81
Eighth Semester B.E. Degree Examination, June I July 2Ol3
Advanced Gomputer Architecture
Time: 3 hrs. Max. Marks:100
Note: Answer any FIVE full questions, selecting atleast TWO question from each part.
PART - A
a. Defure Computer Architecture. Illustrate the seven dimensions of an ISA.
b. Assume 4 disk subsystem with the following components and MTTF.
i) 10 Disk, each rated at 1000000 hours MTTF ii) 1 SCSI controller 500,000
hours MTTF ii| 1 power supply 200,000 - hours MTTF i r) 1 Fan 200,000 -
hours MTTF v) 1 SCSI cable 1,000,000 - hours MTTF. Using the simplifying
assumptions that the iife times are exponentially distributed and that lailure are independent.
Compute the MTTF olthe sl stem as a whole. (04 Marks)
c. We will run two applieations on this dual Pentium but the resource requirements are not
equal. The f-rst application needs 80% of the resources and the other only 20% of the
resou.rces.
i) Given that 40% of the first application is parallelizable, how much speed up would you
achieve with that application if run in isolation?
ii) Given that 99%o of the second application is parallelizable, how much speed up would
this application observe ifrun in isolation?
iii) Given that 40Yo of the first application is paralletizable, how much overall system speed
up would you observe ilyou parallelized it?
E
q
g
.= cr
E.J
tt
-a
5!
AA
6d,
5.!l
E>
.i ...i
z
o
E
2a.
b.
(08 Marks)
much overall system
(08 Marks)
(10 Marks)
(10 Marks)
.4
c.
a.
b.
With a neat diagram. explain the classic five stage pipeline fo1 RISC processor.
Mention the techniques used to reduce branch costs.
prediction used for same.
Explain static and dynamic branch
(08 Marks)
dependencies. Explain
(06 Marks)
(06 Marks)
(0E Mrrks)
(04 Marks)
b. Explain the basic schemes for enforcing Coherence in
system.
a. Briefly explain four basic Cache optimization methods.
1of2
iv) Given that 99% of the seiond application is parallelizable, how
speedup would you get?
What is pipelining? List pipeline hazards. Explain any one in detail.
What is data dependencies? Mention the different types of data
ame dependencies with example between two instructions.
What is correlating predictors? Explain with examples.
Explain the basic VLIW approach for exploiting ILP using multiple issues.
Write a note on value prediction.
c. Mention the key issues in implementing advanced speculation techniques. Explain.
(08 Marks)
PART - B
a. Explain any two hardware primitives to implement synchronization, with example.
(I0 Marks)
a shared memory multiprocessor
( l0 Marks)
ii -' (lo Marks)
li'
3. 06cs81
b. Assume we have a computer where the Clocks Per Instruction (CPI) is 1.0. When all
memory accesses hit in the Cache. The only data accesses are loads and stores and these
@
)/n
vp
-J,
/)L,r/ e
t}
'ts,s*
-..9n
r.W*I.*
.Nv ag-
..* Y
fl
aV
rly
xv
{. -a'
(,,
{*}
*cI.
,
'(l:"
'"ar{-J
,,
./t,ry
(
+S'
2 of2
4. USN
06CS/IS834
(06 Marks)
(08 Marks)
(06 Marks)
(06 Marks)
(04 Marks)
(05 Marks)
(05 Marks)
(06 Marks)
(10 Marks)
(04 Marks)
.(05 Mark)
(06 Marks)
(04 Marks)
(05 Marks)
(06 Marks)
(08 Marks)
(06 Marks)
E
g
Yi
'! a
66
CE
--3
og
oi
-i ..i
z
E
Eighth Semester B.E. Degree Examination, June / July 2013
Network Management Systems
Time: 3 hrs. Max. Marks:100
Notez Answer ony FIVEfull questions, selecting atleast TlyO question from each part.
PART-A
1 a. What are the goals of network management? Explain the functions of network management.
(10 Marks)
b. List the problems that are common in network management system. (04 Marks)
c. With a neat diagram, explain network management Dumbbell Architecture. (06 Marks)
Explain the salient features ofvarious network management standards.
Explain the functional model of network management system.
Explain various data types used in ASN - 1.
a. Explain Two tier, Tluee tier and proxy server organization model of SNMP. (08 Marks)
b. With a neat diagram, explain network management architecture of SNMP. (08 Marks)
c. Write a note on history of SNMP management. (04 Marks)
b.
c.
4 a. Explain the structure of management inlormation in SNMP.
b. Explain how basic encoding rule (BER) is used in SNMP.
d. Explain the Get - Request operation tbr a system group.
PART - B
What is remote monitoring? Explain new data types defined in RMON 1 .
Explain the common RMON1 and Ethernet groups.
Describe RMON2 conformance group.
7 a. Brielly explain the dif'ferent broadband access technology.
b. Explain the ADSL system reference model.
c. What are the different parameters used in ADSL fault management? i
d. Explain the elements of cable modem management MIBs.
8 a. Write a note on Fault management.
b. Describe the various kinds ofclient / server authentication systems.
c. With a neat diagram, explain policy - based management.
c. What are the types of traps used in SNMP? Explain each with the structure of trap PDU.
5a.
b.
c.
6 a. What is the need for ATM LAN emulation? Explain the layered architecture of a LAN
emulation. (08 Marks)
b. With a neat diagram, explain the role of SNMP and ILMI in ATM management. (06 Marks)
c. Describe ATM digital exchange interface management. (06 Marks)
5. USN
' Time: 3 hrs.
06IS81
Max. Marks:100
(08 Marks)
(04 Marks)
(08 Marks)
(04 Marks)
(08 Marks)
(08 Marks)
cause-effect
(05 Marks)
(05 Marks)
(05 Marks)
(05 Marks)
(05 Marks)
(05 Marks)
(10 Marks)
Eighth Semester B.E. Degree Examination, June/July 2013
Software Testing
Note: Answer FIVE full questions, selecting
ot least TWO questions from each part.
a
:v1
-^t
x0r
-a
:q
6 .9.
4.9
oy
(.) <
o
z
a
E
1a.
b.
c.
PART_A
Explain in detail the various measures ofsoftware quality attributes.
With a suitable example, explain how will you specify program bahviour.
Briefly explain the concepts oftest metrics.
Explain the eoncepts ofdefect management.
Explain in detail the several strategies for test generation.
With a neat sketch,.explain the elements of model checking.
W}at do you mean by definition - use pairs?
Explain the concepts ofdata dependence graph with a suitable example.
Briefly explain the concepts ofdata flow analysis.
Define data flow testing criteria with respect to DU pa s.
What are the diff'erences between test case and test case specifications?
Define the term adequacy criteria with a suitable example
Briefly explain the concepts ofscaffolding.
Explain the concepts ofself-checks as oracles.
Write short notes on the following concepts:
Memory leaks
System testing
Acceptance testing
Integration testing
3 a. Briefly explain the concepts of unidimensional versus multidimensional puf,itiorirfljo
murr.g
b. Name and explain the four steps which are helpful in creating the equivalence class.
(06 Marks)
c. With a neat sketch, explain in detail the steps involved in the generation of tests using the
category-partition method. (08 Marks)
a. Explain the procedures which.are used for the generation of tests using
graphing.
b. With a neat sketch, explain the notation used in cause-effect graphing.
c. Briefly describe the lault model for predicate testing.
d. Explain the usage olpredicate testing in practice.
PAR'I'- B
a. Explain the concepts of statement testing.
b. Briefly explain the concepts ol branch testing.
c. Explain in detail the concepts of path testing with a suitable example.
2a.
b.
c.
6a.
b.
c.
d.
la.
b.
c
d.
8
(05 Marks)
(05 Marks)
(05 Marks)
(05 Marks)
(05 Marks)
.(05 Marks)
(05 Marks)
(05 Marks)
a.
b.
c.
d. (20 Marks)