Exam Details
Subject | data communication and networking – ii (paper – i) | |
Paper | ||
Exam / Course | b.sc. – i (ecs) | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | October, 2018 | |
City, State | maharashtra, solapur |
Question Paper
B.Sc. III (Semester VI) (CGPA) Examination, 2018
Data Communication and Networking II (Paper
Day and Date Monday, 29-10-2018 Max. Marks 70
Time 10.30 a.m. to 1.00 p.m.
Instructions All questions are compulsory.
Figures to the right indicate full marks.
1. Choose the correct alternative. 14
Piconet can be combined to form
Scatter spot Scatternet
Pico spot Fibernet
protocol is used to provide facility for remote logins to computer
via Internet.
POP SNMP ARP Telnet
190.160.10.0 address is belongs to following class.
B C D A
server can serve files and printers that is faster and secure
in Linux.
Samba Print Web FTP
Bluetooth is wireless technology for.
MAN LAN PAN WAN
Which protocol is used to find the hardware address of a local device
ARP RARP TCP UDP
Repeater works at layer of OSI model.
Application Presentation
Physical Network
substitutes one symbol with another.
Substitution cipher Transposition cipher
Round robin None of the above
In IP datagram the size of fragmentation Offset is bit.
8 16 13 4
10) Wireless network uses waves to transmit signals.
Sound Radio
Mechanical None
11) Default format for transferring text files by FTP is file.
Binary ASCII EBCDIC Image
12) is a asymmetric algorithm in cryptography.
IDEA DES AES RSA
13) operates at the upper layer of OSI Model.
Browser Bridge Gateway Hub
14) Pop stands for
Post Open Protocol Post of Protocol
Page Off Procedure Post Office Protocol
2. Answer the following (any seven) 14
Explain Cryptography.
What is Repeater
What is Transposition cipher
What is mean by port number
What is Dig server
What is three way handshaking mechanism
Which are the recommended partitions in LINUX
What is mean by Active Hub and Passive Hub
What is meant by VPN
3. Answer the following (any two) 10
Explain the four protocols used in SSL.
What is the RARP
Write a note on Proxy server.
Explain the working of asymmetric key cryptography. 4
4. Answer the following (any two). 14
Explain the architecture and working of GSM.
Explain PGP in detail.
Explain TCP in detail.
5. Answer the following (any two). 14
Explain User Management in LINUX.
Explain gateway in detail.
What is firewall Explain application Gateway in detail.
Data Communication and Networking II (Paper
Day and Date Monday, 29-10-2018 Max. Marks 70
Time 10.30 a.m. to 1.00 p.m.
Instructions All questions are compulsory.
Figures to the right indicate full marks.
1. Choose the correct alternative. 14
Piconet can be combined to form
Scatter spot Scatternet
Pico spot Fibernet
protocol is used to provide facility for remote logins to computer
via Internet.
POP SNMP ARP Telnet
190.160.10.0 address is belongs to following class.
B C D A
server can serve files and printers that is faster and secure
in Linux.
Samba Print Web FTP
Bluetooth is wireless technology for.
MAN LAN PAN WAN
Which protocol is used to find the hardware address of a local device
ARP RARP TCP UDP
Repeater works at layer of OSI model.
Application Presentation
Physical Network
substitutes one symbol with another.
Substitution cipher Transposition cipher
Round robin None of the above
In IP datagram the size of fragmentation Offset is bit.
8 16 13 4
10) Wireless network uses waves to transmit signals.
Sound Radio
Mechanical None
11) Default format for transferring text files by FTP is file.
Binary ASCII EBCDIC Image
12) is a asymmetric algorithm in cryptography.
IDEA DES AES RSA
13) operates at the upper layer of OSI Model.
Browser Bridge Gateway Hub
14) Pop stands for
Post Open Protocol Post of Protocol
Page Off Procedure Post Office Protocol
2. Answer the following (any seven) 14
Explain Cryptography.
What is Repeater
What is Transposition cipher
What is mean by port number
What is Dig server
What is three way handshaking mechanism
Which are the recommended partitions in LINUX
What is mean by Active Hub and Passive Hub
What is meant by VPN
3. Answer the following (any two) 10
Explain the four protocols used in SSL.
What is the RARP
Write a note on Proxy server.
Explain the working of asymmetric key cryptography. 4
4. Answer the following (any two). 14
Explain the architecture and working of GSM.
Explain PGP in detail.
Explain TCP in detail.
5. Answer the following (any two). 14
Explain User Management in LINUX.
Explain gateway in detail.
What is firewall Explain application Gateway in detail.
Other Question Papers
Subjects
- advanced java (paper – iii)
- advanced microprocessor
- compiler construction (paper – iv)
- computer graphics
- core java (old cgpa) (paper – iii)
- data communication and networking – i
- data communication and networking – ii (paper – i)
- data communications and networking – i (paper – i)
- data structures (paper – iv)
- data structures algorithms enginering – ii
- database management system – i (paper – ii)
- database management system – ii (paper – ii)
- dbms using oracle
- descriptive statistics – i
- descriptive statistics – ii
- digital electronics – i
- digital electronics and microprocesor – ii
- discrete structure
- embedded system – i
- embedded system – ii (paper – v)
- english (compulsory) (new) (cbcs)
- fundamental of computer
- golden petals
- introduction to programming using c – ii (paper – iii)
- introduction to web designing (paper – ii)
- linear electronics – i
- linear electronics – ii
- linux operating system (new)
- literary quest
- mathematical algebra
- mathematics(numerical methods)
- microprocesor – ii
- object oriented programming using c++
- object oriented programming using java (paper – i)
- on track – english skills for success
- oop using c++ – ii
- operating system
- operating system – ii (paper – i)
- operations research
- organization of pc – ii
- peripherals and interfacing – ii
- pr obabili ty theory – ii
- probability theory – i (paper – ix)
- programming using “c”
- python – i (paper – v)
- software engineering
- software enginering – ii
- theory of computer science
- theory of computer science (paper – iv)
- visual programming – i
- visual programming and aplication software – i (old)
- visual programming and aplication software – ii(paper – vi)
- web technology and e-commerce – i
- web technology and e-commerce – i (paper – v)
- web technology and e-commerce – ii (paper – v)