can't find your donut ?? lets search

for msbte curriculams first please see this page carefully http://www.msbte.com/website/curriculum/

IMPORTANT

If you are MSBTE diploma third year student of computer branch co,cm,if,cd plesae subscribe to my blog by email.. by link given below

SE tips to remember answer... if u have any please comment it below

1.SE core principles (bold are keyword)

eX kiss kg vision(or wajaan or vazan) consume karte ho.. oh future kya ? plan ko reuse ka socho...

meaning

ex-- the reason it all exists

kiss- u all know... keep it simple

kg. -- nothing

vision-- maintain vision

consume---- what you produce others will consume

future --- be open to future

plan ko reuse---plan to reuse

socho-----simple.. think..


2
hierarchy of patterns.

patterns of process
+----- (consist of) phase patterns
+-------------(consist of) stage patterns
+------------(consist of) task patterns

MAT/MMS all definitions uploaded

all multimedia and animation technique (MAT) or MMS definitions and terms are uploaded please click following link to go to page ... download link is given there
http://sites.google.com/site/p11vesp/mms-glossary

SE most important notes all definitions extracted from pressman

please go here download link is also given there and document also

http://sites.google.com/site/p11vesp/Home/pressman-se-all-definitions-extracted

MSBTE JAVA MANUAL. All programs of JAVA manual by rushal ajmera

please take all java programs of manual written by rushal ajmera.

http://sites.google.com/site/p11vesp/Home/ExperimentsMail.zip

for MMS/MAT please read from techmax

this is my personal experirence if you want to study multimedia systems or MAT please read it from techmax because the answers are given point to point , but condition to read from it is only that you should know subject otherwise you will have to rattofy the subject...
please leave your comment

unix os hardening notes

Operating System Hardening is an essential security strategy positioned between the network and application. One of popular server OS - Unix is a multi-user system, which could support over hundreds of users with different directories and database applications. Unix is less secure than other proprietary operating systems as its public-domain variants are particularly vulnerable. That's is why hardening Unix is becoming essential parts of each organization. HiTRUST provides UNIX Hardening service to minimize servers' exposure to current and future threats on this computer platform by fully configuring the operating system, removing unnecessary applications and apply security-related patches offered by your vendor.

Hardening Unix server raises the bar on the level of skill and effort needed to crack into system, thus discourages joyride attackers looking for an easy target. HiTRUST also helps to log all network-access hacking attempts to the Unix server, both successful and unsuccessful. By logging suspicious network activity, an organization can stop would-be attackers from breaking into the system; more importantly, the organization can trace (and sometimes identify) successful attackers.

Common hardening task aims to protect system against:


Denial-of-service attacks


Brute-force attacks

Social-engineering attacks

Passive attacks

Malicious local users

Legitimate users' clumsiness

Software bugs, etc.


How to make your machine more secure
(And easier to keep up to date on patches because there'll be fewer patches you need to apply)

  1. Most of what we'll be doing involves turning off unneeded services in /etc/inetd.conf.
    • Go ahead and edit /etc/inetd.conf. Entries that have a "#" are a comment. All those lines that aren't commented out, are services that are launched by inetd. The odds that any given one of these services will develop a (known) security hole isn't that high, but the odds that any one of them will is noticeably higher. So we want to turn off all the unneeded ones.
    • Services we recommend always turning off include: echo, daytime, chargen, time.
    • Services we recommend turning off if you can include... everything else. If this isn't a mission critical machine, we'd actually recommend that you turn off everything, and then add back services you later discover you needed. Of course, on a machine that must be available, it's better to only turn off services you know you won't need.
    • For specifics of how to turn off a service that's launched by inetd, see Turning off an inetd-launched service.
  2. Not all network services on UNIX are launched by inetd. Some run as standalone daemons. Sendmail and Samba are both packages that have the option of either running off of inetd, OR running as standalone daemons.
    • If you don't need to process e-mail on this machine (including local e-mail), we recommend turning off sendmail. See turning off sendmail for specifics.
    • If you don't need to share files or printers from your UNIX machine to machines running Microsoft operating systems, we recommend turning off samba. See turning off sambafor specifics.
    • Note that you may have other network services that are not launched by inetd. These are only two of the most common.
    You're done. For now.

windows hardening CS paper

<>Use a Non-Administrator Account

Windows ships with the Administrator account and Guest account by default. A password is not required to log-on. At least 60% of the machines I encounter in both home and business environments are running this way. Many current exploits are written to find and attack machines set up this way. Connected to the Internet and running as Administrator, an exploit is capable of:

  • Install any start services

  • Install AxtiveX controls, including IE and shell add-ins (common to both adware and spyware)

  • Install kernel-mode rootkits and keyloggers (hard to impossible to detect)

  • Access data belonging to all users on the machine

  • Cause code to run whenever anyone logs on to the computer (including capturing user names and passwords entered in the
    Ctrl-Alt-Delete logon dialog

  • Replace normal OS and program files with Trojan horses

  • Disable or even uninstall anti-virus programs

  • Cover its tracks in the event log to avoid detection

  • Access any other computer you are also Administrator on and gain control of those computers as well

  • The list goes on and on

Rename the Administrator account, and then password-protect it. Then, set up a limited account for yourself and all other users of the computer as well. Remember to use a password for the new accounts. Use the limited accounts for all general computing needs,
especially Internet and email uses. Never use the Administrator account unless it is necessary (Install or un-install programs, Windows updates etc.).

In some business environments, this can cause a problem because some everyday applications require Admin account privileges to run properly. Why you ask? Because in many cases it is easier to write a program this way. If you have program that needs Admin privileges
to run properly, you will have no choice, but I recommend pressuring the software vendor for a newer version being developed that will
run with a limited user. If enough users do this, the vendors will begin to respond rather than loose business.

If it helps you make the decision whether or not to take this step, remember that an exploit written to use Admin privilege is stopped
from installing, running or executing if you are a limited user.

The built-in administrator account and administrator group has the greatest number of default permissions and privilege as well as the ability to change their permissions and privileges. The object is to prevent an intruder from gaining control over the computer and administrator rights from the built-in Administrator account. To accomplish this, we will rename the Administrator account, change its description, and Password-protect it.

<>Renaming and password protecting the Administrator account

Windows 2000 computers:

  1. Right click on ‘My Computer’ then click on ‘Manage’, which opens the Microsoft Management console.

  2. Expand the “Local Users and Groups”, and open the ‘Users’ folder

  3. Right click on ‘Administrator’, then click ‘Properties’ and type in the new name for the account. Then, change the description so
    it no longer indicates it is the built-in account for administering the computer/domain.

  4. Left click on ‘OK’.

  5. Right click the newly named account, click ‘Set Password’ and type in and confirm the new password for the account.

Windows XP Pro computers:

  1. Right click on ‘My Computer’ then click on ‘Manage’, which opens the Microsoft Management console.

  2. Open the Users folder under Local users and groups, right click on ‘Administrator’ and click ‘Rename’ and type in the new name
    for the account.

  3. Right click the newly named account, click ‘Properties’ and change the description for the account so as not to reveal its true
    nature.

  4. Click on ‘OK’

  5. Right click on the new ‘Administrator’ account, and click ‘Set Password’.

  6. Click ‘Proceed’ in the message box

  7. Type in and confirm the new password for the account in the boxes and then click ‘OK’

<>Use Strong Passwords

I really can’t stress this enough, especially for business use. Please, do not pick a pet name, spouse name or anything else easily
guessed by people who know you.

Pick a password at least 8 characters long. I prefer 15 or more characters. Windows will accept a maximum of 127 characters.
Use both upper and lower case letters, numbers, and try to use characters as well. If you have multiple computers, do not repeat the
same passwords on each one. Never write down passwords and leave them in plain sight, or send them in email.

It is very scary to me to sit at a workstation that has all the account names, login names and passwords written on post-its and stuck on
the monitor. In a business environment, this is just inviting misuse.

The easiest way to pick a long, effective password is to think of an easy to remember phrase. Then change the letter o to the number 0, and all letter l to number 1. For example:

I like Tootsie-Roll becomes: I1iket00tsie-R011. Much harder to break that. Also, remember that Windows will accept spaces as a
password character.

<>Use a BIOS and Bootlevel Password

Once you set a Boot level BIOS password, it will be required every time the system is started. The system is completely disabled until
the password is entered. This is normally accomplished by selecting the password option in the BIOS setup. You may also want to
consider an additional password for accessing the BIOS settings in order to prevent unauthorized changes in the BIOS settings.

<>Use the Screensaver

Proper use of the screensaver will help protect your computer while you are away from it for short periods of time. This is especially important in business environments. Just bring up the screensaver settings and enable password protection. Here's how:

  1. Right click an open area of the desktop

  2. Left click properties from the choices

  3. Left click the screensaver tab

  4. Check the box to “On resume, password protect”

On Windows 2000 machines, left click the Power button, then left click the advanced tab, then check the box to “Prompt for password
when computer goes off standby”.

Remember to pick a time period for the screensaver to start, perhaps 10 minutes. If you are going to be away for an unknown time
period, you can always start the screensaver manually when you are called away. Another quick way to secure things is to simply hit
Ctrl-Alt-Delete which brings up the task manager. You then select ‘Lock Computer’ by left clicking the button, or hitting ‘Alt-k’ on the keyboard.

<>Guest Account

The guest account is known to exist on all Windows 2000 Server, Windows 2000 Professional, and Windows XP computers. Microsoft recommends against disabling the Guest account in Windows XP or removing it in either Win2k or XP. For more security of this account,
I recommend the following.

Windows 2000 computers:

Rename Guest account, password protect it, then disable it. Here's how:

  1. On the desktop, right click on ‘My Computer’ then click on ‘Manage’, which opens the Microsoft Management console.

  2. Expand the “Local Users and Groups”, and open the ‘Users’ folder

  3. Right click on ‘Guest’ then click ‘Rename’ and type in the new preferred name

  4. Right click on ’Guest’ then click ‘Properties and check to box ‘Account is disabled’. Also check the box for ‘User cannot change password’. Then type in the new full name, and change the description of the account as well.

Windows XP Pro computers:

  1. Right click on ‘My Computer’, then click ‘Manage’ which opens the Microsoft Management Console.

  2. Open the Users folder under Local users and groups, right click on ‘Guest’ and click ‘Rename’ and type in the new name for the account.

  3. Right click on ‘Guest’, click properties and edit the description for the account so its true nature will not be revealed.

<>Use NTFS File system

When Windows XP or Windows 2000 is installed, it should be installed on a separate partition formatted with the NTFS File system
rather than the older FAT File system. The NTFS system allows you to configure which users have access to which data, who can
perform what kinds of operations, and allows you to encrypt files and data.

<>Disable auto-logins

Do not use any automated logins and be sure all users are password protected. Go to the control panel, click on administrative tools,
click local security policy. Make sure all users have a password set for the account. I also recommend having only one administrator
account on each machine.

<>Limit unnecessary accounts

Limit any unnecessary or unused accounts and remember, I recommend only one administrator account per machine. If you see
accounts that are not needed, or not used, delete them.

<>Disable Enumeration of SIDS

Even after renaming Guest and Administrator accounts, an intruder armed with the right software can still find the real account by enumerating the account SIDs (Security Identifiers) because renaming an account does not change its SID. Once an account name has been identified (an attacker is looking for an Administrator account here) a brute force attack on the password is usually the next step.
This can be avoided by not allowing the enumeration of Account SIDs.

On a Windows XP machine, follow these steps:

  1. Click Start, go to Control Panel, click administrative tools, and click local security policy.

  2. Click the ‘Security Options’ folder in the left pane

  3. Double click ‘Network access: Do not allow anonymous enumeration of SAM accounts and shares’ on the right pane.

  4. Choose ‘Enabled’ and then click ‘Apply’ and ‘OK’ to save your settings.

On a Windows 2000 machine, follow these steps:

  1. Click Start, go to control panel, click administrative tools, and open ‘Local Security Policy’

  2. Click on + on the ‘Local Policies’ folder in the left pane

  3. Left click ‘Security Options’ folder under local policies

  4. Right click on ‘Additional restrictions for anonymous connections’ in the right pane

  5. Left click ‘Security…’ from the box that opens

  6. Under local policy setting, click the down arrow at the right end of the window and choose (left click) ‘Do not allow enumeration
    of SAM accounts and shares’

  7. Left click ‘OK’ to save your settings, and exit all windows

<>Disable File and Print Sharing

If you are not connected to a domain, simplified file sharing is automatically enabled in Windows XP. It should be noted here that simple
file sharing cannot be turned off in Windows XP Home Edition. Why disable print and file sharing? Well, if you use an always-on
high-speed Internet connection, leaving these services turned on is like leaving your doors open when you are not at home. Unless it is absolutely necessary, I recommend you turn these services off.

In Windows XP, follow these steps:

  1. Click Start, then go to settings, then click Control Panel

  2. Double click Internet Options.

  3. Click on the ‘Connections’ tab, select your connection, and then click ‘Settings’

  4. Click ‘Properties’, click the ‘Networking’ tab, and then uncheck the box for ‘File and Printer Sharing for Microsoft Networks’.

  5. Click ‘OK’ to save the settings

While you are here, let’s do one more thing, and choose not to save temporary Internet files:

  1. Left click on the Advanced tab of Internet Properties

  2. Scroll down to ‘Security’ at the bottom of the window, and check the box to ‘Empty Temporary Internet Files when browser is
    closed’

  3. Click ‘OK’ to save the settings, and exit the control panel

On Windows 2000 machines, use the following steps:

  1. Click Start, then go to settings, then click Control Panel

  2. Double click ‘Network and Dial-up Connections’

  3. Right click ‘Local Area Connection’ and choose ‘Properties’

  4. From the box that opens, uncheck ‘File and Print Sharing for Microsoft Networks’

  5. Click ‘OK’ to save the settings

To choose not to save Temporary Internet Files:

  1. In the Control Panel, open Internet Options

  2. Left click on the Advanced tab of Internet Properties

  3. Scroll down to ‘Security’ at the bottom of the window, and check the box to ‘Empty Temporary Internet Files when browser is
    closed’

  4. Click ‘OK’ to save the settings, and exit the control panel

<>Unhide File Extensions

By default, Windows XP and Windows 2000 hides known file extensions to simplify displays. The problem with this is that a malware
writer can hide a file extension type after the file display and keep you from knowing what kind of file you are about to open. This is especially true for files hiding Trojans. Let’s not let this happen for most file types.

On both Windows XP and Windows 2000, follow these steps:

  1. Click Start, go to settings, open the Control Panel, and double click ‘Folder Options’

  2. Left click the ‘View’ tab

  3. Uncheck the box for ‘Hide extensions for known file types’

There are still three known file extensions that will remain hidden even after the above procedure. They are .shs, .pif, and .lnk so if in doubt, the rule should be not to open or run the file. The file extensions on my personal banned list are: .exe .dll .ocx .wav .jpeg .gif
.bat .com .cmd .pif .scr .zip .mime .mim .uue .uu .b64 .bhx .hgx .xxe .doc .vbs .ico .bmp .ani .cur .hlp .upm .shs .lnk. I never open any
of these unless I am specifically expecting them.

<>Disable Remote Assistance and Remote Desktop

This applies to Windows XP machines only. Remote assistance allows you to invite another person to logon to your machine for remote troubleshooting. I recommend you leave it disabled. You can always re-enable it later if the service is ever needed. Remote desktop is available on XP Professional and allows you access to a Windows session on one computer while you are at another computer in
another location, not only over a LAN, but over the Internet as well.

To disable these functions, follow this procedure:

  1. Click Start, go to settings, then Control Panel

  2. Double click on the System icon

  3. Click on the ‘Remote’ tab, and uncheck the boxes to ‘Allow Remote Assistance invitations to be sent from this computer’, and
    ‘Allow users to connect remotely to this computer’

  4. Click ‘Apply’ to save the settings, and close the windows.

<>Disable any unnecessary and potentially dangerous service

The three most common services to turn off are Windows Plug and Play, DCOM, and Windows Messenger. I have been using PC’s for
"over twenty years now and cannot imagine a situation where any of these services are needed. I have never used any of them, but
many a malware writer has. The easiest way to disable these services is to use very small programs from Steve Gibson, of Gibson Research Corporation.

To disable Windows Plug and Play, go here:

http://www.grc.com/unpnp/unpnp.htm

To disable Windows DCOM, go here:

http://www.grc.com/dcom/

To disable Windows Messenger, go here:

http://www.grc.com/stm/shootthemessenger.htm

All three of these programs are freeware and are a very small file size.

<>Encrypt the My Documents and Temp folders

Both Windows XP and Windows 2000 allow you to encrypt selected data files and folders in your computer. By doing this, even if your computer is compromised by an attacker, you have an extra layer of security for your most used files by denying access to anyone
except the user that encrypted the files to begin with.

In Windows XP computers, follow this procedure:

  1. Open Windows Explorer

  2. Right click the folder you want to encrypt, and then click ‘Properties’

  3. On the ‘General’ tab, click ‘Advanced’

  4. Check the box to ‘Encrypt contents to secure data’

  5. Click ‘OK’ to save your settings

In Windows 2000 computers, follow this procedure:

  1. Right click “start” and then choose ‘Explore’

  2. In the left pane, right click the folder you want to encrypt, then left click ‘Properties

  3. Left click ‘Advanced’

  4. Left click the box to ‘Encrypt contents to secure data'

  5. Click ok to save your settings, and close open windows.

I recommend that you encrypt at least the following two folders:

1. ‘My Documents’ that contains the personal files in which most Microsoft Office documents are stored.
2. ‘Temp’ folder that contains the files created by most applications programs

<>Registry changes

The last few suggestions I have involves changes to the system registry. If you are at all squeamish about this, I suggest you stop your Windows hardening efforts at this point, or get help from someone that is familiar with registry edits and changes. If you elect to
proceed, I strongly suggest you do a system state backup before making any changes to the registry.

<>Clear Page File at System Shutdown

Default settings allow process memory files to be paged to the hard disk in clear text form at shutdown. Although this allows more
rapid recovery of this information the next time the system is started, it’s a great place for an intruder to look for any sensitive
information, and it is displayed in plain text form.

To clear the Page File at shutdown, follow this procedure:

  1. Click Start and go to settings and open the Control Panel

  2. Open ‘Administrative Tools, and choose ‘Local Security Policy’ followed by ‘Local Policies’ in the left pane, and then ‘Security
    Options’

  3. In the right pane, right click on ‘Clear virtual memory pagefile when system shuts down’ , left click ‘Security’, and choose
    ‘Enabled’

  4. Left click ‘OK’ to save your settings, and close all open windows.

<>Disable dump file creation

When Windows stops unexpectedly as the result of a Stop Error (“blue screen of death” or system crash), a Memory.dmp file is
created and it can be helpful when using debugging tools and software. Like the page file above, it can contain sensitive information and
passwords displayed in plain text form. I have never found this information of much use, but an intruder can definitely make use of it. To disable the dump file creation, follow this procedure:

  1. Click on Start, go the settings, and open the Control Panel

  2. Double click the ‘System’ icon and then click the ‘Advanced’ tab

  3. Click the ‘Startup and Recovery button, and look for ‘Write Debugging Information’ toward the bottom of the window (XP users
    will have to first click on ‘Settings’)

  4. Click on the down arrow at the right of the top window. Default setting is Small Memory Dump (64 KB). Choose ‘(none)’

  5. Click ‘OK’ to save your settings and close all open windows.

<>Disable Dr. Watson dump file creation

Another memory dump file similar to the ones above is created by Dr Watson. This is a program error debugger that gathers all kinds
of information about your computer when a user error or user-mode fault occurs within a program. I have never found these files to be useful either. To stop creation of these files, follow this procedure:

  1. Go to start, then run, then type in ‘regedit.exe’ and hit ‘Return’

  2. Browse to the following location in the left pane:

HKEY_LOCAL-MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AeDebug

  1. Left click on the value ‘Auto’ on the right pane, and change the value from ‘1’ to ‘0’

  2. Close the registry editor.

To delete the dump files created by Dr Watson on earlier occasions, you will have to delete them manually with this procedure:

  1. Open Windows explorer

  2. Browse to C:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson and delete files named User.dmp and Drwtsn32log.

<>The Scrap File danger

A scrap file is used by Windows machines to transfer data between programs, and it can contain just about anything from data to an executable program. Remember that in our discussion of file types, we chose to uncheck the box to ‘Hide known file extension types’ to show all file extensions and that I told you three file types would still remain hidden, one of them being .shs?

Herein lies the danger. A scrap file can be renamed with a different file extension to make it look benign. Windows assigns
‘RUNDLL32.EXE SHSCRAP.DLL, OPENSCRAP_RUNDLL %1’ to the .SHS extension by default. When the file is opened, Windows will unpack the scrap file and open or execute whatever is in the file. Once the scrap file is opened, you have absolutely no control over it. The trick here is to get the file to show its true .shs extension. To do this, we need yet another registry edit by following this procedure:

  1. Go to ‘Start’, ‘Run’ and then type in “regedit.exe’

  2. Left click ‘Edit’, then ‘Find’, and type in: HKEY_CLASSES_ROOT\ShellScrap and click ‘Find’

  3. Once found, in the right pane, right click on ‘NeverShowExt’ and choose ‘Modify’

  4. Type in ‘AlwaysShowExt’ and hit ‘Return’

  5. Close the Registry Editor

  6. Complete shut-down and re-boot

CS IMP. DATA VLAN AND PATCH

A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the Broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices.

VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain.

This is also useful if one wants to create multiple Layer 3 networks on the same Layer 2 switch. For example if a DHCP server (which will broadcast its presence) were plugged into a switch it would serve anyone on that switch that was configured to do so. By using VLANs you easily split the network up so some hosts won't use that server and default to Link-local addresses.

Virtual LANs are essentially Layer 2 constructs, compared with IP subnets which are Layer 3 constructs. In a LAN employing VLANs, a one-to-one relationship often exists between VLANs and IP subnets, although it is possible to have multiple subnets on one VLAN or have one subnet spread across multiple VLANs. Virtual LANs and IP subnets provide independent Layer 2 and Layer 3 constructs that map to one another and this correspondence is useful during the network design process.

By using VLAN, one can control traffic patterns and react quickly to relocations. VLANs provide the flexibility to adapt to changes in network requirements and allow for simplified administration
................
.......................
......................
................

A patch is a small piece of software designed to fix problems with or update a computer program or its
supporting data. This includes fixing bugs, replacing graphics and improving the usability or performance.
Though meant to fix problems, poorly designed patches can sometimes introduce new problems.

Patch management is the process of using a strategy and plan of what patches should be applied to
which systems at a specified time.

Patches sometimes become mandatory to fix problems with libraries or with portions of source code for
programs in frequent use or in maintenance. This commonly occurs on very large-scale software projects,
but rarely in small-scale development.

In open source projects, the authors commonly receive patches or many people publish patches that fix
particular problems or add certain functionality, like support for local languages outside the project's locale.

If a patch is a piece of data used to update a software product,
then a security patch is a change applied to an asset to correct the weakness described by a vulnerability.
This corrective action will prevent successful exploitation and remove or mitigate a threat’s capability
to exploit a specific vulnerability in an asset.

Security patches are the primary method of fixing security vulnerabilities in software.
Currently Microsoft releases their security patches once a month, and other operating systems and
software projects have security teams dedicated to releasing the most reliable software patches as soon
after a vulnerability announcement as possible. Security patches are closely tied to responsible disclosure.

software engineering 20 marks and 80 mark MSBTE third year fifth semster co,cm,cd,if CO/cd/cm/if SAMPLE question paper SE,

Sample Test Paper-I
Course Name : Computer Engineering Group
Course Code : CO/CM/IF
Semester: Fifth
Subject: Software Engineering
Marks: 20

Q 1. Attempt any two----------08 Marks
1) Describe the Prototype model.
2) Describe spiral model.
3) State the role of software.

Q 2. Attempt any three---------12 Marks
1) Draw the notation used in data flow diagram.
2) Describe the behavioral Model.
3) Describe the functional modeling.
4) List the layers of the object oriented system design.


Sample Test Paper-II
Course Name : Computer Engineering Group
Course Code : CO/ CM /IF
Semester: Fifth
Subject: Software Engineering
Marks: 20
Time: 1 Hour

Q.1 Attempt any two.-----------08 Marks
1) State four risk components & give meaning.
2) Describe the PERT.
3) Describe the Black Box testing.

Q.2 Attempt any three-----------12 Marks
1) State the phases of software project planning.
2) What are the factors responsible for software project failure?
3) Describe the alpha and beta testing.
4) Describe the term SQA.





Sample Question Paper-I
Course Name : Computer Engineering Group
Course Code : CO/CM/IF
Semester: Fifth
Subject: Software Engineering
Marks: 80

Q. 1 Attempt any Four.--------16 Marks
1) List the types of process patterns
2) Describe first two Core Principles of software engineering.
3) Describe Recovery Testing
4) Describe People and Process management spectrum.
5) Describe the term “Software Quality Assurance”
6) Describe the role of system analyst.

Q. 2 Attempt any Three.---------------12 Marks
1) Describe Waterfall Model.
2) List software process assessments and describe first two.
3) Describe Behavioral Model
4) List steps for creating Data Flow Model

Q. 3 Attempt any Three.-------------12 Marks
1) List the techniques of White Box Testing.
2) Describe CPM.
3) Describe Problem Decomposition.
4) Describe Reactive vs. Proactive Risk strategies

Q.4 Attempt any Two.---------16 Marks
1) Describe following Requirement Engineering Tasks.
a.Inception b. Elicitation. c.Elaboration. d. Negotiation.
2) Describe Types of System Testing.
3) What is Debugging? And Describe process of debugging.

Q.5 Attempt any Three.---------12 Marks
1) List Different phases of software project planning and management.
2) Describe Cost estimation techniques.
3) Describe ‘ISO 9000’ Standards.
4) Describe software feasibility,

Q.6 Attempt any Three.--------12 Marks
1) Describe major cost component for project
2) Describe different activities under phase-I.
3) Describe Data attributes and Data relationship.
4) List notations used in Data Dictionary.

java , jpr 20 marks and 80 mark MSBTE third year fifth semester co,cm,cd,if CO/cd/cm/if SAMPLE question paper

Sample Test Paper-I
Course Name : Computer Engineering Group
Course Code : CO/CM/IF/CD
Semester: FIFTH
for CO/CM/IF and Sixth for CD
Subject: Java Programming
Marks: 20


Q1. Attempt any Two of the following.---------4 x 2 = 8 Marks
a) What do you mean by garbage collection in java.
b) Explain the term Wrapper class.
c) How multiple inheritance is achieved in java?

Q2. Attempt any Three of the following.-------4 x 3 = 12 Marks
a) Write a java program to define a class Rectangle. Assume suitable
members and calculate area and perimeter of the rectangle.
b) Describe the uses of final and super with respect to inheritance.
c) Describe the following methods related to String
  • replace()
  • compareTo()

d) What is a package? How to create it?






Sample Test Paper-II
Course Name : Computer Engineering Group
Course Code : CO/CM/IF/CD
Semester : FIFTH for CO/CM/IF and Sixth for CD
Subject: Java Programming
Marks: 20


Q1. Attempt any TWO of the following.--------4 x 2 = 8 Marks
a) Give the purpose of each arguments used in the method fillarc()
b) What is finally block? When and how it is used.Give a suitable example.
c) Explain the functionality of a FILE class.


Q2. Attempt any THREE of the following.-----4 x 3 = 12 Marks
a) Explain the following methods related to thread
i) wait()
ii) sleep()
b) Distinguish between applet and frame.
c) What is an Exception? How it is handled? Give suitable example.
d) Write a simple applet program to display “ Hello World ”.




Sample Question Paper-I
Course Name : Computer Engineering Group
Course Code : CO/CM/IF/CD
Semester: FIFTH
for CO/CM/IF and Sixth for CD
Subject: Java Programming
Marks: 80

Q1. Attempt any Four of the following-------16 Marks

a) State any four features of java.
b) Describe arithmetic operators with examples.
c) Describe different java access specifiers.
d) How to create a package? Explain with examples.
e) What is difference between vector and array? Give suitable example.
f) Explain file input class with suitable example.


Q2. Attempt any Three of the following-------12 Marks

a) Define the following terms

i) Static method
ii) Garbage Collection
b) Give the working of Anonymous classes in details.
c) Describe the various levels of access protection available for packages.
d) Write an applet application that display the string “Click” every time the mouse button is
clicked.



Q3. Attempt any Three of the following------12 Marks
a) What is a thread? Describe the complete life cycle of thread.
b) Write an applet for each of following graphics methods.
drawoval() , drawrect() , drawline() , filloval()
c) Write a program to implement the fibonacci series using any control structure
d) What are similarities between Interfaces and Classes?

Q4. Attempt any Two of the following----16 Marks

a) Explain the following terms with respect to exception handling.
i) try
ii)catch
iii)throw
iv)finally
b) Explain dynamic methods dispatch with examples.
c) Write a program to create two threads so one thread will print odd numbers where as
second thread will print even numbers between 1 to 20 numbers.

Q5. Attempt any Three of the following---12 Marks
a) Describe left shift and right shift operators with examples.
b) How do we add class or interface to a package?
c) Draw the life cycle of an applet and explain it.
d) Distinguish between
i) Inputstream and Reader classes
ii) Outputstream and Writer classes

Q6. Attempt any Three of the following----12 Marks
a) How do applets differ from application programs with examples?
b) Write a program to demonstrate uses of implementing interfaces.
c) Write an applet program that accepts two input string using tag and
concatenate the strings and display it in status window.
d) Define an exception called “NoMatchException” that is thrown when a string is not
equal to “India”.

computer security 20 marks and 80 mark MSBTE third year fifth semester co,cm,cd,if CO/cd/cm/if SAMPLE question paper CS ,

Sample Test Paper-I
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 20
Time: 1 Hrs

Q.1 Attempt any TWO.---------08 Marks
a. State and Describe Security goals.
b. Describe piggy backing and Shoulder Surfing
c. Describe cryptography and cipher text

Q.2 Attempt any THREE.---------12 Marks
a. “I am Third Computer Engineering student studying in 6th semester” convert it
into cipher text using double transposition method.
b. What is digital Certificate and how it can be used for authentication?
c. What is Access control? List the method of access control and describe the one
which is mostly used now days
d. What attack? List different type of attack? Describe the attack which includes
zombies as agent of attack.





Sample Test Paper-II
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 20

Q.1 Attempt any TWO.-------08 Marks
a. What is Firewall? List Different type of fire wall.
b. What is intruder? Describe Intruder Detection System.
c. Describe Virtual Private network.

Q2. Attempt any THREE.--------12 Marks
a. List Different Email Protocols and describe any one in detail.
b. Draw SSL architecture and Describe How to secure Socket Layer.
c. Describe Hierarchical Trust Model.
d. What is Hardening and describe it related to Unix / Linux system.



Sample Question Paper
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 80
Time: 3 Hrs.

Q.1 Attempt any FOUR. --------16 Marks

a. List and Describe basic components of computer security.
b. List the step in verifying authencity and integrity of the digital certificate.
c. Describe the of denial of service attack with help of diagram.
d. What is IP security? Describe Authentication Header mode of IP security.
e. With the neat diagram describe network intrusion system mechanism.
f. What does encryption means? Describe shiif cipher encryption technique.

Q.2 Attempt any TWO.---------12 Marks
a. What is virus and Worms? Describe the virus spreading mechanism.
b. With respect to security policies, describe policies, standard, guideline and procedure.
c. Describe the handprint and Fingerprint mechanism for authentication of the user.

Q.3 Attempt any TWO.----12 Marks
a. Describe what is code injections and how to prevent code injection.
b. Describe caeser’s cipher substitution technique of cryptography
c. Describe buffer overflow and different status of the stack related to buffer overflow

Q.4 Attempt any TWO.--------16 Marks
a. What is operating system security? Compare the security system of windows and Linux
operating system.
b. Describe single homed bastion and screened host gateway type of firewall
c. Describe the component of Host Based IDS? State its advantage and disadvantages.

Q.5 Attempt any THREE.-----------12 Marks
a. Describe Threat, Vulnerability and attack as characteristics of Computer Intrusion.
b. List the method of defense? Describe controls, Encryption related to defense methods.
c. Describe MD2, MD4, MD5 hashing functions.
d. Describe the requirement and solution to email security.

Q.6 Attempt any THREE.----------12 Marks
a. What is Hash Function? Describe with example.
b. Describe the handwriting and signature process of verification.
c. Explain symmetric and asymmetric key cryptography.
d. List and describe different ways of web security.

MAT, Multimedia and Animation Techniques 20 marks and 80 mark MSBTE third year fifth semester co,cm,cd,if CO/cd/cm/if SAMPLE question paper

Sample Test Paper-I

Course Name : Computer Technology / Information Technology

Course Code : CO/CM/IF

Semester: Fifth

Subject: Multimedia and Animation Techniques (Elective – I)

Marks: 20

Time:1 Hr.

Q.1 Attempt any TWO.

08 Marks

a. Describe Holographic images and its use.

b. Draw a block diagram of components of Digital Camera.

c. What is Orchestration?

Q.2 Attempt any THREE.

12 Marks

a. Describe approximate and observation based QOS.

b. Explain intercolative and predictive compression techniques.

c. Describe MPEG-2 and MPEG-4.

d. Draw a labeled sequential coding block diagram for JPEG.




Sample Test Paper-II

Course Name : Computer Technology / Information Technology

Course Code : CO/CM/IF

Semester: Fifth

Subject: Multimedia and Animation Techniques (Elective – I)

Marks: 20


Q.1 Attempt any TWO.

08 Marks

a. Describe dedicated multimedia authoring system.

b. Describe the telephone metaphore.

c. Explain line tool of Flash with example.

Q.2 Attempt any THREE.

12 Marks

a. What are the components of Distributed Multimedia System?

b. What are the services provided by the User Interface Service Agent?

c. Write stepwise procedure to create the layers and insert a JPEG picture from a

file on hard disk.

d. Describe Object Directory Service agent of distributed multimedia system.

Sample Question Paper

Course Name : Computer Technology / Information

Course Code : CM/IF

Semester: Fifth

Subject : Multimedia and Animation Techniques (Elective – I)

Marks: 80

Q.1 Attempt any FOUR.

16 Marks

a.

(i) List any four components of Multimedia file.

(ii) Define Pixel and Roping display terminology.

b. Describe tightly controlled and bounding related to QOS architecture.

c. What benefits are achieved by using compression in multimedia systems?

d. State four design related issues in multimedia authoring system.

e. State four topologies used for multi-server network.

f. Which tool is used to create shape in flash? Explain with example.

Q.2 Attempt any THREE.

12 Marks

a. Describe image Annotation and its use.

b. Why the traditional input devices are not suitable for multimedia systems? List the

multimedia devices used for video conference.

c. Give meaning of CD-ROM, WORM, Rewriteable, Multifunction.

d. Describe working of Digitizer and state function of dictionary of electronic pen.

Q.3 Attempt any THREE.

12 Marks

a. Draw a block diagram of video compression technique.

b. What is the use of paint bucket tool? How Gap size and Lock fill options are used?

c. Draw a block diagram of model of a Timeline Based Multimedia Authoring System.

d. What is Scene Change Frame Detection? Why it is required?

Q.4 Attempt any TWO.

16 Marks

a. Describe with figure DCT Encoding and Quantization related to JPEG.

b. When different types of multimedia objects on the same server are combined? What

should be motive to separate them?

c. Describe the time-line, tool box, panels, and Stage of the Flash environment.

Q.5 Attempt any THREE.

12 Marks

a. Define middleware and list its four functions related to distributed computing.

b. How the direct and index access to the information can be made in multimedia

authoring and user interface?

c. What is JPEG? Write full form of RIF and RIFF.

d. What is the use of colour mixer and colour component panel?

Q.6 Attempt any THREE.

12 Marks

a. Describe the role of Data-processing server and full motion video server.

b. Differentiate between embedding and linking with reference to storing and editing of

multimedia objects.

c. Describe how I and B pictures are decoded in MPEG.

d. Describe the importance of synchronization in multimedia application.



os, operating system 20 marks and 80 mark MSBTE third year fifth semester co,cm,cd,if CO/cd/cm/if SAMPLE question paper

Sample Test Paper - I

Subject

: Operating System

Max Marks : 20

.

Q.1 Attempt any Two of the following.------08 Marks

a) State and explain different Operating System services.

b) Explain process control block with suitable diagram.

c) What is mean by Operating System? Write difference between multitasking and

multiprogramming.



Q.2 Attempt any Two of the following.----------12 Marks

a) Write different types of Operating System structure. Explain any two in detail.

b) Explain following terms

i)Multiprocessor systems.

ii)Distributed systems.

iii)Clustered Systems.

c)

i) Explain file management.

ii) What is mean by system call? Write system calls for process control.




Sample Test Paper - II

Subject

: Operating System

Max Marks : 20

Q.1 Attempt any Two of the following.08 Marks

a) Define thread. State the benefits of threads.

b) Explain Round Robin (RR) scheduling algorithm with suitable example.

c) What is Deadlock? How to prevent Deadlock?


Q.2 Attempt any Three of the following.12 Marks

a) Explain the following terms.

i)Sequential access method.

ii)Direct access method.

b) What is Virtual Memory? Explain the concept of Paging.

c) Explain the following terms.

i)First In First Out (FIFO).

ii)Least Recently Used (LRU).

d) Explain any two allocation methods.



Sample Question Paper - I

Course Name : Computer Engineering Group

Course Code : CO/CM/CD/IF

Semester: Fifth

Subject: Operating System

Max Marks : 80

Time: 3 Hours



Q.1 Attempt any FOUR of the following.16 Marks

a) What is Operating System? Explain the concept of time sharing.

b) State uses of system calls.

c) State and explain different process states.

d) State the concept of mutual exclusion.

e) Explain with suitable diagram layered and monolithic operating system structures.

f) Explain concept of swapping with diagram.


Q.2 Attempt any THREE of the following.-------12 Marks

a) State and explain different operating system services.

b) Differentiate between sequential and batch processing.

c) What do mean by scheduler? State types of scheduler.

d) Differentiate between Pre-emptive and Non-emptive scheduling.


Q.3 Attempt any TWO of the following. -------12 Marks

a) What is booting? Explain the concept of device management.

b) Write different types of operating system structures. Explain any two with suitable

diagram.

c) What is process? Draw process state diagram and state its meaning.


Q.4 Attempt any TWO of the following.16 Marks

a) Explain in detail multithreading models with suitable example.

b) What is Deadlock? Explain concept of critical region and Deadlock handling.

c) Differentiate between the following terms

i)Contiguous and Linked allocation.

ii)Linked and Indexed allocation.


Q.5 Attempt any THREE of the following.-------12 Marks

a) Differentiate between multitasking and multiprogramming.

b) State real time and multiprocessor system.

c) State and explain operations on processes.

d) Explain CPU and I/O Burst cycle with suitable diagram.


Q.6 Attempt any TWO of the following.----12 Marks

a) Solve the following problem by using following scheduling algorithms

Processes Burst Time

  • 1
  • 27
  • 2
  • 6
  • 3
  • 3

i)FCFS.

ii)SJF.

iii)Round Robin.

b) Explain different free space management techniques.

c) Explain the FIFO, Optimal and LRU page replacement algorithm for the reference string,

7 0 1 2 0 3 0 4 2 3 1 0 3.



 

ana