New Update

IGNOU BCA, MCA New, PGDCA New, M.com New, PGDIBO solved assignments July-January 2023-24 & January -July 2024 now available. Note: If do not get solved assignments after payment then mail us. Thanks You...

Saturday 1 April 2023

IGNOU MCS-022 term-end exam notes, upcoming guess papers, important questions with solution free download

IGNOU BCA, MCA, PGDCA MCS-022 term-end exam notes, upcoming guess papers, important questions free download. IGNOU BCA, MCA, PGDCA all semester new revised (1st semester, 2nd semester, 3rd semester, 4th semester, 5th semester and 6th semester) solved assignments, term-end exam notes, study materials,important questions, books/blocks (June-December) free download.
IGNOU BCA/MCA MCS-022 term-end exam notes,upcoming guess papers,important questions free download

IGNOU BCA, MCA, PGDCA MCS-022 Term-End Examination (OPERATING SYSTEM CONCEPTS AND NETWORKING MANAGEMENT) books/block, term-end exam notes, upcoming guess paper, important questions, study materials, previous year papers download.

S. No.

                         Topic with solutions

1.

Operating System

2.

Network

3.

Linux Operating System

4.

Shell Scripting

5.

Windows XP

6.

Advanced Windows 200 Networking

7.

Security Management

8.

Security

9.

Solved Questions papers (June 2014 to June 2019)

10.

Guess Questions

                                               Download


                                                                   Notes-1

1. (a) Write the steps to configure a Windows 2000 computer to ensure that users can log-on to the server only during the specified times.
(b) Differentiate the role and responsibilities of user mode and kernel mode of Windows 2000 system.
(c) Explain the various file access control mechanisms provided by LINUX operating system. Also, give the suitable example for each.
(d) List the important components of domain name server. Also, explain how the domain name server is configured in LINUX operating system.
(e) How is print server configured in Windows 2000 ? Also, explain the importance of print queue management.
(f) What is kerberos ? Explain the complete process of client authentication through kerberos.

2. (a) Write the use of following LINUX commands, with an example for each :
(i) cmp  (ii) sort
(iii) grep  (iv) chmod
(b) Describe the addressing scheme used in the Network layer and Transport layer of TCP/IP model.
(c) Differentiate between coaxial cable and optical fiber cable.

3. (a) What is Virtual Private Network (VPN) ? Describe the mechanism to create a virtual
private network. Also, explain the significance of VPN in security.
(b) Explain the principle of Token Ring protocol. Also , explain its working with the help of a suitable example.
(c) List the functions of Network Interface Card (NIC).

4. (a) Write a shell script which will generate the list of users along with details of files those are created /modified by the respective user during the specified time. Also, draw the flow-chart of this shell script.
(b) Differentiate between LAN, MAN and WAN in terms of size, protocols, access mechanism, hardware devices and switching methods.

5. Write short notes on the following (any four) :
(a) NTFS
(b) Packet switching
(c) IPsec
(d) EFS services
(e) Firewall

                                                             Notes-2

1. (a) Explain the collision avoidance mechanism of CSMA/CD. Also, differentiate between CSMA/CD and token passing access methods.
(b) Describe the concept and advantages of using EFS services in Windows 2000.
(c) What option in Registry Management will be useful in tracking who accessed the registry, from where, and when ? Also,write the steps for enabling this option.
(d) How does Windows 2000 manage the domains ? Also, explain how the trust relationship is created and managed between domains.
(e) Explain the steps for configuring the Local Area Network (LAN) in LINUX system.
(f) List the IPv4 class formats and its uses.

2. (a) Explain the built-in groups supported by Windows 2000. Also, discuss the group policies of each group.
(b) Explain the process of encryption and decryption in symmetric key, asymmetric key crypto systems.
(c) Write the advantages of Virtual Private Network.

3. (a) Compare and contrast between Network operating systems and Distributed operating systems. Also, list the advantages of Distributed operating systems over Centralized operating systems.
(b) Write a Shell script which will delete the temporary files from all local users after 24 hours of their creation/modification.Also, make the flow chart of this Shell script.
(c) Differentiate between bridges and gateways.

4. (a) Explain the file systems supported by LINUX systems. Compare these file systems with NTFS.
(b) Compare and contrast the 'Mandatory Access Control' and 'Discretionary Access Control' mechanisms in Windows.
(c) What is print server ? Write the steps to configure a print server in LINUX system.

5. Write short notes on the following (any four) :
(a) Proxy Server
(b) DNS
(c) RAID
(d) Network Topologies
(e) TCP/IP

                                                         Notes-3

1. (a) Briefly explain the following in the context of Domain Name System :
(i) Design Goals
(ii) Design Principles
(iii) Architecture
(iv) DNS Zones
(b) Explain the memory management in LINUX operating system.
(c) Discuss the Users' Administration in WINDOWS 2000 by highlighting :
(i) Existing User Accounts Modification
(ii) Managing User Profiles
(iii) Group Accounts Administration
(iv) Auditing
(d) Explain how fault tolerant systems can be designed to protect the system in the event of hardware failures using the following techniques :
(i) System Fault Tolerance technique
(ii) RAID

2. (a) Describe the process and file management in LINUX operating system.
(b) "A LINUX machine can be configured to work with a Network File System (NFS),where files on other machines on the network can be made available as if they were local files." Explain the process of configuring it.

3. (a) List and explain the various Network protocols being supported by WINDOWS 2000.
(b) Discuss the purpose of Virtual Private Network and explain how it can be configured in  INDOWS 2000.

4. (a) List the components of WINDOWS 2000 kernel and mention the functionality of each component.
(b) Describe the purpose and functioning of the following network devices :
(i) Repeaters
(ii) Hubs
(iii) Bridges
(iv) Gateways

5. Write short notes on the following :
(a) Network and Distributed operating system
(b) Auditing the Registry Access of WINDOWS 2000
(c) Backup and Restoration in LINUX
(d) Shell Scripts and its uses in LINUX

IGNOU BCA/MCA MCS-022 6th semester Term-End Examination (OPERATING SYSTEM CONCEPTS AND NETWORKING MANAGEMENT) term-end exam notes Download    

Also available:-

BCA all semester new solved assignments Download  

BCA all semester new revised books/blocks,study materials 
Download

MCA all semester new solved assignments Download  

MCA all semester new revised books/blocks,study materials Download 

BCA all semester term-end exam notes,important questions,guess papers (june-december) Download  

MCA all semester term-end exam notes,important questions,guess papers (june-december) Download 

BCA/MCA asp.net project Download