1.(a)Define a usecase?what are its common properties,contents and uses? (b)List out the various steps involved in modeling the content of a system? 2.What is a state?what are the several parts of a state?Enumerate the steps to model a family of signals? 3.Write about swimalanes in activity diagrams? 4.Explain briefly about the following terms: (i)Action states and activity states (ii)Transitions (iii)Branching. 5.(a)What are the common properties,contents and uses of the component diagrams? (b)Enumerate the steps to model source code and API? 6.Explain briefly about the following terms: (i)Signals (ii)Time and change events (iii)Call events (iv)Sending and receiving events.
Aware Center, Bhagawatipuram, Maheswaram Cross Roads, R R District, 501359, Telangana.
welcome
welcome to our college social blog
we have lot of information about our college fest and events etc
all of our college members join in this site .
to add to this blog
click on follow then select google
after that log in with your gmail id
thank you
KARTHIK REDDY.
Friday, March 25, 2011
OOAD
Wednesday, March 23, 2011
middle ware mid questions for IT
Middleware Technologies
--------------------------
1) a)write abt COBRA architechture?
b)write a simple COBRA program by taking any example?
2) write abt i)the portable count?
ii)multicount?
3) write abt Cobra activation services?
4) write abt COBRA JAVA-to-IDL mapping?
5) write abt events and properties if JAVA BEAN component model?
6) a)write a program to implement session beans by taking your own example?
b)write abt EJB architecture?
--------------------------
1) a)write abt COBRA architechture?
b)write a simple COBRA program by taking any example?
2) write abt i)the portable count?
ii)multicount?
3) write abt Cobra activation services?
4) write abt COBRA JAVA-to-IDL mapping?
5) write abt events and properties if JAVA BEAN component model?
6) a)write a program to implement session beans by taking your own example?
b)write abt EJB architecture?
CN MID QUESTIONS
Computer Network
-----------------------
1) a)distinguish b/w virtual circuit and datagram subnet?
b)write abt shortest path routing?
2) write abt distance vector routing?
3) write abt broadcast routing?
4) write abt IP protocal?
5) write tcp segment header?
6) a)write abt DNS?
b)write abt DES?
-----------------------
1) a)distinguish b/w virtual circuit and datagram subnet?
b)write abt shortest path routing?
2) write abt distance vector routing?
3) write abt broadcast routing?
4) write abt IP protocal?
5) write tcp segment header?
6) a)write abt DNS?
b)write abt DES?
IS MID QUESTIONS
Information Security QuestionS
--------------------------------
1) write abt IP security architecture?
2) write abt authentication header?
3) write abt secure socket layer (ssl)?
4) write abt secure electronic transaction(set)?
5) a)write abt snmp?
b)write abt intruders ,viruses ,threats?
6) write abt firewall design principles?
--------------------------------
1) write abt IP security architecture?
2) write abt authentication header?
3) write abt secure socket layer (ssl)?
4) write abt secure electronic transaction(set)?
5) a)write abt snmp?
b)write abt intruders ,viruses ,threats?
6) write abt firewall design principles?
CD MID questions
CD mid qustions.
1.a)write about organization for block structures languages.
b)write about hashing and free structures representation
2.write about runtime stack and heap storage allocation.
3.a)write about scope of optimization.
b)write about loop optimization.
4.write about
i)flow graph ii)data flow equation.
5.write about redunent sub expression elimination.
6.write about DAG for register allocation.
1.a)write about organization for block structures languages.
b)write about hashing and free structures representation
2.write about runtime stack and heap storage allocation.
3.a)write about scope of optimization.
b)write about loop optimization.
4.write about
i)flow graph ii)data flow equation.
5.write about redunent sub expression elimination.
6.write about DAG for register allocation.
AI mid questionsAI mid qutions..
- AI mid qutions..
- 1.a)write about neural networks principles.
- b)write about models of neuron.
- 2.write about pattern recognition problem.
- 3.write about analysis of fattern association networks.
- 4.write about analysis of pattern storage networks.
- 5.write about analysis of linear auto associateve ff networks.
- 6.a)write about analysis of pattern clustering networks.
- b)write about associative memory.
Sunday, March 20, 2011
OOAD AND CN LAB DATES
OOAD&CN
22/12/10
30/12/10
6/1/11
20/1/11
27/1/11
10/2/11
24/2/11
3/3/11
10/3/11
15/3/11
OS AND CD LAB DATES
os&cd lab dates
24/12/10
31/12/10
7/1/11
21/1/11
28/1/11
11/2/11
18/2/11
4/3/11
11/3/11
16/3/11
Tuesday, March 15, 2011
IS IMPORTANT QUESTIONS
1. wrt abt a)security attacks b)security services
2. wrt abt a model for internetwork security
3. wrt abt buffer overflow & format string vulnerabilities
4. wrt abt a)route table modification b)man-in-the middle attack
5. wrt abt conventional encryption principles
6. wrt abt a)substitution cipher b)transposition cipher
7. wrt abt DES
8. wrt abt cipher block modes of operation(ECM,CBC,CFB,OFB)
9. wrt abt key distribution approaches of message authentication
10. wrt abt HMAC
11. wrt abt RSA
12. wrt abt digital signatures
13. wrt abt key management using kerberos
14. wrt abt x.509 authentication service
15. explain PGP
16. explain S/MIME
17. wrt abt IP security architecture
18. wrt abt autheutication header
19. wrt encapsulating security payload
20. wrt abt SSL(secure socket layer)
21. wrt abt TLS(transport layer security)
22. wrt abt SNMP
23. wrt abt a)intruders b)viruses and related threats
24. explain firewall desing principles
25. wrt abt intrusion detection system
2. wrt abt a model for internetwork security
3. wrt abt buffer overflow & format string vulnerabilities
4. wrt abt a)route table modification b)man-in-the middle attack
5. wrt abt conventional encryption principles
6. wrt abt a)substitution cipher b)transposition cipher
7. wrt abt DES
8. wrt abt cipher block modes of operation(ECM,CBC,CFB,OFB)
9. wrt abt key distribution approaches of message authentication
10. wrt abt HMAC
11. wrt abt RSA
12. wrt abt digital signatures
13. wrt abt key management using kerberos
14. wrt abt x.509 authentication service
15. explain PGP
16. explain S/MIME
17. wrt abt IP security architecture
18. wrt abt autheutication header
19. wrt encapsulating security payload
20. wrt abt SSL(secure socket layer)
21. wrt abt TLS(transport layer security)
22. wrt abt SNMP
23. wrt abt a)intruders b)viruses and related threats
24. explain firewall desing principles
25. wrt abt intrusion detection system
CN IMPORTANT QUESTIONS
1. distinguish b/w tcp/ip & osi reference model
2. wrt abt networktopologies
3. wrt abt twisted pair
4. wrt abt coxial cable & optical fibre
5. wrt abt asynchronous communication
6. wrt abt narrow band & broad band ISDN
7. wrt abt a) stop & wait
b)sliding window protocols
8. explain HDLC
9. wrt abt ALOHA
10. wrt abt CSMA
11. wrt abt wireless LAN'S
12. wrt abt bridges
13. distinguish b/w virtual circuit & datagram subnet
14. wrt abt a)flooding b)hierarchical routing
15. explain distance vector routing
16. wrt abt broadcast routing
17. wrt abt congestion prevention policies
18. explain IP protocol
19. a)ICMP b)ARP
20. wrt abt OSPF
21. wrt abt connection management in transport layer
22. explain TCP segment header
23. wrt abt a) AAL1 b) AAL3/4
24. wrt abt DES
25. wrt abt RSA
26. wrt abt authentication protocols
27. wrt abt digital signatures
28. explain DNS
29. explain abt SNMP
30. wrt abt architecture of E-main
31. wrt abt PGP
32. wrt abt WWW
2. wrt abt networktopologies
3. wrt abt twisted pair
4. wrt abt coxial cable & optical fibre
5. wrt abt asynchronous communication
6. wrt abt narrow band & broad band ISDN
7. wrt abt a) stop & wait
b)sliding window protocols
8. explain HDLC
9. wrt abt ALOHA
10. wrt abt CSMA
11. wrt abt wireless LAN'S
12. wrt abt bridges
13. distinguish b/w virtual circuit & datagram subnet
14. wrt abt a)flooding b)hierarchical routing
15. explain distance vector routing
16. wrt abt broadcast routing
17. wrt abt congestion prevention policies
18. explain IP protocol
19. a)ICMP b)ARP
20. wrt abt OSPF
21. wrt abt connection management in transport layer
22. explain TCP segment header
23. wrt abt a) AAL1 b) AAL3/4
24. wrt abt DES
25. wrt abt RSA
26. wrt abt authentication protocols
27. wrt abt digital signatures
28. explain DNS
29. explain abt SNMP
30. wrt abt architecture of E-main
31. wrt abt PGP
32. wrt abt WWW
Subscribe to:
Posts (Atom)