Cse Question Bank
Cse Question Bank
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
10. (a) What is dead lock detection? Also discuss about the method used for resolution of deadlocks.
(b) Discuss in brief about timestamp ordering rule.
OR
11. Explain in detail about two approaches used for increasing the concurrency in locking schemes.
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
B.Tech. III Year II Semester-Model Paper IV
Distributed Systems
2 (a) Define Distributed Systems. Explain the significant consequences of defining distributed systems.
(b) Discuss in detail the URL component with example.
OR
3 (a) Explain in detail about the following architectural models
1.Client server model
2.Multiple servers model
(b) Discuss in brief about World Wide Web.
4. (a) What is the importance of time in distributed systems
(b) Describe the algorithm for external synchronization
OR
5. (a) What is Consensus Problem
(b) Discuss the two implementation of reliable multi cast
6. (a) List and discuss the characteristics of network that are hidden by the stream obstruction
(b) Discuss in detail about HTTP Protocol
OR
7. What is XML? Explain XML Schemas?
8. (a) Give an Over View of Types of Storage Systems and their properties
(b) Explain the file service architecture with a neat diagram
OR
9 (a) What are the requirements for the design of distributed file system
(b) Write about
(i) Hierarchic File Systems
(ii) File Groups
10. (a) Explain in detail the two-phase commit protocol
(b) What is a distributed deadlock? Explain briefly with an example?
OR
11. Explain in detail about the well-known problems of concurrent transactions
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
B.Tech. III Year II Semester-Model Paper V
Distributed Systems
Time: 3 Hours Max. Marks: 75
PART- A (Marks 25)
Answer All the Questions
1. a) What is the role of firewall in distributed system ? 3
b) What is an intranet? 2
c) Differentiate between RPC and LRPC. 3
d) What is XML name space ? Give example. 2
e) Give the difference between stub and skeleton. 3
f) Define distributed debugging. Give example. 3
g) A reliable multicast is one that satisfies the following properties 2
i) Integrity, validity
ii) Integrity, validity, agreement
iii) Integrity, validity, agreement and delivery
iv) Integrity, recoverability and durability.
h) What is dirty read? 2
i) List any three rules for committing nested transactions. 3
j) Define distributed shared memory. 2
(OR)
3. a) List out the Challenges in distributed systems? Explain it? [5M]
b) Explain in detail about Failure model? [5M]
SECTION – II
(OR)
5. What is the need of election algorithm? Explain ring based election algorithm. [10M]
SECTION – III
(OR)
7. a)write a Java API program for UDP client sends a message to the server and gets a reply
[5M]
b) Explain Types of overlay in Interprocess Communication? [5M]
SECTION – IV
(OR)
9. a) Discuss about the Design and Implementation issues in Distributed Shared Memory? [5M]
b) Explain Sequential consistency in Distributed Shared Memory? [5M]
SECTION – V
10. a) Discuss Flat and Nested Distributed Transactions in Distributed Transactions? [5M]
b) Explain Comparison of methods for concurrency control in Transactions and Concurrency
control [5M]
(OR)
*****
Code No: 126AQ R13
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
B. Tech III Year II Semester Examinations, May - 2016
INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3hours Max.Marks:75
PART- A
(25 Marks)
PART-B
(50 Marks)
2.a) Consider the following:
Plaintext: “PROTOCOL”
Secret key: “NETWORK”
What is the corresponding cipher text using play fair cipher method?
b) What is the need for security? [5+5]
OR
3.a) Explain the model of network security.
b) Write about steganography. [5+5]
PART - A
(25 Marks)
1.a) Explain the network security model. [2]
b) What are the two basic functions used in encryption algorithms? [3]
c) What are the advantages of Key Distribution? [2]
d) What are the principles of public key cryptosystems? [3]
e) List three approaches to Message Authentication. [2]
f) Explain the importance of knapsack algorithm. [3]
g) What are different approaches to Public-key Management? [2]
h) How does PGP provides public key management? [3]
i) What is Secure Socket Layer? [2]
j) What are different alert codes of TLS protocol? [3]
PART - B
(50 Marks)
---ooOoo---
Code No: 126AQ
R13
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
B. Tech III Year II Semester Examinations, May - 2017
INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3 hours Max. Marks: 75
PART - A
(25 Marks)
PART - B
(50 Marks)
2.a) Discuss in detail about various types of Security attacks with neat diagrams.
b) Give a model for Network Security with neat diagram. [5+5]
OR
3.a) What is symmetric key cryptography? Discuss its advantages and limitations.
b) Explain various substitution techniques with suitable examples. [5+5]
4.a) Explain DES algorithm with suitable examples. Discuss its advantages and limitations.
b) What is Elliptic Curve Cryptography (ECC)? Discuss ECC algorithm with neat
diagram. [5+5]
OR
5.a) Explain RSA algorithm with suitable examples.
b) Write a short note on RC4. [5+5]
10.a) What is Intrusion? Discuss Intrusion detection system with neat diagram.
b) Discuss the need of Secure Socket Layer. [5+5]
OR
11.a) Write a short note on firewall design principles and types of firewalls.
b) Discuss in detail about secure electronic transaction. [5+5]
---ooOoo---
Code No: 126AQ
R13
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
B. Tech III Year II Semester Examinations, December - 2017
INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3 hours Max. Marks: 75
PART - A
(25 Marks)
PART - B
(50 Marks)
2. Compare and Contrast between Symmetric and Asymmetric key cryptography. [10]
OR
3. Give an example to explain the concept of transposition ciphers in detail. [10]
4. With a neat diagram explain how encryption and decryption are done using Blowfish
algorithm? [10]
OR
5. Given two prime numbers p=5 and q=11, and encryption key e=7 derive the decryption
key d. Let the message be x=24. Perform the encryption and decryption using R.S.A
algorithm. [10]
6. Give a neat sketch to explain the concept of Secured Hash Algorithm (SHA). [10]
OR
7. Client machine C wants to communicate with server S. Explain how it can be achieved
through Kerberos protocol? [10]
8. How the messages are generated and transmitted in pretty good privacy (PGP)
protocol? Explain with clear diagrams. [10]
OR
9. Draw the IP security authentication header and explain the functions of each field. [10]
10. Explain the steps involved in performing Secure Inter-branch Payment Transactions.
[10]
OR
11. List the characteristics of a good firewall implementation? How is circuit gateway
different from application gateway? [10]
---ooOoo---
R15
Code No: R15A0519
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution – UGC, Govt. of India)
III B. Tech II Semester Regular Examinations, April/May 2018
Information Security
(CSE)
Roll No
Time: 3 hours Max. Marks: 75
Note: This question paper contains two parts A and B
Part A is compulsory which carriers 25 marks and Answer all questions.
Part B Consists of 5 SECTIONS (One SECTION for each UNIT). Answer FIVE Questions, Choosing
ONE Question from each SECTION and each Question carries 10 marks.
*****
PART – A (25 Marks)
1.
a) Enumerate the mechanisms implemented for confidentiality? (2M)
b) Use Caesar cipher with key =15 to encrypt the message “college”? (3M)
c) Define stream cipher? (2M)
d) Discuss the design principles of block cipher technique? (3M)
e) What are the advantages of Key Distribution center? (2M)
f) Write any two advantages of hashing functions? (3M)
g) Why does PGP generate a signature before applying compression? (2M)
h) What is secure socket layer? (3M)
i) How to manage pass word? (2M)
j) What is the firewall? (3M)
2. (a) What are the different types of attacks and services? Explain? (4M)
(b) Explain any three substitution techniques. (6M)
[OR]
3. (a) Write about any two classical crypto systems with suitable examples? (4M)
(b) Explain about Hill Cipher. Consider the plaintext "paymoremoney" and use the (6M)
encryption key:
17 17 5
K= 21 18 21. Find the cipher text?.
2 2 19
SECTION – II
6. (a) Write about HMAC algorithm. What need to be done to speed up HMAC algorithm? (4M)
(b) With a neat flowchart, Explain MD5 processing of a single 512 bit block? (6M)
[OR]
7. (a) Explain the message sequence of Kerberos V4. (5M)
(b) Explain SHA-512 with neat diagram? (5M)
SECTION – IV
8. (a) What is R64 conversion? Why is R64 conversion useful for an e-mail application? (5M)
(b) What are the content types provided by S/MIME? Explain? (5M)
[OR]
9. Explain transport and tunnel mode for AH & ESP (10M)
[OR]
SECTION –V
10.(a) Generalize the role of intrusion detection system? Point out the three benefits that can (6M)
be provided by the intrusion detection system ?
(b) List out the participants of SET system, and explain in detail? (4M)
[OR]
11.(a) Illustrate the three common types of firewalls with diagrams ? (6M)
(b) Is it technically possible to have elections on the Internet? How? What sort of (4M)
infrastructure would be needed for this?
*****
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
Permanently Affiliated to JNTUH, Approved by AICTE-Accredited by NBA & NAAC- A-Grade; ISO 9001:2008 Certified
MODEL PAPER - I
INFORMATION SECURITY (A60522)
Time : 3.00 Hours Max.Marks: 75
Note:- This question paper contains TWO parts Part-A and Part-B.
Part – A is contains TEN questions and carries 25 marks. Answer all questions from it
Part–B contains FIVE questions either or type from each of the FIVE units. Answer any
One full question from each unit and each question carries 10 marks and may have a, b,c
as sub questions.
PART-A (25 Marks)
2. A) What are the goals of Network Security and explain each with an example? [4M + 6M]
B) Discuss the man in-middle attack in network communications?
OR
3. A) Convert the following plain text message P=”Hide the gold in the tree stump” into cipher text with
key k=”play fair example” by using play fair cipher technique? [6M + 4M]
B) Explain the Transposition Techniques?
4. What are the elements of a Conventional Block Cipher? Explain the DES algorithm? [10M ]
OR
5. A) Explain RSA Algorithm with an example? [4M + 6M]
B) Discuss any three cipher block modes of operation.
Note:- This question paper contains TWO parts Part-A and Part-B.
Part – A is contains TEN questions and carries 25 marks. Answer all questions from it
Part–B contains FIVE questions either or type from each of the FIVE units. Answer any
One full question from each unit and each question carries 10 marks and may have a, b,c
as sub questions.
PART-A (25 Marks)
2. What are Security Attacks, Services, and Mechanisms? Discuss them with examples. [ 10M ]
OR
3. A) Discuss a model for network security with the help of a neat diagram? [6M + 4M]
B) What is RFC? Explain how an internet standard have been developed and approved
Using RFCs.
4. Define Block cipher and Stream Cipher and Explain in detail about the AES algorithm. [ 10M ]
OR
5. What are the principal elements of a public key cryptosystems? Explain the Diffie - Hellman key
Exchange algorithm? [ 10M ]
6. What is are Secure Hash functions? Explain the working of SHA-1 algorithm. [ 10 M ]
OR
7. What do you mean by the Kerberos Realm? Explain the working of Kerberos. [5M + 5M]
10. Demonstrate how SSL provide security services between TCP applications? [ 10 M ]
OR
Note:- This question paper contains TWO parts Part-A and Part-B.
Part – A is contains TEN questions and carries 25 marks. Answer all questions from it
Part–B contains FIVE questions either or type from each of the FIVE units. Answer any
One full question from each unit and each question carries 10 marks and may have a, b,c
as sub questions.
PART-A (25 Marks)
2. What are Security Mechanisms? Explain different mechanisms used in information security?
Discuss a model for network security. [ 10M ]
OR
3. A) Compare and contrast DES, 3-DES and AES? [6M + 4M]
B) Illustrate the procedure of key distribution in conventional encryption?
4. What are “Substitution” and “Transposition” techniques? What kind of cipher is the Caesar
cipher? Calculate the encryption and decryption for the following plain text P=”COME TO MY
HOME” by using caser cipher with Key k=3? [ 10M ]
OR
5. What are the ingredients of a public key cryptosystems? Explain the RSA algorithm with your
own example? [ 10M ]
OR
7. A) Explain X.509 authentication service [5M + 5M]
B) Discuss Biometric Authentication.
OR
9. A) Discuss the purpose of SA selectors?
B) Define payload? And discuss about encapsulating security payload? [ 4M+6M ]
10. What do you mean by a secured electronic transaction? Discuss briefly about the various
components of SET system? [ 10 M ]
OR
11. Define an intruder. Explain different types of intruders. Discuss the Intrusion Detection System (IDS).
[ 10 M ]
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution- UGC. Govt. of India)
B.Tech. III Year II Semester Examination
Object Oriented Analysis and Design (CSE)
Time: 3 Hours Max. Marks: 75
PART- A (Marks 25)
Answer All the Questions
1. a) Define
i) Software architecture
ii) Artifact.
b) Enumerate any six artifacts.
c) Briefly explain any four standard constraints that apply to generalization relationships.
d) What are the properties of a well structured object diagram?
e) Draw a collaboration diagram that specifies the flow of control involved in registering a new student at a
school.
f) Explain the following standards stereotypes that adorn the ends of links.
i) Association.
ii) Self.
iii)Parameter.
g) What are the characteristics of deployment diagrams?
h) What are the characteristics of a well- structured model with time and space properties?
i) Draw a class diagram showing architectural overview of the library system.
j) For coding the specifications are fetched from which diagrams in the design model.
2. Explain the Association, Generalization and Realization relationships. Give suitable examples on which
context these relationships are specified.
OR
3. a) What are the rules of UML.
b) What is meant by dependency and Realization relationships. For what purpose they are used. Give
suitable examples to describe their usage.
OR
6. a)What are the contents, common properties and uses of interaction diagrams.
b) Define Synchronous and Asynchronous messages.
OR
7. Usecase diagrams are essential for managing system requirements. Substantiate this statement.
b) What is Object flow? Explain.
8. a) Explain the following advanced features of states and transitions.
i) Internal Transitions
ii) Concurrent substates
iii) Sequential Substates.
iv) History states.
b) Explain the common properties , common contents and common uses of deployment diagram
OR
9. a) What is the UML approach to process synchronization.
b) What is the UML notation for the following?
Explain briefly i) Timing marks ii) Time expressions iii) Timing Constraints.
10. a) List the steps involved while developing a unified library application.
b) List and explain the different usecases in the library system.
OR
11. Explain indetail about the following models
i) Analysis model.
ii) Design model.
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution- UGC. Govt. of India)
B.Tech. III Year II Semester Examination
Object Oriented Analysis and Design (CSE)
Time: 3 Hours Max. Marks: 75
1. a) What is generalization?
b) Write short notes on modularity.
c) Enumerate the steps to model new properties.
d) Why is it necessary to have a variety of diagrams in a model of a system?
e) Explain the following standard stereotypes that adorn the ends of links.
i) Local
ii) Global.
f) Discuss the significance of activity diagram in object oriented modeling.
g) Contrast active object vs reactive object.
h) Discuss the characteristics of a well- structured component diagram.
i) What are the steps followed while searching and reserving an item?
j) Define pattern.
1. a) List some of the advantages of object oriented approach over conventional approach.
b) What are the application areas of UML? Give any Five.
c) Enumerate the steps to model non-software things.
d) What is Class diagram.
e) What is the significance of Usecases and Collaborations.
f) Enumerate the properties of a well structural usecase.
g) Compare substates, nested states, composite states.
h) Explain forward engineering of a deployment diagram.
i) What is Framework.
j) Draw a sequence diagram for the Add title usecase.
1. a) What is an artifact?
b) What are the adornments in the UML?
c) What is navigation?
d) Explain the levels of visibility.
e) What is usecase diagram?
f) What are interaction diagrams?
g) What is a component?
h) What is deployment diagram?
i) What are the common uses of deployment diagram?
j) What are the three kinds of components?
6. a) What are the different kinds of Events? Explain any one common modelling
Technique. (5M)
b) Write the steps to reverse engineer a use case diagram. (5M)
(OR)
7. a) Explain about Interaction Diagrams with a suitable example. (5M)
b) What are Fork and Join, why do we need for Modelling, demonstrate with an Activity Diagram.
(5M)
SECTION – IV
8. a) What are the Characteristics of a well-structured model with time and space properties?
(5M)
b) Explain about State Chart Diagram for ATM with a suitable example. (5M)
(OR)
SECTION – V
10. a) Draw the UML Diagrams for Unified Library Application. (5M)
b) Write short notes on Processes and Threads. (5M)
(OR)
11. a) What are the Modeling Techniques for Use Case Diagram, Explain? (5M)
b) What are the Modeling Techniques for Object Diagram, Explain? (5M)
********
R 15
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
B. Tech III Year II Semester Examinations
SOFTWARE TESTING METHODOLOGIES
(MODEL PAPER - I)
Time: 3 hours Max Marks: 75
1. a) Write any two differences for black box and white box testing. [2]
b) Categorize different kinds of loops and explain briefly. [3]
c) Define a transaction. Give an example. [2]
d) What are dataflow machines? [2]
e) What is the difference between Linear and Nonlinear Boundaries? [3]
f) Write short notes on
(a) Path Products (b) Path Expressions. [2]
g) Reduce the following functions using Karnaugh Map method:
F(A,B,C,D)= p(4,5,6,7,8,12,13)+d(1,15) [3]
h) Differentiate between good state graphs and bad state graphs. [2]
i) Illustrate the applications of Node Reduction algorithm. [3]
j) What are graph matrices? Explain with an example. [2]
8. Write the steps involved in node reduction procedure. Illustrate all the steps with the help of
neat labeled diagrams. [10]
(OR)
9. a) Explain about the mean processing time of a routine with example.
b) Justify the following statement:
“Decision tables can also be used to examine a program structure” [5+5]
10. a) What are the principles of state testing? Explain its advantages and disadvantages.
b) Write about equivalence relation and partial ordering relation. [5+5]
(OR)
11. Write short notes on,
a) Transition bugs
b) Dead states
c) State bugs
d) Encoding bugs [10]
R 15
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
B. Tech III Year II Semester Examinations
SOFTWARE TESTING METHODOLOGIES
(MODEL PAPER - II)
Time: 3 hours Max Marks: 75
6. Discuss in detail the nice domains and ugly domains with suitable examples. [10]
(OR)
7. Explain the domain boundary bugs for two dimensional domains. [10]
8. What is decision table and how is a decision table useful in testing? Also explain with the
help of an example. [10]
(OR)
9. a) Explain Push/Pop arithmetic with example.
b) What are the rules of Boolean algebra? Explain. [5+5]
1. a) Specify on which factors the importance of bug depends. Give metric for it. [2]
b) What is meant by coincidental correctness? [3]
c) Differentiate control flow graphs and flowcharts. [2]
d) Write short notes on static and dynamic slicing. [3]
e) Differentiate equality predicate and inequality predicate. [2]
f) Write any two applications of regular expressions. [3]
g) What is a decision table? What are the parts of decision table? Explain. [2]
h) Explain briefly about Unreachable states [3]
i) What is a finite state machine? [2]
j) What is degree of a node and density of graphs? [3]
9. Write about Haung’s theorem. Explain its implementation with example. Explain its
generalizations and limitations. [10]
4. a) How an anomaly can be detected? Explain different types of data flow anomalies and data
flow anomaly state graphs. [10]
(OR)
5. a) Explain about data flow graphs.
b) Define the following terms:
1) Definition-clear path segment
2) Loop-free path segment
3) Simple path segment
4) du path [5+5]
6. What is meant by domain testing? Discuss various applications of domain testing. [10]
(OR)
7. a) Discuss testability of domains and interfaces.
b) Explain the domain boundary bugs for one dimensional domains. [5+5]
1. a) Discuss how software testing will ensure the quality of a developed software [2]
b) Give difference between functional testing and structural testing [3]
c) Categorize different kinds of loops and explain? [2]
d) Explain the construction of control flow graph? [3]
e) What is meant by data flow testing? [2]
f) Explain the procedure to construct a data flow graph. [3]
g) Discuss path sum with example [2]
h) Explain different ugly domains [3]
i) What are principles of state testing? [2]
j) Explain about matrix of graph in detail [3]
6. a) Explain how the transaction flow graph is used in functional testing [5]
b) Compare the path flow and data flow testing strategies [5]
(OR)
7. What is domain testing? Discuss nice and ugly domains with neat diagram [10]
8. a) Discuss about bode reduction procedure. [5]
b) Discuss the role of decision table in a test case design. [5]
(OR)
9. a) Explain Karnaugh map method to minimize the given function. [5]
b) Explain about the ambiguities and contradictions in the specifications [5]
10. a)Differentiate between good state graphs and bad state graphs
b) Write about building tools of graph matrices. [5+5]
(OR)
11. a) Write a partitioning algorithm in software testing.
b) What are relations and give their properties. [5+5]
Code No: R15A0520
R 15
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD
B. Tech III Year II Semester Examinations
Web Technologies
(Computer Science and Engineering)
Time: 3 hours Max Marks: 75
Note: This question paper contains two parts A and B. Part A are compulsory which carries 25 marks.
Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit.
Each question carries 10 marks and may have a, b, c as sub questions.
MODEL PAPER – 1
PART-A (Answer all the Questions)
2. Create a user registration form using HTML with the following fields: First Name, Middle Name,
Last Name, Gender (Male / Female), Contact Number, E-Mail ID, Submit button and a Reset
Button. (10M)
(OR)
3. What is CSS? Explain different types of CSS with examples.
6. Explain the method of reading the names and values of parameters that are included in a client
request in servlets. Illustrate this with an example program. And discuss the methods defined by
ServletRequest interface. (10M)
(OR)
7. List and describe the classes that are provided in the javax.servlet package. Explain how Http
Request and Http Response are handled in servlets with an Example Program. (10M)
4. Create an XML file for an employee (EMPID, EMPNAME, DOJ, SALARY). Create a DTD and a
Schema for this xml file. (10M)
(OR)
5. a. What is an array? Explain types of arrays in PHP.
b. What are the differences between SAX and DOM. (5M+5M)
8. Define Java Server Pages? What are the elements of a JSP page (or) components of JSP? Write
short notes about each element with examples. (10M)
(OR)
9. Write a short notes about session tracking and explain in detail about different ways of maintaining
sessions in JSP(Cookies, Rewriting URLs & form hidden object) (10M)
5. (a) List any two XML tags with their attributes and values.
(b) Collect the student’s details such as, register number, name, subject and marks using
forms and generate a DTD for this XML document. Display the collected information
in the descending order of marks. Write XML source code for the above. [4+6]
6. (a)Develop a servlet that handles an HTTP POST request.
( b) Discuss about Session tracking in Servlets with a suitable example. [5+5]
(OR)
7. a) What are the two objects that a servlet receives when it accepts a call from client?
b) How does server side programming differ from client side programming? (10M)
8. What is the key difference between Http servlet Response. send Redriect() and <jsp:forward>?
Explain. (10M)
(OR)
9. Describe the anatomy of a JSP page.
b) Write a in brief about JSP Declarations. (10M)
10. a) What is JDBC? What are various drivers of JDBC? (5+5)
b) Explain about the database connectivity using JDBC.
(OR)
11. What is a Java Bean? Explain Deploying java beans in a JSP page with example. (10M)
Code No: R15A0520
R 15
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD
B. Tech III Year II Semester Examinations
Web Technologies
(Common to Computer Science )
Time: 3 hours Max Marks: 75
Note: This question paper contains two parts A and B. Part A are compulsory which carries 25 marks.
Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit.
Each question carries 10 marks and may have a, b, c as sub questions.
MODEL PAPER – 4
PART-A(Answer all the Questions)
1. a) Write the structure of HTML Program. (2M)
b) What are the various styles in CSS. (3M)
c) Write the structure of PHP script with an example. (2M)
d) Write some event handlers in Java Script. (3M)
e) What are XML schemas? (2M)
f) How to define a constant variable in PHP? Give an example (3M)
g) Differentiate between HttpServlet and GenericServlet. (2M)
h) List different JSP Elements? (3M)
i) Explain about Connection Establishment in JDBC. (2M)
j) Define bean and explain how to use beans in JSP? (3M)
PART-B (Answer any one full question from each unit)
2. Design an application form of name, password, age, mobile no, email-id, address, reset and
submit button using HTML. (10M)
(OR)
3. Explain the various control statements available with JavaScript. (5M)
What is an event? How can we handle events in JavaScript?. (5M)
4. a) How we can retrieve the data in the result set of MySQL using PHP? Explain. [5M]
b) What is the difference between explode () and split () functions in PHP? (5m)
Explain with an example. (OR)
5. Create a XML document to store voter ID, voter name, address and date of birth details. Create a
DTD to validate the document. [5M]
b) What is DOM? Draw the detailed DOM objects structure. Explain its usage. (5m)
6 a) Write a Servlet program to read data from an application form using Request? (5m)
b) Explain how HTTP POST request is processed using Servlets (5m)
(OR)
7. What are the two objects that a servlet receives when it accepts a call from client? (5m)
b) How does server side programming differ from client side programming? (5m)
8. What is the key difference between Http servlet Response? send Redriect() and
<jsp:forward>? Explain. (10M)
(OR)
9.What is a Java Bean? Explain Deploying java beans in a JSP page with example. (10M)
10. List the statements that are used to connect JSP with JDBC. (5m)
Explain Accessing a Database from a JSP with example. (5m)
(OR)
11. Explain about the JSP Directive Elements? Explain each one of them in detail? (10M)