6th Sem All Sub Pyq
6th Sem All Sub Pyq
6th Sem All Sub Pyq
Subject Code-13095
B. Tech. (CSE/IT) EXAMINATION
(Batch 2018 Onwards)
(Sixth Semester)
PYTHON PROGRAMMING
PCC-IT-308-T/PCC-CSE302-T
Time :3 Hours Maximum Marks : 70
Unit IV
J-13095 4 100
2000 o|oo03
Roll No. ....esoeeoe0do0e Exam Code : M-23
Subject Code-13086
B.Tech. (CSE/IT) EXAMINATION
IT-308-LIOE-CSE-392L/PCC-IT-305-TPEC
CSB411-T
server on Windows 10 ?
6. (a) Describe all network management
(b) Explain the configuration process for the functions in detail.
Web Server. 7x2=14
(b) Explain thestandard SNMP model in
3. (a) Write the steps used for Proxy Server detail. 7x2=14
Configuration.
7. (a) What is the network management model ?
(b) What is troubleshooting ? Explain the
Explain each one in detail.
following TCP/IP troubleshooting
commands. 7x2=14
(b) Compare and contrast organizational and
informational models. 7×2=14
L13086 2 (3-45-17-0523) J-13086 3 PT.0.
Unit IV
J-13086 4 100
(5-16-10-0523)
J-13093 1. Note: Hours
Time:3
..boo6|o003RolNol .
(iv) LALR(ii)Parsing Describe
buffering
(i) Inputi)
B.
question
compulsory. Tech.
Machine PCC-IT-306-T/PCC-CSE-401-T
Attempt
Subject
the COMPILER
DESIGN Onwards)
(Batch
2018
following from Five Semester)
(Sixth (CSEIIT)
depended All
questions Code-13093
questions each
: EXAMINATION
code Unit. Maximum
:70
in Marks
carry all, Exam
Q.
equal selecting Code
No.
PT.0. marks. M-23 :
1 one
14 is
J-13093 4. 3.
(a) (b) (a) (b) (a) (vi) SDT(v)
ABC ’S
Consider tObtain
he following Construct tools.Explainvarious What Role
following (a do of
regular | various phases you parsers.
the b)
regular a
Unit II minimal mean Unit I
following finite *
2 expression(ab)*b | of
expression compiler
compiler. by
automata state Compiler
grammar |
equivalent at DFAconstruction
(bb)* :
?
for Explain
14 to the 14
(5-16-11-0523)
J-13093 6. 5.
(a) B’E. EA S
’construct Test (b)
S the
4’B aS’A Construct ’ whether Eliminate B A
AaAb )grammar.
(ii) Describe C
following ’
’ ’ ’
XAy parsing
a Operator reduce
,Shift
Bb Aa
predictive the
BaBa Cc|
an UnitIII the left
XByXAz grammar f e |d
grammarSLR(1) precedence following recursion
3
parsing
is
parsing
: LL
table (1) : from
parsing.
table for or the
PT.0.
not
it above
for 14 : and
J-13093
8. 7.
(b) (a) (b) (a) (b)
thesegenerated table.
the Explainsymbol the What implemented How code
Triple generation
following What C CC LR
’S Check
compiler. various ’
errors ? is is Xgeneration (1)
syntax do cC whether
the = and or
during the data UnitIV (A
statements you
use Indirect ? b.| not
How ?
4
various structures of directed + Explain mean
?the
Explain B)*(C -
does the symbol schemes.
triple by following
various translation into various
we types
associated table withrepresentation intermediate
D)/E.
recover the
example. Convert
intermediate
phases of ? Quadruple, grammar
Explain scheme
from errors with
code
14 of 14 the 14
: is
J-13093 (a)9.
(b)
do
optimization
optimization Whatyouidentify by What
the
do
out term
you
? e
thleader
?
5 Explain What mean
basic
mean
?
blocks.Write do by
with
peepholeby you the
example. algorithm understand term
100 code
14 to
(3-26-12-0523)
J-13094 1. Attempt
Note : Time RolNo.l
(b) (a) INFORMATION
: EXAMINATION
(CSE/IT)
B.Tech.
3
DES. in questions question Hours ..OAOAS0003
Write Define swer
(Compulsory
Question) Onwards)
(Batch
2018
Code-13094
Subject
down threat type from Five (Sixth
carry PCC-IT-307-T Semester)
questions questions AND
the each
and equal
purpose Unit. CYBER
attack.
marks. is Marks:70
Maximum
in
Q. all, Code:
Exam
M-23
of compulsory. No. SECURITY
the selecting
1
S-Boxes of
P.T.0. short one
All
J-13094 3. 2.
(3-26-13-0523)
J-13094 6. 5. 4.
(a) (b) (a) (b) (a)
cybercrime
example andof authentication.
each.for Explain the WhatModel.
Biba
(iii) (ii)Lattice
Modelmodels
() Explainintegrity program.
Discussvulnerabilities
What the Give What
Bell-LaPadula
Model
advantage form is is Some is
in inthreats themeant
different
detailthe UnitIII meant
authentication brief most Unit II
that
3 to
the common
by examples by
provide of Database Database affect
following program
using ? the
at Write security
categories Security. codeof
Security security security
least
P.T.O.
security
form down
one and
8 5 7 of
7 ? ?
J-13094 (a)8. 7.
(b) (b) (a) (b)
security. amendments
cyberthreats
of Discuss also. IT
What hacker.Steganography.
the What (ii) (ii) () Write property What
Act, roles
is is Virus Key short
for the the do
andEthical in
2000 ÜnitIV
organizations most objective responsibilities
andloggers notes cyberspace you
4 Hacking Worms
common ? on mean
and
Discuss and the
Spywares ?
in scope ? Discuss by
types Briefly following
the of
its an intellectual
context
of
of ethicaldiscuss in
majorIndian brief.
web :
6 8 5 6
9.
26-14-0523)
J-13094
(b) (a)
Whatcontext
punishment cyber is socialDiscussthe What
computing do
of you
under cyber
challenges mean
5
Indian security. for
terrorismand by
organizations social
IT associated
with
Act, computing
2000 in
100 its the
5 ? 9 ?
(6-2-3-0523)
J-13101 1. Note Hours
Time:3 HIGH
(CSE/IT)
Tech.No....b003
B. Roll
B-ISDN
(c) Ethernet
(b) (a)Define
:
Traffic ofother Q. SPEED
the the No.
(Compulsory
Question) four Onwards)
(Batch
2018
Code-13
Subject101
following remaining
management questions 1 NETWORKSSemester)
(Sixth
is PEC-IT-305-T
compulsory
: four EXAMINATION 2023
selecting
in Units. Maximum
Marks
:70
TECHNOLOGIES
ATM and Exam
one
attemptany Code
2x7-14
from
P.T.0.
each M-23 :
J-13101 Writethe 6. 5. 4. Discuss 3. 2.
architechure.
protocol
layered diagram.
suitable
Describe ISDN Draw protocol
layered
applications.
its Define
Ethernet IPvóg)UDP()GSM(eCDMA
) (d)
services.
andits and
detail ATM. fibre protocol
Gigabit
explain
channel
description Unit Discuss
Unit II
architecture. architecture Unit I
2
Ethernet.
III protocol with
the
about topologies
ATM
architectureof and
Explain
IEEE
cell also
and
802.16. with explain
ports, 10GB
14, 14 14 14 14
a
(6-2-4-0523)
J-13101
9. 8. 7
format
Describe
architecture. Draw down Draw