IGNOU MCS-22 (July 2023 - January 2024) Assignment Questions
Q1. (a) Explain two approaches used to improve system performance by overlapping input, output and processing in CPU.
(b) Explain the characteristics of multiprocessor operating system.
Q2. (a) What is Token Ring? How does it work? Differentiate between token ring and token bus.
(b) What is meant by Trust Relationship? Discuss the role of Kerberos and Domain controller in maintaining trust relationships.
Q3. (a) Describe the pre-installation checks and information gathering that need to be carried out before installing LINUX on a computer.
(b) Differentiate between absolute and relative path names, along with an example of each.
Q4. Answer the following questions related to Linux commands:
(a) Is desired to create a file in LINUX called "newfile" that consists of the last 15 lines of a file "filer followed by the last 6 lines of a file "file2". Both "filet" and "file2" already exist. Write the sequence of commands in LINUX to achieve this
(b) Write the LINUX command to change the password of a user called "SOCIS" to "E93df!kN#". Who can run this command?
(c) Write the LINUX command to find the number of users currently logged into the system?
(d) Write the LINUX command to take a text file named "source-file" as input and circularly shift every small case letter forward by 5 characters, such that "a" becomes "f", "z" becomes "e" and so on, but "A", "3", "$" and other such characters are left unchanged.
Q5. (a) What is the Active Directory in Windows 2000? Describe, with the help of a diagram, the logical structure of the Active Directory.
(b) Differentiate the role and responsibilities of user mode and kernel mode of Windows 2000 system.
Q6. (a) Write a shell script which will generate the list of users along with details of files those are created /modified by the respective user during the specified time.
(b) Differentiate between LAN, MAN and WAN in terms of size, protocols, access mechanism, hardware devices and switching methods.
Q7. (a) What are the security services provided by IPsec? Discuss the two IPsec components in WINDOWS 2000. Also explain the policy options for IPsec implementation.
(b) List and describe various security features in WINDOWS 2000 O/S.
Q8. Write short notes on the following:
(a) NTFS
(b) Packet switching
(c) EFS services
(d) Firewall
IGNOU MCS-22 (July 2022 - January 2023) Assignment Questions
Q1. Discuss the key characteristics of a modern operating system.
Q2. Discuss the basic design issues in distributed OS which are different from traditional OS and network OS and how are they implemented?
Q3. Explain the memory management model of Linux Operating System.
Q4. (a) What is the default location of the print spooler in Windows NT?
(b) Explain virtual to physical address mapping concepts with the help of an abstract model. Make appropriate diagrams if required.
Q5. Answer the following questions related to Linux commands:
• List all the directories using echo command only
• List all the files within a directory including hidden files
• Display a Calendar for a specific month and year
• What will be the output of the following:
who| more
who –a
cat file name | more ℓs- ℓ > temp
• What options can be used with a grep command? Show output with each option
Q6. (a) What are the objectives of dynamic addressing and directory services in Windows 2000? How are they configured?
(b) How is static IP address different from dynamic IP address?
Q7. What is the meaning of map drive in Windows 2000? What are the benefits in mapping a network drive? Write all the steps for mapping a network drive. ?
Q8. Explain functions of Primary Domain Controller. Also, explain the role of the 'primary domain controller' and 'backup domain controller' in enhancing security of window 2000 server.
Q9. Write a Shell Script program to find Greatest Common Divisor (GCD) for any two numbers. Ensure that your script carries out basic error checking.
Q10. What are the three strategies that can be used to authenticate a user to a computer
system? Describe how authentication can be done using hardware tokens.
Q11. (a) Differentiate between dial-up connection and VPN connection for remote access. List the requirements to set up a VPN connection. Explain the steps for configuring Windows 2000 VPN
(b) Discuss the protocols and tools for providing secure VPN services
Q12. What are intrusion detection systems (IDS)? What IDS can do?
Q13. Define IPSec? What are its features? Discuss its implementation in Windows 2000.
Buy MCS-22 Assignment