Accounting and Financial Management (3) Analog and Digital Communication (2) Artificial Intelligence (2) BE(Civil) (2) BE(CSE) (83) BE(ECE) (11) BE(Mech) (10) Business Processes (3) C# and .NET Framework (2) Communication Skills (1) Compiler Design (1) COMPONENT BASED TECHNOLOGY (1) COMPUTER ARCHITECTURE (1) COMPUTER GRAPHICS and MULTIMEDIA SYSTEMS (6) COMPUTER INTEGRATED MANUFACTURING (1) Computer Networks (9) Computer Organization (2) Computer Programming (1) Consumer Behaviour (1) Control Systems (1) Cryptography and Network Security (3) Datastructures and Algorithms (10) Datawarehousing and Mining (1) DBMS (5) DESIGN AND ANALYSIS OF ALGORITHMS (9) DESIGN OF MACHINE ELEMENTS (1) DIGITAL PRINCIPLES AND SYSTEMS DESIGN (3) Discrete Mathematics (1) DISTRIBUTED COMPUTING (2) DSP (8) DYNAMICS OF MACHINERY (2) Economic Foundations (1) ELECTRICAL ENGINEERING (1) ELECTRICAL ENGINEERING AND CONTROL SYSTEMS (1) Electromagnetic Fields (3) ELECTRONIC CIRCUITS (1) ELECTRONIC COMMERCE (4) ELECTRONIC DEVICES AND CIRCUITS (1) EMBEDDED SYSTEMS (1) FUNDAMENTALS OF COMPUTING (2) Graphics and Multimedia (3) HEAT AND MASS TRANSFER (1) HUMAN RESOURCE MANAGEMENT (1) Internet Programming (9) INTRODUCTION TO FINITE ELEMENT ANALYSIS (1) Legal Aspects of Business (1) MANAGEMENT INFORMATION SYSTEMS (1) Marketing Management (1) MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (4) MATHEMATICS - I (1) MBA (9) MCA (83) MCA QUESTION BANK (2) MECHATRONICS (1) MicroProcessor and Controllers (4) MICROPROCESSORS AND APPLICATIONS (5) MIDDLE WARE TECHNOLOGIES (3) MOBILE COMPUTING (5) NETWORK PROGRAMMING (1) NUMERICAL METHODS (1) OBJECT ORIENTED ANALYSIS AND DESIGN (5) Object Oriented Programming (18) Operating System (2) OPERATING SYSTEMS (9) Organizational Behaviour (2) POWER ELECTRONICS (1) Principles of Management (8) PROBABILITY AND QUEUEING THEORY (2) Probability and Statistics (1) PROBLEM SOLVING AND PROGRAMMING (2) PROCESS PLANNING AND COST ESTIMATION (1) PROFESSIONAL ETHICS AND HUMAN VALUES (1) RANDOM PROCESSES (1) RESOURCE MANAGEMENT TECHNIQUES (2) ROBOTICS (1) Security analysis (1) Service Marketing (1) SIGNALS AND SYSTEMS (1) Software Engineering (8) SOFTWARE PROJECT MANAGEMENT (4) SOFTWARE QUALITY MANAGEMENT (2) System Software (2) TCP/IP PROTOCOL SUITE (3) Theory of Computation (4) Total Quality Management (2) UNIX AND NETWORK PROGRAMMING (4) Visual Programming (2) WEB GRAPHICS (2) WEB TECHNOLOGY (2) XML AND WEB SERVICES (4)

Tuesday, October 26, 2010

MC 1801 XML AND WEB SERVICES DEC 2008

M.C.A. DEGREE EXAMINATION NOVEMBER/DECEMBER 2008

FIFTH SEMESTER

MC 1801 – XML AND WEB SERVICES

(Regulation 2005)

Time: Three hours Maximum:100 marks

Answer ALL questions.

PART A – ( 10 * 2 = 20 marks )

1. Define web services.

2. Give the meaning of valid XML document.

3. Define namespace. Give its usage.

4. Specify the usage RDF in search engine.

5. What is SOAP design pattern?

6. Distinguish loosely coupled network and tightly coupled networks.

7. What is WDSL?

8. List out the functions of transaction server.

9. Mention the security requirements for e- business.

10. Specify the relationship between XKMS and PKI.

PART B – ( 5 * 16 = 80 marks)

11. (a) (i) Give the principle for creating new software. 6

(ii) Explain the role of XML in extended enterprises. 10

Or

(b) (i) List out the advantages of XML. 6

(ii) Explain data revolution of XML document. 10

12. (a) (i) Discuss the structure of XHTML. 6

(ii)Explain any two presentation technology. 10

Or

(b) (i) List out the various levels of DOM. Explain. 6

(ii) Explain the hierarchy of XML schema data types. 10

13. (a) (i) Write the usage of GET and POST methods of HTTP. 6

(ii)Explain the structure of SOAP protocol. 10

Or

(b) (i) List out the components of web services. Explain. 6

(ii) Explain the message structure of SOAP with example 10

14. (a) (i) Write the components of XML technology. 6

(ii)Explain the technology of web services. 10

Or

(b) (i) Discuss the usage of UDDI in error recovery. 6

(ii) Explain .NET frame work in detail. 10

15. (a) (i) Compare single key cryptography and public key cryptography. 6

(ii) Explain the steps used in XML encryption. 10

Or

(b) (i) Discuss about elements of digital signature. 6

(ii) Explain the XML cannibalization process with an example. 10

No comments:

Post a Comment