Sei sulla pagina 1di 1145

*SLRTX312*

SLR-TX – 312
Seat
No.
Set P
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14

1) 12 x 3 is equal to
D

x5  2 x3 
a) b) e x
–x 3
c) e  x +  d) None of these
x

20  3 

2) The general solution of (D4 + 2D2 + 1) y = 0 is


a) c1cosx + c2 sinx + c3 sin x + c4 cosx
b) (c1 + c2x) ex
c) (c1 + c2x) cosx + (c3 + c4x) sinx
d) (c1 + c2x + c3x2 + c4x3) e–x
3) The Laplace transform of e2tsint is
1 1 1 1
a) b) 2 c) 2 d) 2
s −4
2
s +1 s + 4s + 1 s − 4s + 5
1
4) (s − 3)2 is the Laplace transform of ________
a) te–3t b) t3 c) e3tt d) e–3tt2
P.T.O.
SLR-TX – 312 -2- *SLRTX312*
t
5) The Laplace transform of ∫ cos 2u du is
0

s 1 s 1
a) b) c) 2 d)
s +4
2
s +42
s −4 s −4
2

z
6) The inverse Z-transform of , |z|>a(k ≥ 0) is
z − a
a) ak b) a–k c) ak+1 d) a–k+1
7) If Z{f(k)} = F(z), then z{kf(k)}=
dF(z) −dF(z) dF(z) dF(z)
a) b) c) −z d) z
dz dz dz dz
8) The Fourier series expansion of F(x) = sin2x is
a) sinx + cosx b) 1 – cos2x
c) sin2x + cos2x d) 1 (1 – cos2x)
2
9) In the interval – π ≤ x < π the constant term in the Fourier series of f(x) =
|x| is,
a) π b) π c) π d) 0
2 4
10) The lines of regression are 10y = x + 17 and x = 5y – 7 the and are
a) 1 and 10 b) 1 and 5 c) 2 and 3 d) 3 and 2
11) Correlation analysis help us to __________ our activities.
a) control b) plan c) predict d) all of the above
12) If mean = 12 and variance = 4 then the binomial distribution constants n,
p, q are respectively
a) 9, 1 , 2 b) 4, 1 , 1 c) 18, 2 3 , 13 d) 9, 2 3 , 13
3 3 2 2
13) Idle time of the queuing system is
λ λ µ
a)
b) 1− c) µ d) 1−
µ µ λ λ
14) A waiting customer leave a queue due to impatience. This behaviour is
known as
a) Reneging b) Balking c) Jockeying d) Selection
_____________

Set P
*SLRTX312* -3- SLR-TX – 312
Seat
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks.
3) Use of non-programmable calculator is allowed.

SECTION – I

2. Solve any three of the following : 9


 2 sin 2t sin 6t 
a) Find L  .
 t 
b) Find inverse Laplace transform of Cot −1 s ( a) .
c) Solve (D3 + 2D2 + D) y = x3.
d) Solve y′′ − 4 y′ + 4 y = 8x ⋅ e cos 2x .
2 2x

e) Find Z{2k sin(3k + 2)}, k ≥ 0.

3. Solve any three of the following : 9


a) Find Laplace transform of (3t + 4)3 + 5t–cosh2t.
−1  s+2 
b) Find L  2 .
 s (s + 3) 
e−3 x
c) Solve (D + 6D + 9) y =
2
.
45
d) Find Z{k2 e–ak}, k ≥ 0.
1
e) Find inverse z-transform of , | z |< 5 .
(z − 5)2
4. Solve any two of the following : 10
d2 y
a) Solve 2
− y = (1+ x 2 )ex + x sin x
dx
b) Solve y′′ + by′ + 9y = 12t 2e−3 t , with y(0) = 0 = y′(0) by using Laplace
transform method.

Set P
SLR-TX – 312 -4- *SLRTX312*

1
c) Find inverse Z-transform of , where
(z − 3) (z − 2)
i) |z|< 2
ii) 2<|z|<3.

SECTION – II

5. Attempt any three :


a) In a partially destroyed laboratory record of analysis of correlation data,
the following results were legible. Variance of x = 9. Regression equations
4x – 5y + 33 = 0, 20x – 9y – 107 = 0
Find :
i) The mean values of x and y
ii) The correlation coefficient between x and y
iii) The standard derivation of y. 3
b) The following mistakes per page were observed in a book.
No. of mistakes : 0 1 2 3 4
No. of pages : 211 90 19 5 0
Fit a Poisson distribution. 3
c) Find half range cosine series for f(x) = (x – 1)2, 0 ≤ x ≤ 1. Hence find

1
∑h
n=1
2
. 3

d) Find the Fourier expansion for f(x) = 1− cos x in (0, 2π). 3
e) A super market has two girls serving at the two counters the customers
arrive in Poisson Fashion at the rate of 12 per hours. The service time for
each customer is exponential with mean 6 minutes.
Find :
1) The probability that an arriving customer has to wait ?
2) The average time spent by a customer in the super market. 3
6. Attempt any three :
a) Obtain Fourier series for
π
f(x) = + x, − π < x < 0
2
π
= − x, 0 < x < π . 3
2
Set P
*SLRTX312* -5- SLR-TX – 312
b) Find the line of regression of x on y from the following data. 3
x : 2 4 6 8 10
y : 6 5 4 3 2
c) Weights of 4000 students are found to be normally distributed with mean
50 kgs and standard deviation 5 kgs. Find the number of students with
weights :
i) Less than 45 kgs and
ii) Between 45 and 60 kgs.
[Given – for SNV z, Area between z = 0 to z = 1 is 0.3413 and z = 0 to
z = 2 is 0.4772]. 3
d) Find the average waiting time per customer in the queue and in the
system for M|M|1|∞ model, if λ =9 and µ = 15 per hours. 3
e) People arrive to purchase railways tickets at the rate of 5 per minute.
On an average it takes 10 seconds to issue the ticket. A person arrives
5 min, before the train starts. It takes 4 min for him to get in the train after
purchasing the ticket.
i) Can he be expected in the train before the train starts ?
ii) What is the probability that he will be in the train before the train
starts ? 3

7. Attempt any two :


a) Calculate Karl Pearson’s coefficient of correlation from the following data. 5
x : 28 45 40 38 35 33 40 32 36 33
y : 23 34 33 34 30 26 28 31 36 35
b) Obtain the Fourier expansion of f(x) = e–x in (– a, a). 5
c) There are two typists in a type writing shop each typists can type on an
average 5 letters per hour. The rate of arrivals of letters is 8 per hours
i) What is the probability that both the typist are busy ?
ii) What is the average idle time for which both typist are idle ? 5

_____________

Set P
Set P
*SLRTX312* SLR-TX – 312
Seat
No.
Set Q
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) The Fourier series expansion of F(x) = sin2x is
a) sinx + cosx b) 1 – cos2x
c) sin2x + cos2x d) 1 (1 – cos2x)
2
2) In the interval – π ≤ x < π the constant term in the Fourier series of f(x) =
|x| is,
a) π b) π c) π d) 0
2 4
3) The lines of regression are 10y = x + 17 and x = 5y – 7 the and are
a) 1 and 10 b) 1 and 5 c) 2 and 3 d) 3 and 2
4) Correlation analysis help us to __________ our activities.
a) control b) plan c) predict d) all of the above
5) If mean = 12 and variance = 4 then the binomial distribution constants n,
p, q are respectively
a) 9, 1 , 2 b) 4, 1 , 1 c) 18, 2 3 , 13 d) 9, 2 3 , 13
3 3 2 2
6) Idle time of the queuing system is
λ λ µ
a) b) 1− c) µ d) 1−
µ µ λ λ P.T.O.
SLR-TX – 312 -2- *SLRTX312*
7) A waiting customer leave a queue due to impatience. This behaviour is
known as
a) Reneging b) Balking c) Jockeying d) Selection

8) 12 x 3 is equal to
D

x5  x3 
a) b) e–xx3 c) ex  x 2 +  d) None of these
20  3 

9) The general solution of (D4 + 2D2 + 1) y = 0 is


a) c1cosx + c2 sinx + c3 sin x + c4 cosx
b) (c1 + c2x) ex
c) (c1 + c2x) cosx + (c3 + c4x) sinx
d) (c1 + c2x + c3x2 + c4x3) e–x
10) The Laplace transform of e2tsint is
1 1 1 1
a) b) 2 c) 2 d) 2
s −4 2
s +1 s + 4s + 1 s − 4s + 5
1
11) (s − 3)2 is the Laplace transform of ________
a) te–3t b) t3 c) e3tt d) e–3tt2
t
12) The Laplace transform of ∫ cos 2u du is
0

s 1 s 1
a) b) c) 2 d)
s +4
2
s +4 2
s −4 s −4
2

z
13) The inverse Z-transform of , |z|>a(k ≥ 0) is
z − a
a) ak b) a–k c) ak+1 d) a–k+1
14) If Z{f(k)} = F(z), then z{kf(k)}=
dF(z) −dF(z) dF(z) dF(z)
a) b) c) −z d) z
dz dz dz dz

_____________

Set Q
*SLRTX312* -3- SLR-TX – 312
Seat
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks.
3) Use of non-programmable calculator is allowed.

SECTION – I

2. Solve any three of the following : 9


 2 sin 2t sin 6t 
a) Find L  .
 t 
b) Find inverse Laplace transform of Cot −1 s ( a) .
c) Solve (D3 + 2D2 + D) y = x3.
d) Solve y′′ − 4 y′ + 4 y = 8x ⋅ e cos 2x .
2 2x

e) Find Z{2k sin(3k + 2)}, k ≥ 0.

3. Solve any three of the following : 9


a) Find Laplace transform of (3t + 4)3 + 5t–cosh2t.
−1  s+2 
b) Find L  2 .
 s (s + 3) 
e−3 x
c) Solve (D + 6D + 9) y =
2
.
45
d) Find Z{k2 e–ak}, k ≥ 0.
1
e) Find inverse z-transform of , | z |< 5 .
(z − 5)2
4. Solve any two of the following : 10
d2 y
a) Solve 2
− y = (1+ x 2 )ex + x sin x
dx
b) Solve y′′ + by′ + 9y = 12t 2e−3 t , with y(0) = 0 = y′(0) by using Laplace
transform method.

Set Q
SLR-TX – 312 -4- *SLRTX312*

1
c) Find inverse Z-transform of , where
(z − 3) (z − 2)
i) |z|< 2
ii) 2<|z|<3.

SECTION – II

5. Attempt any three :


a) In a partially destroyed laboratory record of analysis of correlation data,
the following results were legible. Variance of x = 9. Regression equations
4x – 5y + 33 = 0, 20x – 9y – 107 = 0
Find :
i) The mean values of x and y
ii) The correlation coefficient between x and y
iii) The standard derivation of y. 3
b) The following mistakes per page were observed in a book.
No. of mistakes : 0 1 2 3 4
No. of pages : 211 90 19 5 0
Fit a Poisson distribution. 3
c) Find half range cosine series for f(x) = (x – 1)2, 0 ≤ x ≤ 1. Hence find

1
∑h
n=1
2
. 3

d) Find the Fourier expansion for f(x) = 1− cos x in (0, 2π). 3
e) A super market has two girls serving at the two counters the customers
arrive in Poisson Fashion at the rate of 12 per hours. The service time for
each customer is exponential with mean 6 minutes.
Find :
1) The probability that an arriving customer has to wait ?
2) The average time spent by a customer in the super market. 3
6. Attempt any three :
a) Obtain Fourier series for
π
f(x) = + x, − π < x < 0
2
π
= − x, 0 < x < π . 3
2
Set Q
*SLRTX312* -5- SLR-TX – 312
b) Find the line of regression of x on y from the following data. 3
x : 2 4 6 8 10
y : 6 5 4 3 2
c) Weights of 4000 students are found to be normally distributed with mean
50 kgs and standard deviation 5 kgs. Find the number of students with
weights :
i) Less than 45 kgs and
ii) Between 45 and 60 kgs.
[Given – for SNV z, Area between z = 0 to z = 1 is 0.3413 and z = 0 to
z = 2 is 0.4772]. 3
d) Find the average waiting time per customer in the queue and in the
system for M|M|1|∞ model, if λ =9 and µ = 15 per hours. 3
e) People arrive to purchase railways tickets at the rate of 5 per minute.
On an average it takes 10 seconds to issue the ticket. A person arrives
5 min, before the train starts. It takes 4 min for him to get in the train after
purchasing the ticket.
i) Can he be expected in the train before the train starts ?
ii) What is the probability that he will be in the train before the train
starts ? 3

7. Attempt any two :


a) Calculate Karl Pearson’s coefficient of correlation from the following data. 5
x : 28 45 40 38 35 33 40 32 36 33
y : 23 34 33 34 30 26 28 31 36 35
b) Obtain the Fourier expansion of f(x) = e–x in (– a, a). 5
c) There are two typists in a type writing shop each typists can type on an
average 5 letters per hour. The rate of arrivals of letters is 8 per hours
i) What is the probability that both the typist are busy ?
ii) What is the average idle time for which both typist are idle ? 5

_____________

Set Q
Set Q
*SLRTX312* SLR-TX – 312
Seat
No.
Set R
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


t
1) The Laplace transform of ∫ cos 2u du is
0

s 1 s 1
a) b) c) 2 d)
s +4
2
s +4 2
s −4 s −4
2

z
2) The inverse Z-transform of , |z|>a(k ≥ 0) is
z − a
a) ak b) a–k c) ak+1 d) a–k+1
3) If Z{f(k)} = F(z), then z{kf(k)}=
dF(z) −dF(z) dF(z) dF(z)
a) b) c) −z d) z
dz dz dz dz
4) The Fourier series expansion of F(x) = sin2x is
a) sinx + cosx b) 1 – cos2x
c) sin2x + cos2x d) 1 (1 – cos2x)
2
5) In the interval – π ≤ x < π the constant term in the Fourier series of f(x) =
|x| is,
a) π b) π c) π d) 0
2 4 P.T.O.
SLR-TX – 312 -2- *SLRTX312*

6) The lines of regression are 10y = x + 17 and x = 5y – 7 the and are


a) 1 and 10 b) 1 and 5 c) 2 and 3 d) 3 and 2
7) Correlation analysis help us to __________ our activities.
a) control b) plan c) predict d) all of the above
8) If mean = 12 and variance = 4 then the binomial distribution constants n,
p, q are respectively
a) 9, 1 , 2 b) 4, 1 , 1 c) 18, 2 3 , 13 d) 9, 2 3 , 13
3 3 2 2
9) Idle time of the queuing system is
λ λ µ
a)
b) 1− c) µ d) 1−
µ µ λ λ
10) A waiting customer leave a queue due to impatience. This behaviour is
known as
a) Reneging b) Balking c) Jockeying d) Selection

11) 12 x 3 is equal to
D

x5  2 x3 
a) b) e x
–x 3
c) e  x +  d) None of these
x

20  3 

12) The general solution of (D4 + 2D2 + 1) y = 0 is


a) c1cosx + c2 sinx + c3 sin x + c4 cosx
b) (c1 + c2x) ex
c) (c1 + c2x) cosx + (c3 + c4x) sinx
d) (c1 + c2x + c3x2 + c4x3) e–x
13) The Laplace transform of e2tsint is
1 1 1 1
a) b) 2 c) 2 d) 2
s −4 2
s +1 s + 4s + 1 s − 4s + 5
1
14) (s − 3)2 is the Laplace transform of ________
a) te–3t b) t3 c) e3tt d) e–3tt2

_____________

Set R
*SLRTX312* -3- SLR-TX – 312
Seat
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks.
3) Use of non-programmable calculator is allowed.

SECTION – I

2. Solve any three of the following : 9


 2 sin 2t sin 6t 
a) Find L  .
 t 
b) Find inverse Laplace transform of Cot −1 s ( a) .
c) Solve (D3 + 2D2 + D) y = x3.
d) Solve y′′ − 4 y′ + 4 y = 8x ⋅ e cos 2x .
2 2x

e) Find Z{2k sin(3k + 2)}, k ≥ 0.

3. Solve any three of the following : 9


a) Find Laplace transform of (3t + 4)3 + 5t–cosh2t.
−1  s+2 
b) Find L  2 .
 s (s + 3) 
e−3 x
c) Solve (D + 6D + 9) y =
2
.
45
d) Find Z{k2 e–ak}, k ≥ 0.
1
e) Find inverse z-transform of , | z |< 5 .
(z − 5)2
4. Solve any two of the following : 10
d2 y
a) Solve 2
− y = (1+ x 2 )ex + x sin x
dx
b) Solve y′′ + by′ + 9y = 12t 2e−3 t , with y(0) = 0 = y′(0) by using Laplace
transform method.

Set R
SLR-TX – 312 -4- *SLRTX312*

1
c) Find inverse Z-transform of , where
(z − 3) (z − 2)
i) |z|< 2
ii) 2<|z|<3.

SECTION – II

5. Attempt any three :


a) In a partially destroyed laboratory record of analysis of correlation data,
the following results were legible. Variance of x = 9. Regression equations
4x – 5y + 33 = 0, 20x – 9y – 107 = 0
Find :
i) The mean values of x and y
ii) The correlation coefficient between x and y
iii) The standard derivation of y. 3
b) The following mistakes per page were observed in a book.
No. of mistakes : 0 1 2 3 4
No. of pages : 211 90 19 5 0
Fit a Poisson distribution. 3
c) Find half range cosine series for f(x) = (x – 1)2, 0 ≤ x ≤ 1. Hence find

1
∑h
n=1
2
. 3

d) Find the Fourier expansion for f(x) = 1− cos x in (0, 2π). 3
e) A super market has two girls serving at the two counters the customers
arrive in Poisson Fashion at the rate of 12 per hours. The service time for
each customer is exponential with mean 6 minutes.
Find :
1) The probability that an arriving customer has to wait ?
2) The average time spent by a customer in the super market. 3
6. Attempt any three :
a) Obtain Fourier series for
π
f(x) = + x, − π < x < 0
2
π
= − x, 0 < x < π . 3
2
Set R
*SLRTX312* -5- SLR-TX – 312
b) Find the line of regression of x on y from the following data. 3
x : 2 4 6 8 10
y : 6 5 4 3 2
c) Weights of 4000 students are found to be normally distributed with mean
50 kgs and standard deviation 5 kgs. Find the number of students with
weights :
i) Less than 45 kgs and
ii) Between 45 and 60 kgs.
[Given – for SNV z, Area between z = 0 to z = 1 is 0.3413 and z = 0 to
z = 2 is 0.4772]. 3
d) Find the average waiting time per customer in the queue and in the
system for M|M|1|∞ model, if λ =9 and µ = 15 per hours. 3
e) People arrive to purchase railways tickets at the rate of 5 per minute.
On an average it takes 10 seconds to issue the ticket. A person arrives
5 min, before the train starts. It takes 4 min for him to get in the train after
purchasing the ticket.
i) Can he be expected in the train before the train starts ?
ii) What is the probability that he will be in the train before the train
starts ? 3

7. Attempt any two :


a) Calculate Karl Pearson’s coefficient of correlation from the following data. 5
x : 28 45 40 38 35 33 40 32 36 33
y : 23 34 33 34 30 26 28 31 36 35
b) Obtain the Fourier expansion of f(x) = e–x in (– a, a). 5
c) There are two typists in a type writing shop each typists can type on an
average 5 letters per hour. The rate of arrivals of letters is 8 per hours
i) What is the probability that both the typist are busy ?
ii) What is the average idle time for which both typist are idle ? 5

_____________

Set R
Set R
*SLRTX312* SLR-TX – 312
Seat
No.
Set S
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) The lines of regression are 10y = x + 17 and x = 5y – 7 the and are
a) 1 and 10 b) 1 and 5 c) 2 and 3 d) 3 and 2
2) Correlation analysis help us to __________ our activities.
a) control b) plan c) predict d) all of the above
3) If mean = 12 and variance = 4 then the binomial distribution constants n,
p, q are respectively
a) 9, 1 , 2 b) 4, 1 , 1 c) 18, 2 3 , 13 d) 9, 2 3 , 13
3 3 2 2
4) Idle time of the queuing system is
λ λ µ
a) b) 1− c) µ d) 1−
µ µ λ λ
5) A waiting customer leave a queue due to impatience. This behaviour is
known as
a) Reneging b) Balking c) Jockeying d) Selection

P.T.O.
SLR-TX – 312 -2- *SLRTX312*

6) 12 x 3 is equal to
D

x5  x3 
a) b) e–xx3 c) ex  x 2 +  d) None of these
20  3 

7) The general solution of (D4 + 2D2 + 1) y = 0 is


a) c1cosx + c2 sinx + c3 sin x + c4 cosx
b) (c1 + c2x) ex
c) (c1 + c2x) cosx + (c3 + c4x) sinx
d) (c1 + c2x + c3x2 + c4x3) e–x
8) The Laplace transform of e2tsint is
1 1 1 1
a) b) c) d)
s2 − 4 s2 + 1 s2 + 4s + 1 s − 4s + 5
2

1
9) (s − 3)2 is the Laplace transform of ________
a) te–3t b) t3 c) e3tt d) e–3tt2
t
10) The Laplace transform of ∫ cos 2u du is
0

s 1 s 1
a) b) c) 2 d)
s +4
2
s +4 2
s −4 s −4
2

z
11) The inverse Z-transform of , |z|>a(k ≥ 0) is
z − a
a) ak b) a–k c) ak+1 d) a–k+1
12) If Z{f(k)} = F(z), then z{kf(k)}=
dF(z) −dF(z) dF(z) dF(z)
a) b) c) −z d) z
dz dz dz dz
13) The Fourier series expansion of F(x) = sin2x is
a) sinx + cosx b) 1 – cos2x
c) sin2x + cos2x d) 1 (1 – cos2x)
2
14) In the interval – π ≤ x < π the constant term in the Fourier series of f(x) =
|x| is,
a) π b) π c) π d) 0
2 4
Set S
_____________

*SLRTX312* -3- SLR-TX – 312
Seat
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks.
3) Use of non-programmable calculator is allowed.

SECTION – I

2. Solve any three of the following : 9


 2 sin 2t sin 6t 
a) Find L  .
 t 
b) Find inverse Laplace transform of Cot −1 s ( a) .
c) Solve (D3 + 2D2 + D) y = x3.
d) Solve y′′ − 4 y′ + 4 y = 8x ⋅ e cos 2x .
2 2x

e) Find Z{2k sin(3k + 2)}, k ≥ 0.

3. Solve any three of the following : 9


a) Find Laplace transform of (3t + 4)3 + 5t–cosh2t.
−1  s+2 
b) Find L  2 .
 s (s + 3) 
e−3 x
c) Solve (D + 6D + 9) y =
2
.
45
d) Find Z{k2 e–ak}, k ≥ 0.
1
e) Find inverse z-transform of , | z |< 5 .
(z − 5)2
4. Solve any two of the following : 10
d2 y
a) Solve 2
− y = (1+ x 2 )ex + x sin x
dx
b) Solve y′′ + by′ + 9y = 12t 2e−3 t , with y(0) = 0 = y′(0) by using Laplace
transform method.

Set S
SLR-TX – 312 -4- *SLRTX312*

1
c) Find inverse Z-transform of , where
(z − 3) (z − 2)
i) |z|< 2
ii) 2<|z|<3.

SECTION – II

5. Attempt any three :


a) In a partially destroyed laboratory record of analysis of correlation data,
the following results were legible. Variance of x = 9. Regression equations
4x – 5y + 33 = 0, 20x – 9y – 107 = 0
Find :
i) The mean values of x and y
ii) The correlation coefficient between x and y
iii) The standard derivation of y. 3
b) The following mistakes per page were observed in a book.
No. of mistakes : 0 1 2 3 4
No. of pages : 211 90 19 5 0
Fit a Poisson distribution. 3
c) Find half range cosine series for f(x) = (x – 1)2, 0 ≤ x ≤ 1. Hence find

1
∑h
n=1
2
. 3

d) Find the Fourier expansion for f(x) = 1− cos x in (0, 2π). 3
e) A super market has two girls serving at the two counters the customers
arrive in Poisson Fashion at the rate of 12 per hours. The service time for
each customer is exponential with mean 6 minutes.
Find :
1) The probability that an arriving customer has to wait ?
2) The average time spent by a customer in the super market. 3
6. Attempt any three :
a) Obtain Fourier series for
π
f(x) = + x, − π < x < 0
2
π
= − x, 0 < x < π . 3
2
Set S
*SLRTX312* -5- SLR-TX – 312
b) Find the line of regression of x on y from the following data. 3
x : 2 4 6 8 10
y : 6 5 4 3 2
c) Weights of 4000 students are found to be normally distributed with mean
50 kgs and standard deviation 5 kgs. Find the number of students with
weights :
i) Less than 45 kgs and
ii) Between 45 and 60 kgs.
[Given – for SNV z, Area between z = 0 to z = 1 is 0.3413 and z = 0 to
z = 2 is 0.4772]. 3
d) Find the average waiting time per customer in the queue and in the
system for M|M|1|∞ model, if λ =9 and µ = 15 per hours. 3
e) People arrive to purchase railways tickets at the rate of 5 per minute.
On an average it takes 10 seconds to issue the ticket. A person arrives
5 min, before the train starts. It takes 4 min for him to get in the train after
purchasing the ticket.
i) Can he be expected in the train before the train starts ?
ii) What is the probability that he will be in the train before the train
starts ? 3

7. Attempt any two :


a) Calculate Karl Pearson’s coefficient of correlation from the following data. 5
x : 28 45 40 38 35 33 40 32 36 33
y : 23 34 33 34 30 26 28 31 36 35
b) Obtain the Fourier expansion of f(x) = e–x in (– a, a). 5
c) There are two typists in a type writing shop each typists can type on an
average 5 letters per hour. The rate of arrivals of letters is 8 per hours
i) What is the probability that both the typist are busy ?
ii) What is the average idle time for which both typist are idle ? 5

_____________

Set S
Set S
*SLRTX313* SLR-TX – 313
Seat
No.
Set P
S.E. (CSE) (Part – I) (New CBCS Pattern) Examination, 2018
Computer Science and Engineering (CSE)
Discrete Mathematical Structure (DMS)

Day and Date : Thursday, 6-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

    Note : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14�1=14)


1) The set A∩B = Φ is called as
a) Subset b) Proper subset
c) Disjoint set d) None of these
2) If a*b = a*c then b = c is called as
a) Commutative b) Cancellation
c) Left cancellation d) Right cancellation
3) The relation R on set S if satisfies the reflexive, antisymmetric and
transitive property then relation is
a) Compatible relation b) Partial ordered relation
c) Equivalence relation d) None of these
4) GLB is called as
a) Join b) Supermum
c) Infimum d) Both a) and b)

P.T.O.
SLR-TX – 313 -2- *SLRTX313*
5) A group is said to ___________ if there exist an element a € G such that
every element of G can be written as some power of a
a) Acyclic b) Cyclic c) Abalian d) Angular
6) A ∪ Φ= A is represent
a) Identity law b) Idempotent law
c) Domination law d) Complement law
7) (P ↓ P) is equivalent to
a) (P ∨ P) b) P ^ P c) P d) All of these
¬

¬
8) Let R be the Binary relation on X and Y sets, which of the following is true
a) Domain (R) is the subset of Y b) Domain (R) is the not subset of Y
c) Domain (R) is the subset of X d) All are true
9) Let X = {a, b, c} and Y = {0, 1} how many possible mapping are listed as
f : X → Y.
a) 2 b) 32 c) 16 d) 8
10) Monoids satisfies the property
a) Inverse b) Identity
c) Idempotent d) Absorption
11) In polish expression rank of well-formed formula is always
a) 1 b) 0 c) –1 d) 2
12) The complement and distributive lattice is ______________
a) LUB b) Boolean function
c) GLB d) Boolean algebra
13) {↑} and {↓} are functionally complete set of connective.
a) True b) False c) Only {↑} d) Only {↓}
14) <L, *, > and <S, ^, v> be the two lattices a mapping g : L → S is isomorphic if
a) g is into b) g is onto c) g is bijective d) both b) and c)

_____________

Set P
*SLRTX313* -3- SLR-TX – 313
Seat
No.
S.E. (CSE) (Part – I) (New CBCS Pattern) Examination, 2018
Computer Science and Engineering (CSE)
Discrete Mathematical Structure (DMS)

Day and Date : Thursday, 6-12-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

    Note : All questions are compulsory.

SECTION – I

2. Answer the following (any 3) : (3�4=12)


1) Define power set. Given S = {a1, a2, a3, ... a8}. What subsets are
represented by B19, B31 and B124.
2) Define the following with example :
a) ordered pair and order n-tuple b) proposition
3) Let A = {1, 2, 3, ...., 10} and relation R on set A is R = {<x, 2x>|x€A}
obtain the relation matrix and graph of relation.
4) What is equivalence of formula, show the following equivalence ?
(p ∨ q) ^ ( p ^ ( p ^ q)) < = > ( p ^ q).
¬

3. Answer the following (any 1) : (1�8=8)


1) Explain operation of set with example and show the following set identities
a) (A – C) ∩ (C – B) = Φ b) A + A = Φ.
2) Obtain PCNF and PDNF of the following :
a) ( p → r) ^ (q ↔ p) b) p → (p ^ (q → p))
¬

4. Given relation matrix MR of binary relation R on set {a, b, c}, find relation
matrices of :
a) R–1 b) R o R = R2

c) R2 o R = R3 d) R o R–1. (1�8=8)

MR = 1 0 1
1 1 0
1 1 1
Set P
SLR-TX – 313 -4- *SLRTX313*
SECTION – II

5. Answer the following (any 3) : (3�4=12)


1) Define inverse function and explain it with example.
2) Define semigroup and explain the homomorphism of semigroup with types.
3) Define lattice as a partial ordered set and explain properties with example.
4) Show that the lattices given in diagram are distributive or not.

a)

b)

6. Answer the following (any 1) : (1�8=8)


1) Obtain sum of product canonical form of the following Boolean
expression in three variable :
a) X1 * X2
b) X1 ⊕ X2.
2) Give the following representation to the Boolean function
F = x′y′z + x′yz′ + xy′z′ :
a) Circuit diagram
b) Truth table
c) K-Map
d) Cube.

7. Define algebraic system and explain the properties with an example. (1�8=8)

_____________

Set P
*SLRTX313* SLR-TX – 313
Seat
No.
Set Q
S.E. (CSE) (Part – I) (New CBCS Pattern) Examination, 2018
Computer Science and Engineering (CSE)
Discrete Mathematical Structure (DMS)

Day and Date : Thursday, 6-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

    Note : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14�1=14)


1) Let R be the Binary relation on X and Y sets, which of the following is true
a) Domain (R) is the subset of Y b) Domain (R) is the not subset of Y
c) Domain (R) is the subset of X d) All are true
2) Let X = {a, b, c} and Y = {0, 1} how many possible mapping are listed as
f : X → Y.
a) 2 b) 32 c) 16 d) 8
3) Monoids satisfies the property
a) Inverse b) Identity
c) Idempotent d) Absorption
4) In polish expression rank of well-formed formula is always
a) 1 b) 0 c) –1 d) 2
5) The complement and distributive lattice is ______________
a) LUB b) Boolean function
c) GLB d) Boolean algebra

P.T.O.
SLR-TX – 313 -2- *SLRTX313*
6) {↑} and {↓} are functionally complete set of connective.
a) True b) False c) Only {↑} d) Only {↓}
7) <L, *, > and <S, ^, v> be the two lattices a mapping g : L → S is isomorphic if
a) g is into b) g is onto c) g is bijective d) both b) and c)
8) The set A∩B = Φ is called as
a) Subset b) Proper subset
c) Disjoint set d) None of these
9) If a*b = a*c then b = c is called as
a) Commutative b) Cancellation
c) Left cancellation d) Right cancellation
10) The relation R on set S if satisfies the reflexive, antisymmetric and
transitive property then relation is
a) Compatible relation b) Partial ordered relation
c) Equivalence relation d) None of these
11) GLB is called as
a) Join b) Supermum
c) Infimum d) Both a) and b)
12) A group is said to ___________ if there exist an element a € G such that
every element of G can be written as some power of a
a) Acyclic b) Cyclic c) Abalian d) Angular
13) A ∪ Φ= A is represent
a) Identity law b) Idempotent law
c) Domination law d) Complement law
14) (P ↓ P) is equivalent to
a) (P ∨ P) b) P ^ P c) P d) All of these
¬

_____________

Set Q
*SLRTX313* -3- SLR-TX – 313
Seat
No.
S.E. (CSE) (Part – I) (New CBCS Pattern) Examination, 2018
Computer Science and Engineering (CSE)
Discrete Mathematical Structure (DMS)

Day and Date : Thursday, 6-12-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

    Note : All questions are compulsory.

SECTION – I

2. Answer the following (any 3) : (3�4=12)


1) Define power set. Given S = {a1, a2, a3, ... a8}. What subsets are
represented by B19, B31 and B124.
2) Define the following with example :
a) ordered pair and order n-tuple b) proposition
3) Let A = {1, 2, 3, ...., 10} and relation R on set A is R = {<x, 2x>|x€A}
obtain the relation matrix and graph of relation.
4) What is equivalence of formula, show the following equivalence ?
(p ∨ q) ^ ( p ^ ( p ^ q)) < = > ( p ^ q).
¬

3. Answer the following (any 1) : (1�8=8)


1) Explain operation of set with example and show the following set identities
a) (A – C) ∩ (C – B) = Φ b) A + A = Φ.
2) Obtain PCNF and PDNF of the following :
a) ( p → r) ^ (q ↔ p) b) p → (p ^ (q → p))
¬

4. Given relation matrix MR of binary relation R on set {a, b, c}, find relation
matrices of :
a) R–1 b) R o R = R2

c) R2 o R = R3 d) R o R–1. (1�8=8)

MR = 1 0 1
1 1 0
1 1 1
Set Q
SLR-TX – 313 -4- *SLRTX313*
SECTION – II

5. Answer the following (any 3) : (3�4=12)


1) Define inverse function and explain it with example.
2) Define semigroup and explain the homomorphism of semigroup with types.
3) Define lattice as a partial ordered set and explain properties with example.
4) Show that the lattices given in diagram are distributive or not.

a)

b)

6. Answer the following (any 1) : (1�8=8)


1) Obtain sum of product canonical form of the following Boolean
expression in three variable :
a) X1 * X2
b) X1 ⊕ X2.
2) Give the following representation to the Boolean function
F = x′y′z + x′yz′ + xy′z′ :
a) Circuit diagram
b) Truth table
c) K-Map
d) Cube.

7. Define algebraic system and explain the properties with an example. (1�8=8)

_____________

Set Q
*SLRTX313* SLR-TX – 313
Seat
No.
Set R
S.E. (CSE) (Part – I) (New CBCS Pattern) Examination, 2018
Computer Science and Engineering (CSE)
Discrete Mathematical Structure (DMS)

Day and Date : Thursday, 6-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

    Note : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14�1=14)


1) A group is said to ___________ if there exist an element a € G such that
every element of G can be written as some power of a
a) Acyclic b) Cyclic c) Abalian d) Angular
2) A ∪ Φ= A is represent
a) Identity law b) Idempotent law
c) Domination law d) Complement law
3) (P ↓ P) is equivalent to
a) (P ∨ P) b) P ^ P c) P d) All of these
¬

4) Let R be the Binary relation on X and Y sets, which of the following is true
a) Domain (R) is the subset of Y b) Domain (R) is the not subset of Y
c) Domain (R) is the subset of X d) All are true
5) Let X = {a, b, c} and Y = {0, 1} how many possible mapping are listed as
f : X → Y.
a) 2 b) 32 c) 16 d) 8

P.T.O.
SLR-TX – 313 -2- *SLRTX313*
6) Monoids satisfies the property
a) Inverse b) Identity
c) Idempotent d) Absorption
7) In polish expression rank of well-formed formula is always
a) 1 b) 0 c) –1 d) 2
8) The complement and distributive lattice is ______________
a) LUB b) Boolean function
c) GLB d) Boolean algebra
9) {↑} and {↓} are functionally complete set of connective.
a) True b) False c) Only {↑} d) Only {↓}
10) <L, *, > and <S, ^, v> be the two lattices a mapping g : L → S is isomorphic if
a) g is into b) g is onto c) g is bijective d) both b) and c)
11) The set A∩B = Φ is called as
a) Subset b) Proper subset
c) Disjoint set d) None of these
12) If a*b = a*c then b = c is called as
a) Commutative b) Cancellation
c) Left cancellation d) Right cancellation
13) The relation R on set S if satisfies the reflexive, antisymmetric and
transitive property then relation is
a) Compatible relation b) Partial ordered relation
c) Equivalence relation d) None of these
14) GLB is called as
a) Join b) Supermum
c) Infimum d) Both a) and b)

_____________

Set R
*SLRTX313* -3- SLR-TX – 313
Seat
No.
S.E. (CSE) (Part – I) (New CBCS Pattern) Examination, 2018
Computer Science and Engineering (CSE)
Discrete Mathematical Structure (DMS)

Day and Date : Thursday, 6-12-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

    Note : All questions are compulsory.

SECTION – I

2. Answer the following (any 3) : (3�4=12)


1) Define power set. Given S = {a1, a2, a3, ... a8}. What subsets are
represented by B19, B31 and B124.
2) Define the following with example :
a) ordered pair and order n-tuple b) proposition
3) Let A = {1, 2, 3, ...., 10} and relation R on set A is R = {<x, 2x>|x€A}
obtain the relation matrix and graph of relation.
4) What is equivalence of formula, show the following equivalence ?
(p ∨ q) ^ ( p ^ ( p ^ q)) < = > ( p ^ q).
¬

3. Answer the following (any 1) : (1�8=8)


1) Explain operation of set with example and show the following set identities
a) (A – C) ∩ (C – B) = Φ b) A + A = Φ.
2) Obtain PCNF and PDNF of the following :
a) ( p → r) ^ (q ↔ p) b) p → (p ^ (q → p))
¬

4. Given relation matrix MR of binary relation R on set {a, b, c}, find relation
matrices of :
a) R–1 b) R o R = R2

c) R2 o R = R3 d) R o R–1. (1�8=8)

MR = 1 0 1
1 1 0
1 1 1
Set R
SLR-TX – 313 -4- *SLRTX313*
SECTION – II

5. Answer the following (any 3) : (3�4=12)


1) Define inverse function and explain it with example.
2) Define semigroup and explain the homomorphism of semigroup with types.
3) Define lattice as a partial ordered set and explain properties with example.
4) Show that the lattices given in diagram are distributive or not.

a)

b)

6. Answer the following (any 1) : (1�8=8)


1) Obtain sum of product canonical form of the following Boolean
expression in three variable :
a) X1 * X2
b) X1 ⊕ X2.
2) Give the following representation to the Boolean function
F = x′y′z + x′yz′ + xy′z′ :
a) Circuit diagram
b) Truth table
c) K-Map
d) Cube.

7. Define algebraic system and explain the properties with an example. (1�8=8)

_____________

Set R
*SLRTX313* SLR-TX – 313
Seat
No.
Set S
S.E. (CSE) (Part – I) (New CBCS Pattern) Examination, 2018
Computer Science and Engineering (CSE)
Discrete Mathematical Structure (DMS)

Day and Date : Thursday, 6-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

    Note : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14�1=14)


1) Monoids satisfies the property
a) Inverse b) Identity
c) Idempotent d) Absorption
2) In polish expression rank of well-formed formula is always
a) 1 b) 0 c) –1 d) 2
3) The complement and distributive lattice is ______________
a) LUB b) Boolean function
c) GLB d) Boolean algebra
4) {↑} and {↓} are functionally complete set of connective.
a) True b) False
c) Only {↑} d) Only {↓}
5) <L, *, > and <S, ^, v> be the two lattices a mapping g : L → S is isomorphic if
a) g is into b) g is onto
c) g is bijective d) both b) and c)

P.T.O.
SLR-TX – 313 -2- *SLRTX313*
6) The set A∩B = Φ is called as
a) Subset b) Proper subset
c) Disjoint set d) None of these
7) If a*b = a*c then b = c is called as
a) Commutative b) Cancellation
c) Left cancellation d) Right cancellation
8) The relation R on set S if satisfies the reflexive, antisymmetric and
transitive property then relation is
a) Compatible relation b) Partial ordered relation
c) Equivalence relation d) None of these
9) GLB is called as
a) Join b) Supermum
c) Infimum d) Both a) and b)
10) A group is said to ___________ if there exist an element a € G such that
every element of G can be written as some power of a
a) Acyclic b) Cyclic c) Abalian d) Angular
11) A ∪ Φ= A is represent
a) Identity law b) Idempotent law
c) Domination law d) Complement law
12) (P ↓ P) is equivalent to
a) (P ∨ P) b) P ^ P c) P d) All of these
¬

13) Let R be the Binary relation on X and Y sets, which of the following is true
a) Domain (R) is the subset of Y b) Domain (R) is the not subset of Y
c) Domain (R) is the subset of X d) All are true
14) Let X = {a, b, c} and Y = {0, 1} how many possible mapping are listed as
f : X → Y.
a) 2 b) 32 c) 16 d) 8

_____________

Set S
*SLRTX313* -3- SLR-TX – 313
Seat
No.
S.E. (CSE) (Part – I) (New CBCS Pattern) Examination, 2018
Computer Science and Engineering (CSE)
Discrete Mathematical Structure (DMS)

Day and Date : Thursday, 6-12-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

    Note : All questions are compulsory.

SECTION – I

2. Answer the following (any 3) : (3�4=12)


1) Define power set. Given S = {a1, a2, a3, ... a8}. What subsets are
represented by B19, B31 and B124.
2) Define the following with example :
a) ordered pair and order n-tuple b) proposition
3) Let A = {1, 2, 3, ...., 10} and relation R on set A is R = {<x, 2x>|x€A}
obtain the relation matrix and graph of relation.
4) What is equivalence of formula, show the following equivalence ?
(p ∨ q) ^ ( p ^ ( p ^ q)) < = > ( p ^ q).
¬

3. Answer the following (any 1) : (1�8=8)


1) Explain operation of set with example and show the following set identities
a) (A – C) ∩ (C – B) = Φ b) A + A = Φ.
2) Obtain PCNF and PDNF of the following :
a) ( p → r) ^ (q ↔ p) b) p → (p ^ (q → p))
¬

4. Given relation matrix MR of binary relation R on set {a, b, c}, find relation
matrices of :
a) R–1 b) R o R = R2

c) R2 o R = R3 d) R o R–1. (1�8=8)

MR = 1 0 1
1 1 0
1 1 1
Set S
SLR-TX – 313 -4- *SLRTX313*
SECTION – II

5. Answer the following (any 3) : (3�4=12)


1) Define inverse function and explain it with example.
2) Define semigroup and explain the homomorphism of semigroup with types.
3) Define lattice as a partial ordered set and explain properties with example.
4) Show that the lattices given in diagram are distributive or not.

a)

b)

6. Answer the following (any 1) : (1�8=8)


1) Obtain sum of product canonical form of the following Boolean
expression in three variable :
a) X1 * X2
b) X1 ⊕ X2.
2) Give the following representation to the Boolean function
F = x′y′z + x′yz′ + xy′z′ :
a) Circuit diagram
b) Truth table
c) K-Map
d) Cube.

7. Define algebraic system and explain the properties with an example. (1�8=8)

_____________

Set S
*SLRTX314* SLR-TX – 314
Seat
Set P
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Data Communication

Day and Date : Saturday, 8-12-2018 , -2018 Total Marks : 70


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) The signal which uses more than two signal levels for encoding is
a) Multilevel binary b) NRZ c) Biphase d) None of these
2) In __________ encoding, there is a transition at the middle of each bit period.
a) NRZ – I b) NRZ – L c) AMI d) Manchester
3) __________ is a least expensive guided transmission medium.
a) Fiber optic b) Twisted pair
c) Co-axial cable d) None of these
4) It is upto the ___________ layer to detect, and if necessary correct errors.
a) Application b) Session c) Data Link d) Physical
5) A network provides _________ by having alternative sources of supply.
a) High reliability b) Scalability
c) Money d) None of these
P.T.O.
SLR-TX – 314 -2- *SLRTX314*
6) An n-bit unit containing data and checkbits is often referred as
a) Word b) Parity
c) Codeword d) Checksum
7) Protocol in which the sender sends one frame and then waits for an
acknowledgement before proceeding is called as __________ protocol.
a) IP b) Sliding window
c) Stop-and-wait d) None of these
8) In ____________ protocols, the channel efficiency improves as the load
increases.
a) Contension b) Collision free
c) Both a and b d) None of these
9) Protocols in which station listens for a carrier and act accordingly are called
_________ protocols.
a) Contension b) Collision free
c) ALOHA d) Carrier sense
10) __________ is used to synchronize receiver’s clock with sender.
a) Start of frame b) Type
c) Preamble d) Pad
11) In 802.3 cabling 10 Base F, F stands for
a) Frequency b) Frame
c) Flexibility d) Fiber optics
12) Preamble field of IEEE std. 802.3 contains a bit pattern
a) 10101010 b) 11110000
c) 11001100 d) 00001111
13) ____________ packets are the warning packets to reduce the transmission
rate and traffic.
a) Warning b) Datagram
c) VC d) Choke
14) ___________ algorithms, change their routing decisions to reflect changes
in the topology or traffic.
a) Non adaptive b) Static
c) Adaptive d) None of these
____________
Set P
*SLRTX314* -3- SLR-TX – 314
Seat
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Data Communication

Day and Date : Saturday, 8-12-2018, -2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Write answer to any four questions (4 marks for each). 16


A) Describe physical description and list the applications of coaxial cable.
B) What is PAN, LAN, MAN and WAN ?
C) What is the relationship between a service and a protocol ?
D) Write a short note on ‘‘Physical layer coding violations’’ framing method.
E) Describe the unacknowledged connectionless service provided by DLL to
Network Layer.

3. Write answer to any one question. 6


A) What is channel capacity ? Explain Nyquist bandwidth and Shannons
capacity.
B) Explain unrestricted simplex protocol.

4. Describe TCP/IP reference model. 6

SECTION – II

5. Write answer to any four questions (4 marks for each). 16


A) Briefly describe 1-persistent CSMA and nonpersistent CSMA.
B) Briefly describe the pure ALOHA and slotted ALOHA protocols for
controlling the multiple access to a communication medium. What are
their throughput per frame time ?
Set P
SLR-TX – 314 -4- *SLRTX314*
C) In which TCP/IP communication layer Router, Bridge, Switch, Repeater
devices operate ?
D) What is flooding of IP packets in WAN ? Briefly describe the techniques
to damp the IP packet flooding process.
E) What is tunneling of IP packets in Internet working ?

6. Write answer to any one question. 6


A) Explain the distance vector routing with suitable network example.
B) Explain basic bit-map collision-free protocol.

7. Describe IEEE 802.6 standard (DQDB). 6


________________

Set P
*SLRTX314* SLR-TX – 314
Seat
Set Q
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Data Communication

Day and Date : Saturday, 8-12-2018 , -2018 Total Marks : 70


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) In ____________ protocols, the channel efficiency improves as the load
increases.
a) Contension b) Collision free
c) Both a and b d) None of these
2) Protocols in which station listens for a carrier and act accordingly are called
_________ protocols.
a) Contension b) Collision free
c) ALOHA d) Carrier sense
3) __________ is used to synchronize receiver’s clock with sender.
a) Start of frame b) Type
c) Preamble d) Pad
4) In 802.3 cabling 10 Base F, F stands for
a) Frequency b) Frame
c) Flexibility d) Fiber optics

P.T.O.
SLR-TX – 314 -2- *SLRTX314*
5) Preamble field of IEEE std. 802.3 contains a bit pattern
a) 10101010 b) 11110000
c) 11001100 d) 00001111
6) ____________ packets are the warning packets to reduce the transmission
rate and traffic.
a) Warning b) Datagram
c) VC d) Choke
7) ___________ algorithms, change their routing decisions to reflect changes
in the topology or traffic.
a) Non adaptive b) Static
c) Adaptive d) None of these
8) The signal which uses more than two signal levels for encoding is
a) Multilevel binary b) NRZ c) Biphase d) None of these
9) In __________ encoding, there is a transition at the middle of each bit period.
a) NRZ – I b) NRZ – L c) AMI d) Manchester
10) __________ is a least expensive guided transmission medium.
a) Fiber optic b) Twisted pair
c) Co-axial cable d) None of these
11) It is upto the ___________ layer to detect, and if necessary correct errors.
a) Application b) Session c) Data Link d) Physical
12) A network provides _________ by having alternative sources of supply.
a) High reliability b) Scalability
c) Money d) None of these
13) An n-bit unit containing data and checkbits is often referred as
a) Word b) Parity
c) Codeword d) Checksum
14) Protocol in which the sender sends one frame and then waits for an
acknowledgement before proceeding is called as __________ protocol.
a) IP b) Sliding window
c) Stop-and-wait d) None of these
___________
Set Q
*SLRTX314* -3- SLR-TX – 314
Seat
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Data Communication

Day and Date : Saturday, 8-12-2018, -2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Write answer to any four questions (4 marks for each). 16


A) Describe physical description and list the applications of coaxial cable.
B) What is PAN, LAN, MAN and WAN ?
C) What is the relationship between a service and a protocol ?
D) Write a short note on ‘‘Physical layer coding violations’’ framing method.
E) Describe the unacknowledged connectionless service provided by DLL to
Network Layer.

3. Write answer to any one question. 6


A) What is channel capacity ? Explain Nyquist bandwidth and Shannons
capacity.
B) Explain unrestricted simplex protocol.

4. Describe TCP/IP reference model. 6

SECTION – II

5. Write answer to any four questions (4 marks for each). 16


A) Briefly describe 1-persistent CSMA and nonpersistent CSMA.
B) Briefly describe the pure ALOHA and slotted ALOHA protocols for
controlling the multiple access to a communication medium. What are
their throughput per frame time ?
Set Q
SLR-TX – 314 -4- *SLRTX314*
C) In which TCP/IP communication layer Router, Bridge, Switch, Repeater
devices operate ?
D) What is flooding of IP packets in WAN ? Briefly describe the techniques
to damp the IP packet flooding process.
E) What is tunneling of IP packets in Internet working ?

6. Write answer to any one question. 6


A) Explain the distance vector routing with suitable network example.
B) Explain basic bit-map collision-free protocol.

7. Describe IEEE 802.6 standard (DQDB). 6


________________

Set Q
*SLRTX314* SLR-TX – 314
Seat
Set R
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Data Communication

Day and Date : Saturday, 8-12-2018 , -2018 Total Marks : 70


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) A network provides _________ by having alternative sources of supply.
a) High reliability b) Scalability
c) Money d) None of these
2) An n-bit unit containing data and checkbits is often referred as
a) Word b) Parity
c) Codeword d) Checksum
3) Protocol in which the sender sends one frame and then waits for an
acknowledgement before proceeding is called as __________ protocol.
a) IP b) Sliding window
c) Stop-and-wait d) None of these
4) In ____________ protocols, the channel efficiency improves as the load
increases.
a) Contension b) Collision free
c) Both a and b d) None of these

P.T.O.
SLR-TX – 314 -2- *SLRTX314*
5) Protocols in which station listens for a carrier and act accordingly are called
_________ protocols.
a) Contension b) Collision free
c) ALOHA d) Carrier sense
6) __________ is used to synchronize receiver’s clock with sender.
a) Start of frame b) Type
c) Preamble d) Pad
7) In 802.3 cabling 10 Base F, F stands for
a) Frequency b) Frame
c) Flexibility d) Fiber optics
8) Preamble field of IEEE std. 802.3 contains a bit pattern
a) 10101010 b) 11110000
c) 11001100 d) 00001111
9) ____________ packets are the warning packets to reduce the transmission
rate and traffic.
a) Warning b) Datagram
c) VC d) Choke
10) ___________ algorithms, change their routing decisions to reflect changes
in the topology or traffic.
a) Non adaptive b) Static
c) Adaptive d) None of these
11) The signal which uses more than two signal levels for encoding is
a) Multilevel binary b) NRZ c) Biphase d) None of these
12) In __________ encoding, there is a transition at the middle of each bit period.
a) NRZ – I b) NRZ – L c) AMI d) Manchester
13) __________ is a least expensive guided transmission medium.
a) Fiber optic b) Twisted pair
c) Co-axial cable d) None of these
14) It is upto the ___________ layer to detect, and if necessary correct errors.
a) Application b) Session c) Data Link d) Physical
____________

Set R
*SLRTX314* -3- SLR-TX – 314
Seat
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Data Communication

Day and Date : Saturday, 8-12-2018, -2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Write answer to any four questions (4 marks for each). 16


A) Describe physical description and list the applications of coaxial cable.
B) What is PAN, LAN, MAN and WAN ?
C) What is the relationship between a service and a protocol ?
D) Write a short note on ‘‘Physical layer coding violations’’ framing method.
E) Describe the unacknowledged connectionless service provided by DLL to
Network Layer.

3. Write answer to any one question. 6


A) What is channel capacity ? Explain Nyquist bandwidth and Shannons
capacity.
B) Explain unrestricted simplex protocol.

4. Describe TCP/IP reference model. 6

SECTION – II

5. Write answer to any four questions (4 marks for each). 16


A) Briefly describe 1-persistent CSMA and nonpersistent CSMA.
B) Briefly describe the pure ALOHA and slotted ALOHA protocols for
controlling the multiple access to a communication medium. What are
their throughput per frame time ?
Set R
SLR-TX – 314 -4- *SLRTX314*
C) In which TCP/IP communication layer Router, Bridge, Switch, Repeater
devices operate ?
D) What is flooding of IP packets in WAN ? Briefly describe the techniques
to damp the IP packet flooding process.
E) What is tunneling of IP packets in Internet working ?

6. Write answer to any one question. 6


A) Explain the distance vector routing with suitable network example.
B) Explain basic bit-map collision-free protocol.

7. Describe IEEE 802.6 standard (DQDB). 6


________________

Set R
*SLRTX314* SLR-TX – 314
Seat
Set S
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Data Communication

Day and Date : Saturday, 8-12-2018 , -2018 Total Marks : 70


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) __________ is used to synchronize receiver’s clock with sender.
a) Start of frame b) Type
c) Preamble d) Pad
2) In 802.3 cabling 10 Base F, F stands for
a) Frequency b) Frame
c) Flexibility d) Fiber optics
3) Preamble field of IEEE std. 802.3 contains a bit pattern
a) 10101010 b) 11110000
c) 11001100 d) 00001111
4) ____________ packets are the warning packets to reduce the transmission
rate and traffic.
a) Warning b) Datagram
c) VC d) Choke

P.T.O.
SLR-TX – 314 -2- *SLRTX314*
5) ___________ algorithms, change their routing decisions to reflect changes
in the topology or traffic.
a) Non adaptive b) Static
c) Adaptive d) None of these
6) The signal which uses more than two signal levels for encoding is
a) Multilevel binary b) NRZ c) Biphase d) None of these
7) In __________ encoding, there is a transition at the middle of each bit period.
a) NRZ – I b) NRZ – L c) AMI d) Manchester
8) __________ is a least expensive guided transmission medium.
a) Fiber optic b) Twisted pair
c) Co-axial cable d) None of these
9) It is upto the ___________ layer to detect, and if necessary correct errors.
a) Application b) Session c) Data Link d) Physical
10) A network provides _________ by having alternative sources of supply.
a) High reliability b) Scalability
c) Money d) None of these
11) An n-bit unit containing data and checkbits is often referred as
a) Word b) Parity
c) Codeword d) Checksum
12) Protocol in which the sender sends one frame and then waits for an
acknowledgement before proceeding is called as __________ protocol.
a) IP b) Sliding window
c) Stop-and-wait d) None of these
13) In ____________ protocols, the channel efficiency improves as the load
increases.
a) Contension b) Collision free
c) Both a and b d) None of these
14) Protocols in which station listens for a carrier and act accordingly are called
_________ protocols.
a) Contension b) Collision free
c) ALOHA d) Carrier sense
____________ Set S

*SLRTX314* -3- SLR-TX – 314
Seat
No.
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Data Communication

Day and Date : Saturday, 8-12-2018, -2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Write answer to any four questions (4 marks for each). 16


A) Describe physical description and list the applications of coaxial cable.
B) What is PAN, LAN, MAN and WAN ?
C) What is the relationship between a service and a protocol ?
D) Write a short note on ‘‘Physical layer coding violations’’ framing method.
E) Describe the unacknowledged connectionless service provided by DLL to
Network Layer.

3. Write answer to any one question. 6


A) What is channel capacity ? Explain Nyquist bandwidth and Shannons
capacity.
B) Explain unrestricted simplex protocol.

4. Describe TCP/IP reference model. 6

SECTION – II

5. Write answer to any four questions (4 marks for each). 16


A) Briefly describe 1-persistent CSMA and nonpersistent CSMA.
B) Briefly describe the pure ALOHA and slotted ALOHA protocols for
controlling the multiple access to a communication medium. What are
their throughput per frame time ?
Set S
SLR-TX – 314 -4- *SLRTX314*
C) In which TCP/IP communication layer Router, Bridge, Switch, Repeater
devices operate ?
D) What is flooding of IP packets in WAN ? Briefly describe the techniques
to damp the IP packet flooding process.
E) What is tunneling of IP packets in Internet working ?

6. Write answer to any one question. 6


A) Explain the distance vector routing with suitable network example.
B) Explain basic bit-map collision-free protocol.

7. Describe IEEE 802.6 standard (DQDB). 6


________________

Set S
*SLRTX315* SLR-TX – 315

Seat
No. Set P
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Convert decimal 64 to binary
a) 01010010 b) 01000000 c) 00110110 d) 01001000
2) Which of the following Boolean Algebra rule is correct ?
a) A.Ā = 1 b) A + AB = A + B
c) A + ĀB = A + B d) A(A + B) = B
3) When using even parity, where is the parity bit placed ?
a) Before the MSB b) After the LSB
c) In the parity word d) After the odd parity bit
4) A device which converts BCD to seven segment is called
a) Encoder b) Decoder c) Multiplexer d) Demultiplexer
5) In a 4 variable K-map, the function contains all minterms then the minimal
a) A b) 1 c) 0 d) Don’t care
6) The term in standard POS form are known as
a) Maxterm b) Minterm c) Don’t care d) None
7) Which IC is used as an universal Gate ?
a) IC7408 b) IC7432 c) IC7404 d) IC7400
8) A SR latch can be implemented by using
a) AND, OR b) NAND, NOR c) NAND, XOR d) NOT, XOR

P.T.O.
SLR-TX – 315 -2- *SLRTX315*
9) A counter with 10 state is known as
a) Cascading asynchronous counter b) Asynchronous ripple counter
c) Decade counter d) Ripple counter
10) This type of register accepts input data serially
a) PIPO b) SIPO c) PISO d) SISO
11) The bitwise NOT is represented by symbol
a) ~ b) & c) | d) ^
12) Verilog is an IEEE standard
a) IEEE 1346 b) IEEE 1364 c) IEEE 1394 d) IEEE 1349
13) Identify port in a verilog.
a) Input b) All c) Output d) Inout
14) The symbol used for multiple comment
a) */*/ b) //
c) /**/ d) None of above

______________

Set P
*SLRTX315* -3- SLR-TX – 315
Seat
No.

S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018


Digital Techniques
Day and Date : Tuesday, 11-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks

SECTION – I

2. Attempt any one : 8


1) Write a short note on Number System with example.
2) Design and explain driver for 7 segment display using IC 7447.

3. Attempt any two : 10


1) Minimize the following logic function using K-map and realize it using the
basic gates
F(A, B, C, D) = ∑m (0, 1, 2, 3, 4, 5, 13, 15) + d (8, 9, 10, 11)
2) Perform the addition using 2’s complement of the following number.
a) 28 + 23
b) – 28 + 23
c) 23 – 48
3) Obtain 1 : 8 demux using 1 : 2 demux.

4. Attempt any two : 10


1) What is Universal gate concept ? Implement basic gates using NAND gate.
2) Write a short note on IC74151.
3) Explain Full subtractor using K-Map.

Set P
SLR-TX – 315 -4- *SLRTX315*

SECTION – II

5. Attempt any one : (8×1=8)


1) What is flip flop ? Draw and explain how to construct SR flip flop, D flip flop
from JK flip flop.
2) Write a HDL code for half subtractor and full subtractor.

6. Attempt any two : (5×2=10)


1) Design up down counter.
2) Write a verilog code for D and T flip flop.
3) What is verilog HDL ?

7. Attempt any two : (5×2=10)


1) What is Module and write a program for counter.
2) Explain synchronous mod 5 counter.
3) Write a HDL code for 4 : 1 multiplexer.

_____________________

Set P
*SLRTX315* SLR-TX – 315

Seat
No. Set Q
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) A SR latch can be implemented by using
a) AND, OR b) NAND, NOR c) NAND, XOR d) NOT, XOR
2) A counter with 10 state is known as
a) Cascading asynchronous counter b) Asynchronous ripple counter
c) Decade counter d) Ripple counter
3) This type of register accepts input data serially
a) PIPO b) SIPO c) PISO d) SISO
4) The bitwise NOT is represented by symbol
a) ~ b) & c) | d) ^
5) Verilog is an IEEE standard
a) IEEE 1346 b) IEEE 1364 c) IEEE 1394 d) IEEE 1349
6) Identify port in a verilog.
a) Input b) All c) Output d) Inout
7) The symbol used for multiple comment
a) */*/ b) //
c) /**/ d) None of above
8) Convert decimal 64 to binary
a) 01010010 b) 01000000 c) 00110110 d) 01001000

P.T.O.
SLR-TX – 315 -2- *SLRTX315*
9) Which of the following Boolean Algebra rule is correct ?
a) A.Ā = 1 b) A + AB = A + B
c) A + ĀB = A + B d) A(A + B) = B
10) When using even parity, where is the parity bit placed ?
a) Before the MSB b) After the LSB
c) In the parity word d) After the odd parity bit
11) A device which converts BCD to seven segment is called
a) Encoder b) Decoder c) Multiplexer d) Demultiplexer
12) In a 4 variable K-map, the function contains all minterms then the minimal
a) A b) 1 c) 0 d) Don’t care
13) The term in standard POS form are known as
a) Maxterm b) Minterm c) Don’t care d) None
14) Which IC is used as an universal Gate ?
a) IC7408 b) IC7432 c) IC7404 d) IC7400

______________

Set Q
*SLRTX315* -3- SLR-TX – 315
Seat
No.

S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018


Digital Techniques
Day and Date : Tuesday, 11-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks

SECTION – I

2. Attempt any one : 8


1) Write a short note on Number System with example.
2) Design and explain driver for 7 segment display using IC 7447.

3. Attempt any two : 10


1) Minimize the following logic function using K-map and realize it using the
basic gates
F(A, B, C, D) = ∑m (0, 1, 2, 3, 4, 5, 13, 15) + d (8, 9, 10, 11)
2) Perform the addition using 2’s complement of the following number.
a) 28 + 23
b) – 28 + 23
c) 23 – 48
3) Obtain 1 : 8 demux using 1 : 2 demux.

4. Attempt any two : 10


1) What is Universal gate concept ? Implement basic gates using NAND gate.
2) Write a short note on IC74151.
3) Explain Full subtractor using K-Map.

Set Q
SLR-TX – 315 -4- *SLRTX315*

SECTION – II

5. Attempt any one : (8×1=8)


1) What is flip flop ? Draw and explain how to construct SR flip flop, D flip flop
from JK flip flop.
2) Write a HDL code for half subtractor and full subtractor.

6. Attempt any two : (5×2=10)


1) Design up down counter.
2) Write a verilog code for D and T flip flop.
3) What is verilog HDL ?

7. Attempt any two : (5×2=10)


1) What is Module and write a program for counter.
2) Explain synchronous mod 5 counter.
3) Write a HDL code for 4 : 1 multiplexer.

_____________________

Set Q
*SLRTX315* SLR-TX – 315

Seat
No. Set R
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) In a 4 variable K-map, the function contains all minterms then the minimal
a) A b) 1 c) 0 d) Don’t care
2) The term in standard POS form are known as
a) Maxterm b) Minterm c) Don’t care d) None
3) Which IC is used as an universal Gate ?
a) IC7408 b) IC7432 c) IC7404 d) IC7400
4) A SR latch can be implemented by using
a) AND, OR b) NAND, NOR c) NAND, XOR d) NOT, XOR
5) A counter with 10 state is known as
a) Cascading asynchronous counter b) Asynchronous ripple counter
c) Decade counter d) Ripple counter
6) This type of register accepts input data serially
a) PIPO b) SIPO c) PISO d) SISO
7) The bitwise NOT is represented by symbol
a) ~ b) & c) | d) ^
8) Verilog is an IEEE standard
a) IEEE 1346 b) IEEE 1364 c) IEEE 1394 d) IEEE 1349
9) Identify port in a verilog.
a) Input b) All c) Output d) Inout
P.T.O.
SLR-TX – 315 -2- *SLRTX315*
10) The symbol used for multiple comment
a) */*/ b) //
c) /**/ d) None of above
11) Convert decimal 64 to binary
a) 01010010 b) 01000000 c) 00110110 d) 01001000
12) Which of the following Boolean Algebra rule is correct ?
a) A.Ā = 1 b) A + AB = A + B
c) A + ĀB = A + B d) A(A + B) = B
13) When using even parity, where is the parity bit placed ?
a) Before the MSB b) After the LSB
c) In the parity word d) After the odd parity bit
14) A device which converts BCD to seven segment is called
a) Encoder b) Decoder c) Multiplexer d) Demultiplexer

______________

Set R
*SLRTX315* -3- SLR-TX – 315
Seat
No.

S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018


Digital Techniques
Day and Date : Tuesday, 11-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks

SECTION – I

2. Attempt any one : 8


1) Write a short note on Number System with example.
2) Design and explain driver for 7 segment display using IC 7447.

3. Attempt any two : 10


1) Minimize the following logic function using K-map and realize it using the
basic gates
F(A, B, C, D) = ∑m (0, 1, 2, 3, 4, 5, 13, 15) + d (8, 9, 10, 11)
2) Perform the addition using 2’s complement of the following number.
a) 28 + 23
b) – 28 + 23
c) 23 – 48
3) Obtain 1 : 8 demux using 1 : 2 demux.

4. Attempt any two : 10


1) What is Universal gate concept ? Implement basic gates using NAND gate.
2) Write a short note on IC74151.
3) Explain Full subtractor using K-Map.

Set R
SLR-TX – 315 -4- *SLRTX315*

SECTION – II

5. Attempt any one : (8×1=8)


1) What is flip flop ? Draw and explain how to construct SR flip flop, D flip flop
from JK flip flop.
2) Write a HDL code for half subtractor and full subtractor.

6. Attempt any two : (5×2=10)


1) Design up down counter.
2) Write a verilog code for D and T flip flop.
3) What is verilog HDL ?

7. Attempt any two : (5×2=10)


1) What is Module and write a program for counter.
2) Explain synchronous mod 5 counter.
3) Write a HDL code for 4 : 1 multiplexer.

_____________________

Set R
*SLRTX315* SLR-TX – 315

Seat
No. Set S
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) This type of register accepts input data serially
a) PIPO b) SIPO c) PISO d) SISO
2) The bitwise NOT is represented by symbol
a) ~ b) & c) | d) ^
3) Verilog is an IEEE standard
a) IEEE 1346 b) IEEE 1364 c) IEEE 1394 d) IEEE 1349
4) Identify port in a verilog.
a) Input b) All c) Output d) Inout
5) The symbol used for multiple comment
a) */*/ b) //
c) /**/ d) None of above
6) Convert decimal 64 to binary
a) 01010010 b) 01000000 c) 00110110 d) 01001000
7) Which of the following Boolean Algebra rule is correct ?
a) A.Ā = 1 b) A + AB = A + B
c) A + ĀB = A + B d) A(A + B) = B
8) When using even parity, where is the parity bit placed ?
a) Before the MSB b) After the LSB
c) In the parity word d) After the odd parity bit
P.T.O.
SLR-TX – 315 -2- *SLRTX315*
9) A device which converts BCD to seven segment is called
a) Encoder b) Decoder c) Multiplexer d) Demultiplexer
10) In a 4 variable K-map, the function contains all minterms then the minimal
a) A b) 1 c) 0 d) Don’t care
11) The term in standard POS form are known as
a) Maxterm b) Minterm c) Don’t care d) None
12) Which IC is used as an universal Gate ?
a) IC7408 b) IC7432 c) IC7404 d) IC7400
13) A SR latch can be implemented by using
a) AND, OR b) NAND, NOR c) NAND, XOR d) NOT, XOR
14) A counter with 10 state is known as
a) Cascading asynchronous counter b) Asynchronous ripple counter
c) Decade counter d) Ripple counter

______________

Set S
*SLRTX315* -3- SLR-TX – 315
Seat
No.

S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018


Digital Techniques
Day and Date : Tuesday, 11-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks

SECTION – I

2. Attempt any one : 8


1) Write a short note on Number System with example.
2) Design and explain driver for 7 segment display using IC 7447.

3. Attempt any two : 10


1) Minimize the following logic function using K-map and realize it using the
basic gates
F(A, B, C, D) = ∑m (0, 1, 2, 3, 4, 5, 13, 15) + d (8, 9, 10, 11)
2) Perform the addition using 2’s complement of the following number.
a) 28 + 23
b) – 28 + 23
c) 23 – 48
3) Obtain 1 : 8 demux using 1 : 2 demux.

4. Attempt any two : 10


1) What is Universal gate concept ? Implement basic gates using NAND gate.
2) Write a short note on IC74151.
3) Explain Full subtractor using K-Map.

Set S
SLR-TX – 315 -4- *SLRTX315*

SECTION – II

5. Attempt any one : (8×1=8)


1) What is flip flop ? Draw and explain how to construct SR flip flop, D flip flop
from JK flip flop.
2) Write a HDL code for half subtractor and full subtractor.

6. Attempt any two : (5×2=10)


1) Design up down counter.
2) Write a verilog code for D and T flip flop.
3) What is verilog HDL ?

7. Attempt any two : (5×2=10)


1) What is Module and write a program for counter.
2) Explain synchronous mod 5 counter.
3) Write a HDL code for 4 : 1 multiplexer.

_____________________

Set S
*SLRTX316* SLR-TX – 316
Seat
No.

Set P
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Computer Graphics
Day and Date : Thursday, 13-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Picture definition is stored in the memory are called __________
a) Frame buffer b) Available frame
c) Scan buffer d) All above
2) The maximum number of points that can be displayed without overlap on
a CRT is ___________
a) Frame buffer b) Aspect ratio
c) Resolution d) None of above
3) A simple seed fill algorithm for a boundary-defined region can be developed
using
a) Queue b) Stack
c) List d) None of above
4) Inbresenham’s integer algorithm the speed of the algorithm is increase by
using integer arithmetic. Because only the sign of error term is important.
a) True b) False
c) Can’t say d) None of above

P.T.O.
SLR-TX – 316 -2- *SLRTX316*

5) The diagonal terms of the general 4×4 transformation matrix produced


__________ in 3D.
a) Translation b) Scaling c) Reflection d) All above
6) ___________ results in the distortion of shape of object.
a) Translation b) Scaling c) Reflection d) Shearing
7) Rotation of an object other than origin point is possible with the help of
Rotation about an arbitrary point method.
a) True b) False c) Can’t say d) None of above
8) __________ operation removes segment from refreshing cycle.
a) Post b) Unpost c) Delete d) Undo
9) Dynamic graphics demands for __________
a) speed regeneration b) selective modification
c) both a) and b) d) none of the above
10) ___________ is unit of display file.
a) Segment b) Pixel
c) File unit d) None of the above
11) Z buffer initializes frame buffer values to ___________
a) Background value b) Minimum z value
c) 0 d) 1
12) Warnock algorithm uses ___________
a) Greedy method b) Dynamic programming
c) Brute force algorithm d) Divide and conquer method
13) Curve is represented as a collection of a _____________
a) Edges b) Points
c) Vertex d) None of the above
14) If curve passes through all control points then its ___________
a) Interpolation b) Intrapolation
c) Entrepolation d) None of the above
_____________________

Set P
*SLRTX316* -3- SLR-TX – 316
Seat
No.

S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Computer Graphics
Day and Date : Thursday, 13-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.
N.B. : 1) All questions are compulsory.
2) Figures to right indicate full marks.

SECTION – I

2. Attempt any three : (3×4=12)


A) Describe and compare between Raster Scan Display and Random Scan
Display.
B) Explain DDA line drawing algorithm.
C) Explain the seed fill algorithm.
D) Describe 2D reflection with diagram.

3. Describe Bresenham’s circle generation algorithm in detail. 8


OR
List the 3D transformation matrices for : 3D rotation, 3D reflection and 3D scaling.
Perform 3D translation of unit cube in xyz direction with –2, –4 and –6
respectively. 8

4. Describe color CRT monitor with the help of shadow-mask CRT. Draw
appropriate diagram for the same. 8

SECTION – II

5. Attempt any 3 : 12
a) Describe posting and unposting a segment function with example.
b) What is need of viewing transformation ? Explain.
c) State advantages and disadvantages of Z-Buffer.
d) Explain antialasing and effects of aliasing.
e) Describe curve representation in detail.

6. Explain region code algorithm with region code representation. 8


OR
Describe in detail B-spline curves. 8

7. Explain Warnock algorithm with quadtree structure. 8


_____________________
Set P
SLR-TX – 316 -4- *SLRTX316*

Set P
*SLRTX316* SLR-TX – 316
Seat
No.

Set Q
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Computer Graphics
Day and Date : Thursday, 13-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) __________ operation removes segment from refreshing cycle.
a) Post b) Unpost c) Delete d) Undo
2) Dynamic graphics demands for __________
a) speed regeneration b) selective modification
c) both a) and b) d) none of the above
3) ___________ is unit of display file.
a) Segment b) Pixel
c) File unit d) None of the above
4) Z buffer initializes frame buffer values to ___________
a) Background value b) Minimum z value
c) 0 d) 1
5) Warnock algorithm uses ___________
a) Greedy method b) Dynamic programming
c) Brute force algorithm d) Divide and conquer method
6) Curve is represented as a collection of a _____________
a) Edges b) Points
c) Vertex d) None of the above

P.T.O.
SLR-TX – 316 -2- *SLRTX316*

7) If curve passes through all control points then its ___________


a) Interpolation b) Intrapolation
c) Entrepolation d) None of the above
8) Picture definition is stored in the memory are called __________
a) Frame buffer b) Available frame
c) Scan buffer d) All above
9) The maximum number of points that can be displayed without overlap on
a CRT is ___________
a) Frame buffer b) Aspect ratio
c) Resolution d) None of above
10) A simple seed fill algorithm for a boundary-defined region can be developed
using
a) Queue b) Stack
c) List d) None of above
11) Inbresenham’s integer algorithm the speed of the algorithm is increase by
using integer arithmetic. Because only the sign of error term is important.
a) True b) False
c) Can’t say d) None of above
12) The diagonal terms of the general 4×4 transformation matrix produced
__________ in 3D.
a) Translation b) Scaling c) Reflection d) All above
13) ___________ results in the distortion of shape of object.
a) Translation b) Scaling c) Reflection d) Shearing
14) Rotation of an object other than origin point is possible with the help of
Rotation about an arbitrary point method.
a) True b) False c) Can’t say d) None of above
_____________________

Set Q
*SLRTX316* -3- SLR-TX – 316
Seat
No.

S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Computer Graphics
Day and Date : Thursday, 13-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.
N.B. : 1) All questions are compulsory.
2) Figures to right indicate full marks.

SECTION – I

2. Attempt any three : (3×4=12)


A) Describe and compare between Raster Scan Display and Random Scan
Display.
B) Explain DDA line drawing algorithm.
C) Explain the seed fill algorithm.
D) Describe 2D reflection with diagram.

3. Describe Bresenham’s circle generation algorithm in detail. 8


OR
List the 3D transformation matrices for : 3D rotation, 3D reflection and 3D scaling.
Perform 3D translation of unit cube in xyz direction with –2, –4 and –6
respectively. 8

4. Describe color CRT monitor with the help of shadow-mask CRT. Draw
appropriate diagram for the same. 8

SECTION – II

5. Attempt any 3 : 12
a) Describe posting and unposting a segment function with example.
b) What is need of viewing transformation ? Explain.
c) State advantages and disadvantages of Z-Buffer.
d) Explain antialasing and effects of aliasing.
e) Describe curve representation in detail.

6. Explain region code algorithm with region code representation. 8


OR
Describe in detail B-spline curves. 8

7. Explain Warnock algorithm with quadtree structure. 8


_____________________
Set Q
SLR-TX – 316 -4- *SLRTX316*

Set Q
*SLRTX316* SLR-TX – 316
Seat
No.

Set R
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Computer Graphics
Day and Date : Thursday, 13-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) The diagonal terms of the general 4×4 transformation matrix produced
__________ in 3D.
a) Translation b) Scaling c) Reflection d) All above
2) ___________ results in the distortion of shape of object.
a) Translation b) Scaling c) Reflection d) Shearing
3) Rotation of an object other than origin point is possible with the help of
Rotation about an arbitrary point method.
a) True b) False c) Can’t say d) None of above
4) __________ operation removes segment from refreshing cycle.
a) Post b) Unpost c) Delete d) Undo
5) Dynamic graphics demands for __________
a) speed regeneration b) selective modification
c) both a) and b) d) none of the above
6) ___________ is unit of display file.
a) Segment b) Pixel
c) File unit d) None of the above

P.T.O.
SLR-TX – 316 -2- *SLRTX316*

7) Z buffer initializes frame buffer values to ___________


a) Background value b) Minimum z value
c) 0 d) 1
8) Warnock algorithm uses ___________
a) Greedy method b) Dynamic programming
c) Brute force algorithm d) Divide and conquer method
9) Curve is represented as a collection of a _____________
a) Edges b) Points
c) Vertex d) None of the above
10) If curve passes through all control points then its ___________
a) Interpolation b) Intrapolation
c) Entrepolation d) None of the above
11) Picture definition is stored in the memory are called __________
a) Frame buffer b) Available frame
c) Scan buffer d) All above
12) The maximum number of points that can be displayed without overlap on
a CRT is ___________
a) Frame buffer b) Aspect ratio
c) Resolution d) None of above
13) A simple seed fill algorithm for a boundary-defined region can be developed
using
a) Queue b) Stack
c) List d) None of above
14) Inbresenham’s integer algorithm the speed of the algorithm is increase by
using integer arithmetic. Because only the sign of error term is important.
a) True b) False
c) Can’t say d) None of above
_____________________

Set R
*SLRTX316* -3- SLR-TX – 316
Seat
No.

S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Computer Graphics
Day and Date : Thursday, 13-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.
N.B. : 1) All questions are compulsory.
2) Figures to right indicate full marks.

SECTION – I

2. Attempt any three : (3×4=12)


A) Describe and compare between Raster Scan Display and Random Scan
Display.
B) Explain DDA line drawing algorithm.
C) Explain the seed fill algorithm.
D) Describe 2D reflection with diagram.

3. Describe Bresenham’s circle generation algorithm in detail. 8


OR
List the 3D transformation matrices for : 3D rotation, 3D reflection and 3D scaling.
Perform 3D translation of unit cube in xyz direction with –2, –4 and –6
respectively. 8

4. Describe color CRT monitor with the help of shadow-mask CRT. Draw
appropriate diagram for the same. 8

SECTION – II

5. Attempt any 3 : 12
a) Describe posting and unposting a segment function with example.
b) What is need of viewing transformation ? Explain.
c) State advantages and disadvantages of Z-Buffer.
d) Explain antialasing and effects of aliasing.
e) Describe curve representation in detail.

6. Explain region code algorithm with region code representation. 8


OR
Describe in detail B-spline curves. 8

7. Explain Warnock algorithm with quadtree structure. 8


_____________________
Set R
SLR-TX – 316 -4- *SLRTX316*

Set R
*SLRTX316* SLR-TX – 316
Seat
No.

Set S
S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Computer Graphics
Day and Date : Thursday, 13-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) ___________ is unit of display file.
a) Segment b) Pixel
c) File unit d) None of the above
2) Z buffer initializes frame buffer values to ___________
a) Background value b) Minimum z value
c) 0 d) 1
3) Warnock algorithm uses ___________
a) Greedy method b) Dynamic programming
c) Brute force algorithm d) Divide and conquer method
4) Curve is represented as a collection of a _____________
a) Edges b) Points
c) Vertex d) None of the above
5) If curve passes through all control points then its ___________
a) Interpolation b) Intrapolation
c) Entrepolation d) None of the above

P.T.O.
SLR-TX – 316 -2- *SLRTX316*

6) Picture definition is stored in the memory are called __________


a) Frame buffer b) Available frame
c) Scan buffer d) All above
7) The maximum number of points that can be displayed without overlap on
a CRT is ___________
a) Frame buffer b) Aspect ratio
c) Resolution d) None of above
8) A simple seed fill algorithm for a boundary-defined region can be developed
using
a) Queue b) Stack
c) List d) None of above
9) Inbresenham’s integer algorithm the speed of the algorithm is increase by
using integer arithmetic. Because only the sign of error term is important.
a) True b) False
c) Can’t say d) None of above
10) The diagonal terms of the general 4×4 transformation matrix produced
__________ in 3D.
a) Translation b) Scaling c) Reflection d) All above
11) ___________ results in the distortion of shape of object.
a) Translation b) Scaling c) Reflection d) Shearing
12) Rotation of an object other than origin point is possible with the help of
Rotation about an arbitrary point method.
a) True b) False c) Can’t say d) None of above
13) __________ operation removes segment from refreshing cycle.
a) Post b) Unpost c) Delete d) Undo
14) Dynamic graphics demands for __________
a) speed regeneration b) selective modification
c) both a) and b) d) none of the above
_____________________

Set S
*SLRTX316* -3- SLR-TX – 316
Seat
No.

S.E. (CSE) (Part – I) (New-CBCS) Examination, 2018
Computer Graphics
Day and Date : Thursday, 13-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.
N.B. : 1) All questions are compulsory.
2) Figures to right indicate full marks.

SECTION – I

2. Attempt any three : (3×4=12)


A) Describe and compare between Raster Scan Display and Random Scan
Display.
B) Explain DDA line drawing algorithm.
C) Explain the seed fill algorithm.
D) Describe 2D reflection with diagram.

3. Describe Bresenham’s circle generation algorithm in detail. 8


OR
List the 3D transformation matrices for : 3D rotation, 3D reflection and 3D scaling.
Perform 3D translation of unit cube in xyz direction with –2, –4 and –6
respectively. 8

4. Describe color CRT monitor with the help of shadow-mask CRT. Draw
appropriate diagram for the same. 8

SECTION – II

5. Attempt any 3 : 12
a) Describe posting and unposting a segment function with example.
b) What is need of viewing transformation ? Explain.
c) State advantages and disadvantages of Z-Buffer.
d) Explain antialasing and effects of aliasing.
e) Describe curve representation in detail.

6. Explain region code algorithm with region code representation. 8


OR
Describe in detail B-spline curves. 8

7. Explain Warnock algorithm with quadtree structure. 8


_____________________
Set S
SLR-TX – 316 -4- *SLRTX316*

Set S
*SLRTX317* SLR-TX – 317
Seat
No.
Set P
S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : 14


1
1) cos ax is equal to _______________
D + a2
2
x x x
a) x cos ax b) cos ax c) sin ax d) sin ax
2a 2
2a 2a 2
2a

2) The complete solution of (D4 – 2D3 + D2) y = 0 if y = ______________
a) C1 + C2x + C3x2e–x b) C1 + C2x + (C3 + C4x)ex
c) (C1 + C2x)e–x+(C3+ C4x) ex d) (C1 + C2x + C3x2)e–x
3) The Laplace transform of e–2t + sin2t is
1 2 1 2 1 2 1 1
a) + 2 b) + 2 c) + 2 d) + 2
s−2 s +4 s+2 s −4 s+2 s +4 s+2 s +4

 s + s2 
4) The L−1  3  = ________________
 s 
a) t + t2 b) t + 1 c) t2 + 1 d) t – 1
5) If z{f(k)} = F(z), then z{kf(k)} =
dF ( z ) dF ( z ) dF ( z ) − dF ( z )
a) − z b) z c) d)
dz dz dz dz

P.T.O.
SLR-TX – 317 -2- *SLRTX317*
6) Fourier series of f(x) = 1 – x2 in (– π, π) contains
a) Only sine series b) Only cosine series
c) Both sine and cosine series d) None of these
7) Which of the following functions cannot be expanded in Fourier series in the interval (– d,d) ?
a) ex b) |x| c) cosec x d) x2
8) The magnitude of maximum directional derivative of ϕ = x2yz3 at the point (2, 1, – 1) is
a) 4 11 b) 44 c) 4 d) 40

9) If r = xi + yj + zk and r = r , then the grad r is,

a) r b) r c) r d) 0
r
10) For binomial distribution mean is 12, variance is 4, then the values of n, p, q are respectively
1 2 2 1 2 1
a) 9, , b) 9, , c) 4, 1 , 1 d) 18, ,
3 3 3 3 2 2 3 3

11) If x is Poisson variate such that p(x = 1) = p(x = 2), then the value of Poisson’s parameter is
a) 0 b) 1 c) 2 d) 3
12) For a certain data, the regression equations are 3x + 2y – 26 = 0 and 6x + y – 31 = 0, then
the coefficient of correlation ‘r’ is
a) 0.5 b) – 0.5 c) 2 d) – 2
13) The normal equations of the curve, y = ax + b are
a) ∑y = na + b∑x, ∑xy = a∑x + b∑x2
b) ∑y = na + b∑x, ∑(x + y) = a∑x + b∑x2
c) ∑y = a∑x + nb, ∑xy = a∑x2 + b∑x
d) ∑y = a∑x + nb, ∑(x + y) = a∑x2 + b∑x
14) The fraction of time the system is busy is
λ µ λ µ
a) b) c) d)
µ λ µ 2
λ2

____________

Set P
*SLRTX317* -3- SLR-TX – 317
Seat
No.
S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
APPLIED MATHEMATICS – I
Day and Date : Tuesday, 4-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 2 and 8 are compulsory and attempt any two


questions from remaining questions of each Section.
2) Figures to the right indicate full marks.
3) Use of calculator is allowed.

SECTION – I

2. a) Solve (D2 + 2D + 1) y = e–xsinx. 3


b) Solve (D4 + 8D2 + 16)y = cosh2x. 3
c) Solve (D3 + 8)y = x4 + 2x+1. 4
OR
x 2
c) Solve y ′′ − y = e (1 + x ) . 4

3. Solve any three of the following : 9



cos 6t − cos 4 t
a) Evaluate ∫ t
dt , by Laplace transform.
0

b) Find L{e3tsin5tsin3t}.

−1  s + 2 

c) Find L  2 .
 s ( s + 3 ) 

  s
d) Find L−1 Cot −1    .
  a
4. a) Find z{c cosαk}, k ≥ 0 where α is real.
k
3

4 , for k < 0


k
b) Find z{f(k)} , where f(k) =  . 3
k
3 , for k ≥ 0
 1 
−1 
c) Find z  3
, z < 5 . 3
 ( z − 5) 
5. a) Find the Fourier series for the function f(x) = ex in the interval (–π, π). 5
b) Find the Half-range cosine series for the function f(x) = C – x in (0, C). 4
Set P
SLR-TX – 317 -4- *SLRTX317*
SECTION – II
6. Attempt the following :

a) Prove that ∇ ⋅  r∇  = .
1 3
3
 r  r4
3

b) Find the unit tangent vector at any point on the curve, x = t2 + 2, y = 4t – 5, z = 2t2 – 6t
where ‘t’ is any variable. Also determine the unit tangent vector at the point t = 2. 3

c) Find directional derivative of ϕ = x2yz + 4xz2 at (1, – 2, – 1) in the direction of 2i – j – 2k. 3

7. Attempt the following :


a) The equations to the two lines of regression are 6y = 5x + 90 and 15x = 8y + 130. Find
the means of x and y and the coefficient of correlation. 3
b) In a room, there are three lamp-sockets. A bag contains 6 working and 4 non-working
bulbs. Three bulbs are selected at random and fitted in the sockets. Find the
probability that there will be some light in the room. 3
c) The income distribution of workers in a certain factory was found to be normal with
mean of ₹ 500 and standard deviation of ₹ 50. There were 228 persons above ₹ 600.
How many persons were there in all ? [Given : for SNV z area from z = 0 to z = 2 is
0.4772). 3

8. Attempt the following :


a) In sampling, a large number of parts manufactured by a machine, the number of
defectives in sample of 40 is 2. Out of 1000 such samples how many would be
expected to contain 3 defective parts. 3
b) Fit a straight line to the following data :
x : 1 2 3 4 6 8
y : 2.4 3 3.4 4 5 6 3
c) Find the equations of the lines of regression from the following data. Find also the best
estimate of y when x = 13.
x : 2 4 6 8 12 14
y : 4 2 5 10 11 12 4

9. Attempt the following :


a) There are three computers in a shop and three operators. Each operator on an
average can send 10 messages per hour by e-mail. If messages arrive for being
e-mailed at the rate of 25 per hour. 5
i) What is the probability that all the computers are busy ?
ii) What is the average number of messages waiting to be sent ?
b) Customers arrive at a clinic according to a Poisson process with mean interval of
25 min., the physician needs on an average 20 min. for a patient to examine. 4
i) Find the excepted number of patients at the clinic and in the queue.
ii) Find percentage of patients who are not required to wait.
Set P
___________________
*SLRTX317* SLR-TX – 317
Seat
No.
Set Q
S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : 14


1) The magnitude of maximum directional derivative of ϕ = x2yz3 at the point (2, 1, – 1) is
a) 4 11 b) 44 c) 4 d) 40

2) If r = xi + yj + zk and r = r , then the grad r is,

a) r b) r c) r d) 0
r
3) For binomial distribution mean is 12, variance is 4, then the values of n, p, q are respectively
1 2 2 1
a) 9, , b) 9, ,
3 3 3 3
2 1
c) 4, 1 , 1 d) 18, ,
2 2 3 3

4) If x is Poisson variate such that p(x = 1) = p(x = 2), then the value of Poisson’s parameter is
a) 0 b) 1 c) 2 d) 3
5) For a certain data, the regression equations are 3x + 2y – 26 = 0 and 6x + y – 31 = 0, then
the coefficient of correlation ‘r’ is
a) 0.5 b) – 0.5
c) 2 d) – 2

P.T.O.
SLR-TX – 317 -2- *SLRTX317*
6) The normal equations of the curve, y = ax + b are
a) ∑y = na + b∑x, ∑xy = a∑x + b∑x2
b) ∑y = na + b∑x, ∑(x + y) = a∑x + b∑x2
c) ∑y = a∑x + nb, ∑xy = a∑x2 + b∑x
d) ∑y = a∑x + nb, ∑(x + y) = a∑x2 + b∑x
7) The fraction of time the system is busy is
λ µ λ µ
a) b) c) d)
µ λ µ 2
λ2

1
8) cos ax is equal to _______________
D + a2
2
x x x
a) x cos ax b) cos ax c) sin ax d) sin ax
2a 2
2a 2a 2
2a

9) The complete solution of (D4 – 2D3 + D2) y = 0 if y = ______________
a) C1 + C2x + C3x2e–x b) C1 + C2x + (C3 + C4x)ex
c) (C1 + C2x)e–x+(C3+ C4x) ex d) (C1 + C2x + C3x2)e–x
10) The Laplace transform of e–2t + sin2t is
1 2 1 2 1 2 1 1
a) + 2 b) + 2 c) + 2 d) + 2
s−2 s +4 s+2 s −4 s+2 s +4 s+2 s +4

 s + s2 
11) The L−1  3  = ________________
 s 

a) t + t2 b) t + 1 c) t2 + 1 d) t – 1
12) If z{f(k)} = F(z), then z{kf(k)} =
dF ( z ) dF ( z ) dF ( z ) − dF ( z )
a) − z b) z c) d)
dz dz dz dz

13) Fourier series of f(x) = 1 – x2 in (– π, π) contains
a) Only sine series b) Only cosine series
c) Both sine and cosine series d) None of these
14) Which of the following functions cannot be expanded in Fourier series in the interval (– d,d) ?
a) ex b) |x| c) cosec x d) x2

____________

Set Q
*SLRTX317* -3- SLR-TX – 317
Seat
No.
S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
APPLIED MATHEMATICS – I
Day and Date : Tuesday, 4-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 2 and 8 are compulsory and attempt any two


questions from remaining questions of each Section.
2) Figures to the right indicate full marks.
3) Use of calculator is allowed.

SECTION – I

2. a) Solve (D2 + 2D + 1) y = e–xsinx. 3


b) Solve (D4 + 8D2 + 16)y = cosh2x. 3
c) Solve (D3 + 8)y = x4 + 2x+1. 4
OR
x 2
c) Solve y ′′ − y = e (1 + x ) . 4

3. Solve any three of the following : 9



cos 6t − cos 4 t
a) Evaluate ∫ t
dt , by Laplace transform.
0

b) Find L{e3tsin5tsin3t}.

−1  s + 2 

c) Find L  2 .
 s ( s + 3 ) 

  s
d) Find L−1 Cot −1    .
  a
4. a) Find z{c cosαk}, k ≥ 0 where α is real.
k
3

4 , for k < 0


k
b) Find z{f(k)} , where f(k) =  . 3
k
3 , for k ≥ 0
 1 
−1 
c) Find z  3
, z < 5 . 3
 ( z − 5) 
5. a) Find the Fourier series for the function f(x) = ex in the interval (–π, π). 5
b) Find the Half-range cosine series for the function f(x) = C – x in (0, C). 4
Set Q
SLR-TX – 317 -4- *SLRTX317*
SECTION – II
6. Attempt the following :

a) Prove that ∇ ⋅  r∇  = .
1 3
3
 r  r4
3

b) Find the unit tangent vector at any point on the curve, x = t2 + 2, y = 4t – 5, z = 2t2 – 6t
where ‘t’ is any variable. Also determine the unit tangent vector at the point t = 2. 3

c) Find directional derivative of ϕ = x2yz + 4xz2 at (1, – 2, – 1) in the direction of 2i – j – 2k. 3

7. Attempt the following :


a) The equations to the two lines of regression are 6y = 5x + 90 and 15x = 8y + 130. Find
the means of x and y and the coefficient of correlation. 3
b) In a room, there are three lamp-sockets. A bag contains 6 working and 4 non-working
bulbs. Three bulbs are selected at random and fitted in the sockets. Find the
probability that there will be some light in the room. 3
c) The income distribution of workers in a certain factory was found to be normal with
mean of ₹ 500 and standard deviation of ₹ 50. There were 228 persons above ₹ 600.
How many persons were there in all ? [Given : for SNV z area from z = 0 to z = 2 is
0.4772). 3

8. Attempt the following :


a) In sampling, a large number of parts manufactured by a machine, the number of
defectives in sample of 40 is 2. Out of 1000 such samples how many would be
expected to contain 3 defective parts. 3
b) Fit a straight line to the following data :
x : 1 2 3 4 6 8
y : 2.4 3 3.4 4 5 6 3
c) Find the equations of the lines of regression from the following data. Find also the best
estimate of y when x = 13.
x : 2 4 6 8 12 14
y : 4 2 5 10 11 12 4

9. Attempt the following :


a) There are three computers in a shop and three operators. Each operator on an
average can send 10 messages per hour by e-mail. If messages arrive for being
e-mailed at the rate of 25 per hour. 5
i) What is the probability that all the computers are busy ?
ii) What is the average number of messages waiting to be sent ?
b) Customers arrive at a clinic according to a Poisson process with mean interval of
25 min., the physician needs on an average 20 min. for a patient to examine. 4
i) Find the excepted number of patients at the clinic and in the queue.
ii) Find percentage of patients who are not required to wait.
Set Q
___________________
*SLRTX317* SLR-TX – 317
Seat
No.
Set R
S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : 14


1) If z{f(k)} = F(z), then z{kf(k)} =
dF ( z ) dF ( z ) dF ( z ) − dF ( z )
a) − z b) z c) d)
dz dz dz dz

2) Fourier series of f(x) = 1 – x2 in (– π, π) contains
a) Only sine series b) Only cosine series
c) Both sine and cosine series d) None of these
3) Which of the following functions cannot be expanded in Fourier series in the interval (– d,d) ?
a) ex b) |x| c) cosec x d) x2
4) The magnitude of maximum directional derivative of ϕ = x2yz3 at the point (2, 1, – 1) is
a) 4 11 b) 44 c) 4 d) 40

5) If r = xi + yj + zk and r = r , then the grad r is,

a) r b) r c) r d) 0
r
6) For binomial distribution mean is 12, variance is 4, then the values of n, p, q are respectively
1 2 2 1 2 1
a) 9, , b) 9, , c) 4, 1 , 1 d) 18, ,
3 3 3 3 2 2 3 3

P.T.O.
SLR-TX – 317 -2- *SLRTX317*
7) If x is Poisson variate such that p(x = 1) = p(x = 2), then the value of Poisson’s parameter is
a) 0 b) 1 c) 2 d) 3
8) For a certain data, the regression equations are 3x + 2y – 26 = 0 and 6x + y – 31 = 0, then
the coefficient of correlation ‘r’ is
a) 0.5 b) – 0.5 c) 2 d) – 2
9) The normal equations of the curve, y = ax + b are
a) ∑y = na + b∑x, ∑xy = a∑x + b∑x2
b) ∑y = na + b∑x, ∑(x + y) = a∑x + b∑x2
c) ∑y = a∑x + nb, ∑xy = a∑x2 + b∑x
d) ∑y = a∑x + nb, ∑(x + y) = a∑x2 + b∑x
10) The fraction of time the system is busy is
λ µ λ µ
a) b) c) d)
µ λ µ 2
λ2
1
11) cos ax is equal to _______________
D + a2
2
x x x
a) x cos ax b) cos ax c) sin ax d) sin ax
2a 2
2a 2a 2
2a

12) The complete solution of (D4 – 2D3 + D2) y = 0 if y = ______________
a) C1 + C2x + C3x2e–x b) C1 + C2x + (C3 + C4x)ex
c) (C1 + C2x)e–x+(C3+ C4x) ex d) (C1 + C2x + C3x2)e–x
13) The Laplace transform of e–2t + sin2t is
1 2 1 2 1 2 1 1
a) + 2 b) + 2 c) + 2 d) +
s−2 s +4 s+2 s −4 s+2 s +4 s + 2 s2 + 4

 s + s2 
14) The L−1  3  = ________________
 s 
a) t + t2 b) t + 1 c) t2 + 1 d) t – 1

____________

Set R
*SLRTX317* -3- SLR-TX – 317
Seat
No.
S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
APPLIED MATHEMATICS – I
Day and Date : Tuesday, 4-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 2 and 8 are compulsory and attempt any two


questions from remaining questions of each Section.
2) Figures to the right indicate full marks.
3) Use of calculator is allowed.

SECTION – I

2. a) Solve (D2 + 2D + 1) y = e–xsinx. 3


b) Solve (D4 + 8D2 + 16)y = cosh2x. 3
c) Solve (D3 + 8)y = x4 + 2x+1. 4
OR
x 2
c) Solve y ′′ − y = e (1 + x ) . 4

3. Solve any three of the following : 9



cos 6t − cos 4 t
a) Evaluate ∫ t
dt , by Laplace transform.
0

b) Find L{e3tsin5tsin3t}.

−1  s + 2 

c) Find L  2 .
 s ( s + 3 ) 

  s
d) Find L−1 Cot −1    .
  a
4. a) Find z{c cosαk}, k ≥ 0 where α is real.
k
3

4 , for k < 0


k
b) Find z{f(k)} , where f(k) =  . 3
k
3 , for k ≥ 0
 1 
−1 
c) Find z  3
, z < 5 . 3
 ( z − 5) 
5. a) Find the Fourier series for the function f(x) = ex in the interval (–π, π). 5
b) Find the Half-range cosine series for the function f(x) = C – x in (0, C). 4
Set R
SLR-TX – 317 -4- *SLRTX317*
SECTION – II
6. Attempt the following :

a) Prove that ∇ ⋅  r∇  = .
1 3
3
 r  r4
3

b) Find the unit tangent vector at any point on the curve, x = t2 + 2, y = 4t – 5, z = 2t2 – 6t
where ‘t’ is any variable. Also determine the unit tangent vector at the point t = 2. 3

c) Find directional derivative of ϕ = x2yz + 4xz2 at (1, – 2, – 1) in the direction of 2i – j – 2k. 3

7. Attempt the following :


a) The equations to the two lines of regression are 6y = 5x + 90 and 15x = 8y + 130. Find
the means of x and y and the coefficient of correlation. 3
b) In a room, there are three lamp-sockets. A bag contains 6 working and 4 non-working
bulbs. Three bulbs are selected at random and fitted in the sockets. Find the
probability that there will be some light in the room. 3
c) The income distribution of workers in a certain factory was found to be normal with
mean of ₹ 500 and standard deviation of ₹ 50. There were 228 persons above ₹ 600.
How many persons were there in all ? [Given : for SNV z area from z = 0 to z = 2 is
0.4772). 3

8. Attempt the following :


a) In sampling, a large number of parts manufactured by a machine, the number of
defectives in sample of 40 is 2. Out of 1000 such samples how many would be
expected to contain 3 defective parts. 3
b) Fit a straight line to the following data :
x : 1 2 3 4 6 8
y : 2.4 3 3.4 4 5 6 3
c) Find the equations of the lines of regression from the following data. Find also the best
estimate of y when x = 13.
x : 2 4 6 8 12 14
y : 4 2 5 10 11 12 4

9. Attempt the following :


a) There are three computers in a shop and three operators. Each operator on an
average can send 10 messages per hour by e-mail. If messages arrive for being
e-mailed at the rate of 25 per hour. 5
i) What is the probability that all the computers are busy ?
ii) What is the average number of messages waiting to be sent ?
b) Customers arrive at a clinic according to a Poisson process with mean interval of
25 min., the physician needs on an average 20 min. for a patient to examine. 4
i) Find the excepted number of patients at the clinic and in the queue.
ii) Find percentage of patients who are not required to wait.
Set R
___________________
*SLRTX317* SLR-TX – 317
Seat
No.
Set S
S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
APPLIED MATHEMATICS – I

Day and Date : Tuesday, 4-12-2018 Max. Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : 14


1) For binomial distribution mean is 12, variance is 4, then the values of n, p, q are respectively
1 2 2 1 2 1
a) 9, , b) 9, , c) 4, 1 , 1 d) 18, ,
3 3 3 3 2 2 3 3

2) If x is Poisson variate such that p(x = 1) = p(x = 2), then the value of Poisson’s parameter is
a) 0 b) 1 c) 2 d) 3
3) For a certain data, the regression equations are 3x + 2y – 26 = 0 and 6x + y – 31 = 0, then
the coefficient of correlation ‘r’ is
a) 0.5 b) – 0.5 c) 2 d) – 2
4) The normal equations of the curve, y = ax + b are
a) ∑y = na + b∑x, ∑xy = a∑x + b∑x2
b) ∑y = na + b∑x, ∑(x + y) = a∑x + b∑x2
c) ∑y = a∑x + nb, ∑xy = a∑x2 + b∑x
d) ∑y = a∑x + nb, ∑(x + y) = a∑x2 + b∑x
5) The fraction of time the system is busy is
λ µ λ µ
a) b) c) d)
µ λ µ 2
λ2

P.T.O.
SLR-TX – 317 -2- *SLRTX317*
1
6) cos ax is equal to _______________
D + a2
2
x x x
a) x cos ax b) cos ax c) sin ax d) sin ax
2a 2
2a 2a 2
2a

7) The complete solution of (D4 – 2D3 + D2) y = 0 if y = ______________
a) C1 + C2x + C3x2e–x b) C1 + C2x + (C3 + C4x)ex
c) (C1 + C2x)e–x+(C3+ C4x) ex d) (C1 + C2x + C3x2)e–x
8) The Laplace transform of e–2t + sin2t is
1 2 1 2 1 2 1 1
a) + b) + c) + d) + 2
s − 2 s2 + 4 s + 2 s2 − 4 s + 2 s2 + 4 s+2 s +4

 s + s2 
9) The L−1  3  = ________________
 s 

a) t + t2 b) t + 1 c) t2 + 1 d) t – 1
10) If z{f(k)} = F(z), then z{kf(k)} =
dF ( z ) dF ( z ) dF ( z ) − dF ( z )
a) − z b) z c) d)
dz dz dz dz

11) Fourier series of f(x) = 1 – x2 in (– π, π) contains
a) Only sine series b) Only cosine series
c) Both sine and cosine series d) None of these
12) Which of the following functions cannot be expanded in Fourier series in the interval (– d,d) ?
a) ex b) |x| c) cosec x d) x2
13) The magnitude of maximum directional derivative of ϕ = x2yz3 at the point (2, 1, – 1) is
a) 4 11 b) 44 c) 4 d) 40

14) If r = xi + yj + zk and r = r , then the grad r is,

a) r b) r c) r d) 0
r

____________

Set S
*SLRTX317* -3- SLR-TX – 317
Seat
No.
S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
APPLIED MATHEMATICS – I
Day and Date : Tuesday, 4-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 2 and 8 are compulsory and attempt any two


questions from remaining questions of each Section.
2) Figures to the right indicate full marks.
3) Use of calculator is allowed.

SECTION – I

2. a) Solve (D2 + 2D + 1) y = e–xsinx. 3


b) Solve (D4 + 8D2 + 16)y = cosh2x. 3
c) Solve (D3 + 8)y = x4 + 2x+1. 4
OR
x 2
c) Solve y ′′ − y = e (1 + x ) . 4

3. Solve any three of the following : 9



cos 6t − cos 4 t
a) Evaluate ∫ t
dt , by Laplace transform.
0

b) Find L{e3tsin5tsin3t}.

−1  s + 2 

c) Find L  2 .
 s ( s + 3 ) 

  s
d) Find L−1 Cot −1    .
  a
4. a) Find z{c cosαk}, k ≥ 0 where α is real.
k
3

4 , for k < 0


k
b) Find z{f(k)} , where f(k) =  . 3
k
3 , for k ≥ 0
 1 
−1 
c) Find z  3
, z < 5 . 3
 ( z − 5) 
5. a) Find the Fourier series for the function f(x) = ex in the interval (–π, π). 5
b) Find the Half-range cosine series for the function f(x) = C – x in (0, C). 4
Set S
SLR-TX – 317 -4- *SLRTX317*
SECTION – II
6. Attempt the following :

a) Prove that ∇ ⋅  r∇  = .
1 3
3
 r  r4
3

b) Find the unit tangent vector at any point on the curve, x = t2 + 2, y = 4t – 5, z = 2t2 – 6t
where ‘t’ is any variable. Also determine the unit tangent vector at the point t = 2. 3

c) Find directional derivative of ϕ = x2yz + 4xz2 at (1, – 2, – 1) in the direction of 2i – j – 2k. 3

7. Attempt the following :


a) The equations to the two lines of regression are 6y = 5x + 90 and 15x = 8y + 130. Find
the means of x and y and the coefficient of correlation. 3
b) In a room, there are three lamp-sockets. A bag contains 6 working and 4 non-working
bulbs. Three bulbs are selected at random and fitted in the sockets. Find the
probability that there will be some light in the room. 3
c) The income distribution of workers in a certain factory was found to be normal with
mean of ₹ 500 and standard deviation of ₹ 50. There were 228 persons above ₹ 600.
How many persons were there in all ? [Given : for SNV z area from z = 0 to z = 2 is
0.4772). 3

8. Attempt the following :


a) In sampling, a large number of parts manufactured by a machine, the number of
defectives in sample of 40 is 2. Out of 1000 such samples how many would be
expected to contain 3 defective parts. 3
b) Fit a straight line to the following data :
x : 1 2 3 4 6 8
y : 2.4 3 3.4 4 5 6 3
c) Find the equations of the lines of regression from the following data. Find also the best
estimate of y when x = 13.
x : 2 4 6 8 12 14
y : 4 2 5 10 11 12 4

9. Attempt the following :


a) There are three computers in a shop and three operators. Each operator on an
average can send 10 messages per hour by e-mail. If messages arrive for being
e-mailed at the rate of 25 per hour. 5
i) What is the probability that all the computers are busy ?
ii) What is the average number of messages waiting to be sent ?
b) Customers arrive at a clinic according to a Poisson process with mean interval of
25 min., the physician needs on an average 20 min. for a patient to examine. 4
i) Find the excepted number of patients at the clinic and in the queue.
ii) Find percentage of patients who are not required to wait.
Set S
___________________
*SLRTX318* SLR-TX – 318
Seat
No.
Set P
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
discrete mathematical structures
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) If set has 3 elements the number of possible proper subsets are
a) 8 b) 7 c) 3 d) 9
2) Which of the following are symmetric ?
a) R : x + y = 10 b) R : x + 4y = 10
c) R : x is greater than y d) None of the above
3) ¬ (P ∨ ¬ Q) is equivalent to
a) P ∧ ¬ Q b) ¬ P ∧ Q c) ¬ P ∨ Q d) P ∨ Q
4) (P ↓ P) is equivalent to
a) ¬ (P ∨ P) b) ¬ P ∧ ¬ P
c) ¬ P d) All of the above
5) If f : X → Y, the codomain of a function is
a) X b) Subset of X c) Y d) Subset of Y
6) < I, + > is the given algebraic system where I = { 0, 1, 2, 3, 4} < I, + > is
a) Group b) Semigroup c) Monoid d) None of these
7) Permutation is _______________ mapping.
a) One to one b) One to one and onto
c) Onto d) None of the above

P.T.O.
SLR-TX – 318 -2- *SLRTX318*
8) Hasse diagrams are drawn for
a) POSET b) Boolean algebra
c) Lattice d) For all
9) In lattice L, GLB {a, b} is denoted by
a) a + b b) a * b
c) a < b d) none of the above
10) If < G, * > is a group and order of the group is 1 then G set is
a) ∅ b) {e}
c) {∅} d) {e, a}
11) If f : X → Y and g : Y → X then g will be called as inverse of f if
a) f • g = Ix and g • f = Iy b) g • f = Ix and f • g = Ix
c) g • f = Ix and f • g = Iy d) f • g = Iy and g • f = Iy
12) If A = ∅ and B = {a, b, c}, then the value of A × B is
a) {∅} b) ∅
c) {<a, a>, <b, b>, <c,c>} d) None of the above
13) [a] = R (a) = {x ∈ A | aRx } is called
a) Symmetric class b) Antisymmetric class
c) Equivalence class d) Irreflexive class
14) The disjunctive normal form of P ∧ (P → Q) is
a) (P ∨ ¬ P) ∧ (P ∧ Q) b) (P ∨ ¬ P) ∧ (P ∨ Q)
c) P ∧ Q d) (P ∧ ¬ P) ∨ (P ∧ Q)
_________________

Set P
*SLRTX318* -3- SLR-TX – 318
Seat
No.

S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)


Examination, 2018
discrete mathematical structures
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary

SECTION – I

2. Solve any three : (3×4=12)


a) Explain with example matrix and graph representation of relation.
b) Convert the given formula into prefix and suffix form :
A ∨ (¬ B → C) ∧ (D ↔ E).
c) Define maxtermand PCNF and obtain PCNF (P ∧ Q) ∨ (¬ P ∧ R).
d) Draw Hasse diagram of partial ordering such that set with
{<A, B>| A subset of B} on the power set of S = {a, b}.
e) Define Tautological Implication and solve (P ∧ Q) => (P → Q).

3. Solve any one : 8


a) Let A be the set of factors of a particular positive integer m and let ≤ be a
relation ‘divides’ i.e. ≤ = { < x, y> | x∈A ∧ y∈A ∧ (x divides y)}. Write partial
order relation ‘divides’ and draw Hasse diagram for each example.
1) m = 45 2) m = 30 3) m = 28 4) m = 12
b) Explain the following terms :
1) Tautology and contradiction
2) Atomic statement and compound statement
3) Power set
4) Set inclusion and equality of sets.

Set P
SLR-TX – 318 -4- *SLRTX318*

4. Solve the following : 8


a) Obtain PDNF of (P ∧ Q) ∨ (¬ P ∧ R) ∨ (Q ∧ R) without constructing truth table.
b) Obtain PCNF of (P ∧ Q) ∨ (¬ P ∧ R) without constructing truth table.

SECTION – II

5. Solve any three : (3×4=12)


a) Explain with example semigroup and monoid.
b) Define lattice as an algebraic system and explain meet and join
operations.
c) Show that functions f(x) = x3 and g(x) = x1/3 for x ∈ R are inverse of each
other.
d) Let S be a nonempty set and P(S) be its power set. Show that the algebra
<P(S), ∩> is a monoid.
e) Show that identity element in a group is unique.

6. Solve any one :


a) Explain the following terms : 8
1) Complemented lattice.
2) Distributive lattice.
3) Lattice homomorphism.
4) Sub Boolean algebra.
b) Consider the algebraic system <G, *> where G is the set of all non-zero real
numbers and * is the binary operation defined by a * b = ab/4. Show that
<G, *> is an Abelian group.

7. Let L = {0, 1} and lattice <L, ≤ > is given as follows 8

0
1
Draw following lattices.

a) <L2, ≤2> b) <L3, ≤3>.

_____________________

Set P
*SLRTX318* SLR-TX – 318
Seat
No.
Set Q
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
discrete mathematical structures
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Hasse diagrams are drawn for
a) POSET b) Boolean algebra
c) Lattice d) For all
2) In lattice L, GLB {a, b} is denoted by
a) a + b b) a * b
c) a < b d) none of the above
3) If < G, * > is a group and order of the group is 1 then G set is
a) ∅ b) {e}
c) {∅} d) {e, a}
4) If f : X → Y and g : Y → X then g will be called as inverse of f if
a) f • g = Ix and g • f = Iy b) g • f = Ix and f • g = Ix
c) g • f = Ix and f • g = Iy d) f • g = Iy and g • f = Iy

P.T.O.
SLR-TX – 318 -2- *SLRTX318*
5) If A = ∅ and B = {a, b, c}, then the value of A × B is
a) {∅} b) ∅
c) {<a, a>, <b, b>, <c,c>} d) None of the above
6) [a] = R (a) = {x ∈ A | aRx } is called
a) Symmetric class b) Antisymmetric class
c) Equivalence class d) Irreflexive class
7) The disjunctive normal form of P ∧ (P → Q) is
a) (P ∨ ¬ P) ∧ (P ∧ Q) b) (P ∨ ¬ P) ∧ (P ∨ Q)
c) P ∧ Q d) (P ∧ ¬ P) ∨ (P ∧ Q)
8) If set has 3 elements the number of possible proper subsets are
a) 8 b) 7 c) 3 d) 9
9) Which of the following are symmetric ?
a) R : x + y = 10 b) R : x + 4y = 10
c) R : x is greater than y d) None of the above
10) ¬ (P ∨ ¬ Q) is equivalent to
a) P ∧ ¬ Q b) ¬ P ∧ Q c) ¬ P ∨ Q d) P ∨ Q
11) (P ↓ P) is equivalent to
a) ¬ (P ∨ P) b) ¬ P ∧ ¬ P
c) ¬ P d) All of the above
12) If f : X → Y, the codomain of a function is
a) X b) Subset of X c) Y d) Subset of Y
13) < I, + > is the given algebraic system where I = { 0, 1, 2, 3, 4} < I, + > is
a) Group b) Semigroup c) Monoid d) None of these
14) Permutation is _______________ mapping.
a) One to one b) One to one and onto
c) Onto d) None of the above
_________________

Set Q
*SLRTX318* -3- SLR-TX – 318
Seat
No.

S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)


Examination, 2018
discrete mathematical structures
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary

SECTION – I

2. Solve any three : (3×4=12)


a) Explain with example matrix and graph representation of relation.
b) Convert the given formula into prefix and suffix form :
A ∨ (¬ B → C) ∧ (D ↔ E).
c) Define maxtermand PCNF and obtain PCNF (P ∧ Q) ∨ (¬ P ∧ R).
d) Draw Hasse diagram of partial ordering such that set with
{<A, B>| A subset of B} on the power set of S = {a, b}.
e) Define Tautological Implication and solve (P ∧ Q) => (P → Q).

3. Solve any one : 8


a) Let A be the set of factors of a particular positive integer m and let ≤ be a
relation ‘divides’ i.e. ≤ = { < x, y> | x∈A ∧ y∈A ∧ (x divides y)}. Write partial
order relation ‘divides’ and draw Hasse diagram for each example.
1) m = 45 2) m = 30 3) m = 28 4) m = 12
b) Explain the following terms :
1) Tautology and contradiction
2) Atomic statement and compound statement
3) Power set
4) Set inclusion and equality of sets.

Set Q
SLR-TX – 318 -4- *SLRTX318*

4. Solve the following : 8


a) Obtain PDNF of (P ∧ Q) ∨ (¬ P ∧ R) ∨ (Q ∧ R) without constructing truth table.
b) Obtain PCNF of (P ∧ Q) ∨ (¬ P ∧ R) without constructing truth table.

SECTION – II

5. Solve any three : (3×4=12)


a) Explain with example semigroup and monoid.
b) Define lattice as an algebraic system and explain meet and join
operations.
c) Show that functions f(x) = x3 and g(x) = x1/3 for x ∈ R are inverse of each
other.
d) Let S be a nonempty set and P(S) be its power set. Show that the algebra
<P(S), ∩> is a monoid.
e) Show that identity element in a group is unique.

6. Solve any one :


a) Explain the following terms 8
1) Complemented lattice.
2) Distributive lattice.
3) Lattice homomorphism.
4) Sub Boolean algebra.
b) Consider the algebraic system <G, *> where G is the set of all non-zero real
numbers and * is the binary operation defined by a * b = ab/4. Show that
<G, *> is an Abelian group.

7. Let L = {0, 1} and lattice <L, ≤ > is given as follows : 8

0
1
Draw following lattices.

a) <L2, ≤2> b) <L3, ≤3>.

_____________________

Set Q
*SLRTX318* SLR-TX – 318
Seat
No.
Set R
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
discrete mathematical structures
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) If f : X → Y, the codomain of a function is
a) X b) Subset of X c) Y d) Subset of Y
2) < I, + > is the given algebraic system where I = { 0, 1, 2, 3, 4} < I, + > is
a) Group b) Semigroup c) Monoid d) None of these
3) Permutation is _______________ mapping.
a) One to one b) One to one and onto
c) Onto d) None of the above
4) Hasse diagrams are drawn for
a) POSET b) Boolean algebra
c) Lattice d) For all
5) In lattice L, GLB {a, b} is denoted by
a) a + b b) a * b
c) a < b d) none of the above
6) If < G, * > is a group and order of the group is 1 then G set is
a) ∅ b) {e}
c) {∅} d) {e, a}
P.T.O.
SLR-TX – 318 -2- *SLRTX318*
7) If f : X → Y and g : Y → X then g will be called as inverse of f if
a) f • g = Ix and g • f = Iy b) g • f = Ix and f • g = Ix
c) g • f = Ix and f • g = Iy d) f • g = Iy and g • f = Iy
8) If A = ∅ and B = {a, b, c}, then the value of A × B is
a) {∅} b) ∅
c) {<a, a>, <b, b>, <c,c>} d) None of the above
9) [a] = R (a) = {x ∈ A | aRx } is called
a) Symmetric class b) Antisymmetric class
c) Equivalence class d) Irreflexive class
10) The disjunctive normal form of P ∧ (P → Q) is
a) (P ∨ ¬ P) ∧ (P ∧ Q) b) (P ∨ ¬ P) ∧ (P ∨ Q)
c) P ∧ Q d) (P ∧ ¬ P) ∨ (P ∧ Q)
11) If set has 3 elements the number of possible proper subsets are
a) 8 b) 7 c) 3 d) 9
12) Which of the following are symmetric ?
a) R : x + y = 10 b) R : x + 4y = 10
c) R : x is greater than y d) None of the above
13) ¬ (P ∨ ¬ Q) is equivalent to
a) P ∧ ¬ Q b) ¬ P ∧ Q c) ¬ P ∨ Q d) P ∨ Q
14) (P ↓ P) is equivalent to
a) ¬ (P ∨ P) b) ¬ P ∧ ¬ P
c) ¬ P d) All of the above
_________________

Set R
*SLRTX318* -3- SLR-TX – 318
Seat
No.

S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)


Examination, 2018
discrete mathematical structures
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary

SECTION – I

2. Solve any three : (3×4=12)


a) Explain with example matrix and graph representation of relation.
b) Convert the given formula into prefix and suffix form :
A ∨ (¬ B → C) ∧ (D ↔ E).
c) Define maxtermand PCNF and obtain PCNF (P ∧ Q) ∨ (¬ P ∧ R).
d) Draw Hasse diagram of partial ordering such that set with
{<A, B>| A subset of B} on the power set of S = {a, b}.
e) Define Tautological Implication and solve (P ∧ Q) => (P → Q).

3. Solve any one : 8


a) Let A be the set of factors of a particular positive integer m and let ≤ be a
relation ‘divides’ i.e. ≤ = { < x, y> | x∈A ∧ y∈A ∧ (x divides y)}. Write partial
order relation ‘divides’ and draw Hasse diagram for each example.
1) m = 45 2) m = 30 3) m = 28 4) m = 12
b) Explain the following terms :
1) Tautology and contradiction
2) Atomic statement and compound statement
3) Power set
4) Set inclusion and equality of sets.

Set R
SLR-TX – 318 -4- *SLRTX318*

4. Solve the following : 8


a) Obtain PDNF of (P ∧ Q) ∨ (¬ P ∧ R) ∨ (Q ∧ R) without constructing truth table.
b) Obtain PCNF of (P ∧ Q) ∨ (¬ P ∧ R) without constructing truth table.

SECTION – II

5. Solve any three : (3×4=12)


a) Explain with example semigroup and monoid.
b) Define lattice as an algebraic system and explain meet and join
operations.
c) Show that functions f(x) = x3 and g(x) = x1/3 for x ∈ R are inverse of each
other.
d) Let S be a nonempty set and P(S) be its power set. Show that the algebra
<P(S), ∩> is a monoid.
e) Show that identity element in a group is unique.

6. Solve any one :


a) Explain the following terms : 8
1) Complemented lattice.
2) Distributive lattice.
3) Lattice homomorphism.
4) Sub Boolean algebra.
b) Consider the algebraic system <G, *> where G is the set of all non-zero real
numbers and * is the binary operation defined by a * b = ab/4. Show that
<G, *> is an Abelian group.

7. Let L = {0, 1} and lattice <L, ≤ > is given as follows 8

0
1
Draw following lattices.

a) <L2, ≤2> b) <L3, ≤3>.

_____________________

Set R
*SLRTX318* SLR-TX – 318
Seat
No.
Set S
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
discrete mathematical structures
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) If < G, * > is a group and order of the group is 1 then G set is
a) ∅ b) {e}
c) {∅} d) {e, a}
2) If f : X → Y and g : Y → X then g will be called as inverse of f if
a) f • g = Ix and g • f = Iy b) g • f = Ix and f • g = Ix
c) g • f = Ix and f • g = Iy d) f • g = Iy and g • f = Iy
3) If A = ∅ and B = {a, b, c}, then the value of A × B is
a) {∅} b) ∅
c) {<a, a>, <b, b>, <c,c>} d) None of the above
4) [a] = R (a) = {x ∈ A | aRx } is called
a) Symmetric class b) Antisymmetric class
c) Equivalence class d) Irreflexive class
5) The disjunctive normal form of P ∧ (P → Q) is
a) (P ∨ ¬ P) ∧ (P ∧ Q) b) (P ∨ ¬ P) ∧ (P ∨ Q)
c) P ∧ Q d) (P ∧ ¬ P) ∨ (P ∧ Q)
6) If set has 3 elements the number of possible proper subsets are
a) 8 b) 7 c) 3 d) 9
P.T.O.
SLR-TX – 318 -2- *SLRTX318*

7) Which of the following are symmetric ?


a) R : x + y = 10 b) R : x + 4y = 10
c) R : x is greater than y d) None of the above
8) ¬ (P ∨ ¬ Q) is equivalent to
a) P ∧ ¬ Q b) ¬ P ∧ Q c) ¬ P ∨ Q d) P ∨ Q
9) (P ↓ P) is equivalent to
a) ¬ (P ∨ P) b) ¬ P ∧ ¬ P
c) ¬ P d) All of the above
10) If f : X → Y, the codomain of a function is
a) X b) Subset of X c) Y d) Subset of Y
11) < I, + > is the given algebraic system where I = { 0, 1, 2, 3, 4} < I, + > is
a) Group b) Semigroup c) Monoid d) None of these
12) Permutation is _______________ mapping.
a) One to one b) One to one and onto
c) Onto d) None of the above
13) Hasse diagrams are drawn for
a) POSET b) Boolean algebra
c) Lattice d) For all
14) In lattice L, GLB {a, b} is denoted by
a) a + b b) a * b
c) a < b d) none of the above
_________________

Set S
*SLRTX318* -3- SLR-TX – 318
Seat
No.

S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)


Examination, 2018
discrete mathematical structures
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary

SECTION – I

2. Solve any three : (3×4=12)


a) Explain with example matrix and graph representation of relation.
b) Convert the given formula into prefix and suffix form :
A ∨ (¬ B → C) ∧ (D ↔ E).
c) Define maxtermand PCNF and obtain PCNF (P ∧ Q) ∨ (¬ P ∧ R).
d) Draw Hasse diagram of partial ordering such that set with
{<A, B>| A subset of B} on the power set of S = {a, b}.
e) Define Tautological Implication and solve (P ∧ Q) => (P → Q).

3. Solve any one : 8


a) Let A be the set of factors of a particular positive integer m and let ≤ be a
relation ‘divides’ i.e. ≤ = { < x, y> | x∈A ∧ y∈A ∧ (x divides y)}. Write partial
order relation ‘divides’ and draw Hasse diagram for each example.
1) m = 45 2) m = 30 3) m = 28 4) m = 12
b) Explain the following terms :
1) Tautology and contradiction
2) Atomic statement and compound statement
3) Power set
4) Set inclusion and equality of sets.

Set S
SLR-TX – 318 -4- *SLRTX318*

4. Solve the following : 8


a) Obtain PDNF of (P ∧ Q) ∨ (¬ P ∧ R) ∨ (Q ∧ R) without constructing truth table.
b) Obtain PCNF of (P ∧ Q) ∨ (¬ P ∧ R) without constructing truth table.

SECTION – II

5. Solve any three : (3×4=12)


a) Explain with example semigroup and monoid.
b) Define lattice as an algebraic system and explain meet and join
operations.
c) Show that functions f(x) = x3 and g(x) = x1/3 for x ∈ R are inverse of each
other.
d) Let S be a nonempty set and P(S) be its power set. Show that the algebra
<P(S), ∩> is a monoid.
e) Show that identity element in a group is unique.

6. Solve any one :


a) Explain the following terms : 8
1) Complemented lattice.
2) Distributive lattice.
3) Lattice homomorphism.
4) Sub Boolean algebra.
b) Consider the algebraic system <G, *> where G is the set of all non-zero real
numbers and * is the binary operation defined by a * b = ab/4. Show that
<G, *> is an Abelian group.

7. Let L = {0, 1} and lattice <L, ≤ > is given as follows 8

0
1
Draw following lattices.

a) <L2, ≤2> b) <L3, ≤3>.

_____________________

Set S
*SLRTX319* SLR-TX – 319

Seat
No.
Set P

S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018


Advanced C Concept
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) All recursive functions can be implemented iteratively.
A) True B) False
2) Which of following sorting method is slower ?
A) Quick B) Shell C) Heap D) Bubble
3) The library function used to find the last occurrence of character in string is
A) strchar ( ) B) strnstr ( )
C) strrstr ( ) D) laststr ( )
4) Recursive function will be executed in a
A) First in first out order B) Last in first out order
C) Both (A) and (B) D) None
5) The average search time of hashing with linear hashing probing will be less if
A) Load factor is far less than 1 B) Load factor is equal to 1
C) Load factor is greater than 1 D) All
6) Which of the following is not a valid variable name declaration ?
A) float PI = 3.14 B) double PI = 3.14
C) int PI = 3.14 D) #define PI 3.14

P.T.O.
SLR-TX – 319 -2- *SLRTX319*

7) What would happen if you create a file stdio.h and use #include “stdio.h” ?
A) The predefined library file will be selected
B) The user-defined library file will be selected
C) Both the files will be included
D) The compiler won’t accept the program
8) Register storage class can be specified to global variables.
A) True B) False
C) Depends on the compiler D) Depends on the standard
9) In function free(p), p is a
A) int
B) pointer returned by malloc( )
C) pointer returned by calloc( )
D) pointer returned by malloc( ) and calloc( )
10) Automatic variables are allocated memory in
A) Heap B) Data segment
C) Code segment D) Stack
11) The variable declaration with no storage class specified is by default
A) Auto B) Extern C) Static D) Register
12) What is the output of this C code ?
#include <stdio.h>
void main ( )
{
char *s = “hello”;
char *p = s;
printf (“%c\t%c”, *(p + 3), s[1]);
}
A) h e B) I I C) I o D) I e
13) When fopen( ) is not able to open a file, it returns
A) EOF B) NULL
C) Runtime error D) Compiler Dependent
14) _________ sort is also known as diminishing increment sort.
A) Quick B) Heap C) Shell D) None of these

______________

Set P
*SLRTX319* -3- SLR-TX – 319
Seat
No.

S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018


Advanced C Concept
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.
2. Attempt any four : (4�4=16)
1) Write a short note dynamic memory allocation.
2) What are the advantages and disadvantages of recursive function ?
3) Explain pointer in details.
4) Explain storage classes.
5) Explain and list out different string operation.
3. Attempt any one : (6�1=6)
1) Write C program to perform
i) Count the length string ii) Copy the string from one to another
OR
2) Write a C program to implement concept of recursion for the following :
a) Factorial of given number b) Fibonacci series
4. Explain array of pointer by considering suitable example. (6�1=6)
5. Attempt any four : (4�4=16)
1) Explain “omega” notation.
2) List out and explain different file operation in short.
3) Write a short note on space complexity.
4) Explain and list out different file operation.
5) What is double hashing ?
6. Attempt any one : (6�1=6)
1) Write a C program to implement concept of Bubble sort by considering
suitable example.
OR
2) Write a C program to implement concept of Merge sort.
7. Compare different hashing function. (6�1=6)
_____________________

Set P
Set P
*SLRTX319* SLR-TX – 319

Seat
No.
Set Q

S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018


Advanced C Concept
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) Register storage class can be specified to global variables.
A) True
B) False
C) Depends on the compiler
D) Depends on the standard
2) In function free(p), p is a
A) int
B) pointer returned by malloc( )
C) pointer returned by calloc( )
D) pointer returned by malloc( ) and calloc( )
3) Automatic variables are allocated memory in
A) Heap B) Data segment
C) Code segment D) Stack
4) The variable declaration with no storage class specified is by default
A) Auto B) Extern
C) Static D) Register

P.T.O.
SLR-TX – 319 -2- *SLRTX319*

5) What is the output of this C code ?


#include <stdio.h>
void main ( )
{
char *s = “hello”;
char *p = s;
printf (“%c\t%c”, *(p + 3), s[1]);
}
A) h e B) I I C) I o D) I e
6) When fopen( ) is not able to open a file, it returns
A) EOF B) NULL
C) Runtime error D) Compiler Dependent
7) _________ sort is also known as diminishing increment sort.
A) Quick B) Heap C) Shell D) None of these
8) All recursive functions can be implemented iteratively.
A) True B) False
9) Which of following sorting method is slower ?
A) Quick B) Shell C) Heap D) Bubble
10) The library function used to find the last occurrence of character in string is
A) strchar ( ) B) strnstr ( ) C) strrstr ( ) D) laststr ( )
11) Recursive function will be executed in a
A) First in first out order B) Last in first out order
C) Both (A) and (B) D) None
12) The average search time of hashing with linear hashing probing will be less if
A) Load factor is far less than 1 B) Load factor is equal to 1
C) Load factor is greater than 1 D) All
13) Which of the following is not a valid variable name declaration ?
A) float PI = 3.14 B) double PI = 3.14
C) int PI = 3.14 D) #define PI 3.14
14) What would happen if you create a file stdio.h and use #include “stdio.h” ?
A) The predefined library file will be selected
B) The user-defined library file will be selected
C) Both the files will be included
D) The compiler won’t accept the program
______________

Set Q
*SLRTX319* -3- SLR-TX – 319
Seat
No.

S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018


Advanced C Concept
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.
2. Attempt any four : (4�4=16)
1) Write a short note dynamic memory allocation.
2) What are the advantages and disadvantages of recursive function ?
3) Explain pointer in details.
4) Explain storage classes.
5) Explain and list out different string operation.
3. Attempt any one : (6�1=6)
1) Write C program to perform
i) Count the length string ii) Copy the string from one to another
OR
2) Write a C program to implement concept of recursion for the following :
a) Factorial of given number b) Fibonacci series
4. Explain array of pointer by considering suitable example. (6�1=6)
5. Attempt any four : (4�4=16)
1) Explain “omega” notation.
2) List out and explain different file operation in short.
3) Write a short note on space complexity.
4) Explain and list out different file operation.
5) What is double hashing ?
6. Attempt any one : (6�1=6)
1) Write a C program to implement concept of Bubble sort by considering
suitable example.
OR
2) Write a C program to implement concept of Merge sort.
7. Compare different hashing function. (6�1=6)
_____________________

Set Q
Set Q
*SLRTX319* SLR-TX – 319

Seat
No.
Set R

S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018


Advanced C Concept
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) The average search time of hashing with linear hashing probing will be less if
A) Load factor is far less than 1 B) Load factor is equal to 1
C) Load factor is greater than 1 D) All
2) Which of the following is not a valid variable name declaration ?
A) float PI = 3.14 B) double PI = 3.14
C) int PI = 3.14 D) #define PI 3.14
3) What would happen if you create a file stdio.h and use #include “stdio.h” ?
A) The predefined library file will be selected
B) The user-defined library file will be selected
C) Both the files will be included
D) The compiler won’t accept the program
4) Register storage class can be specified to global variables.
A) True B) False
C) Depends on the compiler D) Depends on the standard
5) In function free(p), p is a
A) int
B) pointer returned by malloc( )
C) pointer returned by calloc( )
D) pointer returned by malloc( ) and calloc( )
P.T.O.
SLR-TX – 319 -2- *SLRTX319*

6) Automatic variables are allocated memory in


A) Heap B) Data segment
C) Code segment D) Stack
7) The variable declaration with no storage class specified is by default
A) Auto B) Extern C) Static D) Register
8) What is the output of this C code ?
#include <stdio.h>
void main ( )
{
char *s = “hello”;
char *p = s;
printf (“%c\t%c”, *(p + 3), s[1]);
}
A) h e B) I I C) I o D) I e
9) When fopen( ) is not able to open a file, it returns
A) EOF B) NULL
C) Runtime error D) Compiler Dependent
10) _________ sort is also known as diminishing increment sort.
A) Quick B) Heap C) Shell D) None of these
11) All recursive functions can be implemented iteratively.
A) True B) False
12) Which of following sorting method is slower ?
A) Quick B) Shell C) Heap D) Bubble
13) The library function used to find the last occurrence of character in string is
A) strchar ( ) B) strnstr ( )
C) strrstr ( ) D) laststr ( )
14) Recursive function will be executed in a
A) First in first out order B) Last in first out order
C) Both (A) and (B) D) None

______________

Set R
*SLRTX319* -3- SLR-TX – 319
Seat
No.

S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018


Advanced C Concept
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.
2. Attempt any four : (4�4=16)
1) Write a short note dynamic memory allocation.
2) What are the advantages and disadvantages of recursive function ?
3) Explain pointer in details.
4) Explain storage classes.
5) Explain and list out different string operation.
3. Attempt any one : (6�1=6)
1) Write C program to perform
i) Count the length string ii) Copy the string from one to another
OR
2) Write a C program to implement concept of recursion for the following :
a) Factorial of given number b) Fibonacci series
4. Explain array of pointer by considering suitable example. (6�1=6)
5. Attempt any four : (4�4=16)
1) Explain “omega” notation.
2) List out and explain different file operation in short.
3) Write a short note on space complexity.
4) Explain and list out different file operation.
5) What is double hashing ?
6. Attempt any one : (6�1=6)
1) Write a C program to implement concept of Bubble sort by considering
suitable example.
OR
2) Write a C program to implement concept of Merge sort.
7. Compare different hashing function. (6�1=6)
_____________________

Set R
Set R
*SLRTX319* SLR-TX – 319

Seat
No.
Set S

S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018


Advanced C Concept
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) Automatic variables are allocated memory in
A) Heap B) Data segment
C) Code segment D) Stack
2) The variable declaration with no storage class specified is by default
A) Auto B) Extern C) Static D) Register
3) What is the output of this C code ?
#include <stdio.h>
void main ( )
{
char *s = “hello”;
char *p = s;
printf (“%c\t%c”, *(p + 3), s[1]);
}
A) h e B) I I C) I o D) I e
4) When fopen( ) is not able to open a file, it returns
A) EOF B) NULL
C) Runtime error D) Compiler Dependent
P.T.O.
SLR-TX – 319 -2- *SLRTX319*

5) _________ sort is also known as diminishing increment sort.


A) Quick B) Heap C) Shell D) None of these
6) All recursive functions can be implemented iteratively.
A) True B) False
7) Which of following sorting method is slower ?
A) Quick B) Shell C) Heap D) Bubble
8) The library function used to find the last occurrence of character in string is
A) strchar ( ) B) strnstr ( )
C) strrstr ( ) D) laststr ( )
9) Recursive function will be executed in a
A) First in first out order B) Last in first out order
C) Both (A) and (B) D) None
10) The average search time of hashing with linear hashing probing will be less if
A) Load factor is far less than 1 B) Load factor is equal to 1
C) Load factor is greater than 1 D) All
11) Which of the following is not a valid variable name declaration ?
A) float PI = 3.14 B) double PI = 3.14
C) int PI = 3.14 D) #define PI 3.14
12) What would happen if you create a file stdio.h and use #include “stdio.h” ?
A) The predefined library file will be selected
B) The user-defined library file will be selected
C) Both the files will be included
D) The compiler won’t accept the program
13) Register storage class can be specified to global variables.
A) True B) False
C) Depends on the compiler D) Depends on the standard
14) In function free(p), p is a
A) int
B) pointer returned by malloc( )
C) pointer returned by calloc( )
D) pointer returned by malloc( ) and calloc( )

______________

Set S
*SLRTX319* -3- SLR-TX – 319
Seat
No.

S.E. (CSE) (Part – I) (Old CGPA) Examination, 2018


Advanced C Concept
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.
2. Attempt any four : (4�4=16)
1) Write a short note dynamic memory allocation.
2) What are the advantages and disadvantages of recursive function ?
3) Explain pointer in details.
4) Explain storage classes.
5) Explain and list out different string operation.
3. Attempt any one : (6�1=6)
1) Write C program to perform
i) Count the length string ii) Copy the string from one to another
OR
2) Write a C program to implement concept of recursion for the following :
a) Factorial of given number b) Fibonacci series
4. Explain array of pointer by considering suitable example. (6�1=6)
5. Attempt any four : (4�4=16)
1) Explain “omega” notation.
2) List out and explain different file operation in short.
3) Write a short note on space complexity.
4) Explain and list out different file operation.
5) What is double hashing ?
6. Attempt any one : (6�1=6)
1) Write a C program to implement concept of Bubble sort by considering
suitable example.
OR
2) Write a C program to implement concept of Merge sort.
7. Compare different hashing function. (6�1=6)
_____________________

Set S
Set S
*SLRTX320* SLR-TX – 320
Seat
No.
Set P
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes


in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14
1. Choose correct answer. (14×1=14)
1) The output of Ex-NOR gate is 1. Find out correct combination of inputs.
a) 1, 0 b) 0, 1 c) 0, 0 d) both a) and b)
2) What is minimum number of invertors required to get the expression,
Y = AB′C + A′BC + A′B′C ?
a) 1 b) 2 c) 3 d) 4
3) (23.6)10 = (?)2
a) 11111.10011 b) 10111.10011
c) 11111.10111 d) 10111.10111
4) In JK flip flop if initial output is 1 and next output is also 1 then inputs J and
K will have values
a) J = K = 0 b) J = 0, K = 1 c) J = 1, K = 0 d) None of the above
5) Race around condition can be removed using _______ flip flop.
a) MS b) SR c) modified SR d) all of these
6) When input R and S are complement of each other then it is called as
______ flip flop.
a) Clocked RS b) Clocked SR c) D d) T

P.T.O.
SLR-TX – 320 -2- *SLRTX320*
7) NAND gate is equivalent to ________ gate.
a) NOR b) AND followed by NOT
c) Bubbled OR d) Both b) and c)
8) In VHDL, which object/s is/are used to connect entities together for the
model formation ?
a) Constant b) Variable c) Signal d) All of the above
9) If the number of n selected input lines is equal to 2m then it requires _______
select lines.
a) 2 b) m c) n d) None
10) A demultiplexer has
a) one data input and a number of selection inputs, and they have several
outputs
b) one input and one output
c) several inputs and several outputs
d) several inputs and one output
11) In M×N memory chip, what is M ?
a) Number of location b) Number of bits in given data
c) Number of address lines d) None of above
12) Which among the following is pre-defined in the standard package as
one-dimensional array type comprising each element of BIT type ?
a) Bit type b) Bit_vector type
c) Boolean type d) All of the above
13) Among the VHDL features, which language statements are executed at the
same time in parallel flow ?
a) Concurrent b) Sequential c) Net-list d) Test-bench
14) The storage element for a static RAM is the
a) Diode b) Capacitor c) Resistor d) Flip-flop
____________

Set P
*SLRTX320* -3- SLR-TX – 320
Seat
No.
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks.

SECTION – I

2. Attempt any three : (3×4=12)


a) Design full adder.
b) Explain minterm, maxterm and relationship between them.
c) Explain different techniques to simplify the boolean expression.
d) Perform (58 – 68) using 2’s complement arithmetic.

3. What is an excitation table ? Draw excitation table for SR and JK flip flop. (8×1=8)
OR
Design Mod 10 counter using JK flip flop.

4. Design circuit using NAND gates only for the expression


Y = Σm (2, 4, 8, 10) + d (0, 6, 7). 8

SECTION – II

5. Solve any three : (4×3=12)


a) Implement of full adder using 4:1 multiplexer.
b) Obtain a 16 × 8 memory using 16 × 4 memory ICs.
c) Write VHDL code for T flip flop.
d) Implement 16:1 multiplexer using 4:1 multiplexer.

Set P
SLR-TX – 320 -4- *SLRTX320*
6. Solve any two : (2×8=16)
a) What is Multiplexer ? Implement the following expression using 8:1 MUX
f (A, B, C, D) = Σm (0, 2, 3, 7, 13, 14).
b) What is De multiplexer ? What is the difference between a demultiplexer
and a decoder with example ?
c) Write VHDL code for the circuit shown below

______________

Set P
*SLRTX320* SLR-TX – 320
Seat
No.
Set P
Q

S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)


Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes


in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14
1. Choose correct answer. (14×1=14)
1) In VHDL, which object/s is/are used to connect entities together for the
model formation ?
a) Constant b) Variable
c) Signal d) All of the above
2) If the number of n selected input lines is equal to 2m then it requires _______
select lines.
a) 2 b) m c) n d) None
3) A demultiplexer has
a) one data input and a number of selection inputs, and they have several
outputs
b) one input and one output
c) several inputs and several outputs
d) several inputs and one output
4) In M×N memory chip, what is M ?
a) Number of location b) Number of bits in given data
c) Number of address lines d) None of above

P.T.O.
SLR-TX – 320 -2- *SLRTX320*
5) Which among the following is pre-defined in the standard package as
one-dimensional array type comprising each element of BIT type ?
a) Bit type b) Bit_vector type
c) Boolean type d) All of the above
6) Among the VHDL features, which language statements are executed at the
same time in parallel flow ?
a) Concurrent b) Sequential c) Net-list d) Test-bench
7) The storage element for a static RAM is the
a) Diode b) Capacitor c) Resistor d) Flip-flop
8) The output of Ex-NOR gate is 1. Find out correct combination of inputs.
a) 1, 0 b) 0, 1 c) 0, 0 d) both a) and b)
9) What is minimum number of invertors required to get the expression,
Y = AB′C + A′BC + A′B′C ?
a) 1 b) 2 c) 3 d) 4
10) (23.6)10 = (?)2
a) 11111.10011 b) 10111.10011
c) 11111.10111 d) 10111.10111
11) In JK flip flop if initial output is 1 and next output is also 1 then inputs J and
K will have values
a) J = K = 0 b) J = 0, K = 1 c) J = 1, K = 0 d) None of the above
12) Race around condition can be removed using _______ flip flop.
a) MS b) SR c) modified SR d) all of these
13) When input R and S are complement of each other then it is called as
______ flip flop.
a) Clocked RS b) Clocked SR c) D d) T
14) NAND gate is equivalent to ________ gate.
a) NOR b) AND followed by NOT
c) Bubbled OR d) Both b) and c)
____________

Set Q
*SLRTX320* -3- SLR-TX – 320
Seat
No.
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks.

SECTION – I

2. Attempt any three : (3×4=12)


a) Design full adder.
b) Explain minterm, maxterm and relationship between them.
c) Explain different techniques to simplify the boolean expression.
d) Perform (58 – 68) using 2’s complement arithmetic.

3. What is an excitation table ? Draw excitation table for SR and JK flip flop. (8×1=8)
OR
Design Mod 10 counter using JK flip flop.

4. Design circuit using NAND gates only for the expression


Y = Σm (2, 4, 8, 10) + d (0, 6, 7). 8

SECTION – II

5. Solve any three : (4×3=12)


a) Implement of full adder using 4:1 multiplexer.
b) Obtain a 16 × 8 memory using 16 × 4 memory ICs.
c) Write VHDL code for T flip flop.
d) Implement 16:1 multiplexer using 4:1 multiplexer.

Set Q
SLR-TX – 320 -4- *SLRTX320*
6. Solve any two : (2×8=16)
a) What is Multiplexer ? Implement the following expression using 8:1 MUX
f (A, B, C, D) = Σm (0, 2, 3, 7, 13, 14).
b) What is De multiplexer ? What is the difference between a demultiplexer
and a decoder with example ?
c) Write VHDL code for the circuit shown below

______________

Set Q
*SLRTX320* SLR-TX – 320
Seat
No.
Set P
R

S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)


Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes


in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14
1. Choose correct answer. (14×1=14)
1) Race around condition can be removed using _______ flip flop.
a) MS b) SR
c) modified SR d) all of these
2) When input R and S are complement of each other then it is called as
______ flip flop.
a) Clocked RS b) Clocked SR c) D d) T
3) NAND gate is equivalent to ________ gate.
a) NOR b) AND followed by NOT
c) Bubbled OR d) Both b) and c)
4) In VHDL, which object/s is/are used to connect entities together for the
model formation ?
a) Constant b) Variable
c) Signal d) All of the above
5) If the number of n selected input lines is equal to 2m then it requires _______
select lines.
a) 2 b) m c) n d) None

P.T.O.
SLR-TX – 320 -2- *SLRTX320*
6) A demultiplexer has
a) one data input and a number of selection inputs, and they have several
outputs
b) one input and one output
c) several inputs and several outputs
d) several inputs and one output
7) In M×N memory chip, what is M ?
a) Number of location b) Number of bits in given data
c) Number of address lines d) None of above
8) Which among the following is pre-defined in the standard package as
one-dimensional array type comprising each element of BIT type ?
a) Bit type b) Bit_vector type
c) Boolean type d) All of the above
9) Among the VHDL features, which language statements are executed at the
same time in parallel flow ?
a) Concurrent b) Sequential c) Net-list d) Test-bench
10) The storage element for a static RAM is the
a) Diode b) Capacitor c) Resistor d) Flip-flop
11) The output of Ex-NOR gate is 1. Find out correct combination of inputs.
a) 1, 0 b) 0, 1 c) 0, 0 d) both a) and b)
12) What is minimum number of invertors required to get the expression,
Y = AB′C + A′BC + A′B′C ?
a) 1 b) 2 c) 3 d) 4
13) (23.6)10 = (?)2
a) 11111.10011 b) 10111.10011
c) 11111.10111 d) 10111.10111
14) In JK flip flop if initial output is 1 and next output is also 1 then inputs J and
K will have values
a) J = K = 0 b) J = 0, K = 1 c) J = 1, K = 0 d) None of the above

____________

Set R
*SLRTX320* -3- SLR-TX – 320
Seat
No.
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks.

SECTION – I

2. Attempt any three : (3×4=12)


a) Design full adder.
b) Explain minterm, maxterm and relationship between them.
c) Explain different techniques to simplify the boolean expression.
d) Perform (58 – 68) using 2’s complement arithmetic.

3. What is an excitation table ? Draw excitation table for SR and JK flip flop. (8×1=8)
OR
Design Mod 10 counter using JK flip flop.

4. Design circuit using NAND gates only for the expression


Y = Σm (2, 4, 8, 10) + d (0, 6, 7). 8

SECTION – II

5. Solve any three : (4×3=12)


a) Implement of full adder using 4:1 multiplexer.
b) Obtain a 16 × 8 memory using 16 × 4 memory ICs.
c) Write VHDL code for T flip flop.
d) Implement 16:1 multiplexer using 4:1 multiplexer.

Set R
SLR-TX – 320 -4- *SLRTX320*
6. Solve any two : (2×8=16)
a) What is Multiplexer ? Implement the following expression using 8:1 MUX
f (A, B, C, D) = Σm (0, 2, 3, 7, 13, 14).
b) What is De multiplexer ? What is the difference between a demultiplexer
and a decoder with example ?
c) Write VHDL code for the circuit shown below

______________

Set R
*SLRTX320* SLR-TX – 320
Seat
No.
Set P
S

S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)


Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes


in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14
1. Choose correct answer. (14×1=14)
1) A demultiplexer has
a) one data input and a number of selection inputs, and they have several
outputs
b) one input and one output
c) several inputs and several outputs
d) several inputs and one output
2) In M×N memory chip, what is M ?
a) Number of location b) Number of bits in given data
c) Number of address lines d) None of above
3) Which among the following is pre-defined in the standard package as
one-dimensional array type comprising each element of BIT type ?
a) Bit type b) Bit_vector type
c) Boolean type d) All of the above
4) Among the VHDL features, which language statements are executed at the
same time in parallel flow ?
a) Concurrent b) Sequential
c) Net-list d) Test-bench
P.T.O.
SLR-TX – 320 -2- *SLRTX320*
5) The storage element for a static RAM is the
a) Diode b) Capacitor c) Resistor d) Flip-flop
6) The output of Ex-NOR gate is 1. Find out correct combination of inputs.
a) 1, 0 b) 0, 1 c) 0, 0 d) both a) and b)
7) What is minimum number of invertors required to get the expression,
Y = AB′C + A′BC + A′B′C ?
a) 1 b) 2 c) 3 d) 4
8) (23.6)10 = (?)2
a) 11111.10011 b) 10111.10011
c) 11111.10111 d) 10111.10111
9) In JK flip flop if initial output is 1 and next output is also 1 then inputs J and
K will have values
a) J = K = 0 b) J = 0, K = 1 c) J = 1, K = 0 d) None of the above
10) Race around condition can be removed using _______ flip flop.
a) MS b) SR c) modified SR d) all of these
11) When input R and S are complement of each other then it is called as
______ flip flop.
a) Clocked RS b) Clocked SR c) D d) T
12) NAND gate is equivalent to ________ gate.
a) NOR b) AND followed by NOT
c) Bubbled OR d) Both b) and c)
13) In VHDL, which object/s is/are used to connect entities together for the
model formation ?
a) Constant b) Variable c) Signal d) All of the above
14) If the number of n selected input lines is equal to 2m then it requires _______
select lines.
a) 2 b) m c) n d) None
____________

Set S
*SLRTX320* -3- SLR-TX – 320
Seat
No.
S.E. (Computer Science and Engineering) (Part – I) (Old CGPA)
Examination, 2018
Digital Techniques
Day and Date : Tuesday, 11-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to right indicate full marks.

SECTION – I

2. Attempt any three : (3×4=12)


a) Design full adder.
b) Explain minterm, maxterm and relationship between them.
c) Explain different techniques to simplify the boolean expression.
d) Perform (58 – 68) using 2’s complement arithmetic.

3. What is an excitation table ? Draw excitation table for SR and JK flip flop. (8×1=8)
OR
Design Mod 10 counter using JK flip flop.

4. Design circuit using NAND gates only for the expression


Y = Σm (2, 4, 8, 10) + d (0, 6, 7). 8

SECTION – II

5. Solve any three : (4×3=12)


a) Implement of full adder using 4:1 multiplexer.
b) Obtain a 16 × 8 memory using 16 × 4 memory ICs.
c) Write VHDL code for T flip flop.
d) Implement 16:1 multiplexer using 4:1 multiplexer.

Set S
SLR-TX – 320 -4- *SLRTX320*
6. Solve any two : (2×8=16)
a) What is Multiplexer ? Implement the following expression using 8:1 MUX
f (A, B, C, D) = Σm (0, 2, 3, 7, 13, 14).
b) What is De multiplexer ? What is the difference between a demultiplexer
and a decoder with example ?
c) Write VHDL code for the circuit shown below

______________

Set S
*SLRTX321* SLR-TX – 321

Seat
No.
Set P
S.E. (Computer Science and Engineering) (Part – I) (Old – CGPA)
Examination, 2018
computer Graphics
Day and Date : Thursday, 13-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) All the questions are compulsory.
4) Figures to the right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative : (14×1=14)


1) The amount of light emitted by the phosphor coating depends on the
a) Number of electrons striking the screen
b) Speed of electrons striking the screen
c) Distance from the cathode to the screen
d) None of above
2) Refreshing is not needed in DVST because of the presence of
a) Primary gun b) Flood gun
c) Focusing anode d) Control grid
3) In __________ algorithm initial pixel must be provided by user.
a) Edge fill b) Edge flag c) Seed fill d) Fence fill
4) The transformation in which an object is moved in a minimum distance path
from one position to another is called
a) Rotation b) Replacement
c) Scaling d) Translation

P.T.O.
SLR-TX – 321 -2- *SLRTX321*

5) Two dimensional color model are


a) RGB and CMYK b) RBG and CYMK
c) RGB and CMKY d) None
6) Which technique of color CRT is used for production of realistic image ?
a) Beam penetration b) Shadow mask
c) Both a) and b) d) None of above
7) The transformation in which an object is moved from one position to another
in circular path around a specified pivot point is called
a) Scaling b) Shearing c) Rotation d) Translation
8) The process of extracting a portion of a database or a picture inside or
outside a specified region are called
a) Transformation b) Projection c) Mapping d) Clipping
9) A quad-tree is a data structure which is used for graphical representation of
a) 2D digital picture or object b) 3D picture or object
c) Both a) and b) d) None of these
10) A method used to test lines for total clipping is equivalent to the
a) logical XOR b) logical AND c) logical OR d) both a and b
11) The algorithm of hidden surface are
a) Object-space method b) Image-space method
c) Both a) and b) d) None of these
12) The region code of a point within the window is
a) 1111 b) 1000 c) 0001 d) 0000
13) A Bezier curve is a polynomial of degree__________ the no. of control
points used.
a) One less than b) One more than
c) Two less than d) Two more than
14) ______and depth buffer are used in Z- buffer algorithm.
a) Data buffer b) Frame buffer
c) Display buffer d) None

______________

Set P
*SLRTX321* -3- SLR-TX – 321
Seat
No.

S.E. (Computer Science and Engineering) (Part – I) (Old – CGPA)


Examination, 2018
computer Graphics
Day and Date : Thursday, 13-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All the questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three (Each carries 4 marks) : 12


a) What is RLE ? Explain in detail with its advantages and disadvantages.
b) Explain DDA line drawing algorithm.
c) Explain Reflection through an arbitrary line in 2D.
d) Differentiate between raster scan display and random scan display.

3. Explain below 3D transformation with its matrices and diagram 8


a) Translation
b) Scaling
c) Rotation.
OR

Illustrate and draw the flowchart of Bresenham’s circle algorithm by considering


the origin centered circle of radius 6. 8

4. Consider the rectangle with co-ordinate A(2, 2), B(5, 2), C(5, 4) and D(2, 4)
perform the following combined transformation.
a) Translate the object with 3 units in X direction as well as 3 units in Y
direction.
b) Scale the object by scaling factor x = 2 and y = 2.
c) Reflect the object through the line y = x.   8
Set P
SLR-TX – 321 -4- *SLRTX321*

SECTION – II

5. Solve any three (Each carries 4 marks) : 12


a) Explain midpoint sub division algorithm in detail.
b) Explain display file compilation in detail.
c) Explain non parametric curve representation.
d) Write a short note on image and its applications.

6. Explain in detail Warnock algorithm. Also draw quadtree data structure. 8


OR

Explain in detail Cohen-Sutherland line clipping algorithm. 8

7. Explain antialising and halftoning techniques in detail. 8

_____________________

Set P
*SLRTX321* SLR-TX – 321

Seat
No.
Set Q
S.E. (Computer Science and Engineering) (Part – I) (Old – CGPA)
Examination, 2018
computer Graphics
Day and Date : Thursday, 13-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) All the questions are compulsory.
4) Figures to the right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative : (14×1=14)


1) The process of extracting a portion of a database or a picture inside or
outside a specified region are called
a) Transformation b) Projection c) Mapping d) Clipping
2) A quad-tree is a data structure which is used for graphical representation of
a) 2D digital picture or object b) 3D picture or object
c) Both a) and b) d) None of these
3) A method used to test lines for total clipping is equivalent to the
a) logical XOR b) logical AND c) logical OR d) both a and b
4) The algorithm of hidden surface are
a) Object-space method b) Image-space method
c) Both a) and b) d) None of these
5) The region code of a point within the window is
a) 1111 b) 1000 c) 0001 d) 0000

P.T.O.
SLR-TX – 321 -2- *SLRTX321*

6) A Bezier curve is a polynomial of degree__________ the no. of control


points used.
a) One less than b) One more than
c) Two less than d) Two more than
7) ______and depth buffer are used in Z- buffer algorithm.
a) Data buffer b) Frame buffer
c) Display buffer d) None
8) The amount of light emitted by the phosphor coating depends on the
a) Number of electrons striking the screen
b) Speed of electrons striking the screen
c) Distance from the cathode to the screen
d) None of above
9) Refreshing is not needed in DVST because of the presence of
a) Primary gun b) Flood gun
c) Focusing anode d) Control grid
10) In __________ algorithm initial pixel must be provided by user.
a) Edge fill b) Edge flag c) Seed fill d) Fence fill
11) The transformation in which an object is moved in a minimum distance path
from one position to another is called
a) Rotation b) Replacement
c) Scaling d) Translation
12) Two dimensional color model are
a) RGB and CMYK b) RBG and CYMK
c) RGB and CMKY d) None
13) Which technique of color CRT is used for production of realistic image ?
a) Beam penetration b) Shadow mask
c) Both a) and b) d) None of above
14) The transformation in which an object is moved from one position to another
in circular path around a specified pivot point is called
a) Scaling b) Shearing c) Rotation d) Translation

______________

Set Q
*SLRTX321* -3- SLR-TX – 321
Seat
No.

S.E. (Computer Science and Engineering) (Part – I) (Old – CGPA)


Examination, 2018
computer Graphics
Day and Date : Thursday, 13-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All the questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three (Each carries 4 marks) : 12


a) What is RLE ? Explain in detail with its advantages and disadvantages.
b) Explain DDA line drawing algorithm.
c) Explain Reflection through an arbitrary line in 2D.
d) Differentiate between raster scan display and random scan display.

3. Explain below 3D transformation with its matrices and diagram 8


a) Translation
b) Scaling
c) Rotation.
OR

Illustrate and draw the flowchart of Bresenham’s circle algorithm by considering


the origin centered circle of radius 6. 8

4. Consider the rectangle with co-ordinate A(2, 2), B(5, 2), C(5, 4) and D(2, 4)
perform the following combined transformation.
a) Translate the object with 3 units in X direction as well as 3 units in Y
direction.
b) Scale the object by scaling factor x = 2 and y = 2.
c) Reflect the object through the line y = x.   8
Set Q
SLR-TX – 321 -4- *SLRTX321*

SECTION – II

5. Solve any three (Each carries 4 marks) : 12


a) Explain midpoint sub division algorithm in detail.
b) Explain display file compilation in detail.
c) Explain non parametric curve representation.
d) Write a short note on image and its applications.

6. Explain in detail Warnock algorithm. Also draw quadtree data structure. 8


OR

Explain in detail Cohen-Sutherland line clipping algorithm. 8

7. Explain antialising and halftoning techniques in detail. 8

_____________________

Set Q
*SLRTX321* SLR-TX – 321

Seat
No.
Set R
S.E. (Computer Science and Engineering) (Part – I) (Old – CGPA)
Examination, 2018
computer Graphics
Day and Date : Thursday, 13-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) All the questions are compulsory.
4) Figures to the right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative : (14×1=14)


1) Two dimensional color model are
a) RGB and CMYK b) RBG and CYMK
c) RGB and CMKY d) None
2) Which technique of color CRT is used for production of realistic image ?
a) Beam penetration b) Shadow mask
c) Both a) and b) d) None of above
3) The transformation in which an object is moved from one position to another
in circular path around a specified pivot point is called
a) Scaling b) Shearing c) Rotation d) Translation
4) The process of extracting a portion of a database or a picture inside or
outside a specified region are called
a) Transformation b) Projection c) Mapping d) Clipping
5) A quad-tree is a data structure which is used for graphical representation of
a) 2D digital picture or object b) 3D picture or object
c) Both a) and b) d) None of these
P.T.O.
SLR-TX – 321 -2- *SLRTX321*

6) A method used to test lines for total clipping is equivalent to the


a) logical XOR b) logical AND c) logical OR d) both a and b
7) The algorithm of hidden surface are
a) Object-space method b) Image-space method
c) Both a) and b) d) None of these
8) The region code of a point within the window is
a) 1111 b) 1000 c) 0001 d) 0000
9) A Bezier curve is a polynomial of degree__________ the no. of control
points used.
a) One less than b) One more than
c) Two less than d) Two more than
10) ______and depth buffer are used in Z- buffer algorithm.
a) Data buffer b) Frame buffer
c) Display buffer d) None
11) The amount of light emitted by the phosphor coating depends on the
a) Number of electrons striking the screen
b) Speed of electrons striking the screen
c) Distance from the cathode to the screen
d) None of above
12) Refreshing is not needed in DVST because of the presence of
a) Primary gun b) Flood gun
c) Focusing anode d) Control grid
13) In __________ algorithm initial pixel must be provided by user.
a) Edge fill b) Edge flag c) Seed fill d) Fence fill
14) The transformation in which an object is moved in a minimum distance path
from one position to another is called
a) Rotation b) Replacement
c) Scaling d) Translation

______________

Set R
*SLRTX321* -3- SLR-TX – 321
Seat
No.

S.E. (Computer Science and Engineering) (Part – I) (Old – CGPA)


Examination, 2018
computer Graphics
Day and Date : Thursday, 13-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All the questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three (Each carries 4 marks) : 12


a) What is RLE ? Explain in detail with its advantages and disadvantages.
b) Explain DDA line drawing algorithm.
c) Explain Reflection through an arbitrary line in 2D.
d) Differentiate between raster scan display and random scan display.

3. Explain below 3D transformation with its matrices and diagram 8


a) Translation
b) Scaling
c) Rotation.
OR

Illustrate and draw the flowchart of Bresenham’s circle algorithm by considering


the origin centered circle of radius 6. 8

4. Consider the rectangle with co-ordinate A(2, 2), B(5, 2), C(5, 4) and D(2, 4)
perform the following combined transformation.
a) Translate the object with 3 units in X direction as well as 3 units in Y
direction.
b) Scale the object by scaling factor x = 2 and y = 2.
c) Reflect the object through the line y = x.   8
Set R
SLR-TX – 321 -4- *SLRTX321*

SECTION – II

5. Solve any three (Each carries 4 marks) : 12


a) Explain midpoint sub division algorithm in detail.
b) Explain display file compilation in detail.
c) Explain non parametric curve representation.
d) Write a short note on image and its applications.

6. Explain in detail Warnock algorithm. Also draw quadtree data structure. 8


OR

Explain in detail Cohen-Sutherland line clipping algorithm. 8

7. Explain antialising and halftoning techniques in detail. 8

_____________________

Set R
*SLRTX321* SLR-TX – 321

Seat
No.
Set S
S.E. (Computer Science and Engineering) (Part – I) (Old – CGPA)
Examination, 2018
computer Graphics
Day and Date : Thursday, 13-12-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) All the questions are compulsory.
4) Figures to the right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative : (14×1=14)


1) A method used to test lines for total clipping is equivalent to the
a) logical XOR b) logical AND c) logical OR d) both a and b
2) The algorithm of hidden surface are
a) Object-space method b) Image-space method
c) Both a) and b) d) None of these
3) The region code of a point within the window is
a) 1111 b) 1000 c) 0001 d) 0000
4) A Bezier curve is a polynomial of degree__________ the no. of control
points used.
a) One less than b) One more than
c) Two less than d) Two more than
5) ______and depth buffer are used in Z- buffer algorithm.
a) Data buffer b) Frame buffer
c) Display buffer d) None

P.T.O.
SLR-TX – 321 -2- *SLRTX321*

6) The amount of light emitted by the phosphor coating depends on the


a) Number of electrons striking the screen
b) Speed of electrons striking the screen
c) Distance from the cathode to the screen
d) None of above
7) Refreshing is not needed in DVST because of the presence of
a) Primary gun b) Flood gun
c) Focusing anode d) Control grid
8) In __________ algorithm initial pixel must be provided by user.
a) Edge fill b) Edge flag c) Seed fill d) Fence fill
9) The transformation in which an object is moved in a minimum distance path
from one position to another is called
a) Rotation b) Replacement
c) Scaling d) Translation
10) Two dimensional color model are
a) RGB and CMYK b) RBG and CYMK
c) RGB and CMKY d) None
11) Which technique of color CRT is used for production of realistic image ?
a) Beam penetration b) Shadow mask
c) Both a) and b) d) None of above
12) The transformation in which an object is moved from one position to another
in circular path around a specified pivot point is called
a) Scaling b) Shearing c) Rotation d) Translation
13) The process of extracting a portion of a database or a picture inside or
outside a specified region are called
a) Transformation b) Projection c) Mapping d) Clipping
14) A quad-tree is a data structure which is used for graphical representation of
a) 2D digital picture or object b) 3D picture or object
c) Both a) and b) d) None of these

______________

Set S
*SLRTX321* -3- SLR-TX – 321
Seat
No.

S.E. (Computer Science and Engineering) (Part – I) (Old – CGPA)


Examination, 2018
computer Graphics
Day and Date : Thursday, 13-12-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All the questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three (Each carries 4 marks) : 12


a) What is RLE ? Explain in detail with its advantages and disadvantages.
b) Explain DDA line drawing algorithm.
c) Explain Reflection through an arbitrary line in 2D.
d) Differentiate between raster scan display and random scan display.

3. Explain below 3D transformation with its matrices and diagram 8


a) Translation
b) Scaling
c) Rotation.
OR

Illustrate and draw the flowchart of Bresenham’s circle algorithm by considering


the origin centered circle of radius 6. 8

4. Consider the rectangle with co-ordinate A(2, 2), B(5, 2), C(5, 4) and D(2, 4)
perform the following combined transformation.
a) Translate the object with 3 units in X direction as well as 3 units in Y
direction.
b) Scale the object by scaling factor x = 2 and y = 2.
c) Reflect the object through the line y = x.   8
Set S
SLR-TX – 321 -4- *SLRTX321*

SECTION – II

5. Solve any three (Each carries 4 marks) : 12


a) Explain midpoint sub division algorithm in detail.
b) Explain display file compilation in detail.
c) Explain non parametric curve representation.
d) Write a short note on image and its applications.

6. Explain in detail Warnock algorithm. Also draw quadtree data structure. 8


OR

Explain in detail Cohen-Sutherland line clipping algorithm. 8

7. Explain antialising and halftoning techniques in detail. 8

_____________________

Set S
*SLRTX322* SLR-TX – 322
Seat
No.
Set P
S.E. CSE (Part – I) (Old) Examination, 2018
Data Structure – I
Day and Date : Tuesday, 18-12-2018, -2018 Total Marks : 100
Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 20

1. Choose the correct alternative : 20


1) Which of the following data structure is used in recursion ?
a) Stack b) Queue c) Link list d) Tree
2) abc[ ] and xyz[ ] are two strings and we have to copy xyz[ ] at the end of
abc[ ] . Which of the following function is used ?
a) strcmp( ) b) strcat( ) c) strcpy( ) d) strconcat( )
3) The ftell( ) function is used to
a) Set the position to desired point in the file
b) Give current position in the file
c) Set the position to the beginning of the file
d) None of these
4) Pointer to an array means
a) A variable which keeps the address of all array elements
b) A variable which keeps the address of first array element
c) An array which contains all addresses of different elements
d) None of the above
5) char X[10] [5] ; declaration tells that
a) X is a matrix with 5 rows and 10 columns
b) X is an 1 D array with 10 rows and 5 columns
c) x is a matrix with 10 rows and 5 columns
d) None of the above
P.T.O.
SLR-TX – 322 -2- *SLRTX322*
6) Pointer to pointer of type integer is
a) A variable which keeps the address of an integer variable
b) A variable which keeps value at address of an integer variable
c) A variable which keeps the address of address of an integer variable
d) A integer variable which keeps the address of another integer variable
7) Which function is appropriate for writing records in a binary file ?
a) fputc( ) b) fgets( ) c) fputs( ) d) fwrite( )
8) If n is number of disks, the number of disk movements in Towers of Hanoi are
a) 2n – 1 b) 2n – 1 c) n2 – 1 d) none of above
9) Function strlen( ) returns
a) a string b) a character value
c) an integer value d) a float value
10) __________ function is used to read the file line by line.
a) fgetc( ) b) fputs( ) c) fgets( ) d) fread( )
11) Which of the following is not a file opening mode ?
a) r + b) wb+ c) ab d) rw
12) In linked lists there are no NULL links in
a) single linked list b) linear doubly linked list
c) circular linked list d) linked list
13) Which of the following is not an inherent application of stack ?
a) Reversing a string b) Evaluation of postfix expression
c) Implementation of recursion d) Job scheduling
14) Each node in doubly linked list has _________ fields.
a) 2 b) 3 c) 1 d) 4
15) Ascending priority queue is one in which the item removed is
a) the smallest item b) the largest item
c) any item d) none
16) In linked representation of stack __________ holds the elements of the stack.
a) INFO fields b) TOP fields c) LINK fields d) NULL fields
17) The situation in a linked list when START = NULL means
a) list is created b) list is overflow
c) list is empty d) new node is created
18) What is postfix form of * + A B – C D prefix expression ?
a) A B + * C D – b) A B C + * – c) A B + * C D – d) A B + C D – *
19) The situation when PTR-> NEXT = START in a circular linked list, means
a) PTR is at the first node in the linked list
b) PTR is at the last but one node in the linked list
c) PTR is at the last node in the linked list
d) PTR is at the middle node in the linked list
20) Which of the following is an application of stack ?
a) finding factorial b) towers of Hanoi
c) evaluation of postfix expression d) none of the above
____________

Set P
*SLRTX322* -3- SLR-TX – 322
Seat
No.
S.E. CSE (Part – I) (Old) Examination, 2018
Data Structure – I

Day and Date : Tuesday, 18-12-2018, -2018 Marks : 80


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instruction : Figures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×5=20)


a) What is recursion ? How it works ? Explain with the help of a program.
b) Explain the concept of pointer to an array with an example.
c) Explain strcat( ) and strcmp( ) built in functions with example.
d) Write a program to find out length of a string using user defined function.
e) Discuss file functions to open, read, write and to bring file pointer to a
desired location.

3. Write a program to copy the contents of one file into another file. 10
OR

Discuss different file opening modes in detail.

4. Write a program to allocate memory for an array dynamically, store elements


and display them. 10

SECTION – II

5. Answer any four : (4×5=20)


a) What is stack ? Discuss insert, delete and display functions of stack.
b) Explain operations of circular queue with examples and changes made in
front and rear variables during operations.
c) What is linked list ? How it differs from an array ?
d) Write a function to insert a given node in the beginning in a singly circular
linked list.
e) Discuss addition of two polynomials using linked list with example. Set P
SLR-TX – 322 -4- *SLRTX322*
6. Answer any one : 10
Write a menu driven program to implement Singly Linked List showing
operations.
1) Insert a node in the beginning of the list
2) Insert a node at a given position in the list
3) Display the linked list.
OR
Write a menu driven program to implement Doubly Linked List showing
operations.
1) Insert a node in the beginning of the list
2) Delete a given node
3) Display the linked list.

7. How an infix expression is converted to postfix using stack ? Convert following


expression into postfix by providing proper explanation and showing the
content of stack. 10
(A + B) * C/D + E ∧ F/G
_____________

Set P
*SLRTX322* SLR-TX – 322
Seat
Set Q
No.
S.E. CSE (Part – I) (Old) Examination, 2018
Data Structure – I
Day and Date : Tuesday, 18-12-2018, -2018 Total Marks : 100
Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 20

1. Choose the correct alternative : 20


1) In linked representation of stack __________ holds the elements of the stack.
a) INFO fields b) TOP fields c) LINK fields d) NULL fields
2) The situation in a linked list when START = NULL means
a) list is created b) list is overflow
c) list is empty d) new node is created
3) What is postfix form of * + A B – C D prefix expression ?
a) A B + * C D – b) A B C + * – c) A B + * C D – d) A B + C D – *
4) The situation when PTR-> NEXT = START in a circular linked list, means
a) PTR is at the first node in the linked list
b) PTR is at the last but one node in the linked list
c) PTR is at the last node in the linked list
d) PTR is at the middle node in the linked list
5) Which of the following is an application of stack ?
a) finding factorial b) towers of Hanoi
c) evaluation of postfix expression d) none of the above
6) Which of the following data structure is used in recursion ?
a) Stack b) Queue c) Link list d) Tree
7) abc[ ] and xyz[ ] are two strings and we have to copy xyz[ ] at the end of
abc[ ] . Which of the following function is used ?
a) strcmp( ) b) strcat( ) c) strcpy( ) d) strconcat( )
P.T.O.
SLR-TX – 322 -2- *SLRTX322*
8) The ftell( ) function is used to
a) Set the position to desired point in the file
b) Give current position in the file
c) Set the position to the beginning of the file
d) None of these
9) Pointer to an array means
a) A variable which keeps the address of all array elements
b) A variable which keeps the address of first array element
c) An array which contains all addresses of different elements
d) None of the above
10) char X[10] [5] ; declaration tells that
a) X is a matrix with 5 rows and 10 columns
b) X is an 1 D array with 10 rows and 5 columns
c) x is a matrix with 10 rows and 5 columns
d) None of the above
11) Pointer to pointer of type integer is
a) A variable which keeps the address of an integer variable
b) A variable which keeps value at address of an integer variable
c) A variable which keeps the address of address of an integer variable
d) A integer variable which keeps the address of another integer variable
12) Which function is appropriate for writing records in a binary file ?
a) fputc( ) b) fgets( ) c) fputs( ) d) fwrite( )
13) If n is number of disks, the number of disk movements in Towers of Hanoi are
a) 2n – 1 b) 2n – 1 c) n2 – 1 d) none of above
14) Function strlen( ) returns
a) a string b) a character value
c) an integer value d) a float value
15) __________ function is used to read the file line by line.
a) fgetc( ) b) fputs( ) c) fgets( ) d) fread( )
16) Which of the following is not a file opening mode ?
a) r + b) wb+ c) ab d) rw
17) In linked lists there are no NULL links in
a) single linked list b) linear doubly linked list
c) circular linked list d) linked list
18) Which of the following is not an inherent application of stack ?
a) Reversing a string b) Evaluation of postfix expression
c) Implementation of recursion d) Job scheduling
19) Each node in doubly linked list has _________ fields.
a) 2 b) 3 c) 1 d) 4
20) Ascending priority queue is one in which the item removed is
a) the smallest item b) the largest item
c) any item d) none
____________
Set Q

*SLRTX322* -3- SLR-TX – 322
Seat
No.
S.E. CSE (Part – I) (Old) Examination, 2018
Data Structure – I

Day and Date : Tuesday, 18-12-2018, -2018 Marks : 80


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instruction : Figures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×5=20)


a) What is recursion ? How it works ? Explain with the help of a program.
b) Explain the concept of pointer to an array with an example.
c) Explain strcat( ) and strcmp( ) built in functions with example.
d) Write a program to find out length of a string using user defined function.
e) Discuss file functions to open, read, write and to bring file pointer to a
desired location.

3. Write a program to copy the contents of one file into another file. 10
OR

Discuss different file opening modes in detail.

4. Write a program to allocate memory for an array dynamically, store elements


and display them. 10

SECTION – II

5. Answer any four : (4×5=20)


a) What is stack ? Discuss insert, delete and display functions of stack.
b) Explain operations of circular queue with examples and changes made in
front and rear variables during operations.
c) What is linked list ? How it differs from an array ?
d) Write a function to insert a given node in the beginning in a singly circular
linked list.
e) Discuss addition of two polynomials using linked list with example. Set Q
SLR-TX – 322 -4- *SLRTX322*
6. Answer any one : 10
Write a menu driven program to implement Singly Linked List showing
operations.
1) Insert a node in the beginning of the list
2) Insert a node at a given position in the list
3) Display the linked list.
OR
Write a menu driven program to implement Doubly Linked List showing
operations.
1) Insert a node in the beginning of the list
2) Delete a given node
3) Display the linked list.

7. How an infix expression is converted to postfix using stack ? Convert following


expression into postfix by providing proper explanation and showing the
content of stack. 10
(A + B) * C/D + E ∧ F/G
_____________

Set Q
*SLRTX322* SLR-TX – 322
Seat
Set R
No.
S.E. CSE (Part – I) (Old) Examination, 2018
Data Structure – I
Day and Date : Tuesday, 18-12-2018, -2018 Total Marks : 100
Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 20

1. Choose the correct alternative : 20


1) Which of the following is not a file opening mode ?
a) r + b) wb+ c) ab d) rw
2) In linked lists there are no NULL links in
a) single linked list b) linear doubly linked list
c) circular linked list d) linked list
3) Which of the following is not an inherent application of stack ?
a) Reversing a string b) Evaluation of postfix expression
c) Implementation of recursion d) Job scheduling
4) Each node in doubly linked list has _________ fields.
a) 2 b) 3 c) 1 d) 4
5) Ascending priority queue is one in which the item removed is
a) the smallest item b) the largest item
c) any item d) none
6) In linked representation of stack __________ holds the elements of the stack.
a) INFO fields b) TOP fields c) LINK fields d) NULL fields
7) The situation in a linked list when START = NULL means
a) list is created b) list is overflow
c) list is empty d) new node is created
8) What is postfix form of * + A B – C D prefix expression ?
a) A B + * C D – b) A B C + * – c) A B + * C D – d) A B + C D – *
9) The situation when PTR-> NEXT = START in a circular linked list, means
a) PTR is at the first node in the linked list
b) PTR is at the last but one node in the linked list
c) PTR is at the last node in the linked list
d) PTR is at the middle node in the linked list P.T.O.
SLR-TX – 322 -2- *SLRTX322*
10) Which of the following is an application of stack ?
a) finding factorial b) towers of Hanoi
c) evaluation of postfix expression d) none of the above
11) Which of the following data structure is used in recursion ?
a) Stack b) Queue c) Link list d) Tree
12) abc[ ] and xyz[ ] are two strings and we have to copy xyz[ ] at the end of
abc[ ] . Which of the following function is used ?
a) strcmp( ) b) strcat( ) c) strcpy( ) d) strconcat( )
13) The ftell( ) function is used to
a) Set the position to desired point in the file
b) Give current position in the file
c) Set the position to the beginning of the file
d) None of these
14) Pointer to an array means
a) A variable which keeps the address of all array elements
b) A variable which keeps the address of first array element
c) An array which contains all addresses of different elements
d) None of the above
15) char X[10] [5] ; declaration tells that
a) X is a matrix with 5 rows and 10 columns
b) X is an 1 D array with 10 rows and 5 columns
c) x is a matrix with 10 rows and 5 columns
d) None of the above
16) Pointer to pointer of type integer is
a) A variable which keeps the address of an integer variable
b) A variable which keeps value at address of an integer variable
c) A variable which keeps the address of address of an integer variable
d) A integer variable which keeps the address of another integer variable
17) Which function is appropriate for writing records in a binary file ?
a) fputc( ) b) fgets( ) c) fputs( ) d) fwrite( )
18) If n is number of disks, the number of disk movements in Towers of Hanoi are
a) 2n – 1 b) 2n – 1 c) n2 – 1 d) none of above
19) Function strlen( ) returns
a) a string b) a character value
c) an integer value d) a float value
20) __________ function is used to read the file line by line.
a) fgetc( ) b) fputs( ) c) fgets( ) d) fread( )
____________
Set R
*SLRTX322* -3- SLR-TX – 322
Seat
No.
S.E. CSE (Part – I) (Old) Examination, 2018
Data Structure – I

Day and Date : Tuesday, 18-12-2018, -2018 Marks : 80


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instruction : Figures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×5=20)


a) What is recursion ? How it works ? Explain with the help of a program.
b) Explain the concept of pointer to an array with an example.
c) Explain strcat( ) and strcmp( ) built in functions with example.
d) Write a program to find out length of a string using user defined function.
e) Discuss file functions to open, read, write and to bring file pointer to a
desired location.

3. Write a program to copy the contents of one file into another file. 10
OR

Discuss different file opening modes in detail.

4. Write a program to allocate memory for an array dynamically, store elements


and display them. 10

SECTION – II

5. Answer any four : (4×5=20)


a) What is stack ? Discuss insert, delete and display functions of stack.
b) Explain operations of circular queue with examples and changes made in
front and rear variables during operations.
c) What is linked list ? How it differs from an array ?
d) Write a function to insert a given node in the beginning in a singly circular
linked list.
e) Discuss addition of two polynomials using linked list with example. Set R
SLR-TX – 322 -4- *SLRTX322*
6. Answer any one : 10
Write a menu driven program to implement Singly Linked List showing
operations.
1) Insert a node in the beginning of the list
2) Insert a node at a given position in the list
3) Display the linked list.
OR
Write a menu driven program to implement Doubly Linked List showing
operations.
1) Insert a node in the beginning of the list
2) Delete a given node
3) Display the linked list.

7. How an infix expression is converted to postfix using stack ? Convert following


expression into postfix by providing proper explanation and showing the
content of stack. 10
(A + B) * C/D + E ∧ F/G
_____________

Set R
*SLRTX322* SLR-TX – 322
Seat
Set S
No.
S.E. CSE (Part – I) (Old) Examination, 2018
Data Structure – I
Day and Date : Tuesday, 18-12-2018, -2018 Total Marks : 100
Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 20

1. Choose the correct alternative : 20


1) Pointer to pointer of type integer is
a) A variable which keeps the address of an integer variable
b) A variable which keeps value at address of an integer variable
c) A variable which keeps the address of address of an integer variable
d) A integer variable which keeps the address of another integer variable
2) Which function is appropriate for writing records in a binary file ?
a) fputc( ) b) fgets( ) c) fputs( ) d) fwrite( )
3) If n is number of disks, the number of disk movements in Towers of Hanoi are
a) 2n – 1 b) 2n – 1 c) n2 – 1 d) none of above
4) Function strlen( ) returns
a) a string b) a character value
c) an integer value d) a float value
5) __________ function is used to read the file line by line.
a) fgetc( ) b) fputs( ) c) fgets( ) d) fread( )
6) Which of the following is not a file opening mode ?
a) r + b) wb+ c) ab d) rw
7) In linked lists there are no NULL links in
a) single linked list b) linear doubly linked list
c) circular linked list d) linked list
8) Which of the following is not an inherent application of stack ?
a) Reversing a string b) Evaluation of postfix expression
c) Implementation of recursion d) Job scheduling
9) Each node in doubly linked list has _________ fields.
a) 2 b) 3 c) 1 d) 4
P.T.O.
SLR-TX – 322 -2- *SLRTX322*
10) Ascending priority queue is one in which the item removed is
a) the smallest item b) the largest item
c) any item d) none
11) In linked representation of stack __________ holds the elements of the stack.
a) INFO fields b) TOP fields c) LINK fields d) NULL fields
12) The situation in a linked list when START = NULL means
a) list is created b) list is overflow
c) list is empty d) new node is created
13) What is postfix form of * + A B – C D prefix expression ?
a) A B + * C D – b) A B C + * – c) A B + * C D – d) A B + C D – *
14) The situation when PTR-> NEXT = START in a circular linked list, means
a) PTR is at the first node in the linked list
b) PTR is at the last but one node in the linked list
c) PTR is at the last node in the linked list
d) PTR is at the middle node in the linked list
15) Which of the following is an application of stack ?
a) finding factorial b) towers of Hanoi
c) evaluation of postfix expression d) none of the above
16) Which of the following data structure is used in recursion ?
a) Stack b) Queue c) Link list d) Tree
17) abc[ ] and xyz[ ] are two strings and we have to copy xyz[ ] at the end of
abc[ ] . Which of the following function is used ?
a) strcmp( ) b) strcat( ) c) strcpy( ) d) strconcat( )
18) The ftell( ) function is used to
a) Set the position to desired point in the file
b) Give current position in the file
c) Set the position to the beginning of the file
d) None of these
19) Pointer to an array means
a) A variable which keeps the address of all array elements
b) A variable which keeps the address of first array element
c) An array which contains all addresses of different elements
d) None of the above
20) char X[10] [5] ; declaration tells that
a) X is a matrix with 5 rows and 10 columns
b) X is an 1 D array with 10 rows and 5 columns
c) x is a matrix with 10 rows and 5 columns
d) None of the above
____________
Set S
*SLRTX322* -3- SLR-TX – 322
Seat
No.
S.E. CSE (Part – I) (Old) Examination, 2018
Data Structure – I

Day and Date : Tuesday, 18-12-2018, -2018 Marks : 80


Time : 10.00 a.m. to 1.00 p.m..00 .m. to .00 .m.

Instruction : Figures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×5=20)


a) What is recursion ? How it works ? Explain with the help of a program.
b) Explain the concept of pointer to an array with an example.
c) Explain strcat( ) and strcmp( ) built in functions with example.
d) Write a program to find out length of a string using user defined function.
e) Discuss file functions to open, read, write and to bring file pointer to a
desired location.

3. Write a program to copy the contents of one file into another file. 10
OR

Discuss different file opening modes in detail.

4. Write a program to allocate memory for an array dynamically, store elements


and display them. 10

SECTION – II

5. Answer any four : (4×5=20)


a) What is stack ? Discuss insert, delete and display functions of stack.
b) Explain operations of circular queue with examples and changes made in
front and rear variables during operations.
c) What is linked list ? How it differs from an array ?
d) Write a function to insert a given node in the beginning in a singly circular
linked list.
e) Discuss addition of two polynomials using linked list with example. Set S
SLR-TX – 322 -4- *SLRTX322*
6. Answer any one : 10
Write a menu driven program to implement Singly Linked List showing
operations.
1) Insert a node in the beginning of the list
2) Insert a node at a given position in the list
3) Display the linked list.
OR
Write a menu driven program to implement Doubly Linked List showing
operations.
1) Insert a node in the beginning of the list
2) Delete a given node
3) Display the linked list.

7. How an infix expression is converted to postfix using stack ? Convert following


expression into postfix by providing proper explanation and showing the
content of stack. 10
(A + B) * C/D + E ∧ F/G
_____________

Set S
*SLRTX323* SLR-TX – 323

Seat
No.
Set P
S.E. (C.S.E.) (Part – I) (Old) Examination, 2018
switching theory and logic design
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.
4) All questions are compulsory.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) RAM is
a) Volatile b) Non-volatile
c) Both a) and b) d) None of above
2) Number of inputs for full-subtractor are
a) Two b) Three c) Four d) Five
3) Memory element present in _________ ckt. to store past information.
a) Sequential ckt. b) Combinational ckt.
c) Both a) and b) d) None of these
4) A Minterm corresponding to don’t care condition have a value of
a) 1 b) 0 c) 2 d) 0 and 1
5) ‘n’ variable k-map having ____________ cells.
a) n no. of cells b) N no. of cells
c) 2 no. of cells
n
d) 2N no. of cells
6) Race round condition is occurred when J and K i/p’s are
a) J = 1, K = 0 b) J = 0, K = 1 c) J = 1, K = 1 d) J = 0, K= 0.
7) In AND operation, O/P is logic 1 if and only if all I/P’s are
a) 1 b) 0 c) Both a) and b) d) None of above
P.T.O.
SLR-TX – 323 -2- *SLRTX323*
8) Two’s complement of 01001110 is
a) 10110001 b) 10110011 c) 10110010 d) None
9) State counter is also known as
a) Up-down counter b) Ripple counter
c) Multiple choice counter d) MOD counter
10) All FF’s are clocked simultaneously in __________ counter.
a) Synchronous counter b) Asynchronous counter
c) Both a) and b) d) None
11) In __________ ckt. o/p at any instant of time depends upon the present i/p
as well as past i/p or o/p.
a) Universal ckt. b) Combinational ckt.
c) Sequential ckt. d) None
12) D-type FF is also called as
a) Data FF b) Distance FF c) Both a) and b) d) Delay FF
13) Half substractor is use to performed
a) Two 1-bit substraction b) Multibit Substraction
c) Three 1-bit substraction d) Four 1-bit substraction
14) NAND-NAND realization is ______________ level realization.
a) One level b) Two level c) Three level d) Four level
15) To increase the speed of adder ___________ technique is used.
a) Cascading Adder b) LAC
c) Adder d) Half Adder
16) RTL stands for
a) Resistance-transfer level b) Register-transfer level
c) Register-two level d) None of above
17) Multiplexer is also known as
a) Decoder b) Encoder c) Counter d) Data Selector
18) Race – around condition is in ___________ Flip-flop.
a) SR Flip-flop b) D Flip-flop c) JK Flip-flop d) T Flip-flop
19) In _____________ ckt. inputs pass through select i/p according to code.
a) MUX b) DEMUX c) Encoder d) Decoder
20) IC 7447 is use for performing
a) BCD to 7-Seg. Display b) BCD to Decimal decoder driver
c) Both a) and b) d) None of above
________________

Set P
*SLRTX323* -3- SLR-TX – 323
Seat
No.

S.E. (C.S.E.) (Part – I) (Old) Examination, 2018


switching theory and logic design
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) All questions are compulsory.
SECTION – I
2. Attempt any four (each carries 5 marks) : (4×5=20)
a) Minimize the four-variable logic function using K-map.
f(A, B, C, D) = ∏M(4, 6, 10, 12, 13, 15)
b) Write a short note on Full Adder.
c) What is BCD-to-7 segment Decoder ? Explain with neat diagram.
d) Write a short note on Race-Around condition.
e) Draw and explain excitation table of JK and SR flip-flop.
3. Attempt any two (each carries 10 marks) : (2×10=20)
a) For a given logical function f(A, B, C, D) = Sm(0, 1, 2, 3, 11, 12, 14, 15).
Minimize using k-map and realize using NAND gates only.
b) What is Shift register ? Draw SISO shift register for 5 bit data (10111).
c) What is UP-DOWN counter ?
SECTION – II
4. Attempt any four (each carries 5 marks) : (4×5=20)
a) Draw 3-line-to-8-line decoder using 74155 ICs.
b) Write a short note on Digital comparator.
c) Compare Multiplexer and Demultiplexer.
d) Explain Look-Ahead-Carry in detail.
e) Write a short note on Digital comparator.
5. Attempt any two (each carries 10 marks) : (2×10=20)
a) Design 1 : 8 DEMUX also draw logic diagram for 1 : 8 DEMUX.
b) Explain RAM architecture in detail.
c) Design 8K × 8 memory using 4K × 8 memory chips using 3 : 8 decoder.
_____________________
Set P
Set P
*SLRTX323* SLR-TX – 323

Seat
No.
Set Q
S.E. (C.S.E.) (Part – I) (Old) Examination, 2018
switching theory and logic design
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.
4) All questions are compulsory.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) RTL stands for
a) Resistance-transfer level b) Register-transfer level
c) Register-two level d) None of above
2) Multiplexer is also known as
a) Decoder b) Encoder c) Counter d) Data Selector
3) Race – around condition is in ___________ Flip-flop.
a) SR Flip-flop b) D Flip-flop c) JK Flip-flop d) T Flip-flop
4) In _____________ ckt. inputs pass through select i/p according to code.
a) MUX b) DEMUX c) Encoder d) Decoder
5) IC 7447 is use for performing
a) BCD to 7-Seg. Display b) BCD to Decimal decoder driver
c) Both a) and b) d) None of above
6) RAM is
a) Volatile b) Non-volatile
c) Both a) and b) d) None of above
7) Number of inputs for full-subtractor are
a) Two b) Three c) Four d) Five
P.T.O.
SLR-TX – 323 -2- *SLRTX323*
8) Memory element present in _________ ckt. to store past information.
a) Sequential ckt. b) Combinational ckt.
c) Both a) and b) d) None of these
9) A Minterm corresponding to don’t care condition have a value of
a) 1 b) 0 c) 2 d) 0 and 1
10) ‘n’ variable k-map having ____________ cells.
a) n no. of cells b) N no. of cells
c) 2 no. of cells
n
d) 2N no. of cells
11) Race round condition is occurred when J and K i/p’s are
a) J = 1, K = 0 b) J = 0, K = 1 c) J = 1, K = 1 d) J = 0, K= 0.
12) In AND operation, O/P is logic 1 if and only if all I/P’s are
a) 1 b) 0 c) Both a) and b) d) None of above
13) Two’s complement of 01001110 is
a) 10110001 b) 10110011 c) 10110010 d) None
14) State counter is also known as
a) Up-down counter b) Ripple counter
c) Multiple choice counter d) MOD counter
15) All FF’s are clocked simultaneously in __________ counter.
a) Synchronous counter b) Asynchronous counter
c) Both a) and b) d) None
16) In __________ ckt. o/p at any instant of time depends upon the present i/p
as well as past i/p or o/p.
a) Universal ckt. b) Combinational ckt.
c) Sequential ckt. d) None
17) D-type FF is also called as
a) Data FF b) Distance FF c) Both a) and b) d) Delay FF
18) Half substractor is use to performed
a) Two 1-bit substraction b) Multibit Substraction
c) Three 1-bit substraction d) Four 1-bit substraction
19) NAND-NAND realization is ______________ level realization.
a) One level b) Two level c) Three level d) Four level
20) To increase the speed of adder ___________ technique is used.
a) Cascading Adder b) LAC
c) Adder d) Half Adder
________________

Set Q
*SLRTX323* -3- SLR-TX – 323
Seat
No.

S.E. (C.S.E.) (Part – I) (Old) Examination, 2018


switching theory and logic design
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) All questions are compulsory.
SECTION – I
2. Attempt any four (each carries 5 marks) : (4×5=20)
a) Minimize the four-variable logic function using K-map.
f(A, B, C, D) = ∏M(4, 6, 10, 12, 13, 15)
b) Write a short note on Full Adder.
c) What is BCD-to-7 segment Decoder ? Explain with neat diagram.
d) Write a short note on Race-Around condition.
e) Draw and explain excitation table of JK and SR flip-flop.
3. Attempt any two (each carries 10 marks) : (2×10=20)
a) For a given logical function f(A, B, C, D) = Sm(0, 1, 2, 3, 11, 12, 14, 15).
Minimize using k-map and realize using NAND gates only.
b) What is Shift register ? Draw SISO shift register for 5 bit data (10111).
c) What is UP-DOWN counter ?
SECTION – II
4. Attempt any four (each carries 5 marks) : (4×5=20)
a) Draw 3-line-to-8-line decoder using 74155 ICs.
b) Write a short note on Digital comparator.
c) Compare Multiplexer and Demultiplexer.
d) Explain Look-Ahead-Carry in detail.
e) Write a short note on Digital comparator.
5. Attempt any two (each carries 10 marks) : (2×10=20)
a) Design 1 : 8 DEMUX also draw logic diagram for 1 : 8 DEMUX.
b) Explain RAM architecture in detail.
c) Design 8K × 8 memory using 4K × 8 memory chips using 3 : 8 decoder.
_____________________
Set Q
Set Q
*SLRTX323* SLR-TX – 323

Seat
No.
Set R
S.E. (C.S.E.) (Part – I) (Old) Examination, 2018
switching theory and logic design
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.
4) All questions are compulsory.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) In __________ ckt. o/p at any instant of time depends upon the present i/p
as well as past i/p or o/p.
a) Universal ckt. b) Combinational ckt.
c) Sequential ckt. d) None
2) D-type FF is also called as
a) Data FF b) Distance FF c) Both a) and b) d) Delay FF
3) Half substractor is use to performed
a) Two 1-bit substraction b) Multibit Substraction
c) Three 1-bit substraction d) Four 1-bit substraction
4) NAND-NAND realization is ______________ level realization.
a) One level b) Two level c) Three level d) Four level
5) To increase the speed of adder ___________ technique is used.
a) Cascading Adder b) LAC
c) Adder d) Half Adder
6) RTL stands for
a) Resistance-transfer level b) Register-transfer level
c) Register-two level d) None of above

P.T.O.
SLR-TX – 323 -2- *SLRTX323*
7) Multiplexer is also known as
a) Decoder b) Encoder c) Counter d) Data Selector
8) Race – around condition is in ___________ Flip-flop.
a) SR Flip-flop b) D Flip-flop c) JK Flip-flop d) T Flip-flop
9) In _____________ ckt. inputs pass through select i/p according to code.
a) MUX b) DEMUX c) Encoder d) Decoder
10) IC 7447 is use for performing
a) BCD to 7-Seg. Display b) BCD to Decimal decoder driver
c) Both a) and b) d) None of above
11) RAM is
a) Volatile b) Non-volatile
c) Both a) and b) d) None of above
12) Number of inputs for full-subtractor are
a) Two b) Three c) Four d) Five
13) Memory element present in _________ ckt. to store past information.
a) Sequential ckt. b) Combinational ckt.
c) Both a) and b) d) None of these
14) A Minterm corresponding to don’t care condition have a value of
a) 1 b) 0 c) 2 d) 0 and 1
15) ‘n’ variable k-map having ____________ cells.
a) n no. of cells b) N no. of cells
c) 2 no. of cells
n
d) 2N no. of cells
16) Race round condition is occurred when J and K i/p’s are
a) J = 1, K = 0 b) J = 0, K = 1 c) J = 1, K = 1 d) J = 0, K= 0.
17) In AND operation, O/P is logic 1 if and only if all I/P’s are
a) 1 b) 0 c) Both a) and b) d) None of above
18) Two’s complement of 01001110 is
a) 10110001 b) 10110011 c) 10110010 d) None
19) State counter is also known as
a) Up-down counter b) Ripple counter
c) Multiple choice counter d) MOD counter
20) All FF’s are clocked simultaneously in __________ counter.
a) Synchronous counter b) Asynchronous counter
c) Both a) and b) d) None
________________

Set R
*SLRTX323* -3- SLR-TX – 323
Seat
No.

S.E. (C.S.E.) (Part – I) (Old) Examination, 2018


switching theory and logic design
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) All questions are compulsory.
SECTION – I
2. Attempt any four (each carries 5 marks) : (4×5=20)
a) Minimize the four-variable logic function using K-map.
f(A, B, C, D) = ∏M(4, 6, 10, 12, 13, 15)
b) Write a short note on Full Adder.
c) What is BCD-to-7 segment Decoder ? Explain with neat diagram.
d) Write a short note on Race-Around condition.
e) Draw and explain excitation table of JK and SR flip-flop.
3. Attempt any two (each carries 10 marks) : (2×10=20)
a) For a given logical function f(A, B, C, D) = Sm(0, 1, 2, 3, 11, 12, 14, 15).
Minimize using k-map and realize using NAND gates only.
b) What is Shift register ? Draw SISO shift register for 5 bit data (10111).
c) What is UP-DOWN counter ?
SECTION – II
4. Attempt any four (each carries 5 marks) : (4×5=20)
a) Draw 3-line-to-8-line decoder using 74155 ICs.
b) Write a short note on Digital comparator.
c) Compare Multiplexer and Demultiplexer.
d) Explain Look-Ahead-Carry in detail.
e) Write a short note on Digital comparator.
5. Attempt any two (each carries 10 marks) : (2×10=20)
a) Design 1 : 8 DEMUX also draw logic diagram for 1 : 8 DEMUX.
b) Explain RAM architecture in detail.
c) Design 8K × 8 memory using 4K × 8 memory chips using 3 : 8 decoder.
_____________________
Set R
Set R
*SLRTX323* SLR-TX – 323

Seat
No.
Set S
S.E. (C.S.E.) (Part – I) (Old) Examination, 2018
switching theory and logic design
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.
4) All questions are compulsory.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) Race round condition is occurred when J and K i/p’s are
a) J = 1, K = 0 b) J = 0, K = 1 c) J = 1, K = 1 d) J = 0, K= 0.
2) In AND operation, O/P is logic 1 if and only if all I/P’s are
a) 1 b) 0 c) Both a) and b) d) None of above
3) Two’s complement of 01001110 is
a) 10110001 b) 10110011 c) 10110010 d) None
4) State counter is also known as
a) Up-down counter b) Ripple counter
c) Multiple choice counter d) MOD counter
5) All FF’s are clocked simultaneously in __________ counter.
a) Synchronous counter b) Asynchronous counter
c) Both a) and b) d) None
6) In __________ ckt. o/p at any instant of time depends upon the present i/p
as well as past i/p or o/p.
a) Universal ckt. b) Combinational ckt.
c) Sequential ckt. d) None
7) D-type FF is also called as
a) Data FF b) Distance FF c) Both a) and b) d) Delay FF
P.T.O.
SLR-TX – 323 -2- *SLRTX323*
8) Half substractor is use to performed
a) Two 1-bit substraction b) Multibit Substraction
c) Three 1-bit substraction d) Four 1-bit substraction
9) NAND-NAND realization is ______________ level realization.
a) One level b) Two level c) Three level d) Four level
10) To increase the speed of adder ___________ technique is used.
a) Cascading Adder b) LAC
c) Adder d) Half Adder
11) RTL stands for
a) Resistance-transfer level b) Register-transfer level
c) Register-two level d) None of above
12) Multiplexer is also known as
a) Decoder b) Encoder c) Counter d) Data Selector
13) Race – around condition is in ___________ Flip-flop.
a) SR Flip-flop b) D Flip-flop c) JK Flip-flop d) T Flip-flop
14) In _____________ ckt. inputs pass through select i/p according to code.
a) MUX b) DEMUX c) Encoder d) Decoder
15) IC 7447 is use for performing
a) BCD to 7-Seg. Display b) BCD to Decimal decoder driver
c) Both a) and b) d) None of above
16) RAM is
a) Volatile b) Non-volatile
c) Both a) and b) d) None of above
17) Number of inputs for full-subtractor are
a) Two b) Three c) Four d) Five
18) Memory element present in _________ ckt. to store past information.
a) Sequential ckt. b) Combinational ckt.
c) Both a) and b) d) None of these
19) A Minterm corresponding to don’t care condition have a value of
a) 1 b) 0 c) 2 d) 0 and 1
20) ‘n’ variable k-map having ____________ cells.
a) n no. of cells b) N no. of cells
c) 2 no. of cells
n
d) 2N no. of cells
________________

Set S
*SLRTX323* -3- SLR-TX – 323
Seat
No.

S.E. (C.S.E.) (Part – I) (Old) Examination, 2018


switching theory and logic design
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) All questions are compulsory.
SECTION – I
2. Attempt any four (each carries 5 marks) : (4×5=20)
a) Minimize the four-variable logic function using K-map.
f(A, B, C, D) = ∏M(4, 6, 10, 12, 13, 15)
b) Write a short note on Full Adder.
c) What is BCD-to-7 segment Decoder ? Explain with neat diagram.
d) Write a short note on Race-Around condition.
e) Draw and explain excitation table of JK and SR flip-flop.
3. Attempt any two (each carries 10 marks) : (2×10=20)
a) For a given logical function f(A, B, C, D) = Sm(0, 1, 2, 3, 11, 12, 14, 15).
Minimize using k-map and realize using NAND gates only.
b) What is Shift register ? Draw SISO shift register for 5 bit data (10111).
c) What is UP-DOWN counter ?
SECTION – II
4. Attempt any four (each carries 5 marks) : (4×5=20)
a) Draw 3-line-to-8-line decoder using 74155 ICs.
b) Write a short note on Digital comparator.
c) Compare Multiplexer and Demultiplexer.
d) Explain Look-Ahead-Carry in detail.
e) Write a short note on Digital comparator.
5. Attempt any two (each carries 10 marks) : (2×10=20)
a) Design 1 : 8 DEMUX also draw logic diagram for 1 : 8 DEMUX.
b) Explain RAM architecture in detail.
c) Design 8K × 8 memory using 4K × 8 memory chips using 3 : 8 decoder.
_____________________
Set S
Set S
*SLRTX326* SLR-TX – 326
Seat
No. Set P
S.E. (CSE) (Part – II) (CBCS) Examination, 2018
Applied Mathematics – II (New)
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to the right indicate full marks.
4) Use of calculator is allowed.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) The order of convergence in Newton’s Raphson method is
a) 1.6 b) 2 c) 1.5 d) 3
2) In solving algebraic and transcendental equation f(x) = 0, which of the following method
is called method chord ?
a) False position b) Newton’s Raphson
rd
1
c) Power method d) Simpson’s
3
3) The interval in which a positive real root of the equation x3 – 4x – 9 = 0 lies is
a) (3, 4) b) (0, 1) c) (1, 2) d) (2, 3)
4) In solving simultaneous linear equation Ax = B by Jordan method, the coefficient matrix
A reduced to
a) Lower triangular matrix b) Upper triangular matrix
c) Diagonal matrix d) Null matrix
5) Which of the following method is used to find dominant eigen value and corresponding
eigen vector of a matrix ?
a) Newton’s Raphson b) Power method
c) Gauss elimination d) Jacobi’s method

3 th
6) The number of strips required in Simpson’s rule is a
8
a) multiple of 2 b) multiple of 4 c) multiple of 6 d) multiple of 3
P.T.O.
SLR-TX – 326 -2- *SLRTX326*
1
7) If f(0) = 1, f(0.5) = 0.8, f(1) = 0.5 and h = 0.5 then by Trapezoidal rule the value of ∫ f(x) dx
is 0

a) 0.775 b) 1.55 c) 3.10 d) 0.155


8) Consider the fuzzy sets
0.4 0.2 0.5 0.4 1
A= + + + +
x y z u v
0.3 1 0.5 0.6 0.3
B= + + + +
x y z u v
A ∩B =

a) 2.5 b) 2.3 c) 1.7 d) 3.6
9) The α – cut of fuzzy set defined by
π
tan x 0≤x≤
A( x ) = 4 is given by
0 otherwise
π π π
a) [tan−1 α , ] b) (tan−1 α , ] c) (cot −1 α , ] d) [0 , tan−1 α)
4 4 4
10) Which of the following is not true ?
A ∩B α α A ∩B
a) S(B, A ) = b) A = ∑ c) B = ∑ d) S(A, B) =
B α α A α αB B
11) The α-cut of any fuzzy set is
a) subsethood b) fuzzy set c) ordinary set d) fuzzy number
12) Which of the following is true ? (A | B) (x) =
– – – –
a) (A ∩ B) (x) b) (A ∩ B) (x) c) (A ∩ B) (x) d) (A ∩ B ) (x)
13) For maximization LP model, the simplex method is terminated when all values.
a) zj – cj ≥ 0 b) zj – cj ≤ 0 c) zj – cj = 0 d) zj ≤ 0
14) If there are n workers and n jobs, there would be
a) n solutions b) n ! solutions
c) (n – 1) ! solutions d) (n !)n solutions

____________

Set P
*SLRTX326* -3- SLR-TX – 326
Seat
No.
S.E. (CSE) (Part – II) (CBCS) Examination, 2018
Applied Mathematics – II (New)
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Use of calculator is allowed.

SECTION – I

2. Solve any three from the following : (3×3=9)


a) Find a positive real root of the equation xlog10x = 1.2 by False position method correct
to three decimal places.
b) Using Newton’s Raphson iterative formula, find approximate value of 29 correct to
four decimal places.
c) Using Gauss elimination method solve the equation
x + 2y + 3z – u = 10, 2x + 3y – 3z – u = 1
2x – y + 2z + 3u = 7, 3x + 2y – 4z + 3u = 2.
d) Apply Gauss seidal iteration method to solve the equations 20x + y – 2z = 17,
3x + 20y – z = – 18, 2x – 3y + 20z = 25 (perform three iterations).
0 .5
 x  rd
1 rule taking h = 0.125.
e) Evaluate ∫  sin x 
 
dx using simpson’s
3
0

3. Solve any three from the following : (3×3=9)


2 4
1
a) Evaluate ∫∫ (x + y )2
dxdy , taking h = k = 0.5 by Trapezoidal rule.
1 3 5 .2
b) Evaluate the integral ∫ loge (x) dx using Weddle’s rule.
4
4 2 
c) Find the largest eigen value and corresponding eigen vector of a matrix   by
 1 3
 =  0 
using power method, taking x 0  1 as initial eigen vector (Perform five iterations).
 
d) Find a positive real root of the equation xex – 2 = 0 correct to three places of decimals
using Newton’s Raphson method.
e) Solve the following simultaneous equations by Jordan method.
x + 2y + z = 3, 2x + 3y + 3z = 10, 3x – y + 2z = 13.

Set P
SLR-TX – 326 -4- *SLRTX326*

4. Solve any two from the following : 10


a) Solve the system of non-linear equations x2 + y = 11, y2 + x = 7 with x0 = 3.5, y0 = – 1.8
by Newton’s Raphson method (in two iteration).
2 1
b) Evaluate ∫ 0 x2 + 4 dx by Trapezoidal rule with h = 0.5 and h = 0.25, then improve the
value of integration by Romberg’s method.
c) Solve the following system by Factorization method x + y + z = 1, 4x + 3y – z = 6,
3x + 5y + 3z = 4.

Section – II

5. Attempt any three from the following : (3×3=9)


a) Solve the following equation A + X = B where A and B are fuzzy numbers given as
0 .1 0 .6 0 .9 1 0 .4 0 .1
A (x) = + + + + +
[0, 1) [1, 2) [2, 3) 3 (3, 4] (4, 5]

0.1 0.2 0.6 0.7 0 .9 1 0 .4 0.4 0. 1


B (x) = + + + + + + + +
[0, 1) [1, 2) [2, 3) [3, 4) [4, 5) 5 (5,, 6] (6, 7] (7, 8]

b) Calculate the following fuzzy operations on the intervals


i) [– 1, 2] – [1, 3]
[ − 4, 6]
ii)
[2, 4]
iii) [– 3, 4]  [– 3, 5]
0.5 0.8 0.92 0.36 0.25
c) For the given fuzzy set. A = + + + + Find special fuzzy set for
x1 x2 x3 x4 x5
α = 0.8, 0.25, 0.5.
d) Define the following :

i) Support of a fuzzy set

ii) Height of a fuzzy set

iii) Equilibrium point.


e) Max Z = 7x1 + 5x2
Subject to
– x1 – 2x2 ≥ – 6
4x1 + 3x2 ≤ 12
x1, x2 ≥ 0
Solve by using simplex method.
Set P
*SLRTX326* -5- SLR-TX – 326
6. Attempt any three from the following. (3×3=9)
a) Find the optimal solution for the assignment with following cost matrix .

Persons
1 2 3 4
A 10 12 19 11
B 5 10 7 8
Tasks
C 12 14 13 11
D 8 15 11 9
b) If A, B are two fuzzy numbers given by membership function below
x −1
A( x ) = 1< x ≤ 4 B (x) = 0 x > 7, x ≤ 1
3
7−x x−7
= 4<x≤7 = 7 < x ≤ 10
3 13
13 − x
= 0 otherwise = 10 < x ≤ 13
13
Find α B – A.


c) Find strong α-cut for the following fuzzy set defined on universal set X = [ 0, 10] by the
x
membership function A(x ) = for α = 0.2, 0.8, 1.
x+2
d) If X = {0, 1, 2, 3, 4} is a universal set given A, B, C are the three fuzzy sets defined on X
by membership function
1 1 1
A( x ) = , B(x) = , C(x ) =
1 + 20 x 1
(1 + 10x )2
(1 + 10 x ) 2

then find scalar cardinality of A, B, C.

e) Given fuzzy set A defined on universal set X = {–3, –2, –1, 0, 1, 2, 3, 4, 5} by membership
12 − x
function A(x ) = and f(x) = x2 + 2 is a crisp function ∀x ∈ x then by using extension
15
principle find f(A).

7. Attempt any two from the followings : (2×5=10)

a) For given fuzzy number find MIN (A, B) where

x−2
A( x ) = 2<x≤5 B(x ) = x − 3 3 < x ≤ 4
3
7−x 9−x
= 5<x≤7 = 4<x≤9
2 5
=0 otherwise = 0 otherwise
Set P
SLR-TX – 326 -6- *SLRTX326*
b) Use simplex method to
Minimize z = x2 – 3x3 + 2x5
Subject to the constraints
3x2 – x3 + 2x5 ≤ 7, –2x2 + 4x3 ≤ 12
– 4x2 + 3x3 + 8x5 ≤ 10

x2 ≥ 0, x3 ≥ 0 and x5 ≥ 0
c) Let A and B are two fuzzy numbers with membership function given by
x −1
A( x ) = 1< x ≤ 4
3
7−x
= 4<x≤7
3
= 0 x > 7, x ≤ 1

B(x ) = 0 x ≤ 7, x > 13
x−7
= 7 < x ≤ 10
3
13 − x
= 10 < x ≤ 13
13

Calculate fuzzy number A.B.

___________

Set P
*SLRTX326* SLR-TX – 326
Seat
No. Set Q
S.E. (CSE) (Part – II) (CBCS) Examination, 2018
Applied Mathematics – II (New)
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to the right indicate full marks.
4) Use of calculator is allowed.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Consider the fuzzy sets
0.4 0.2 0.5 0.4 1
A= + + + +
x y z u v
0.3 1 0.5 0.6 0.3
B= + + + +
x y z u v
A ∩B =

a) 2.5 b) 2.3 c) 1.7 d) 3.6
2) The α – cut of fuzzy set defined by
π
tan x 0≤x≤
A( x ) = 4 is given by
0 otherwise
π π π
a) [tan−1 α , ] b) (tan−1 α , ] c) (cot −1 α , ] d) [0 , tan−1 α)
4 4 4
3) Which of the following is not true ?
A ∩B α α A ∩B
a) S(B, A ) = b) A = ∑ c) B = ∑ d) S(A, B) =
B α αA α αB B
4) The α-cut of any fuzzy set is
a) subsethood b) fuzzy set c) ordinary set d) fuzzy number
P.T.O.
SLR-TX – 326 -2- *SLRTX326*
5) Which of the following is true ? (A | B) (x) =
– – – –
a) (A ∩ B) (x) b) (A ∩ B) (x) c) (A ∩ B) (x) d) (A ∩ B ) (x)
6) For maximization LP model, the simplex method is terminated when all values.
a) zj – cj ≥ 0 b) zj – cj ≤ 0 c) zj – cj = 0 d) zj ≤ 0
7) If there are n workers and n jobs, there would be
a) n solutions b) n ! solutions
c) (n – 1) ! solutions d) (n !)n solutions
8) The order of convergence in Newton’s Raphson method is
a) 1.6 b) 2 c) 1.5 d) 3
9) In solving algebraic and transcendental equation f(x) = 0, which of the following method
is called method chord ?
a) False position b) Newton’s Raphson
1rd
c) Power method d) Simpson’s
3
10) The interval in which a positive real root of the equation x3 – 4x – 9 = 0 lies is
a) (3, 4) b) (0, 1) c) (1, 2) d) (2, 3)
11) In solving simultaneous linear equation Ax = B by Jordan method, the coefficient matrix
A reduced to
a) Lower triangular matrix b) Upper triangular matrix
c) Diagonal matrix d) Null matrix
12) Which of the following method is used to find dominant eigen value and corresponding
eigen vector of a matrix ?
a) Newton’s Raphson b) Power method
c) Gauss elimination d) Jacobi’s method
th
3
13) The number of strips required in Simpson’s rule is a
8
a) multiple of 2 b) multiple of 4 c) multiple of 6 d) multiple of 3
1
14) If f(0) = 1, f(0.5) = 0.8, f(1) = 0.5 and h = 0.5 then by Trapezoidal rule the value of ∫ f(x) dx
is 0
a) 0.775 b) 1.55 c) 3.10 d) 0.155

____________

Set Q
*SLRTX326* -3- SLR-TX – 326
Seat
No.
S.E. (CSE) (Part – II) (CBCS) Examination, 2018
Applied Mathematics – II (New)
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Use of calculator is allowed.

SECTION – I

2. Solve any three from the following : (3×3=9)


a) Find a positive real root of the equation xlog10x = 1.2 by False position method correct
to three decimal places.
b) Using Newton’s Raphson iterative formula, find approximate value of 29 correct to
four decimal places.
c) Using Gauss elimination method solve the equation
x + 2y + 3z – u = 10, 2x + 3y – 3z – u = 1
2x – y + 2z + 3u = 7, 3x + 2y – 4z + 3u = 2.
d) Apply Gauss seidal iteration method to solve the equations 20x + y – 2z = 17,
3x + 20y – z = – 18, 2x – 3y + 20z = 25 (perform three iterations).
0 .5
 x  rd
1 rule taking h = 0.125.
e) Evaluate ∫  sin x  dx using simpson’s
  3
0

3. Solve any three from the following : (3×3=9)


2 4
1
a) Evaluate ∫∫ (x + y )2
dxdy , taking h = k = 0.5 by Trapezoidal rule.
1 3 5 .2
b) Evaluate the integral ∫ loge (x) dx using Weddle’s rule.
4
4 2 
c) Find the largest eigen value and corresponding eigen vector of a matrix  by
 1 3 
using power method, taking x  = 0  as initial eigen vector (Perform five iterations).
0  1
 
d) Find a positive real root of the equation xex – 2 = 0 correct to three places of decimals
using Newton’s Raphson method.
e) Solve the following simultaneous equations by Jordan method.
x + 2y + z = 3, 2x + 3y + 3z = 10, 3x – y + 2z = 13.

Set Q
SLR-TX – 326 -4- *SLRTX326*

4. Solve any two from the following : 10


a) Solve the system of non-linear equations x2 + y = 11, y2 + x = 7 with x0 = 3.5, y0 = – 1.8
by Newton’s Raphson method (in two iteration).
2 1
b) Evaluate ∫ 0 x2 + 4 dx by Trapezoidal rule with h = 0.5 and h = 0.25, then improve the
value of integration by Romberg’s method.
c) Solve the following system by Factorization method x + y + z = 1, 4x + 3y – z = 6,
3x + 5y + 3z = 4.

Section – II

5. Attempt any three from the following : (3×3=9)


a) Solve the following equation A + X = B where A and B are fuzzy numbers given as
0 .1 0 .6 0 .9 1 0 .4 0 .1
A (x) = + + + + +
[0, 1) [1, 2) [2, 3) 3 (3, 4] (4, 5]

0.1 0.2 0.6 0.7 0 .9 1 0 .4 0.4 0. 1


B (x) = + + + + + + + +
[0, 1) [1, 2) [2, 3) [3, 4) [4, 5) 5 (5,, 6] (6, 7] (7, 8]

b) Calculate the following fuzzy operations on the intervals


i) [– 1, 2] – [1, 3]
[ − 4, 6]
ii)
[2, 4]
iii) [– 3, 4]  [– 3, 5]
0.5 0.8 0.92 0.36 0.25
c) For the given fuzzy set. A = + + + + Find special fuzzy set for
x1 x2 x3 x4 x5
α = 0.8, 0.25, 0.5.
d) Define the following :

i) Support of a fuzzy set

ii) Height of a fuzzy set

iii) Equilibrium point.


e) Max Z = 7x1 + 5x2
Subject to
– x1 – 2x2 ≥ – 6
4x1 + 3x2 ≤ 12
x1, x2 ≥ 0
Solve by using simplex method.
Set Q
*SLRTX326* -5- SLR-TX – 326
6. Attempt any three from the following. (3×3=9)
a) Find the optimal solution for the assignment with following cost matrix .

Persons
1 2 3 4
A 10 12 19 11
B 5 10 7 8
Tasks
C 12 14 13 11
D 8 15 11 9
b) If A, B are two fuzzy numbers given by membership function below
x −1
A( x ) = 1< x ≤ 4 B (x) = 0 x > 7, x ≤ 1
3
7−x x−7
= 4<x≤7 = 7 < x ≤ 10
3 13
13 − x
=0 otherwise = 10 < x ≤ 13
13
Find α B – A.


c) Find strong α-cut for the following fuzzy set defined on universal set X = [ 0, 10] by the
x
membership function A(x ) = for α = 0.2, 0.8, 1.
x+2
d) If X = {0, 1, 2, 3, 4} is a universal set given A, B, C are the three fuzzy sets defined on X
by membership function
1 1 1
A( x ) = , B(x) = , C(x ) =
1 + 20 x 1
(1 + 10x )2
(1 + 10 x ) 2

then find scalar cardinality of A, B, C.

e) Given fuzzy set A defined on universal set X = {–3, –2, –1, 0, 1, 2, 3, 4, 5} by membership
12 − x
function A(x ) = and f(x) = x2 + 2 is a crisp function ∀x ∈ x then by using extension
15
principle find f(A).

7. Attempt any two from the followings : (2×5=10)

a) For given fuzzy number find MIN (A, B) where

x−2
A( x ) = 2<x≤5 B(x ) = x − 3 3 < x ≤ 4
3
7−x 9−x
= 5<x≤7 = 4<x≤9
2 5
=0 otherwise = 0 otherwise
Set Q
SLR-TX – 326 -6- *SLRTX326*
b) Use simplex method to
Minimize z = x2 – 3x3 + 2x5
Subject to the constraints
3x2 – x3 + 2x5 ≤ 7, –2x2 + 4x3 ≤ 12
– 4x2 + 3x3 + 8x5 ≤ 10

x2 ≥ 0, x3 ≥ 0 and x5 ≥ 0
c) Let A and B are two fuzzy numbers with membership function given by
x −1
A( x ) = 1< x ≤ 4
3
7−x
= 4<x≤7
3
= 0 x > 7, x ≤ 1

B(x ) = 0 x ≤ 7, x > 13
x−7
= 7 < x ≤ 10
3
13 − x
= 10 < x ≤ 13
13

Calculate fuzzy number A.B.

___________

Set Q
*SLRTX326* SLR-TX – 326
Seat
No. Set R
S.E. (CSE) (Part – II) (CBCS) Examination, 2018
Applied Mathematics – II (New)
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to the right indicate full marks.
4) Use of calculator is allowed.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)

1) Which of the following method is used to find dominant eigen value and corresponding
eigen vector of a matrix ?
a) Newton’s Raphson b) Power method
c) Gauss elimination d) Jacobi’s method
th
3
2) The number of strips required in Simpson’s rule is a
8
a) multiple of 2 b) multiple of 4 c) multiple of 6 d) multiple of 3
1
3) If f(0) = 1, f(0.5) = 0.8, f(1) = 0.5 and h = 0.5 then by Trapezoidal rule the value of ∫ f(x) dx
is 0

a) 0.775 b) 1.55 c) 3.10 d) 0.155


4) Consider the fuzzy sets
0.4 0.2 0.5 0.4 1
A= + + + +
x y z u v
0.3 1 0.5 0.6 0.3
B= + + + +
x y z u v
A ∩B =

a) 2.5 b) 2.3 c) 1.7 d) 3.6
P.T.O.
SLR-TX – 326 -2- *SLRTX326*
5) The α – cut of fuzzy set defined by
π
tan x 0≤x≤
A( x ) = 4 is given by
0 otherwise
π π π
a) [tan−1 α , ] b) (tan−1 α , ] c) (cot −1 α , ] d) [0 , tan−1 α)
4 4 4
6) Which of the following is not true ?
A ∩B α α A ∩B
a) S(B, A ) = b) A = ∑ c) B = ∑ d) S(A, B) =
B α αA α αB B
7) The α-cut of any fuzzy set is
a) subsethood b) fuzzy set c) ordinary set d) fuzzy number
8) Which of the following is true ? (A | B) (x) =
– – – –
a) (A ∩ B) (x) b) (A ∩ B) (x) c) (A ∩ B) (x) d) (A ∩ B ) (x)
9) For maximization LP model, the simplex method is terminated when all values.
a) zj – cj ≥ 0 b) zj – cj ≤ 0 c) zj – cj = 0 d) zj ≤ 0
10) If there are n workers and n jobs, there would be
a) n solutions b) n ! solutions
c) (n – 1) ! solutions d) (n !)n solutions
11) The order of convergence in Newton’s Raphson method is
a) 1.6 b) 2 c) 1.5 d) 3
12) In solving algebraic and transcendental equation f(x) = 0, which of the following method
is called method chord ?
a) False position b) Newton’s Raphson
1rd
c) Power method d) Simpson’s
3
13) The interval in which a positive real root of the equation x3 – 4x – 9 = 0 lies is
a) (3, 4) b) (0, 1) c) (1, 2) d) (2, 3)
14) In solving simultaneous linear equation Ax = B by Jordan method, the coefficient matrix
A reduced to
a) Lower triangular matrix b) Upper triangular matrix
c) Diagonal matrix d) Null matrix

____________

Set R
*SLRTX326* -3- SLR-TX – 326
Seat
No.
S.E. (CSE) (Part – II) (CBCS) Examination, 2018
Applied Mathematics – II (New)
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Use of calculator is allowed.

SECTION – I

2. Solve any three from the following : (3×3=9)


a) Find a positive real root of the equation xlog10x = 1.2 by False position method correct
to three decimal places.
b) Using Newton’s Raphson iterative formula, find approximate value of 29 correct to
four decimal places.
c) Using Gauss elimination method solve the equation
x + 2y + 3z – u = 10, 2x + 3y – 3z – u = 1
2x – y + 2z + 3u = 7, 3x + 2y – 4z + 3u = 2.
d) Apply Gauss seidal iteration method to solve the equations 20x + y – 2z = 17,
3x + 20y – z = – 18, 2x – 3y + 20z = 25 (perform three iterations).
0 .5
 x  rd
1 rule taking h = 0.125.
e) Evaluate ∫  sin x 
 
dx using simpson’s
3
0

3. Solve any three from the following : (3×3=9)


2 4
1
a) Evaluate ∫∫ (x + y )2
dxdy , taking h = k = 0.5 by Trapezoidal rule.
1 3 5 .2
b) Evaluate the integral ∫ loge (x) dx using Weddle’s rule.
4
4 2 
c) Find the largest eigen value and corresponding eigen vector of a matrix   by
 1 3
 =  0 
using power method, taking x 0  1 as initial eigen vector (Perform five iterations).
 
d) Find a positive real root of the equation xex – 2 = 0 correct to three places of decimals
using Newton’s Raphson method.
e) Solve the following simultaneous equations by Jordan method.
x + 2y + z = 3, 2x + 3y + 3z = 10, 3x – y + 2z = 13.

Set R
SLR-TX – 326 -4- *SLRTX326*

4. Solve any two from the following : 10


a) Solve the system of non-linear equations x2 + y = 11, y2 + x = 7 with x0 = 3.5, y0 = – 1.8
by Newton’s Raphson method (in two iteration).
2 1
b) Evaluate ∫ 0 x2 + 4 dx by Trapezoidal rule with h = 0.5 and h = 0.25, then improve the
value of integration by Romberg’s method.
c) Solve the following system by Factorization method x + y + z = 1, 4x + 3y – z = 6,
3x + 5y + 3z = 4.

Section – II

5. Attempt any three from the following : (3×3=9)


a) Solve the following equation A + X = B where A and B are fuzzy numbers given as
0 .1 0 .6 0 .9 1 0 .4 0 .1
A (x) = + + + + +
[0, 1) [1, 2) [2, 3) 3 (3, 4] (4, 5]

0.1 0.2 0.6 0.7 0 .9 1 0 .4 0.4 0. 1


B (x) = + + + + + + + +
[0, 1) [1, 2) [2, 3) [3, 4) [4, 5) 5 (5,, 6] (6, 7] (7, 8]

b) Calculate the following fuzzy operations on the intervals


i) [– 1, 2] – [1, 3]
[ − 4, 6]
ii)
[2, 4]
iii) [– 3, 4]  [– 3, 5]
0.5 0.8 0.92 0.36 0.25
c) For the given fuzzy set. A = + + + + Find special fuzzy set for
x1 x2 x3 x4 x5
α = 0.8, 0.25, 0.5.
d) Define the following :

i) Support of a fuzzy set

ii) Height of a fuzzy set

iii) Equilibrium point.


e) Max Z = 7x1 + 5x2
Subject to
– x1 – 2x2 ≥ – 6
4x1 + 3x2 ≤ 12
x1, x2 ≥ 0
Solve by using simplex method.
Set R
*SLRTX326* -5- SLR-TX – 326
6. Attempt any three from the following. (3×3=9)
a) Find the optimal solution for the assignment with following cost matrix .

Persons
1 2 3 4
A 10 12 19 11
B 5 10 7 8
Tasks
C 12 14 13 11
D 8 15 11 9
b) If A, B are two fuzzy numbers given by membership function below
x −1
A( x ) = 1< x ≤ 4 B (x) = 0 x > 7, x ≤ 1
3
7−x x−7
= 4<x≤7 = 7 < x ≤ 10
3 13
13 − x
=0 otherwise = 10 < x ≤ 13
13
Find α B – A.


c) Find strong α-cut for the following fuzzy set defined on universal set X = [ 0, 10] by the
x
membership function A(x ) = for α = 0.2, 0.8, 1.
x+2
d) If X = {0, 1, 2, 3, 4} is a universal set given A, B, C are the three fuzzy sets defined on X
by membership function
1 1 1
A( x ) = , B(x) = , C(x ) =
1 + 20 x 1
(1 + 10x )2
(1 + 10 x ) 2

then find scalar cardinality of A, B, C.

e) Given fuzzy set A defined on universal set X = {–3, –2, –1, 0, 1, 2, 3, 4, 5} by membership
12 − x
function A(x ) = and f(x) = x2 + 2 is a crisp function ∀x ∈ x then by using extension
15
principle find f(A).

7. Attempt any two from the followings : (2×5=10)

a) For given fuzzy number find MIN (A, B) where

x−2
A( x ) = 2<x≤5 B(x ) = x − 3 3 < x ≤ 4
3
7−x 9−x
= 5<x≤7 = 4<x≤9
2 5
=0 otherwise = 0 otherwise
Set R
SLR-TX – 326 -6- *SLRTX326*
b) Use simplex method to
Minimize z = x2 – 3x3 + 2x5
Subject to the constraints
3x2 – x3 + 2x5 ≤ 7, –2x2 + 4x3 ≤ 12
– 4x2 + 3x3 + 8x5 ≤ 10

x2 ≥ 0, x3 ≥ 0 and x5 ≥ 0
c) Let A and B are two fuzzy numbers with membership function given by
x −1
A( x ) = 1< x ≤ 4
3
7−x
= 4<x≤7
3
= 0 x > 7, x ≤ 1

B(x ) = 0 x ≤ 7, x > 13
x−7
= 7 < x ≤ 10
3
13 − x
= 10 < x ≤ 13
13

Calculate fuzzy number A.B.

___________

Set R
*SLRTX326* SLR-TX – 326
Seat
No. Set S
S.E. (CSE) (Part – II) (CBCS) Examination, 2018
Applied Mathematics – II (New)
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to the right indicate full marks.
4) Use of calculator is allowed.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)

1) Which of the following is not true ?


A ∩B α α A ∩B
a) S(B, A ) = b) A = ∑ c) B = ∑ d) S(A, B) =
B α α A α αB B
2) The α-cut of any fuzzy set is
a) subsethood b) fuzzy set c) ordinary set d) fuzzy number
3) Which of the following is true ? (A | B) (x) =
– – – –
a) (A ∩ B) (x) b) (A ∩ B) (x) c) (A ∩ B) (x) d) (A ∩ B ) (x)
4) For maximization LP model, the simplex method is terminated when all values.
a) zj – cj ≥ 0 b) zj – cj ≤ 0 c) zj – cj = 0 d) zj ≤ 0
5) If there are n workers and n jobs, there would be
a) n solutions b) n ! solutions
c) (n – 1) ! solutions d) (n !)n solutions
6) The order of convergence in Newton’s Raphson method is
a) 1.6 b) 2 c) 1.5 d) 3
7) In solving algebraic and transcendental equation f(x) = 0, which of the following method
is called method chord ?
a) False position b) Newton’s Raphson
rd
1
c) Power method d) Simpson’s
3
P.T.O.
SLR-TX – 326 -2- *SLRTX326*
8) The interval in which a positive real root of the equation x3 – 4x – 9 = 0 lies is
a) (3, 4) b) (0, 1) c) (1, 2) d) (2, 3)
9) In solving simultaneous linear equation Ax = B by Jordan method, the coefficient matrix
A reduced to
a) Lower triangular matrix b) Upper triangular matrix
c) Diagonal matrix d) Null matrix
10) Which of the following method is used to find dominant eigen value and corresponding
eigen vector of a matrix ?
a) Newton’s Raphson b) Power method
c) Gauss elimination d) Jacobi’s method
th
3
11) The number of strips required in Simpson’s rule is a
8
a) multiple of 2 b) multiple of 4 c) multiple of 6 d) multiple of 3
1
12) If f(0) = 1, f(0.5) = 0.8, f(1) = 0.5 and h = 0.5 then by Trapezoidal rule the value of ∫ f(x) dx
is 0

a) 0.775 b) 1.55 c) 3.10 d) 0.155


13) Consider the fuzzy sets
0.4 0.2 0.5 0.4 1
A= + + + +
x y z u v
0.3 1 0.5 0.6 0.3
B= + + + +
x y z u v
A ∩B =

a) 2.5 b) 2.3 c) 1.7 d) 3.6
14) The α – cut of fuzzy set defined by
π
tan x 0≤x≤
A( x ) = 4 is given by
0 otherwise
π π π
a) [tan−1 α , ] b) (tan−1 α , ] c) (cot −1 α , ] d) [0 , tan−1 α)
4 4 4

____________

Set S
*SLRTX326* -3- SLR-TX – 326
Seat
No.
S.E. (CSE) (Part – II) (CBCS) Examination, 2018
Applied Mathematics – II (New)
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Use of calculator is allowed.

SECTION – I

2. Solve any three from the following : (3×3=9)


a) Find a positive real root of the equation xlog10x = 1.2 by False position method correct
to three decimal places.
b) Using Newton’s Raphson iterative formula, find approximate value of 29 correct to
four decimal places.
c) Using Gauss elimination method solve the equation
x + 2y + 3z – u = 10, 2x + 3y – 3z – u = 1
2x – y + 2z + 3u = 7, 3x + 2y – 4z + 3u = 2.
d) Apply Gauss seidal iteration method to solve the equations 20x + y – 2z = 17,
3x + 20y – z = – 18, 2x – 3y + 20z = 25 (perform three iterations).
0 .5
 x  rd
1 rule taking h = 0.125.
e) Evaluate ∫  sin x  dx using simpson’s
  3
0

3. Solve any three from the following : (3×3=9)


2 4
1
a) Evaluate ∫∫ (x + y )2
dxdy , taking h = k = 0.5 by Trapezoidal rule.
1 3 5 .2
b) Evaluate the integral ∫ loge (x) dx using Weddle’s rule.
4
4 2 
c) Find the largest eigen value and corresponding eigen vector of a matrix  by
 1 3 
using power method, taking x  = 0  as initial eigen vector (Perform five iterations).
0  1
 
d) Find a positive real root of the equation xex – 2 = 0 correct to three places of decimals
using Newton’s Raphson method.
e) Solve the following simultaneous equations by Jordan method.
x + 2y + z = 3, 2x + 3y + 3z = 10, 3x – y + 2z = 13.

Set S
SLR-TX – 326 -4- *SLRTX326*

4. Solve any two from the following : 10


a) Solve the system of non-linear equations x2 + y = 11, y2 + x = 7 with x0 = 3.5, y0 = – 1.8
by Newton’s Raphson method (in two iteration).
2 1
b) Evaluate ∫ 0 x2 + 4 dx by Trapezoidal rule with h = 0.5 and h = 0.25, then improve the
value of integration by Romberg’s method.
c) Solve the following system by Factorization method x + y + z = 1, 4x + 3y – z = 6,
3x + 5y + 3z = 4.

Section – II

5. Attempt any three from the following : (3×3=9)


a) Solve the following equation A + X = B where A and B are fuzzy numbers given as
0 .1 0 .6 0 .9 1 0 .4 0 .1
A (x) = + + + + +
[0, 1) [1, 2) [2, 3) 3 (3, 4] (4, 5]

0.1 0.2 0.6 0.7 0 .9 1 0 .4 0.4 0. 1


B (x) = + + + + + + + +
[0, 1) [1, 2) [2, 3) [3, 4) [4, 5) 5 (5,, 6] (6, 7] (7, 8]

b) Calculate the following fuzzy operations on the intervals


i) [– 1, 2] – [1, 3]
[ − 4, 6]
ii)
[2, 4]
iii) [– 3, 4]  [– 3, 5]
0.5 0.8 0.92 0.36 0.25
c) For the given fuzzy set. A = + + + + Find special fuzzy set for
x1 x2 x3 x4 x5
α = 0.8, 0.25, 0.5.
d) Define the following :

i) Support of a fuzzy set

ii) Height of a fuzzy set

iii) Equilibrium point.


e) Max Z = 7x1 + 5x2
Subject to
– x1 – 2x2 ≥ – 6
4x1 + 3x2 ≤ 12
x1, x2 ≥ 0
Solve by using simplex method.
Set S
*SLRTX326* -5- SLR-TX – 326
6. Attempt any three from the following. (3×3=9)
a) Find the optimal solution for the assignment with following cost matrix .

Persons
1 2 3 4
A 10 12 19 11
B 5 10 7 8
Tasks
C 12 14 13 11
D 8 15 11 9
b) If A, B are two fuzzy numbers given by membership function below
x −1
A( x ) = 1< x ≤ 4 B (x) = 0 x > 7, x ≤ 1
3
7−x x−7
= 4<x≤7 = 7 < x ≤ 10
3 13
13 − x
=0 otherwise = 10 < x ≤ 13
13
Find α B – A.


c) Find strong α-cut for the following fuzzy set defined on universal set X = [ 0, 10] by the
x
membership function A(x ) = for α = 0.2, 0.8, 1.
x+2
d) If X = {0, 1, 2, 3, 4} is a universal set given A, B, C are the three fuzzy sets defined on X
by membership function
1 1 1
A( x ) = , B(x) = , C(x ) =
1 + 20 x 1
(1 + 10x )2
(1 + 10 x ) 2

then find scalar cardinality of A, B, C.

e) Given fuzzy set A defined on universal set X = {–3, –2, –1, 0, 1, 2, 3, 4, 5} by membership
12 − x
function A(x ) = and f(x) = x2 + 2 is a crisp function ∀x ∈ x then by using extension
15
principle find f(A).

7. Attempt any two from the followings : (2×5=10)

a) For given fuzzy number find MIN (A, B) where

x−2
A( x ) = 2<x≤5 B(x ) = x − 3 3 < x ≤ 4
3
7−x 9−x
= 5<x≤7 = 4<x≤9
2 5
=0 otherwise = 0 otherwise
Set S
SLR-TX – 326 -6- *SLRTX326*
b) Use simplex method to
Minimize z = x2 – 3x3 + 2x5
Subject to the constraints
3x2 – x3 + 2x5 ≤ 7, –2x2 + 4x3 ≤ 12
– 4x2 + 3x3 + 8x5 ≤ 10

x2 ≥ 0, x3 ≥ 0 and x5 ≥ 0
c) Let A and B are two fuzzy numbers with membership function given by
x −1
A( x ) = 1< x ≤ 4
3
7−x
= 4<x≤7
3
= 0 x > 7, x ≤ 1

B(x ) = 0 x ≤ 7, x > 13
x−7
= 7 < x ≤ 10
3
13 − x
= 10 < x ≤ 13
13

Calculate fuzzy number A.B.

___________

Set S
*SLRTX327* SLR-TX – 327
Seat
No. Set P
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
theory of computation

Day and Date : Tuesday, 20-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes


in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) How many strings of length less than 4 contains the language described by the
regular expression (x + y)*y(a + ab)* ?
a) 7 b) 10 c) 12 d) 11
2) The behavior of a NFA can be stimulated by DFA
a) always b) sometimes c) never d) depend on NFA
3) Context free language can be recognized by
a) Finite state automaton b) Linear bounded automaton
c) Pushdown automaton d) Both b and c
4) An FSM can be used to add two given integers. This remark is
a) True b) False
c) May be true d) None of the above
5) Given the language L = {ab, aa, baa}, which of the following strings are in L* ?
1) abaabaaabaa 2) aaaabaaaa
3) baaaaabaaaab 4) baaaaabaa
a) 1, 2 and 3 b) 2, 3 and 4 c) 1, 2 and 4 d) 1, 3 and 4
6) An instantaneous description of turing machine consists of
a) Present state and input to be processed
b) Present state and entire input to be processed
c) Present input only
d) None of these
P.T.O.
SLR-TX – 327 -2- *SLRTX327*
7) Which of the following is true for the language {ap | p is prime} ?
a) It is not accepted by a Turing Machine
b) It is regular but not context-free
c) It is context-free but not regular
d) It is neither regular nor context-free, but accepted by a Turing machine
8) Consider the following grammar.
S –> AB
A –> a
A –> BaB
B –> bbA
Which of the following is false ?
a) No string produced by the grammar has four consecutive b s
b) No string produced by the grammar has three consecutive a s
c) No string produced by the grammar has an odd number of consecutive b s
d) The length of every string produced by the grammar is even
9) The regular expression corresponding to the language L where L = {x ∈ {0, 1}* | x
ends with 1 and does not contain substring 00 } is
a) (1 + 01)*(10 + 01) b) (1 + 01)* 01 c) (1 + 01)*(1 + 01) d) (10 + 01)* 01
10) If a CFG has a null production, then it is possible to construct another CFG accepting
the same language without null production
a) True b) False
11) PDA can be represented with the help of
a) Instantaneous description b) Transition diagram
c) Transition table d) All of these
12) Which type of symbols contain in the stack of PDA ?
a) Variable b) Terminal c) Both a and b d) None of these
13) The language which is generated by the grammar S –> aSa I bSb I a I b over the
alphabet {a, b} is the set of
a) Strings that begin and end with the same symbol
b) All odd and even length palindromes
c) All odd length palindromes
d) All even length palindromes
14) Which of the following statement is false ?
a) Context free language is the subset of context sensitive language
b) Regular language is the subset of context sensitive language
c) Recursively enumerable language is the super set of regular language
d) Context sensitive language is a subset of context free language
__________________
Set P
*SLRTX327* -3- SLR-TX – 327
Seat
No.
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
theory of computation

Day and Date : Tuesday, 20-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Answer any three : (4×3=12)
a) Differentiate between DFA and NFA.
b) Define ^ - closure with example.
c) In each case, what is language generated by context free grammar with
indicated grammar with the indicated productions
1) S ->aSa|bSb|a|b 2) S ->SaS|b.
d) Find Context Free Grammar, generating each of these language
{ai bj ck | j = i + k}.

3. Solve any one : 8


a) Draw DFA for regular expression
1) ab (a + b)*ab 2) (0+1)*(00+11).
b) Consider following NFA – ^


Find whether particular string is accepted or not
1) ∂*(q0,010) 2) ∂*(q0,11) 3) ∂*(q0,101) 4) ∂*(q0,010)

Set P
SLR-TX – 327 -4- *SLRTX327*
4. Minimize the following Finite Automata 8

Section – II

5. Answer any three. (4×3=12)


a) Explain Universal Turing machine.
b) Define DPDA and compare with NPDA.
c) Explain Multitape Turing machine.
d) State and prove pumping lemma of CFL.

6. Solve any one. 8


a) Give transition table for PDA to recognize balanced strings of 2 types “( )” and “[ ]”.
b) Draw Turing machine to accept {a, b}*{aba} {a,b}*.

7. Design a PDA to accept the language having more number of a’s than b’s. 8

___________________

Set P
*SLRTX327* SLR-TX – 327
Seat
No. Set Q
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
theory of computation

Day and Date : Tuesday, 20-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes


in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Consider the following grammar.
S –> AB
A –> a
A –> BaB
B –> bbA
Which of the following is false ?
a) No string produced by the grammar has four consecutive b s
b) No string produced by the grammar has three consecutive a s
c) No string produced by the grammar has an odd number of consecutive b s
d) The length of every string produced by the grammar is even
2) The regular expression corresponding to the language L where L = {x ∈ {0, 1}* | x
ends with 1 and does not contain substring 00 } is
a) (1 + 01)*(10 + 01) b) (1 + 01)* 01 c) (1 + 01)*(1 + 01) d) (10 + 01)* 01
3) If a CFG has a null production, then it is possible to construct another CFG accepting
the same language without null production
a) True b) False
4) PDA can be represented with the help of
a) Instantaneous description b) Transition diagram
c) Transition table d) All of these
5) Which type of symbols contain in the stack of PDA ?
a) Variable b) Terminal c) Both a and b d) None of these
P.T.O.
SLR-TX – 327 -2- *SLRTX327*
6) The language which is generated by the grammar S –> aSa I bSb I a I b over the
alphabet {a, b} is the set of
a) Strings that begin and end with the same symbol
b) All odd and even length palindromes
c) All odd length palindromes
d) All even length palindromes
7) Which of the following statement is false ?
a) Context free language is the subset of context sensitive language
b) Regular language is the subset of context sensitive language
c) Recursively enumerable language is the super set of regular language
d) Context sensitive language is a subset of context free language
8) How many strings of length less than 4 contains the language described by the
regular expression (x + y)*y(a + ab)* ?
a) 7 b) 10 c) 12 d) 11
9) The behavior of a NFA can be stimulated by DFA
a) always b) sometimes c) never d) depend on NFA
10) Context free language can be recognized by
a) Finite state automaton b) Linear bounded automaton
c) Pushdown automaton d) Both b and c
11) An FSM can be used to add two given integers. This remark is
a) True b) False
c) May be true d) None of the above
12) Given the language L = {ab, aa, baa}, which of the following strings are in L* ?
1) abaabaaabaa 2) aaaabaaaa
3) baaaaabaaaab 4) baaaaabaa
a) 1, 2 and 3 b) 2, 3 and 4 c) 1, 2 and 4 d) 1, 3 and 4
13) An instantaneous description of turing machine consists of
a) Present state and input to be processed
b) Present state and entire input to be processed
c) Present input only
d) None of these
14) Which of the following is true for the language {ap | p is prime} ?
a) It is not accepted by a Turing Machine
b) It is regular but not context-free
c) It is context-free but not regular
d) It is neither regular nor context-free, but accepted by a Turing machine
__________________
Set Q
*SLRTX327* -3- SLR-TX – 327
Seat
No.
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
theory of computation

Day and Date : Tuesday, 20-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Answer any three : (4×3=12)
a) Differentiate between DFA and NFA.
b) Define ^ - closure with example.
c) In each case, what is language generated by context free grammar with
indicated grammar with the indicated productions
1) S ->aSa|bSb|a|b 2) S ->SaS|b.
d) Find Context Free Grammar, generating each of these language
{ai bj ck | j = i + k}.

3. Solve any one : 8


a) Draw DFA for regular expression
1) ab (a + b)*ab 2) (0+1)*(00+11).
b) Consider following NFA – ^


Find whether particular string is accepted or not
1) ∂*(q0,010) 2) ∂*(q0,11) 3) ∂*(q0,101) 4) ∂*(q0,010)

Set Q
SLR-TX – 327 -4- *SLRTX327*
4. Minimize the following Finite Automata 8

Section – II

5. Answer any three. (4×3=12)


a) Explain Universal Turing machine.
b) Define DPDA and compare with NPDA.
c) Explain Multitape Turing machine.
d) State and prove pumping lemma of CFL.

6. Solve any one. 8


a) Give transition table for PDA to recognize balanced strings of 2 types “( )” and “[ ]”.
b) Draw Turing machine to accept {a, b}*{aba} {a,b}*.

7. Design a PDA to accept the language having more number of a’s than b’s. 8

___________________

Set Q
*SLRTX327* SLR-TX – 327
Seat
No. Set R
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
theory of computation

Day and Date : Tuesday, 20-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes


in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Given the language L = {ab, aa, baa}, which of the following strings are in L* ?
1) abaabaaabaa 2) aaaabaaaa
3) baaaaabaaaab 4) baaaaabaa
a) 1, 2 and 3 b) 2, 3 and 4 c) 1, 2 and 4 d) 1, 3 and 4
2) An instantaneous description of turing machine consists of
a) Present state and input to be processed
b) Present state and entire input to be processed
c) Present input only
d) None of these
3) Which of the following is true for the language {ap | p is prime} ?
a) It is not accepted by a Turing Machine
b) It is regular but not context-free
c) It is context-free but not regular
d) It is neither regular nor context-free, but accepted by a Turing machine
4) Consider the following grammar.
S –> AB
A –> a
A –> BaB
B –> bbA
Which of the following is false ?
a) No string produced by the grammar has four consecutive b s
b) No string produced by the grammar has three consecutive a s
c) No string produced by the grammar has an odd number of consecutive b s
d) The length of every string produced by the grammar is even
P.T.O.
SLR-TX – 327 -2- *SLRTX327*
5) The regular expression corresponding to the language L where L = {x ∈ {0, 1}* | x
ends with 1 and does not contain substring 00 } is
a) (1 + 01)*(10 + 01) b) (1 + 01)* 01 c) (1 + 01)*(1 + 01) d) (10 + 01)* 01
6) If a CFG has a null production, then it is possible to construct another CFG accepting
the same language without null production
a) True b) False
7) PDA can be represented with the help of
a) Instantaneous description b) Transition diagram
c) Transition table d) All of these
8) Which type of symbols contain in the stack of PDA ?
a) Variable b) Terminal c) Both a and b d) None of these
9) The language which is generated by the grammar S –> aSa I bSb I a I b over the
alphabet {a, b} is the set of
a) Strings that begin and end with the same symbol
b) All odd and even length palindromes
c) All odd length palindromes
d) All even length palindromes
10) Which of the following statement is false ?
a) Context free language is the subset of context sensitive language
b) Regular language is the subset of context sensitive language
c) Recursively enumerable language is the super set of regular language
d) Context sensitive language is a subset of context free language
11) How many strings of length less than 4 contains the language described by the
regular expression (x + y)*y(a + ab)* ?
a) 7 b) 10 c) 12 d) 11
12) The behavior of a NFA can be stimulated by DFA
a) always b) sometimes c) never d) depend on NFA
13) Context free language can be recognized by
a) Finite state automaton b) Linear bounded automaton
c) Pushdown automaton d) Both b and c
14) An FSM can be used to add two given integers. This remark is
a) True b) False
c) May be true d) None of the above
__________________

Set R
*SLRTX327* -3- SLR-TX – 327
Seat
No.
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
theory of computation

Day and Date : Tuesday, 20-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Answer any three : (4×3=12)
a) Differentiate between DFA and NFA.
b) Define ^ - closure with example.
c) In each case, what is language generated by context free grammar with
indicated grammar with the indicated productions
1) S ->aSa|bSb|a|b 2) S ->SaS|b.
d) Find Context Free Grammar, generating each of these language
{ai bj ck | j = i + k}.

3. Solve any one : 8


a) Draw DFA for regular expression
1) ab (a + b)*ab 2) (0+1)*(00+11).
b) Consider following NFA – ^


Find whether particular string is accepted or not
1) ∂*(q0,010) 2) ∂*(q0,11) 3) ∂*(q0,101) 4) ∂*(q0,010)

Set R
SLR-TX – 327 -4- *SLRTX327*
4. Minimize the following Finite Automata 8

Section – II

5. Answer any three. (4×3=12)


a) Explain Universal Turing machine.
b) Define DPDA and compare with NPDA.
c) Explain Multitape Turing machine.
d) State and prove pumping lemma of CFL.

6. Solve any one. 8


a) Give transition table for PDA to recognize balanced strings of 2 types “( )” and “[ ]”.
b) Draw Turing machine to accept {a, b}*{aba} {a,b}*.

7. Design a PDA to accept the language having more number of a’s than b’s. 8

___________________

Set R
*SLRTX327* SLR-TX – 327
Seat
No. Set S
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
theory of computation

Day and Date : Tuesday, 20-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes


in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) If a CFG has a null production, then it is possible to construct another CFG accepting
the same language without null production
a) True b) False
2) PDA can be represented with the help of
a) Instantaneous description b) Transition diagram
c) Transition table d) All of these
3) Which type of symbols contain in the stack of PDA ?
a) Variable b) Terminal c) Both a and b d) None of these
4) The language which is generated by the grammar S –> aSa I bSb I a I b over the
alphabet {a, b} is the set of
a) Strings that begin and end with the same symbol
b) All odd and even length palindromes
c) All odd length palindromes
d) All even length palindromes
5) Which of the following statement is false ?
a) Context free language is the subset of context sensitive language
b) Regular language is the subset of context sensitive language
c) Recursively enumerable language is the super set of regular language
d) Context sensitive language is a subset of context free language
6) How many strings of length less than 4 contains the language described by the
regular expression (x + y)*y(a + ab)* ?
a) 7 b) 10 c) 12 d) 11

P.T.O.
SLR-TX – 327 -2- *SLRTX327*
7) The behavior of a NFA can be stimulated by DFA
a) always b) sometimes c) never d) depend on NFA
8) Context free language can be recognized by
a) Finite state automaton b) Linear bounded automaton
c) Pushdown automaton d) Both b and c
9) An FSM can be used to add two given integers. This remark is
a) True b) False
c) May be true d) None of the above
10) Given the language L = {ab, aa, baa}, which of the following strings are in L* ?
1) abaabaaabaa 2) aaaabaaaa
3) baaaaabaaaab 4) baaaaabaa
a) 1, 2 and 3 b) 2, 3 and 4 c) 1, 2 and 4 d) 1, 3 and 4
11) An instantaneous description of turing machine consists of
a) Present state and input to be processed
b) Present state and entire input to be processed
c) Present input only
d) None of these
12) Which of the following is true for the language {ap | p is prime} ?
a) It is not accepted by a Turing Machine
b) It is regular but not context-free
c) It is context-free but not regular
d) It is neither regular nor context-free, but accepted by a Turing machine
13) Consider the following grammar.
S –> AB
A –> a
A –> BaB
B –> bbA
Which of the following is false ?
a) No string produced by the grammar has four consecutive b s
b) No string produced by the grammar has three consecutive a s
c) No string produced by the grammar has an odd number of consecutive b s
d) The length of every string produced by the grammar is even
14) The regular expression corresponding to the language L where L = {x ∈ {0, 1}* | x
ends with 1 and does not contain substring 00 } is
a) (1 + 01)*(10 + 01) b) (1 + 01)* 01 c) (1 + 01)*(1 + 01) d) (10 + 01)* 01
__________________
Set S
*SLRTX327* -3- SLR-TX – 327
Seat
No.
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
theory of computation

Day and Date : Tuesday, 20-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Answer any three : (4×3=12)
a) Differentiate between DFA and NFA.
b) Define ^ - closure with example.
c) In each case, what is language generated by context free grammar with
indicated grammar with the indicated productions
1) S ->aSa|bSb|a|b 2) S ->SaS|b.
d) Find Context Free Grammar, generating each of these language
{ai bj ck | j = i + k}.

3. Solve any one : 8


a) Draw DFA for regular expression
1) ab (a + b)*ab 2) (0+1)*(00+11).
b) Consider following NFA – ^


Find whether particular string is accepted or not
1) ∂*(q0,010) 2) ∂*(q0,11) 3) ∂*(q0,101) 4) ∂*(q0,010)

Set S
SLR-TX – 327 -4- *SLRTX327*
4. Minimize the following Finite Automata 8

Section – II

5. Answer any three. (4×3=12)


a) Explain Universal Turing machine.
b) Define DPDA and compare with NPDA.
c) Explain Multitape Turing machine.
d) State and prove pumping lemma of CFL.

6. Solve any one. 8


a) Give transition table for PDA to recognize balanced strings of 2 types “( )” and “[ ]”.
b) Draw Turing machine to accept {a, b}*{aba} {a,b}*.

7. Design a PDA to accept the language having more number of a’s than b’s. 8

___________________

Set S
*SLRTX328* SLR-TX – 328

Seat
No. Set P
S.E. (Computer Science and Engineering) (Part – II) (New CBCS)
Examination, 2018
microprocessors
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : a) Figures in right indicates full marks.


b) Assume suitable data if necessary.
c) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
d) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


i) Address bus of 8085 is can transmit __________ bits.
a) 8 b) 16 c) 24 d) 32
ii) Data bus of 8085 is
a) bidirectional b) unidirectional
c) 16 bit d) 32 bit
iii) ____________ generate interrupt signal to microprocessor and receive
acknowledge.
a) priority resolver b) control logic
c) interrupt request register d) interrupt register
iv) How many modes 8255 can operate ?
a) two modes b) three modes
c) one mode d) six modes

P.T.O.
SLR-TX – 328 -2- *SLRTX328*

v) In 8086 microprocessor the following has the highest priority among all
type interrupts ?
a) NMI b) DNO c) Type 255 d) OVER FLOW
vi) What is the addressing mode used in instruction MOV M, C ?
a) Direct b) Indirect
c) Immediate d) None of the above
vii) Number of address lines required to interface 1 KB memory are
a) 10 b) 11 c) 12 d) 13
viii) MOV DS, BX is _________ type of addressing mode.
a) Register b) Immediate
c) Direct d) Register Indirect
ix) The ________ translates byte from one code to another code.
a) XLAT b) XCHG
c) POP d) PUSH
x) DMA stands for
a) Direct Memory Allocation b) Distinct Memory Allocation
c) Direct Memory Access d) Distinct Memory Access
xi) Which of the following is the non-maskable interrupt ?
a) RST 7.5 b) TRAP
c) INTR d) RST 6.5
xii) 8085 has total 16 address lines therefore it can address upto ______
memory.
a) 32 K b) 64 K c) 128 K d) 1M
xiii) An instruction consist of
a) Date and Address b) Register and Memory
c) Opcode and Operand d) Input and O/P
xiv) The work of EV in 8086 is
a) encoding b) decoding
c) processing d) calculation

______________

Set P
*SLRTX328* -3- SLR-TX – 328
Seat
No.

S.E. (Computer Science and Engineering) (Part – II) (New CBCS)


Examination, 2018
microprocessors

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : a) Figures in right indicates full marks.


b) Assume suitable data if necessary.

SECTION – I

2. Attempt any three : (4×3=12)


a) What is the program counter and stack pointer of 8085 ?
b) What are basic features of 8086 ?
c) Write an program to arrange numbers in ascending order of the given array
using 8086.
d) With neat pin diagram explain maximum mode pins of 8086.

3. Attempt any two : (8×2=16)


a) Draw the functional architecture of 8085 microprocessor neatly labeling the
data paths, registers etc. Briefly explain function of each.
b) Draw and explain pin diagram of 8086.
c) Explain the following instruction with example.
i) LDS reg 16, memptr 16
ii) LEA reg 16, memptr or variable
iii) MUL BH
iv) DIV CL
v) MOV dst, src
vi) XCHG dst, src
Set P
SLR-TX – 328 -4- *SLRTX328*

SECTION – II

4. Attempt any three : (4×3=12)


a) Explain interrupt sequence in detail. Also explain interrupt sequence for
INTR interrupt.
b) Explain control register of 8087 coprocessor in detail.
c) Draw 8257 architecture (DMA controller).
d) Explain control word format for I/O mode of 8255.

5. Attempt any two : (8×2=16)


a) Draw and explain Programmable Interrupt Controller (8259).
b) With neat pin diagram explain pins of 8087 coprocessor.
c) Draw and explain 80386 Architecture.

____________

Set P
*SLRTX328* SLR-TX – 328

Seat
No. Set Q
S.E. (Computer Science and Engineering) (Part – II) (New CBCS)
Examination, 2018
microprocessors
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : a) Figures in right indicates full marks.


b) Assume suitable data if necessary.
c) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
d) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


i) MOV DS, BX is _________ type of addressing mode.
a) Register b) Immediate
c) Direct d) Register Indirect
ii) The ________ translates byte from one code to another code.
a) XLAT b) XCHG
c) POP d) PUSH
iii) DMA stands for
a) Direct Memory Allocation b) Distinct Memory Allocation
c) Direct Memory Access d) Distinct Memory Access
iv) Which of the following is the non-maskable interrupt ?
a) RST 7.5 b) TRAP
c) INTR d) RST 6.5

P.T.O.
SLR-TX – 328 -2- *SLRTX328*

v) 8085 has total 16 address lines therefore it can address upto ______
memory.
a) 32 K b) 64 K c) 128 K d) 1M
vi) An instruction consist of
a) Date and Address b) Register and Memory
c) Opcode and Operand d) Input and O/P
vii) The work of EV in 8086 is
a) encoding b) decoding
c) processing d) calculation
viii) Address bus of 8085 is can transmit __________ bits.
a) 8 b) 16 c) 24 d) 32
ix) Data bus of 8085 is
a) bidirectional b) unidirectional
c) 16 bit d) 32 bit
x) ____________ generate interrupt signal to microprocessor and receive
acknowledge.
a) priority resolver b) control logic
c) interrupt request register d) interrupt register
xi) How many modes 8255 can operate ?
a) two modes b) three modes
c) one mode d) six modes
xii) In 8086 microprocessor the following has the highest priority among all
type interrupts ?
a) NMI b) DNO c) Type 255 d) OVER FLOW
xiii) What is the addressing mode used in instruction MOV M, C ?
a) Direct b) Indirect
c) Immediate d) None of the above
xiv) Number of address lines required to interface 1 KB memory are
a) 10 b) 11 c) 12 d) 13

______________

Set Q
*SLRTX328* -3- SLR-TX – 328
Seat
No.

S.E. (Computer Science and Engineering) (Part – II) (New CBCS)


Examination, 2018
microprocessors

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : a) Figures in right indicates full marks.


b) Assume suitable data if necessary.

SECTION – I

2. Attempt any three : (4×3=12)


a) What is the program counter and stack pointer of 8085 ?
b) What are basic features of 8086 ?
c) Write an program to arrange numbers in ascending order of the given array
using 8086.
d) With neat pin diagram explain maximum mode pins of 8086.

3. Attempt any two : (8×2=16)


a) Draw the functional architecture of 8085 microprocessor neatly labeling the
data paths, registers etc. Briefly explain function of each.
b) Draw and explain pin diagram of 8086.
c) Explain the following instruction with example.
i) LDS reg 16, memptr 16
ii) LEA reg 16, memptr or variable
iii) MUL BH
iv) DIV CL
v) MOV dst, src
vi) XCHG dst, src
Set Q
SLR-TX – 328 -4- *SLRTX328*

SECTION – II

4. Attempt any three : (4×3=12)


a) Explain interrupt sequence in detail. Also explain interrupt sequence for
INTR interrupt.
b) Explain control register of 8087 coprocessor in detail.
c) Draw 8257 architecture (DMA controller).
d) Explain control word format for I/O mode of 8255.

5. Attempt any two : (8×2=16)


a) Draw and explain Programmable Interrupt Controller (8259).
b) With neat pin diagram explain pins of 8087 coprocessor.
c) Draw and explain 80386 Architecture.

____________

Set Q
*SLRTX328* SLR-TX – 328

Seat
No. Set R
S.E. (Computer Science and Engineering) (Part – II) (New CBCS)
Examination, 2018
microprocessors
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : a) Figures in right indicates full marks.


b) Assume suitable data if necessary.
c) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
d) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


i) In 8086 microprocessor the following has the highest priority among all
type interrupts ?
a) NMI b) DNO
c) Type 255 d) OVER FLOW
ii) What is the addressing mode used in instruction MOV M, C ?
a) Direct b) Indirect
c) Immediate d) None of the above
iii) Number of address lines required to interface 1 KB memory are
a) 10 b) 11 c) 12 d) 13
iv) MOV DS, BX is _________ type of addressing mode.
a) Register b) Immediate
c) Direct d) Register Indirect

P.T.O.
SLR-TX – 328 -2- *SLRTX328*

v) The ________ translates byte from one code to another code.


a) XLAT b) XCHG
c) POP d) PUSH
vi) DMA stands for
a) Direct Memory Allocation b) Distinct Memory Allocation
c) Direct Memory Access d) Distinct Memory Access
vii) Which of the following is the non-maskable interrupt ?
a) RST 7.5 b) TRAP
c) INTR d) RST 6.5
viii) 8085 has total 16 address lines therefore it can address upto ______
memory.
a) 32 K b) 64 K c) 128 K d) 1M
ix) An instruction consist of
a) Date and Address b) Register and Memory
c) Opcode and Operand d) Input and O/P
x) The work of EV in 8086 is
a) encoding b) decoding
c) processing d) calculation
xi) Address bus of 8085 is can transmit __________ bits.
a) 8 b) 16 c) 24 d) 32
xii) Data bus of 8085 is
a) bidirectional b) unidirectional
c) 16 bit d) 32 bit
xiii) ____________ generate interrupt signal to microprocessor and receive
acknowledge.
a) priority resolver b) control logic
c) interrupt request register d) interrupt register
xiv) How many modes 8255 can operate ?
a) two modes b) three modes
c) one mode d) six modes

______________
Set R
*SLRTX328* -3- SLR-TX – 328
Seat
No.

S.E. (Computer Science and Engineering) (Part – II) (New CBCS)


Examination, 2018
microprocessors

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : a) Figures in right indicates full marks.


b) Assume suitable data if necessary.

SECTION – I

2. Attempt any three : (4×3=12)


a) What is the program counter and stack pointer of 8085 ?
b) What are basic features of 8086 ?
c) Write an program to arrange numbers in ascending order of the given array
using 8086.
d) With neat pin diagram explain maximum mode pins of 8086.

3. Attempt any two : (8×2=16)


a) Draw the functional architecture of 8085 microprocessor neatly labeling the
data paths, registers etc. Briefly explain function of each.
b) Draw and explain pin diagram of 8086.
c) Explain the following instruction with example.
i) LDS reg 16, memptr 16
ii) LEA reg 16, memptr or variable
iii) MUL BH
iv) DIV CL
v) MOV dst, src
vi) XCHG dst, src
Set R
SLR-TX – 328 -4- *SLRTX328*

SECTION – II

4. Attempt any three : (4×3=12)


a) Explain interrupt sequence in detail. Also explain interrupt sequence for
INTR interrupt.
b) Explain control register of 8087 coprocessor in detail.
c) Draw 8257 architecture (DMA controller).
d) Explain control word format for I/O mode of 8255.

5. Attempt any two : (8×2=16)


a) Draw and explain Programmable Interrupt Controller (8259).
b) With neat pin diagram explain pins of 8087 coprocessor.
c) Draw and explain 80386 Architecture.

____________

Set R
*SLRTX328* SLR-TX – 328

Seat
No. Set S
S.E. (Computer Science and Engineering) (Part – II) (New CBCS)
Examination, 2018
microprocessors
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : a) Figures in right indicates full marks.


b) Assume suitable data if necessary.
c) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
d) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


i) DMA stands for
a) Direct Memory Allocation b) Distinct Memory Allocation
c) Direct Memory Access d) Distinct Memory Access
ii) Which of the following is the non-maskable interrupt ?
a) RST 7.5 b) TRAP
c) INTR d) RST 6.5
iii) 8085 has total 16 address lines therefore it can address upto ______
memory.
a) 32 K b) 64 K c) 128 K d) 1M
iv) An instruction consist of
a) Date and Address b) Register and Memory
c) Opcode and Operand d) Input and O/P

P.T.O.
SLR-TX – 328 -2- *SLRTX328*

v) The work of EV in 8086 is


a) encoding b) decoding
c) processing d) calculation
vi) Address bus of 8085 is can transmit __________ bits.
a) 8 b) 16 c) 24 d) 32
vii) Data bus of 8085 is
a) bidirectional b) unidirectional
c) 16 bit d) 32 bit
viii) ____________ generate interrupt signal to microprocessor and receive
acknowledge.
a) priority resolver b) control logic
c) interrupt request register d) interrupt register
ix) How many modes 8255 can operate ?
a) two modes b) three modes
c) one mode d) six modes
x) In 8086 microprocessor the following has the highest priority among all
type interrupts ?
a) NMI b) DNO c) Type 255 d) OVER FLOW
xi) What is the addressing mode used in instruction MOV M, C ?
a) Direct b) Indirect
c) Immediate d) None of the above
xii) Number of address lines required to interface 1 KB memory are
a) 10 b) 11 c) 12 d) 13
xiii) MOV DS, BX is _________ type of addressing mode.
a) Register b) Immediate
c) Direct d) Register Indirect
xiv) The ________ translates byte from one code to another code.
a) XLAT b) XCHG
c) POP d) PUSH

______________

Set S
*SLRTX328* -3- SLR-TX – 328
Seat
No.

S.E. (Computer Science and Engineering) (Part – II) (New CBCS)


Examination, 2018
microprocessors

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : a) Figures in right indicates full marks.


b) Assume suitable data if necessary.

SECTION – I

2. Attempt any three : (4×3=12)


a) What is the program counter and stack pointer of 8085 ?
b) What are basic features of 8086 ?
c) Write an program to arrange numbers in ascending order of the given array
using 8086.
d) With neat pin diagram explain maximum mode pins of 8086.

3. Attempt any two : (8×2=16)


a) Draw the functional architecture of 8085 microprocessor neatly labeling the
data paths, registers etc. Briefly explain function of each.
b) Draw and explain pin diagram of 8086.
c) Explain the following instruction with example.
i) LDS reg 16, memptr 16
ii) LEA reg 16, memptr or variable
iii) MUL BH
iv) DIV CL
v) MOV dst, src
vi) XCHG dst, src
Set S
SLR-TX – 328 -4- *SLRTX328*

SECTION – II

4. Attempt any three : (4×3=12)


a) Explain interrupt sequence in detail. Also explain interrupt sequence for
INTR interrupt.
b) Explain control register of 8087 coprocessor in detail.
c) Draw 8257 architecture (DMA controller).
d) Explain control word format for I/O mode of 8255.

5. Attempt any two : (8×2=16)


a) Draw and explain Programmable Interrupt Controller (8259).
b) With neat pin diagram explain pins of 8087 coprocessor.
c) Draw and explain 80386 Architecture.

____________

Set S
*SLRTX329* SLR-TX – 329

Seat
No. Set P
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
data structure
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Stack is a ___________data structure.
a) Non-linear b) Linear
c) Both d) None of the above
2) An infix expression can be converted to a postfix expression using a
a) Stack b) Queue
c) Dequeue d) None of the above
3) Enque operation of queue makes
a) rear = rear + 1 b) front = rear + 1
c) front = rear – 1 d) none of the above
4) The result of an illegal attempt to remove an element from an empty
queue is
a) underflow b) empty c) full d) error
5) How many files are contained in each node in Doubly linked list
a) atmost 2 b) atleast 3
c) exactly 2 d) none of the above
6) ________ traversal of binary search tree outputs the value in sorted order.
a) Pre-order b) In-order
c) Post-order d) None of the above
7) A binary search tree is generated by inserting in order the following integers :
90, 15,62, 120, 98,91,3,8,97,160, 124
a) (4,6) b) (5, 5) c) (3,7) d) None of the above
P.T.O.
SLR-TX – 329 -2- *SLRTX329*
8) Pre-order traversal is also called
a) Depth first b) Breadth first c) Level order d) In-order
9) The depth of root node is
a) 0 b) 1 c) 2 d) 3
10) An edge that has identical end-points is called a
a) Multi-path b) Loop c) Cycle d) Multi-edge
11) Every internal node of an M-way search tree consists of pointer to M
sub-tree and contains how many keys ?
a) M b) M –1 c) 2 d) M + 1
12) Every node in a B tree has at most ________ children.
a) M b) M –1 c) 2 d) M + 1
13) In the worst case, a binary search tree will take how much time to search
an elements ?
a) O(n) b) O(log n) c) O(n2) d) O(n log n)
14) How much time does an AVL tree take to perform search, insert, and delete
operations in the average case as well as the worst case?
a) O(n) b) O(log n) c) O(n2) d) O(n log n)
______________

Set P
*SLRTX329* -3- SLR-TX – 329
Seat
No.

S.E. (CSE) (Part – II) (New CBCS) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any four : (4×4=16)


a) Define stack. Explain PUSH and POP operation using array.
b) Write a C program to implement queue operations using array.
c) Explain insertion operation in doubly linked list at the end of the list.
d) Define the following with example :
i) Binary search tree
ii) Complete binary tree
e) Explain applications of STACK.
f) Explain data structure and its importance.

3. Attempt any two : (2×6=12)


a) Write a C Program to convert the given infix expression to postfix
expression.
b) Write an program to implement the following for the singly Circular Linked
List (CLL).
i) add new element at end of the list
ii) display all the elements
iii) search particular element in the CLL
c) Explain Priority queue. Explain operations with example.
d) What is threaded binary tree ? Explain the insertion of a node in threaded
binary tree.

Set P
SLR-TX – 329 -4- *SLRTX329*

SECTION – II

4. Attempt any four : (4×4=16)


a) Explain balanced tree with example.
b) Differentiate between B and B+ Tree.
c) Explain type of rotation in AVL tree.
d) Explain what kind of problem occurs while deleting a node from AVL tree.
e) Explain the terminologies.
a) source
b) sink
c) DAG
d) clique
f) Explain BFS algorithm.

5. Attempt any two : (2×6=12)


a) Construct B tree of order 3
84 17 82 78 81 45 42 2 11
b) Insert the following element in AVL tree and Delete 37.
37, 25, 52, 73, 84, 48, 81, 18, 72, 27
c) Write a program to represent Graph using adjacency list.

_____________________

Set P
*SLRTX329* SLR-TX – 329

Seat
No. Set Q
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
data structure
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Pre-order traversal is also called
a) Depth first b) Breadth first c) Level order d) In-order
2) The depth of root node is
a) 0 b) 1 c) 2 d) 3
3) An edge that has identical end-points is called a
a) Multi-path b) Loop c) Cycle d) Multi-edge
4) Every internal node of an M-way search tree consists of pointer to M
sub-tree and contains how many keys ?
a) M b) M –1 c) 2 d) M + 1
5) Every node in a B tree has at most ________ children.
a) M b) M –1 c) 2 d) M + 1
6) In the worst case, a binary search tree will take how much time to search
an elements ?
a) O(n) b) O(log n) c) O(n2) d) O(n log n)
7) How much time does an AVL tree take to perform search, insert, and delete
operations in the average case as well as the worst case?
a) O(n) b) O(log n) c) O(n2) d) O(n log n)
8) Stack is a ___________data structure.
a) Non-linear b) Linear
c) Both d) None of the above

P.T.O.
SLR-TX – 329 -2- *SLRTX329*
9) An infix expression can be converted to a postfix expression using a
a) Stack b) Queue
c) Dequeue d) None of the above
10) Enque operation of queue makes
a) rear = rear + 1 b) front = rear + 1
c) front = rear – 1 d) none of the above
11) The result of an illegal attempt to remove an element from an empty
queue is
a) underflow b) empty c) full d) error
12) How many files are contained in each node in Doubly linked list
a) atmost 2 b) atleast 3
c) exactly 2 d) none of the above
13) ________ traversal of binary search tree outputs the value in sorted order.
a) Pre-order b) In-order
c) Post-order d) None of the above
14) A binary search tree is generated by inserting in order the following integers :
90, 15,62, 120, 98,91,3,8,97,160, 124
a) (4,6) b) (5, 5) c) (3,7) d) None of the above

______________

Set Q
*SLRTX329* -3- SLR-TX – 329
Seat
No.

S.E. (CSE) (Part – II) (New CBCS) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any four : (4×4=16)


a) Define stack. Explain PUSH and POP operation using array.
b) Write a C program to implement queue operations using array.
c) Explain insertion operation in doubly linked list at the end of the list.
d) Define the following with example :
i) Binary search tree
ii) Complete binary tree
e) Explain applications of STACK.
f) Explain data structure and its importance.

3. Attempt any two : (2×6=12)


a) Write a C Program to convert the given infix expression to postfix
expression.
b) Write an program to implement the following for the singly Circular Linked
List (CLL).
i) add new element at end of the list
ii) display all the elements
iii) search particular element in the CLL
c) Explain Priority queue. Explain operations with example.
d) What is threaded binary tree ? Explain the insertion of a node in threaded
binary tree.

Set Q
SLR-TX – 329 -4- *SLRTX329*

SECTION – II

4. Attempt any four : (4×4=16)


a) Explain balanced tree with example.
b) Differentiate between B and B+ Tree.
c) Explain type of rotation in AVL tree.
d) Explain what kind of problem occurs while deleting a node from AVL tree.
e) Explain the terminologies.
a) source
b) sink
c) DAG
d) clique
f) Explain BFS algorithm.

5. Attempt any two : (2×6=12)


a) Construct B tree of order 3
84 17 82 78 81 45 42 2 11
b) Insert the following element in AVL tree and Delete 37.
37, 25, 52, 73, 84, 48, 81, 18, 72, 27
c) Write a program to represent Graph using adjacency list.

_____________________

Set Q
*SLRTX329* SLR-TX – 329

Seat
No. Set R
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
data structure
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) How many files are contained in each node in Doubly linked list
a) atmost 2 b) atleast 3
c) exactly 2 d) none of the above
2) ________ traversal of binary search tree outputs the value in sorted order.
a) Pre-order b) In-order
c) Post-order d) None of the above
3) A binary search tree is generated by inserting in order the following integers :
90, 15,62, 120, 98,91,3,8,97,160, 124
a) (4,6) b) (5, 5) c) (3,7) d) None of the above
4) Pre-order traversal is also called
a) Depth first b) Breadth first c) Level order d) In-order
5) The depth of root node is
a) 0 b) 1 c) 2 d) 3
6) An edge that has identical end-points is called a
a) Multi-path b) Loop c) Cycle d) Multi-edge
7) Every internal node of an M-way search tree consists of pointer to M
sub-tree and contains how many keys ?
a) M b) M –1 c) 2 d) M + 1
8) Every node in a B tree has at most ________ children.
a) M b) M –1 c) 2 d) M + 1

P.T.O.
SLR-TX – 329 -2- *SLRTX329*
9) In the worst case, a binary search tree will take how much time to search
an elements ?
a) O(n) b) O(log n) c) O(n2) d) O(n log n)
10) How much time does an AVL tree take to perform search, insert, and delete
operations in the average case as well as the worst case?
a) O(n) b) O(log n) c) O(n2) d) O(n log n)
11) Stack is a ___________data structure.
a) Non-linear b) Linear
c) Both d) None of the above
12) An infix expression can be converted to a postfix expression using a
a) Stack b) Queue
c) Dequeue d) None of the above
13) Enque operation of queue makes
a) rear = rear + 1 b) front = rear + 1
c) front = rear – 1 d) none of the above
14) The result of an illegal attempt to remove an element from an empty
queue is
a) underflow b) empty c) full d) error
______________

Set R
*SLRTX329* -3- SLR-TX – 329
Seat
No.

S.E. (CSE) (Part – II) (New CBCS) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any four : (4×4=16)


a) Define stack. Explain PUSH and POP operation using array.
b) Write a C program to implement queue operations using array.
c) Explain insertion operation in doubly linked list at the end of the list.
d) Define the following with example :
i) Binary search tree
ii) Complete binary tree
e) Explain applications of STACK.
f) Explain data structure and its importance.

3. Attempt any two : (2×6=12)


a) Write a C Program to convert the given infix expression to postfix
expression.
b) Write an program to implement the following for the singly Circular Linked
List (CLL).
i) add new element at end of the list
ii) display all the elements
iii) search particular element in the CLL
c) Explain Priority queue. Explain operations with example.
d) What is threaded binary tree ? Explain the insertion of a node in threaded
binary tree.

Set R
SLR-TX – 329 -4- *SLRTX329*

SECTION – II

4. Attempt any four : (4×4=16)


a) Explain balanced tree with example.
b) Differentiate between B and B+ Tree.
c) Explain type of rotation in AVL tree.
d) Explain what kind of problem occurs while deleting a node from AVL tree.
e) Explain the terminologies.
a) source
b) sink
c) DAG
d) clique
f) Explain BFS algorithm.

5. Attempt any two : (2×6=12)


a) Construct B tree of order 3
84 17 82 78 81 45 42 2 11
b) Insert the following element in AVL tree and Delete 37.
37, 25, 52, 73, 84, 48, 81, 18, 72, 27
c) Write a program to represent Graph using adjacency list.

_____________________

Set R
*SLRTX329* SLR-TX – 329

Seat
No. Set S
S.E. (CSE) (Part – II) (New CBCS) Examination, 2018
data structure
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) An edge that has identical end-points is called a
a) Multi-path b) Loop
c) Cycle d) Multi-edge
2) Every internal node of an M-way search tree consists of pointer to M
sub-tree and contains how many keys ?
a) M b) M –1 c) 2 d) M + 1
3) Every node in a B tree has at most ________ children.
a) M b) M –1 c) 2 d) M + 1
4) In the worst case, a binary search tree will take how much time to search
an elements ?
a) O(n) b) O(log n) c) O(n2) d) O(n log n)
5) How much time does an AVL tree take to perform search, insert, and delete
operations in the average case as well as the worst case?
a) O(n) b) O(log n)
c) O(n )
2
d) O(n log n)
6) Stack is a ___________data structure.
a) Non-linear b) Linear
c) Both d) None of the above
7) An infix expression can be converted to a postfix expression using a
a) Stack b) Queue
c) Dequeue d) None of the above
P.T.O.
SLR-TX – 329 -2- *SLRTX329*
8) Enque operation of queue makes
a) rear = rear + 1 b) front = rear + 1
c) front = rear – 1 d) none of the above
9) The result of an illegal attempt to remove an element from an empty
queue is
a) underflow b) empty c) full d) error
10) How many files are contained in each node in Doubly linked list
a) atmost 2 b) atleast 3
c) exactly 2 d) none of the above
11) ________ traversal of binary search tree outputs the value in sorted order.
a) Pre-order b) In-order
c) Post-order d) None of the above
12) A binary search tree is generated by inserting in order the following integers :
90, 15,62, 120, 98,91,3,8,97,160, 124
a) (4,6) b) (5, 5) c) (3,7) d) None of the above
13) Pre-order traversal is also called
a) Depth first b) Breadth first c) Level order d) In-order
14) The depth of root node is
a) 0 b) 1 c) 2 d) 3
______________

Set S
*SLRTX329* -3- SLR-TX – 329
Seat
No.

S.E. (CSE) (Part – II) (New CBCS) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any four : (4×4=16)


a) Define stack. Explain PUSH and POP operation using array.
b) Write a C program to implement queue operations using array.
c) Explain insertion operation in doubly linked list at the end of the list.
d) Define the following with example :
i) Binary search tree
ii) Complete binary tree
e) Explain applications of STACK.
f) Explain data structure and its importance.

3. Attempt any two : (2×6=12)


a) Write a C Program to convert the given infix expression to postfix
expression.
b) Write an program to implement the following for the singly Circular Linked
List (CLL).
i) add new element at end of the list
ii) display all the elements
iii) search particular element in the CLL
c) Explain Priority queue. Explain operations with example.
d) What is threaded binary tree ? Explain the insertion of a node in threaded
binary tree.

Set S
SLR-TX – 329 -4- *SLRTX329*

SECTION – II

4. Attempt any four : (4×4=16)


a) Explain balanced tree with example.
b) Differentiate between B and B+ Tree.
c) Explain type of rotation in AVL tree.
d) Explain what kind of problem occurs while deleting a node from AVL tree.
e) Explain the terminologies.
a) source
b) sink
c) DAG
d) clique
f) Explain BFS algorithm.

5. Attempt any two : (2×6=12)


a) Construct B tree of order 3
84 17 82 78 81 45 42 2 11
b) Insert the following element in AVL tree and Delete 37.
37, 25, 52, 73, 84, 48, 81, 18, 72, 27
c) Write a program to represent Graph using adjacency list.

_____________________

Set S
*SLRTX330* SLR-TX – 330

Seat
No. Set P
S.E. (C.S.E.) (Part – II) (New) (CBCS) Examination, 2018
Computer Networks
Day and Date : Tuesday, 27-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) First question is objective type.
3) All questions are compulsory.
4) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
5) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative : 14


1) Address space of IPv4 is
a) 28 b) 216 c) 232 d) 264
2) A computer that uses the ____________ system stores the LSB of data in
the starting address of the data unit.
a) Little-Endian b) Big-Endian
c) Both a) and b) d) None of above
3) ___________ of SCTP involves multiple streams.
a) Packets b) Association
c) Multihoming d) None of above
4) In ___________ addressing the whole address space is divided into variable
length blocks.
a) Classfull b) Classless
c) Both a) and b) d) None
5) Error control in TCP is achieved through
a) Checksum b) Acknowledgement
c) Time-out d) All the above
6) Port addresses are ___________ bits in length.
a) 32 Bits b) 64 Bits c) 48 Bits d) 16 Bits
P.T.O.
SLR-TX– 330 -2- *SLRTX330*
7) In out-of-band signalling, which of the following command is act as Urgent
Pointer ?
a) DM b) IP c) IAC d) All the above
8) Port forwarding is also known as
a) Component forwarding b) SSH packet forwarding
c) SSH - application forwarding d) SSH tunnelling
9) SSH uses ___________ communication protocol.
a) UDP b) TCP c) SCTP d) FTP
10) In ___________ sequence of character is without structure.
a) Flat Name Space b) Hierarchical Name Space
c) Zone Name Space d) None of above
11) A packet in SCTP is called as
a) Datagram b) Segment c) Chunk d) Block
12) Which of the following is/are Message Transfer Agent ?
a) POP b) IMAP c) SMTP d) Both a) and b)
13) The ___________ is a technology that creates and handles Dynamic
web documents. It defines how document is written, how data are input to
program and how output result is used.
a) CGI b) NVT c) SSH d) TELNET
14) Which of the following statement is incorrect ?
Statement 1 : UDP is connectionless, unreliable transport protocol
Statement 2: UDP provide flow control.
Statement 3: UDP provide encapsulation and decapsulation service
a) Statement 1 and 2 b) Statement 1 and 3
c) Statement 2 and 3 d) Statement 2

______________

Set P
*SLRTX330* -3- SLR-TX – 330
Seat
No.

S.E. (C.S.E.) (Part – II) (New) (CBCS) Examination, 2018


Computer Networks
Day and Date : Tuesday, 27-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Each Section carries 28 marks.
3) Attempt all questions in each Section.

SECTION – I

2. Attempt any three (Each carries 4 marks) : (3×4=12)


1) Explain IP Datagram in detail.
2) What is Queuing in UDP ? Explain with diagram.
3) Explain SCTP packet format in detail.
4) The following is the dump of UDP header in Hexadecimal format
CB84000D001C001C
Find Source port number, Destination port number, Total length of the
user datagram, length of the data, Direction of packet and Name of client
process.
5) What do you mean by Concurrency in client and server ?

3. Attempt any two : (2×8=16)


1) Explain Windows in TCP.
2) Explain Socket structure also explain any 4 Socket System calls with
syntax.
3) What is Fragmentation in IP ? Explain with example.

Set P
SLR-TX – 330 -4- *SLRTX330*

SECTION – II

4. Attempt any three (Each carries 4 marks) : (3×4=12)


1) Explain BOOTP operation. Why need of DHCP ?
2) Explain Generic and Country Domains of DNS.
3) Explain Message Access Agent in detail.
4) What is SSH ? Explain format of SSH Packet.
5) Write a short note on FTP.

5. Attempt any two : (2×8=16)


1) Explain DHCP packet format in detail.
2) Explain Email architecture with its third scenario.
3) What is Remote Login ? Explain the concept of NVT.s.

_____________________

Set P
*SLRTX330* SLR-TX – 330

Seat
No. Set Q
S.E. (C.S.E.) (Part – II) (New) (CBCS) Examination, 2018
Computer Networks
Day and Date : Tuesday, 27-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) First question is objective type.
3) All questions are compulsory.
4) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
5) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative : 14


1) Port forwarding is also known as
a) Component forwarding b) SSH packet forwarding
c) SSH - application forwarding d) SSH tunnelling
2) SSH uses ___________ communication protocol.
a) UDP b) TCP c) SCTP d) FTP
3) In ___________ sequence of character is without structure.
a) Flat Name Space b) Hierarchical Name Space
c) Zone Name Space d) None of above
4) A packet in SCTP is called as
a) Datagram b) Segment c) Chunk d) Block
5) Which of the following is/are Message Transfer Agent ?
a) POP b) IMAP
c) SMTP d) Both a) and b)
6) The ___________ is a technology that creates and handles Dynamic
web documents. It defines how document is written, how data are input to
program and how output result is used.
a) CGI b) NVT
c) SSH d) TELNET
P.T.O.
SLR-TX– 330 -2- *SLRTX330*
7) Which of the following statement is incorrect ?
Statement 1 : UDP is connectionless, unreliable transport protocol
Statement 2: UDP provide flow control.
Statement 3: UDP provide encapsulation and decapsulation service
a) Statement 1 and 2 b) Statement 1 and 3
c) Statement 2 and 3 d) Statement 2
8) Address space of IPv4 is
a) 28 b) 216 c) 232 d) 264
9) A computer that uses the ____________ system stores the LSB of data in
the starting address of the data unit.
a) Little-Endian b) Big-Endian
c) Both a) and b) d) None of above
10) ___________ of SCTP involves multiple streams.
a) Packets b) Association
c) Multihoming d) None of above
11) In ___________ addressing the whole address space is divided into variable
length blocks.
a) Classfull b) Classless
c) Both a) and b) d) None
12) Error control in TCP is achieved through
a) Checksum b) Acknowledgement
c) Time-out d) All the above
13) Port addresses are ___________ bits in length.
a) 32 Bits b) 64 Bits c) 48 Bits d) 16 Bits
14) In out-of-band signalling, which of the following command is act as Urgent
Pointer ?
a) DM b) IP c) IAC d) All the above

______________

Set Q
*SLRTX330* -3- SLR-TX – 330
Seat
No.

S.E. (C.S.E.) (Part – II) (New) (CBCS) Examination, 2018


Computer Networks
Day and Date : Tuesday, 27-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Each Section carries 28 marks.
3) Attempt all questions in each Section.

SECTION – I

2. Attempt any three (Each carries 4 marks) : (3×4=12)


1) Explain IP Datagram in detail.
2) What is Queuing in UDP ? Explain with diagram.
3) Explain SCTP packet format in detail.
4) The following is the dump of UDP header in Hexadecimal format
CB84000D001C001C
Find Source port number, Destination port number, Total length of the
user datagram, length of the data, Direction of packet and Name of client
process.
5) What do you mean by Concurrency in client and server ?

3. Attempt any two : (2×8=16)


1) Explain Windows in TCP.
2) Explain Socket structure also explain any 4 Socket System calls with
syntax.
3) What is Fragmentation in IP ? Explain with example.

Set Q
SLR-TX – 330 -4- *SLRTX330*

SECTION – II

4. Attempt any three (Each carries 4 marks) : (3×4=12)


1) Explain BOOTP operation. Why need of DHCP ?
2) Explain Generic and Country Domains of DNS.
3) Explain Message Access Agent in detail.
4) What is SSH ? Explain format of SSH Packet.
5) Write a short note on FTP.

5. Attempt any two : (2×8=16)


1) Explain DHCP packet format in detail.
2) Explain Email architecture with its third scenario.
3) What is Remote Login ? Explain the concept of NVT.s.

_____________________

Set Q
*SLRTX330* SLR-TX – 330

Seat
No. Set R
S.E. (C.S.E.) (Part – II) (New) (CBCS) Examination, 2018
Computer Networks
Day and Date : Tuesday, 27-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) First question is objective type.
3) All questions are compulsory.
4) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
5) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative : 14


1) Error control in TCP is achieved through
a) Checksum b) Acknowledgement
c) Time-out d) All the above
2) Port addresses are ___________ bits in length.
a) 32 Bits b) 64 Bits c) 48 Bits d) 16 Bits
3) In out-of-band signalling, which of the following command is act as Urgent
Pointer ?
a) DM b) IP c) IAC d) All the above
4) Port forwarding is also known as
a) Component forwarding b) SSH packet forwarding
c) SSH - application forwarding d) SSH tunnelling
5) SSH uses ___________ communication protocol.
a) UDP b) TCP c) SCTP d) FTP
6) In ___________ sequence of character is without structure.
a) Flat Name Space b) Hierarchical Name Space
c) Zone Name Space d) None of above
7) A packet in SCTP is called as
a) Datagram b) Segment c) Chunk d) Block
P.T.O.
SLR-TX– 330 -2- *SLRTX330*
8) Which of the following is/are Message Transfer Agent ?
a) POP b) IMAP c) SMTP d) Both a) and b)
9) The ___________ is a technology that creates and handles Dynamic
web documents. It defines how document is written, how data are input to
program and how output result is used.
a) CGI b) NVT c) SSH d) TELNET
10) Which of the following statement is incorrect ?
Statement 1 : UDP is connectionless, unreliable transport protocol
Statement 2: UDP provide flow control.
Statement 3: UDP provide encapsulation and decapsulation service
a) Statement 1 and 2 b) Statement 1 and 3
c) Statement 2 and 3 d) Statement 2
11) Address space of IPv4 is
a) 28 b) 216 c) 232 d) 264
12) A computer that uses the ____________ system stores the LSB of data in
the starting address of the data unit.
a) Little-Endian b) Big-Endian
c) Both a) and b) d) None of above
13) ___________ of SCTP involves multiple streams.
a) Packets b) Association
c) Multihoming d) None of above
14) In ___________ addressing the whole address space is divided into variable
length blocks.
a) Classfull b) Classless
c) Both a) and b) d) None

______________

Set R
*SLRTX330* -3- SLR-TX – 330
Seat
No.

S.E. (C.S.E.) (Part – II) (New) (CBCS) Examination, 2018


Computer Networks
Day and Date : Tuesday, 27-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Each Section carries 28 marks.
3) Attempt all questions in each Section.

SECTION – I

2. Attempt any three (Each carries 4 marks) : (3×4=12)


1) Explain IP Datagram in detail.
2) What is Queuing in UDP ? Explain with diagram.
3) Explain SCTP packet format in detail.
4) The following is the dump of UDP header in Hexadecimal format
CB84000D001C001C
Find Source port number, Destination port number, Total length of the
user datagram, length of the data, Direction of packet and Name of client
process.
5) What do you mean by Concurrency in client and server ?

3. Attempt any two : (2×8=16)


1) Explain Windows in TCP.
2) Explain Socket structure also explain any 4 Socket System calls with
syntax.
3) What is Fragmentation in IP ? Explain with example.

Set R
SLR-TX – 330 -4- *SLRTX330*

SECTION – II

4. Attempt any three (Each carries 4 marks) : (3×4=12)


1) Explain BOOTP operation. Why need of DHCP ?
2) Explain Generic and Country Domains of DNS.
3) Explain Message Access Agent in detail.
4) What is SSH ? Explain format of SSH Packet.
5) Write a short note on FTP.

5. Attempt any two : (2×8=16)


1) Explain DHCP packet format in detail.
2) Explain Email architecture with its third scenario.
3) What is Remote Login ? Explain the concept of NVT.s.

_____________________

Set R
*SLRTX330* SLR-TX – 330

Seat
No. Set S
S.E. (C.S.E.) (Part – II) (New) (CBCS) Examination, 2018
Computer Networks
Day and Date : Tuesday, 27-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) First question is objective type.
3) All questions are compulsory.
4) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
5) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative : 14


1) In ___________ sequence of character is without structure.
a) Flat Name Space b) Hierarchical Name Space
c) Zone Name Space d) None of above
2) A packet in SCTP is called as
a) Datagram b) Segment c) Chunk d) Block
3) Which of the following is/are Message Transfer Agent ?
a) POP b) IMAP c) SMTP d) Both a) and b)
4) The ___________ is a technology that creates and handles Dynamic
web documents. It defines how document is written, how data are input to
program and how output result is used.
a) CGI b) NVT c) SSH d) TELNET
5) Which of the following statement is incorrect ?
Statement 1 : UDP is connectionless, unreliable transport protocol
Statement 2: UDP provide flow control.
Statement 3: UDP provide encapsulation and decapsulation service
a) Statement 1 and 2 b) Statement 1 and 3
c) Statement 2 and 3 d) Statement 2

P.T.O.
SLR-TX– 330 -2- *SLRTX330*
6) Address space of IPv4 is
a) 28 b) 216 c) 232 d) 264
7) A computer that uses the ____________ system stores the LSB of data in
the starting address of the data unit.
a) Little-Endian b) Big-Endian
c) Both a) and b) d) None of above
8) ___________ of SCTP involves multiple streams.
a) Packets b) Association
c) Multihoming d) None of above
9) In ___________ addressing the whole address space is divided into variable
length blocks.
a) Classfull b) Classless
c) Both a) and b) d) None
10) Error control in TCP is achieved through
a) Checksum b) Acknowledgement
c) Time-out d) All the above
11) Port addresses are ___________ bits in length.
a) 32 Bits b) 64 Bits c) 48 Bits d) 16 Bits
12) In out-of-band signalling, which of the following command is act as Urgent
Pointer ?
a) DM b) IP c) IAC d) All the above
13) Port forwarding is also known as
a) Component forwarding b) SSH packet forwarding
c) SSH - application forwarding d) SSH tunnelling
14) SSH uses ___________ communication protocol.
a) UDP b) TCP c) SCTP d) FTP

______________

Set S
*SLRTX330* -3- SLR-TX – 330
Seat
No.

S.E. (C.S.E.) (Part – II) (New) (CBCS) Examination, 2018


Computer Networks
Day and Date : Tuesday, 27-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Each Section carries 28 marks.
3) Attempt all questions in each Section.

SECTION – I

2. Attempt any three (Each carries 4 marks) : (3×4=12)


1) Explain IP Datagram in detail.
2) What is Queuing in UDP ? Explain with diagram.
3) Explain SCTP packet format in detail.
4) The following is the dump of UDP header in Hexadecimal format
CB84000D001C001C
Find Source port number, Destination port number, Total length of the
user datagram, length of the data, Direction of packet and Name of client
process.
5) What do you mean by Concurrency in client and server ?

3. Attempt any two : (2×8=16)


1) Explain Windows in TCP.
2) Explain Socket structure also explain any 4 Socket System calls with
syntax.
3) What is Fragmentation in IP ? Explain with example.

Set S
SLR-TX – 330 -4- *SLRTX330*

SECTION – II

4. Attempt any three (Each carries 4 marks) : (3×4=12)


1) Explain BOOTP operation. Why need of DHCP ?
2) Explain Generic and Country Domains of DNS.
3) Explain Message Access Agent in detail.
4) What is SSH ? Explain format of SSH Packet.
5) Write a short note on FTP.

5. Attempt any two : (2×8=16)


1) Explain DHCP packet format in detail.
2) Explain Email architecture with its third scenario.
3) What is Remote Login ? Explain the concept of NVT.s.

_____________________

Set S
*SLRTX331* SLR-TX – 331

Seat
No. Set P
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
applied mathematics – ii
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Attempt any three questions from each Section.
2) Figures to the right indicate full marks.
3) Use of scientific calculator is allowed.
4) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
5) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (1×14=14)


1) The rate of convergence of regula falsi method is
a) 1.235 b) 3.141 c) 1.618 d) None of these
2) Newton’s iterative formula to find the value of N is
1 N 1 N
a) xn+1 =  xn −  b) xn+1 =  xn + 
2 Xn  2 xn 

1 1
c) xn+1 = [ xn − Nxn ] d) xn+1 = [ xn + Nxn ]
2 2
3) Which of the following is a direct method ?
a) Newton-Raphson b) Bisection
c) Gauss Elimination d) Gauss Seidal
4) In solving simultaneous equations by Gauss Jordan method the coefficient
matrix is reduced to
a) Unit matrix b) Diagonal matrix
c) Null matrix d) Square matrix
5) The process of evaluating a definite integral from a set of tabulated
values of the intergrated F(x) is
a) Numerical value b) Numerical differentiation
c) Numerical integration d) None of these
P.T.O.
SLR-TX – 331 -2- *SLRTX331*
6) Simpson’s one-third rule is used when number of subintervals are in
a) Multiples of 1 b) Multiples of 2 c) Multiples of 3 d) None of these
7) Using Bisection method, a second approximation to the root of the equation
x3 – 4x – 9 = 0 between 2 and 3 is
a) 2.95 b) 2.85 c) 2.75 d) 2.25
8) If XA = [2x – 1, 3 – 2x] and XB = [2x + 1, 5 – 2x] then for x ∈ (0, 1], XA+B =
a) [4x – 6, 2 – 4x] b) [4x, 8 – 4x] c) [4x, 8 + 4x] d) [3x, 8 – 4x]
9) Fuzzy cardinality of fuzzy set is
a) Level set b) Fuzzy number
c) Fuzzy set d) A real number
10) A ordinary fuzzy set is also called as
a) Type 2 fuzzy set b) Level 2 fuzzy set
c) Type 1 level 1 fuzzy set d) Type 2 level 2 fuzzy set
11) The crisp rule p → q : q → r ∴ p → R is known as
a) disjunctive syllogism b) hypothetical syllogism
c) modus ponens d) modus tollens
2
1  1 
12) If C ( x ) = and D ( x ) =   x ≥ 0 then ordering of fuzzy set is
1 + 5x  1 + 5x 
a) D ≤ C b) C ≤ D c) C = D d) C = D
13) If A is a fuzzy set, A(x) = A ( x ) , x ∈ X then x is called as
a) Special point b) Equilibrium point
c) Middle point d) Point of intersections
x
14) For the fuzzy set A(x) = x ∈ {1, 2, 3, 4, 5} scalar cardinality of A ( x ) is
x+2
approximately
a) 2.1857 b) 2.8143 c) 2.8157 d) 1.1857

______________

Set P
*SLRTX331* -3- SLR-TX – 331
Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


applied mathematics – ii
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Attempt any three questions from each Section.


2) Figures to the right indicate full marks.
3) Use of scientific calculator is allowed.

SECTION – I

2. Solve the following : (3×3=9)

a) Perform 4 iterations of Gauss-Jacobi’s method to find the solution of


the following system correct upto 4 decimal places 10x + y – 2z = 7.74,
x + 12y + 3z = 39.66, 3x + 4y + 15z = 54.8.

b) Solve the following system of equations using Gauss Elimination method

x + y + z = 9, 2x – 3y + 4z = 13, 3x + 4y + 5z = 40.

c) Perform three iterations of power method to find largest eigenvalue of the


following matrix correct upto three decimal places taking X0 = [0, 0, 1] T as
1 3 −1
initial approximation  3 2 4  .

 −1 4 10 

3. Solve the following : (5×2=10)

a) Find a positive real root of the equation cosx = 3x – 1 correct to 4 decimal


places using method of false position.

b) Perform six iterations of Bisection method to find positive real root of the
equation x3 – 2x – 5 = 0 correct upto 4 decimal places.

Set P
SLR-TX – 331 -4- *SLRTX331*

4. Solve the following : (3×3=9)


7

∫ sin ( x ) dx taking 7 ordinates using Trapezoidal rule. Correct


2
a) Evaluate
1
upto 4 decimal places.
π/2
th π
b) Evaluate ∫ cos x dx using Simpson’s 3 rule taking h =
12
correct upto
0 8
4 decimal places.
2
dx
c) Use Romberg’s method to compute ∫ x
correct upto 4 decimal places by
1

taking h = 0.5, 0.25.

5. Solve the following (Attempt any three) : (3×3=9)


a) Find a real root of the equation x3 – x – 4 = 0 correct to 4 decimal places
using Newton-Raphson method taking initial approximation x0 = 1.5.
b) Solve the following system of equations using Gauss Jordan method
x + 3y + z = 3, x + 4y + 2z = 3, –x – 2y + 3z = –6.
2
−x
c) Evaluate ∫e x dx using Weddle’s rule taking 7 ordinates correct upto
1
4 decimal places.
1
dx
d) Evaluate ∫ 1+ x2 using Gauss formula for n = 2.
−1

SECTION – II

6. a) Sketch the graphs of fuzzy sets A and B defined by


i) A(x) = 2–x x ∈ X = [0, 10]
x
ii) B ( x ) = x ∈ X = [0, 10]
x + 2

also find their α-cut interval. 4

Set P
*SLRTX331* -5- SLR-TX – 331

b) If A and B are fuzzy sets defined on universal set X given by


0 .5 1 0 .5 0 .3
A (x) =
+ + +
−1 0 1 2
0 .5 1 0 .5 0 .3
B(x) = + + +
2 3 4 5
and let f : X × X → X be defined by f(x1, x2) = x2 – x1, x1x2 ∈ X then find
f(A, B) by using an extension principle. 5

7. a) Define the following terms :


i) Support of a fuzzy set
ii) Degree of subsethood. 4
b) Solve the fuzzy equation A.X = B where 6
x − 4 4 < x ≤ 5

A ( x ) = 6 − x 5 < x ≤ 6
 0 otherwise

 x − 10 10 < x ≤ 20
 10

 35 − x 20 < x ≤ 35
B (x) = 
 15
 0 otherwise


OR
b) Let A and B be two fuzzy numbers whose membership functions are given by
 x + 1 −1 < x ≤ 1
 2

3 − x 1< x ≤ 3
A (x) = 
 2
 0 otherwise


 x − 1 1< x ≤ 3
 2

5 − x 3 < x ≤ 5
B(x) = 
 2
 0 otherwise


then find MIN (A, B). 6
Set P
SLR-TX – 331 -6- *SLRTX331*

8. a) Let A be a fuzzy set defined by


0 .5 0 .4 0 .7 0 .8 1
A= + + + +
1 1 .5 2 2 .5 3

List all α-cuts and strong α-cuts of A. 4


b) Calculate the fuzzy number B – A with the membership functions as 5
 x − 1 1< x ≤ 4
 3

7 − x 4 < x ≤ 7
A (x) = 
 3
 0 x > 7, x ≤ 1



 0 x ≥ 7, x < 13

 x−7 7 < x ≤ 10
B(x) = 
 13
13 − x 10 < x ≤ 13
 13

9. a) Explain the concept of fuzzy quantifiers. 4


b) Write down the conditions for a fuzzy set to qualify as a fuzzy number.
Determine which of the following functions are fuzzy numbers 5
sin x for 0 ≤ x ≤ π
i) A ( x ) = 
 0 otherwise

min{1, x} for x ≥ 0
ii) B ( x ) = 
 0 otherwise


_____________________

Set P
*SLRTX331* SLR-TX – 331

Seat
No. Set Q
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
applied mathematics – ii
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Attempt any three questions from each Section.
2) Figures to the right indicate full marks.
3) Use of scientific calculator is allowed.
4) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
5) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (1×14=14)


1) If XA = [2x – 1, 3 – 2x] and XB = [2x + 1, 5 – 2x] then for x ∈ (0, 1], XA+B =
a) [4x – 6, 2 – 4x] b) [4x, 8 – 4x] c) [4x, 8 + 4x] d) [3x, 8 – 4x]
2) Fuzzy cardinality of fuzzy set is
a) Level set b) Fuzzy number
c) Fuzzy set d) A real number
3) A ordinary fuzzy set is also called as
a) Type 2 fuzzy set b) Level 2 fuzzy set
c) Type 1 level 1 fuzzy set d) Type 2 level 2 fuzzy set
4) The crisp rule p → q : q → r ∴ p → R is known as
a) disjunctive syllogism b) hypothetical syllogism
c) modus ponens d) modus tollens
2
1  1 
5) If C ( x ) = and D ( x ) =   x ≥ 0 then ordering of fuzzy set is
1 + 5x  1 + 5x 
a) D ≤ C b) C ≤ D c) C = D d) C = D
6) If A is a fuzzy set, A(x) = A ( x ) , x ∈ X then x is called as
a) Special point b) Equilibrium point
c) Middle point d) Point of intersections

P.T.O.
SLR-TX – 331 -2- *SLRTX331*
x
7) For the fuzzy set A(x) = x ∈ {1, 2, 3, 4, 5} scalar cardinality of A ( x ) is
x+2
approximately
a) 2.1857 b) 2.8143 c) 2.8157 d) 1.1857
8) The rate of convergence of regula falsi method is
a) 1.235 b) 3.141 c) 1.618 d) None of these
9) Newton’s iterative formula to find the value of N is
1 N 1 N
a) xn+1 =  xn −  b) xn+1 =  xn + 
2 Xn  2 xn 

1 1
c) xn+1 = [ xn − Nxn ] d) xn+1 = [ xn + Nxn ]
2 2
10) Which of the following is a direct method ?
a) Newton-Raphson b) Bisection
c) Gauss Elimination d) Gauss Seidal
11) In solving simultaneous equations by Gauss Jordan method the coefficient
matrix is reduced to
a) Unit matrix b) Diagonal matrix
c) Null matrix d) Square matrix
12) The process of evaluating a definite integral from a set of tabulated
values of the intergrated F(x) is
a) Numerical value b) Numerical differentiation
c) Numerical integration d) None of these
13) Simpson’s one-third rule is used when number of subintervals are in
a) Multiples of 1 b) Multiples of 2 c) Multiples of 3 d) None of these
14) Using Bisection method, a second approximation to the root of the equation
x3 – 4x – 9 = 0 between 2 and 3 is
a) 2.95 b) 2.85 c) 2.75 d) 2.25

______________

Set Q
*SLRTX331* -3- SLR-TX – 331
Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


applied mathematics – ii
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Attempt any three questions from each Section.


2) Figures to the right indicate full marks.
3) Use of scientific calculator is allowed.

SECTION – I

2. Solve the following : (3×3=9)

a) Perform 4 iterations of Gauss-Jacobi’s method to find the solution of


the following system correct upto 4 decimal places 10x + y – 2z = 7.74,
x + 12y + 3z = 39.66, 3x + 4y + 15z = 54.8.

b) Solve the following system of equations using Gauss Elimination method

x + y + z = 9, 2x – 3y + 4z = 13, 3x + 4y + 5z = 40.

c) Perform three iterations of power method to find largest eigenvalue of the


following matrix correct upto three decimal places taking X0 = [0, 0, 1] T as
1 3 −1
initial approximation  3 2 4  .

 −1 4 10 

3. Solve the following : (5×2=10)

a) Find a positive real root of the equation cosx = 3x – 1 correct to 4 decimal


places using method of false position.

b) Perform six iterations of Bisection method to find positive real root of the
equation x3 – 2x – 5 = 0 correct upto 4 decimal places.

Set Q
SLR-TX – 331 -4- *SLRTX331*

4. Solve the following : (3×3=9)


7

∫ sin ( x ) dx taking 7 ordinates using Trapezoidal rule. Correct


2
a) Evaluate
1
upto 4 decimal places.
π/2
th π
b) Evaluate ∫ cos x dx using Simpson’s 3 rule taking h =
12
correct upto
0 8
4 decimal places.
2
dx
c) Use Romberg’s method to compute ∫ x
correct upto 4 decimal places by
1

taking h = 0.5, 0.25.

5. Solve the following (Attempt any three) : (3×3=9)


a) Find a real root of the equation x3 – x – 4 = 0 correct to 4 decimal places
using Newton-Raphson method taking initial approximation x0 = 1.5.
b) Solve the following system of equations using Gauss Jordan method
x + 3y + z = 3, x + 4y + 2z = 3, –x – 2y + 3z = –6.
2
−x
c) Evaluate ∫e x dx using Weddle’s rule taking 7 ordinates correct upto
1
4 decimal places.
1
dx
d) Evaluate ∫ 1+ x2 using Gauss formula for n = 2.
−1

SECTION – II

6. a) Sketch the graphs of fuzzy sets A and B defined by


i) A(x) = 2–x x ∈ X = [0, 10]
x
ii) B ( x ) = x ∈ X = [0, 10]
x + 2

also find their α-cut interval. 4

Set Q
*SLRTX331* -5- SLR-TX – 331

b) If A and B are fuzzy sets defined on universal set X given by


0 .5 1 0 .5 0 .3
A (x) =
+ + +
−1 0 1 2
0 .5 1 0 .5 0 .3
B(x) = + + +
2 3 4 5
and let f : X × X → X be defined by f(x1, x2) = x2 – x1, x1x2 ∈ X then find
f(A, B) by using an extension principle. 5

7. a) Define the following terms :


i) Support of a fuzzy set
ii) Degree of subsethood. 4
b) Solve the fuzzy equation A.X = B where 6
x − 4 4 < x ≤ 5

A ( x ) = 6 − x 5 < x ≤ 6
 0 otherwise

 x − 10 10 < x ≤ 20
 10

 35 − x 20 < x ≤ 35
B (x) = 
 15
 0 otherwise


OR
b) Let A and B be two fuzzy numbers whose membership functions are given by
 x + 1 −1 < x ≤ 1
 2

3 − x 1< x ≤ 3
A (x) = 
 2
 0 otherwise


 x − 1 1< x ≤ 3
 2

5 − x 3 < x ≤ 5
B(x) = 
 2
 0 otherwise


then find MIN (A, B). 6
Set Q
SLR-TX – 331 -6- *SLRTX331*

8. a) Let A be a fuzzy set defined by


0 .5 0 .4 0 .7 0 .8 1
A= + + + +
1 1 .5 2 2 .5 3

List all α-cuts and strong α-cuts of A. 4


b) Calculate the fuzzy number B – A with the membership functions as 5
 x − 1 1< x ≤ 4
 3

7 − x 4 < x ≤ 7
A (x) = 
 3
 0 x > 7, x ≤ 1



 0 x ≥ 7, x < 13

 x−7 7 < x ≤ 10
B(x) = 
 13
13 − x 10 < x ≤ 13
 13

9. a) Explain the concept of fuzzy quantifiers. 4


b) Write down the conditions for a fuzzy set to qualify as a fuzzy number.
Determine which of the following functions are fuzzy numbers 5
sin x for 0 ≤ x ≤ π
i) A ( x ) = 
 0 otherwise

min{1, x} for x ≥ 0
ii) B ( x ) = 
 0 otherwise


_____________________

Set Q
*SLRTX331* SLR-TX – 331

Seat
No. Set R
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
applied mathematics – ii
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Attempt any three questions from each Section.
2) Figures to the right indicate full marks.
3) Use of scientific calculator is allowed.
4) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
5) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (1×14=14)


1) The process of evaluating a definite integral from a set of tabulated
values of the intergrated F(x) is
a) Numerical value b) Numerical differentiation
c) Numerical integration d) None of these
2) Simpson’s one-third rule is used when number of subintervals are in
a) Multiples of 1 b) Multiples of 2 c) Multiples of 3 d) None of these
3) Using Bisection method, a second approximation to the root of the equation
x3 – 4x – 9 = 0 between 2 and 3 is
a) 2.95 b) 2.85
c) 2.75 d) 2.25
4) If XA = [2x – 1, 3 – 2x] and XB = [2x + 1, 5 – 2x] then for x ∈ (0, 1], XA+B =
a) [4x – 6, 2 – 4x] b) [4x, 8 – 4x] c) [4x, 8 + 4x] d) [3x, 8 – 4x]
5) Fuzzy cardinality of fuzzy set is
a) Level set b) Fuzzy number
c) Fuzzy set d) A real number
6) A ordinary fuzzy set is also called as
a) Type 2 fuzzy set b) Level 2 fuzzy set
c) Type 1 level 1 fuzzy set d) Type 2 level 2 fuzzy set
P.T.O.
SLR-TX – 331 -2- *SLRTX331*
7) The crisp rule p → q : q → r ∴ p → R is known as
a) disjunctive syllogism b) hypothetical syllogism
c) modus ponens d) modus tollens
2
1  1 
8) If C ( x ) = and D ( x ) =   x ≥ 0 then ordering of fuzzy set is
1 + 5x  1 + 5x 
a) D ≤ C b) C ≤ D c) C = D d) C = D
9) If A is a fuzzy set, A(x) = A ( x ) , x ∈ X then x is called as
a) Special point b) Equilibrium point
c) Middle point d) Point of intersections
x
10) For the fuzzy set A(x) = x ∈ {1, 2, 3, 4, 5} scalar cardinality of A ( x ) is
x+2
approximately
a) 2.1857 b) 2.8143 c) 2.8157 d) 1.1857
11) The rate of convergence of regula falsi method is
a) 1.235 b) 3.141 c) 1.618 d) None of these
12) Newton’s iterative formula to find the value of N is
1 N 1 N
a) xn+1 =  xn −  b) xn+1 =  xn + 
2 Xn  2 xn 

1 1
c) xn+1 = [ xn − Nxn ] d) xn+1 = [ xn + Nxn ]
2 2
13) Which of the following is a direct method ?
a) Newton-Raphson b) Bisection
c) Gauss Elimination d) Gauss Seidal
14) In solving simultaneous equations by Gauss Jordan method the coefficient
matrix is reduced to
a) Unit matrix b) Diagonal matrix
c) Null matrix d) Square matrix
______________

Set R
*SLRTX331* -3- SLR-TX – 331
Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


applied mathematics – ii
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Attempt any three questions from each Section.


2) Figures to the right indicate full marks.
3) Use of scientific calculator is allowed.

SECTION – I

2. Solve the following : (3×3=9)

a) Perform 4 iterations of Gauss-Jacobi’s method to find the solution of


the following system correct upto 4 decimal places 10x + y – 2z = 7.74,
x + 12y + 3z = 39.66, 3x + 4y + 15z = 54.8.

b) Solve the following system of equations using Gauss Elimination method

x + y + z = 9, 2x – 3y + 4z = 13, 3x + 4y + 5z = 40.

c) Perform three iterations of power method to find largest eigenvalue of the


following matrix correct upto three decimal places taking X0 = [0, 0, 1] T as
1 3 −1
initial approximation  3 2 4  .

 −1 4 10 

3. Solve the following : (5×2=10)

a) Find a positive real root of the equation cosx = 3x – 1 correct to 4 decimal


places using method of false position.

b) Perform six iterations of Bisection method to find positive real root of the
equation x3 – 2x – 5 = 0 correct upto 4 decimal places.

Set R
SLR-TX – 331 -4- *SLRTX331*

4. Solve the following : (3×3=9)


7

∫ sin ( x ) dx taking 7 ordinates using Trapezoidal rule. Correct


2
a) Evaluate
1
upto 4 decimal places.
π/2
th π
b) Evaluate ∫ cos x dx using Simpson’s 3 rule taking h =
12
correct upto
0 8
4 decimal places.
2
dx
c) Use Romberg’s method to compute ∫ x
correct upto 4 decimal places by
1

taking h = 0.5, 0.25.

5. Solve the following (Attempt any three) : (3×3=9)


a) Find a real root of the equation x3 – x – 4 = 0 correct to 4 decimal places
using Newton-Raphson method taking initial approximation x0 = 1.5.
b) Solve the following system of equations using Gauss Jordan method
x + 3y + z = 3, x + 4y + 2z = 3, –x – 2y + 3z = –6.
2
−x
c) Evaluate ∫e x dx using Weddle’s rule taking 7 ordinates correct upto
1
4 decimal places.
1
dx
d) Evaluate ∫ 1+ x2 using Gauss formula for n = 2.
−1

SECTION – II

6. a) Sketch the graphs of fuzzy sets A and B defined by


i) A(x) = 2–x x ∈ X = [0, 10]
x
ii) B ( x ) = x ∈ X = [0, 10]
x + 2

also find their α-cut interval. 4

Set R
*SLRTX331* -5- SLR-TX – 331

b) If A and B are fuzzy sets defined on universal set X given by


0 .5 1 0 .5 0 .3
A (x) =
+ + +
−1 0 1 2
0 .5 1 0 .5 0 .3
B(x) = + + +
2 3 4 5
and let f : X × X → X be defined by f(x1, x2) = x2 – x1, x1x2 ∈ X then find
f(A, B) by using an extension principle. 5

7. a) Define the following terms :


i) Support of a fuzzy set
ii) Degree of subsethood. 4
b) Solve the fuzzy equation A.X = B where 6
x − 4 4 < x ≤ 5

A ( x ) = 6 − x 5 < x ≤ 6
 0 otherwise

 x − 10 10 < x ≤ 20
 10

 35 − x 20 < x ≤ 35
B (x) = 
 15
 0 otherwise


OR
b) Let A and B be two fuzzy numbers whose membership functions are given by
 x + 1 −1 < x ≤ 1
 2

3 − x 1< x ≤ 3
A (x) = 
 2
 0 otherwise


 x − 1 1< x ≤ 3
 2

5 − x 3 < x ≤ 5
B(x) = 
 2
 0 otherwise


then find MIN (A, B). 6
Set R
SLR-TX – 331 -6- *SLRTX331*

8. a) Let A be a fuzzy set defined by


0 .5 0 .4 0 .7 0 .8 1
A= + + + +
1 1 .5 2 2 .5 3

List all α-cuts and strong α-cuts of A. 4


b) Calculate the fuzzy number B – A with the membership functions as 5
 x − 1 1< x ≤ 4
 3

7 − x 4 < x ≤ 7
A (x) = 
 3
 0 x > 7, x ≤ 1



 0 x ≥ 7, x < 13

 x−7 7 < x ≤ 10
B(x) = 
 13
13 − x 10 < x ≤ 13
 13

9. a) Explain the concept of fuzzy quantifiers. 4


b) Write down the conditions for a fuzzy set to qualify as a fuzzy number.
Determine which of the following functions are fuzzy numbers 5
sin x for 0 ≤ x ≤ π
i) A ( x ) = 
 0 otherwise

min{1, x} for x ≥ 0
ii) B ( x ) = 
 0 otherwise


_____________________

Set R
*SLRTX331* SLR-TX – 331

Seat
No. Set S
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
applied mathematics – ii
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Attempt any three questions from each Section.
2) Figures to the right indicate full marks.
3) Use of scientific calculator is allowed.
4) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
5) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (1×14=14)


1) A ordinary fuzzy set is also called as
a) Type 2 fuzzy set b) Level 2 fuzzy set
c) Type 1 level 1 fuzzy set d) Type 2 level 2 fuzzy set
2) The crisp rule p → q : q → r ∴ p → R is known as
a) disjunctive syllogism b) hypothetical syllogism
c) modus ponens d) modus tollens
2
1  1 
3) If C ( x ) = and D ( x ) =   x ≥ 0 then ordering of fuzzy set is
1 + 5x  1 + 5x 
a) D ≤ C b) C ≤ D c) C = D d) C = D
4) If A is a fuzzy set, A(x) = A ( x ) , x ∈ X then x is called as
a) Special point b) Equilibrium point
c) Middle point d) Point of intersections
x
5) For the fuzzy set A(x) = x ∈ {1, 2, 3, 4, 5} scalar cardinality of A ( x ) is
x+2
approximately
a) 2.1857 b) 2.8143 c) 2.8157 d) 1.1857
6) The rate of convergence of regula falsi method is
a) 1.235 b) 3.141 c) 1.618 d) None of these
P.T.O.
SLR-TX – 331 -2- *SLRTX331*
7) Newton’s iterative formula to find the value of N is
1 N 1 N
a) xn+1 =  xn −  b) xn+1 =  xn + 
2 Xn  2 xn 

1 1
c) xn+1 = [ xn − Nxn ] d) xn+1 = [ xn + Nxn ]
2 2
8) Which of the following is a direct method ?
a) Newton-Raphson b) Bisection
c) Gauss Elimination d) Gauss Seidal
9) In solving simultaneous equations by Gauss Jordan method the coefficient
matrix is reduced to
a) Unit matrix b) Diagonal matrix
c) Null matrix d) Square matrix
10) The process of evaluating a definite integral from a set of tabulated
values of the intergrated F(x) is
a) Numerical value b) Numerical differentiation
c) Numerical integration d) None of these
11) Simpson’s one-third rule is used when number of subintervals are in
a) Multiples of 1 b) Multiples of 2 c) Multiples of 3 d) None of these
12) Using Bisection method, a second approximation to the root of the equation
x3 – 4x – 9 = 0 between 2 and 3 is
a) 2.95 b) 2.85 c) 2.75 d) 2.25
13) If XA = [2x – 1, 3 – 2x] and XB = [2x + 1, 5 – 2x] then for x ∈ (0, 1], XA+B =
a) [4x – 6, 2 – 4x] b) [4x, 8 – 4x] c) [4x, 8 + 4x] d) [3x, 8 – 4x]
14) Fuzzy cardinality of fuzzy set is
a) Level set b) Fuzzy number
c) Fuzzy set d) A real number
______________

Set S
*SLRTX331* -3- SLR-TX – 331
Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


applied mathematics – ii
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Attempt any three questions from each Section.


2) Figures to the right indicate full marks.
3) Use of scientific calculator is allowed.

SECTION – I

2. Solve the following : (3×3=9)

a) Perform 4 iterations of Gauss-Jacobi’s method to find the solution of


the following system correct upto 4 decimal places 10x + y – 2z = 7.74,
x + 12y + 3z = 39.66, 3x + 4y + 15z = 54.8.

b) Solve the following system of equations using Gauss Elimination method

x + y + z = 9, 2x – 3y + 4z = 13, 3x + 4y + 5z = 40.

c) Perform three iterations of power method to find largest eigenvalue of the


following matrix correct upto three decimal places taking X0 = [0, 0, 1] T as
1 3 −1
initial approximation  3 2 4  .

 −1 4 10 

3. Solve the following : (5×2=10)

a) Find a positive real root of the equation cosx = 3x – 1 correct to 4 decimal


places using method of false position.

b) Perform six iterations of Bisection method to find positive real root of the
equation x3 – 2x – 5 = 0 correct upto 4 decimal places.

Set S
SLR-TX – 331 -4- *SLRTX331*

4. Solve the following : (3×3=9)


7

∫ sin ( x ) dx taking 7 ordinates using Trapezoidal rule. Correct


2
a) Evaluate
1
upto 4 decimal places.
π/2
th π
b) Evaluate ∫ cos x dx using Simpson’s 3 rule taking h =
12
correct upto
0 8
4 decimal places.
2
dx
c) Use Romberg’s method to compute ∫ x
correct upto 4 decimal places by
1

taking h = 0.5, 0.25.

5. Solve the following (Attempt any three) : (3×3=9)


a) Find a real root of the equation x3 – x – 4 = 0 correct to 4 decimal places
using Newton-Raphson method taking initial approximation x0 = 1.5.
b) Solve the following system of equations using Gauss Jordan method
x + 3y + z = 3, x + 4y + 2z = 3, –x – 2y + 3z = –6.
2
−x
c) Evaluate ∫e x dx using Weddle’s rule taking 7 ordinates correct upto
1
4 decimal places.
1
dx
d) Evaluate ∫ 1+ x2 using Gauss formula for n = 2.
−1

SECTION – II

6. a) Sketch the graphs of fuzzy sets A and B defined by


i) A(x) = 2–x x ∈ X = [0, 10]
x
ii) B ( x ) = x ∈ X = [0, 10]
x + 2

also find their α-cut interval. 4

Set S
*SLRTX331* -5- SLR-TX – 331

b) If A and B are fuzzy sets defined on universal set X given by


0 .5 1 0 .5 0 .3
A (x) =
+ + +
−1 0 1 2
0 .5 1 0 .5 0 .3
B(x) = + + +
2 3 4 5
and let f : X × X → X be defined by f(x1, x2) = x2 – x1, x1x2 ∈ X then find
f(A, B) by using an extension principle. 5

7. a) Define the following terms :


i) Support of a fuzzy set
ii) Degree of subsethood. 4
b) Solve the fuzzy equation A.X = B where 6
x − 4 4 < x ≤ 5

A ( x ) = 6 − x 5 < x ≤ 6
 0 otherwise

 x − 10 10 < x ≤ 20
 10

 35 − x 20 < x ≤ 35
B (x) = 
 15
 0 otherwise


OR
b) Let A and B be two fuzzy numbers whose membership functions are given by
 x + 1 −1 < x ≤ 1
 2

3 − x 1< x ≤ 3
A (x) = 
 2
 0 otherwise


 x − 1 1< x ≤ 3
 2

5 − x 3 < x ≤ 5
B(x) = 
 2
 0 otherwise


then find MIN (A, B). 6
Set S
SLR-TX – 331 -6- *SLRTX331*

8. a) Let A be a fuzzy set defined by


0 .5 0 .4 0 .7 0 .8 1
A= + + + +
1 1 .5 2 2 .5 3

List all α-cuts and strong α-cuts of A. 4


b) Calculate the fuzzy number B – A with the membership functions as 5
 x − 1 1< x ≤ 4
 3

7 − x 4 < x ≤ 7
A (x) = 
 3
 0 x > 7, x ≤ 1



 0 x ≥ 7, x < 13

 x−7 7 < x ≤ 10
B(x) = 
 13
13 − x 10 < x ≤ 13
 13

9. a) Explain the concept of fuzzy quantifiers. 4


b) Write down the conditions for a fuzzy set to qualify as a fuzzy number.
Determine which of the following functions are fuzzy numbers 5
sin x for 0 ≤ x ≤ π
i) A ( x ) = 
 0 otherwise

min{1, x} for x ≥ 0
ii) B ( x ) = 
 0 otherwise


_____________________

Set S
*SLRTX332* SLR-TX – 332
Seat
No.
Set P
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
THEORY OF COMPUTATION

Day and Date : Tuesday, 20-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative (s) from the following : 14

1) Finite automata has


a) Finite Memory b) Finite control
c) Read only head d) All a), b), c)

2) The language accepted by finite automata is


a) Context free b) Regular
c) Non-regular d) None

3) A FA can be used for


a) String recognition b) Arithmetic operations
c) Both a) and b) d) None

4) A finite automata is a/an


a) Acceptor b) Computing device
c) Both a) and b) d) None
P.T.O.
SLR-TX – 332 -2- *SLRTX332*
5) Regular expressions are
a) Compact representation of strings
b) Representation of strings over some alphabet
c) Compact representation of certain set of strings in algebric manner
d) None
6) If L1 and L2 are two regular languages, then concatenation of L1 and L2 is
a) L1L2 b) L1.L2 c) L1 × L2 d) None
7) Turing machine was invented by :
a) Alan Turing b) Turing man c) Turing taring d) None of these
8) Turing machine is more powerful than
a) Finite automata b) Push down automata
c) Both a) and b) d) None of these
9) A UTM is a
a) Programmable TM b) Two tape TM
c) Single tape TM d) None
10) Turing machine can be represented using
a) Transition table b) Transition diagram
c) Instantaneous description d) All of these
11) Which of the following is an extension to the basic model of turing machine ?
a) Multitude turing machine b) Multi head turing machine
c) Offline turing machine d) All of the above
12) A PDA accepts
a) Regular language b) CFL
c) CSL d) Both a) and b)
13) A grammer G can be described by
a) (Vn,∑, P, S) b) (∑, P, S) c) (Vn, P, S) d) (Vn,∑, P)
14) PDA can be represented with the help of
a) Instantaneous description b) Transition diagram
c) Transition table d) All of these

____________

Set P
*SLRTX332* -3- SLR-TX – 332
Seat
No.
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
THEORY OF COMPUTATION

Day and Date : Tuesday, 20-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)

1) Compare between NFA and DFA.

2) L = {x|x contains substring 010} Draw Finite Automata.

3) Derive CFC to accept lang. L = {ai bi ck | j > i + k}.

4) Define ^ - closure.

3. Attempt any two : (2×8=16)

1) Construct NFA-^ for (00 + 1) * (10) * using Kleen’s thermo.

2) Convert the following CFG to CNF.

S ->AACD

A -> aAb | ^

C ->cC |a

D->aDa |bDb| ^

3) Using subset construction method converts following NFA to FA.

Set P
SLR-TX – 332 -4- *SLRTX332*

SECTION – II

4. Attempt any three : (3×4=12)

1) What is PDA ?

2) Explain basic Turing machine model.

3) Obtain a Turing Machine to accept the language containing string of 0’s


and 1’s and ending with 011.

4) Explain pumping lemma for regular language.

5. Attempt any two : (2×8=16)

1) Design a PDA to accept a language of odd length Palindromes.

2) Design a Turing machine to accept the lang. L = {anbn ≥ 1}. Show an ID


for the string aaabbb with tape symbols.

3) What are the types of acceptance by a PDA ?

_________________

Set P
*SLRTX332* SLR-TX – 332
Seat
No.
Set q
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
THEORY OF COMPUTATION

Day and Date : Tuesday, 20-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative (s) from the following : 14

1) Turing machine is more powerful than


a) Finite automata b) Push down automata
c) Both a) and b) d) None of these
2) A UTM is a
a) Programmable TM b) Two tape TM
c) Single tape TM d) None
3) Turing machine can be represented using
a) Transition table b) Transition diagram
c) Instantaneous description d) All of these
4) Which of the following is an extension to the basic model of turing machine ?
a) Multitude turing machine b) Multi head turing machine
c) Offline turing machine d) All of the above
5) A PDA accepts
a) Regular language b) CFL
c) CSL d) Both a) and b)
P.T.O.
SLR-TX – 332 -2- *SLRTX332*
6) A grammer G can be described by
a) (Vn,∑, P, S) b) (∑, P, S) c) (Vn, P, S) d) (Vn,∑, P)
7) PDA can be represented with the help of
a) Instantaneous description b) Transition diagram
c) Transition table d) All of these

8) Finite automata has


a) Finite Memory b) Finite control
c) Read only head d) All a), b), c)

9) The language accepted by finite automata is


a) Context free b) Regular
c) Non-regular d) None

10) A FA can be used for


a) String recognition b) Arithmetic operations
c) Both a) and b) d) None

11) A finite automata is a/an


a) Acceptor b) Computing device
c) Both a) and b) d) None
12) Regular expressions are
a) Compact representation of strings
b) Representation of strings over some alphabet
c) Compact representation of certain set of strings in algebric manner
d) None
13) If L1 and L2 are two regular languages, then concatenation of L1 and L2 is
a) L1L2 b) L1.L2 c) L1 × L2 d) None
14) Turing machine was invented by :
a) Alan Turing b) Turing man c) Turing taring d) None of these

____________
Set Q
*SLRTX332* -3- SLR-TX – 332
Seat
No.
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
THEORY OF COMPUTATION

Day and Date : Tuesday, 20-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)

1) Compare between NFA and DFA.

2) L = {x|x contains substring 010} Draw Finite Automata.

3) Derive CFC to accept lang. L = {ai bi ck | j > i + k}.

4) Define ^ - closure.

3. Attempt any two : (2×8=16)

1) Construct NFA-^ for (00 + 1) * (10) * using Kleen’s thermo.

2) Convert the following CFG to CNF.

S ->AACD

A -> aAb | ^

C ->cC |a

D->aDa |bDb| ^

3) Using subset construction method converts following NFA to FA.

Set Q
SLR-TX – 332 -4- *SLRTX332*

SECTION – II

4. Attempt any three : (3×4=12)

1) What is PDA ?

2) Explain basic Turing machine model.

3) Obtain a Turing Machine to accept the language containing string of 0’s


and 1’s and ending with 011.

4) Explain pumping lemma for regular language.

5. Attempt any two : (2×8=16)

1) Design a PDA to accept a language of odd length Palindromes.

2) Design a Turing machine to accept the lang. L = {anbn ≥ 1}. Show an ID


for the string aaabbb with tape symbols.

3) What are the types of acceptance by a PDA ?

_________________

Set Q
*SLRTX332* SLR-TX – 332
Seat
No.
Set R
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
THEORY OF COMPUTATION

Day and Date : Tuesday, 20-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative (s) from the following : 14

1) Regular expressions are


a) Compact representation of strings
b) Representation of strings over some alphabet
c) Compact representation of certain set of strings in algebric manner
d) None
2) If L1 and L2 are two regular languages, then concatenation of L1 and L2 is
a) L1L2 b) L1.L2 c) L1 × L2 d) None
3) Turing machine was invented by :
a) Alan Turing b) Turing man c) Turing taring d) None of these
4) Turing machine is more powerful than
a) Finite automata b) Push down automata
c) Both a) and b) d) None of these
5) A UTM is a
a) Programmable TM b) Two tape TM
c) Single tape TM d) None
P.T.O.
SLR-TX – 332 -2- *SLRTX332*
6) Turing machine can be represented using
a) Transition table b) Transition diagram
c) Instantaneous description d) All of these
7) Which of the following is an extension to the basic model of turing machine ?
a) Multitude turing machine b) Multi head turing machine
c) Offline turing machine d) All of the above
8) A PDA accepts
a) Regular language b) CFL
c) CSL d) Both a) and b)
9) A grammer G can be described by
a) (Vn,∑, P, S) b) (∑, P, S) c) (Vn, P, S) d) (Vn,∑, P)
10) PDA can be represented with the help of
a) Instantaneous description b) Transition diagram
c) Transition table d) All of these

11) Finite automata has


a) Finite Memory b) Finite control
c) Read only head d) All a), b), c)

12) The language accepted by finite automata is


a) Context free b) Regular
c) Non-regular d) None

13) A FA can be used for


a) String recognition b) Arithmetic operations
c) Both a) and b) d) None

14) A finite automata is a/an


a) Acceptor b) Computing device
c) Both a) and b) d) None

____________
Set R
*SLRTX332* -3- SLR-TX – 332
Seat
No.
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
THEORY OF COMPUTATION

Day and Date : Tuesday, 20-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)

1) Compare between NFA and DFA.

2) L = {x|x contains substring 010} Draw Finite Automata.

3) Derive CFC to accept lang. L = {ai bi ck | j > i + k}.

4) Define ^ - closure.

3. Attempt any two : (2×8=16)

1) Construct NFA-^ for (00 + 1) * (10) * using Kleen’s thermo.

2) Convert the following CFG to CNF.

S ->AACD

A -> aAb | ^

C ->cC |a

D->aDa |bDb| ^

3) Using subset construction method converts following NFA to FA.

Set R
SLR-TX – 332 -4- *SLRTX332*

SECTION – II

4. Attempt any three : (3×4=12)

1) What is PDA ?

2) Explain basic Turing machine model.

3) Obtain a Turing Machine to accept the language containing string of 0’s


and 1’s and ending with 011.

4) Explain pumping lemma for regular language.

5. Attempt any two : (2×8=16)

1) Design a PDA to accept a language of odd length Palindromes.

2) Design a Turing machine to accept the lang. L = {anbn ≥ 1}. Show an ID


for the string aaabbb with tape symbols.

3) What are the types of acceptance by a PDA ?

_________________

Set R
*SLRTX332* SLR-TX – 332
Seat
No.
Set S
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
THEORY OF COMPUTATION

Day and Date : Tuesday, 20-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative (s) from the following : 14

1) Turing machine can be represented using


a) Transition table b) Transition diagram
c) Instantaneous description d) All of these
2) Which of the following is an extension to the basic model of turing machine ?
a) Multitude turing machine b) Multi head turing machine
c) Offline turing machine d) All of the above
3) A PDA accepts
a) Regular language b) CFL
c) CSL d) Both a) and b)
4) A grammer G can be described by
a) (Vn,∑, P, S) b) (∑, P, S) c) (Vn, P, S) d) (Vn,∑, P)
5) PDA can be represented with the help of
a) Instantaneous description b) Transition diagram
c) Transition table d) All of these
P.T.O.
SLR-TX – 332 -2- *SLRTX332*
6) Finite automata has
a) Finite Memory b) Finite control
c) Read only head d) All a), b), c)

7) The language accepted by finite automata is


a) Context free b) Regular
c) Non-regular d) None

8) A FA can be used for


a) String recognition b) Arithmetic operations
c) Both a) and b) d) None

9) A finite automata is a/an


a) Acceptor b) Computing device
c) Both a) and b) d) None
10) Regular expressions are
a) Compact representation of strings
b) Representation of strings over some alphabet
c) Compact representation of certain set of strings in algebric manner
d) None
11) If L1 and L2 are two regular languages, then concatenation of L1 and L2 is
a) L1L2 b) L1.L2 c) L1 × L2 d) None
12) Turing machine was invented by :
a) Alan Turing b) Turing man c) Turing taring d) None of these
13) Turing machine is more powerful than
a) Finite automata b) Push down automata
c) Both a) and b) d) None of these
14) A UTM is a
a) Programmable TM b) Two tape TM
c) Single tape TM d) None

____________
Set S
*SLRTX332* -3- SLR-TX – 332
Seat
No.
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
THEORY OF COMPUTATION

Day and Date : Tuesday, 20-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)

1) Compare between NFA and DFA.

2) L = {x|x contains substring 010} Draw Finite Automata.

3) Derive CFC to accept lang. L = {ai bi ck | j > i + k}.

4) Define ^ - closure.

3. Attempt any two : (2×8=16)

1) Construct NFA-^ for (00 + 1) * (10) * using Kleen’s thermo.

2) Convert the following CFG to CNF.

S ->AACD

A -> aAb | ^

C ->cC |a

D->aDa |bDb| ^

3) Using subset construction method converts following NFA to FA.

Set S
SLR-TX – 332 -4- *SLRTX332*

SECTION – II

4. Attempt any three : (3×4=12)

1) What is PDA ?

2) Explain basic Turing machine model.

3) Obtain a Turing Machine to accept the language containing string of 0’s


and 1’s and ending with 011.

4) Explain pumping lemma for regular language.

5. Attempt any two : (2×8=16)

1) Design a PDA to accept a language of odd length Palindromes.

2) Design a Turing machine to accept the lang. L = {anbn ≥ 1}. Show an ID


for the string aaabbb with tape symbols.

3) What are the types of acceptance by a PDA ?

_________________

Set S
*SLRTX333* SLR-TX – 333

Seat
No. Set P
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
microprocessors
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) The addressing mode used in MVI A, 04H is
a) Absolute b) Indirect
c) Immediate d) Direct
2) Vector address of RST 7.5 interrupt is
a) 0024 H b) 003 CH
c) 0034 H d) 002 CH
3) Special purpose register is
a) Program array b) Stack pointer
c) Index pointer d) Queue pointer
4) Mention the type of machine cycle for the following status and control
signals
IO/M = 1, S1 = 1, S0 = 0 RD = 0
a) I/O Read b) I/O Write
c) Opcode fetch d) Memory Read
5) The no. of address lines required to address a memory of size 64 KB is
a) 15 lines b) 16 lines
c) 18 lines d) 14 lines

P.T.O.
SLR-TX – 333 -2- *SLRTX333*

6) Register B contains 65 H and accumulator has 97 H, what is status of s, z, cy


flags after subtracting contents of Register B from accumulator ?
a) s = 0, z = 1, cy = 0 b) s = 1, z = 0, cy = 0
c) s = 0, z = 0, cy = 0 d) s = 1, z = 0, cy = 1
7) JMP 3200 is how many byte instruction ?
a) 1 byte instruction b) 2 byte instruction
c) 3 byte instruction d) 4 byte instruction
8) Which interrupt has highest priority ?
a) INTR b) TRAP
c) RST 6.5 d) RST 5.5
9) Which IC is used for USART ?
a) 8279 b) 8255
c) 8251 d) 8085
10) The unit that subjects the processor operation to boundary scan tests is
a) parity generation and control unit
b) prefetcher unit
c) boundary scan and control unit
d) segmentation unit
11) The common register(s) for all the four channels of 8257 are
a) DMA address register
b) Terminal count register
c) Mode set register and status register
d) None of the mentioned
12) In cascaded mode, the number of vectored interrupts provided by 8259 A is
a) 4 b) 8 c) 16 d) 64
13) In real addressing mode, the 80286 operates at a speed
a) faster than that of 8086 b) half of that of 8086
c) slower than that of 8086 d) same as that of 8086
14) The segments in 80386 real mode are
a) overlapped
b) non-overlapped
c) either overlapped or non-overlapped
d) none of the mentioned

______________

Set P
*SLRTX333* -3- SLR-TX – 333
Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


microprocessors
Day and Date : Thursday, 22-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instruction : Figures to right indicate full marks.


SECTION – I
2. Attempt any three : (3×4=12)
a) Draw and explain flag register of 8085.
b) Interface 1K × 8 memory to 8085 using 1K × 4 memory chips. Interface it at
address C400 H.
c) Write a program to subtract two 16 bit numbers stored at memory address
starting from 4000 H. The result should be stored at 4008 H.
d) Describe instruction register and instruction decoder.
3. Attempt any two : (2×8=16)
a) Explain the working of following instructions with example :
A) LDAX B B) POP PSW C) XTHL D) PCHL
b) Draw pin diagram of Intel 8085 and explain the various pins of 8085.
c) Draw and explain timing diagram of OUT instruction.
SECTION – II
4. Attempt any three : (3×4=12)
a) Write a short note on Hardware and Software interrupts.
b) Explain the different modes of operations of 8255 PPI.
c) Draw and explain block diagram of DMA controller 8257.
d) Draw and explain block diagram of 8259 PIC.
5. Attempt any two : (2×8=16)
a) Explain interrupt sequence in detail. Also explain interrupt sequence for INTR
interrupts.
b) Draw and explain block diagram of 8251 USART.
c) Explain with neat architecture 80286 microprocessor.
____________ Set P
Set P
*SLRTX333* SLR-TX – 333

Seat
No. Set Q
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
microprocessors
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Which interrupt has highest priority ?
a) INTR b) TRAP
c) RST 6.5 d) RST 5.5
2) Which IC is used for USART ?
a) 8279 b) 8255
c) 8251 d) 8085
3) The unit that subjects the processor operation to boundary scan tests is
a) parity generation and control unit
b) prefetcher unit
c) boundary scan and control unit
d) segmentation unit
4) The common register(s) for all the four channels of 8257 are
a) DMA address register
b) Terminal count register
c) Mode set register and status register
d) None of the mentioned
5) In cascaded mode, the number of vectored interrupts provided by 8259 A is
a) 4 b) 8 c) 16 d) 64
P.T.O.
SLR-TX – 333 -2- *SLRTX333*

6) In real addressing mode, the 80286 operates at a speed


a) faster than that of 8086 b) half of that of 8086
c) slower than that of 8086 d) same as that of 8086
7) The segments in 80386 real mode are
a) overlapped
b) non-overlapped
c) either overlapped or non-overlapped
d) none of the mentioned
8) The addressing mode used in MVI A, 04H is
a) Absolute b) Indirect
c) Immediate d) Direct
9) Vector address of RST 7.5 interrupt is
a) 0024 H b) 003 CH
c) 0034 H d) 002 CH
10) Special purpose register is
a) Program array b) Stack pointer
c) Index pointer d) Queue pointer
11) Mention the type of machine cycle for the following status and control
signals
IO/M = 1, S1 = 1, S0 = 0 RD = 0
a) I/O Read b) I/O Write
c) Opcode fetch d) Memory Read
12) The no. of address lines required to address a memory of size 64 KB is
a) 15 lines b) 16 lines
c) 18 lines d) 14 lines
13) Register B contains 65 H and accumulator has 97 H, what is status of s, z, cy
flags after subtracting contents of Register B from accumulator ?
a) s = 0, z = 1, cy = 0 b) s = 1, z = 0, cy = 0
c) s = 0, z = 0, cy = 0 d) s = 1, z = 0, cy = 1
14) JMP 3200 is how many byte instruction ?
a) 1 byte instruction b) 2 byte instruction
c) 3 byte instruction d) 4 byte instruction
______________

Set Q
*SLRTX333* -3- SLR-TX – 333
Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


microprocessors
Day and Date : Thursday, 22-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instruction : Figures to right indicate full marks.


SECTION – I
2. Attempt any three : (3×4=12)
a) Draw and explain flag register of 8085.
b) Interface 1K × 8 memory to 8085 using 1K × 4 memory chips. Interface it at
address C400 H.
c) Write a program to subtract two 16 bit numbers stored at memory address
starting from 4000 H. The result should be stored at 4008 H.
d) Describe instruction register and instruction decoder.
3. Attempt any two : (2×8=16)
a) Explain the working of following instructions with example :
A) LDAX B B) POP PSW C) XTHL D) PCHL
b) Draw pin diagram of Intel 8085 and explain the various pins of 8085.
c) Draw and explain timing diagram of OUT instruction.
SECTION – II
4. Attempt any three : (3×4=12)
a) Write a short note on Hardware and Software interrupts.
b) Explain the different modes of operations of 8255 PPI.
c) Draw and explain block diagram of DMA controller 8257.
d) Draw and explain block diagram of 8259 PIC.
5. Attempt any two : (2×8=16)
a) Explain interrupt sequence in detail. Also explain interrupt sequence for INTR
interrupts.
b) Draw and explain block diagram of 8251 USART.
c) Explain with neat architecture 80286 microprocessor.
____________ Set Q
Set Q
*SLRTX333* SLR-TX – 333

Seat
No. Set R
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
microprocessors
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) The no. of address lines required to address a memory of size 64 KB is
a) 15 lines b) 16 lines
c) 18 lines d) 14 lines
2) Register B contains 65 H and accumulator has 97 H, what is status of s, z, cy
flags after subtracting contents of Register B from accumulator ?
a) s = 0, z = 1, cy = 0 b) s = 1, z = 0, cy = 0
c) s = 0, z = 0, cy = 0 d) s = 1, z = 0, cy = 1
3) JMP 3200 is how many byte instruction ?
a) 1 byte instruction b) 2 byte instruction
c) 3 byte instruction d) 4 byte instruction
4) Which interrupt has highest priority ?
a) INTR b) TRAP
c) RST 6.5 d) RST 5.5
5) Which IC is used for USART ?
a) 8279 b) 8255
c) 8251 d) 8085

P.T.O.
SLR-TX – 333 -2- *SLRTX333*

6) The unit that subjects the processor operation to boundary scan tests is
a) parity generation and control unit
b) prefetcher unit
c) boundary scan and control unit
d) segmentation unit
7) The common register(s) for all the four channels of 8257 are
a) DMA address register
b) Terminal count register
c) Mode set register and status register
d) None of the mentioned
8) In cascaded mode, the number of vectored interrupts provided by 8259 A is
a) 4 b) 8 c) 16 d) 64
9) In real addressing mode, the 80286 operates at a speed
a) faster than that of 8086 b) half of that of 8086
c) slower than that of 8086 d) same as that of 8086
10) The segments in 80386 real mode are
a) overlapped
b) non-overlapped
c) either overlapped or non-overlapped
d) none of the mentioned
11) The addressing mode used in MVI A, 04H is
a) Absolute b) Indirect
c) Immediate d) Direct
12) Vector address of RST 7.5 interrupt is
a) 0024 H b) 003 CH
c) 0034 H d) 002 CH
13) Special purpose register is
a) Program array b) Stack pointer
c) Index pointer d) Queue pointer
14) Mention the type of machine cycle for the following status and control
signals
IO/M = 1, S1 = 1, S0 = 0 RD = 0
a) I/O Read b) I/O Write
c) Opcode fetch d) Memory Read

______________
Set R
*SLRTX333* -3- SLR-TX – 333
Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


microprocessors
Day and Date : Thursday, 22-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instruction : Figures to right indicate full marks.


SECTION – I
2. Attempt any three : (3×4=12)
a) Draw and explain flag register of 8085.
b) Interface 1K × 8 memory to 8085 using 1K × 4 memory chips. Interface it at
address C400 H.
c) Write a program to subtract two 16 bit numbers stored at memory address
starting from 4000 H. The result should be stored at 4008 H.
d) Describe instruction register and instruction decoder.
3. Attempt any two : (2×8=16)
a) Explain the working of following instructions with example :
A) LDAX B B) POP PSW C) XTHL D) PCHL
b) Draw pin diagram of Intel 8085 and explain the various pins of 8085.
c) Draw and explain timing diagram of OUT instruction.
SECTION – II
4. Attempt any three : (3×4=12)
a) Write a short note on Hardware and Software interrupts.
b) Explain the different modes of operations of 8255 PPI.
c) Draw and explain block diagram of DMA controller 8257.
d) Draw and explain block diagram of 8259 PIC.
5. Attempt any two : (2×8=16)
a) Explain interrupt sequence in detail. Also explain interrupt sequence for INTR
interrupts.
b) Draw and explain block diagram of 8251 USART.
c) Explain with neat architecture 80286 microprocessor.
____________ Set R
Set R
*SLRTX333* SLR-TX – 333

Seat
No. Set S
S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018
microprocessors
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) The unit that subjects the processor operation to boundary scan tests is
a) parity generation and control unit
b) prefetcher unit
c) boundary scan and control unit
d) segmentation unit
2) The common register(s) for all the four channels of 8257 are
a) DMA address register
b) Terminal count register
c) Mode set register and status register
d) None of the mentioned
3) In cascaded mode, the number of vectored interrupts provided by 8259 A is
a) 4 b) 8 c) 16 d) 64
4) In real addressing mode, the 80286 operates at a speed
a) faster than that of 8086 b) half of that of 8086
c) slower than that of 8086 d) same as that of 8086

P.T.O.
SLR-TX – 333 -2- *SLRTX333*

5) The segments in 80386 real mode are


a) overlapped
b) non-overlapped
c) either overlapped or non-overlapped
d) none of the mentioned
6) The addressing mode used in MVI A, 04H is
a) Absolute b) Indirect
c) Immediate d) Direct
7) Vector address of RST 7.5 interrupt is
a) 0024 H b) 003 CH
c) 0034 H d) 002 CH
8) Special purpose register is
a) Program array b) Stack pointer
c) Index pointer d) Queue pointer
9) Mention the type of machine cycle for the following status and control
signals
IO/M = 1, S1 = 1, S0 = 0 RD = 0
a) I/O Read b) I/O Write
c) Opcode fetch d) Memory Read
10) The no. of address lines required to address a memory of size 64 KB is
a) 15 lines b) 16 lines
c) 18 lines d) 14 lines
11) Register B contains 65 H and accumulator has 97 H, what is status of s, z, cy
flags after subtracting contents of Register B from accumulator ?
a) s = 0, z = 1, cy = 0 b) s = 1, z = 0, cy = 0
c) s = 0, z = 0, cy = 0 d) s = 1, z = 0, cy = 1
12) JMP 3200 is how many byte instruction ?
a) 1 byte instruction b) 2 byte instruction
c) 3 byte instruction d) 4 byte instruction
13) Which interrupt has highest priority ?
a) INTR b) TRAP
c) RST 6.5 d) RST 5.5
14) Which IC is used for USART ?
a) 8279 b) 8255
c) 8251 d) 8085
______________
Set S
*SLRTX333* -3- SLR-TX – 333
Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


microprocessors
Day and Date : Thursday, 22-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instruction : Figures to right indicate full marks.


SECTION – I
2. Attempt any three : (3×4=12)
a) Draw and explain flag register of 8085.
b) Interface 1K × 8 memory to 8085 using 1K × 4 memory chips. Interface it at
address C400 H.
c) Write a program to subtract two 16 bit numbers stored at memory address
starting from 4000 H. The result should be stored at 4008 H.
d) Describe instruction register and instruction decoder.
3. Attempt any two : (2×8=16)
a) Explain the working of following instructions with example :
A) LDAX B B) POP PSW C) XTHL D) PCHL
b) Draw pin diagram of Intel 8085 and explain the various pins of 8085.
c) Draw and explain timing diagram of OUT instruction.
SECTION – II
4. Attempt any three : (3×4=12)
a) Write a short note on Hardware and Software interrupts.
b) Explain the different modes of operations of 8255 PPI.
c) Draw and explain block diagram of DMA controller 8257.
d) Draw and explain block diagram of 8259 PIC.
5. Attempt any two : (2×8=16)
a) Explain interrupt sequence in detail. Also explain interrupt sequence for INTR
interrupts.
b) Draw and explain block diagram of 8251 USART.
c) Explain with neat architecture 80286 microprocessor.
____________ Set S
Set S
*SLRTX334* SLR-TX – 334
Seat
No.

Set P

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book on Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer. (1�14=14)


1) Stack cannot be used to
a) Allocate resource and scheduling
b) Implementation of recursion
c) Reverse string
d) Postfix expression evaluation
2) The result of evaluating the postfix expression 123*+4 – is
a) 6 b) 3 c) 10 d) 7
3) Following sequence of operations are performed on a stack.
Push( 1), push( 2 ), pop, push( 1 ), push( 2 ), pop, pop, pop, push( 2 ), pop.
The sequence of popped out values are
a) 2, 2, 1, 1, 2 b) 2, 2, 1, 2, 2
c) 2, 1, 2, 2, 1 d) 2, 1, 2, 2, 2
4) What can be said about the array representation of a circular queue when it
contains only one element ?
a) Front = Rear = Null b) Front = Rear + 1
c) Front = Rear – 1 d) Front = Rear
5) Ascending priority queue is one in which the item removed is
a) The item with highest priority b) The item with lowest priority
c) Any item d) None
P.T.O.
SLR-TX – 334 -2- *SLRTX334*
6) Which of the following operations is performed more efficiently by doubly linked
list than by singly linked list ?
a) Inserting a new mode after node whose location is given
b) Searching of an unsorted list for a given item
c) Deleting a node whose location is given
d) All above
7) A complete binary tree of level 5 (considering root at level 1) has how many nodes ?
a) 63 b) 31 c) 15 d) 32
8) Which of the following tree is typically used for “External Search” ?
a) B tree b) AVL tree
c) Red Black tree d) BST
9) In a graph if e=[u, v], then u and v are called __________
a) End points of e b) Adjacent nodes
c) Neighbors d) All of the above
10) If we draw an AVL tree using following elements 50, 45, 80, 95, 26, 43, 105, 2.
What will be balance factor of node 43 in finally produced AVL tree ?
a) 0 b) –1 c) +2 d) +1
11) Topological sort can be apply to only __________
a) Directed Acyclic graph b) Cyclic graph
c) All types of graph d) None of the above
12) Consider B+ tree in which the search key is 12 bytes long, block size is
1024 bytes, record pointer is 10 bytes long and block pointer is 8 bytes long. The
maximum number of keys that can be accommodated in each “non-leaf node” of
the tree is
a) 49 b) 50 c) 51 d) 52
13) Dijkestra Algorithms is used for finding __________
a) Cycle in the graph b) Topological sort
c) Shortest path d) Tree in a graph
14) In AVL tree the __________ of node is the height of its left subtree minus the
height of its right subtree.
a) Ordering b) Balanced factor
c) Cardinality d) Multiplicity

_________________

Set P
*SLRTX334* SLR-TX – 334
-3-


Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Answer the following questions (any three) : (4�3=12)

a) Write a C function to insert a node at the end of a singly linked list.

b) What are various applications of stack ? Evaluate postfix expression A B + C * D /


if A = 2, B = 3, C = 4 and D = 5 by providing proper explanation and content of
stack.

c) Explain different traversal techniques of Binary tree.

d) Write the properties of Threaded Binary Trees with example.

3. Answer any one : 8

a) Write a menu driven program to implement circular queue showing operations,


Insertion, Deletion and Display.

b) Write a program to implement a stack using singly linked list.

4. Write a program to implement doubly linked list and perform the operations : 8

1) Insert a node in the beginning of the list.

2) Insert a node at the end of the list.

3) Delete a given node.

4) Display the linked list.

Set P
SLR-TX – 334 -4- *SLRTX334*
Section – II

5. Attempt any three : (3�4=12)

A) Discuss B+ Tree with an example. What is difference between B tree and


B+ tree ?

B) Explain depth first search algorithm for graph with proper example.

C) What is multiway search tree ? List difference between binary search tree
and multiway search tree.

D) Define the following terms with proper diagram :


i) Graph
ii) Path
iii) Cycle
iv) Weighted graph.

E) What is AVL tree ? With an example, explain the single rotation in AVL.

6. Attempt any two : (8�2=16)


A) What are the properties of a B tree ? Construct the B-tree of order 4 and 5 for the
following elements :

23, 43, 46, 21, 66, 76, 54, 38, 89, 95, 77, 82, 11 (with explanation for every step.)

B) Insert the following key in order to build an AVL tree (Explain every step and
rotation) :

a) 12,23,33,45,51,69,72,84,3,27
b) represent deletion of node 23, 72,84.

C) With an example, explain the Dijkstra shortest path algorithm.

_________________

Set P
*SLRTX334* SLR-TX – 334
Seat
No.

Set Q

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book on Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer. (1�14=14)


1) Which of the following tree is typically used for “External Search” ?
a) B tree b) AVL tree
c) Red Black tree d) BST
2) In a graph if e=[u, v], then u and v are called __________
a) End points of e b) Adjacent nodes
c) Neighbors d) All of the above
3) If we draw an AVL tree using following elements 50, 45, 80, 95, 26, 43, 105, 2.
What will be balance factor of node 43 in finally produced AVL tree ?
a) 0 b) –1 c) +2 d) +1
4) Topological sort can be apply to only __________
a) Directed Acyclic graph b) Cyclic graph
c) All types of graph d) None of the above
5) Consider B+ tree in which the search key is 12 bytes long, block size is
1024 bytes, record pointer is 10 bytes long and block pointer is 8 bytes long. The
maximum number of keys that can be accommodated in each “non-leaf node” of
the tree is
a) 49 b) 50 c) 51 d) 52
P.T.O.
SLR-TX – 334 -2- *SLRTX334*
6) Dijkestra Algorithms is used for finding __________
a) Cycle in the graph b) Topological sort
c) Shortest path d) Tree in a graph
7) In AVL tree the __________ of node is the height of its left subtree minus the
height of its right subtree.
a) Ordering b) Balanced factor
c) Cardinality d) Multiplicity
8) Stack cannot be used to
a) Allocate resource and scheduling
b) Implementation of recursion
c) Reverse string
d) Postfix expression evaluation
9) The result of evaluating the postfix expression 123*+4 – is
a) 6 b) 3 c) 10 d) 7
10) Following sequence of operations are performed on a stack.
Push( 1), push( 2 ), pop, push( 1 ), push( 2 ), pop, pop, pop, push( 2 ), pop.
The sequence of popped out values are
a) 2, 2, 1, 1, 2 b) 2, 2, 1, 2, 2
c) 2, 1, 2, 2, 1 d) 2, 1, 2, 2, 2
11) What can be said about the array representation of a circular queue when it
contains only one element ?
a) Front = Rear = Null b) Front = Rear + 1
c) Front = Rear – 1 d) Front = Rear
12) Ascending priority queue is one in which the item removed is
a) The item with highest priority b) The item with lowest priority
c) Any item d) None
13) Which of the following operations is performed more efficiently by doubly linked
list than by singly linked list ?
a) Inserting a new mode after node whose location is given
b) Searching of an unsorted list for a given item
c) Deleting a node whose location is given
d) All above
14) A complete binary tree of level 5 (considering root at level 1) has how many nodes ?
a) 63 b) 31 c) 15 d) 32

_________________

Set Q
*SLRTX334* SLR-TX – 334
-3-


Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Answer the following questions (any three) : (4�3=12)

a) Write a C function to insert a node at the end of a singly linked list.

b) What are various applications of stack ? Evaluate postfix expression A B + C * D /


if A = 2, B = 3, C = 4 and D = 5 by providing proper explanation and content of
stack.

c) Explain different traversal techniques of Binary tree.

d) Write the properties of Threaded Binary Trees with example.

3. Answer any one : 8

a) Write a menu driven program to implement circular queue showing operations,


Insertion, Deletion and Display.

b) Write a program to implement a stack using singly linked list.

4. Write a program to implement doubly linked list and perform the operations : 8

1) Insert a node in the beginning of the list.

2) Insert a node at the end of the list.

3) Delete a given node.

4) Display the linked list.

Set Q
SLR-TX – 334 -4- *SLRTX334*
Section – II

5. Attempt any three : (3�4=12)

A) Discuss B+ Tree with an example. What is difference between B tree and


B+ tree ?

B) Explain depth first search algorithm for graph with proper example.

C) What is multiway search tree ? List difference between binary search tree
and multiway search tree.

D) Define the following terms with proper diagram :


i) Graph
ii) Path
iii) Cycle
iv) Weighted graph.

E) What is AVL tree ? With an example, explain the single rotation in AVL.

6. Attempt any two : (8�2=16)


A) What are the properties of a B tree ? Construct the B-tree of order 4 and 5 for the
following elements :

23, 43, 46, 21, 66, 76, 54, 38, 89, 95, 77, 82, 11 (with explanation for every step.)

B) Insert the following key in order to build an AVL tree (Explain every step and
rotation) :

a) 12,23,33,45,51,69,72,84,3,27
b) represent deletion of node 23, 72,84.

C) With an example, explain the Dijkstra shortest path algorithm.

_________________

Set Q
*SLRTX334* SLR-TX – 334
Seat
No.

Set R

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book on Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer. (1�14=14)


1) Ascending priority queue is one in which the item removed is
a) The item with highest priority b) The item with lowest priority
c) Any item d) None
2) Which of the following operations is performed more efficiently by doubly linked
list than by singly linked list ?
a) Inserting a new mode after node whose location is given
b) Searching of an unsorted list for a given item
c) Deleting a node whose location is given
d) All above
3) A complete binary tree of level 5 (considering root at level 1) has how many nodes ?
a) 63 b) 31 c) 15 d) 32
4) Which of the following tree is typically used for “External Search” ?
a) B tree b) AVL tree
c) Red Black tree d) BST
5) In a graph if e=[u, v], then u and v are called __________
a) End points of e b) Adjacent nodes
c) Neighbors d) All of the above
P.T.O.
SLR-TX – 334 -2- *SLRTX334*
6) If we draw an AVL tree using following elements 50, 45, 80, 95, 26, 43, 105, 2.
What will be balance factor of node 43 in finally produced AVL tree ?
a) 0 b) –1 c) +2 d) +1
7) Topological sort can be apply to only __________
a) Directed Acyclic graph b) Cyclic graph
c) All types of graph d) None of the above
8) Consider B+ tree in which the search key is 12 bytes long, block size is
1024 bytes, record pointer is 10 bytes long and block pointer is 8 bytes long. The
maximum number of keys that can be accommodated in each “non-leaf node” of
the tree is
a) 49 b) 50 c) 51 d) 52
9) Dijkestra Algorithms is used for finding __________
a) Cycle in the graph b) Topological sort
c) Shortest path d) Tree in a graph
10) In AVL tree the __________ of node is the height of its left subtree minus the
height of its right subtree.
a) Ordering b) Balanced factor
c) Cardinality d) Multiplicity
11) Stack cannot be used to
a) Allocate resource and scheduling
b) Implementation of recursion
c) Reverse string
d) Postfix expression evaluation
12) The result of evaluating the postfix expression 123*+4 – is
a) 6 b) 3 c) 10 d) 7
13) Following sequence of operations are performed on a stack.
Push( 1), push( 2 ), pop, push( 1 ), push( 2 ), pop, pop, pop, push( 2 ), pop.
The sequence of popped out values are
a) 2, 2, 1, 1, 2 b) 2, 2, 1, 2, 2
c) 2, 1, 2, 2, 1 d) 2, 1, 2, 2, 2
14) What can be said about the array representation of a circular queue when it
contains only one element ?
a) Front = Rear = Null b) Front = Rear + 1
c) Front = Rear – 1 d) Front = Rear

_________________

Set R
*SLRTX334* SLR-TX – 334
-3-


Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Answer the following questions (any three) : (4�3=12)

a) Write a C function to insert a node at the end of a singly linked list.

b) What are various applications of stack ? Evaluate postfix expression A B + C * D /


if A = 2, B = 3, C = 4 and D = 5 by providing proper explanation and content of
stack.

c) Explain different traversal techniques of Binary tree.

d) Write the properties of Threaded Binary Trees with example.

3. Answer any one : 8

a) Write a menu driven program to implement circular queue showing operations,


Insertion, Deletion and Display.

b) Write a program to implement a stack using singly linked list.

4. Write a program to implement doubly linked list and perform the operations : 8

1) Insert a node in the beginning of the list.

2) Insert a node at the end of the list.

3) Delete a given node.

4) Display the linked list.

Set R
SLR-TX – 334 -4- *SLRTX334*
Section – II

5. Attempt any three : (3�4=12)

A) Discuss B+ Tree with an example. What is difference between B tree and


B+ tree ?

B) Explain depth first search algorithm for graph with proper example.

C) What is multiway search tree ? List difference between binary search tree
and multiway search tree.

D) Define the following terms with proper diagram :


i) Graph
ii) Path
iii) Cycle
iv) Weighted graph.

E) What is AVL tree ? With an example, explain the single rotation in AVL.

6. Attempt any two : (8�2=16)


A) What are the properties of a B tree ? Construct the B-tree of order 4 and 5 for the
following elements :

23, 43, 46, 21, 66, 76, 54, 38, 89, 95, 77, 82, 11 (with explanation for every step.)

B) Insert the following key in order to build an AVL tree (Explain every step and
rotation) :

a) 12,23,33,45,51,69,72,84,3,27
b) represent deletion of node 23, 72,84.

C) With an example, explain the Dijkstra shortest path algorithm.

_________________

Set R
*SLRTX334* SLR-TX – 334
Seat
No.

Set S

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book on Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer. (1�14=14)


1) If we draw an AVL tree using following elements 50, 45, 80, 95, 26, 43, 105, 2.
What will be balance factor of node 43 in finally produced AVL tree ?
a) 0 b) –1 c) +2 d) +1
2) Topological sort can be apply to only __________
a) Directed Acyclic graph b) Cyclic graph
c) All types of graph d) None of the above
3) Consider B+ tree in which the search key is 12 bytes long, block size is
1024 bytes, record pointer is 10 bytes long and block pointer is 8 bytes long. The
maximum number of keys that can be accommodated in each “non-leaf node” of
the tree is
a) 49 b) 50 c) 51 d) 52
4) Dijkestra Algorithms is used for finding __________
a) Cycle in the graph b) Topological sort
c) Shortest path d) Tree in a graph
5) In AVL tree the __________ of node is the height of its left subtree minus the
height of its right subtree.
a) Ordering b) Balanced factor
c) Cardinality d) Multiplicity

P.T.O.
SLR-TX – 334 -2- *SLRTX334*
6) Stack cannot be used to
a) Allocate resource and scheduling
b) Implementation of recursion
c) Reverse string
d) Postfix expression evaluation
7) The result of evaluating the postfix expression 123*+4 – is
a) 6 b) 3 c) 10 d) 7
8) Following sequence of operations are performed on a stack.
Push( 1), push( 2 ), pop, push( 1 ), push( 2 ), pop, pop, pop, push( 2 ), pop.
The sequence of popped out values are
a) 2, 2, 1, 1, 2 b) 2, 2, 1, 2, 2
c) 2, 1, 2, 2, 1 d) 2, 1, 2, 2, 2
9) What can be said about the array representation of a circular queue when it
contains only one element ?
a) Front = Rear = Null b) Front = Rear + 1
c) Front = Rear – 1 d) Front = Rear
10) Ascending priority queue is one in which the item removed is
a) The item with highest priority b) The item with lowest priority
c) Any item d) None
11) Which of the following operations is performed more efficiently by doubly linked
list than by singly linked list ?
a) Inserting a new mode after node whose location is given
b) Searching of an unsorted list for a given item
c) Deleting a node whose location is given
d) All above
12) A complete binary tree of level 5 (considering root at level 1) has how many nodes ?
a) 63 b) 31 c) 15 d) 32
13) Which of the following tree is typically used for “External Search” ?
a) B tree b) AVL tree
c) Red Black tree d) BST
14) In a graph if e=[u, v], then u and v are called __________
a) End points of e b) Adjacent nodes
c) Neighbors d) All of the above

_________________

Set S
*SLRTX334* SLR-TX – 334
-3-


Seat
No.

S.E. (CSE) (Part – II) (Old CGPA) Examination, 2018


data structure
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Answer the following questions (any three) : (4�3=12)

a) Write a C function to insert a node at the end of a singly linked list.

b) What are various applications of stack ? Evaluate postfix expression A B + C * D /


if A = 2, B = 3, C = 4 and D = 5 by providing proper explanation and content of
stack.

c) Explain different traversal techniques of Binary tree.

d) Write the properties of Threaded Binary Trees with example.

3. Answer any one : 8

a) Write a menu driven program to implement circular queue showing operations,


Insertion, Deletion and Display.

b) Write a program to implement a stack using singly linked list.

4. Write a program to implement doubly linked list and perform the operations : 8

1) Insert a node in the beginning of the list.

2) Insert a node at the end of the list.

3) Delete a given node.

4) Display the linked list.

Set S
SLR-TX – 334 -4- *SLRTX334*
Section – II

5. Attempt any three : (3�4=12)

A) Discuss B+ Tree with an example. What is difference between B tree and


B+ tree ?

B) Explain depth first search algorithm for graph with proper example.

C) What is multiway search tree ? List difference between binary search tree
and multiway search tree.

D) Define the following terms with proper diagram :


i) Graph
ii) Path
iii) Cycle
iv) Weighted graph.

E) What is AVL tree ? With an example, explain the single rotation in AVL.

6. Attempt any two : (8�2=16)


A) What are the properties of a B tree ? Construct the B-tree of order 4 and 5 for the
following elements :

23, 43, 46, 21, 66, 76, 54, 38, 89, 95, 77, 82, 11 (with explanation for every step.)

B) Insert the following key in order to build an AVL tree (Explain every step and
rotation) :

a) 12,23,33,45,51,69,72,84,3,27
b) represent deletion of node 23, 72,84.

C) With an example, explain the Dijkstra shortest path algorithm.

_________________

Set S
*SLRTX335* SLR-TX – 335
Seat
Set P
No.
S.E. (CSE) (Part II) (Old CGPA) Examination, 2018
Data Communication

Day and Date : Tuesday, 27-11-2018, -2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer: (14×1=14)


1) The ATM cells are __________ bytes long.
a) 64 b) 128 c) 32 d) 53
2) The sine wave is the fundamentals ___________ signals.
a) periodic b) digital c) non periodic d) all
3) The AAL Layer is splits into a
a) AAT and CS b) AAP and SR c) SAR and CS d) CS and OSI
4) FTP and TELNET are used in ___________ layers of TCP/IP.
a) Transport b) Internet
c) Host to network d) Application
5) _____________ have a single Communication Channel that is shared by
all the machine on the network.
a) Point to point b) Broadcast c) Unicast d) None of these

P.T.O.
SLR-TX – 335 -2- *SLRTX335*
6) Breaking a bit stream into frames is necessary for
a) Error control b) Flow control
c) Congestion d) None of these
7) The IP addresses 192.168.1.0 is belong to
a) Class A b) Class C c) Class B d) Class E
8) Count-to-infinity problem can occur in
a) Link state routing b) Distance vector routing
c) Shortest path routing d) none of these
9) ____________ Protocol converts physical address to IP addresses.
a) ARP b) RARP c) Both a and b d) None of these
10) IPv6 has __________ bit addresses.
a) 32 b) 64 c) 128 d) constant
11) According to ___________ if router J is on the minimum path from router
I to router K, then the minimum path from J to K also falls along the same
route.
a) Bellman-Ford Principle
b) For-Fulkerson Principle
c) Optimality Principle
d) Both a and b
12) Open Loop technique attempt to solve problem by good design before
occurring congestion in network.
a) True b) False
13) LANs can be connected by device called as a
a) Bridge b) Modern c) both a and b d) none of these
14) The variation in the packet arrival times is called
a) Piggybacking b) Jitter
c) Delayed delivery d) none of these
____________

Set P
*SLRTX335* -3- SLR-TX – 335
Seat
No.
S.E. (CSE) (Part II) (Old CGPA) Examination, 2018
Data Communication

Day and Date : Tuesday, 27-11-2018, -2018 Marks : 56


Time : .2.30 p.m. to 5.30 p.m. 00 .m. to .00 .m.

Instruction : F
igures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×4=16)


a) Define the following terms :
1) Frequency 2) Phase
3) Spectrum 4) Wavelength
b) List and explain uses of computer network.
c) Describe a Unrestricted Simplex Protocol.
d) Explain different types of Network Topologies with diagrams.
e) Explain different types of noise.

3. Attempt any two : (6×2=12)


a) List and explain design issues of Data Link Layers.
b) What is error detection ? Describe CRC with examples.
c) Describe twisted pair transmission medium along with its physical
description, characteristics and application.

SECTION – II

4. Attempt any four : (4×4=16)


a) Write short note on : NAT.
b) Explain flow based routing algorithm in detail.
c) Explain limited contention protocol in detail.
d) Describe IEEE Std. 802.5 frame format with explaining each fields.
e) What is count-to-infinity problem ? State a solution for the same.
Set P
SLR-TX – 335 -4- *SLRTX335*
5. Attempt any one : (6×1=6)
a) What is Adaptive and Non-adaptive routing algorithm ? Explain Link State
Routing algorithm with all steps in detail.
b) Explain design issues of Network layers with suitable diagrams.

6. Attempt the following : (1×6=6)

Draw and explain all classes of IP addresses. What is sub netting ? What is
Subnet Mask explain with suitable examples ?

__________________

Set P
*SLRTX335* SLR-TX – 335
Seat
Set Q
No.
S.E. (CSE) (Part II) (Old CGPA) Examination, 2018
Data Communication

Day and Date : Tuesday, 27-11-2018, -2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer: (14×1=14)


1) Count-to-infinity problem can occur in
a) Link state routing b) Distance vector routing
c) Shortest path routing d) none of these
2) ____________ Protocol converts physical address to IP addresses.
a) ARP b) RARP c) Both a and b d) None of these
3) IPv6 has __________ bit addresses.
a) 32 b) 64 c) 128 d) constant
4) According to ___________ if router J is on the minimum path from router
I to router K, then the minimum path from J to K also falls along the same
route.
a) Bellman-Ford Principle
b) For-Fulkerson Principle
c) Optimality Principle
d) Both a and b
P.T.O.
SLR-TX – 335 -2- *SLRTX335*
5) Open Loop technique attempt to solve problem by good design before
occurring congestion in network.
a) True b) False
6) LANs can be connected by device called as a
a) Bridge b) Modern c) both a and b d) none of these
7) The variation in the packet arrival times is called
a) Piggybacking b) Jitter
c) Delayed delivery d) none of these
8) The ATM cells are __________ bytes long.
a) 64 b) 128 c) 32 d) 53
9) The sine wave is the fundamentals ___________ signals.
a) periodic b) digital c) non periodic d) all
10) The AAL Layer is splits into a
a) AAT and CS b) AAP and SR c) SAR and CS d) CS and OSI
11) FTP and TELNET are used in ___________ layers of TCP/IP.
a) Transport b) Internet
c) Host to network d) Application
12) _____________ have a single Communication Channel that is shared by
all the machine on the network.
a) Point to point b) Broadcast c) Unicast d) None of these
13) Breaking a bit stream into frames is necessary for
a) Error control b) Flow control
c) Congestion d) None of these
14) The IP addresses 192.168.1.0 is belong to
a) Class A b) Class C c) Class B d) Class E
____________

Set Q
*SLRTX335* -3- SLR-TX – 335
Seat
No.
S.E. (CSE) (Part II) (Old CGPA) Examination, 2018
Data Communication

Day and Date : Tuesday, 27-11-2018, -2018 Marks : 56


Time : .2.30 p.m. to 5.30 p.m. 00 .m. to .00 .m.

Instruction : F
igures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×4=16)


a) Define the following terms :
1) Frequency 2) Phase
3) Spectrum 4) Wavelength
b) List and explain uses of computer network.
c) Describe a Unrestricted Simplex Protocol.
d) Explain different types of Network Topologies with diagrams.
e) Explain different types of noise.

3. Attempt any two : (6×2=12)


a) List and explain design issues of Data Link Layers.
b) What is error detection ? Describe CRC with examples.
c) Describe twisted pair transmission medium along with its physical
description, characteristics and application.

SECTION – II

4. Attempt any four : (4×4=16)


a) Write short note on : NAT.
b) Explain flow based routing algorithm in detail.
c) Explain limited contention protocol in detail.
d) Describe IEEE Std. 802.5 frame format with explaining each fields.
e) What is count-to-infinity problem ? State a solution for the same.
Set Q
SLR-TX – 335 -4- *SLRTX335*
5. Attempt any one : (6×1=6)
a) What is Adaptive and Non-adaptive routing algorithm ? Explain Link State
Routing algorithm with all steps in detail.
b) Explain design issues of Network layers with suitable diagrams.

6. Attempt the following : (1×6=6)

Draw and explain all classes of IP addresses. What is sub netting ? What is
Subnet Mask explain with suitable examples ?

__________________

Set Q
*SLRTX335* SLR-TX – 335
Seat
Set R
No.
S.E. (CSE) (Part II) (Old CGPA) Examination, 2018
Data Communication

Day and Date : Tuesday, 27-11-2018, -2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer: (14×1=14)


1) _____________ have a single Communication Channel that is shared by
all the machine on the network.
a) Point to point b) Broadcast c) Unicast d) None of these
2) Breaking a bit stream into frames is necessary for
a) Error control b) Flow control
c) Congestion d) None of these
3) The IP addresses 192.168.1.0 is belong to
a) Class A b) Class C c) Class B d) Class E
4) Count-to-infinity problem can occur in
a) Link state routing b) Distance vector routing
c) Shortest path routing d) none of these

P.T.O.
SLR-TX – 335 -2- *SLRTX335*
5) ____________ Protocol converts physical address to IP addresses.
a) ARP b) RARP c) Both a and b d) None of these
6) IPv6 has __________ bit addresses.
a) 32 b) 64 c) 128 d) constant
7) According to ___________ if router J is on the minimum path from router
I to router K, then the minimum path from J to K also falls along the same
route.
a) Bellman-Ford Principle
b) For-Fulkerson Principle
c) Optimality Principle
d) Both a and b
8) Open Loop technique attempt to solve problem by good design before
occurring congestion in network.
a) True b) False
9) LANs can be connected by device called as a
a) Bridge b) Modern c) both a and b d) none of these
10) The variation in the packet arrival times is called
a) Piggybacking b) Jitter
c) Delayed delivery d) none of these
11) The ATM cells are __________ bytes long.
a) 64 b) 128 c) 32 d) 53
12) The sine wave is the fundamentals ___________ signals.
a) periodic b) digital c) non periodic d) all
13) The AAL Layer is splits into a
a) AAT and CS b) AAP and SR c) SAR and CS d) CS and OSI
14) FTP and TELNET are used in ___________ layers of TCP/IP.
a) Transport b) Internet
c) Host to network d) Application
____________
Set R
*SLRTX335* -3- SLR-TX – 335
Seat
No.
S.E. (CSE) (Part II) (Old CGPA) Examination, 2018
Data Communication

Day and Date : Tuesday, 27-11-2018, -2018 Marks : 56


Time : .2.30 p.m. to 5.30 p.m. 00 .m. to .00 .m.

Instruction : F
igures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×4=16)


a) Define the following terms :
1) Frequency 2) Phase
3) Spectrum 4) Wavelength
b) List and explain uses of computer network.
c) Describe a Unrestricted Simplex Protocol.
d) Explain different types of Network Topologies with diagrams.
e) Explain different types of noise.

3. Attempt any two : (6×2=12)


a) List and explain design issues of Data Link Layers.
b) What is error detection ? Describe CRC with examples.
c) Describe twisted pair transmission medium along with its physical
description, characteristics and application.

SECTION – II

4. Attempt any four : (4×4=16)


a) Write short note on : NAT.
b) Explain flow based routing algorithm in detail.
c) Explain limited contention protocol in detail.
d) Describe IEEE Std. 802.5 frame format with explaining each fields.
e) What is count-to-infinity problem ? State a solution for the same.
Set R
SLR-TX – 335 -4- *SLRTX335*
5. Attempt any one : (6×1=6)
a) What is Adaptive and Non-adaptive routing algorithm ? Explain Link State
Routing algorithm with all steps in detail.
b) Explain design issues of Network layers with suitable diagrams.

6. Attempt the following : (1×6=6)

Draw and explain all classes of IP addresses. What is sub netting ? What is
Subnet Mask explain with suitable examples ?

__________________

Set R
*SLRTX335* SLR-TX – 335
Seat
Set S
No.
S.E. (CSE) (Part II) (Old CGPA) Examination, 2018
Data Communication

Day and Date : Tuesday, 27-11-2018, -2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer: (14×1=14)


1) IPv6 has __________ bit addresses.
a) 32 b) 64 c) 128 d) constant
2) According to ___________ if router J is on the minimum path from router
I to router K, then the minimum path from J to K also falls along the same
route.
a) Bellman-Ford Principle
b) For-Fulkerson Principle
c) Optimality Principle
d) Both a and b
3) Open Loop technique attempt to solve problem by good design before
occurring congestion in network.
a) True b) False

P.T.O.
SLR-TX – 335 -2- *SLRTX335*
4) LANs can be connected by device called as a
a) Bridge b) Modern c) both a and b d) none of these
5) The variation in the packet arrival times is called
a) Piggybacking b) Jitter
c) Delayed delivery d) none of these
6) The ATM cells are __________ bytes long.
a) 64 b) 128 c) 32 d) 53
7) The sine wave is the fundamentals ___________ signals.
a) periodic b) digital c) non periodic d) all
8) The AAL Layer is splits into a
a) AAT and CS b) AAP and SR c) SAR and CS d) CS and OSI
9) FTP and TELNET are used in ___________ layers of TCP/IP.
a) Transport b) Internet
c) Host to network d) Application
10) _____________ have a single Communication Channel that is shared by
all the machine on the network.
a) Point to point b) Broadcast c) Unicast d) None of these
11) Breaking a bit stream into frames is necessary for
a) Error control b) Flow control
c) Congestion d) None of these
12) The IP addresses 192.168.1.0 is belong to
a) Class A b) Class C c) Class B d) Class E
13) Count-to-infinity problem can occur in
a) Link state routing b) Distance vector routing
c) Shortest path routing d) none of these
14) ____________ Protocol converts physical address to IP addresses.
a) ARP b) RARP c) Both a and b d) None of these
____________
Set S
*SLRTX335* -3- SLR-TX – 335
Seat
No.
S.E. (CSE) (Part II) (Old CGPA) Examination, 2018
Data Communication

Day and Date : Tuesday, 27-11-2018, -2018 Marks : 56


Time : .2.30 p.m. to 5.30 p.m. 00 .m. to .00 .m.

Instruction : F
igures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×4=16)


a) Define the following terms :
1) Frequency 2) Phase
3) Spectrum 4) Wavelength
b) List and explain uses of computer network.
c) Describe a Unrestricted Simplex Protocol.
d) Explain different types of Network Topologies with diagrams.
e) Explain different types of noise.

3. Attempt any two : (6×2=12)


a) List and explain design issues of Data Link Layers.
b) What is error detection ? Describe CRC with examples.
c) Describe twisted pair transmission medium along with its physical
description, characteristics and application.

SECTION – II

4. Attempt any four : (4×4=16)


a) Write short note on : NAT.
b) Explain flow based routing algorithm in detail.
c) Explain limited contention protocol in detail.
d) Describe IEEE Std. 802.5 frame format with explaining each fields.
e) What is count-to-infinity problem ? State a solution for the same.
Set S
SLR-TX – 335 -4- *SLRTX335*
5. Attempt any one : (6×1=6)
a) What is Adaptive and Non-adaptive routing algorithm ? Explain Link State
Routing algorithm with all steps in detail.
b) Explain design issues of Network layers with suitable diagrams.

6. Attempt the following : (1×6=6)

Draw and explain all classes of IP addresses. What is sub netting ? What is
Subnet Mask explain with suitable examples ?

__________________

Set S
*SLRTX336* SLR-TX – 336

Seat
No. Set P
S.E. (CSE) (Part – II) (Old) Examination, 2018
data structure – ii
Day and Date : Tuesday, 18-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Each Section carries 40 marks.
2) Attempt all question in each Section.
3) Q. No. 1 is compulsory. It should be solved in first 30 minutes in Answer
Book Page No. 3. Each question carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3 only. Don’t forget
to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct alternative : (20×1=20)


1) Running merge sort on an array of size n which is already sorted is
a) O(n) b) O(nlogn) c) O(n2) d) None
2) If the given input array is sorted or nearly sorted, which of the following algorithm gives the best
performance ?
a) Insertion sort b) Selection sort c) Quick sort d) Merge sort
3) The worst case complexity of binary search matches with
a) Interpolation search b) Linear search c) Merge sort d) None of the above
4) Consider a hash table of size seven, with starting index zero and a hash function (3x + 4)mod 7.
Assuming the hash table is initially empty, which of the following is the contents of the table when
the sequence 1, 3, 8, 10 is inserted into the table using closed hashing ? Note that ‘–’ denotes an
empty location in the table.
a) 8, _, _, _, _, _, 10 b) 1, 8, 10, _, _, _, 3 c) 1, _, _, _, _, _, 3 d) 1, 10, 8, _, _, _, 3
5) Quick sort running time depends on the selection of
a) size of array b) pivot element c) sequence of values d) none of the above
6) Given the following input (4322, 1334, 1471,9679, 1989, 6171, 6173,4199) and the hash function
x mod 10, which of the following statements are true ?
i. 9679,1989, 4199 hash to the same value
ii. 1471,6171 hash to the same value
iii. All elements hash to the same value
iv. Each element hashes to a different value
a) i only b) ii only c) i and ii only d) iii or iv
7) What is direct addressing ?
a) Distinct array position for every possible key
b) Fewer array positions than keys
c) Fewer keys than array positions
d) None of the mentioned
8) Binary trees can have how many children
a) 2 b) any number of children
c) 0 or 1 or 2 d) 0 or 1

P.T.O.
SLR-TX – 336 -2- *SLRTX336*
9) Advantages of linked list representation of binary trees over arrays?
a) Dynamic size b) Ease of insertion/deletion
c) Ease in randomly accessing a node d) Both dynamic size and ease in insertion/deletion
10) For the tree below, write the post-order traversal.
a) 2, 7, 2, 6, 5,11, 5, 9, 4 b) 2, 7, 5, 2, 6, 9, 5, 11, 4
c) 2, 5, 11, 6, 7, 4, 9, 5, 2 d) 2, 7, 5, 6, 11, 2, 5, 4, 9
11) The number of edges from the root to the node is called _________ of the tree.
a) Height b) Depth c) Length d) None of the mentioned
12) What is the time complexity for finding the height of the binary tree ?
a) h = O(loglogn) b) h = O(nlogn) c) h = O(n) d) h = O(log n)
13) Why we need to a binary tree which is height balanced ?
a) to avoid formation of skew trees b) to save memory
c) to attain faster memory access d) to simplify storing
14) Given an empty AVL tree, how would you construct AVL tree when a set of numbers are given
without performing any rotations ?
a) just build the tree with the given input
b) find the median of the set of elements given, make it as root and construct the tree
c) use trial and error
d) use dynamic programming to build the tree
15) What are null nodes filled with in a threaded binary tree?
a) in order predecessor for left node and inorder successor for right node information
b) right node with inorder predecessor and left node with inorder successor information
c) they remain null
d) some other values randomly
16) Which of the following ways can be used to represent a graph ?
a) Adjacency list and adjacency matrix
b) Incidence Matrix
c) Adjacency List, Adjacency Matrix as well as Incidence Matrix
d) None of the mentioned
17) What sequence would the BFS traversal of the given graph yield ?

a) A F D B C E b) C B A F D c) A B D C F d) F D C B A
18) Nonleaf nodes of B+- tree structure form a
a) Multilevel clustered indices b) Sparse indices
c) Multilevel dense indices d) Multilevel sparse indices
19) Most widely used structure for index structures, is known to be
a) B+- trees structure b) Balanced tree structure
c) Unbalanced tree structure d) Sequential tree structure
20) Which of the following is false about a binary search tree ?
a) The left child is always lesser than its parent
b) The right child is always greater than its parent
c) The left and right sub-trees should also be binary search trees
d) None of the mentioned
______________

Set P
*SLRTX336* -3- SLR-TX – 336
Seat
No.

S.E. (CSE) (Part – II) (Old) Examination, 2018


data structure – ii
Day and Date : Tuesday, 18-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) All questions are compulsory.
2) Figures to right indicate full marks.

SECTION – I

2. Solve any four : (5×4=20)


1) Write a program for bouble sort.
2) What is data structure ? Explain its types.
3) What is Tree? Explain traversal of binary tree.
4) Perform insertion sort (ascending) of following numbers-show every iteration.
199, 13, 21, 5, 11, 45, 34
5) Explain the concept of asymptotic notations with corresponding graphs.
6) Give any three Hashing functions with examples.

3. What is Hashing ? Discuss complexity of hashing. Explain different open addressing techniques to
resolve collision in detail by giving suitable examples.

4. Write a C program for implementing Merge sort using recursive technique. 10


OR
What is threaded-Binary tree? Explain with example. 10
a) Left-in threaded Binary Tree
b) Right-in threaded Binary Tree
c) Fully threaded Binary Tree.

SECTION – II

5. Solve any four : (5×4=20)


1) What is B+ tree? Explain node structure of B+ tree.
2) Compare between tree and graph.
3) Insert the following nodes in B tree( n = 3) , show all steps.
7, 2, 9, 4,11, 6, 23, 45, 99, 67, 43
4) What is height balance tree. Discuss its properties.
5) Give the Depth first traversal algorithm for graph. Also explain with example.
6) Define the Graph and explain adjacency list and adjacency matrix representation of Graph.

Set P
SLR-TX – 336 -4- *SLRTX336*

6. Explain with example rotations in AVL tree. Also Give an AVL tree for following elements.
12, 45, 66, 21, 88, 45, 32, 89, 14, 76, 46, 91, 33, 28 10

7. Explain finding the shortest path in a given graph using Dijkstra algorithm, (state and assume
suitable data). 10
OR

Explain with example and algorithm the topological ordering of graph.

_____________________

Set P
*SLRTX336* SLR-TX – 336

Seat
No. Set Q
S.E. (CSE) (Part – II) (Old) Examination, 2018
data structure – ii
Day and Date : Tuesday, 18-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Each Section carries 40 marks.
2) Attempt all question in each Section.
3) Q. No. 1 is compulsory. It should be solved in first 30 minutes in Answer
Book Page No. 3. Each question carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3 only. Don’t forget
to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct alternative : (20×1=20)


1) Which of the following ways can be used to represent a graph ?
a) Adjacency list and adjacency matrix
b) Incidence Matrix
c) Adjacency List, Adjacency Matrix as well as Incidence Matrix
d) None of the mentioned
2) What sequence would the BFS traversal of the given graph yield ?

a) A F D B C E b) C B A F D c) A B D C F d) F D C B A
3) Nonleaf nodes of B+- tree structure form a
a) Multilevel clustered indices b) Sparse indices
c) Multilevel dense indices d) Multilevel sparse indices
4) Most widely used structure for index structures, is known to be
a) B+- trees structure b) Balanced tree structure
c) Unbalanced tree structure d) Sequential tree structure
5) Which of the following is false about a binary search tree ?
a) The left child is always lesser than its parent
b) The right child is always greater than its parent
c) The left and right sub-trees should also be binary search trees
d) None of the mentioned
6) Running merge sort on an array of size n which is already sorted is
a) O(n) b) O(nlogn) c) O(n2) d) None
7) If the given input array is sorted or nearly sorted, which of the following algorithm gives the best
performance ?
a) Insertion sort b) Selection sort c) Quick sort d) Merge sort
P.T.O.
SLR-TX – 336 -2- *SLRTX336*
8) The worst case complexity of binary search matches with
a) Interpolation search b) Linear search c) Merge sort d) None of the above
9) Consider a hash table of size seven, with starting index zero and a hash function (3x + 4)mod 7.
Assuming the hash table is initially empty, which of the following is the contents of the table when
the sequence 1, 3, 8, 10 is inserted into the table using closed hashing ? Note that ‘–’ denotes an
empty location in the table.
a) 8, _, _, _, _, _, 10 b) 1, 8, 10, _, _, _, 3 c) 1, _, _, _, _, _, 3 d) 1, 10, 8, _, _, _, 3
10) Quick sort running time depends on the selection of
a) size of array b) pivot element c) sequence of values d) none of the above
11) Given the following input (4322, 1334, 1471,9679, 1989, 6171, 6173,4199) and the hash function
x mod 10, which of the following statements are true ?
i. 9679,1989, 4199 hash to the same value
ii. 1471,6171 hash to the same value
iii. All elements hash to the same value
iv. Each element hashes to a different value
a) i only b) ii only c) i and ii only d) iii or iv
12) What is direct addressing ?
a) Distinct array position for every possible key
b) Fewer array positions than keys
c) Fewer keys than array positions
d) None of the mentioned
13) Binary trees can have how many children
a) 2 b) any number of children
c) 0 or 1 or 2 d) 0 or 1
14) Advantages of linked list representation of binary trees over arrays?
a) Dynamic size b) Ease of insertion/deletion
c) Ease in randomly accessing a node d) Both dynamic size and ease in insertion/deletion
15) For the tree below, write the post-order traversal.
a) 2, 7, 2, 6, 5,11, 5, 9, 4 b) 2, 7, 5, 2, 6, 9, 5, 11, 4
c) 2, 5, 11, 6, 7, 4, 9, 5, 2 d) 2, 7, 5, 6, 11, 2, 5, 4, 9
16) The number of edges from the root to the node is called _________ of the tree.
a) Height b) Depth c) Length d) None of the mentioned
17) What is the time complexity for finding the height of the binary tree ?
a) h = O(loglogn) b) h = O(nlogn) c) h = O(n) d) h = O(log n)
18) Why we need to a binary tree which is height balanced ?
a) to avoid formation of skew trees b) to save memory
c) to attain faster memory access d) to simplify storing
19) Given an empty AVL tree, how would you construct AVL tree when a set of numbers are given
without performing any rotations ?
a) just build the tree with the given input
b) find the median of the set of elements given, make it as root and construct the tree
c) use trial and error
d) use dynamic programming to build the tree
20) What are null nodes filled with in a threaded binary tree?
a) in order predecessor for left node and inorder successor for right node information
b) right node with inorder predecessor and left node with inorder successor information
c) they remain null
d) some other values randomly
______________

Set Q
*SLRTX336* -3- SLR-TX – 336
Seat
No.

S.E. (CSE) (Part – II) (Old) Examination, 2018


data structure – ii
Day and Date : Tuesday, 18-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) All questions are compulsory.
2) Figures to right indicate full marks.

SECTION – I

2. Solve any four : (5×4=20)


1) Write a program for bouble sort.
2) What is data structure ? Explain its types.
3) What is Tree? Explain traversal of binary tree.
4) Perform insertion sort (ascending) of following numbers-show every iteration.
199, 13, 21, 5, 11, 45, 34
5) Explain the concept of asymptotic notations with corresponding graphs.
6) Give any three Hashing functions with examples.

3. What is Hashing ? Discuss complexity of hashing. Explain different open addressing techniques to
resolve collision in detail by giving suitable examples.

4. Write a C program for implementing Merge sort using recursive technique. 10


OR
What is threaded-Binary tree? Explain with example. 10
a) Left-in threaded Binary Tree
b) Right-in threaded Binary Tree
c) Fully threaded Binary Tree.

SECTION – II

5. Solve any four : (5×4=20)


1) What is B+ tree? Explain node structure of B+ tree.
2) Compare between tree and graph.
3) Insert the following nodes in B tree( n = 3) , show all steps.
7, 2, 9, 4,11, 6, 23, 45, 99, 67, 43
4) What is height balance tree. Discuss its properties.
5) Give the Depth first traversal algorithm for graph. Also explain with example.
6) Define the Graph and explain adjacency list and adjacency matrix representation of Graph.

Set Q
SLR-TX – 336 -4- *SLRTX336*

6. Explain with example rotations in AVL tree. Also Give an AVL tree for following elements.
12, 45, 66, 21, 88, 45, 32, 89, 14, 76, 46, 91, 33, 28 10

7. Explain finding the shortest path in a given graph using Dijkstra algorithm, (state and assume
suitable data). 10
OR

Explain with example and algorithm the topological ordering of graph.

_____________________

Set Q
*SLRTX336* SLR-TX – 336

Seat
No. Set R
S.E. (CSE) (Part – II) (Old) Examination, 2018
data structure – ii
Day and Date : Tuesday, 18-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Each Section carries 40 marks.
2) Attempt all question in each Section.
3) Q. No. 1 is compulsory. It should be solved in first 30 minutes in Answer
Book Page No. 3. Each question carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3 only. Don’t forget
to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct alternative : (20×1=20)


1) The number of edges from the root to the node is called _________ of the tree.
a) Height b) Depth c) Length d) None of the mentioned
2) What is the time complexity for finding the height of the binary tree ?
a) h = O(loglogn) b) h = O(nlogn) c) h = O(n) d) h = O(log n)
3) Why we need to a binary tree which is height balanced ?
a) to avoid formation of skew trees b) to save memory
c) to attain faster memory access d) to simplify storing
4) Given an empty AVL tree, how would you construct AVL tree when a set of numbers are given
without performing any rotations ?
a) just build the tree with the given input
b) find the median of the set of elements given, make it as root and construct the tree
c) use trial and error
d) use dynamic programming to build the tree
5) What are null nodes filled with in a threaded binary tree?
a) in order predecessor for left node and inorder successor for right node information
b) right node with inorder predecessor and left node with inorder successor information
c) they remain null
d) some other values randomly
6) Which of the following ways can be used to represent a graph ?
a) Adjacency list and adjacency matrix
b) Incidence Matrix
c) Adjacency List, Adjacency Matrix as well as Incidence Matrix
d) None of the mentioned
7) What sequence would the BFS traversal of the given graph yield ?

a) A F D B C E b) C B A F D c) A B D C F d) F D C B A

P.T.O.
SLR-TX – 336 -2- *SLRTX336*
8) Nonleaf nodes of B+- tree structure form a
a) Multilevel clustered indices b) Sparse indices
c) Multilevel dense indices d) Multilevel sparse indices
9) Most widely used structure for index structures, is known to be
a) B+- trees structure b) Balanced tree structure
c) Unbalanced tree structure d) Sequential tree structure
10) Which of the following is false about a binary search tree ?
a) The left child is always lesser than its parent
b) The right child is always greater than its parent
c) The left and right sub-trees should also be binary search trees
d) None of the mentioned
11) Running merge sort on an array of size n which is already sorted is
a) O(n) b) O(nlogn) c) O(n2) d) None
12) If the given input array is sorted or nearly sorted, which of the following algorithm gives the best
performance ?
a) Insertion sort b) Selection sort c) Quick sort d) Merge sort
13) The worst case complexity of binary search matches with
a) Interpolation search b) Linear search c) Merge sort d) None of the above
14) Consider a hash table of size seven, with starting index zero and a hash function (3x + 4)mod 7.
Assuming the hash table is initially empty, which of the following is the contents of the table when
the sequence 1, 3, 8, 10 is inserted into the table using closed hashing ? Note that ‘–’ denotes an
empty location in the table.
a) 8, _, _, _, _, _, 10 b) 1, 8, 10, _, _, _, 3 c) 1, _, _, _, _, _, 3 d) 1, 10, 8, _, _, _, 3
15) Quick sort running time depends on the selection of
a) size of array b) pivot element c) sequence of values d) none of the above
16) Given the following input (4322, 1334, 1471,9679, 1989, 6171, 6173,4199) and the hash function
x mod 10, which of the following statements are true ?
i. 9679,1989, 4199 hash to the same value
ii. 1471,6171 hash to the same value
iii. All elements hash to the same value
iv. Each element hashes to a different value
a) i only b) ii only c) i and ii only d) iii or iv
17) What is direct addressing ?
a) Distinct array position for every possible key
b) Fewer array positions than keys
c) Fewer keys than array positions
d) None of the mentioned
18) Binary trees can have how many children
a) 2 b) any number of children
c) 0 or 1 or 2 d) 0 or 1
19) Advantages of linked list representation of binary trees over arrays?
a) Dynamic size b) Ease of insertion/deletion
c) Ease in randomly accessing a node d) Both dynamic size and ease in insertion/deletion
20) For the tree below, write the post-order traversal.
a) 2, 7, 2, 6, 5,11, 5, 9, 4 b) 2, 7, 5, 2, 6, 9, 5, 11, 4
c) 2, 5, 11, 6, 7, 4, 9, 5, 2 d) 2, 7, 5, 6, 11, 2, 5, 4, 9
______________

Set R
*SLRTX336* -3- SLR-TX – 336
Seat
No.

S.E. (CSE) (Part – II) (Old) Examination, 2018


data structure – ii
Day and Date : Tuesday, 18-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) All questions are compulsory.
2) Figures to right indicate full marks.

SECTION – I

2. Solve any four : (5×4=20)


1) Write a program for bouble sort.
2) What is data structure ? Explain its types.
3) What is Tree? Explain traversal of binary tree.
4) Perform insertion sort (ascending) of following numbers-show every iteration.
199, 13, 21, 5, 11, 45, 34
5) Explain the concept of asymptotic notations with corresponding graphs.
6) Give any three Hashing functions with examples.

3. What is Hashing ? Discuss complexity of hashing. Explain different open addressing techniques to
resolve collision in detail by giving suitable examples.

4. Write a C program for implementing Merge sort using recursive technique. 10


OR
What is threaded-Binary tree? Explain with example. 10
a) Left-in threaded Binary Tree
b) Right-in threaded Binary Tree
c) Fully threaded Binary Tree.

SECTION – II

5. Solve any four : (5×4=20)


1) What is B+ tree? Explain node structure of B+ tree.
2) Compare between tree and graph.
3) Insert the following nodes in B tree( n = 3) , show all steps.
7, 2, 9, 4,11, 6, 23, 45, 99, 67, 43
4) What is height balance tree. Discuss its properties.
5) Give the Depth first traversal algorithm for graph. Also explain with example.
6) Define the Graph and explain adjacency list and adjacency matrix representation of Graph.

Set R
SLR-TX – 336 -4- *SLRTX336*

6. Explain with example rotations in AVL tree. Also Give an AVL tree for following elements.
12, 45, 66, 21, 88, 45, 32, 89, 14, 76, 46, 91, 33, 28 10

7. Explain finding the shortest path in a given graph using Dijkstra algorithm, (state and assume
suitable data). 10
OR

Explain with example and algorithm the topological ordering of graph.

_____________________

Set R
*SLRTX336* SLR-TX – 336

Seat
No. Set S
S.E. (CSE) (Part – II) (Old) Examination, 2018
data structure – ii
Day and Date : Tuesday, 18-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Each Section carries 40 marks.
2) Attempt all question in each Section.
3) Q. No. 1 is compulsory. It should be solved in first 30 minutes in Answer
Book Page No. 3. Each question carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3 only. Don’t forget
to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct alternative : (20×1=20)


1) Given the following input (4322, 1334, 1471,9679, 1989, 6171, 6173,4199) and the hash function
x mod 10, which of the following statements are true ?
i. 9679,1989, 4199 hash to the same value
ii. 1471,6171 hash to the same value
iii. All elements hash to the same value
iv. Each element hashes to a different value
a) i only b) ii only
c) i and ii only d) iii or iv
2) What is direct addressing ?
a) Distinct array position for every possible key
b) Fewer array positions than keys
c) Fewer keys than array positions
d) None of the mentioned
3) Binary trees can have how many children
a) 2 b) any number of children
c) 0 or 1 or 2 d) 0 or 1
4) Advantages of linked list representation of binary trees over arrays?
a) Dynamic size b) Ease of insertion/deletion
c) Ease in randomly accessing a node d) Both dynamic size and ease in insertion/deletion
5) For the tree below, write the post-order traversal.
a) 2, 7, 2, 6, 5,11, 5, 9, 4 b) 2, 7, 5, 2, 6, 9, 5, 11, 4
c) 2, 5, 11, 6, 7, 4, 9, 5, 2 d) 2, 7, 5, 6, 11, 2, 5, 4, 9
6) The number of edges from the root to the node is called _________ of the tree.
a) Height b) Depth c) Length d) None of the mentioned
7) What is the time complexity for finding the height of the binary tree ?
a) h = O(loglogn) b) h = O(nlogn)
c) h = O(n) d) h = O(log n)
8) Why we need to a binary tree which is height balanced ?
a) to avoid formation of skew trees b) to save memory
c) to attain faster memory access d) to simplify storing

P.T.O.
SLR-TX – 336 -2- *SLRTX336*
9) Given an empty AVL tree, how would you construct AVL tree when a set of numbers are given
without performing any rotations ?
a) just build the tree with the given input
b) find the median of the set of elements given, make it as root and construct the tree
c) use trial and error
d) use dynamic programming to build the tree
10) What are null nodes filled with in a threaded binary tree?
a) in order predecessor for left node and inorder successor for right node information
b) right node with inorder predecessor and left node with inorder successor information
c) they remain null
d) some other values randomly
11) Which of the following ways can be used to represent a graph ?
a) Adjacency list and adjacency matrix
b) Incidence Matrix
c) Adjacency List, Adjacency Matrix as well as Incidence Matrix
d) None of the mentioned
12) What sequence would the BFS traversal of the given graph yield ?

a) A F D B C E b) C B A F D c) A B D C F d) F D C B A
13) Nonleaf nodes of B+- tree structure form a
a) Multilevel clustered indices b) Sparse indices
c) Multilevel dense indices d) Multilevel sparse indices
14) Most widely used structure for index structures, is known to be
a) B+- trees structure b) Balanced tree structure
c) Unbalanced tree structure d) Sequential tree structure
15) Which of the following is false about a binary search tree ?
a) The left child is always lesser than its parent
b) The right child is always greater than its parent
c) The left and right sub-trees should also be binary search trees
d) None of the mentioned
16) Running merge sort on an array of size n which is already sorted is
a) O(n) b) O(nlogn) c) O(n2) d) None
17) If the given input array is sorted or nearly sorted, which of the following algorithm gives the best
performance ?
a) Insertion sort b) Selection sort c) Quick sort d) Merge sort
18) The worst case complexity of binary search matches with
a) Interpolation search b) Linear search c) Merge sort d) None of the above
19) Consider a hash table of size seven, with starting index zero and a hash function (3x + 4)mod 7.
Assuming the hash table is initially empty, which of the following is the contents of the table when
the sequence 1, 3, 8, 10 is inserted into the table using closed hashing ? Note that ‘–’ denotes an
empty location in the table.
a) 8, _, _, _, _, _, 10 b) 1, 8, 10, _, _, _, 3 c) 1, _, _, _, _, _, 3 d) 1, 10, 8, _, _, _, 3
20) Quick sort running time depends on the selection of
a) size of array b) pivot element c) sequence of values d) none of the above
______________

Set S
*SLRTX336* -3- SLR-TX – 336
Seat
No.

S.E. (CSE) (Part – II) (Old) Examination, 2018


data structure – ii
Day and Date : Tuesday, 18-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) All questions are compulsory.
2) Figures to right indicate full marks.

SECTION – I

2. Solve any four : (5×4=20)


1) Write a program for bouble sort.
2) What is data structure ? Explain its types.
3) What is Tree? Explain traversal of binary tree.
4) Perform insertion sort (ascending) of following numbers-show every iteration.
199, 13, 21, 5, 11, 45, 34
5) Explain the concept of asymptotic notations with corresponding graphs.
6) Give any three Hashing functions with examples.

3. What is Hashing ? Discuss complexity of hashing. Explain different open addressing techniques to
resolve collision in detail by giving suitable examples.

4. Write a C program for implementing Merge sort using recursive technique. 10


OR
What is threaded-Binary tree? Explain with example. 10
a) Left-in threaded Binary Tree
b) Right-in threaded Binary Tree
c) Fully threaded Binary Tree.

SECTION – II

5. Solve any four : (5×4=20)


1) What is B+ tree? Explain node structure of B+ tree.
2) Compare between tree and graph.
3) Insert the following nodes in B tree( n = 3) , show all steps.
7, 2, 9, 4,11, 6, 23, 45, 99, 67, 43
4) What is height balance tree. Discuss its properties.
5) Give the Depth first traversal algorithm for graph. Also explain with example.
6) Define the Graph and explain adjacency list and adjacency matrix representation of Graph.

Set S
SLR-TX – 336 -4- *SLRTX336*

6. Explain with example rotations in AVL tree. Also Give an AVL tree for following elements.
12, 45, 66, 21, 88, 45, 32, 89, 14, 76, 46, 91, 33, 28 10

7. Explain finding the shortest path in a given graph using Dijkstra algorithm, (state and assume
suitable data). 10
OR

Explain with example and algorithm the topological ordering of graph.

_____________________

Set S
*SLRTX337* SLR-TX – 337
Seat
No. Set P
S.E. (CSE) (Part – II) (Old) Examination, 2018
formal system and automata

Day and Date : Wednesday, 19-12-2018 Total Marks : 100


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 20


1. Choose the correct answer : (20×1=20)
1) A FA with null string accepting capability is known as
a) NFA b) DFA c) NFA – ∧ d) NULL
2) A FA with deterministic transition capability is known as
a) DFA b) NFA c) NFA – ∧ d) All of the above
3) The behavior of NFA can be simulated by a DFA
a) Always b) Sometime c) Never d) Depends
4) The CFG G, S -> aS|bS|a|b generates
a) (a + b)* b) (a + b) (a + b)*
c) (a + b)* (a + b) d) All of above
5) Language of finite automata is
a) Type 0 b) Type 1 c) Type 2 d) Type 3
6) Finite automata requires minimum ___________ number of stacks.
a) 1 b) 0
c) 2 d) None of the mentioned
7) Regular expression for all strings starts with ab and ends with bba is
a) aba*b*bba b) ab(ab)*bba
c) ab(a + b)*bba d) All of the mentioned
8) FSM with output capability can be used to add two given integer in binary
representation. This is
a) True b) False
c) May be true d) None of the mentioned
P.T.O.
SLR-TX – 337 -2- *SLRTX337*
9) NFA, in its name has ‘non-deterministic’ because of
a) The result is undetermined
b) The choice of path is non-deterministic
c) The state to be transited next is non-deterministic
d) All of the mentioned
10) Given :
L1 = {x∈∑*|x contains even no’s of 0’s}
L2 = {x∈∑*|x contains odd no’s of 1’s}
No of final states in Language L1 ∪ L2 ?
a) 1 b) 2 c) 3 d) 4
11) The sum of minimum and maximum number of final states for a DFA n
states is equal to
a) n + 1 b) n c) n – 1 d) n + 2
12) A CFG is ambiguous if
a) It has more than one rightmost derivations
b) It has more than one leftmost derivations
c) No parse tree can be generated for the CFG
d) None of the mentioned
13) (a + b)* is equivalent to
a) b*a* b) (a*b*)*
c) a*b* d) None of the mentioned
14) The production of the form A -> B, where A and B are non terminals is called
a) Null production b) Unit production
c) Greibach Normal Form d) Chomsky Normal Form
15) Halting states are of two types. They are
a) Accept and Reject b) Reject and Allow
c) Start and Reject d) None of the mentioned
16) A regular language over an alphabet a is one that can be obtained from
a) union b) concatenation
c) kleene d) all of the mentioned
17) Regular expression {0, 1} is equivalent to
a) 0 ∪ 1 b) 0/1
c) 0 + 1 d) All of the mentioned
18) The instantaneous PDA is has the following elements
a) State b) Unconsumed input
c) Stack content d) All of the mentioned
19) State true or false :
Statement : Every context free grammar can be transformed into an
equivalent non deterministic push down automata.
a) true b) false
20) Subset Construction method refers to
a) Conversion of NFA to DFA b) DFA minimization
c) Eliminating Null references d) ε-NFA to NFA
____________ Set P

*SLRTX337* -3- SLR-TX – 337
Seat
No.
S.E. (CSE) (Part – II) (Old) Examination, 2018
formal system and automata

Day and Date : Wednesday, 19-12-2018 , -2018 Marks : 80


Time : 2.30 p.m. to 5.30 p.m. 00 .m. to .00 .m.

SECTION – I

2. Answer any four : (5×4=20)


a) Differentiate between DFA and NFA.
b) Define ∧ – closure with example.
c) In each case, what is language generated by context free grammar with
indicated grammar with the indicated productions
1) S -> aSa | bSb | a | b
2) S -> SaS | b
d) Define Grammar with example.
e) Explain extended transition function for NFA.
3. Solve any one : 10
a) Draw DFA for regular expression
1) ab (a + b)* ab
2) (0 + 1) * (00 + 11)
b) Consider following NFA – ∧

Set P

SLR-TX – 337 -4- *SLRTX337*

Find whether particular string is accepted or not
1) ∂*(q0, 010)
2) ∂*(q0, 11)
3) ∂*(q0, 101)
4) ∂*(q0, 100)

4. Minimize the following Finite Automata. 10

SECTION – II

5. Answer any four : (5×4=20)


a) Explain Universal Turing machine.
b) Define DPDA and compare with NPDA.
c) Explain Multitape turing machine.
d) State and Prove Pumping lemma of CFL.
e) Define Push down automata with example.

6. Solve any one : 10


a) Give transition table for PDA to recognize balanced strings of 2 types “()”
and “[]”.
OR
a) Draw Turing machine to compute the function f(x) = 2x where x is non
negative integer, using unary representation.

7. Design a PDA to accept the language having more number of a’s than b’s. 10

–––––––––––––

Set P
*SLRTX337* SLR-TX – 337
Seat
No. Set Q
S.E. (CSE) (Part – II) (Old) Examination, 2018
formal system and automata

Day and Date : Wednesday, 19-12-2018 Total Marks : 100


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 20


1. Choose the correct answer : (20×1=20)
1) A regular language over an alphabet a is one that can be obtained from
a) union b) concatenation
c) kleene d) all of the mentioned
2) Regular expression {0, 1} is equivalent to
a) 0 ∪ 1 b) 0/1
c) 0 + 1 d) All of the mentioned
3) The instantaneous PDA is has the following elements
a) State b) Unconsumed input
c) Stack content d) All of the mentioned
4) State true or false :
Statement : Every context free grammar can be transformed into an
equivalent non deterministic push down automata.
a) true b) false
5) Subset Construction method refers to
a) Conversion of NFA to DFA b) DFA minimization
c) Eliminating Null references d) ε-NFA to NFA
6) A FA with null string accepting capability is known as
a) NFA b) DFA c) NFA – ∧ d) NULL
7) A FA with deterministic transition capability is known as
a) DFA b) NFA c) NFA – ∧ d) All of the above
8) The behavior of NFA can be simulated by a DFA
a) Always b) Sometime c) Never d) Depends
P.T.O.
SLR-TX – 337 -2- *SLRTX337*
9) The CFG G, S -> aS|bS|a|b generates
a) (a + b)* b) (a + b) (a + b)*
c) (a + b)* (a + b) d) All of above
10) Language of finite automata is
a) Type 0 b) Type 1 c) Type 2 d) Type 3
11) Finite automata requires minimum ___________ number of stacks.
a) 1 b) 0
c) 2 d) None of the mentioned
12) Regular expression for all strings starts with ab and ends with bba is
a) aba*b*bba b) ab(ab)*bba
c) ab(a + b)*bba d) All of the mentioned
13) FSM with output capability can be used to add two given integer in binary
representation. This is
a) True b) False
c) May be true d) None of the mentioned
14) NFA, in its name has ‘non-deterministic’ because of
a) The result is undetermined
b) The choice of path is non-deterministic
c) The state to be transited next is non-deterministic
d) All of the mentioned
15) Given :
L1 = {x∈∑*|x contains even no’s of 0’s}
L2 = {x∈∑*|x contains odd no’s of 1’s}
No of final states in Language L1 ∪ L2 ?
a) 1 b) 2 c) 3 d) 4
16) The sum of minimum and maximum number of final states for a DFA n
states is equal to
a) n + 1 b) n c) n – 1 d) n + 2
17) A CFG is ambiguous if
a) It has more than one rightmost derivations
b) It has more than one leftmost derivations
c) No parse tree can be generated for the CFG
d) None of the mentioned
18) (a + b)* is equivalent to
a) b*a* b) (a*b*)*
c) a*b* d) None of the mentioned
19) The production of the form A -> B, where A and B are non terminals is called
a) Null production b) Unit production
c) Greibach Normal Form d) Chomsky Normal Form
20) Halting states are of two types. They are
a) Accept and Reject b) Reject and Allow
c) Start and Reject d) None of the mentioned

____________ Set Q

*SLRTX337* -3- SLR-TX – 337
Seat
No.
S.E. (CSE) (Part – II) (Old) Examination, 2018
formal system and automata

Day and Date : Wednesday, 19-12-2018 , -2018 Marks : 80


Time : 2.30 p.m. to 5.30 p.m. 00 .m. to .00 .m.

SECTION – I

2. Answer any four : (5×4=20)


a) Differentiate between DFA and NFA.
b) Define ∧ – closure with example.
c) In each case, what is language generated by context free grammar with
indicated grammar with the indicated productions
1) S -> aSa | bSb | a | b
2) S -> SaS | b
d) Define Grammar with example.
e) Explain extended transition function for NFA.
3. Solve any one : 10
a) Draw DFA for regular expression
1) ab (a + b)* ab
2) (0 + 1) * (00 + 11)
b) Consider following NFA – ∧

Set Q

SLR-TX – 337 -4- *SLRTX337*

Find whether particular string is accepted or not
1) ∂*(q0, 010)
2) ∂*(q0, 11)
3) ∂*(q0, 101)
4) ∂*(q0, 100)

4. Minimize the following Finite Automata. 10

SECTION – II

5. Answer any four : (5×4=20)


a) Explain Universal Turing machine.
b) Define DPDA and compare with NPDA.
c) Explain Multitape turing machine.
d) State and Prove Pumping lemma of CFL.
e) Define Push down automata with example.

6. Solve any one : 10


a) Give transition table for PDA to recognize balanced strings of 2 types “()”
and “[]”.
OR
a) Draw Turing machine to compute the function f(x) = 2x where x is non
negative integer, using unary representation.

7. Design a PDA to accept the language having more number of a’s than b’s. 10

–––––––––––––

Set Q
*SLRTX337* SLR-TX – 337
Seat
No. Set R
S.E. (CSE) (Part – II) (Old) Examination, 2018
formal system and automata

Day and Date : Wednesday, 19-12-2018 Total Marks : 100


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 20


1. Choose the correct answer : (20×1=20)
1) The sum of minimum and maximum number of final states for a DFA n
states is equal to
a) n + 1 b) n c) n – 1 d) n + 2
2) A CFG is ambiguous if
a) It has more than one rightmost derivations
b) It has more than one leftmost derivations
c) No parse tree can be generated for the CFG
d) None of the mentioned
3) (a + b)* is equivalent to
a) b*a* b) (a*b*)*
c) a*b* d) None of the mentioned
4) The production of the form A -> B, where A and B are non terminals is called
a) Null production b) Unit production
c) Greibach Normal Form d) Chomsky Normal Form
5) Halting states are of two types. They are
a) Accept and Reject b) Reject and Allow
c) Start and Reject d) None of the mentioned
6) A regular language over an alphabet a is one that can be obtained from
a) union b) concatenation
c) kleene d) all of the mentioned
7) Regular expression {0, 1} is equivalent to
a) 0 ∪ 1 b) 0/1
c) 0 + 1 d) All of the mentioned
P.T.O.
SLR-TX – 337 -2- *SLRTX337*
8) The instantaneous PDA is has the following elements
a) State b) Unconsumed input
c) Stack content d) All of the mentioned
9) State true or false :
Statement : Every context free grammar can be transformed into an
equivalent non deterministic push down automata.
a) true b) false
10) Subset Construction method refers to
a) Conversion of NFA to DFA b) DFA minimization
c) Eliminating Null references d) ε-NFA to NFA
11) A FA with null string accepting capability is known as
a) NFA b) DFA c) NFA – ∧ d) NULL
12) A FA with deterministic transition capability is known as
a) DFA b) NFA c) NFA – ∧ d) All of the above
13) The behavior of NFA can be simulated by a DFA
a) Always b) Sometime c) Never d) Depends
14) The CFG G, S -> aS|bS|a|b generates
a) (a + b)* b) (a + b) (a + b)*
c) (a + b)* (a + b) d) All of above
15) Language of finite automata is
a) Type 0 b) Type 1 c) Type 2 d) Type 3
16) Finite automata requires minimum ___________ number of stacks.
a) 1 b) 0
c) 2 d) None of the mentioned
17) Regular expression for all strings starts with ab and ends with bba is
a) aba*b*bba b) ab(ab)*bba
c) ab(a + b)*bba d) All of the mentioned
18) FSM with output capability can be used to add two given integer in binary
representation. This is
a) True b) False
c) May be true d) None of the mentioned
19) NFA, in its name has ‘non-deterministic’ because of
a) The result is undetermined
b) The choice of path is non-deterministic
c) The state to be transited next is non-deterministic
d) All of the mentioned
20) Given :
L1 = {x∈∑*|x contains even no’s of 0’s}
L2 = {x∈∑*|x contains odd no’s of 1’s}
No of final states in Language L1 ∪ L2 ?
a) 1 b) 2 c) 3 d) 4

____________ Set R

*SLRTX337* -3- SLR-TX – 337
Seat
No.
S.E. (CSE) (Part – II) (Old) Examination, 2018
formal system and automata

Day and Date : Wednesday, 19-12-2018 , -2018 Marks : 80


Time : 2.30 p.m. to 5.30 p.m. 00 .m. to .00 .m.

SECTION – I

2. Answer any four : (5×4=20)


a) Differentiate between DFA and NFA.
b) Define ∧ – closure with example.
c) In each case, what is language generated by context free grammar with
indicated grammar with the indicated productions
1) S -> aSa | bSb | a | b
2) S -> SaS | b
d) Define Grammar with example.
e) Explain extended transition function for NFA.
3. Solve any one : 10
a) Draw DFA for regular expression
1) ab (a + b)* ab
2) (0 + 1) * (00 + 11)
b) Consider following NFA – ∧

Set R

SLR-TX – 337 -4- *SLRTX337*

Find whether particular string is accepted or not
1) ∂*(q0, 010)
2) ∂*(q0, 11)
3) ∂*(q0, 101)
4) ∂*(q0, 100)

4. Minimize the following Finite Automata. 10

SECTION – II

5. Answer any four : (5×4=20)


a) Explain Universal Turing machine.
b) Define DPDA and compare with NPDA.
c) Explain Multitape turing machine.
d) State and Prove Pumping lemma of CFL.
e) Define Push down automata with example.

6. Solve any one : 10


a) Give transition table for PDA to recognize balanced strings of 2 types “()”
and “[]”.
OR
a) Draw Turing machine to compute the function f(x) = 2x where x is non
negative integer, using unary representation.

7. Design a PDA to accept the language having more number of a’s than b’s. 10

–––––––––––––

Set R
*SLRTX337* SLR-TX – 337
Seat
No. Set S
S.E. (CSE) (Part – II) (Old) Examination, 2018
formal system and automata

Day and Date : Wednesday, 19-12-2018 Total Marks : 100


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 20


1. Choose the correct answer : (20×1=20)
1) Finite automata requires minimum ___________ number of stacks.
a) 1 b) 0
c) 2 d) None of the mentioned
2) Regular expression for all strings starts with ab and ends with bba is
a) aba*b*bba b) ab(ab)*bba
c) ab(a + b)*bba d) All of the mentioned
3) FSM with output capability can be used to add two given integer in binary
representation. This is
a) True b) False
c) May be true d) None of the mentioned
4) NFA, in its name has ‘non-deterministic’ because of
a) The result is undetermined
b) The choice of path is non-deterministic
c) The state to be transited next is non-deterministic
d) All of the mentioned
5) Given :
L1 = {x∈∑*|x contains even no’s of 0’s}
L2 = {x∈∑*|x contains odd no’s of 1’s}
No of final states in Language L1 ∪ L2 ?
a) 1 b) 2 c) 3 d) 4
6) The sum of minimum and maximum number of final states for a DFA n
states is equal to
a) n + 1 b) n c) n – 1 d) n + 2
P.T.O.
SLR-TX – 337 -2- *SLRTX337*
7) A CFG is ambiguous if
a) It has more than one rightmost derivations
b) It has more than one leftmost derivations
c) No parse tree can be generated for the CFG
d) None of the mentioned
8) (a + b)* is equivalent to
a) b*a* b) (a*b*)*
c) a*b* d) None of the mentioned
9) The production of the form A -> B, where A and B are non terminals is called
a) Null production b) Unit production
c) Greibach Normal Form d) Chomsky Normal Form
10) Halting states are of two types. They are
a) Accept and Reject b) Reject and Allow
c) Start and Reject d) None of the mentioned
11) A regular language over an alphabet a is one that can be obtained from
a) union b) concatenation
c) kleene d) all of the mentioned
12) Regular expression {0, 1} is equivalent to
a) 0 ∪ 1 b) 0/1
c) 0 + 1 d) All of the mentioned
13) The instantaneous PDA is has the following elements
a) State b) Unconsumed input
c) Stack content d) All of the mentioned
14) State true or false :
Statement : Every context free grammar can be transformed into an
equivalent non deterministic push down automata.
a) true b) false
15) Subset Construction method refers to
a) Conversion of NFA to DFA b) DFA minimization
c) Eliminating Null references d) ε-NFA to NFA
16) A FA with null string accepting capability is known as
a) NFA b) DFA c) NFA – ∧ d) NULL
17) A FA with deterministic transition capability is known as
a) DFA b) NFA c) NFA – ∧ d) All of the above
18) The behavior of NFA can be simulated by a DFA
a) Always b) Sometime c) Never d) Depends
19) The CFG G, S -> aS|bS|a|b generates
a) (a + b)* b) (a + b) (a + b)*
c) (a + b)* (a + b) d) All of above
20) Language of finite automata is
a) Type 0 b) Type 1 c) Type 2 d) Type 3
____________

Set S
*SLRTX337* -3- SLR-TX – 337
Seat
No.
S.E. (CSE) (Part – II) (Old) Examination, 2018
formal system and automata

Day and Date : Wednesday, 19-12-2018 , -2018 Marks : 80


Time : 2.30 p.m. to 5.30 p.m. 00 .m. to .00 .m.

SECTION – I

2. Answer any four : (5×4=20)


a) Differentiate between DFA and NFA.
b) Define ∧ – closure with example.
c) In each case, what is language generated by context free grammar with
indicated grammar with the indicated productions
1) S -> aSa | bSb | a | b
2) S -> SaS | b
d) Define Grammar with example.
e) Explain extended transition function for NFA.
3. Solve any one : 10
a) Draw DFA for regular expression
1) ab (a + b)* ab
2) (0 + 1) * (00 + 11)
b) Consider following NFA – ∧

Set S

SLR-TX – 337 -4- *SLRTX337*

Find whether particular string is accepted or not
1) ∂*(q0, 010)
2) ∂*(q0, 11)
3) ∂*(q0, 101)
4) ∂*(q0, 100)

4. Minimize the following Finite Automata. 10

SECTION – II

5. Answer any four : (5×4=20)


a) Explain Universal Turing machine.
b) Define DPDA and compare with NPDA.
c) Explain Multitape turing machine.
d) State and Prove Pumping lemma of CFL.
e) Define Push down automata with example.

6. Solve any one : 10


a) Give transition table for PDA to recognize balanced strings of 2 types “()”
and “[]”.
OR
a) Draw Turing machine to compute the function f(x) = 2x where x is non
negative integer, using unary representation.

7. Design a PDA to accept the language having more number of a’s than b’s. 10

–––––––––––––

Set S
*SLRTX338* SLR-TX – 338
Seat
No.
Set P

S.E. (Computer Science and Engg.) (Part – II) (Old) Examination, 2018
computer networks – i
Day and Date : Thursday, 20-12-2018 Max. Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. I) Which of the situations might not require multiple routing protocols in a network ?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors
II) Considers be the average number of new frames generated per frame time. If s > 1, then
a) Frames not at all collide b) Every frame will suffer collision
c) Maximum utilization of channel d) No change in throughput
III) What does administrative distance rank ?
a) Metrics b) Sources of routing information
c) Router reliability d) Best paths
IV) This layer in an addition to OSI model
a) Application layer b) Presentation layer
c) Session layer d) Both b) and c)
V) Which of the following might be used by a company to satisfy its growing communication
needs ?
a) Front end processor b) Multiplexer
c) Controller d) All of the above
VI) Bytes of data being transferred in each connection are numbered by TCP. These numbers
starts with a
a) Random number b) Zero
c) One d) Sequence of zero’s and one’s
VII) To achieve reliable transport in TCP, ________ is used to check the safe and sound
arrival of data.
a) Packet b) Buffer c) Segment d) Acknowledgment
P.T.O.
SLR-TX – 338 -2- *SLRTX338*
VIII) UTP is commonly used in
a) DSL b) FTTP
c) HTTP d) None of the mentioned
IX) Terrestrial radio channels are broadly classified into _______ groups.
a) 2 b) 3 c) 4 d) 1
X) In which topology if there are n devices in a network each device has n-1 ports for cables ?
a) Mesh b) Star c) Bus d) Ring
XI) Which protocol should you select if the network diameter is more than 17 hops ?
a) RIPv1 b) RIPv2 c) EIGRP d) All of the above
XII) This is not a application layer protocol
a) HTTP b) SMTP c) FTP d) TCP
XIII) Fiber optics posses following properties
a) Immune electromagnetic interference b) Very less signal attenuation
c) Very hard to tap d) All of the mentioned
XIV) The receiver of the data controls the amount of data that are to be sent by the sender is
referred as
a) Flow control b) Error control
c) Congestion control d) Error detection
XV) On which layer of the OSI model the router configuration reside
a) Transport b) Network c) Logical link d) Physical
XVI) The process of, A client that wishes to connect to an open server tells its TCP that it
needs to be connected to that particular server is
a) Active open b) Active close c) Passive close d) Passive open
XVII) Which one of the following task is not done by data like layer ?
a) Framing b) Error control c) Flow control d) Channel coding
XVIII) CRC stands for
a) Cyclic Redundancy Check b) Code Repeat Check
c) Code Redundancy Check d) Cyclic Repeat Check
XIX) An endpoint of an inter-process communication flow across a computer network is called
a) Socket b) Pipe
c) Port d) None of the mentioned
XX) TCP/IP model does not have ___________ layer but OSI model have this layer.
a) Session layer b) Transport layer
c) Application layer d) None of the mentioned

__________

Set P
*SLRTX338* -3- SLR-TX – 338
Seat
No.

S.E. (Computer Science and Engg.) (Part – II) (Old) Examination, 2018
computer networks – i
Day and Date : Thursday, 20-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any four questions : 20


A) Explain Error Correction Technique.
B) Explain Mesh topology.
C) Explain Security issues LAN.
D) Write a note on UDP.
E) Write a short note on presentation layer and session layer OSI model.

3. Write note on Error Detection Techniques. 10


OR
Write a note on TCP/IP reference model.

4. Write short note on (any two) : 10


A) Network software.
B) DLL protocols.
C) ATM reference model.

SECTION – II

5. Attempt any four questions : 20


A) Explain CSMA.
B) Explain repeater networking device.
C) Write note on Layer 2 device.
D) Write a note on Slotted ALOHA.
E) Explain classes of IPv4.

Set P
SLR-TX – 338 -4- *SLRTX338*
6. Explain Congestion control algorithms. 10
OR
Explain different network layer design issues.

7. Write short note on (any two) : 10


A) OSFP.
B) Distance vector routing protocol.
C) RARP and ARP.
______________

Set P
*SLRTX338* SLR-TX – 338
Seat
No.
Set Q

S.E. (Computer Science and Engg.) (Part – II) (Old) Examination, 2018
computer networks – i
Day and Date : Thursday, 20-12-2018 Max. Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. I) The process of, A client that wishes to connect to an open server tells its TCP that it needs
to be connected to that particular server is
a) Active open b) Active close c) Passive close d) Passive open
II) Which one of the following task is not done by data like layer ?
a) Framing b) Error control c) Flow control d) Channel coding
III) CRC stands for
a) Cyclic Redundancy Check b) Code Repeat Check
c) Code Redundancy Check d) Cyclic Repeat Check
IV) An endpoint of an inter-process communication flow across a computer network is called
a) Socket b) Pipe
c) Port d) None of the mentioned
V) TCP/IP model does not have ___________ layer but OSI model have this layer.
a) Session layer b) Transport layer
c) Application layer d) None of the mentioned

VI) Which of the situations might not require multiple routing protocols in a network ?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors
VII) Considers be the average number of new frames generated per frame time. If s > 1, then
a) Frames not at all collide b) Every frame will suffer collision
c) Maximum utilization of channel d) No change in throughput
VIII) What does administrative distance rank ?
a) Metrics b) Sources of routing information
c) Router reliability d) Best paths P.T.O.
SLR-TX – 338 -2- *SLRTX338*
IX) This layer in an addition to OSI model
a) Application layer b) Presentation layer
c) Session layer d) Both b) and c)
X) Which of the following might be used by a company to satisfy its growing communication
needs ?
a) Front end processor b) Multiplexer
c) Controller d) All of the above
XI) Bytes of data being transferred in each connection are numbered by TCP. These numbers
starts with a
a) Random number b) Zero
c) One d) Sequence of zero’s and one’s
XII) To achieve reliable transport in TCP, ________ is used to check the safe and sound
arrival of data.
a) Packet b) Buffer c) Segment d) Acknowledgment
XIII) UTP is commonly used in
a) DSL b) FTTP
c) HTTP d) None of the mentioned
XIV) Terrestrial radio channels are broadly classified into _______ groups.
a) 2 b) 3 c) 4 d) 1
XV) In which topology if there are n devices in a network each device has n-1 ports for cables ?
a) Mesh b) Star c) Bus d) Ring
XVI) Which protocol should you select if the network diameter is more than 17 hops ?
a) RIPv1 b) RIPv2 c) EIGRP d) All of the above
XVII) This is not a application layer protocol
a) HTTP b) SMTP c) FTP d) TCP
XVIII) Fiber optics posses following properties
a) Immune electromagnetic interference b) Very less signal attenuation
c) Very hard to tap d) All of the mentioned
XIX) The receiver of the data controls the amount of data that are to be sent by the sender is
referred as
a) Flow control b) Error control
c) Congestion control d) Error detection
XX) On which layer of the OSI model the router configuration reside
a) Transport b) Network c) Logical link d) Physical

__________

Set Q
*SLRTX338* -3- SLR-TX – 338
Seat
No.

S.E. (Computer Science and Engg.) (Part – II) (Old) Examination, 2018
computer networks – i
Day and Date : Thursday, 20-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any four questions : 20


A) Explain Error Correction Technique.
B) Explain Mesh topology.
C) Explain Security issues LAN.
D) Write a note on UDP.
E) Write a short note on presentation layer and session layer OSI model.

3. Write note on Error Detection Techniques. 10


OR
Write a note on TCP/IP reference model.

4. Write short note on (any two) : 10


A) Network software.
B) DLL protocols.
C) ATM reference model.

SECTION – II

5. Attempt any four questions : 20


A) Explain CSMA.
B) Explain repeater networking device.
C) Write note on Layer 2 device.
D) Write a note on Slotted ALOHA.
E) Explain classes of IPv4.

Set Q
SLR-TX – 338 -4- *SLRTX338*
6. Explain Congestion control algorithms. 10
OR
Explain different network layer design issues.

7. Write short note on (any two) : 10


A) OSFP.
B) Distance vector routing protocol.
C) RARP and ARP.
______________

Set Q
*SLRTX338* SLR-TX – 338
Seat
No.
Set R

S.E. (Computer Science and Engg.) (Part – II) (Old) Examination, 2018
computer networks – i
Day and Date : Thursday, 20-12-2018 Max. Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. I) Which protocol should you select if the network diameter is more than 17 hops ?
a) RIPv1 b) RIPv2 c) EIGRP d) All of the above
II) This is not a application layer protocol
a) HTTP b) SMTP c) FTP d) TCP
III) Fiber optics posses following properties
a) Immune electromagnetic interference b) Very less signal attenuation
c) Very hard to tap d) All of the mentioned
IV) The receiver of the data controls the amount of data that are to be sent by the sender is
referred as
a) Flow control b) Error control
c) Congestion control d) Error detection
V) On which layer of the OSI model the router configuration reside
a) Transport b) Network c) Logical link d) Physical
VI) The process of, A client that wishes to connect to an open server tells its TCP that it
needs to be connected to that particular server is
a) Active open b) Active close c) Passive close d) Passive open
VII) Which one of the following task is not done by data like layer ?
a) Framing b) Error control c) Flow control d) Channel coding
VIII) CRC stands for
a) Cyclic Redundancy Check b) Code Repeat Check
c) Code Redundancy Check d) Cyclic Repeat Check
IX) An endpoint of an inter-process communication flow across a computer network is called
a) Socket b) Pipe
c) Port d) None of the mentioned

P.T.O.
SLR-TX – 338 -2- *SLRTX338*
X) TCP/IP model does not have ___________ layer but OSI model have this layer.
a) Session layer b) Transport layer
c) Application layer d) None of the mentioned

XI) Which of the situations might not require multiple routing protocols in a network ?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors
XII) Considers be the average number of new frames generated per frame time. If s > 1, then
a) Frames not at all collide b) Every frame will suffer collision
c) Maximum utilization of channel d) No change in throughput
XIII) What does administrative distance rank ?
a) Metrics b) Sources of routing information
c) Router reliability d) Best paths
XIV) This layer in an addition to OSI model
a) Application layer b) Presentation layer
c) Session layer d) Both b) and c)
XV) Which of the following might be used by a company to satisfy its growing communication
needs ?
a) Front end processor b) Multiplexer
c) Controller d) All of the above
XVI) Bytes of data being transferred in each connection are numbered by TCP. These numbers
starts with a
a) Random number b) Zero
c) One d) Sequence of zero’s and one’s
XVII) To achieve reliable transport in TCP, ________ is used to check the safe and sound
arrival of data.
a) Packet b) Buffer c) Segment d) Acknowledgment
XVIII) UTP is commonly used in
a) DSL b) FTTP
c) HTTP d) None of the mentioned
XIX) Terrestrial radio channels are broadly classified into _______ groups.
a) 2 b) 3 c) 4 d) 1
XX) In which topology if there are n devices in a network each device has n-1 ports for cables ?
a) Mesh b) Star c) Bus d) Ring

__________

Set R
*SLRTX338* -3- SLR-TX – 338
Seat
No.

S.E. (Computer Science and Engg.) (Part – II) (Old) Examination, 2018
computer networks – i
Day and Date : Thursday, 20-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any four questions : 20


A) Explain Error Correction Technique.
B) Explain Mesh topology.
C) Explain Security issues LAN.
D) Write a note on UDP.
E) Write a short note on presentation layer and session layer OSI model.

3. Write note on Error Detection Techniques. 10


OR
Write a note on TCP/IP reference model.

4. Write short note on (any two) : 10


A) Network software.
B) DLL protocols.
C) ATM reference model.

SECTION – II

5. Attempt any four questions : 20


A) Explain CSMA.
B) Explain repeater networking device.
C) Write note on Layer 2 device.
D) Write a note on Slotted ALOHA.
E) Explain classes of IPv4.

Set R
SLR-TX – 338 -4- *SLRTX338*
6. Explain Congestion control algorithms. 10
OR
Explain different network layer design issues.

7. Write short note on (any two) : 10


A) OSFP.
B) Distance vector routing protocol.
C) RARP and ARP.
______________

Set R
*SLRTX338* SLR-TX – 338
Seat
No.
Set S

S.E. (Computer Science and Engg.) (Part – II) (Old) Examination, 2018
computer networks – i
Day and Date : Thursday, 20-12-2018 Max. Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. I) Bytes of data being transferred in each connection are numbered by TCP. These numbers
starts with a
a) Random number b) Zero
c) One d) Sequence of zero’s and one’s
II) To achieve reliable transport in TCP, ________ is used to check the safe and sound
arrival of data.
a) Packet b) Buffer c) Segment d) Acknowledgment
III) UTP is commonly used in
a) DSL b) FTTP
c) HTTP d) None of the mentioned
IV) Terrestrial radio channels are broadly classified into _______ groups.
a) 2 b) 3 c) 4 d) 1
V) In which topology if there are n devices in a network each device has n-1 ports for cables ?
a) Mesh b) Star c) Bus d) Ring
VI) Which protocol should you select if the network diameter is more than 17 hops ?
a) RIPv1 b) RIPv2 c) EIGRP d) All of the above
VII) This is not a application layer protocol
a) HTTP b) SMTP c) FTP d) TCP
VIII) Fiber optics posses following properties
a) Immune electromagnetic interference b) Very less signal attenuation
c) Very hard to tap d) All of the mentioned
IX) The receiver of the data controls the amount of data that are to be sent by the sender is
referred as
a) Flow control b) Error control
c) Congestion control d) Error detection
P.T.O.
SLR-TX – 338 -2- *SLRTX338*
X) On which layer of the OSI model the router configuration reside
a) Transport b) Network c) Logical link d) Physical
XI) The process of, A client that wishes to connect to an open server tells its TCP that it
needs to be connected to that particular server is
a) Active open b) Active close c) Passive close d) Passive open
XII) Which one of the following task is not done by data like layer ?
a) Framing b) Error control c) Flow control d) Channel coding
XIII) CRC stands for
a) Cyclic Redundancy Check b) Code Repeat Check
c) Code Redundancy Check d) Cyclic Repeat Check
XIV) An endpoint of an inter-process communication flow across a computer network is called
a) Socket b) Pipe
c) Port d) None of the mentioned
XV) TCP/IP model does not have ___________ layer but OSI model have this layer.
a) Session layer b) Transport layer
c) Application layer d) None of the mentioned

XVI) Which of the situations might not require multiple routing protocols in a network ?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors
XVII) Considers be the average number of new frames generated per frame time. If s > 1, then
a) Frames not at all collide b) Every frame will suffer collision
c) Maximum utilization of channel d) No change in throughput
XVIII) What does administrative distance rank ?
a) Metrics b) Sources of routing information
c) Router reliability d) Best paths
XIX) This layer in an addition to OSI model
a) Application layer b) Presentation layer
c) Session layer d) Both b) and c)
XX) Which of the following might be used by a company to satisfy its growing communication
needs ?
a) Front end processor b) Multiplexer
c) Controller d) All of the above

__________

Set S
*SLRTX338* -3- SLR-TX – 338
Seat
No.

S.E. (Computer Science and Engg.) (Part – II) (Old) Examination, 2018
computer networks – i
Day and Date : Thursday, 20-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any four questions : 20


A) Explain Error Correction Technique.
B) Explain Mesh topology.
C) Explain Security issues LAN.
D) Write a note on UDP.
E) Write a short note on presentation layer and session layer OSI model.

3. Write note on Error Detection Techniques. 10


OR
Write a note on TCP/IP reference model.

4. Write short note on (any two) : 10


A) Network software.
B) DLL protocols.
C) ATM reference model.

SECTION – II

5. Attempt any four questions : 20


A) Explain CSMA.
B) Explain repeater networking device.
C) Write note on Layer 2 device.
D) Write a note on Slotted ALOHA.
E) Explain classes of IPv4.

Set S
SLR-TX – 338 -4- *SLRTX338*
6. Explain Congestion control algorithms. 10
OR
Explain different network layer design issues.

7. Write short note on (any two) : 10


A) OSFP.
B) Distance vector routing protocol.
C) RARP and ARP.
______________

Set S
*SLRTX339* SLR-TX – 339
Seat
No. Set P
T.E. (CSE) (Part – I) (CBCS) Examination, 2018
operating system concepts (new)

Day and Date : Friday, 30-11-2018, -2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (14×1=14)
1) The primary job of the operating system of a computer is to
A) Command resources B) Manage resources
C) Provide utilities D) Be user friendly
2) The variable turn can have values 0 or 1
Void Process (i)
{
while(1)
{
//Non-critical section
while (turn!=i);
//Critical section
turn= j;
}
}
The above code does not provide
A) Mutual exclusion B) Progress
C) Bounded wait D) None of these
3) In a time-sharing operating system, when the time slot given to process is completed,
the process goes from the running state to the
A) Blocked state B) Ready state
C) Suspended state D) Terminated state
4) A high level synchronization construct, characterized by a set of programmer defined
operators is known as
A) Semaphore B) Hardware synchronization
C) Monitor D) None of the above
P.T.O.
SLR-TX – 339 -2- *SLRTX339*
5) What is dispatch Latancy
A) The time taken by the dispatcher to stop one process and start another
B) Time taken by processor to write a file into disk
C) The whole time taken by all processor
D) Time taken by CPU sheduler to shedule next process
6) Which of the following statements are true ?
I. Shortest remaining time first scheduling may cause starvation
II. Preemptive scheduling may cause starvation
III. Round robin is better than FCFS in terms of response time
A) I only B) I and II only C) I, II, III D) II and III
7) A ________ system is often used as a control device in a dedicated application and has
a well defined and fixed time constraints.
A) Soft-real time systems B) Distributed systems
C) Hard real time systems D) Time-shairing
8) The state of a process is defined by
A) the final activity of the process
B) the activity just executed by the process
C) the activity to next be executed by the process
D) the current activity of the process
9) _______ page replacement policy generates minimum number of page fault.
A) LRU B) LFU C) FIFO D) Optimal
10) Which of the following is deadlock prevention mechanism ?
A) Bankers algorithm B) Avoiding hold and wait
C) No preemption of resource D) All of these
11) Syntax for ioctl system call is
A) ioctl(); B) ioctl(int,fd, ptr)
C) ioctl(fd, int, ptr) D) ioctl(ptr,int,fd);
12) What does turn around time mean ?
A) Time from the process enters the ready queue to the time it starts execution
B) The difference between the arrival time and the completion time of the process
C) Time taken from start to completion of I/O
D) Time a process waits in the ready queue
13) The hardware that measure elapsed time and to trigger operations is called a
A) Programmable Interval timer B) Program interrupt timer
C) Clock D) None of these
14) ________ is a set of wires and rigidly defined protocol that specifies a set of messages
that can be sent on wires.
A) Bios B) Port C) Bus D) Controller
____________
Set P
*SLRTX339* -3- SLR-TX – 339
Seat
No.
T.E. (CSE) (Part – I) (CBCS) Examination, 2018
operating system concepts (new)
Day and Date : Friday, 30-11-2018, -2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m..2

SECTION – I

2. Solve any three : (4×3=12)


1) Draw queing diagram and state different types of queues used by processes during
execution.
2) Write a short note on Time Sharing Operating System.
3) What is dispatcher ? List all scheduling criteria and explain in detail.
4) Compare FCFS, SJF, Priority and round Robin scheduling algorithms.
5) How processes communicate with each other using direct or indirect communication,
write its primitives.

3. Consider a set of process A, B, C, D arriving in the same order at time zero in the ready
queue. Their burst times are 4, 1, 8, 1 respectively. Using Round Robin scheduling, with
time slice of 1 unit.
a) Draw Gantt Chart.
b) What is the time at which process B completes execution ?
c) Find waiting time and turn around time for all processes.
d) Find Avg. waiting time and turn around time. 8
OR
3. How synchronization is achieved by using hardware Test and Set instruction ? 8

4. Using state transition diagram explain how process undergoes in different states during its
lifetime. Also describe process control block. 8

SECTION – II

5. Solve any three : (4×3=12)


1) Explain with example how Resource Allocation Graph (RAG) can be used to describe a
deadlock.
2) Describe how process termination helps in recovery of deadlock.
Set P
SLR-TX – 339 -4- *SLRTX339*
3) Differentiate between paging and segmentation.
4) How memory can be allocated using First Fit, Best Fit and Worst Fit strategies ?
5) Write a short note on streams.

6. What is page fault ? When it occurs ? What are different steps for handling a page fault ? 8
OR
6. What is the approach of an operating system to detect a deadlock for single instance of
resource type and multiple instance of resource type ? Explain with example. 8

7. Consider below given reference string and number of frames available as 3, find page fault
using FIFO, LRU and optimal page replacement algorithms.
State which algorithm results belody’s Anomoly and which is best for page replacement.
Reference String : 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1. 8

_______________

Set P
*SLRTX339* SLR-TX – 339
Seat
No. Set Q
T.E. (CSE) (Part – I) (CBCS) Examination, 2018
operating system concepts (new)

Day and Date : Friday, 30-11-2018, -2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (14×1=14)
1) The state of a process is defined by
A) the final activity of the process
B) the activity just executed by the process
C) the activity to next be executed by the process
D) the current activity of the process
2) _______ page replacement policy generates minimum number of page fault.
A) LRU B) LFU C) FIFO D) Optimal
3) Which of the following is deadlock prevention mechanism ?
A) Bankers algorithm B) Avoiding hold and wait
C) No preemption of resource D) All of these
4) Syntax for ioctl system call is
A) ioctl(); B) ioctl(int,fd, ptr)
C) ioctl(fd, int, ptr) D) ioctl(ptr,int,fd);
5) What does turn around time mean ?
A) Time from the process enters the ready queue to the time it starts execution
B) The difference between the arrival time and the completion time of the process
C) Time taken from start to completion of I/O
D) Time a process waits in the ready queue
6) The hardware that measure elapsed time and to trigger operations is called a
A) Programmable Interval timer B) Program interrupt timer
C) Clock D) None of these
7) ________ is a set of wires and rigidly defined protocol that specifies a set of messages
that can be sent on wires.
A) Bios B) Port C) Bus D) Controller
P.T.O.
SLR-TX – 339 -2- *SLRTX339*
8) The primary job of the operating system of a computer is to
A) Command resources B) Manage resources
C) Provide utilities D) Be user friendly
9) The variable turn can have values 0 or 1
Void Process (i)
{
while(1)
{
//Non-critical section
while (turn!=i);
//Critical section
turn= j;
}
}
The above code does not provide
A) Mutual exclusion B) Progress
C) Bounded wait D) None of these
10) In a time-sharing operating system, when the time slot given to process is completed,
the process goes from the running state to the
A) Blocked state B) Ready state
C) Suspended state D) Terminated state
11) A high level synchronization construct, characterized by a set of programmer defined
operators is known as
A) Semaphore B) Hardware synchronization
C) Monitor D) None of the above
12) What is dispatch Latancy
A) The time taken by the dispatcher to stop one process and start another
B) Time taken by processor to write a file into disk
C) The whole time taken by all processor
D) Time taken by CPU sheduler to shedule next process
13) Which of the following statements are true ?
I. Shortest remaining time first scheduling may cause starvation
II. Preemptive scheduling may cause starvation
III. Round robin is better than FCFS in terms of response time
A) I only B) I and II only C) I, II, III D) II and III
14) A ________ system is often used as a control device in a dedicated application and has
a well defined and fixed time constraints.
A) Soft-real time systems B) Distributed systems
C) Hard real time systems D) Time-shairing
____________
Set Q
*SLRTX339* -3- SLR-TX – 339
Seat
No.
T.E. (CSE) (Part – I) (CBCS) Examination, 2018
operating system concepts (new)
Day and Date : Friday, 30-11-2018, -2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m..2

SECTION – I

2. Solve any three : (4×3=12)


1) Draw queing diagram and state different types of queues used by processes during
execution.
2) Write a short note on Time Sharing Operating System.
3) What is dispatcher ? List all scheduling criteria and explain in detail.
4) Compare FCFS, SJF, Priority and round Robin scheduling algorithms.
5) How processes communicate with each other using direct or indirect communication,
write its primitives.

3. Consider a set of process A, B, C, D arriving in the same order at time zero in the ready
queue. Their burst times are 4, 1, 8, 1 respectively. Using Round Robin scheduling, with
time slice of 1 unit.
a) Draw Gantt Chart.
b) What is the time at which process B completes execution ?
c) Find waiting time and turn around time for all processes.
d) Find Avg. waiting time and turn around time. 8
OR
3. How synchronization is achieved by using hardware Test and Set instruction ? 8

4. Using state transition diagram explain how process undergoes in different states during its
lifetime. Also describe process control block. 8

SECTION – II

5. Solve any three : (4×3=12)


1) Explain with example how Resource Allocation Graph (RAG) can be used to describe a
deadlock.
2) Describe how process termination helps in recovery of deadlock.
Set Q
SLR-TX – 339 -4- *SLRTX339*
3) Differentiate between paging and segmentation.
4) How memory can be allocated using First Fit, Best Fit and Worst Fit strategies ?
5) Write a short note on streams.

6. What is page fault ? When it occurs ? What are different steps for handling a page fault ? 8
OR
6. What is the approach of an operating system to detect a deadlock for single instance of
resource type and multiple instance of resource type ? Explain with example. 8

7. Consider below given reference string and number of frames available as 3, find page fault
using FIFO, LRU and optimal page replacement algorithms.
State which algorithm results belody’s Anomoly and which is best for page replacement.
Reference String : 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1. 8

_______________

Set Q
*SLRTX339* SLR-TX – 339
Seat
No. Set R
T.E. (CSE) (Part – I) (CBCS) Examination, 2018
operating system concepts (new)

Day and Date : Friday, 30-11-2018, -2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (14×1=14)
1) What is dispatch Latancy
A) The time taken by the dispatcher to stop one process and start another
B) Time taken by processor to write a file into disk
C) The whole time taken by all processor
D) Time taken by CPU sheduler to shedule next process
2) Which of the following statements are true ?
I. Shortest remaining time first scheduling may cause starvation
II. Preemptive scheduling may cause starvation
III. Round robin is better than FCFS in terms of response time
A) I only B) I and II only C) I, II, III D) II and III
3) A ________ system is often used as a control device in a dedicated application and has
a well defined and fixed time constraints.
A) Soft-real time systems B) Distributed systems
C) Hard real time systems D) Time-shairing
4) The state of a process is defined by
A) the final activity of the process
B) the activity just executed by the process
C) the activity to next be executed by the process
D) the current activity of the process
5) _______ page replacement policy generates minimum number of page fault.
A) LRU B) LFU C) FIFO D) Optimal
6) Which of the following is deadlock prevention mechanism ?
A) Bankers algorithm B) Avoiding hold and wait
C) No preemption of resource D) All of these
P.T.O.
SLR-TX – 339 -2- *SLRTX339*
7) Syntax for ioctl system call is
A) ioctl(); B) ioctl(int,fd, ptr)
C) ioctl(fd, int, ptr) D) ioctl(ptr,int,fd);
8) What does turn around time mean ?
A) Time from the process enters the ready queue to the time it starts execution
B) The difference between the arrival time and the completion time of the process
C) Time taken from start to completion of I/O
D) Time a process waits in the ready queue
9) The hardware that measure elapsed time and to trigger operations is called a
A) Programmable Interval timer B) Program interrupt timer
C) Clock D) None of these
10) ________ is a set of wires and rigidly defined protocol that specifies a set of messages
that can be sent on wires.
A) Bios B) Port C) Bus D) Controller
11) The primary job of the operating system of a computer is to
A) Command resources B) Manage resources
C) Provide utilities D) Be user friendly
12) The variable turn can have values 0 or 1
Void Process (i)
{
while(1)
{
//Non-critical section
while (turn!=i);
//Critical section
turn= j;
}
}
The above code does not provide
A) Mutual exclusion B) Progress
C) Bounded wait D) None of these
13) In a time-sharing operating system, when the time slot given to process is completed,
the process goes from the running state to the
A) Blocked state B) Ready state
C) Suspended state D) Terminated state
14) A high level synchronization construct, characterized by a set of programmer defined
operators is known as
A) Semaphore B) Hardware synchronization
C) Monitor D) None of the above
____________

Set R
*SLRTX339* -3- SLR-TX – 339
Seat
No.
T.E. (CSE) (Part – I) (CBCS) Examination, 2018
operating system concepts (new)
Day and Date : Friday, 30-11-2018, -2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m..2

SECTION – I

2. Solve any three : (4×3=12)


1) Draw queing diagram and state different types of queues used by processes during
execution.
2) Write a short note on Time Sharing Operating System.
3) What is dispatcher ? List all scheduling criteria and explain in detail.
4) Compare FCFS, SJF, Priority and round Robin scheduling algorithms.
5) How processes communicate with each other using direct or indirect communication,
write its primitives.

3. Consider a set of process A, B, C, D arriving in the same order at time zero in the ready
queue. Their burst times are 4, 1, 8, 1 respectively. Using Round Robin scheduling, with
time slice of 1 unit.
a) Draw Gantt Chart.
b) What is the time at which process B completes execution ?
c) Find waiting time and turn around time for all processes.
d) Find Avg. waiting time and turn around time. 8
OR
3. How synchronization is achieved by using hardware Test and Set instruction ? 8

4. Using state transition diagram explain how process undergoes in different states during its
lifetime. Also describe process control block. 8

SECTION – II

5. Solve any three : (4×3=12)


1) Explain with example how Resource Allocation Graph (RAG) can be used to describe a
deadlock.
2) Describe how process termination helps in recovery of deadlock.
Set R
SLR-TX – 339 -4- *SLRTX339*
3) Differentiate between paging and segmentation.
4) How memory can be allocated using First Fit, Best Fit and Worst Fit strategies ?
5) Write a short note on streams.

6. What is page fault ? When it occurs ? What are different steps for handling a page fault ? 8
OR
6. What is the approach of an operating system to detect a deadlock for single instance of
resource type and multiple instance of resource type ? Explain with example. 8

7. Consider below given reference string and number of frames available as 3, find page fault
using FIFO, LRU and optimal page replacement algorithms.
State which algorithm results belody’s Anomoly and which is best for page replacement.
Reference String : 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1. 8

_______________

Set R
*SLRTX339* SLR-TX – 339
Seat
No. Set S
T.E. (CSE) (Part – I) (CBCS) Examination, 2018
operating system concepts (new)

Day and Date : Friday, 30-11-2018, -2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (14×1=14)
1) Which of the following is deadlock prevention mechanism ?
A) Bankers algorithm B) Avoiding hold and wait
C) No preemption of resource D) All of these
2) Syntax for ioctl system call is
A) ioctl(); B) ioctl(int,fd, ptr)
C) ioctl(fd, int, ptr) D) ioctl(ptr,int,fd);
3) What does turn around time mean ?
A) Time from the process enters the ready queue to the time it starts execution
B) The difference between the arrival time and the completion time of the process
C) Time taken from start to completion of I/O
D) Time a process waits in the ready queue
4) The hardware that measure elapsed time and to trigger operations is called a
A) Programmable Interval timer B) Program interrupt timer
C) Clock D) None of these
5) ________ is a set of wires and rigidly defined protocol that specifies a set of messages
that can be sent on wires.
A) Bios B) Port C) Bus D) Controller
6) The primary job of the operating system of a computer is to
A) Command resources B) Manage resources
C) Provide utilities D) Be user friendly
P.T.O.
SLR-TX – 339 -2- *SLRTX339*
7) The variable turn can have values 0 or 1
Void Process (i)
{
while(1)
{
//Non-critical section
while (turn!=i);
//Critical section
turn= j;
}
}
The above code does not provide
A) Mutual exclusion B) Progress
C) Bounded wait D) None of these
8) In a time-sharing operating system, when the time slot given to process is completed,
the process goes from the running state to the
A) Blocked state B) Ready state
C) Suspended state D) Terminated state
9) A high level synchronization construct, characterized by a set of programmer defined
operators is known as
A) Semaphore B) Hardware synchronization
C) Monitor D) None of the above
10) What is dispatch Latancy
A) The time taken by the dispatcher to stop one process and start another
B) Time taken by processor to write a file into disk
C) The whole time taken by all processor
D) Time taken by CPU sheduler to shedule next process
11) Which of the following statements are true ?
I. Shortest remaining time first scheduling may cause starvation
II. Preemptive scheduling may cause starvation
III. Round robin is better than FCFS in terms of response time
A) I only B) I and II only C) I, II, III D) II and III
12) A ________ system is often used as a control device in a dedicated application and has
a well defined and fixed time constraints.
A) Soft-real time systems B) Distributed systems
C) Hard real time systems D) Time-shairing
13) The state of a process is defined by
A) the final activity of the process
B) the activity just executed by the process
C) the activity to next be executed by the process
D) the current activity of the process
14) _______ page replacement policy generates minimum number of page fault.
A) LRU B) LFU C) FIFO D) Optimal
____________
Set S
*SLRTX339* -3- SLR-TX – 339
Seat
No.
T.E. (CSE) (Part – I) (CBCS) Examination, 2018
operating system concepts (new)
Day and Date : Friday, 30-11-2018, -2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m..2

SECTION – I

2. Solve any three : (4×3=12)


1) Draw queing diagram and state different types of queues used by processes during
execution.
2) Write a short note on Time Sharing Operating System.
3) What is dispatcher ? List all scheduling criteria and explain in detail.
4) Compare FCFS, SJF, Priority and round Robin scheduling algorithms.
5) How processes communicate with each other using direct or indirect communication,
write its primitives.

3. Consider a set of process A, B, C, D arriving in the same order at time zero in the ready
queue. Their burst times are 4, 1, 8, 1 respectively. Using Round Robin scheduling, with
time slice of 1 unit.
a) Draw Gantt Chart.
b) What is the time at which process B completes execution ?
c) Find waiting time and turn around time for all processes.
d) Find Avg. waiting time and turn around time. 8
OR
3. How synchronization is achieved by using hardware Test and Set instruction ? 8

4. Using state transition diagram explain how process undergoes in different states during its
lifetime. Also describe process control block. 8

SECTION – II

5. Solve any three : (4×3=12)


1) Explain with example how Resource Allocation Graph (RAG) can be used to describe a
deadlock.
2) Describe how process termination helps in recovery of deadlock.
Set S
SLR-TX – 339 -4- *SLRTX339*
3) Differentiate between paging and segmentation.
4) How memory can be allocated using First Fit, Best Fit and Worst Fit strategies ?
5) Write a short note on streams.

6. What is page fault ? When it occurs ? What are different steps for handling a page fault ? 8
OR
6. What is the approach of an operating system to detect a deadlock for single instance of
resource type and multiple instance of resource type ? Explain with example. 8

7. Consider below given reference string and number of frames available as 3, find page fault
using FIFO, LRU and optimal page replacement algorithms.
State which algorithm results belody’s Anomoly and which is best for page replacement.
Reference String : 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1. 8

_______________

Set S
*SLRTX340* SLR-TX – 340
Seat
No.

Set P

T.E. (Computer Science and Engineering) (Part – I) (New CBCS)


Examination, 2018
system programming
Day and Date : Monday, 3-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book on Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) The output of the lexical and syntax analyzer can stated as
a) parse stream, parse tree b) token tree, parse tree
c) token stream, parse tree d) all of the mentioned
2) Which of the following is not advanced assembler directive ?
a) START b) EQU c) ORIGIN d) LTORG
3) Intermediate code for “ORIGIN” is
a) (IS, 03) b) (DL, 02) c) (AD, 03) d) (AD, 04)
4) A __________ statement declares the name of macro.
a) Macro prototype b) Macro definition
c) Macro identification d) None of the above
5) Expansion time variables are used
a) Before expansion of micro calls b) Only during expansion of macro calls
c) After expansion of micro calls d) None of the above

P.T.O.
SLR-TX – 340 -2- *SLRTX340*
6) The optimization technique which is typically applied on loops is
a) Removal of invariant computation
b) Constant folding
c) Peephole optimization
d) All of these
7) Relocation table is generated in
a) Loader b) Binary program
c) Object module d) Translator
8) The linker has utilities needed for ________ within the translated program.
a) Input b) Output c) Processing d) All of these
9) In direct linking loader which is not related with object program ?
a) ESD b) RLD c) BSS d) TXT
10) Loading is _________ with the task of storage management of operating
system and mostly preformed after assembly.
a) Bound b) Expanded
c) Overlaps d) All of these
11) Choose correct statement from following .
a) The symbol table built during Lexical Analysis
b) The symbol table built during Semantic Analysis
c) The symbol table built during Syntax Analysis
d) All of these
12) If translated origin and linked origin are different, then relocation is
performed by
a) Linker b) Loader c) Translator d) Both a) and b)
13) The operand descriptor has the fields
a) Attributes b) Addressability
c) Both a) and b) d) None of these
14) File with .exe extension contains
a) Non relocated object program b) Relocated program
c) Linked program d) None of these

_________________

Set P
*SLRTX340* -3- SLR-TX – 340
Seat
No.

T.E. (Computer Science and Engineering) (Part – I) (New CBCS)


Examination, 2018
system programming

Day and Date : Monday, 3-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Attempt any 3 : (4×3=12)


a) What is language processor pass ? How forward references are handled
in two pass assembler ? Elaborate.
b) Elaborate Analysis and synthesis phase structure of an assembler.
c) What is the difference in positional parameters and keyword parameters ?
Explain with example.
d) What is Lex used for ? Elaborate with an example.
e) Explain intermediate code in two pass assemble.

3. Attempt any one : 8


Elaborate the back end of a Toy compiler with an example.
OR

List the tables required for the design of a macro preprocessor with their fields.

4. Elaborate the data structures (table) used in Assembler pass-I with an example. 8

Set P
SLR-TX – 340 -4- *SLRTX340*
SECTION – II

5. Attempt any 3 : (4×3=12)


a) List and explain the contents of Object Module w.r.t. Linkers.
b) Explain overlay structured program with example.
c) Explain the concept of “Triples” with respect to intermediate codes for
expression and show the contents of “Triples” for the following expression.
Source string = a + b * c + d * e ↑ f
d) Write a short note on :
i) Register descriptor
ii) Operand descriptor.
e) Explain the use of relocation bits and transfer vector with proper example.

6. Attempt any one : 8


a) Write and explain “Evaluation order for operators” using RR label with
proper example.
OR

b) Draw and explain Pass-I flow chart of direct linking loader.

7. Explain any two loader schemes with its advantages and disadvantages. 8

_________________

Set P
*SLRTX340* SLR-TX – 340
Seat
No.

Set Q

T.E. (Computer Science and Engineering) (Part – I) (New CBCS)


Examination, 2018
system programming
Day and Date : Monday, 3-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book on Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) The linker has utilities needed for ________ within the translated program.
a) Input b) Output c) Processing d) All of these
2) In direct linking loader which is not related with object program ?
a) ESD b) RLD c) BSS d) TXT
3) Loading is _________ with the task of storage management of operating
system and mostly preformed after assembly.
a) Bound b) Expanded
c) Overlaps d) All of these
4) Choose correct statement from following .
a) The symbol table built during Lexical Analysis
b) The symbol table built during Semantic Analysis
c) The symbol table built during Syntax Analysis
d) All of these

P.T.O.
SLR-TX – 340 -2- *SLRTX340*
5) If translated origin and linked origin are different, then relocation is
performed by
a) Linker b) Loader c) Translator d) Both a) and b)
6) The operand descriptor has the fields
a) Attributes b) Addressability
c) Both a) and b) d) None of these
7) File with .exe extension contains
a) Non relocated object program b) Relocated program
c) Linked program d) None of these
8) The output of the lexical and syntax analyzer can stated as
a) parse stream, parse tree b) token tree, parse tree
c) token stream, parse tree d) all of the mentioned
9) Which of the following is not advanced assembler directive ?
a) START b) EQU c) ORIGIN d) LTORG
10) Intermediate code for “ORIGIN” is
a) (IS, 03) b) (DL, 02) c) (AD, 03) d) (AD, 04)
11) A __________ statement declares the name of macro.
a) Macro prototype b) Macro definition
c) Macro identification d) None of the above
12) Expansion time variables are used
a) Before expansion of micro calls b) Only during expansion of macro calls
c) After expansion of micro calls d) None of the above
13) The optimization technique which is typically applied on loops is
a) Removal of invariant computation
b) Constant folding
c) Peephole optimization
d) All of these
14) Relocation table is generated in
a) Loader b) Binary program
c) Object module d) Translator

_________________

Set Q
*SLRTX340* -3- SLR-TX – 340
Seat
No.

T.E. (Computer Science and Engineering) (Part – I) (New CBCS)


Examination, 2018
system programming

Day and Date : Monday, 3-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Attempt any 3 : (4×3=12)


a) What is language processor pass ? How forward references are handled
in two pass assembler ? Elaborate.
b) Elaborate Analysis and synthesis phase structure of an assembler.
c) What is the difference in positional parameters and keyword parameters ?
Explain with example.
d) What is Lex used for ? Elaborate with an example.
e) Explain intermediate code in two pass assemble.

3. Attempt any one : 8


Elaborate the back end of a Toy compiler with an example.
OR

List the tables required for the design of a macro preprocessor with their fields.

4. Elaborate the data structures (table) used in Assembler pass-I with an example. 8

Set Q
SLR-TX – 340 -4- *SLRTX340*
SECTION – II

5. Attempt any 3 : (4×3=12)


a) List and explain the contents of Object Module w.r.t. Linkers.
b) Explain overlay structured program with example.
c) Explain the concept of “Triples” with respect to intermediate codes for
expression and show the contents of “Triples” for the following expression.
Source string = a + b * c + d * e ↑ f
d) Write a short note on :
i) Register descriptor
ii) Operand descriptor.
e) Explain the use of relocation bits and transfer vector with proper example.

6. Attempt any one : 8


a) Write and explain “Evaluation order for operators” using RR label with
proper example.
OR

b) Draw and explain Pass-I flow chart of direct linking loader.

7. Explain any two loader schemes with its advantages and disadvantages. 8

_________________

Set Q
*SLRTX340* SLR-TX – 340
Seat
No.

Set R

T.E. (Computer Science and Engineering) (Part – I) (New CBCS)


Examination, 2018
system programming
Day and Date : Monday, 3-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book on Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) Expansion time variables are used
a) Before expansion of micro calls b) Only during expansion of macro calls
c) After expansion of micro calls d) None of the above
2) The optimization technique which is typically applied on loops is
a) Removal of invariant computation
b) Constant folding
c) Peephole optimization
d) All of these
3) Relocation table is generated in
a) Loader b) Binary program
c) Object module d) Translator
4) The linker has utilities needed for ________ within the translated program.
a) Input b) Output c) Processing d) All of these

P.T.O.
SLR-TX – 340 -2- *SLRTX340*
5) In direct linking loader which is not related with object program ?
a) ESD b) RLD c) BSS d) TXT
6) Loading is _________ with the task of storage management of operating
system and mostly preformed after assembly.
a) Bound b) Expanded
c) Overlaps d) All of these
7) Choose correct statement from following .
a) The symbol table built during Lexical Analysis
b) The symbol table built during Semantic Analysis
c) The symbol table built during Syntax Analysis
d) All of these
8) If translated origin and linked origin are different, then relocation is
performed by
a) Linker b) Loader c) Translator d) Both a) and b)
9) The operand descriptor has the fields
a) Attributes b) Addressability
c) Both a) and b) d) None of these
10) File with .exe extension contains
a) Non relocated object program b) Relocated program
c) Linked program d) None of these
11) The output of the lexical and syntax analyzer can stated as
a) parse stream, parse tree b) token tree, parse tree
c) token stream, parse tree d) all of the mentioned
12) Which of the following is not advanced assembler directive ?
a) START b) EQU c) ORIGIN d) LTORG
13) Intermediate code for “ORIGIN” is
a) (IS, 03) b) (DL, 02) c) (AD, 03) d) (AD, 04)
14) A __________ statement declares the name of macro.
a) Macro prototype b) Macro definition
c) Macro identification d) None of the above

_________________
Set R
*SLRTX340* -3- SLR-TX – 340
Seat
No.

T.E. (Computer Science and Engineering) (Part – I) (New CBCS)


Examination, 2018
system programming

Day and Date : Monday, 3-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Attempt any 3 : (4×3=12)


a) What is language processor pass ? How forward references are handled
in two pass assembler ? Elaborate.
b) Elaborate Analysis and synthesis phase structure of an assembler.
c) What is the difference in positional parameters and keyword parameters ?
Explain with example.
d) What is Lex used for ? Elaborate with an example.
e) Explain intermediate code in two pass assemble.

3. Attempt any one : 8


Elaborate the back end of a Toy compiler with an example.
OR

List the tables required for the design of a macro preprocessor with their fields.

4. Elaborate the data structures (table) used in Assembler pass-I with an example. 8

Set R
SLR-TX – 340 -4- *SLRTX340*
SECTION – II

5. Attempt any 3 : (4×3=12)


a) List and explain the contents of Object Module w.r.t. Linkers.
b) Explain overlay structured program with example.
c) Explain the concept of “Triples” with respect to intermediate codes for
expression and show the contents of “Triples” for the following expression.
Source string = a + b * c + d * e ↑ f
d) Write a short note on :
i) Register descriptor
ii) Operand descriptor.
e) Explain the use of relocation bits and transfer vector with proper example.

6. Attempt any one : 8


a) Write and explain “Evaluation order for operators” using RR label with
proper example.
OR

b) Draw and explain Pass-I flow chart of direct linking loader.

7. Explain any two loader schemes with its advantages and disadvantages. 8

_________________

Set R
*SLRTX340* SLR-TX – 340
Seat
No.

Set S

T.E. (Computer Science and Engineering) (Part – I) (New CBCS)


Examination, 2018
system programming
Day and Date : Monday, 3-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book on Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) Loading is _________ with the task of storage management of operating
system and mostly preformed after assembly.
a) Bound b) Expanded
c) Overlaps d) All of these
2) Choose correct statement from following .
a) The symbol table built during Lexical Analysis
b) The symbol table built during Semantic Analysis
c) The symbol table built during Syntax Analysis
d) All of these
3) If translated origin and linked origin are different, then relocation is
performed by
a) Linker b) Loader c) Translator d) Both a) and b)
4) The operand descriptor has the fields
a) Attributes b) Addressability
c) Both a) and b) d) None of these
P.T.O.
SLR-TX – 340 -2- *SLRTX340*
5) File with .exe extension contains
a) Non relocated object program b) Relocated program
c) Linked program d) None of these
6) The output of the lexical and syntax analyzer can stated as
a) parse stream, parse tree b) token tree, parse tree
c) token stream, parse tree d) all of the mentioned
7) Which of the following is not advanced assembler directive ?
a) START b) EQU c) ORIGIN d) LTORG
8) Intermediate code for “ORIGIN” is
a) (IS, 03) b) (DL, 02) c) (AD, 03) d) (AD, 04)
9) A __________ statement declares the name of macro.
a) Macro prototype b) Macro definition
c) Macro identification d) None of the above
10) Expansion time variables are used
a) Before expansion of micro calls b) Only during expansion of macro calls
c) After expansion of micro calls d) None of the above
11) The optimization technique which is typically applied on loops is
a) Removal of invariant computation
b) Constant folding
c) Peephole optimization
d) All of these
12) Relocation table is generated in
a) Loader b) Binary program
c) Object module d) Translator
13) The linker has utilities needed for ________ within the translated program.
a) Input b) Output c) Processing d) All of these
14) In direct linking loader which is not related with object program ?
a) ESD b) RLD c) BSS d) TXT

_________________

Set S
*SLRTX340* -3- SLR-TX – 340
Seat
No.

T.E. (Computer Science and Engineering) (Part – I) (New CBCS)


Examination, 2018
system programming

Day and Date : Monday, 3-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Attempt any 3 : (4×3=12)


a) What is language processor pass ? How forward references are handled
in two pass assembler ? Elaborate.
b) Elaborate Analysis and synthesis phase structure of an assembler.
c) What is the difference in positional parameters and keyword parameters ?
Explain with example.
d) What is Lex used for ? Elaborate with an example.
e) Explain intermediate code in two pass assemble.

3. Attempt any one : 8


Elaborate the back end of a Toy compiler with an example.
OR

List the tables required for the design of a macro preprocessor with their fields.

4. Elaborate the data structures (table) used in Assembler pass-I with an example. 8

Set S
SLR-TX – 340 -4- *SLRTX340*
SECTION – II

5. Attempt any 3 : (4×3=12)


a) List and explain the contents of Object Module w.r.t. Linkers.
b) Explain overlay structured program with example.
c) Explain the concept of “Triples” with respect to intermediate codes for
expression and show the contents of “Triples” for the following expression.
Source string = a + b * c + d * e ↑ f
d) Write a short note on :
i) Register descriptor
ii) Operand descriptor.
e) Explain the use of relocation bits and transfer vector with proper example.

6. Attempt any one : 8


a) Write and explain “Evaluation order for operators” using RR label with
proper example.
OR

b) Draw and explain Pass-I flow chart of direct linking loader.

7. Explain any two loader schemes with its advantages and disadvantages. 8

_________________

Set S
*SLRTX341* SLR-TX – 341
Seat
No.

Set P

T.E. (Computer Science and Engineering) New CBCS (Part – I)


Examination, 2018
database engineering
Day and Date : Wednesday, 5-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book on Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) Logical level describes _____________ data are stored in the DB.
a) which b) where c) what d) when
2) To delete a particular column in a relation the command used is _____________
a) update b) drop c) alter d) delete
3) The database schema is written in _____________
a) hll b) dml c) ddl d) dcl
4) Which of the following is a legal expression in SQL ?
a) select null from employee
b) select name from employee
c) select name from employee where salary=null
d) None of the above
5) S1 : Primary key can be composite search key
S2 : Primary key is also a candidate keys.
a) S1 and S2 are true b) S1 is only true
c) S2 is only true d) S1 and S2 are false
6) In tuple relational calculus P1 → P2 is equivalent to _____________
a) ¬P1 ∨ P2 b) P1 ∨ P2
c) P1 ∧ P2 d) P1 ∧ ¬ P2
P.T.O.
SLR-TX – 341 -2- *SLRTX341*
7) Entities are identified from the word statement of a problem by
a) picking words which are adjectives
b) picking words which are verbs
c) picking words which are pronouns
d) picking words which are nouns
8) Canonical cover is a
a) subset of F b) super set of F
c) proper subset of F d) None of these
9) ___________ index has an index entry for every search key value in the data file.
a) Sparse b) Dense c) Both a) and b) d) None
10) A transaction is in _________ state after the final statement has been executed.
a) active b) partially committed
c) committed d) none of the above
11) Isolation of the transactions is ensured by
a) Transaction management b) Application programmer
c) Concurrency control d) Recovery management
12) Precedence graphs help to find a __________ schedule.
a) Serializable b) Deadlock free
c) Recoverable d) Cacadeless
13) Which of the following are valid reason for concurrency ?
i) Improved throughput
ii) Resource utilization
iii) Reduced transaction failure
iv) Improved consistency
a) Only iii and ii b) Only iii and i
c) Only ii and i d) Only iv and i
14) ‘dump’ log record is written to
a) Stable storage b) Log record buffer
c) Disk block d) None of these

_________________

Set P
*SLRTX341* SLR-TX – 341
-3-


Seat
No.

T.E. (Computer Science and Engineering) New CBCS (Part – I)


Examination, 2018
database engineering
Day and Date : Wednesday, 5-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.

SECTION – I
2. Solve any three : (3�4=12)

a) What is data independence ? Explain different forms of it.

b) Explain with example group by and having clause.

c) Explain with example lossless decomposition.

d) Explain different types of keys in relational model with example.

e) Explain with example canonical cover and how to detect extraneous attribute.

3. Solve any one : 8

a) What is functional dependency ? Describe the different types of functional


dependency with an example.

b) Define the following terms with an example.

1) Referential integrity.

2) 2NF.

3) Strong and weak entity sets.

4) Set membership.

Set P
SLR-TX – 341 -4- *SLRTX341*
4. Consider the following schema : 8
Employee (Empid, First_Name, Last_Name, salary, department)
Write SQL statements for following queries.

a) Get employee details from employee table whose first name starts with ‘J’.

b) Get department, total salary with respect to a department from employee table
order by total salary descending.

c) Get First_Name from employee table whose salary is more than 10000 and who
is from sales department.

d) Find the names of the employees whose department and salary is same as
employee “Albert King”.

Section – II

5. Solve any three : (3�4=12)

a) Explain Thomas write rule.

b) Explain secondary index with an example.

c) Explain ACID properties with an example.

d) Write a short note on Bitmap indices. And give example.

e) Explain types of failures.

6. Solve any one : 8

a) Explain deadlock detection and recovery from deadlock.

b) Explain recovery with concurrent transactions.

7. Explain two phase locking protocol along with its variations. 8

_________________

Set P
*SLRTX341* SLR-TX – 341
Seat
No.

Set Q

T.E. (Computer Science and Engineering) New CBCS (Part – I)


Examination, 2018
database engineering
Day and Date : Wednesday, 5-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book on Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) Canonical cover is a
a) subset of F b) super set of F
c) proper subset of F d) None of these
2) ___________ index has an index entry for every search key value in the data file.
a) Sparse b) Dense
c) Both a) and b) d) None
3) A transaction is in _________ state after the final statement has been executed.
a) active b) partially committed
c) committed d) none of the above
4) Isolation of the transactions is ensured by
a) Transaction management b) Application programmer
c) Concurrency control d) Recovery management
5) Precedence graphs help to find a __________ schedule.
a) Serializable b) Deadlock free
c) Recoverable d) Cacadeless

P.T.O.
SLR-TX – 341 -2- *SLRTX341*
6) Which of the following are valid reason for concurrency ?
i) Improved throughput
ii) Resource utilization
iii) Reduced transaction failure
iv) Improved consistency
a) Only iii and ii b) Only iii and i
c) Only ii and i d) Only iv and i
7) ‘dump’ log record is written to
a) Stable storage b) Log record buffer
c) Disk block d) None of these
8) Logical level describes _____________ data are stored in the DB.
a) which b) where c) what d) when
9) To delete a particular column in a relation the command used is _____________
a) update b) drop c) alter d) delete
10) The database schema is written in _____________
a) hll b) dml c) ddl d) dcl
11) Which of the following is a legal expression in SQL ?
a) select null from employee
b) select name from employee
c) select name from employee where salary=null
d) None of the above
12) S1 : Primary key can be composite search key
S2 : Primary key is also a candidate keys.
a) S1 and S2 are true b) S1 is only true
c) S2 is only true d) S1 and S2 are false
13) In tuple relational calculus P1 → P2 is equivalent to _____________
a) ¬P1 ∨ P2 b) P1 ∨ P2
c) P1 ∧ P2 d) P1 ∧ ¬ P2
14) Entities are identified from the word statement of a problem by
a) picking words which are adjectives
b) picking words which are verbs
c) picking words which are pronouns
d) picking words which are nouns

_________________

Set Q
*SLRTX341* SLR-TX – 341
-3-


Seat
No.

T.E. (Computer Science and Engineering) New CBCS (Part – I)


Examination, 2018
database engineering
Day and Date : Wednesday, 5-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.

SECTION – I
2. Solve any three : (3�4=12)

a) What is data independence ? Explain different forms of it.

b) Explain with example group by and having clause.

c) Explain with example lossless decomposition.

d) Explain different types of keys in relational model with example.

e) Explain with example canonical cover and how to detect extraneous attribute.

3. Solve any one : 8

a) What is functional dependency ? Describe the different types of functional


dependency with an example.

b) Define the following terms with an example.

1) Referential integrity.

2) 2NF.

3) Strong and weak entity sets.

4) Set membership.

Set Q
SLR-TX – 341 -4- *SLRTX341*
4. Consider the following schema : 8
Employee (Empid, First_Name, Last_Name, salary, department)
Write SQL statements for following queries.

a) Get employee details from employee table whose first name starts with ‘J’.

b) Get department, total salary with respect to a department from employee table
order by total salary descending.

c) Get First_Name from employee table whose salary is more than 10000 and who
is from sales department.

d) Find the names of the employees whose department and salary is same as
employee “Albert King”.

Section – II

5. Solve any three : (3�4=12)

a) Explain Thomas write rule.

b) Explain secondary index with an example.

c) Explain ACID properties with an example.

d) Write a short note on Bitmap indices. And give example.

e) Explain types of failures.

6. Solve any one : 8

a) Explain deadlock detection and recovery from deadlock.

b) Explain recovery with concurrent transactions.

7. Explain two phase locking protocol along with its variations. 8

_________________

Set Q
*SLRTX341* SLR-TX – 341
Seat
No.

Set R

T.E. (Computer Science and Engineering) New CBCS (Part – I)


Examination, 2018
database engineering
Day and Date : Wednesday, 5-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book on Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) S1 : Primary key can be composite search key
S2 : Primary key is also a candidate keys.
a) S1 and S2 are true b) S1 is only true
c) S2 is only true d) S1 and S2 are false
2) In tuple relational calculus P1 → P2 is equivalent to _____________
a) ¬P1 ∨ P2 b) P1 ∨ P2
c) P1 ∧ P2 d) P1 ∧ ¬ P2
3) Entities are identified from the word statement of a problem by
a) picking words which are adjectives
b) picking words which are verbs
c) picking words which are pronouns
d) picking words which are nouns
4) Canonical cover is a
a) subset of F b) super set of F
c) proper subset of F d) None of these
5) ___________ index has an index entry for every search key value in the data file.
a) Sparse b) Dense
c) Both a) and b) d) None

P.T.O.
SLR-TX – 341 -2- *SLRTX341*
6) A transaction is in _________ state after the final statement has been executed.
a) active b) partially committed
c) committed d) none of the above
7) Isolation of the transactions is ensured by
a) Transaction management b) Application programmer
c) Concurrency control d) Recovery management
8) Precedence graphs help to find a __________ schedule.
a) Serializable b) Deadlock free
c) Recoverable d) Cacadeless
9) Which of the following are valid reason for concurrency ?
i) Improved throughput
ii) Resource utilization
iii) Reduced transaction failure
iv) Improved consistency
a) Only iii and ii b) Only iii and i
c) Only ii and i d) Only iv and i
10) ‘dump’ log record is written to
a) Stable storage b) Log record buffer
c) Disk block d) None of these
11) Logical level describes _____________ data are stored in the DB.
a) which b) where c) what d) when
12) To delete a particular column in a relation the command used is _____________
a) update b) drop c) alter d) delete
13) The database schema is written in _____________
a) hll b) dml c) ddl d) dcl
14) Which of the following is a legal expression in SQL ?
a) select null from employee
b) select name from employee
c) select name from employee where salary=null
d) None of the above

_________________

Set R
*SLRTX341* SLR-TX – 341
-3-


Seat
No.

T.E. (Computer Science and Engineering) New CBCS (Part – I)


Examination, 2018
database engineering
Day and Date : Wednesday, 5-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.

SECTION – I
2. Solve any three : (3�4=12)

a) What is data independence ? Explain different forms of it.

b) Explain with example group by and having clause.

c) Explain with example lossless decomposition.

d) Explain different types of keys in relational model with example.

e) Explain with example canonical cover and how to detect extraneous attribute.

3. Solve any one : 8

a) What is functional dependency ? Describe the different types of functional


dependency with an example.

b) Define the following terms with an example.

1) Referential integrity.

2) 2NF.

3) Strong and weak entity sets.

4) Set membership.

Set R
SLR-TX – 341 -4- *SLRTX341*
4. Consider the following schema : 8
Employee (Empid, First_Name, Last_Name, salary, department)
Write SQL statements for following queries.

a) Get employee details from employee table whose first name starts with ‘J’.

b) Get department, total salary with respect to a department from employee table
order by total salary descending.

c) Get First_Name from employee table whose salary is more than 10000 and who
is from sales department.

d) Find the names of the employees whose department and salary is same as
employee “Albert King”.

Section – II

5. Solve any three : (3�4=12)

a) Explain Thomas write rule.

b) Explain secondary index with an example.

c) Explain ACID properties with an example.

d) Write a short note on Bitmap indices. And give example.

e) Explain types of failures.

6. Solve any one : 8

a) Explain deadlock detection and recovery from deadlock.

b) Explain recovery with concurrent transactions.

7. Explain two phase locking protocol along with its variations. 8

_________________

Set R
*SLRTX341* SLR-TX – 341
Seat
No.

Set S

T.E. (Computer Science and Engineering) New CBCS (Part – I)


Examination, 2018
database engineering
Day and Date : Wednesday, 5-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in


Answer Book on Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) A transaction is in _________ state after the final statement has been executed.
a) active b) partially committed
c) committed d) none of the above
2) Isolation of the transactions is ensured by
a) Transaction management b) Application programmer
c) Concurrency control d) Recovery management
3) Precedence graphs help to find a __________ schedule.
a) Serializable b) Deadlock free
c) Recoverable d) Cacadeless
4) Which of the following are valid reason for concurrency ?
i) Improved throughput
ii) Resource utilization
iii) Reduced transaction failure
iv) Improved consistency
a) Only iii and ii b) Only iii and i
c) Only ii and i d) Only iv and i
5) ‘dump’ log record is written to
a) Stable storage b) Log record buffer
c) Disk block d) None of these
P.T.O.
SLR-TX – 341 -2- *SLRTX341*
6) Logical level describes _____________ data are stored in the DB.
a) which b) where c) what d) when
7) To delete a particular column in a relation the command used is _____________
a) update b) drop c) alter d) delete
8) The database schema is written in _____________
a) hll b) dml c) ddl d) dcl
9) Which of the following is a legal expression in SQL ?
a) select null from employee
b) select name from employee
c) select name from employee where salary=null
d) None of the above
10) S1 : Primary key can be composite search key
S2 : Primary key is also a candidate keys.
a) S1 and S2 are true b) S1 is only true
c) S2 is only true d) S1 and S2 are false
11) In tuple relational calculus P1 → P2 is equivalent to _____________
a) ¬P1 ∨ P2 b) P1 ∨ P2
c) P1 ∧ P2 d) P1 ∧ ¬ P2
12) Entities are identified from the word statement of a problem by
a) picking words which are adjectives
b) picking words which are verbs
c) picking words which are pronouns
d) picking words which are nouns
13) Canonical cover is a
a) subset of F b) super set of F
c) proper subset of F d) None of these
14) ___________ index has an index entry for every search key value in the data file.
a) Sparse b) Dense c) Both a) and b) d) None

_________________

Set S
*SLRTX341* SLR-TX – 341
-3-


Seat
No.

T.E. (Computer Science and Engineering) New CBCS (Part – I)


Examination, 2018
database engineering
Day and Date : Wednesday, 5-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.

SECTION – I
2. Solve any three : (3�4=12)

a) What is data independence ? Explain different forms of it.

b) Explain with example group by and having clause.

c) Explain with example lossless decomposition.

d) Explain different types of keys in relational model with example.

e) Explain with example canonical cover and how to detect extraneous attribute.

3. Solve any one : 8

a) What is functional dependency ? Describe the different types of functional


dependency with an example.

b) Define the following terms with an example.

1) Referential integrity.

2) 2NF.

3) Strong and weak entity sets.

4) Set membership.

Set S
SLR-TX – 341 -4- *SLRTX341*
4. Consider the following schema : 8
Employee (Empid, First_Name, Last_Name, salary, department)
Write SQL statements for following queries.

a) Get employee details from employee table whose first name starts with ‘J’.

b) Get department, total salary with respect to a department from employee table
order by total salary descending.

c) Get First_Name from employee table whose salary is more than 10000 and who
is from sales department.

d) Find the names of the employees whose department and salary is same as
employee “Albert King”.

Section – II

5. Solve any three : (3�4=12)

a) Explain Thomas write rule.

b) Explain secondary index with an example.

c) Explain ACID properties with an example.

d) Write a short note on Bitmap indices. And give example.

e) Explain types of failures.

6. Solve any one : 8

a) Explain deadlock detection and recovery from deadlock.

b) Explain recovery with concurrent transactions.

7. Explain two phase locking protocol along with its variations. 8

_________________

Set S
*SLRTX342* SLR-TX – 342

Seat
No. Set P
T.E. (CSE) (Part – I) (New CBCS) Examination, 2018
design and analysis of algorithm
Day and Date : Friday, 7-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in
Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternatives : 14


1) Which of the following standard algorithms is not a Greedy algorithm ?
a) Dijkstra’s shortest path algorithm b) Prim’s algorithm
c) Kruskal algorithm d) None of the above
2) The Floyd-Warshall all-pairs shortest path algorithm for finding the shortest distances
between nodes in a graph is an example of
a) A Dynamic Programming formulation
b) A Greedy Algorithm
c) A recursion based divide and conquer technique
d) None of the above
3) Which of the following sorting algorithms has the lowest worst–case complexity ?
a) Merge sort b) Bubble sort c) Quick sort d) Selection sort
4) Quick sort is run on two inputs shown below to sort in ascending order
i) 1, 2, 3 ,. . . , n ii) N, n – 1, n – 2 . . . 2, 1
Let C1 and C2 be the number of comparisons made for the inputs (i) and (ii) respectively. Then
a) C1 < C2 b) C1 > C2 c) C1 = C2 d) We cant say
5) Consider following graph for Dijkstra’s single source shortest path. In what order do the
nodes gets included into set of vertices for which shortest path distances are finalized ?
1
Q R
1 4 2

P 6 S 1
2
7 3

T 2 U

a) P, Q, R, S, T, U b) P, Q, R, U, S, T c) P, Q, R, U, T, S d) P, Q, T, R, U, S

P.T.O.
SLR-TX – 342 -2- *SLRTX342*
6) Let G be an undirected connected graph with distinct edge weights. Let emax be the edge
with maximum weight and emin be the edge with minimum weight. Which of the following
statement is false ?
a) Every minimum spanning tree of G must contain emin
b) If emax is in a minimum spanning tree, then its removal must disconnect G
c) No minimum spanning tree contains emax
d) G has unique minimum spanning tree
7) Which of the following statements are true ?
1. The problem of determining whether there exists a cycle in an undirected graph is in P.
2. The problem of determining whether there exists a cycle in an undirected graph is in NP.
3. If a problem A is NP-complete, there exists a non deterministic polynomial time
algorithm to solve A
a) 1, 2 and 3 b) 1 and 3 c) 2 only d) 3 only
8) Two alternate packages A and B are available for processing a database having 10k
records. Package A requires 0.0001 n2 time unit and package B requires 10nlog10n units
to process records. What is the smallest value of k for which package B will be preferred
over A.
a) 12 b) 10 c) 6 d) 5
9) The average number of key comparisons done on a successful sequential search in a list
of length of n is
a) Log n b) n–1/2 c) n/2 d) n + 1/2
10) Although it requires more complicated data structures, Prim’s algorithm for a minimum
spanning tree is better than Kruskal’s when the graph has a large number of vertices.
a) True b) False
11) The correct matching for the following pair is
A. All pair shortest path 1. Greedy
B. Quick sort 2. Depth First Search
C. Minimum weight spanning tree 3. Dynamic programming
D. Connected components 4. Divide and conquer
a) A – 2, B – 4, C – 1, D – 3 b) A – 3, B – 4, C – 1, D – 2
c) A – 3, B – 4, C – 2, D – 1 d) A – 4, B – 1, C – 2, D – 3
12) Which one of the following correctly determines the solution of the recurrence relation
with T(1) = 1 ?
T(n) = 2T(n/2) + log n.
a) θ(n) b) θ(n logn) c) θ(n2) d) θ(logn)
13) The minimum number of comparisons required to determine if an integer appears more
than n/2 times in a sorted array of n integer is
a) θ(n) b) θ(logn) c) θ(log2n) d) θ(1)
14) For merging two sorted list of size m and n into sorted list of size m + n, we required
comparisons of
a) 0(m) b) 0 (n)
c) 0(m + n) d) 0(log m + log n)
______________
Set P
*SLRTX342* -3- SLR-TX – 342
Seat
No.

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


design and analysis of algorithm
Day and Date : Friday, 7-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Solve any three : (4×3=12)


1) Compare the two functions n2 and 2n/4 for various values of n. Determine when the second
becomes larger than first.
2) Determine the frequency count for all the statements in the following algorithm
segments
Algorithm Transpose (a, n)
{
For i = 1 to n – 1 do
For j = i + 1 to n do
{
t = a[i, j]; a[i, j] = a[j, i]; a[j, i] = t;
}
}
3) Differentiate between Kruskal and Prims algorithm.
4) Device a binary search algorithm that splits the set not into two sets of (almost) equal
sizes but into two sets, one of which is twice the size of other.

3. Solve any one : (8×1=8)


A) Show how Quicksort sorts the following sequence of keys
5, 5, 8, 3, 4, 3, 2
OR
A) Find an optimal solution to the knapsack instance
n = 7, m = 15, (p1, p2,. .., p7) = (10, 5, 15, 7, 6, 18, 3) and (w1, w2, ..., w7) = (2, 3, 5, 7, 1, 4, 1)

Set P
SLR-TX – 342 -4- *SLRTX342*

4. Solve 8
Symbol Frequency
A 70 million
B 3 million
C 20 million
D 37 million
Find decode tree and code for above symbol table.

SECTION – II

5. Solve any three : (4×3=12)


1) Write difference between Greedy algorithm and Dynamic Programming.
2) Generate the sets Si, 0 < = i > = 4, when (w1, w2, w3, w4) = [10, 15, 6, 9) and
(p1, p2, p3, p4) = (2, 5, 8, 1)
3) Define P, NP, NP-complete and NP-Hard problem.
4) Define tractable and intractable problem.

6. Solve any one : (8×1=8)


A) Let w = (5, 7, 10, 12, 15, 18, 20) and m = 35. Find all possible subset of w that sum to m.
Draw portion of state space tree.
OR
A) Find optimal binary search tree for given data
n = 4 ,identifier(a1, a2, a3, a4)=(do, if, int, while) p(1 : 4) = (3, 3, 1, 1) and
q(0 : 4) = (2, 3, 1, 1, 1).

7. Find a minimum cost path from S to T in multistage graph using forward approach. 8
Stage 2 Stage 3
A 3
D
6 4
1 8
Stage 1
Stage 4
S 2 B 10 2
E T

3
7 10
C

_____________________
Set P
*SLRTX342* SLR-TX – 342

Seat
No. Set Q
T.E. (CSE) (Part – I) (New CBCS) Examination, 2018
design and analysis of algorithm
Day and Date : Friday, 7-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in
Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternatives : 14


1) Two alternate packages A and B are available for processing a database having 10k
records. Package A requires 0.0001 n2 time unit and package B requires 10nlog10n units
to process records. What is the smallest value of k for which package B will be preferred
over A.
a) 12 b) 10 c) 6 d) 5
2) The average number of key comparisons done on a successful sequential search in a list
of length of n is
a) Log n b) n–1/2 c) n/2 d) n + 1/2
3) Although it requires more complicated data structures, Prim’s algorithm for a minimum
spanning tree is better than Kruskal’s when the graph has a large number of vertices.
a) True b) False
4) The correct matching for the following pair is
A. All pair shortest path 1. Greedy
B. Quick sort 2. Depth First Search
C. Minimum weight spanning tree 3. Dynamic programming
D. Connected components 4. Divide and conquer
a) A – 2, B – 4, C – 1, D – 3 b) A – 3, B – 4, C – 1, D – 2
c) A – 3, B – 4, C – 2, D – 1 d) A – 4, B – 1, C – 2, D – 3
5) Which one of the following correctly determines the solution of the recurrence relation
with T(1) = 1 ?
T(n) = 2T(n/2) + log n.
a) θ(n) b) θ(n logn) c) θ(n2) d) θ(logn)
6) The minimum number of comparisons required to determine if an integer appears more
than n/2 times in a sorted array of n integer is
a) θ(n) b) θ(logn) c) θ(log2n) d) θ(1)

P.T.O.
SLR-TX – 342 -2- *SLRTX342*
7) For merging two sorted list of size m and n into sorted list of size m + n, we required
comparisons of
a) 0(m) b) 0 (n)
c) 0(m + n) d) 0(log m + log n)
8) Which of the following standard algorithms is not a Greedy algorithm ?
a) Dijkstra’s shortest path algorithm b) Prim’s algorithm
c) Kruskal algorithm d) None of the above
9) The Floyd-Warshall all-pairs shortest path algorithm for finding the shortest distances
between nodes in a graph is an example of
a) A Dynamic Programming formulation
b) A Greedy Algorithm
c) A recursion based divide and conquer technique
d) None of the above
10) Which of the following sorting algorithms has the lowest worst–case complexity ?
a) Merge sort b) Bubble sort c) Quick sort d) Selection sort
11) Quick sort is run on two inputs shown below to sort in ascending order
i) 1, 2, 3 ,. . . , n ii) N, n – 1, n – 2 . . . 2, 1
Let C1 and C2 be the number of comparisons made for the inputs (i) and (ii) respectively.
Then
a) C1 < C2 b) C1 > C2 c) C1 = C2 d) We cant say
12) Consider following graph for Dijkstra’s single source shortest path. In what order do the
nodes gets included into set of vertices for which shortest path distances are finalized ?
1
Q R
1 4 2

P 6 S 1
2
7 3

T 2 U
a) P, Q, R, S, T, U b) P, Q, R, U, S, T c) P, Q, R, U, T, S d) P, Q, T, R, U, S
13) Let G be an undirected connected graph with distinct edge weights. Let emax be the edge
with maximum weight and emin be the edge with minimum weight. Which of the following
statement is false ?
a) Every minimum spanning tree of G must contain emin
b) If emax is in a minimum spanning tree, then its removal must disconnect G
c) No minimum spanning tree contains emax
d) G has unique minimum spanning tree
14) Which of the following statements are true ?
1. The problem of determining whether there exists a cycle in an undirected graph is in P.
2. The problem of determining whether there exists a cycle in an undirected graph is in NP.
3. If a problem A is NP-complete, there exists a non deterministic polynomial time
algorithm to solve A
a) 1, 2 and 3 b) 1 and 3 c) 2 only d) 3 only Set Q
______________
*SLRTX342* -3- SLR-TX – 342
Seat
No.

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


design and analysis of algorithm
Day and Date : Friday, 7-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Solve any three : (4×3=12)


1) Compare the two functions n2 and 2n/4 for various values of n. Determine when the second
becomes larger than first.
2) Determine the frequency count for all the statements in the following algorithm
segments
Algorithm Transpose (a, n)
{
For i = 1 to n – 1 do
For j = i + 1 to n do
{
t = a[i, j]; a[i, j] = a[j, i]; a[j, i] = t;
}
}
3) Differentiate between Kruskal and Prims algorithm.
4) Device a binary search algorithm that splits the set not into two sets of (almost) equal
sizes but into two sets, one of which is twice the size of other.

3. Solve any one : (8×1=8)


A) Show how Quicksort sorts the following sequence of keys
5, 5, 8, 3, 4, 3, 2
OR
A) Find an optimal solution to the knapsack instance
n = 7, m = 15, (p1, p2,. .., p7) = (10, 5, 15, 7, 6, 18, 3) and (w1, w2, ..., w7) = (2, 3, 5, 7, 1, 4, 1)

Set Q
SLR-TX – 342 -4- *SLRTX342*

4. Solve 8
Symbol Frequency
A 70 million
B 3 million
C 20 million
D 37 million
Find decode tree and code for above symbol table.

SECTION – II

5. Solve any three : (4×3=12)


1) Write difference between Greedy algorithm and Dynamic Programming.
2) Generate the sets Si, 0 < = i > = 4, when (w1, w2, w3, w4) = [10, 15, 6, 9) and
(p1, p2, p3, p4) = (2, 5, 8, 1)
3) Define P, NP, NP-complete and NP-Hard problem.
4) Define tractable and intractable problem.

6. Solve any one : (8×1=8)


A) Let w = (5, 7, 10, 12, 15, 18, 20) and m = 35. Find all possible subset of w that sum to m.
Draw portion of state space tree.
OR
A) Find optimal binary search tree for given data
n = 4 ,identifier(a1, a2, a3, a4)=(do, if, int, while) p(1 : 4) = (3, 3, 1, 1) and
q(0 : 4) = (2, 3, 1, 1, 1).

7. Find a minimum cost path from S to T in multistage graph using forward approach. 8
Stage 2 Stage 3
A 3
D
6 4
1 8
Stage 1
Stage 4
S 2 B 10 2
E T

3
7 10
C

_____________________
Set Q
*SLRTX342* SLR-TX – 342

Seat
No. Set R
T.E. (CSE) (Part – I) (New CBCS) Examination, 2018
design and analysis of algorithm
Day and Date : Friday, 7-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in
Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct alternatives : 14
1) Consider following graph for Dijkstra’s single source shortest path. In what order do the
nodes gets included into set of vertices for which shortest path distances are finalized ?
1
Q R
1 4 2

P 6 S 1
2
7 3

T 2 U
a) P, Q, R, S, T, U b) P, Q, R, U, S, T c) P, Q, R, U, T, S d) P, Q, T, R, U, S
2) Let G be an undirected connected graph with distinct edge weights. Let emax be the edge
with maximum weight and emin be the edge with minimum weight. Which of the following
statement is false ?
a) Every minimum spanning tree of G must contain emin
b) If emax is in a minimum spanning tree, then its removal must disconnect G
c) No minimum spanning tree contains emax
d) G has unique minimum spanning tree
3) Which of the following statements are true ?
1. The problem of determining whether there exists a cycle in an undirected graph is in P.
2. The problem of determining whether there exists a cycle in an undirected graph is in NP.
3. If a problem A is NP-complete, there exists a non deterministic polynomial time
algorithm to solve A
a) 1, 2 and 3 b) 1 and 3 c) 2 only d) 3 only
4) Two alternate packages A and B are available for processing a database having 10k
records. Package A requires 0.0001 n2 time unit and package B requires 10nlog10n units
to process records. What is the smallest value of k for which package B will be preferred
over A.
a) 12 b) 10 c) 6 d) 5
P.T.O.
SLR-TX – 342 -2- *SLRTX342*
5) The average number of key comparisons done on a successful sequential search in a list
of length of n is
a) Log n b) n–1/2 c) n/2 d) n + 1/2
6) Although it requires more complicated data structures, Prim’s algorithm for a minimum
spanning tree is better than Kruskal’s when the graph has a large number of vertices.
a) True b) False
7) The correct matching for the following pair is
A. All pair shortest path 1. Greedy
B. Quick sort 2. Depth First Search
C. Minimum weight spanning tree 3. Dynamic programming
D. Connected components 4. Divide and conquer
a) A – 2, B – 4, C – 1, D – 3 b) A – 3, B – 4, C – 1, D – 2
c) A – 3, B – 4, C – 2, D – 1 d) A – 4, B – 1, C – 2, D – 3
8) Which one of the following correctly determines the solution of the recurrence relation
with T(1) = 1 ?
T(n) = 2T(n/2) + log n.
a) θ(n) b) θ(n logn) c) θ(n2) d) θ(logn)
9) The minimum number of comparisons required to determine if an integer appears more
than n/2 times in a sorted array of n integer is
a) θ(n) b) θ(logn) c) θ(log2n) d) θ(1)
10) For merging two sorted list of size m and n into sorted list of size m + n, we required
comparisons of
a) 0(m) b) 0 (n)
c) 0(m + n) d) 0(log m + log n)
11) Which of the following standard algorithms is not a Greedy algorithm ?
a) Dijkstra’s shortest path algorithm b) Prim’s algorithm
c) Kruskal algorithm d) None of the above
12) The Floyd-Warshall all-pairs shortest path algorithm for finding the shortest distances
between nodes in a graph is an example of
a) A Dynamic Programming formulation
b) A Greedy Algorithm
c) A recursion based divide and conquer technique
d) None of the above
13) Which of the following sorting algorithms has the lowest worst–case complexity ?
a) Merge sort b) Bubble sort c) Quick sort d) Selection sort
14) Quick sort is run on two inputs shown below to sort in ascending order
i) 1, 2, 3 ,. . . , n ii) N, n – 1, n – 2 . . . 2, 1
Let C1 and C2 be the number of comparisons made for the inputs (i) and (ii) respectively.
Then
a) C1 < C2 b) C1 > C2 c) C1 = C2 d) We cant say
______________

Set R
*SLRTX342* -3- SLR-TX – 342
Seat
No.

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


design and analysis of algorithm
Day and Date : Friday, 7-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Solve any three : (4×3=12)


1) Compare the two functions n2 and 2n/4 for various values of n. Determine when the second
becomes larger than first.
2) Determine the frequency count for all the statements in the following algorithm
segments
Algorithm Transpose (a, n)
{
For i = 1 to n – 1 do
For j = i + 1 to n do
{
t = a[i, j]; a[i, j] = a[j, i]; a[j, i] = t;
}
}
3) Differentiate between Kruskal and Prims algorithm.
4) Device a binary search algorithm that splits the set not into two sets of (almost) equal
sizes but into two sets, one of which is twice the size of other.

3. Solve any one : (8×1=8)


A) Show how Quicksort sorts the following sequence of keys
5, 5, 8, 3, 4, 3, 2
OR
A) Find an optimal solution to the knapsack instance
n = 7, m = 15, (p1, p2,. .., p7) = (10, 5, 15, 7, 6, 18, 3) and (w1, w2, ..., w7) = (2, 3, 5, 7, 1, 4, 1)

Set R
SLR-TX – 342 -4- *SLRTX342*

4. Solve 8
Symbol Frequency
A 70 million
B 3 million
C 20 million
D 37 million
Find decode tree and code for above symbol table.

SECTION – II

5. Solve any three : (4×3=12)


1) Write difference between Greedy algorithm and Dynamic Programming.
2) Generate the sets Si, 0 < = i > = 4, when (w1, w2, w3, w4) = [10, 15, 6, 9) and
(p1, p2, p3, p4) = (2, 5, 8, 1)
3) Define P, NP, NP-complete and NP-Hard problem.
4) Define tractable and intractable problem.

6. Solve any one : (8×1=8)


A) Let w = (5, 7, 10, 12, 15, 18, 20) and m = 35. Find all possible subset of w that sum to m.
Draw portion of state space tree.
OR
A) Find optimal binary search tree for given data
n = 4 ,identifier(a1, a2, a3, a4)=(do, if, int, while) p(1 : 4) = (3, 3, 1, 1) and
q(0 : 4) = (2, 3, 1, 1, 1).

7. Find a minimum cost path from S to T in multistage graph using forward approach. 8
Stage 2 Stage 3
A 3
D
6 4
1 8
Stage 1
Stage 4
S 2 B 10 2
E T

3
7 10
C

_____________________
Set R
*SLRTX342* SLR-TX – 342

Seat
No. Set S
T.E. (CSE) (Part – I) (New CBCS) Examination, 2018
design and analysis of algorithm
Day and Date : Friday, 7-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in
Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternatives : 14


1) Although it requires more complicated data structures, Prim’s algorithm for a minimum
spanning tree is better than Kruskal’s when the graph has a large number of vertices.
a) True b) False
2) The correct matching for the following pair is
A. All pair shortest path 1. Greedy
B. Quick sort 2. Depth First Search
C. Minimum weight spanning tree 3. Dynamic programming
D. Connected components 4. Divide and conquer
a) A – 2, B – 4, C – 1, D – 3 b) A – 3, B – 4, C – 1, D – 2
c) A – 3, B – 4, C – 2, D – 1 d) A – 4, B – 1, C – 2, D – 3
3) Which one of the following correctly determines the solution of the recurrence relation
with T(1) = 1 ?
T(n) = 2T(n/2) + log n.
a) θ(n) b) θ(n logn) c) θ(n2) d) θ(logn)
4) The minimum number of comparisons required to determine if an integer appears more
than n/2 times in a sorted array of n integer is
a) θ(n) b) θ(logn) c) θ(log2n) d) θ(1)
5) For merging two sorted list of size m and n into sorted list of size m + n, we required
comparisons of
a) 0(m) b) 0 (n)
c) 0(m + n) d) 0(log m + log n)
6) Which of the following standard algorithms is not a Greedy algorithm ?
a) Dijkstra’s shortest path algorithm b) Prim’s algorithm
c) Kruskal algorithm d) None of the above

P.T.O.
SLR-TX – 342 -2- *SLRTX342*
7) The Floyd-Warshall all-pairs shortest path algorithm for finding the shortest distances
between nodes in a graph is an example of
a) A Dynamic Programming formulation
b) A Greedy Algorithm
c) A recursion based divide and conquer technique
d) None of the above
8) Which of the following sorting algorithms has the lowest worst–case complexity ?
a) Merge sort b) Bubble sort c) Quick sort d) Selection sort
9) Quick sort is run on two inputs shown below to sort in ascending order
i) 1, 2, 3 ,. . . , n ii) N, n – 1, n – 2 . . . 2, 1
Let C1 and C2 be the number of comparisons made for the inputs (i) and (ii) respectively.
Then
a) C1 < C2 b) C1 > C2 c) C1 = C2 d) We cant say
10) Consider following graph for Dijkstra’s single source shortest path. In what order do the
nodes gets included into set of vertices for which shortest path distances are finalized ?
1
Q R
1 4 2

P 6 S 1
2
7 3

T 2 U
a) P, Q, R, S, T, U b) P, Q, R, U, S, T c) P, Q, R, U, T, S d) P, Q, T, R, U, S
11) Let G be an undirected connected graph with distinct edge weights. Let emax be the edge
with maximum weight and emin be the edge with minimum weight. Which of the following
statement is false ?
a) Every minimum spanning tree of G must contain emin
b) If emax is in a minimum spanning tree, then its removal must disconnect G
c) No minimum spanning tree contains emax
d) G has unique minimum spanning tree
12) Which of the following statements are true ?
1. The problem of determining whether there exists a cycle in an undirected graph is in P.
2. The problem of determining whether there exists a cycle in an undirected graph is in NP.
3. If a problem A is NP-complete, there exists a non deterministic polynomial time
algorithm to solve A
a) 1, 2 and 3 b) 1 and 3 c) 2 only d) 3 only
13) Two alternate packages A and B are available for processing a database having 10k
records. Package A requires 0.0001 n2 time unit and package B requires 10nlog10n units
to process records. What is the smallest value of k for which package B will be preferred
over A.
a) 12 b) 10 c) 6 d) 5
14) The average number of key comparisons done on a successful sequential search in a list
of length of n is
a) Log n b) n–1/2 c) n/2 d) n + 1/2 Set S
__________________
*SLRTX342* -3- SLR-TX – 342
Seat
No.

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


design and analysis of algorithm
Day and Date : Friday, 7-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Solve any three : (4×3=12)


1) Compare the two functions n2 and 2n/4 for various values of n. Determine when the second
becomes larger than first.
2) Determine the frequency count for all the statements in the following algorithm
segments
Algorithm Transpose (a, n)
{
For i = 1 to n – 1 do
For j = i + 1 to n do
{
t = a[i, j]; a[i, j] = a[j, i]; a[j, i] = t;
}
}
3) Differentiate between Kruskal and Prims algorithm.
4) Device a binary search algorithm that splits the set not into two sets of (almost) equal
sizes but into two sets, one of which is twice the size of other.

3. Solve any one : (8×1=8)


A) Show how Quicksort sorts the following sequence of keys
5, 5, 8, 3, 4, 3, 2
OR
A) Find an optimal solution to the knapsack instance
n = 7, m = 15, (p1, p2,. .., p7) = (10, 5, 15, 7, 6, 18, 3) and (w1, w2, ..., w7) = (2, 3, 5, 7, 1, 4, 1)

Set S
SLR-TX – 342 -4- *SLRTX342*

4. Solve 8
Symbol Frequency
A 70 million
B 3 million
C 20 million
D 37 million
Find decode tree and code for above symbol table.

SECTION – II

5. Solve any three : (4×3=12)


1) Write difference between Greedy algorithm and Dynamic Programming.
2) Generate the sets Si, 0 < = i > = 4, when (w1, w2, w3, w4) = [10, 15, 6, 9) and
(p1, p2, p3, p4) = (2, 5, 8, 1)
3) Define P, NP, NP-complete and NP-Hard problem.
4) Define tractable and intractable problem.

6. Solve any one : (8×1=8)


A) Let w = (5, 7, 10, 12, 15, 18, 20) and m = 35. Find all possible subset of w that sum to m.
Draw portion of state space tree.
OR
A) Find optimal binary search tree for given data
n = 4 ,identifier(a1, a2, a3, a4)=(do, if, int, while) p(1 : 4) = (3, 3, 1, 1) and
q(0 : 4) = (2, 3, 1, 1, 1).

7. Find a minimum cost path from S to T in multistage graph using forward approach. 8
Stage 2 Stage 3
A 3
D
6 4
1 8
Stage 1
Stage 4
S 2 B 10 2
E T

3
7 10
C

_____________________
Set S
*SLRTX343* SLR-TX – 343

Seat
No. Set P

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


Computer Organization
Day and Date : Monday, 10-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Answer all the questions from Section – I and Section – II.
4) Figures to the right indicate full marks.
5) Assume data whenever necessary.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) In process DMA stands for
A) Direct memory access
B) Division memory access
C) Direct mapping access
D) All of the above
2) The periods of time when the unit is idle is called as
A) Stalls B) Bubbles
C) Hazards D) Both A) and B)
3) Smallest addressable memory item binary __________ coded decimal.
A) Bit B) Byte
C) Half word D) Word
4) The average time required to reach a storage location in memory and obtain
its contents is called the
A) seek time B) turnaround time
C) access time D) transfer time
P.T.O.
SLR-TX – 343 -2- *SLRTX343*

5) The idea of cache memory is based


A) on the property of locality of reference
B) on the heuristic 90-10 rule
C) on the fact that references generally tend to cluster
D) all of the above
6) Which of the following is lowest in memory hierarchy ?
A) Cache memory B) Secondary memory
C) Registers D) RAM
7) Cache memory acts between
A) CPU and RAM B) RAM and ROM
C) CPU and Hard Disk D) None of these
8) A Stack-organised Computer uses instruction of
A) Indirect addressing B) Two-addressing
C) Zero addressing D) Index addressing
9) The multiplicand register and multiplier register of a hardware circuit
implementing booth’s algorithm have (11101) and (1100). The result shall
be
A) (812) 10 B) (–12) 10 C) (12) 10 D) (–812) 10
10) The circuit converting binary data in to decimal is
A) Encoder B) Multiplexer
C) Decoder D) Code converter
11) MRI indicates
A) Memory Reference Information
B) Memory Reference Instruction
C) Memory Registers Instruction
D) Memory Register information
12) Which of the following interrupt is non maskable ?
A) INTR B) RST 7.5 C) RST 6.5 D) TRAP
13) Which of the following are not a machine instructions ?
A) MOV B) ORG C) END D) B) and C)
14) When necessary, the results are transferred from the CPU to main memory
by
A) I/O devices B) CPU C) Shift registers D) none of these

______________

Set P
*SLRTX343* -3- SLR-TX – 343
Seat
No.

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


Computer Organization
Day and Date : Monday, 10-12-2018 Max. Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Answer all the questions from Section – I and Section – II.
2) Figures to the right indicate full marks.
3) Assume data whenever necessary.
SECTION – I
2. Attempt any three : (3×4=12)
1) List out the different functional units of computer and explain any 2.
2) Differentiate between RlSC and CISC.
3) Divide 29/3 with non restoring algorithm.
4) Explain full adder circuit dig by using two half adder.
5) Explain page segmentation.
3. Attempt any two : (2×8=16)
1) Describe look aside and look -through organization of cache.
2) List out different types of instruction with example.
3) Explain in brief Electronics generation of computer.
SECTION – II
4. Attempt any three : (3×4=12)
1) Draw and explain the detailed hardwired control organization.
2) Differentiate between Memory mapped I/O and Isolated I/O.
3) Differentiate between linear and non linear pipelining.
4) list out different IO techniques and explain any one.
5) Write a short note on DMA.
5. Attempt any two : (2×8=16)
1) List out different types of hazard in pipelining and explain data hazard and
give the advantages of Pipelining.
2) Explain Multiplier control unit.
3) Draw and explain loosely coupled and tightly coupled multiprocessor.
____________
Set P
Set P
*SLRTX343* SLR-TX – 343

Seat
No. Set Q

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


Computer Organization
Day and Date : Monday, 10-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Answer all the questions from Section – I and Section – II.
4) Figures to the right indicate full marks.
5) Assume data whenever necessary.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) A Stack-organised Computer uses instruction of
A) Indirect addressing B) Two-addressing
C) Zero addressing D) Index addressing
2) The multiplicand register and multiplier register of a hardware circuit
implementing booth’s algorithm have (11101) and (1100). The result shall
be
A) (812) 10 B) (–12) 10 C) (12) 10 D) (–812) 10
3) The circuit converting binary data in to decimal is
A) Encoder B) Multiplexer
C) Decoder D) Code converter
4) MRI indicates
A) Memory Reference Information
B) Memory Reference Instruction
C) Memory Registers Instruction
D) Memory Register information
P.T.O.
SLR-TX – 343 -2- *SLRTX343*

5) Which of the following interrupt is non maskable ?


A) INTR B) RST 7.5 C) RST 6.5 D) TRAP
6) Which of the following are not a machine instructions ?
A) MOV B) ORG C) END D) B) and C)
7) When necessary, the results are transferred from the CPU to main memory
by
A) I/O devices B) CPU C) Shift registers D) none of these
8) In process DMA stands for
A) Direct memory access
B) Division memory access
C) Direct mapping access
D) All of the above
9) The periods of time when the unit is idle is called as
A) Stalls B) Bubbles
C) Hazards D) Both A) and B)
10) Smallest addressable memory item binary __________ coded decimal.
A) Bit B) Byte
C) Half word D) Word
11) The average time required to reach a storage location in memory and obtain
its contents is called the
A) seek time B) turnaround time
C) access time D) transfer time
12) The idea of cache memory is based
A) on the property of locality of reference
B) on the heuristic 90-10 rule
C) on the fact that references generally tend to cluster
D) all of the above
13) Which of the following is lowest in memory hierarchy ?
A) Cache memory B) Secondary memory
C) Registers D) RAM
14) Cache memory acts between
A) CPU and RAM B) RAM and ROM
C) CPU and Hard Disk D) None of these

______________

Set Q
*SLRTX343* -3- SLR-TX – 343
Seat
No.

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


Computer Organization
Day and Date : Monday, 10-12-2018 Max. Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Answer all the questions from Section – I and Section – II.
2) Figures to the right indicate full marks.
3) Assume data whenever necessary.
SECTION – I
2. Attempt any three : (3×4=12)
1) List out the different functional units of computer and explain any 2.
2) Differentiate between RlSC and CISC.
3) Divide 29/3 with non restoring algorithm.
4) Explain full adder circuit dig by using two half adder.
5) Explain page segmentation.
3. Attempt any two : (2×8=16)
1) Describe look aside and look -through organization of cache.
2) List out different types of instruction with example.
3) Explain in brief Electronics generation of computer.
SECTION – II
4. Attempt any three : (3×4=12)
1) Draw and explain the detailed hardwired control organization.
2) Differentiate between Memory mapped I/O and Isolated I/O.
3) Differentiate between linear and non linear pipelining.
4) list out different IO techniques and explain any one.
5) Write a short note on DMA.
5. Attempt any two : (2×8=16)
1) List out different types of hazard in pipelining and explain data hazard and
give the advantages of Pipelining.
2) Explain Multiplier control unit.
3) Draw and explain loosely coupled and tightly coupled multiprocessor.
____________
Set Q
Set Q
*SLRTX343* SLR-TX – 343

Seat
No. Set R

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


Computer Organization
Day and Date : Monday, 10-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Answer all the questions from Section – I and Section – II.
4) Figures to the right indicate full marks.
5) Assume data whenever necessary.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) The idea of cache memory is based
A) on the property of locality of reference
B) on the heuristic 90-10 rule
C) on the fact that references generally tend to cluster
D) all of the above
2) Which of the following is lowest in memory hierarchy ?
A) Cache memory B) Secondary memory
C) Registers D) RAM
3) Cache memory acts between
A) CPU and RAM B) RAM and ROM
C) CPU and Hard Disk D) None of these
4) A Stack-organised Computer uses instruction of
A) Indirect addressing B) Two-addressing
C) Zero addressing D) Index addressing
P.T.O.
SLR-TX – 343 -2- *SLRTX343*

5) The multiplicand register and multiplier register of a hardware circuit


implementing booth’s algorithm have (11101) and (1100). The result shall
be
A) (812) 10 B) (–12) 10 C) (12) 10 D) (–812) 10
6) The circuit converting binary data in to decimal is
A) Encoder B) Multiplexer
C) Decoder D) Code converter
7) MRI indicates
A) Memory Reference Information
B) Memory Reference Instruction
C) Memory Registers Instruction
D) Memory Register information
8) Which of the following interrupt is non maskable ?
A) INTR B) RST 7.5 C) RST 6.5 D) TRAP
9) Which of the following are not a machine instructions ?
A) MOV B) ORG C) END D) B) and C)
10) When necessary, the results are transferred from the CPU to main memory
by
A) I/O devices B) CPU C) Shift registers D) none of these
11) In process DMA stands for
A) Direct memory access
B) Division memory access
C) Direct mapping access
D) All of the above
12) The periods of time when the unit is idle is called as
A) Stalls B) Bubbles
C) Hazards D) Both A) and B)
13) Smallest addressable memory item binary __________ coded decimal.
A) Bit B) Byte
C) Half word D) Word
14) The average time required to reach a storage location in memory and obtain
its contents is called the
A) seek time B) turnaround time
C) access time D) transfer time

______________

Set R
*SLRTX343* -3- SLR-TX – 343
Seat
No.

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


Computer Organization
Day and Date : Monday, 10-12-2018 Max. Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Answer all the questions from Section – I and Section – II.
2) Figures to the right indicate full marks.
3) Assume data whenever necessary.
SECTION – I
2. Attempt any three : (3×4=12)
1) List out the different functional units of computer and explain any 2.
2) Differentiate between RlSC and CISC.
3) Divide 29/3 with non restoring algorithm.
4) Explain full adder circuit dig by using two half adder.
5) Explain page segmentation.
3. Attempt any two : (2×8=16)
1) Describe look aside and look -through organization of cache.
2) List out different types of instruction with example.
3) Explain in brief Electronics generation of computer.
SECTION – II
4. Attempt any three : (3×4=12)
1) Draw and explain the detailed hardwired control organization.
2) Differentiate between Memory mapped I/O and Isolated I/O.
3) Differentiate between linear and non linear pipelining.
4) list out different IO techniques and explain any one.
5) Write a short note on DMA.
5. Attempt any two : (2×8=16)
1) List out different types of hazard in pipelining and explain data hazard and
give the advantages of Pipelining.
2) Explain Multiplier control unit.
3) Draw and explain loosely coupled and tightly coupled multiprocessor.
____________
Set R
Set R
*SLRTX343* SLR-TX – 343

Seat
No. Set S

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


Computer Organization
Day and Date : Monday, 10-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
3) Answer all the questions from Section – I and Section – II.
4) Figures to the right indicate full marks.
5) Assume data whenever necessary.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) The circuit converting binary data in to decimal is
A) Encoder B) Multiplexer
C) Decoder D) Code converter
2) MRI indicates
A) Memory Reference Information
B) Memory Reference Instruction
C) Memory Registers Instruction
D) Memory Register information
3) Which of the following interrupt is non maskable ?
A) INTR B) RST 7.5 C) RST 6.5 D) TRAP
4) Which of the following are not a machine instructions ?
A) MOV B) ORG C) END D) B) and C)
5) When necessary, the results are transferred from the CPU to main memory
by
A) I/O devices B) CPU C) Shift registers D) none of these
P.T.O.
SLR-TX – 343 -2- *SLRTX343*

6) In process DMA stands for


A) Direct memory access
B) Division memory access
C) Direct mapping access
D) All of the above
7) The periods of time when the unit is idle is called as
A) Stalls B) Bubbles
C) Hazards D) Both A) and B)
8) Smallest addressable memory item binary __________ coded decimal.
A) Bit B) Byte
C) Half word D) Word
9) The average time required to reach a storage location in memory and obtain
its contents is called the
A) seek time B) turnaround time
C) access time D) transfer time
10) The idea of cache memory is based
A) on the property of locality of reference
B) on the heuristic 90-10 rule
C) on the fact that references generally tend to cluster
D) all of the above
11) Which of the following is lowest in memory hierarchy ?
A) Cache memory B) Secondary memory
C) Registers D) RAM
12) Cache memory acts between
A) CPU and RAM B) RAM and ROM
C) CPU and Hard Disk D) None of these
13) A Stack-organised Computer uses instruction of
A) Indirect addressing B) Two-addressing
C) Zero addressing D) Index addressing
14) The multiplicand register and multiplier register of a hardware circuit
implementing booth’s algorithm have (11101) and (1100). The result shall
be
A) (812) 10 B) (–12) 10 C) (12) 10 D) (–812) 10

______________

Set S
*SLRTX343* -3- SLR-TX – 343
Seat
No.

T.E. (CSE) (Part – I) (New CBCS) Examination, 2018


Computer Organization
Day and Date : Monday, 10-12-2018 Max. Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Answer all the questions from Section – I and Section – II.
2) Figures to the right indicate full marks.
3) Assume data whenever necessary.
SECTION – I
2. Attempt any three : (3×4=12)
1) List out the different functional units of computer and explain any 2.
2) Differentiate between RlSC and CISC.
3) Divide 29/3 with non restoring algorithm.
4) Explain full adder circuit dig by using two half adder.
5) Explain page segmentation.
3. Attempt any two : (2×8=16)
1) Describe look aside and look -through organization of cache.
2) List out different types of instruction with example.
3) Explain in brief Electronics generation of computer.
SECTION – II
4. Attempt any three : (3×4=12)
1) Draw and explain the detailed hardwired control organization.
2) Differentiate between Memory mapped I/O and Isolated I/O.
3) Differentiate between linear and non linear pipelining.
4) list out different IO techniques and explain any one.
5) Write a short note on DMA.
5. Attempt any two : (2×8=16)
1) List out different types of hazard in pipelining and explain data hazard and
give the advantages of Pipelining.
2) Explain Multiplier control unit.
3) Draw and explain loosely coupled and tightly coupled multiprocessor.
____________
Set S
Set S
*SLRTX349* SLR-TX – 349
Seat Set P
No.
T.E. (CSE) (Part – I) (Old – CGPA) Examination, 2018
OPERATING SYSTEM CONCEPTS

Day and Date : Friday, 30-11-2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
3) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) The degree of multi-programming is
a) The number of processes executed per unit time
b) The number of processes in the ready queue
c) The number of processes in the I/O queue
d) The number of processes in memory
2) The primary distinction between the short term scheduler and the long
term scheduler is
a) The length of their queues b) The type of processes they schedule
c) The frequency of their execution d) None of these
3) A monitor is a module that encapsulates
a) Shared data structures
b) Procedures that operate on shared data structure
c) Synchronization between concurrent procedure invocation
d) All of the mentioned
4) The child process can
a) be a duplicate of the parent process
b) have another program loaded into it
c) Both a) and b)
d) Only a)
P.T.O.
SLR-TX – 349 -2- *SLRTX349*

5) Spinlocks are
a) CPU cycles wasting locks over critical sections of programs
b) Locks that avoid time wastage in context switches
c) Locks that work better on multiprocessor systems
d) All of these
6) Preemptive Shortest Job First scheduling is sometimes called
a) Fast SJF scheduling
b) EDF (Earliest Deadline First)
c) HRRN (Highest Response Ratio Next)
d) SRTN (Shortest Remaining Time Next)
7) A solution to the problem of indefinite blockage of low-priority processes
is
a) Starvation b) Wait queue c) Ready queue d) None of these
8) A problem encountered in multitasking when a process is perpetually
denied necessary resources is called
a) Deadlock b) Starvation c) Inversion d) Aging
9) Deadlock prevention is a set of methods
a) To ensure that at least one of the necessary conditions cannot hold
b) To ensure that all of the necessary conditions do not hold
c) To decide if the requested resources for a process have to be given or
not
d) To recover from a deadlock
10) What is compaction ?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
11) Operating System maintains the page table for
a) Each process b) Each thread
c) Each instruction d) Each address
12) The pager concerns with the
a) Individual page of a process b) Entire process
c) Entire thread d) First page of a process
13) When a program tries to access a page that is mapped in address space
but not loaded in physical memory, then ?
a) Segmentation fault occurs b) Fatal error occurs
c) Page fault occurs d) No error occurs
14) The _____________ present a uniform device-access interface to the I/O
subsystem, much as system calls provide a standard interface between
the application and the operating system.
a) Devices b) Buses
c) Device drivers d) I/O systems
_____________ Set P

*SLRTX349* -3- SLR-TX – 349
Seat
No.
T.E. (CSE) (Part – I) (Old – CGPA) Examination, 2018
OPERATING SYSTEM CONCEPTS

Day and Date : Friday, 30-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three : (3�4=12)


1) Explain Reader Writer problem.
2) Write a note on multiprocessor systems.
3) What is operating system ? Explain its functionalities.
4) Describe multi-level feedback queue with diagram.
5) Describe PCB with diagram.

3. Solve any two : (2�8=16)


1) Consider the following set of processes with arrival time and burst time in
milliseconds as given below :
P. No. AT BT
1 5 5
2 4 6
3 3 7
4 1 9
5 2 2
6 6 3
i) Draw Gantt Chart illustrating the execution of processes using Round
Robin scheduling algorithm with time quantum of 3 ms.
ii) Calculate average waiting time for the above scheduling algorithm.
iii) Calculate average turn around for the above time scheduling
algorithm.
2) What is semaphore ? Explain Dinning Philosopher problem using
semaphore.
3) What is inter-process communication ? Explain the two models of inter-
process communication.
Set P
SLR-TX – 349 -4- *SLRTX349*
SECTION – II

4. Solve any three : 12


a) Explain different ways for deadlock recovery.
b) Explain resource allocation graph and resource allocation graph algorithm.
c) Explain Demand Paging.
d) Write note on :
1) Logical address and Physical address.
2) Best fit, Worst fit, First fit and Compaction.

5. Attempt any two : 16


a) Explain Paging in detail.
Suppose that we have free segments with sizes : 6, 17, 25, 14 and 19.
Place a program with size 13 kB in the free segment using first-fit, best-fit
and worst-fit ?
b) Prove Belady’s Anomaly with an example. (Show with graph)
c) What are the responsibilities of DMA Controller and the advantages of
DMA ? Explain the steps process to perform DMA transfer.

_____________

Set P
*SLRTX349* SLR-TX – 349
Seat Set Q
No.
T.E. (CSE) (Part – I) (Old – CGPA) Examination, 2018
OPERATING SYSTEM CONCEPTS
Day and Date : Friday, 30-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
3) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1�14=14)
1) A problem encountered in multitasking when a process is perpetually
denied necessary resources is called
a) Deadlock b) Starvation c) Inversion d) Aging
2) Deadlock prevention is a set of methods
a) To ensure that at least one of the necessary conditions cannot hold
b) To ensure that all of the necessary conditions do not hold
c) To decide if the requested resources for a process have to be given or
not
d) To recover from a deadlock
3) What is compaction ?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
4) Operating System maintains the page table for
a) Each process b) Each thread
c) Each instruction d) Each address
5) The pager concerns with the
a) Individual page of a process b) Entire process
c) Entire thread d) First page of a process
6) When a program tries to access a page that is mapped in address space
but not loaded in physical memory, then ?
a) Segmentation fault occurs b) Fatal error occurs
c) Page fault occurs d) No error occurs
P.T.O.
SLR-TX – 349 -2- *SLRTX349*
7) The _____________ present a uniform device-access interface to the I/O
subsystem, much as system calls provide a standard interface between
the application and the operating system.
a) Devices b) Buses
c) Device drivers d) I/O systems
8) The degree of multi-programming is
a) The number of processes executed per unit time
b) The number of processes in the ready queue
c) The number of processes in the I/O queue
d) The number of processes in memory
9) The primary distinction between the short term scheduler and the long
term scheduler is
a) The length of their queues b) The type of processes they schedule
c) The frequency of their execution d) None of these
10) A monitor is a module that encapsulates
a) Shared data structures
b) Procedures that operate on shared data structure
c) Synchronization between concurrent procedure invocation
d) All of the mentioned
11) The child process can
a) be a duplicate of the parent process
b) have another program loaded into it
c) Both a) and b)
d) Only a)
12) Spinlocks are
a) CPU cycles wasting locks over critical sections of programs
b) Locks that avoid time wastage in context switches
c) Locks that work better on multiprocessor systems
d) All of these
13) Preemptive Shortest Job First scheduling is sometimes called
a) Fast SJF scheduling
b) EDF (Earliest Deadline First)
c) HRRN (Highest Response Ratio Next)
d) SRTN (Shortest Remaining Time Next)
14) A solution to the problem of indefinite blockage of low-priority processes
is
a) Starvation b) Wait queue c) Ready queue d) None of these

_____________

Set Q
*SLRTX349* -3- SLR-TX – 349
Seat
No.
T.E. (CSE) (Part – I) (Old – CGPA) Examination, 2018
OPERATING SYSTEM CONCEPTS

Day and Date : Friday, 30-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three : (3�4=12)


1) Explain Reader Writer problem.
2) Write a note on multiprocessor systems.
3) What is operating system ? Explain its functionalities.
4) Describe multi-level feedback queue with diagram.
5) Describe PCB with diagram.

3. Solve any two : (2�8=16)


1) Consider the following set of processes with arrival time and burst time in
milliseconds as given below :
P. No. AT BT
1 5 5
2 4 6
3 3 7
4 1 9
5 2 2
6 6 3
i) Draw Gantt Chart illustrating the execution of processes using Round
Robin scheduling algorithm with time quantum of 3 ms.
ii) Calculate average waiting time for the above scheduling algorithm.
iii) Calculate average turn around for the above time scheduling
algorithm.
2) What is semaphore ? Explain Dinning Philosopher problem using
semaphore.
3) What is inter-process communication ? Explain the two models of inter-
process communication.
Set Q
SLR-TX – 349 -4- *SLRTX349*
SECTION – II

4. Solve any three : 12


a) Explain different ways for deadlock recovery.
b) Explain resource allocation graph and resource allocation graph algorithm.
c) Explain Demand Paging.
d) Write note on :
1) Logical address and Physical address.
2) Best fit, Worst fit, First fit and Compaction.

5. Attempt any two : 16


a) Explain Paging in detail.
Suppose that we have free segments with sizes : 6, 17, 25, 14 and 19.
Place a program with size 13 kB in the free segment using first-fit, best-fit
and worst-fit ?
b) Prove Belady’s Anomaly with an example. (Show with graph)
c) What are the responsibilities of DMA Controller and the advantages of
DMA ? Explain the steps process to perform DMA transfer.

_____________

Set Q
*SLRTX349* SLR-TX – 349
Seat Set R
No.
T.E. (CSE) (Part – I) (Old – CGPA) Examination, 2018
OPERATING SYSTEM CONCEPTS

Day and Date : Friday, 30-11-2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
3) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) Spinlocks are
a) CPU cycles wasting locks over critical sections of programs
b) Locks that avoid time wastage in context switches
c) Locks that work better on multiprocessor systems
d) All of these
2) Preemptive Shortest Job First scheduling is sometimes called
a) Fast SJF scheduling
b) EDF (Earliest Deadline First)
c) HRRN (Highest Response Ratio Next)
d) SRTN (Shortest Remaining Time Next)
3) A solution to the problem of indefinite blockage of low-priority processes
is
a) Starvation b) Wait queue c) Ready queue d) None of these
4) A problem encountered in multitasking when a process is perpetually
denied necessary resources is called
a) Deadlock b) Starvation c) Inversion d) Aging
5) Deadlock prevention is a set of methods
a) To ensure that at least one of the necessary conditions cannot hold
b) To ensure that all of the necessary conditions do not hold
c) To decide if the requested resources for a process have to be given or
not
d) To recover from a deadlock
P.T.O.
SLR-TX – 349 -2- *SLRTX349*
6) What is compaction ?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
7) Operating System maintains the page table for
a) Each process b) Each thread
c) Each instruction d) Each address
8) The pager concerns with the
a) Individual page of a process b) Entire process
c) Entire thread d) First page of a process
9) When a program tries to access a page that is mapped in address space
but not loaded in physical memory, then ?
a) Segmentation fault occurs b) Fatal error occurs
c) Page fault occurs d) No error occurs
10) The _____________ present a uniform device-access interface to the I/O
subsystem, much as system calls provide a standard interface between
the application and the operating system.
a) Devices b) Buses
c) Device drivers d) I/O systems
11) The degree of multi-programming is
a) The number of processes executed per unit time
b) The number of processes in the ready queue
c) The number of processes in the I/O queue
d) The number of processes in memory
12) The primary distinction between the short term scheduler and the long
term scheduler is
a) The length of their queues b) The type of processes they schedule
c) The frequency of their execution d) None of these
13) A monitor is a module that encapsulates
a) Shared data structures
b) Procedures that operate on shared data structure
c) Synchronization between concurrent procedure invocation
d) All of the mentioned
14) The child process can
a) be a duplicate of the parent process
b) have another program loaded into it
c) Both a) and b)
d) Only a)
_____________

Set R
*SLRTX349* -3- SLR-TX – 349
Seat
No.
T.E. (CSE) (Part – I) (Old – CGPA) Examination, 2018
OPERATING SYSTEM CONCEPTS

Day and Date : Friday, 30-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three : (3�4=12)


1) Explain Reader Writer problem.
2) Write a note on multiprocessor systems.
3) What is operating system ? Explain its functionalities.
4) Describe multi-level feedback queue with diagram.
5) Describe PCB with diagram.

3. Solve any two : (2�8=16)


1) Consider the following set of processes with arrival time and burst time in
milliseconds as given below :
P. No. AT BT
1 5 5
2 4 6
3 3 7
4 1 9
5 2 2
6 6 3
i) Draw Gantt Chart illustrating the execution of processes using Round
Robin scheduling algorithm with time quantum of 3 ms.
ii) Calculate average waiting time for the above scheduling algorithm.
iii) Calculate average turn around for the above time scheduling
algorithm.
2) What is semaphore ? Explain Dinning Philosopher problem using
semaphore.
3) What is inter-process communication ? Explain the two models of inter-
process communication.
Set R
SLR-TX – 349 -4- *SLRTX349*
SECTION – II

4. Solve any three : 12


a) Explain different ways for deadlock recovery.
b) Explain resource allocation graph and resource allocation graph algorithm.
c) Explain Demand Paging.
d) Write note on :
1) Logical address and Physical address.
2) Best fit, Worst fit, First fit and Compaction.

5. Attempt any two : 16


a) Explain Paging in detail.
Suppose that we have free segments with sizes : 6, 17, 25, 14 and 19.
Place a program with size 13 kB in the free segment using first-fit, best-fit
and worst-fit ?
b) Prove Belady’s Anomaly with an example. (Show with graph)
c) What are the responsibilities of DMA Controller and the advantages of
DMA ? Explain the steps process to perform DMA transfer.

_____________

Set R
*SLRTX349* SLR-TX – 349
Seat Set S
No.
T.E. (CSE) (Part – I) (Old – CGPA) Examination, 2018
OPERATING SYSTEM CONCEPTS

Day and Date : Friday, 30-11-2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
3) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) What is compaction ?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
2) Operating System maintains the page table for
a) Each process b) Each thread
c) Each instruction d) Each address
3) The pager concerns with the
a) Individual page of a process b) Entire process
c) Entire thread d) First page of a process
4) When a program tries to access a page that is mapped in address space
but not loaded in physical memory, then ?
a) Segmentation fault occurs b) Fatal error occurs
c) Page fault occurs d) No error occurs
5) The _____________ present a uniform device-access interface to the I/O
subsystem, much as system calls provide a standard interface between
the application and the operating system.
a) Devices b) Buses
c) Device drivers d) I/O systems
P.T.O.
SLR-TX – 349 -2- *SLRTX349*
6) The degree of multi-programming is
a) The number of processes executed per unit time
b) The number of processes in the ready queue
c) The number of processes in the I/O queue
d) The number of processes in memory
7) The primary distinction between the short term scheduler and the long
term scheduler is
a) The length of their queues b) The type of processes they schedule
c) The frequency of their execution d) None of these
8) A monitor is a module that encapsulates
a) Shared data structures
b) Procedures that operate on shared data structure
c) Synchronization between concurrent procedure invocation
d) All of the mentioned
9) The child process can
a) be a duplicate of the parent process
b) have another program loaded into it
c) Both a) and b)
d) Only a)
10) Spinlocks are
a) CPU cycles wasting locks over critical sections of programs
b) Locks that avoid time wastage in context switches
c) Locks that work better on multiprocessor systems
d) All of these
11) Preemptive Shortest Job First scheduling is sometimes called
a) Fast SJF scheduling
b) EDF (Earliest Deadline First)
c) HRRN (Highest Response Ratio Next)
d) SRTN (Shortest Remaining Time Next)
12) A solution to the problem of indefinite blockage of low-priority processes
is
a) Starvation b) Wait queue c) Ready queue d) None of these
13) A problem encountered in multitasking when a process is perpetually
denied necessary resources is called
a) Deadlock b) Starvation c) Inversion d) Aging
14) Deadlock prevention is a set of methods
a) To ensure that at least one of the necessary conditions cannot hold
b) To ensure that all of the necessary conditions do not hold
c) To decide if the requested resources for a process have to be given or
not
d) To recover from a deadlock
_____________

Set S
*SLRTX349* -3- SLR-TX – 349
Seat
No.
T.E. (CSE) (Part – I) (Old – CGPA) Examination, 2018
OPERATING SYSTEM CONCEPTS

Day and Date : Friday, 30-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three : (3�4=12)


1) Explain Reader Writer problem.
2) Write a note on multiprocessor systems.
3) What is operating system ? Explain its functionalities.
4) Describe multi-level feedback queue with diagram.
5) Describe PCB with diagram.

3. Solve any two : (2�8=16)


1) Consider the following set of processes with arrival time and burst time in
milliseconds as given below :
P. No. AT BT
1 5 5
2 4 6
3 3 7
4 1 9
5 2 2
6 6 3
i) Draw Gantt Chart illustrating the execution of processes using Round
Robin scheduling algorithm with time quantum of 3 ms.
ii) Calculate average waiting time for the above scheduling algorithm.
iii) Calculate average turn around for the above time scheduling
algorithm.
2) What is semaphore ? Explain Dinning Philosopher problem using
semaphore.
3) What is inter-process communication ? Explain the two models of inter-
process communication.
Set S
SLR-TX – 349 -4- *SLRTX349*
SECTION – II

4. Solve any three : 12


a) Explain different ways for deadlock recovery.
b) Explain resource allocation graph and resource allocation graph algorithm.
c) Explain Demand Paging.
d) Write note on :
1) Logical address and Physical address.
2) Best fit, Worst fit, First fit and Compaction.

5. Attempt any two : 16


a) Explain Paging in detail.
Suppose that we have free segments with sizes : 6, 17, 25, 14 and 19.
Place a program with size 13 kB in the free segment using first-fit, best-fit
and worst-fit ?
b) Prove Belady’s Anomaly with an example. (Show with graph)
c) What are the responsibilities of DMA Controller and the advantages of
DMA ? Explain the steps process to perform DMA transfer.

_____________

Set S
*SLETX350* SLR-TX – 350

Seat
No.
Set P
T.E. (Part – I) (CSE) (Old-CGPA) Examination, 2018
system programming
Day and Date : Monday 3-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) An Operator grammar is a grammar none of whose productions contain
a) One or more consecutive NT’s in any RHS alternative
b) Two or more consecutive NT’s in any RHS alternative
c) Only one NT
d) None of the above
2) Code optimization aims at improving
a) Processor efficiency b) Execution efficiency
c) Semantic gap d) Specification gap
3) Relocation Factor (RF) is calculated using
a) Relocation_factor = I_originp – t_originp
b) Relocation_factor = t_originp- I_originpsymb
c) Relocation_factor = t_originp _ dsymb
d) Relocation_factor = I_origin _ dsymb
4) Binary Symbolic Subroutine (BSS) is an example of
a) Absolute loader b) General loading scheme
c) Direct linking loader d) Relocating loader
5) Which one of the following is considered as limitation in designing one-pass
assembler ?
a) Forward reference b) Intermediate code
c) Symbol table d) Op-code table P.T.O.
SLR-TX – 350 -2- *SLETX350*

6) A macro definition consist of


a) A macro prototype statement b) One or more model statements
c) Macro pre-processor statement d) All of the above
7) Following Intermediate code is in ______ format.
Source Code IR
START 200 (AD, 01) (C, 200)
READ A (IS, 09) A
LOOP MOVER AREG, A (IS, 04) AREG, A

SUB AREG, = ‘1’ (IS, 02) AREG, (L, 01)


BC GT, LOOP (IS, 07) GT, LOOP
STOP (IS, 00)
A DS 1 (DL, 02) (C, 1)
LTORG (DL, 05)
a) Variant I b) Variant II c) Variant III d) None
8) Nested macro expansion follows ______ rule.
a) LIFO b) FIFO c) FILO d) None of these
9) Which of the following is not a valid binding time ?
a) Execution init time of proc. b) Language implementation time of L
c) Language definition time of L d) Language execution time of L
10) Linking Table (LINKTAB) is generated by
a) Linker b) Translator
c) Binary Program d) Dynamic Loader
11) Dead code elimination is carried out in
a) Front end b) Back end
c) Optimization phase d) None of the above
12) Which of the following is an input to the linker ?
a) Object modules b) Source program
c) Binary program d) None
13) A language translator converts C ++ program into
a) Assembly language b) ‘C’ language
c) Machine language d) ‘C++’ language
14) In BSS Loader the transfer Vector is used for
a) Allocation b) Relocation
c) Linking d) Loading Set P

–––––––––––––

*SLETX350* -3- SLR-TX – 350
Seat
No.

T.E. (Part – I) (CSE)(Old-CGPA) Examination, 2018


system programming

Day and Date : Monday 3-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Solve any three : 12


1) Describe program execution steps in detail with schematic.
2) Define forward reference and explain it with example.
3) Define Language processor and explain with example, Specification and
Execution Gap.
4) Describe Program generation through Macro facility with example.

3. Solve any two : 16


1) Explain Single pass Assembler in detail.
2) Write and explain Assembler Pass I algorithm in detail.
3) Explain Design of a Macro preprocessor in detail.

SECTION – II

4. Solve any three : 12


1) Write algorithm for program linking with example.
2) Describe subroutine linkages with example.
3) Explain the evaluation order for operators Algorithm in detail.
4) Describe the aspects of compilation.

5. Solve any two : 16


5) Explain Data flow analysis and Control flow analysis.
6) Explain Compile and go loader Scheme with its advantages and
disadvantages.
7) Explain Memory allocation in block structured languages.

_____________________ Set P
Set P
*SLETX350* SLR-TX – 350

Seat
No.
Set Q
T.E. (Part – I) (CSE) (Old-CGPA) Examination, 2018
system programming
Day and Date : Monday 3-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Nested macro expansion follows ______ rule.
a) LIFO b) FIFO c) FILO d) None of these
2) Which of the following is not a valid binding time ?
a) Execution init time of proc. b) Language implementation time of L
c) Language definition time of L d) Language execution time of L
3) Linking Table (LINKTAB) is generated by
a) Linker b) Translator
c) Binary Program d) Dynamic Loader
4) Dead code elimination is carried out in
a) Front end b) Back end
c) Optimization phase d) None of the above
5) Which of the following is an input to the linker ?
a) Object modules b) Source program
c) Binary program d) None
6) A language translator converts C ++ program into
a) Assembly language b) ‘C’ language
c) Machine language d) ‘C++’ language

P.T.O.
SLR-TX – 350 -2- *SLETX350*

7) In BSS Loader the transfer Vector is used for


a) Allocation b) Relocation
c) Linking d) Loading
8) An Operator grammar is a grammar none of whose productions contain
a) One or more consecutive NT’s in any RHS alternative
b) Two or more consecutive NT’s in any RHS alternative
c) Only one NT
d) None of the above
9) Code optimization aims at improving
a) Processor efficiency b) Execution efficiency
c) Semantic gap d) Specification gap
10) Relocation Factor (RF) is calculated using
a) Relocation_factor = I_originp – t_originp
b) Relocation_factor = t_originp- I_originpsymb
c) Relocation_factor = t_originp _ dsymb
d) Relocation_factor = I_origin _ dsymb
11) Binary Symbolic Subroutine (BSS) is an example of
a) Absolute loader b) General loading scheme
c) Direct linking loader d) Relocating loader
12) Which one of the following is considered as limitation in designing one-pass
assembler ?
a) Forward reference b) Intermediate code
c) Symbol table d) Op-code table
13) A macro definition consist of
a) A macro prototype statement b) One or more model statements
c) Macro pre-processor statement d) All of the above
14) Following Intermediate code is in ______ format.
Source Code IR
START 200 (AD, 01) (C, 200)
READ A (IS, 09) A
LOOP MOVER AREG, A (IS, 04) AREG, A

SUB AREG, = ‘1’ (IS, 02) AREG, (L, 01)


BC GT, LOOP (IS, 07) GT, LOOP
STOP (IS, 00)
A DS 1 (DL, 02) (C, 1)
LTORG (DL, 05)
a) Variant I b) Variant II c) Variant III d) None
Set Q
–––––––––––––

*SLETX350* -3- SLR-TX – 350
Seat
No.

T.E. (Part – I) (CSE)(Old-CGPA) Examination, 2018


system programming

Day and Date : Monday 3-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Solve any three : 12


1) Describe program execution steps in detail with schematic.
2) Define forward reference and explain it with example.
3) Define Language processor and explain with example, Specification and
Execution Gap.
4) Describe Program generation through Macro facility with example.

3. Solve any two : 16


1) Explain Single pass Assembler in detail.
2) Write and explain Assembler Pass I algorithm in detail.
3) Explain Design of a Macro preprocessor in detail.

SECTION – II

4. Solve any three : 12


1) Write algorithm for program linking with example.
2) Describe subroutine linkages with example.
3) Explain the evaluation order for operators Algorithm in detail.
4) Describe the aspects of compilation.

5. Solve any two : 16


5) Explain Data flow analysis and Control flow analysis.
6) Explain Compile and go loader Scheme with its advantages and
disadvantages.
7) Explain Memory allocation in block structured languages.

_____________________ Set Q
Set Q
*SLETX350* SLR-TX – 350

Seat
No.
Set R
T.E. (Part – I) (CSE) (Old-CGPA) Examination, 2018
system programming
Day and Date : Monday 3-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Which one of the following is considered as limitation in designing one-pass
assembler ?
a) Forward reference b) Intermediate code
c) Symbol table d) Op-code table
2) A macro definition consist of
a) A macro prototype statement b) One or more model statements
c) Macro pre-processor statement d) All of the above
3) Following Intermediate code is in ______ format.
Source Code IR
START 200 (AD, 01) (C, 200)
READ A (IS, 09) A
LOOP MOVER AREG, A (IS, 04) AREG, A

SUB AREG, = ‘1’ (IS, 02) AREG, (L, 01)


BC GT, LOOP (IS, 07) GT, LOOP
STOP (IS, 00)
A DS 1 (DL, 02) (C, 1)
LTORG (DL, 05)
a) Variant I b) Variant II c) Variant III d) None
P.T.O.
SLR-TX – 350 -2- *SLETX350*

4) Nested macro expansion follows ______ rule.


a) LIFO b) FIFO c) FILO d) None of these
5) Which of the following is not a valid binding time ?
a) Execution init time of proc. b) Language implementation time of L
c) Language definition time of L d) Language execution time of L
6) Linking Table (LINKTAB) is generated by
a) Linker b) Translator
c) Binary Program d) Dynamic Loader
7) Dead code elimination is carried out in
a) Front end b) Back end
c) Optimization phase d) None of the above
8) Which of the following is an input to the linker ?
a) Object modules b) Source program
c) Binary program d) None
9) A language translator converts C ++ program into
a) Assembly language b) ‘C’ language
c) Machine language d) ‘C++’ language
10) In BSS Loader the transfer Vector is used for
a) Allocation b) Relocation
c) Linking d) Loading
11) An Operator grammar is a grammar none of whose productions contain
a) One or more consecutive NT’s in any RHS alternative
b) Two or more consecutive NT’s in any RHS alternative
c) Only one NT
d) None of the above
12) Code optimization aims at improving
a) Processor efficiency b) Execution efficiency
c) Semantic gap d) Specification gap
13) Relocation Factor (RF) is calculated using
a) Relocation_factor = I_originp – t_originp
b) Relocation_factor = t_originp- I_originpsymb
c) Relocation_factor = t_originp _ dsymb
d) Relocation_factor = I_origin _ dsymb
14) Binary Symbolic Subroutine (BSS) is an example of
a) Absolute loader b) General loading scheme
c) Direct linking loader d) Relocating loader
Set R
______________
*SLETX350* -3- SLR-TX – 350
Seat
No.

T.E. (Part – I) (CSE)(Old-CGPA) Examination, 2018


system programming

Day and Date : Monday 3-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Solve any three : 12


1) Describe program execution steps in detail with schematic.
2) Define forward reference and explain it with example.
3) Define Language processor and explain with example, Specification and
Execution Gap.
4) Describe Program generation through Macro facility with example.

3. Solve any two : 16


1) Explain Single pass Assembler in detail.
2) Write and explain Assembler Pass I algorithm in detail.
3) Explain Design of a Macro preprocessor in detail.

SECTION – II

4. Solve any three : 12


1) Write algorithm for program linking with example.
2) Describe subroutine linkages with example.
3) Explain the evaluation order for operators Algorithm in detail.
4) Describe the aspects of compilation.

5. Solve any two : 16


5) Explain Data flow analysis and Control flow analysis.
6) Explain Compile and go loader Scheme with its advantages and
disadvantages.
7) Explain Memory allocation in block structured languages.

_____________________ Set R
Set R
*SLETX350* SLR-TX – 350

Seat
No.
Set S
T.E. (Part – I) (CSE) (Old-CGPA) Examination, 2018
system programming
Day and Date : Monday 3-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Linking Table (LINKTAB) is generated by
a) Linker b) Translator
c) Binary Program d) Dynamic Loader
2) Dead code elimination is carried out in
a) Front end b) Back end
c) Optimization phase d) None of the above
3) Which of the following is an input to the linker ?
a) Object modules b) Source program
c) Binary program d) None
4) A language translator converts C ++ program into
a) Assembly language b) ‘C’ language
c) Machine language d) ‘C++’ language
5) In BSS Loader the transfer Vector is used for
a) Allocation b) Relocation
c) Linking d) Loading
6) An Operator grammar is a grammar none of whose productions contain
a) One or more consecutive NT’s in any RHS alternative
b) Two or more consecutive NT’s in any RHS alternative
c) Only one NT
d) None of the above
P.T.O.
SLR-TX – 350 -2- *SLETX350*

7) Code optimization aims at improving


a) Processor efficiency b) Execution efficiency
c) Semantic gap d) Specification gap
8) Relocation Factor (RF) is calculated using
a) Relocation_factor = I_originp – t_originp
b) Relocation_factor = t_originp- I_originpsymb
c) Relocation_factor = t_originp _ dsymb
d) Relocation_factor = I_origin _ dsymb
9) Binary Symbolic Subroutine (BSS) is an example of
a) Absolute loader b) General loading scheme
c) Direct linking loader d) Relocating loader
10) Which one of the following is considered as limitation in designing one-pass
assembler ?
a) Forward reference b) Intermediate code
c) Symbol table d) Op-code table
11) A macro definition consist of
a) A macro prototype statement b) One or more model statements
c) Macro pre-processor statement d) All of the above
12) Following Intermediate code is in ______ format.
Source Code IR
START 200 (AD, 01) (C, 200)
READ A (IS, 09) A
LOOP MOVER AREG, A (IS, 04) AREG, A

SUB AREG, = ‘1’ (IS, 02) AREG, (L, 01)


BC GT, LOOP (IS, 07) GT, LOOP
STOP (IS, 00)
A DS 1 (DL, 02) (C, 1)
LTORG (DL, 05)
a) Variant I b) Variant II c) Variant III d) None
13) Nested macro expansion follows ______ rule.
a) LIFO b) FIFO c) FILO d) None of these
14) Which of the following is not a valid binding time ?
a) Execution init time of proc. b) Language implementation time of L
c) Language definition time of L d) Language execution time of L
Set S
–––––––––––––

*SLETX350* -3- SLR-TX – 350
Seat
No.

T.E. (Part – I) (CSE)(Old-CGPA) Examination, 2018


system programming

Day and Date : Monday 3-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Solve any three : 12


1) Describe program execution steps in detail with schematic.
2) Define forward reference and explain it with example.
3) Define Language processor and explain with example, Specification and
Execution Gap.
4) Describe Program generation through Macro facility with example.

3. Solve any two : 16


1) Explain Single pass Assembler in detail.
2) Write and explain Assembler Pass I algorithm in detail.
3) Explain Design of a Macro preprocessor in detail.

SECTION – II

4. Solve any three : 12


1) Write algorithm for program linking with example.
2) Describe subroutine linkages with example.
3) Explain the evaluation order for operators Algorithm in detail.
4) Describe the aspects of compilation.

5. Solve any two : 16


5) Explain Data flow analysis and Control flow analysis.
6) Explain Compile and go loader Scheme with its advantages and
disadvantages.
7) Explain Memory allocation in block structured languages.

_____________________ Set S
Set S
*SLRTX351* SLR-TX – 351
Seat
No. Set P
T.E. C.S.E. (Part – I) (Old-CGPA) Examination, 2018
computer networks

Day and Date : Wednesday, 5-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) A computer that uses the ____________ system stores the MSB of data in
the starting address of the data unit.
a) Little-Endian b) Big-Endian
c) Both a & b d) None of the above
2) _____________ of SCTP involves multiple streams.
a) Packets b) Association
c) Multihoming d) None of the above
3) After sending DHCPDISCOVER message to server, the client goes to
the
a) Requesting State b) Bound State
c) Renewal State d) Selecting State
4) Association establishment in SCTP required
a) Two-way-handshaking b) Three-way-handshaking
c) Four-way-handshaking d) All of the above

P.T.O.
SLR-TX – 351 -2- *SLRTX351*
5) Header of the UDP user datagram consist following fields
a) Source and destination port number
b) Total length
c) Checksum
d) All of the above
6) Port addresses are ___________ bits in length.
a) 32 Bits b) 64 Bits c) 48 Bits d) 16 Bits
7) In TCP ____________ flag is used for synchronizing the sequence no. And
__________ flag is for terminate the connection.
a) URG, SYN b) PSH, FIN c) SYN, FIN d) ACK, SYN
8) To make control character effective in special situation, TELNET uses
a) Out-of-band signalling b) In-band signalling
c) Synchronous signalling d) All of the above
9) Port forwarding is also known as
a) Component forwarding b) SSH packet forwarding
c) SSH-application forwarding d) SSH tunnelling
10) In out-of-band signalling, which of the following command is act as Urgent
Pointer ?
a) DM b) IP c) IAC d) All of the above
11) SSH uses _____________ communication protocol.
a) UDP b) TCP c) SCTP d) FTP
12) In ____________ sequence of character is without structure.
a) Flat Name Space b) Hierarchical Name Space
c) Zone Name Space d) None of the above
13) TSN’s in SCTP are ____________ bits long and randomly initialized.
a) 8 Bits b) 16 Bits c) 32 Bits d) 64 Bits
14) Which of the following is Message access agent ?
a) POP b) IMAP c) SMTP d) Both a & b

____________

Set P
*SLRTX351* -3- SLR-TX – 351
Seat
No.
T.E. C.S.E. (Part – I) (Old-CGPA) Examination, 2018
computer networks

Day and Date : Wednesday, 5-12-2018, -2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
SECTION – I
2. Attempt any four (Each carries 5 marks) : (4×5=20)
a) Explain Port address and Application specific address with examples.
b) For a given UDP Header in hexadecimal format 0045DF000058FE20,
find source port number, destination port number, total length of the user
datagram, length of the data, direction of the packet and kind of client
process ?
c) Explain UDP Package with neat diagram.
d) Write a short note on Persistence Timer.
e) Explain socket structure in detail.
f) Draw and explain TCP Segment format.
3. Attempt any one of the following : (1×8=8)
a) Draw and explain State-transistion diagram of SCTP.
b) Explain connectionless iterative client and server socket interface in detail.
SECTION – II
4. Attempt any four (Each carries 5 marks) : (4×5=20)
a) Explain packet format of DHCP.
b) Explain the terms used in DNS: Flat Name Space, Hierarchical Name
Space, Zone, FQDN and PQDN.
c) Write a short note on Port forwarding.
d) Explain the concept of NVT. Also explain NVT Character set.
e) Explain HTTP with diagram.
f) Explain Out-of-band signalling.
5. Attempt any one of the following : (1×8=8)
a) What is MTA and MAA of SMTP ? Explain MTA commands and responses.
b) Explain need for DNS. What are the DNS domains ? List the types of
DNS records.
–––––––––––––
Set P
Set P
*SLRTX351* SLR-TX – 351
Seat
No. Set Q
T.E. C.S.E. (Part – I) (Old-CGPA) Examination, 2018
computer networks

Day and Date : Wednesday, 5-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) To make control character effective in special situation, TELNET uses
a) Out-of-band signalling b) In-band signalling
c) Synchronous signalling d) All of the above
2) Port forwarding is also known as
a) Component forwarding b) SSH packet forwarding
c) SSH-application forwarding d) SSH tunnelling
3) In out-of-band signalling, which of the following command is act as Urgent
Pointer ?
a) DM b) IP c) IAC d) All of the above
4) SSH uses _____________ communication protocol.
a) UDP b) TCP c) SCTP d) FTP
5) In ____________ sequence of character is without structure.
a) Flat Name Space b) Hierarchical Name Space
c) Zone Name Space d) None of the above

P.T.O.
SLR-TX – 351 -2- *SLRTX351*
6) TSN’s in SCTP are ____________ bits long and randomly initialized.
a) 8 Bits b) 16 Bits c) 32 Bits d) 64 Bits
7) Which of the following is Message access agent ?
a) POP b) IMAP c) SMTP d) Both a & b
8) A computer that uses the ____________ system stores the MSB of data in
the starting address of the data unit.
a) Little-Endian b) Big-Endian
c) Both a & b d) None of the above
9) _____________ of SCTP involves multiple streams.
a) Packets b) Association
c) Multihoming d) None of the above
10) After sending DHCPDISCOVER message to server, the client goes to
the
a) Requesting State b) Bound State
c) Renewal State d) Selecting State
11) Association establishment in SCTP required
a) Two-way-handshaking b) Three-way-handshaking
c) Four-way-handshaking d) All of the above
12) Header of the UDP user datagram consist following fields
a) Source and destination port number
b) Total length
c) Checksum
d) All of the above
13) Port addresses are ___________ bits in length.
a) 32 Bits b) 64 Bits c) 48 Bits d) 16 Bits
14) In TCP ____________ flag is used for synchronizing the sequence no. And
__________ flag is for terminate the connection.
a) URG, SYN b) PSH, FIN c) SYN, FIN d) ACK, SYN

____________

Set Q
*SLRTX351* -3- SLR-TX – 351
Seat
No.
T.E. C.S.E. (Part – I) (Old-CGPA) Examination, 2018
computer networks

Day and Date : Wednesday, 5-12-2018, -2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
SECTION – I
2. Attempt any four (Each carries 5 marks) : (4×5=20)
a) Explain Port address and Application specific address with examples.
b) For a given UDP Header in hexadecimal format 0045DF000058FE20,
find source port number, destination port number, total length of the user
datagram, length of the data, direction of the packet and kind of client
process ?
c) Explain UDP Package with neat diagram.
d) Write a short note on Persistence Timer.
e) Explain socket structure in detail.
f) Draw and explain TCP Segment format.
3. Attempt any one of the following : (1×8=8)
a) Draw and explain State-transistion diagram of SCTP.
b) Explain connectionless iterative client and server socket interface in detail.
SECTION – II
4. Attempt any four (Each carries 5 marks) : (4×5=20)
a) Explain packet format of DHCP.
b) Explain the terms used in DNS: Flat Name Space, Hierarchical Name
Space, Zone, FQDN and PQDN.
c) Write a short note on Port forwarding.
d) Explain the concept of NVT. Also explain NVT Character set.
e) Explain HTTP with diagram.
f) Explain Out-of-band signalling.
5. Attempt any one of the following : (1×8=8)
a) What is MTA and MAA of SMTP ? Explain MTA commands and responses.
b) Explain need for DNS. What are the DNS domains ? List the types of
DNS records.
–––––––––––––
Set Q
Set Q
*SLRTX351* SLR-TX – 351
Seat
No. Set R
T.E. C.S.E. (Part – I) (Old-CGPA) Examination, 2018
computer networks

Day and Date : Wednesday, 5-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Header of the UDP user datagram consist following fields
a) Source and destination port number
b) Total length
c) Checksum
d) All of the above
2) Port addresses are ___________ bits in length.
a) 32 Bits b) 64 Bits c) 48 Bits d) 16 Bits
3) In TCP ____________ flag is used for synchronizing the sequence no. And
__________ flag is for terminate the connection.
a) URG, SYN b) PSH, FIN c) SYN, FIN d) ACK, SYN
4) To make control character effective in special situation, TELNET uses
a) Out-of-band signalling b) In-band signalling
c) Synchronous signalling d) All of the above
P.T.O.
SLR-TX – 351 -2- *SLRTX351*
5) Port forwarding is also known as
a) Component forwarding b) SSH packet forwarding
c) SSH-application forwarding d) SSH tunnelling
6) In out-of-band signalling, which of the following command is act as Urgent
Pointer ?
a) DM b) IP c) IAC d) All of the above
7) SSH uses _____________ communication protocol.
a) UDP b) TCP c) SCTP d) FTP
8) In ____________ sequence of character is without structure.
a) Flat Name Space b) Hierarchical Name Space
c) Zone Name Space d) None of the above
9) TSN’s in SCTP are ____________ bits long and randomly initialized.
a) 8 Bits b) 16 Bits c) 32 Bits d) 64 Bits
10) Which of the following is Message access agent ?
a) POP b) IMAP c) SMTP d) Both a & b
11) A computer that uses the ____________ system stores the MSB of data in
the starting address of the data unit.
a) Little-Endian b) Big-Endian
c) Both a & b d) None of the above
12) _____________ of SCTP involves multiple streams.
a) Packets b) Association
c) Multihoming d) None of the above
13) After sending DHCPDISCOVER message to server, the client goes to
the
a) Requesting State b) Bound State
c) Renewal State d) Selecting State
14) Association establishment in SCTP required
a) Two-way-handshaking b) Three-way-handshaking
c) Four-way-handshaking d) All of the above

____________

Set R
*SLRTX351* -3- SLR-TX – 351
Seat
No.
T.E. C.S.E. (Part – I) (Old-CGPA) Examination, 2018
computer networks

Day and Date : Wednesday, 5-12-2018, -2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
SECTION – I
2. Attempt any four (Each carries 5 marks) : (4×5=20)
a) Explain Port address and Application specific address with examples.
b) For a given UDP Header in hexadecimal format 0045DF000058FE20,
find source port number, destination port number, total length of the user
datagram, length of the data, direction of the packet and kind of client
process ?
c) Explain UDP Package with neat diagram.
d) Write a short note on Persistence Timer.
e) Explain socket structure in detail.
f) Draw and explain TCP Segment format.
3. Attempt any one of the following : (1×8=8)
a) Draw and explain State-transistion diagram of SCTP.
b) Explain connectionless iterative client and server socket interface in detail.
SECTION – II
4. Attempt any four (Each carries 5 marks) : (4×5=20)
a) Explain packet format of DHCP.
b) Explain the terms used in DNS: Flat Name Space, Hierarchical Name
Space, Zone, FQDN and PQDN.
c) Write a short note on Port forwarding.
d) Explain the concept of NVT. Also explain NVT Character set.
e) Explain HTTP with diagram.
f) Explain Out-of-band signalling.
5. Attempt any one of the following : (1×8=8)
a) What is MTA and MAA of SMTP ? Explain MTA commands and responses.
b) Explain need for DNS. What are the DNS domains ? List the types of
DNS records.
–––––––––––––
Set R
Set R
*SLRTX351* SLR-TX – 351
Seat
No. Set S
T.E. C.S.E. (Part – I) (Old-CGPA) Examination, 2018
computer networks

Day and Date : Wednesday, 5-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) In out-of-band signalling, which of the following command is act as Urgent
Pointer ?
a) DM b) IP c) IAC d) All of the above
2) SSH uses _____________ communication protocol.
a) UDP b) TCP c) SCTP d) FTP
3) In ____________ sequence of character is without structure.
a) Flat Name Space b) Hierarchical Name Space
c) Zone Name Space d) None of the above
4) TSN’s in SCTP are ____________ bits long and randomly initialized.
a) 8 Bits b) 16 Bits c) 32 Bits d) 64 Bits
5) Which of the following is Message access agent ?
a) POP b) IMAP c) SMTP d) Both a & b
P.T.O.
SLR-TX – 351 -2- *SLRTX351*
6) A computer that uses the ____________ system stores the MSB of data in
the starting address of the data unit.
a) Little-Endian b) Big-Endian
c) Both a & b d) None of the above
7) _____________ of SCTP involves multiple streams.
a) Packets b) Association
c) Multihoming d) None of the above
8) After sending DHCPDISCOVER message to server, the client goes to
the
a) Requesting State b) Bound State
c) Renewal State d) Selecting State
9) Association establishment in SCTP required
a) Two-way-handshaking b) Three-way-handshaking
c) Four-way-handshaking d) All of the above
10) Header of the UDP user datagram consist following fields
a) Source and destination port number
b) Total length
c) Checksum
d) All of the above
11) Port addresses are ___________ bits in length.
a) 32 Bits b) 64 Bits c) 48 Bits d) 16 Bits
12) In TCP ____________ flag is used for synchronizing the sequence no. And
__________ flag is for terminate the connection.
a) URG, SYN b) PSH, FIN c) SYN, FIN d) ACK, SYN
13) To make control character effective in special situation, TELNET uses
a) Out-of-band signalling b) In-band signalling
c) Synchronous signalling d) All of the above
14) Port forwarding is also known as
a) Component forwarding b) SSH packet forwarding
c) SSH-application forwarding d) SSH tunnelling

____________

Set S
*SLRTX351* -3- SLR-TX – 351
Seat
No.
T.E. C.S.E. (Part – I) (Old-CGPA) Examination, 2018
computer networks

Day and Date : Wednesday, 5-12-2018, -2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
SECTION – I
2. Attempt any four (Each carries 5 marks) : (4×5=20)
a) Explain Port address and Application specific address with examples.
b) For a given UDP Header in hexadecimal format 0045DF000058FE20,
find source port number, destination port number, total length of the user
datagram, length of the data, direction of the packet and kind of client
process ?
c) Explain UDP Package with neat diagram.
d) Write a short note on Persistence Timer.
e) Explain socket structure in detail.
f) Draw and explain TCP Segment format.
3. Attempt any one of the following : (1×8=8)
a) Draw and explain State-transistion diagram of SCTP.
b) Explain connectionless iterative client and server socket interface in detail.
SECTION – II
4. Attempt any four (Each carries 5 marks) : (4×5=20)
a) Explain packet format of DHCP.
b) Explain the terms used in DNS: Flat Name Space, Hierarchical Name
Space, Zone, FQDN and PQDN.
c) Write a short note on Port forwarding.
d) Explain the concept of NVT. Also explain NVT Character set.
e) Explain HTTP with diagram.
f) Explain Out-of-band signalling.
5. Attempt any one of the following : (1×8=8)
a) What is MTA and MAA of SMTP ? Explain MTA commands and responses.
b) Explain need for DNS. What are the DNS domains ? List the types of
DNS records.
–––––––––––––
Set S
Set S
*SLRTX352* SLR-TX – 352
Seat
No.
Set P
T.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
DESIGN AND ANALYSIS OF ALGORITHM

Day and Date : Friday, 7-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative for the following : (1×14=14)


1) Three algorithm do the same task. Algorithm 1 needs O(sqrt(n)) time
algorithm 2 is O(n) and algorithm 3 is O(n.logn). Whch algorithm should
execute faster for large n ?
a) O(sqrt(n)) b) O(n) c) O(n.logn) d) None of these
2) Finite and effective steps, which are when carried out perform certain task
is called as
a) Algorithm b) Pseudo code c) Strategy d) Optimization
3) _______________ method is used for solving recurrence relation.
a) Division b) Replacement c) Substitution d) None of these
4) ______________ can only point to the presence of errors, but not to their
absence.
a) Profiling b) Debugging c) Testing d) Analyzing
5) In this sort, file is divided into subfiles which are to be independently sorted
and then merges
a) quick sort b) heap sort c) bubble sort d) none of these
6) Mean retrieval time is obtained by storing the programs on tape in ________
of their lengths.
a) Non increasing b) Non decreasing
c) Either a) or b) d) Both a) and b)
P.T.O.
SLR-TX – 352 -2- *SLRTX352*
7) Huffman code is an application of
a) Optimal storage b) Optimal merge
c) Optimal retrieval d) None of above
8) A graph is said to be __________ iff it can be drawn in a plane in such a
way that no two edges cross each other.
a) Planar b) Direct
c) Coloured d) Cross
9) The tree organization of solution space is
a) Answer tree b) State space tree
c) Dynamic tree d) Dead tree
10) In n-queen problem two queens are attacking each other it.
a) They are at same diagonal b) They are at same row
c) They are at same column d) All of above
11) Which of the following standard algorithms is not Dynamic Programming
based ?
a) Travelling sales person problem
b) Floyd algorithm for all pair shortest path
c) 0 – 1 knapsack problem
d) Prim’s minimum Spanning tree
12) A _________ is a round trip path along n edges of G that visits every vertex
once and returns to it’s starting position.
a) MST b) TSP
c) Multistage graph d) Hamiltonian Cycle
13) An algorithm that calls itself directly or indirectly is known as
a) Sub algorithm b) Polish algorithm
c) Recursion d) Traversal algorithm
14) In which of the following scheduling process the processing of task on any
processor is not terminated till the task is completed ?
a) Preemptive b) Non preemptive
c) Round-robin d) FIFO

____________

Set P
*SLRTX352* -3- SLR-TX – 352
Seat
No.
T.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
DESIGN AND ANALYSIS OF ALGORITHM

Day and Date : Friday, 7-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)


a) Explain Performance Analysis of algorithm.
b) Write algorithm for binary search using divide and conquer.
c) Find the time complexity of following algorithm by introducing count variable.
Algorithm add(a, b, c, m, n)
{
for i = 1 to m do
for j = 1 to n do
c[i, j] = a[i, j] + b[i, j];
}
d) What is spanning tree ? What are applications of spanning tree ?

3. Attempt the following : (8×2=16)


a) Write the algorithm and prove that complexity of merge sort is O(n.logn)
(Use the recurrence relation).
OR
a) Find shortest path from 1 to all.

Set P
15

SLR-TX – 352 -4- *SLRTX352*
b) Write Prim’s algorithm and find minimum cost spanning tree of following
graph.

SECTION – II

4. Attempt any three : (4×3=12)


a) What is tractable and intractable problems ?
b) Find all pair shortest path.

11

c) Write a short note on optimal binary search tree.
d) Solve the 0/1 knapsack instance with n = 3(W1, W2, W3) = (4, 6, 8) and
(P1, P2, P3) = (10, 12, 15) and m = 6 using dynamic programming.

5. Attempt the following : (8×2=16)


a) Consider a set S = {5, 10, 12, 13, 15, 18) and M = 30 solve it for obtaining
sum of subset and also draw state space tree.
OR
a) State and explain Cook’s theorem.
b) Write short note on :
i) 8 queen problem ii) Graph coloring.

_ ___________________
Set P
*SLRTX352* SLR-TX – 352
Seat
No.
Set Q
T.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
DESIGN AND ANALYSIS OF ALGORITHM

Day and Date : Friday, 7-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative for the following : (1×14=14)


1) A graph is said to be __________ iff it can be drawn in a plane in such a
way that no two edges cross each other.
a) Planar b) Direct
c) Coloured d) Cross
2) The tree organization of solution space is
a) Answer tree b) State space tree
c) Dynamic tree d) Dead tree
3) In n-queen problem two queens are attacking each other it.
a) They are at same diagonal b) They are at same row
c) They are at same column d) All of above
4) Which of the following standard algorithms is not Dynamic Programming
based ?
a) Travelling sales person problem
b) Floyd algorithm for all pair shortest path
c) 0 – 1 knapsack problem
d) Prim’s minimum Spanning tree

P.T.O.
SLR-TX – 352 -2- *SLRTX352*
5) A _________ is a round trip path along n edges of G that visits every vertex
once and returns to it’s starting position.
a) MST b) TSP
c) Multistage graph d) Hamiltonian Cycle
6) An algorithm that calls itself directly or indirectly is known as
a) Sub algorithm b) Polish algorithm
c) Recursion d) Traversal algorithm
7) In which of the following scheduling process the processing of task on any
processor is not terminated till the task is completed ?
a) Preemptive b) Non preemptive
c) Round-robin d) FIFO
8) Three algorithm do the same task. Algorithm 1 needs O(sqrt(n)) time
algorithm 2 is O(n) and algorithm 3 is O(n.logn). Whch algorithm should
execute faster for large n ?
a) O(sqrt(n)) b) O(n) c) O(n.logn) d) None of these
9) Finite and effective steps, which are when carried out perform certain task
is called as
a) Algorithm b) Pseudo code c) Strategy d) Optimization
10) _______________ method is used for solving recurrence relation.
a) Division b) Replacement c) Substitution d) None of these
11) ______________ can only point to the presence of errors, but not to their
absence.
a) Profiling b) Debugging c) Testing d) Analyzing
12) In this sort, file is divided into subfiles which are to be independently sorted
and then merges
a) quick sort b) heap sort c) bubble sort d) none of these
13) Mean retrieval time is obtained by storing the programs on tape in ________
of their lengths.
a) Non increasing b) Non decreasing
c) Either a) or b) d) Both a) and b)
14) Huffman code is an application of
a) Optimal storage b) Optimal merge
c) Optimal retrieval d) None of above

____________
Set Q

*SLRTX352* -3- SLR-TX – 352
Seat
No.
T.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
DESIGN AND ANALYSIS OF ALGORITHM

Day and Date : Friday, 7-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)


a) Explain Performance Analysis of algorithm.
b) Write algorithm for binary search using divide and conquer.
c) Find the time complexity of following algorithm by introducing count variable.
Algorithm add(a, b, c, m, n)
{
for i = 1 to m do
for j = 1 to n do
c[i, j] = a[i, j] + b[i, j];
}
d) What is spanning tree ? What are applications of spanning tree ?

3. Attempt the following : (8×2=16)


a) Write the algorithm and prove that complexity of merge sort is O(n.logn)
(Use the recurrence relation).
OR
a) Find shortest path from 1 to all.

Set Q
15

SLR-TX – 352 -4- *SLRTX352*
b) Write Prim’s algorithm and find minimum cost spanning tree of following
graph.

SECTION – II

4. Attempt any three : (4×3=12)


a) What is tractable and intractable problems ?
b) Find all pair shortest path.

11

c) Write a short note on optimal binary search tree.
d) Solve the 0/1 knapsack instance with n = 3(W1, W2, W3) = (4, 6, 8) and
(P1, P2, P3) = (10, 12, 15) and m = 6 using dynamic programming.

5. Attempt the following : (8×2=16)


a) Consider a set S = {5, 10, 12, 13, 15, 18) and M = 30 solve it for obtaining
sum of subset and also draw state space tree.
OR
a) State and explain Cook’s theorem.
b) Write short note on :
i) 8 queen problem ii) Graph coloring.

_ ___________________
Set Q
*SLRTX352* SLR-TX – 352
Seat
No.
Set R
T.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
DESIGN AND ANALYSIS OF ALGORITHM

Day and Date : Friday, 7-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative for the following : (1×14=14)


1) In this sort, file is divided into subfiles which are to be independently sorted
and then merges
a) quick sort b) heap sort c) bubble sort d) none of these
2) Mean retrieval time is obtained by storing the programs on tape in ________
of their lengths.
a) Non increasing b) Non decreasing
c) Either a) or b) d) Both a) and b)
3) Huffman code is an application of
a) Optimal storage b) Optimal merge
c) Optimal retrieval d) None of above
4) A graph is said to be __________ iff it can be drawn in a plane in such a
way that no two edges cross each other.
a) Planar b) Direct
c) Coloured d) Cross
5) The tree organization of solution space is
a) Answer tree b) State space tree
c) Dynamic tree d) Dead tree
P.T.O.
SLR-TX – 352 -2- *SLRTX352*
6) In n-queen problem two queens are attacking each other it.
a) They are at same diagonal b) They are at same row
c) They are at same column d) All of above
7) Which of the following standard algorithms is not Dynamic Programming
based ?
a) Travelling sales person problem
b) Floyd algorithm for all pair shortest path
c) 0 – 1 knapsack problem
d) Prim’s minimum Spanning tree
8) A _________ is a round trip path along n edges of G that visits every vertex
once and returns to it’s starting position.
a) MST b) TSP
c) Multistage graph d) Hamiltonian Cycle
9) An algorithm that calls itself directly or indirectly is known as
a) Sub algorithm b) Polish algorithm
c) Recursion d) Traversal algorithm
10) In which of the following scheduling process the processing of task on any
processor is not terminated till the task is completed ?
a) Preemptive b) Non preemptive
c) Round-robin d) FIFO
11) Three algorithm do the same task. Algorithm 1 needs O(sqrt(n)) time
algorithm 2 is O(n) and algorithm 3 is O(n.logn). Whch algorithm should
execute faster for large n ?
a) O(sqrt(n)) b) O(n) c) O(n.logn) d) None of these
12) Finite and effective steps, which are when carried out perform certain task
is called as
a) Algorithm b) Pseudo code c) Strategy d) Optimization
13) _______________ method is used for solving recurrence relation.
a) Division b) Replacement c) Substitution d) None of these
14) ______________ can only point to the presence of errors, but not to their
absence.
a) Profiling b) Debugging c) Testing d) Analyzing

____________

Set R
*SLRTX352* -3- SLR-TX – 352
Seat
No.
T.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
DESIGN AND ANALYSIS OF ALGORITHM

Day and Date : Friday, 7-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)


a) Explain Performance Analysis of algorithm.
b) Write algorithm for binary search using divide and conquer.
c) Find the time complexity of following algorithm by introducing count variable.
Algorithm add(a, b, c, m, n)
{
for i = 1 to m do
for j = 1 to n do
c[i, j] = a[i, j] + b[i, j];
}
d) What is spanning tree ? What are applications of spanning tree ?

3. Attempt the following : (8×2=16)


a) Write the algorithm and prove that complexity of merge sort is O(n.logn)
(Use the recurrence relation).
OR
a) Find shortest path from 1 to all.

Set R
15

SLR-TX – 352 -4- *SLRTX352*
b) Write Prim’s algorithm and find minimum cost spanning tree of following
graph.

SECTION – II

4. Attempt any three : (4×3=12)


a) What is tractable and intractable problems ?
b) Find all pair shortest path.

11

c) Write a short note on optimal binary search tree.
d) Solve the 0/1 knapsack instance with n = 3(W1, W2, W3) = (4, 6, 8) and
(P1, P2, P3) = (10, 12, 15) and m = 6 using dynamic programming.

5. Attempt the following : (8×2=16)


a) Consider a set S = {5, 10, 12, 13, 15, 18) and M = 30 solve it for obtaining
sum of subset and also draw state space tree.
OR
a) State and explain Cook’s theorem.
b) Write short note on :
i) 8 queen problem ii) Graph coloring.

_ ___________________
Set R
*SLRTX352* SLR-TX – 352
Seat
No.
Set S
T.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
DESIGN AND ANALYSIS OF ALGORITHM

Day and Date : Friday, 7-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct alternative for the following : (1×14=14)


1) In n-queen problem two queens are attacking each other it.
a) They are at same diagonal b) They are at same row
c) They are at same column d) All of above
2) Which of the following standard algorithms is not Dynamic Programming
based ?
a) Travelling sales person problem
b) Floyd algorithm for all pair shortest path
c) 0 – 1 knapsack problem
d) Prim’s minimum Spanning tree
3) A _________ is a round trip path along n edges of G that visits every vertex
once and returns to it’s starting position.
a) MST b) TSP
c) Multistage graph d) Hamiltonian Cycle
4) An algorithm that calls itself directly or indirectly is known as
a) Sub algorithm b) Polish algorithm
c) Recursion d) Traversal algorithm

P.T.O.
SLR-TX – 352 -2- *SLRTX352*
5) In which of the following scheduling process the processing of task on any
processor is not terminated till the task is completed ?
a) Preemptive b) Non preemptive
c) Round-robin d) FIFO
6) Three algorithm do the same task. Algorithm 1 needs O(sqrt(n)) time
algorithm 2 is O(n) and algorithm 3 is O(n.logn). Whch algorithm should
execute faster for large n ?
a) O(sqrt(n)) b) O(n) c) O(n.logn) d) None of these
7) Finite and effective steps, which are when carried out perform certain task
is called as
a) Algorithm b) Pseudo code c) Strategy d) Optimization
8) _______________ method is used for solving recurrence relation.
a) Division b) Replacement c) Substitution d) None of these
9) ______________ can only point to the presence of errors, but not to their
absence.
a) Profiling b) Debugging c) Testing d) Analyzing
10) In this sort, file is divided into subfiles which are to be independently sorted
and then merges
a) quick sort b) heap sort c) bubble sort d) none of these
11) Mean retrieval time is obtained by storing the programs on tape in ________
of their lengths.
a) Non increasing b) Non decreasing
c) Either a) or b) d) Both a) and b)
12) Huffman code is an application of
a) Optimal storage b) Optimal merge
c) Optimal retrieval d) None of above
13) A graph is said to be __________ iff it can be drawn in a plane in such a
way that no two edges cross each other.
a) Planar b) Direct
c) Coloured d) Cross
14) The tree organization of solution space is
a) Answer tree b) State space tree
c) Dynamic tree d) Dead tree

____________

Set S
*SLRTX352* -3- SLR-TX – 352
Seat
No.
T.E. (CSE) (Part – I) (Old CGPA) Examination, 2018
DESIGN AND ANALYSIS OF ALGORITHM

Day and Date : Friday, 7-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)


a) Explain Performance Analysis of algorithm.
b) Write algorithm for binary search using divide and conquer.
c) Find the time complexity of following algorithm by introducing count variable.
Algorithm add(a, b, c, m, n)
{
for i = 1 to m do
for j = 1 to n do
c[i, j] = a[i, j] + b[i, j];
}
d) What is spanning tree ? What are applications of spanning tree ?

3. Attempt the following : (8×2=16)


a) Write the algorithm and prove that complexity of merge sort is O(n.logn)
(Use the recurrence relation).
OR
a) Find shortest path from 1 to all.

Set S
15

SLR-TX – 352 -4- *SLRTX352*
b) Write Prim’s algorithm and find minimum cost spanning tree of following
graph.

SECTION – II

4. Attempt any three : (4×3=12)


a) What is tractable and intractable problems ?
b) Find all pair shortest path.

11

c) Write a short note on optimal binary search tree.
d) Solve the 0/1 knapsack instance with n = 3(W1, W2, W3) = (4, 6, 8) and
(P1, P2, P3) = (10, 12, 15) and m = 6 using dynamic programming.

5. Attempt the following : (8×2=16)


a) Consider a set S = {5, 10, 12, 13, 15, 18) and M = 30 solve it for obtaining
sum of subset and also draw state space tree.
OR
a) State and explain Cook’s theorem.
b) Write short note on :
i) 8 queen problem ii) Graph coloring.

_ ___________________
Set S
*SLRTX353* SLR-TX – 353
Seat
No.
Set P
T.E. (CSE) (Part – I) (Old) (CGPA) Examination, 2018
COMPUTER ORGANIZATION

Day and Date : Monday, 10-12-2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) Von Neumann was introduced new computer for its predecessors stored
and processed numbers in binary of base 2 form called as
a) ENIAC b) EDVAC c) IBM d) IAS
2) RISC Architecture are based on ___________ control unit.
a) Micro Programmed control unit b) Delay element method
c) Hardwired control unit d) State table method
3) Multiply X, C, C is a
a) Zero address instruction b) One address instruction
c) Two address instruction d) Three address instruction
4) OP A is a
a) EDVAC one address information format
b) ENIVAC one address information format
c) IAS one address information format
d) None of these

P.T.O.
SLR-TX – 353 -2- *SLRTX353*
5) HDL stands for
a) Hardware Definition Language b) Hardware Description Language
c) Hardware Domain Language d) None of these
6) PLA in hardwired control unit design stands for
a) Parallel architecture b) Parallel loop array
c) Programmable logic arrays d) Parallel loop architecture
7) What does the hardwired control generator consist of ?
a) Decoder/encoder b) Condition codes
c) Control step counter d) All of the above
8) The average time tA for the CPU to access a word in the two level
memory is given by
a) tA = (1 + H)tA1 + HtA2 b) tA = (1 – H)tA1 + HtA2
c) tA = HtA1 – (1 + H)tA2 d) tA = HtA1 + (1 – H)tA2
9) The most significant bits of address of memory that are used for
comparison are called
a) Index b) Offset c) Tag d) Word
10) A single instruction replacing multiple (scalar) instructions is a
characteristic of which processor ?
a) Multiprocessor b) Uniprocessor
c) Concurrent processor d) Vector processor
11) Linear pipeline applied in case of
a) Instruction execution b) Arithmetic computation
c) Memory access operation d) All
12) Consider two instructions i and j, with i occuring before j. If j tries to read
a source before i writes it, then type of hazard is
a) RAW b) WAW c) WAR d) None
13) In memory-mapped I/O
a) The I/O devices and the memory share the same address space
b) The I/O devices have a separate address space
c) The memory and I/O devices have an associated address space
d) A part of the memory is specifically set aside for the I/O operation
14) The method which offers higher speeds of I/O transfer is
a) Interrupts b) Memory mapping
c) Program-controlled I/O d) DMA

_____________

Set P
*SLRTX353* -3- SLR-TX – 353
Seat
No.
T.E. (CSE) (Part – I) (Old) (CGPA) Examination, 2018
COMPUTER ORGANIZATION

Day and Date : Monday, 10-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three : (3�4=12)


1) What are the functional units of computer ? Define the function of each
functional unit ? How functional units are arranged in computer ?
2) Perform (–8 * 2) using Booth’s algorithm ?
3) Compute X2 by the method of difference represent computation and
corresponding difference engine configuration ?
4) Solve the division by restoring method 7/3.
5) Write a program to evaluate operation X =A*B + C*C using zero, one
address machine instruction.

3. Solve any two : (2�8=16)


1) Draw and explain the structure of Babbage’s analytical engine.
2) Represent (1259.125)10 in single precision and double precision format.
3) Explain the sequence counter method of hardwired control unit ?

SECTION – II

4. Solve any three : (3�4=12)


1) Write a short note on Cache Read Operation.
2) Explain with neat diagram I/O interfaces with modes of transfer.
3) Differentiate linear and non linear pipelining.
4) What is least recently used replacement policy ? Explain with example.

Set P
SLR-TX – 353 -4- *SLRTX353*
5. Solve any two : (2�8=16)
1) Draw and explain DMA function.
2) Explain with example non-preemptive main memory allocation.
3) Define pipeline Hazard and list the pipelining hazards ? Explain each
type of hazards in details.

_____________

Set P
*SLRTX353* SLR-TX – 353
Seat
No.
Set Q
T.E. (CSE) (Part – I) (Old) (CGPA) Examination, 2018
COMPUTER ORGANIZATION

Day and Date : Monday, 10-12-2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) The average time tA for the CPU to access a word in the two level
memory is given by
a) tA = (1 + H)tA1 + HtA2 b) tA = (1 – H)tA1 + HtA2
c) tA = HtA1 – (1 + H)tA2 d) tA = HtA1 + (1 – H)tA2
2) The most significant bits of address of memory that are used for
comparison are called
a) Index b) Offset c) Tag d) Word
3) A single instruction replacing multiple (scalar) instructions is a
characteristic of which processor ?
a) Multiprocessor b) Uniprocessor
c) Concurrent processor d) Vector processor
4) Linear pipeline applied in case of
a) Instruction execution b) Arithmetic computation
c) Memory access operation d) All
5) Consider two instructions i and j, with i occuring before j. If j tries to read
a source before i writes it, then type of hazard is
a) RAW b) WAW c) WAR d) None

P.T.O.
SLR-TX – 353 -2- *SLRTX353*
6) In memory-mapped I/O
a) The I/O devices and the memory share the same address space
b) The I/O devices have a separate address space
c) The memory and I/O devices have an associated address space
d) A part of the memory is specifically set aside for the I/O operation
7) The method which offers higher speeds of I/O transfer is
a) Interrupts b) Memory mapping
c) Program-controlled I/O d) DMA
8) Von Neumann was introduced new computer for its predecessors stored
and processed numbers in binary of base 2 form called as
a) ENIAC b) EDVAC c) IBM d) IAS
9) RISC Architecture are based on ___________ control unit.
a) Micro Programmed control unit b) Delay element method
c) Hardwired control unit d) State table method
10) Multiply X, C, C is a
a) Zero address instruction b) One address instruction
c) Two address instruction d) Three address instruction
11) OP A is a
a) EDVAC one address information format
b) ENIVAC one address information format
c) IAS one address information format
d) None of these
12) HDL stands for
a) Hardware Definition Language b) Hardware Description Language
c) Hardware Domain Language d) None of these
13) PLA in hardwired control unit design stands for
a) Parallel architecture b) Parallel loop array
c) Programmable logic arrays d) Parallel loop architecture
14) What does the hardwired control generator consist of ?
a) Decoder/encoder b) Condition codes
c) Control step counter d) All of the above

_____________

Set Q
*SLRTX353* -3- SLR-TX – 353
Seat
No.
T.E. (CSE) (Part – I) (Old) (CGPA) Examination, 2018
COMPUTER ORGANIZATION

Day and Date : Monday, 10-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three : (3�4=12)


1) What are the functional units of computer ? Define the function of each
functional unit ? How functional units are arranged in computer ?
2) Perform (–8 * 2) using Booth’s algorithm ?
3) Compute X2 by the method of difference represent computation and
corresponding difference engine configuration ?
4) Solve the division by restoring method 7/3.
5) Write a program to evaluate operation X =A*B + C*C using zero, one
address machine instruction.

3. Solve any two : (2�8=16)


1) Draw and explain the structure of Babbage’s analytical engine.
2) Represent (1259.125)10 in single precision and double precision format.
3) Explain the sequence counter method of hardwired control unit ?

SECTION – II

4. Solve any three : (3�4=12)


1) Write a short note on Cache Read Operation.
2) Explain with neat diagram I/O interfaces with modes of transfer.
3) Differentiate linear and non linear pipelining.
4) What is least recently used replacement policy ? Explain with example.

Set Q
SLR-TX – 353 -4- *SLRTX353*
5. Solve any two : (2�8=16)
1) Draw and explain DMA function.
2) Explain with example non-preemptive main memory allocation.
3) Define pipeline Hazard and list the pipelining hazards ? Explain each
type of hazards in details.

_____________

Set Q
*SLRTX353* SLR-TX – 353
Seat
No.
Set R
T.E. (CSE) (Part – I) (Old) (CGPA) Examination, 2018
COMPUTER ORGANIZATION

Day and Date : Monday, 10-12-2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) HDL stands for
a) Hardware Definition Language b) Hardware Description Language
c) Hardware Domain Language d) None of these
2) PLA in hardwired control unit design stands for
a) Parallel architecture b) Parallel loop array
c) Programmable logic arrays d) Parallel loop architecture
3) What does the hardwired control generator consist of ?
a) Decoder/encoder b) Condition codes
c) Control step counter d) All of the above
4) The average time tA for the CPU to access a word in the two level
memory is given by
a) tA = (1 + H)tA1 + HtA2 b) tA = (1 – H)tA1 + HtA2
c) tA = HtA1 – (1 + H)tA2 d) tA = HtA1 + (1 – H)tA2
5) The most significant bits of address of memory that are used for
comparison are called
a) Index b) Offset c) Tag d) Word

P.T.O.
SLR-TX – 353 -2- *SLRTX353*
6) A single instruction replacing multiple (scalar) instructions is a
characteristic of which processor ?
a) Multiprocessor b) Uniprocessor
c) Concurrent processor d) Vector processor
7) Linear pipeline applied in case of
a) Instruction execution b) Arithmetic computation
c) Memory access operation d) All
8) Consider two instructions i and j, with i occuring before j. If j tries to read
a source before i writes it, then type of hazard is
a) RAW b) WAW c) WAR d) None
9) In memory-mapped I/O
a) The I/O devices and the memory share the same address space
b) The I/O devices have a separate address space
c) The memory and I/O devices have an associated address space
d) A part of the memory is specifically set aside for the I/O operation
10) The method which offers higher speeds of I/O transfer is
a) Interrupts b) Memory mapping
c) Program-controlled I/O d) DMA
11) Von Neumann was introduced new computer for its predecessors stored
and processed numbers in binary of base 2 form called as
a) ENIAC b) EDVAC c) IBM d) IAS
12) RISC Architecture are based on ___________ control unit.
a) Micro Programmed control unit b) Delay element method
c) Hardwired control unit d) State table method
13) Multiply X, C, C is a
a) Zero address instruction b) One address instruction
c) Two address instruction d) Three address instruction
14) OP A is a
a) EDVAC one address information format
b) ENIVAC one address information format
c) IAS one address information format
d) None of these

_____________

Set R
*SLRTX353* -3- SLR-TX – 353
Seat
No.
T.E. (CSE) (Part – I) (Old) (CGPA) Examination, 2018
COMPUTER ORGANIZATION

Day and Date : Monday, 10-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three : (3�4=12)


1) What are the functional units of computer ? Define the function of each
functional unit ? How functional units are arranged in computer ?
2) Perform (–8 * 2) using Booth’s algorithm ?
3) Compute X2 by the method of difference represent computation and
corresponding difference engine configuration ?
4) Solve the division by restoring method 7/3.
5) Write a program to evaluate operation X =A*B + C*C using zero, one
address machine instruction.

3. Solve any two : (2�8=16)


1) Draw and explain the structure of Babbage’s analytical engine.
2) Represent (1259.125)10 in single precision and double precision format.
3) Explain the sequence counter method of hardwired control unit ?

SECTION – II

4. Solve any three : (3�4=12)


1) Write a short note on Cache Read Operation.
2) Explain with neat diagram I/O interfaces with modes of transfer.
3) Differentiate linear and non linear pipelining.
4) What is least recently used replacement policy ? Explain with example.

Set R
SLR-TX – 353 -4- *SLRTX353*
5. Solve any two : (2�8=16)
1) Draw and explain DMA function.
2) Explain with example non-preemptive main memory allocation.
3) Define pipeline Hazard and list the pipelining hazards ? Explain each
type of hazards in details.

_____________

Set R
*SLRTX353* SLR-TX – 353
Seat
No.
Set S
T.E. (CSE) (Part – I) (Old) (CGPA) Examination, 2018
COMPUTER ORGANIZATION

Day and Date : Monday, 10-12-2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer :


1) A single instruction replacing multiple (scalar) instructions is a
characteristic of which processor ?
a) Multiprocessor b) Uniprocessor
c) Concurrent processor d) Vector processor
2) Linear pipeline applied in case of
a) Instruction execution b) Arithmetic computation
c) Memory access operation d) All
3) Consider two instructions i and j, with i occuring before j. If j tries to read
a source before i writes it, then type of hazard is
a) RAW b) WAW c) WAR d) None
4) In memory-mapped I/O
a) The I/O devices and the memory share the same address space
b) The I/O devices have a separate address space
c) The memory and I/O devices have an associated address space
d) A part of the memory is specifically set aside for the I/O operation
5) The method which offers higher speeds of I/O transfer is
a) Interrupts b) Memory mapping
c) Program-controlled I/O d) DMA
P.T.O.
SLR-TX – 353 -2- *SLRTX353*
6) Von Neumann was introduced new computer for its predecessors stored
and processed numbers in binary of base 2 form called as
a) ENIAC b) EDVAC c) IBM d) IAS
7) RISC Architecture are based on ___________ control unit.
a) Micro Programmed control unit b) Delay element method
c) Hardwired control unit d) State table method
8) Multiply X, C, C is a
a) Zero address instruction b) One address instruction
c) Two address instruction d) Three address instruction
9) OP A is a
a) EDVAC one address information format
b) ENIVAC one address information format
c) IAS one address information format
d) None of these
10) HDL stands for
a) Hardware Definition Language b) Hardware Description Language
c) Hardware Domain Language d) None of these
11) PLA in hardwired control unit design stands for
a) Parallel architecture b) Parallel loop array
c) Programmable logic arrays d) Parallel loop architecture
12) What does the hardwired control generator consist of ?
a) Decoder/encoder b) Condition codes
c) Control step counter d) All of the above
13) The average time tA for the CPU to access a word in the two level
memory is given by
a) tA = (1 + H)tA1 + HtA2 b) tA = (1 – H)tA1 + HtA2
c) tA = HtA1 – (1 + H)tA2 d) tA = HtA1 + (1 – H)tA2
14) The most significant bits of address of memory that are used for
comparison are called
a) Index b) Offset c) Tag d) Word

_____________

Set S
*SLRTX353* -3- SLR-TX – 353
Seat
No.
T.E. (CSE) (Part – I) (Old) (CGPA) Examination, 2018
COMPUTER ORGANIZATION

Day and Date : Monday, 10-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Solve any three : (3�4=12)


1) What are the functional units of computer ? Define the function of each
functional unit ? How functional units are arranged in computer ?
2) Perform (–8 * 2) using Booth’s algorithm ?
3) Compute X2 by the method of difference represent computation and
corresponding difference engine configuration ?
4) Solve the division by restoring method 7/3.
5) Write a program to evaluate operation X =A*B + C*C using zero, one
address machine instruction.

3. Solve any two : (2�8=16)


1) Draw and explain the structure of Babbage’s analytical engine.
2) Represent (1259.125)10 in single precision and double precision format.
3) Explain the sequence counter method of hardwired control unit ?

SECTION – II

4. Solve any three : (3�4=12)


1) Write a short note on Cache Read Operation.
2) Explain with neat diagram I/O interfaces with modes of transfer.
3) Differentiate linear and non linear pipelining.
4) What is least recently used replacement policy ? Explain with example.

Set S
SLR-TX – 353 -4- *SLRTX353*
5. Solve any two : (2�8=16)
1) Draw and explain DMA function.
2) Explain with example non-preemptive main memory allocation.
3) Define pipeline Hazard and list the pipelining hazards ? Explain each
type of hazards in details.

_____________

Set S
*SLRTX359* SLR-TX – 359
Seat
No.
Set P
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
DATABASE ENGINEERING

Day and Date : Monday, 19-11-2018 Total Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Logical level describes ____________ data are stored in the database.
a) Which b) What c) How d) All
2) AS clause is used in SQL for
a) Selection b) Projection c) Rename d) None
3) Relational Algebra is
a) Procedural Language b) Non-procedural Language
c) Data High Level Language d) None
4) Structure of the database can be changed using _____________ statement.
a) CREATE b) MODIFY c) MAKE d) ALTER
5) Which of the following is true for BCNF ?
a) α→ β must always be non-trivial
b) α is not a superkey
c) Not every BCNF decomposition is dependency preserving
d) None
P.T.O.
SLR-TX – 359 -2- *SLRTX359*
6) Which of the following is not a drawback of bad database design ?
a) Repetition of Information b) Null Values
c) Inability to represent Data d) Redundancy Reduction
7) Which of the following is not a rule for finding Closure of Set of Functional
Dependency ?
a) Transitivity b) Associativity
c) Reflexivity d) Pseudo transitivity
8) Secondary Index is
a) Sparse b) Dense
c) Both a) and b) d) None
9) Which of the following is a reason for Bucket Overflow ?
a) Insufficient number of buckets b) Skew in record distribution
c) Both a) and b) d) None
10) The point in the schedule where the transaction obtains its final lock is called as
a) Final Point b) End Point c) Lock Point d) All
11) Two-Phase Locking Protocol ensures
a) Serializability b) Freedom from Deadlocks
c) Cascadeless Schedule d) None
12) Which of the following is a factor for selecting a particular transaction as a
victim if deadlock has occurred ?
a) How long transaction has computed
b) How many data items transaction has used
c) How many more data items transaction needs
d) All
13) For a set N transactions, which of the following is true ?
a) There will be more N ! Serial Schedules
b) There will be N ! Serial Schedules
c) There will be (N-1)/2 Serial Schedules
d) There will be N/2 Serial Schedules
14) Which of the following is not a log record ?
a) <T COMMIT> b) <T START>
c) <T ABORT> d) <T ROLLBACK>
Set P
____________

*SLRTX359* -3- SLR-TX – 359
Seat
No.
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
DATABASE ENGINEERING

Day and Date : Monday, 19-11-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any three of the following : (3×4=12)


a) Explain different types of Attributes.
b) Explain Specialization and Generalization.
c) Define and explain Second Normal Form.
d) Explain the following terms :
i) Weak Entity Set
ii) Total Participation
iii) Partial Participation
iv) Foreign Key.

3. Explain Lossless Decomposition and Dependency Preservation. 8


OR

3. What is Functional Dependency ? What is the use of Closure of Set of Attributes ?


Explain the procedure to find Closure of Set of attributes. Find (AG)+ for the
following example.
R = (A, B, C, G, H, I)
F = {A → B
A→C
CG → H
CG → I
B → H}

4. List and explain the drawbacks of File System. 8


Set P
SLR-TX – 359 -4- *SLRTX359*
SECTION – II

5. Attempt any three of the following : (3×4=12)


a) Explain the structure of Leaf and Non-leaf Node of B+ Tree Index.
b) Explain different states of transaction with neat diagram.
c) Explain different types of locks with compatibility matrix and example.
d) What is Conflict Serializability ? Show that a Concurrent Schedule is
Conflict serializable with an example.

6. Example Recoverable and Cascadeless Schedules. 8


OR

6. Explain the following terms with example :


i) Primary Index
ii) Clustering Index
iii) Secondary Index
iv) Hash File Organization.

7. Explain Two-Phase Locking Protocol. What are its disadvantages ? Explain


its two variations. 8

_________________

Set P
*SLRTX359* SLR-TX – 359
Seat
No.
Set Q
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
DATABASE ENGINEERING

Day and Date : Monday, 19-11-2018 Total Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Secondary Index is
a) Sparse b) Dense
c) Both a) and b) d) None
2) Which of the following is a reason for Bucket Overflow ?
a) Insufficient number of buckets b) Skew in record distribution
c) Both a) and b) d) None
3) The point in the schedule where the transaction obtains its final lock is called as
a) Final Point b) End Point c) Lock Point d) All
4) Two-Phase Locking Protocol ensures
a) Serializability b) Freedom from Deadlocks
c) Cascadeless Schedule d) None
5) Which of the following is a factor for selecting a particular transaction as a
victim if deadlock has occurred ?
a) How long transaction has computed
b) How many data items transaction has used
c) How many more data items transaction needs
d) All
P.T.O.
SLR-TX – 359 -2- *SLRTX359*
6) For a set N transactions, which of the following is true ?
a) There will be more N ! Serial Schedules
b) There will be N ! Serial Schedules
c) There will be (N-1)/2 Serial Schedules
d) There will be N/2 Serial Schedules
7) Which of the following is not a log record ?
a) <T COMMIT> b) <T START>
c) <T ABORT> d) <T ROLLBACK>
8) Logical level describes ____________ data are stored in the database.
a) Which b) What c) How d) All
9) AS clause is used in SQL for
a) Selection b) Projection c) Rename d) None
10) Relational Algebra is
a) Procedural Language b) Non-procedural Language
c) Data High Level Language d) None
11) Structure of the database can be changed using _____________ statement.
a) CREATE b) MODIFY c) MAKE d) ALTER
12) Which of the following is true for BCNF ?
a) α→ β must always be non-trivial
b) α is not a superkey
c) Not every BCNF decomposition is dependency preserving
d) None
13) Which of the following is not a drawback of bad database design ?
a) Repetition of Information b) Null Values
c) Inability to represent Data d) Redundancy Reduction
14) Which of the following is not a rule for finding Closure of Set of Functional
Dependency ?
a) Transitivity b) Associativity
c) Reflexivity d) Pseudo transitivity

____________

Set Q
*SLRTX359* -3- SLR-TX – 359
Seat
No.
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
DATABASE ENGINEERING

Day and Date : Monday, 19-11-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any three of the following : (3×4=12)


a) Explain different types of Attributes.
b) Explain Specialization and Generalization.
c) Define and explain Second Normal Form.
d) Explain the following terms :
i) Weak Entity Set
ii) Total Participation
iii) Partial Participation
iv) Foreign Key.

3. Explain Lossless Decomposition and Dependency Preservation. 8


OR

3. What is Functional Dependency ? What is the use of Closure of Set of Attributes ?


Explain the procedure to find Closure of Set of attributes. Find (AG)+ for the
following example.
R = (A, B, C, G, H, I)
F = {A → B
A→C
CG → H
CG → I
B → H}

4. List and explain the drawbacks of File System. 8


Set Q
SLR-TX – 359 -4- *SLRTX359*
SECTION – II

5. Attempt any three of the following : (3×4=12)


a) Explain the structure of Leaf and Non-leaf Node of B+ Tree Index.
b) Explain different states of transaction with neat diagram.
c) Explain different types of locks with compatibility matrix and example.
d) What is Conflict Serializability ? Show that a Concurrent Schedule is
Conflict serializable with an example.

6. Example Recoverable and Cascadeless Schedules. 8


OR

6. Explain the following terms with example :


i) Primary Index
ii) Clustering Index
iii) Secondary Index
iv) Hash File Organization.

7. Explain Two-Phase Locking Protocol. What are its disadvantages ? Explain


its two variations. 8

_________________

Set Q
*SLRTX359* SLR-TX – 359
Seat
No.
Set R
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
DATABASE ENGINEERING

Day and Date : Monday, 19-11-2018 Total Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Which of the following is true for BCNF ?
a) α→ β must always be non-trivial
b) α is not a superkey
c) Not every BCNF decomposition is dependency preserving
d) None
2) Which of the following is not a drawback of bad database design ?
a) Repetition of Information b) Null Values
c) Inability to represent Data d) Redundancy Reduction
3) Which of the following is not a rule for finding Closure of Set of Functional
Dependency ?
a) Transitivity b) Associativity
c) Reflexivity d) Pseudo transitivity
4) Secondary Index is
a) Sparse b) Dense
c) Both a) and b) d) None P.T.O.
SLR-TX – 359 -2- *SLRTX359*
5) Which of the following is a reason for Bucket Overflow ?
a) Insufficient number of buckets b) Skew in record distribution
c) Both a) and b) d) None
6) The point in the schedule where the transaction obtains its final lock is called as
a) Final Point b) End Point c) Lock Point d) All
7) Two-Phase Locking Protocol ensures
a) Serializability b) Freedom from Deadlocks
c) Cascadeless Schedule d) None
8) Which of the following is a factor for selecting a particular transaction as a
victim if deadlock has occurred ?
a) How long transaction has computed
b) How many data items transaction has used
c) How many more data items transaction needs
d) All
9) For a set N transactions, which of the following is true ?
a) There will be more N ! Serial Schedules
b) There will be N ! Serial Schedules
c) There will be (N-1)/2 Serial Schedules
d) There will be N/2 Serial Schedules
10) Which of the following is not a log record ?
a) <T COMMIT> b) <T START>
c) <T ABORT> d) <T ROLLBACK>
11) Logical level describes ____________ data are stored in the database.
a) Which b) What c) How d) All
12) AS clause is used in SQL for
a) Selection b) Projection c) Rename d) None
13) Relational Algebra is
a) Procedural Language b) Non-procedural Language
c) Data High Level Language d) None
14) Structure of the database can be changed using _____________ statement.
a) CREATE b) MODIFY c) MAKE d) ALTER

____________ Set R

*SLRTX359* -3- SLR-TX – 359
Seat
No.
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
DATABASE ENGINEERING

Day and Date : Monday, 19-11-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any three of the following : (3×4=12)


a) Explain different types of Attributes.
b) Explain Specialization and Generalization.
c) Define and explain Second Normal Form.
d) Explain the following terms :
i) Weak Entity Set
ii) Total Participation
iii) Partial Participation
iv) Foreign Key.

3. Explain Lossless Decomposition and Dependency Preservation. 8


OR

3. What is Functional Dependency ? What is the use of Closure of Set of Attributes ?


Explain the procedure to find Closure of Set of attributes. Find (AG)+ for the
following example.
R = (A, B, C, G, H, I)
F = {A → B
A→C
CG → H
CG → I
B → H}

4. List and explain the drawbacks of File System. 8


Set R
SLR-TX – 359 -4- *SLRTX359*
SECTION – II

5. Attempt any three of the following : (3×4=12)


a) Explain the structure of Leaf and Non-leaf Node of B+ Tree Index.
b) Explain different states of transaction with neat diagram.
c) Explain different types of locks with compatibility matrix and example.
d) What is Conflict Serializability ? Show that a Concurrent Schedule is
Conflict serializable with an example.

6. Example Recoverable and Cascadeless Schedules. 8


OR

6. Explain the following terms with example :


i) Primary Index
ii) Clustering Index
iii) Secondary Index
iv) Hash File Organization.

7. Explain Two-Phase Locking Protocol. What are its disadvantages ? Explain


its two variations. 8

_________________

Set R
*SLRTX359* SLR-TX – 359
Seat
No.
Set S
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
DATABASE ENGINEERING

Day and Date : Monday, 19-11-2018 Total Marks : 70


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) The point in the schedule where the transaction obtains its final lock is called as
a) Final Point b) End Point c) Lock Point d) All
2) Two-Phase Locking Protocol ensures
a) Serializability b) Freedom from Deadlocks
c) Cascadeless Schedule d) None
3) Which of the following is a factor for selecting a particular transaction as a
victim if deadlock has occurred ?
a) How long transaction has computed
b) How many data items transaction has used
c) How many more data items transaction needs
d) All
4) For a set N transactions, which of the following is true ?
a) There will be more N ! Serial Schedules
b) There will be N ! Serial Schedules
P.T.O.
SLR-TX – 359 -2- *SLRTX359*
c) There will be (N-1)/2 Serial Schedules
d) There will be N/2 Serial Schedules
5) Which of the following is not a log record ?
a) <T COMMIT> b) <T START>
c) <T ABORT> d) <T ROLLBACK>
6) Logical level describes ____________ data are stored in the database.
a) Which b) What c) How d) All
7) AS clause is used in SQL for
a) Selection b) Projection c) Rename d) None
8) Relational Algebra is
a) Procedural Language b) Non-procedural Language
c) Data High Level Language d) None
9) Structure of the database can be changed using _____________ statement.
a) CREATE b) MODIFY c) MAKE d) ALTER
10) Which of the following is true for BCNF ?
a) α→ β must always be non-trivial
b) α is not a superkey
c) Not every BCNF decomposition is dependency preserving
d) None
11) Which of the following is not a drawback of bad database design ?
a) Repetition of Information b) Null Values
c) Inability to represent Data d) Redundancy Reduction
12) Which of the following is not a rule for finding Closure of Set of Functional
Dependency ?
a) Transitivity b) Associativity
c) Reflexivity d) Pseudo transitivity
13) Secondary Index is
a) Sparse b) Dense
c) Both a) and b) d) None
14) Which of the following is a reason for Bucket Overflow ?
a) Insufficient number of buckets b) Skew in record distribution
c) Both a) and b) d) None Set S

____________

*SLRTX359* -3- SLR-TX – 359
Seat
No.
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
DATABASE ENGINEERING

Day and Date : Monday, 19-11-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any three of the following : (3×4=12)


a) Explain different types of Attributes.
b) Explain Specialization and Generalization.
c) Define and explain Second Normal Form.
d) Explain the following terms :
i) Weak Entity Set
ii) Total Participation
iii) Partial Participation
iv) Foreign Key.

3. Explain Lossless Decomposition and Dependency Preservation. 8


OR

3. What is Functional Dependency ? What is the use of Closure of Set of Attributes ?


Explain the procedure to find Closure of Set of attributes. Find (AG)+ for the
following example.
R = (A, B, C, G, H, I)
F = {A → B
A→C
CG → H
CG → I
B → H}

4. List and explain the drawbacks of File System. 8


Set S
SLR-TX – 359 -4- *SLRTX359*
SECTION – II

5. Attempt any three of the following : (3×4=12)


a) Explain the structure of Leaf and Non-leaf Node of B+ Tree Index.
b) Explain different states of transaction with neat diagram.
c) Explain different types of locks with compatibility matrix and example.
d) What is Conflict Serializability ? Show that a Concurrent Schedule is
Conflict serializable with an example.

6. Example Recoverable and Cascadeless Schedules. 8


OR

6. Explain the following terms with example :


i) Primary Index
ii) Clustering Index
iii) Secondary Index
iv) Hash File Organization.

7. Explain Two-Phase Locking Protocol. What are its disadvantages ? Explain


its two variations. 8

_________________

Set S
*SLRTX360* SLR-TX – 360

Seat
No. Set P
T.E. (CSE) (Part – II) (CGPA Pattern) Examination, 2018
compiler construction
Day and Date : Tuesday, 20-11-2018 Total Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (1×14=14)


1) The lexical analyzer takes ________ as input and produces a stream of
________ as output.
a) Source program, tokens b) Tokens, source program
c) Both a) and b) d) None of the above
2) Parsing is also known as
a) Syntax analysis b) Semantic analysis
c) Lexical analysis d) Code generation
3) Shift reduce parsers are
a) Top down parsers
b) Bottom up parser
c) May be top down or bottom up parser
d) None of the above
4) Type checking is normally done during
a) Lexical analysis b) Syntax analysis
c) Syntax directed translation d) Code optimization
5) ________ is a graphical representation of a derivation.
a) The parse tree b) The oct tree
c) The binary tree d) None of the above

P.T.O.
SLR-TX – 360 -2- *SLRTX360*

6) Which of the following parser is most powerful ?


a) Operator precedence b) Canonical LR
c) LALR d) SLR
7) lnherited attribute is a natural choice in
a) Keeping track of variable declaration
b) Checking for the correct use of L values and R values
c) Both a) and b)
d) None of these
8) LR stands for
a) Left to Right
b) Left to Right reduction
c) Right to Left
d) Left to right and Right most derivation in reverse
9) An intermediate code form is
a) Postfix notation b) Syntax trees
c) Three address code d) All of the above
10) Intermediate code generation phase gets input from
a) Lexical analyser b) Syntax analyser
c) Semantic analyser d) Error handling
11) We can optimize code by
a) Dead code elimination b) Common subprograms
c) Copy intermediate loop d) Loop declaration
12) Which of the following is not the function preserving transforming ?
a) Copy propagation b) Dead code elimination
c) Constant folding d) Elimination of left recursion
13) Peephole optimization is a __________ technique.
a) Machine dependant local optimization
b) Global optimization
c) Machine independent local optimization
d) None of the above
14) Which of the following is not the storage allocation strategy ?
a) Stack b) Static c) Linked list d) Heap
______________

Set P
*SLRTX360* -3- SLR-TX – 360
Seat
No.

T.E. (CSE) (Part – II) (CGPA Pattern) Examination, 2018


compiler construction
Day and Date : Tuesday, 20-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Assume suitable data if necessary.
3) Figures to the right indicate full marks.

SECTION – I

2. Attempt any three : (4×3=12)


a) Explain the language processors with diagrams.
b) Describe the following terms with examples.
1) Token 2) Pattern 3) Lexeme
c) Draw a transition diagram that recognizes the lexeme matching the token
relop.
d) Find FIRST and FOLLOW for the following grammar.
E → TE’
E’ → + TE’ | ε
T → FT’
T’ → ∗ FT’ | ε
F → (E)
F → id

3. Attempt any one : 8


a) Explain shift reduce parser with all four actions and perform SR parsing of
input string “id1-id2∗id3” by considering following grammar
E → E-E
E → E∗E
E → id

Set P
SLR-TX – 360 -4- *SLRTX360*

b) Write short note on :


i) Ambiguity of grammar
ii) S-attributed definition
iii) L-attributed definition
iv) Syntax directed translation schemes.

4. Sketch and explain all phases of compiler with example. 8

SECTION – II

5. Attempt any three : (4×3=12)


a) State and explain types of intermediate code representations.
b) Generate optimized three address code for an expression.
x = a + b∗c + d
Assume x and a as real and b, c and d are integer.
c) State and explain any four issues in the machine code generation.
d) Note on register allocation and assignment.

6. Attempt any one : 8


a) Explain principle sources of optimization.
b) Write an algorithm for partitioning into basic blocks by considering following
program code.
prod = 0;
i = 1;
do
{
prod=prod+a[i]∗b[i];
i=i+1;
}while(i<=10);

7. Explain peephole optimization with example. 8

____________

Set P
*SLRTX360* SLR-TX – 360

Seat
No. Set Q
T.E. (CSE) (Part – II) (CGPA Pattern) Examination, 2018
compiler construction
Day and Date : Tuesday, 20-11-2018 Total Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (1×14=14)


1) LR stands for
a) Left to Right
b) Left to Right reduction
c) Right to Left
d) Left to right and Right most derivation in reverse
2) An intermediate code form is
a) Postfix notation b) Syntax trees
c) Three address code d) All of the above
3) Intermediate code generation phase gets input from
a) Lexical analyser b) Syntax analyser
c) Semantic analyser d) Error handling
4) We can optimize code by
a) Dead code elimination b) Common subprograms
c) Copy intermediate loop d) Loop declaration
5) Which of the following is not the function preserving transforming ?
a) Copy propagation b) Dead code elimination
c) Constant folding d) Elimination of left recursion
P.T.O.
SLR-TX – 360 -2- *SLRTX360*

6) Peephole optimization is a __________ technique.


a) Machine dependant local optimization
b) Global optimization
c) Machine independent local optimization
d) None of the above
7) Which of the following is not the storage allocation strategy ?
a) Stack b) Static c) Linked list d) Heap
8) The lexical analyzer takes ________ as input and produces a stream of
________ as output.
a) Source program, tokens b) Tokens, source program
c) Both a) and b) d) None of the above
9) Parsing is also known as
a) Syntax analysis b) Semantic analysis
c) Lexical analysis d) Code generation
10) Shift reduce parsers are
a) Top down parsers
b) Bottom up parser
c) May be top down or bottom up parser
d) None of the above
11) Type checking is normally done during
a) Lexical analysis b) Syntax analysis
c) Syntax directed translation d) Code optimization
12) ________ is a graphical representation of a derivation.
a) The parse tree b) The oct tree
c) The binary tree d) None of the above
13) Which of the following parser is most powerful ?
a) Operator precedence b) Canonical LR
c) LALR d) SLR
14) lnherited attribute is a natural choice in
a) Keeping track of variable declaration
b) Checking for the correct use of L values and R values
c) Both a) and b)
d) None of these
______________
Set Q
*SLRTX360* -3- SLR-TX – 360
Seat
No.

T.E. (CSE) (Part – II) (CGPA Pattern) Examination, 2018


compiler construction
Day and Date : Tuesday, 20-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Assume suitable data if necessary.
3) Figures to the right indicate full marks.

SECTION – I

2. Attempt any three : (4×3=12)


a) Explain the language processors with diagrams.
b) Describe the following terms with examples.
1) Token 2) Pattern 3) Lexeme
c) Draw a transition diagram that recognizes the lexeme matching the token
relop.
d) Find FIRST and FOLLOW for the following grammar.
E → TE’
E’ → + TE’ | ε
T → FT’
T’ → ∗ FT’ | ε
F → (E)
F → id

3. Attempt any one : 8


a) Explain shift reduce parser with all four actions and perform SR parsing of
input string “id1-id2∗id3” by considering following grammar
E → E-E
E → E∗E
E → id

Set Q
SLR-TX – 360 -4- *SLRTX360*

b) Write short note on :


i) Ambiguity of grammar
ii) S-attributed definition
iii) L-attributed definition
iv) Syntax directed translation schemes.

4. Sketch and explain all phases of compiler with example. 8

SECTION – II

5. Attempt any three : (4×3=12)


a) State and explain types of intermediate code representations.
b) Generate optimized three address code for an expression.
x = a + b∗c + d
Assume x and a as real and b, c and d are integer.
c) State and explain any four issues in the machine code generation.
d) Note on register allocation and assignment.

6. Attempt any one : 8


a) Explain principle sources of optimization.
b) Write an algorithm for partitioning into basic blocks by considering following
program code.
prod = 0;
i = 1;
do
{
prod=prod+a[i]∗b[i];
i=i+1;
}while(i<=10);

7. Explain peephole optimization with example. 8

____________

Set Q
*SLRTX360* SLR-TX – 360

Seat
No. Set R
T.E. (CSE) (Part – II) (CGPA Pattern) Examination, 2018
compiler construction
Day and Date : Tuesday, 20-11-2018 Total Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (1×14=14)


1) ________ is a graphical representation of a derivation.
a) The parse tree b) The oct tree
c) The binary tree d) None of the above
2) Which of the following parser is most powerful ?
a) Operator precedence b) Canonical LR
c) LALR d) SLR
3) lnherited attribute is a natural choice in
a) Keeping track of variable declaration
b) Checking for the correct use of L values and R values
c) Both a) and b)
d) None of these
4) LR stands for
a) Left to Right
b) Left to Right reduction
c) Right to Left
d) Left to right and Right most derivation in reverse

P.T.O.
SLR-TX – 360 -2- *SLRTX360*

5) An intermediate code form is


a) Postfix notation b) Syntax trees
c) Three address code d) All of the above
6) Intermediate code generation phase gets input from
a) Lexical analyser b) Syntax analyser
c) Semantic analyser d) Error handling
7) We can optimize code by
a) Dead code elimination b) Common subprograms
c) Copy intermediate loop d) Loop declaration
8) Which of the following is not the function preserving transforming ?
a) Copy propagation b) Dead code elimination
c) Constant folding d) Elimination of left recursion
9) Peephole optimization is a __________ technique.
a) Machine dependant local optimization
b) Global optimization
c) Machine independent local optimization
d) None of the above
10) Which of the following is not the storage allocation strategy ?
a) Stack b) Static c) Linked list d) Heap
11) The lexical analyzer takes ________ as input and produces a stream of
________ as output.
a) Source program, tokens b) Tokens, source program
c) Both a) and b) d) None of the above
12) Parsing is also known as
a) Syntax analysis b) Semantic analysis
c) Lexical analysis d) Code generation
13) Shift reduce parsers are
a) Top down parsers
b) Bottom up parser
c) May be top down or bottom up parser
d) None of the above
14) Type checking is normally done during
a) Lexical analysis b) Syntax analysis
c) Syntax directed translation d) Code optimization
______________

Set R
*SLRTX360* -3- SLR-TX – 360
Seat
No.

T.E. (CSE) (Part – II) (CGPA Pattern) Examination, 2018


compiler construction
Day and Date : Tuesday, 20-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Assume suitable data if necessary.
3) Figures to the right indicate full marks.

SECTION – I

2. Attempt any three : (4×3=12)


a) Explain the language processors with diagrams.
b) Describe the following terms with examples.
1) Token 2) Pattern 3) Lexeme
c) Draw a transition diagram that recognizes the lexeme matching the token
relop.
d) Find FIRST and FOLLOW for the following grammar.
E → TE’
E’ → + TE’ | ε
T → FT’
T’ → ∗ FT’ | ε
F → (E)
F → id

3. Attempt any one : 8


a) Explain shift reduce parser with all four actions and perform SR parsing of
input string “id1-id2∗id3” by considering following grammar
E → E-E
E → E∗E
E → id

Set R
SLR-TX – 360 -4- *SLRTX360*

b) Write short note on :


i) Ambiguity of grammar
ii) S-attributed definition
iii) L-attributed definition
iv) Syntax directed translation schemes.

4. Sketch and explain all phases of compiler with example. 8

SECTION – II

5. Attempt any three : (4×3=12)


a) State and explain types of intermediate code representations.
b) Generate optimized three address code for an expression.
x = a + b∗c + d
Assume x and a as real and b, c and d are integer.
c) State and explain any four issues in the machine code generation.
d) Note on register allocation and assignment.

6. Attempt any one : 8


a) Explain principle sources of optimization.
b) Write an algorithm for partitioning into basic blocks by considering following
program code.
prod = 0;
i = 1;
do
{
prod=prod+a[i]∗b[i];
i=i+1;
}while(i<=10);

7. Explain peephole optimization with example. 8

____________

Set R
*SLRTX360* SLR-TX – 360

Seat
No. Set S
T.E. (CSE) (Part – II) (CGPA Pattern) Examination, 2018
compiler construction
Day and Date : Tuesday, 20-11-2018 Total Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (1×14=14)


1) Intermediate code generation phase gets input from
a) Lexical analyser b) Syntax analyser
c) Semantic analyser d) Error handling
2) We can optimize code by
a) Dead code elimination b) Common subprograms
c) Copy intermediate loop d) Loop declaration
3) Which of the following is not the function preserving transforming ?
a) Copy propagation b) Dead code elimination
c) Constant folding d) Elimination of left recursion
4) Peephole optimization is a __________ technique.
a) Machine dependant local optimization
b) Global optimization
c) Machine independent local optimization
d) None of the above
5) Which of the following is not the storage allocation strategy ?
a) Stack b) Static c) Linked list d) Heap

P.T.O.
SLR-TX – 360 -2- *SLRTX360*

6) The lexical analyzer takes ________ as input and produces a stream of


________ as output.
a) Source program, tokens b) Tokens, source program
c) Both a) and b) d) None of the above
7) Parsing is also known as
a) Syntax analysis b) Semantic analysis
c) Lexical analysis d) Code generation
8) Shift reduce parsers are
a) Top down parsers
b) Bottom up parser
c) May be top down or bottom up parser
d) None of the above
9) Type checking is normally done during
a) Lexical analysis b) Syntax analysis
c) Syntax directed translation d) Code optimization
10) ________ is a graphical representation of a derivation.
a) The parse tree b) The oct tree
c) The binary tree d) None of the above
11) Which of the following parser is most powerful ?
a) Operator precedence b) Canonical LR
c) LALR d) SLR
12) lnherited attribute is a natural choice in
a) Keeping track of variable declaration
b) Checking for the correct use of L values and R values
c) Both a) and b)
d) None of these
13) LR stands for
a) Left to Right
b) Left to Right reduction
c) Right to Left
d) Left to right and Right most derivation in reverse
14) An intermediate code form is
a) Postfix notation b) Syntax trees
c) Three address code d) All of the above
______________

Set S
*SLRTX360* -3- SLR-TX – 360
Seat
No.

T.E. (CSE) (Part – II) (CGPA Pattern) Examination, 2018


compiler construction
Day and Date : Tuesday, 20-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Assume suitable data if necessary.
3) Figures to the right indicate full marks.

SECTION – I

2. Attempt any three : (4×3=12)


a) Explain the language processors with diagrams.
b) Describe the following terms with examples.
1) Token 2) Pattern 3) Lexeme
c) Draw a transition diagram that recognizes the lexeme matching the token
relop.
d) Find FIRST and FOLLOW for the following grammar.
E → TE’
E’ → + TE’ | ε
T → FT’
T’ → ∗ FT’ | ε
F → (E)
F → id

3. Attempt any one : 8


a) Explain shift reduce parser with all four actions and perform SR parsing of
input string “id1-id2∗id3” by considering following grammar
E → E-E
E → E∗E
E → id

Set S
SLR-TX – 360 -4- *SLRTX360*

b) Write short note on :


i) Ambiguity of grammar
ii) S-attributed definition
iii) L-attributed definition
iv) Syntax directed translation schemes.

4. Sketch and explain all phases of compiler with example. 8

SECTION – II

5. Attempt any three : (4×3=12)


a) State and explain types of intermediate code representations.
b) Generate optimized three address code for an expression.
x = a + b∗c + d
Assume x and a as real and b, c and d are integer.
c) State and explain any four issues in the machine code generation.
d) Note on register allocation and assignment.

6. Attempt any one : 8


a) Explain principle sources of optimization.
b) Write an algorithm for partitioning into basic blocks by considering following
program code.
prod = 0;
i = 1;
do
{
prod=prod+a[i]∗b[i];
i=i+1;
}while(i<=10);

7. Explain peephole optimization with example. 8

____________

Set S
*SLRTX361* SLR-TX – 361
Seat
No. Set P
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Unix operating systems
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) An exception refers to unexpected
a) Event b) Address c) Inode d) Block
2) Every directory contains the file name dot (.) whose inode no. is equivalent
to inode no. of
a) Directory b) Parent director
c) Root d) None
3) The Kernel finds the block on its hash queue but the buffer is currently busy.
a) First scenario b) Second scenario
c) Third scenario d) Fifth scenario
4) The inode is on free list only if its reference count is
a) 1 b) –1 c) 0 d) 2
5) Which of the following is UNIX system call for I/O ?
a) nice b) pipe c) create d) wakeup
P.T.O.
SLR-TX – 361 -2- *SLRTX361*
6) The Kernel organizes the buffers into separate queues, based as a function
of
a) Logical device number b) Block number
c) Both a and b d) None of above
7) Fork returns _________ when it fails to create a child process.
a) two b) minus one c) zero d) one
8) The __________ registers contains data generated by the process during
its execution.
a) Data b) Stack
c) Processor status d) General purpose
9) _________ algorithm used to handle signals after recognizing their
existence.
a) issig b) sig c) psig d) none
10) A process may increase or decrease the size of its data region by using
the _______ system call.
a) Grow process b) Brk
c) Extend region d) None
11) When a process accesses a page that is not a part of its working set, it
incurs a _______ page fault.
a) Validity b) Invalid c) Modification d) Recent
12) To create a special file _________ system call is used.
a) Create b) Fork c) Pipe d) Mknod
13) CPU usage is calculated by ________ function.
a) Usage b) R-usage c) Time d) Decay
14) Shell interprets the first word of command line as a
a) Parameter b) Command name
c) Library call d) System call

____________

Set P
*SLRTX361* -3- SLR-TX – 361
Seat
No.
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Unix operating systems

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

Section – i

2. Attempt any three : (3×4=12)


1) Explain link () and unlink () system call in detail.
2) Describe Kernel data structure for file.
3) Describe advantage and disadvantage of buffer header.
4) Write a note on directories.

3. Attempt any two : (2×8=16)


1) Explain the architecture of UNIX operating system with help of block diagram.
2) Explain the algorithm of inode assignment of newly created file.(ialloc
algorithm)
3) Explain getblk algorithm for buffer allocation scenarios.

Section – iI

4. Attempt any three : (3×4=12)


1) Write and explain allocreg algorithm.
2) Write a short note on system call for time.
3) Write a short note on clists.

Set P
SLR-TX – 361 -4- *SLRTX361*

4) What is terminal driver ? List functions of line discipline.


5) Explain the operations performed by Kernel in handling interrupts and
exceptions.

5. Attempt any two : (2×8=16)


1) What is context of a process ? Explain all the fields of user level context,
register level context and system level context.
2) Describe in detail the algorithm used for recognizing the signals and the
algorithm for handling the signals.
3) Explain how kernel manages space on swap device in detail.
4) What is validity page fault ? Explain the function of a validity page fault
handler with the help of algorithm.
___________

Set P
*SLRTX361* SLR-TX – 361
Seat
No. Set Q
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Unix operating systems
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) The __________ registers contains data generated by the process during
its execution.
a) Data b) Stack
c) Processor status d) General purpose
2) _________ algorithm used to handle signals after recognizing their
existence.
a) issig b) sig c) psig d) none
3) A process may increase or decrease the size of its data region by using
the _______ system call.
a) Grow process b) Brk
c) Extend region d) None
4) When a process accesses a page that is not a part of its working set, it
incurs a _______ page fault.
a) Validity b) Invalid c) Modification d) Recent
P.T.O.
SLR-TX – 361 -2- *SLRTX361*
5) To create a special file _________ system call is used.
a) Create b) Fork c) Pipe d) Mknod
6) CPU usage is calculated by ________ function.
a) Usage b) R-usage c) Time d) Decay
7) Shell interprets the first word of command line as a
a) Parameter b) Command name
c) Library call d) System call
8) An exception refers to unexpected
a) Event b) Address c) Inode d) Block
9) Every directory contains the file name dot (.) whose inode no. is equivalent
to inode no. of
a) Directory b) Parent director
c) Root d) None
10) The Kernel finds the block on its hash queue but the buffer is currently busy.
a) First scenario b) Second scenario
c) Third scenario d) Fifth scenario
11) The inode is on free list only if its reference count is
a) 1 b) –1 c) 0 d) 2
12) Which of the following is UNIX system call for I/O ?
a) nice b) pipe c) create d) wakeup
13) The Kernel organizes the buffers into separate queues, based as a function
of
a) Logical device number b) Block number
c) Both a and b d) None of above
14) Fork returns _________ when it fails to create a child process.
a) two b) minus one c) zero d) one

____________

Set Q
*SLRTX361* -3- SLR-TX – 361
Seat
No.
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Unix operating systems

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

Section – i

2. Attempt any three : (3×4=12)


1) Explain link () and unlink () system call in detail.
2) Describe Kernel data structure for file.
3) Describe advantage and disadvantage of buffer header.
4) Write a note on directories.

3. Attempt any two : (2×8=16)


1) Explain the architecture of UNIX operating system with help of block diagram.
2) Explain the algorithm of inode assignment of newly created file.(ialloc
algorithm)
3) Explain getblk algorithm for buffer allocation scenarios.

Section – iI

4. Attempt any three : (3×4=12)


1) Write and explain allocreg algorithm.
2) Write a short note on system call for time.
3) Write a short note on clists.

Set Q
SLR-TX – 361 -4- *SLRTX361*

4) What is terminal driver ? List functions of line discipline.


5) Explain the operations performed by Kernel in handling interrupts and
exceptions.

5. Attempt any two : (2×8=16)


1) What is context of a process ? Explain all the fields of user level context,
register level context and system level context.
2) Describe in detail the algorithm used for recognizing the signals and the
algorithm for handling the signals.
3) Explain how kernel manages space on swap device in detail.
4) What is validity page fault ? Explain the function of a validity page fault
handler with the help of algorithm.
___________

Set Q
*SLRTX361* SLR-TX – 361
Seat
No. Set R
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Unix operating systems
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Which of the following is UNIX system call for I/O ?
a) nice b) pipe c) create d) wakeup
2) The Kernel organizes the buffers into separate queues, based as a function
of
a) Logical device number b) Block number
c) Both a and b d) None of above
3) Fork returns _________ when it fails to create a child process.
a) two b) minus one c) zero d) one
4) The __________ registers contains data generated by the process during
its execution.
a) Data b) Stack
c) Processor status d) General purpose
5) _________ algorithm used to handle signals after recognizing their
existence.
a) issig b) sig c) psig d) none
P.T.O.
SLR-TX – 361 -2- *SLRTX361*
6) A process may increase or decrease the size of its data region by using
the _______ system call.
a) Grow process b) Brk
c) Extend region d) None
7) When a process accesses a page that is not a part of its working set, it
incurs a _______ page fault.
a) Validity b) Invalid c) Modification d) Recent
8) To create a special file _________ system call is used.
a) Create b) Fork c) Pipe d) Mknod
9) CPU usage is calculated by ________ function.
a) Usage b) R-usage c) Time d) Decay
10) Shell interprets the first word of command line as a
a) Parameter b) Command name
c) Library call d) System call
11) An exception refers to unexpected
a) Event b) Address c) Inode d) Block
12) Every directory contains the file name dot (.) whose inode no. is equivalent
to inode no. of
a) Directory b) Parent director
c) Root d) None
13) The Kernel finds the block on its hash queue but the buffer is currently busy.
a) First scenario b) Second scenario
c) Third scenario d) Fifth scenario
14) The inode is on free list only if its reference count is
a) 1 b) –1 c) 0 d) 2

____________

Set R
*SLRTX361* -3- SLR-TX – 361
Seat
No.
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Unix operating systems

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

Section – i

2. Attempt any three : (3×4=12)


1) Explain link () and unlink () system call in detail.
2) Describe Kernel data structure for file.
3) Describe advantage and disadvantage of buffer header.
4) Write a note on directories.

3. Attempt any two : (2×8=16)


1) Explain the architecture of UNIX operating system with help of block diagram.
2) Explain the algorithm of inode assignment of newly created file.(ialloc
algorithm)
3) Explain getblk algorithm for buffer allocation scenarios.

Section – iI

4. Attempt any three : (3×4=12)


1) Write and explain allocreg algorithm.
2) Write a short note on system call for time.
3) Write a short note on clists.

Set R
SLR-TX – 361 -4- *SLRTX361*

4) What is terminal driver ? List functions of line discipline.


5) Explain the operations performed by Kernel in handling interrupts and
exceptions.

5. Attempt any two : (2×8=16)


1) What is context of a process ? Explain all the fields of user level context,
register level context and system level context.
2) Describe in detail the algorithm used for recognizing the signals and the
algorithm for handling the signals.
3) Explain how kernel manages space on swap device in detail.
4) What is validity page fault ? Explain the function of a validity page fault
handler with the help of algorithm.
___________

Set R
*SLRTX361* SLR-TX – 361
Seat
No. Set S
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Unix operating systems
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) A process may increase or decrease the size of its data region by using
the _______ system call.
a) Grow process b) Brk
c) Extend region d) None
2) When a process accesses a page that is not a part of its working set, it
incurs a _______ page fault.
a) Validity b) Invalid c) Modification d) Recent
3) To create a special file _________ system call is used.
a) Create b) Fork c) Pipe d) Mknod
4) CPU usage is calculated by ________ function.
a) Usage b) R-usage c) Time d) Decay
5) Shell interprets the first word of command line as a
a) Parameter b) Command name
c) Library call d) System call
P.T.O.
SLR-TX – 361 -2- *SLRTX361*
6) An exception refers to unexpected
a) Event b) Address c) Inode d) Block
7) Every directory contains the file name dot (.) whose inode no. is equivalent
to inode no. of
a) Directory b) Parent director
c) Root d) None
8) The Kernel finds the block on its hash queue but the buffer is currently busy.
a) First scenario b) Second scenario
c) Third scenario d) Fifth scenario
9) The inode is on free list only if its reference count is
a) 1 b) –1 c) 0 d) 2
10) Which of the following is UNIX system call for I/O ?
a) nice b) pipe c) create d) wakeup
11) The Kernel organizes the buffers into separate queues, based as a function
of
a) Logical device number b) Block number
c) Both a and b d) None of above
12) Fork returns _________ when it fails to create a child process.
a) two b) minus one c) zero d) one
13) The __________ registers contains data generated by the process during
its execution.
a) Data b) Stack
c) Processor status d) General purpose
14) _________ algorithm used to handle signals after recognizing their
existence.
a) issig b) sig c) psig d) none

____________

Set S
*SLRTX361* -3- SLR-TX – 361
Seat
No.
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Unix operating systems

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

Section – i

2. Attempt any three : (3×4=12)


1) Explain link () and unlink () system call in detail.
2) Describe Kernel data structure for file.
3) Describe advantage and disadvantage of buffer header.
4) Write a note on directories.

3. Attempt any two : (2×8=16)


1) Explain the architecture of UNIX operating system with help of block diagram.
2) Explain the algorithm of inode assignment of newly created file.(ialloc
algorithm)
3) Explain getblk algorithm for buffer allocation scenarios.

Section – iI

4. Attempt any three : (3×4=12)


1) Write and explain allocreg algorithm.
2) Write a short note on system call for time.
3) Write a short note on clists.

Set S
SLR-TX – 361 -4- *SLRTX361*

4) What is terminal driver ? List functions of line discipline.


5) Explain the operations performed by Kernel in handling interrupts and
exceptions.

5. Attempt any two : (2×8=16)


1) What is context of a process ? Explain all the fields of user level context,
register level context and system level context.
2) Describe in detail the algorithm used for recognizing the signals and the
algorithm for handling the signals.
3) Explain how kernel manages space on swap device in detail.
4) What is validity page fault ? Explain the function of a validity page fault
handler with the help of algorithm.
___________

Set S
*SLRTX362* SLR-TX – 362
Seat
No. Set P
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software engineering
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Which metric is used to quantify the resistance of a design to the potential
ripple effects that are caused by changes in modules ?
a) Network metric b) Stability metric
c) Information flow metric d) None
2) The graph impurity is zero only when
a) Number of nodes is equal to number of edges
b) Number of edges one more than number of nodes
c) Number of nodes one more than number of edges
d) Number of edges half the number of edges
3) The software entity is open for ________, but closed for ________
a) Alteration and Modification b) Modification and Beautification
c) Extension and Modification d) Extension and Accommodation
4) __________ objects specify the control mechanism for the proposed system.
a) Interface b) Application c) Utility d) None
5) Sub class gets all the features from its super class is called as
a) Single inheritance b) Multiple inheritance
c) Strict inheritance d) Non-strict inheritance
P.T.O.
SLR-TX – 362 -2- *SLRTX362*
6) ___________ is used to represent the design in function oriented.
a) Class diagram b) Sequence diagram
c) Structure charts d) Both a and b
7) Quality of the product comes under which type of measures ?
a) Indirect measures b) Direct measures
c) Coding d) None of the above
8) SPC stands for
a) Statistical Process Control b) Statistical Project Control
c) Status Project Control d) Status Process Control
9) White box testing is also called as
a) Structural testing b) Glass Box Testing
c) Both a and b d) None of these
10) In CMM, ________ level focus on continuously improvement in process.
a) Initial level b) Manage level
c) Optimizing level d) Repeatable level
11) Which of the following is not a validation activity ?
a) Unit testing b) System testing
c) Structured walkthrough d) Acceptance testing
12) MSP stands for
a) Microsoft Product b) Micosoft Process
c) Microsoft Project d) None of the above
13) SEPG is
a) Software Engineering Process Group
b) Software Engineering Project Group
c) Software Engineering Product Group
d) Software Engineering Program Group
14) Pareto analysis is also called as
a) 20 – 80 rule b) 50 – 50 rule
c) 80 – 20 rule d) none of the above

____________

Set P
*SLRTX362* -3- SLR-TX – 362
Seat
No.
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software engineering
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Section – i

2. Attempt any three : (3×4=12)


1) Explain Software Requirement Specification.
2) Explain the change management process.
3) What is effort estimation and scheduling ? Explain briefly.
4) Explain the risk assessments and how to control the risks.
5) What is project control list ? Explain what is the task of project control list
in iterative model.

3. Attempt any two : (2×8=16)


1) Explain the phased development process.
2) Explain the concepts of effort estimation and scheduling in detail.
3) Explain the role of the CMM in a process management.

Section – iI

4. Attempt any three : (3×4=12)


a) Write a note on APM.
b) Explain Pareto analysis.
c) Explain milestone analysis.
d) Describe risk assessment in detail.

5. Attempt any two : (2×8=16)


a) What is risk management ? Explain risk management activities.
b) Discuss white box testing and black box testing in detail.
c) Describe Adaptive Project Management Life Cycle in detail.
___________

Set P
Set P
*SLRTX362* SLR-TX – 362
Seat
No. Set Q
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software engineering
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) SPC stands for
a) Statistical Process Control b) Statistical Project Control
c) Status Project Control d) Status Process Control
2) White box testing is also called as
a) Structural testing b) Glass Box Testing
c) Both a and b d) None of these
3) In CMM, ________ level focus on continuously improvement in process.
a) Initial level b) Manage level
c) Optimizing level d) Repeatable level
4) Which of the following is not a validation activity ?
a) Unit testing b) System testing
c) Structured walkthrough d) Acceptance testing
5) MSP stands for
a) Microsoft Product b) Micosoft Process
c) Microsoft Project d) None of the above

P.T.O.
SLR-TX – 362 -2- *SLRTX362*
6) SEPG is
a) Software Engineering Process Group
b) Software Engineering Project Group
c) Software Engineering Product Group
d) Software Engineering Program Group
7) Pareto analysis is also called as
a) 20 – 80 rule b) 50 – 50 rule
c) 80 – 20 rule d) none of the above
8) Which metric is used to quantify the resistance of a design to the potential
ripple effects that are caused by changes in modules ?
a) Network metric b) Stability metric
c) Information flow metric d) None
9) The graph impurity is zero only when
a) Number of nodes is equal to number of edges
b) Number of edges one more than number of nodes
c) Number of nodes one more than number of edges
d) Number of edges half the number of edges
10) The software entity is open for ________, but closed for ________
a) Alteration and Modification b) Modification and Beautification
c) Extension and Modification d) Extension and Accommodation
11) __________ objects specify the control mechanism for the proposed system.
a) Interface b) Application c) Utility d) None
12) Sub class gets all the features from its super class is called as
a) Single inheritance b) Multiple inheritance
c) Strict inheritance d) Non-strict inheritance
13) ___________ is used to represent the design in function oriented.
a) Class diagram b) Sequence diagram
c) Structure charts d) Both a and b
14) Quality of the product comes under which type of measures ?
a) Indirect measures b) Direct measures
c) Coding d) None of the above

____________

Set Q
*SLRTX362* -3- SLR-TX – 362
Seat
No.
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software engineering
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Section – i

2. Attempt any three : (3×4=12)


1) Explain Software Requirement Specification.
2) Explain the change management process.
3) What is effort estimation and scheduling ? Explain briefly.
4) Explain the risk assessments and how to control the risks.
5) What is project control list ? Explain what is the task of project control list
in iterative model.

3. Attempt any two : (2×8=16)


1) Explain the phased development process.
2) Explain the concepts of effort estimation and scheduling in detail.
3) Explain the role of the CMM in a process management.

Section – iI

4. Attempt any three : (3×4=12)


a) Write a note on APM.
b) Explain Pareto analysis.
c) Explain milestone analysis.
d) Describe risk assessment in detail.

5. Attempt any two : (2×8=16)


a) What is risk management ? Explain risk management activities.
b) Discuss white box testing and black box testing in detail.
c) Describe Adaptive Project Management Life Cycle in detail.
___________

Set Q
Set Q
*SLRTX362* SLR-TX – 362
Seat
No. Set R
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software engineering
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Sub class gets all the features from its super class is called as
a) Single inheritance b) Multiple inheritance
c) Strict inheritance d) Non-strict inheritance
2) ___________ is used to represent the design in function oriented.
a) Class diagram b) Sequence diagram
c) Structure charts d) Both a and b
3) Quality of the product comes under which type of measures ?
a) Indirect measures b) Direct measures
c) Coding d) None of the above
4) SPC stands for
a) Statistical Process Control b) Statistical Project Control
c) Status Project Control d) Status Process Control
5) White box testing is also called as
a) Structural testing b) Glass Box Testing
c) Both a and b d) None of these

P.T.O.
SLR-TX – 362 -2- *SLRTX362*
6) In CMM, ________ level focus on continuously improvement in process.
a) Initial level b) Manage level
c) Optimizing level d) Repeatable level
7) Which of the following is not a validation activity ?
a) Unit testing b) System testing
c) Structured walkthrough d) Acceptance testing
8) MSP stands for
a) Microsoft Product b) Micosoft Process
c) Microsoft Project d) None of the above
9) SEPG is
a) Software Engineering Process Group
b) Software Engineering Project Group
c) Software Engineering Product Group
d) Software Engineering Program Group
10) Pareto analysis is also called as
a) 20 – 80 rule b) 50 – 50 rule
c) 80 – 20 rule d) none of the above
11) Which metric is used to quantify the resistance of a design to the potential
ripple effects that are caused by changes in modules ?
a) Network metric b) Stability metric
c) Information flow metric d) None
12) The graph impurity is zero only when
a) Number of nodes is equal to number of edges
b) Number of edges one more than number of nodes
c) Number of nodes one more than number of edges
d) Number of edges half the number of edges
13) The software entity is open for ________, but closed for ________
a) Alteration and Modification b) Modification and Beautification
c) Extension and Modification d) Extension and Accommodation
14) __________ objects specify the control mechanism for the proposed system.
a) Interface b) Application c) Utility d) None

____________

Set R
*SLRTX362* -3- SLR-TX – 362
Seat
No.
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software engineering
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Section – i

2. Attempt any three : (3×4=12)


1) Explain Software Requirement Specification.
2) Explain the change management process.
3) What is effort estimation and scheduling ? Explain briefly.
4) Explain the risk assessments and how to control the risks.
5) What is project control list ? Explain what is the task of project control list
in iterative model.

3. Attempt any two : (2×8=16)


1) Explain the phased development process.
2) Explain the concepts of effort estimation and scheduling in detail.
3) Explain the role of the CMM in a process management.

Section – iI

4. Attempt any three : (3×4=12)


a) Write a note on APM.
b) Explain Pareto analysis.
c) Explain milestone analysis.
d) Describe risk assessment in detail.

5. Attempt any two : (2×8=16)


a) What is risk management ? Explain risk management activities.
b) Discuss white box testing and black box testing in detail.
c) Describe Adaptive Project Management Life Cycle in detail.
___________

Set R
Set R
*SLRTX362* SLR-TX – 362
Seat
No. Set S
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software engineering
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) In CMM, ________ level focus on continuously improvement in process.
a) Initial level b) Manage level
c) Optimizing level d) Repeatable level
2) Which of the following is not a validation activity ?
a) Unit testing b) System testing
c) Structured walkthrough d) Acceptance testing
3) MSP stands for
a) Microsoft Product b) Micosoft Process
c) Microsoft Project d) None of the above
4) SEPG is
a) Software Engineering Process Group
b) Software Engineering Project Group
c) Software Engineering Product Group
d) Software Engineering Program Group
P.T.O.
SLR-TX – 362 -2- *SLRTX362*
5) Pareto analysis is also called as
a) 20 – 80 rule b) 50 – 50 rule
c) 80 – 20 rule d) none of the above
6) Which metric is used to quantify the resistance of a design to the potential
ripple effects that are caused by changes in modules ?
a) Network metric b) Stability metric
c) Information flow metric d) None
7) The graph impurity is zero only when
a) Number of nodes is equal to number of edges
b) Number of edges one more than number of nodes
c) Number of nodes one more than number of edges
d) Number of edges half the number of edges
8) The software entity is open for ________, but closed for ________
a) Alteration and Modification b) Modification and Beautification
c) Extension and Modification d) Extension and Accommodation
9) __________ objects specify the control mechanism for the proposed system.
a) Interface b) Application c) Utility d) None
10) Sub class gets all the features from its super class is called as
a) Single inheritance b) Multiple inheritance
c) Strict inheritance d) Non-strict inheritance
11) ___________ is used to represent the design in function oriented.
a) Class diagram b) Sequence diagram
c) Structure charts d) Both a and b
12) Quality of the product comes under which type of measures ?
a) Indirect measures b) Direct measures
c) Coding d) None of the above
13) SPC stands for
a) Statistical Process Control b) Statistical Project Control
c) Status Project Control d) Status Process Control
14) White box testing is also called as
a) Structural testing b) Glass Box Testing
c) Both a and b d) None of these

____________

Set S
*SLRTX362* -3- SLR-TX – 362
Seat
No.
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software engineering
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Section – i

2. Attempt any three : (3×4=12)


1) Explain Software Requirement Specification.
2) Explain the change management process.
3) What is effort estimation and scheduling ? Explain briefly.
4) Explain the risk assessments and how to control the risks.
5) What is project control list ? Explain what is the task of project control list
in iterative model.

3. Attempt any two : (2×8=16)


1) Explain the phased development process.
2) Explain the concepts of effort estimation and scheduling in detail.
3) Explain the role of the CMM in a process management.

Section – iI

4. Attempt any three : (3×4=12)


a) Write a note on APM.
b) Explain Pareto analysis.
c) Explain milestone analysis.
d) Describe risk assessment in detail.

5. Attempt any two : (2×8=16)


a) What is risk management ? Explain risk management activities.
b) Discuss white box testing and black box testing in detail.
c) Describe Adaptive Project Management Life Cycle in detail.
___________

Set S
Set S
*SLRTX363* SLR-TX – 363
Seat
No.

Set P

T.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
mobile computing
Day and Date : Tuesday, 27-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions: 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book on Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) Android applications are made up of ____________
a) Loosely tied components b) Tightly tied components
c) Coupled components d) None of above
2) Mandatory for mobile IP is ___________ encapsulation as specified for
mobile IP.
a) IP-in-IP b) Minimal
c) Generic routing d) Maximum
3) ___________ is popularly known as Wi-Fi.
a) IEEE 802.11a b) IEEE 802.11b
c) IEEE 802.11g d) IEEE 802.11n
4) “Every terminal has its own frequency, uninterrupted”, is true for
a) sdma b) tdma
c) fdma d) cdma
5) Example of explicit reservation is
a) prma b) dama
c) Reservation tdma d) csma P.T.O.
SLR-TX – 363 -2- *SLRTX363*
6) Spread spectrum is resistant to ___________ interference.
a) Narrow band b) Broad band
c) Wide band d) All of the above
7) Sky waves are
a) 2 – 30 MHz b) 4 – 40 MHz c) 1 – 10 MHz d) 2 – 20 MHz
8) I-TCP stands for ___________
a) Indirect TCP b) Interrelated TCP
c) Inactive TCP d) Indicated TCP
9) Number of devices can be connected in one piconet is ___________
a) 6 b) 8 c) 10 d) 4
10) Emergency number is which type of service provided by GSM ?
a) Bearer b) Tele
c) Supplementary d) None of these
11) Foreign agents and home agents advertise their presence periodically
using special ______________ messages.
a) Agent advertisement
b) Foreign agent advertisement
c) Home agent advertisement
d) Periodic agent advertisement
12) ______________ is used for initial connection setup between MS and BTS.
a) Access burst
b) Dummy burst
c) Frequency burst
d) Synchronization burst
13) ______________ range is used for communication under water.
a) Infrared (IR) b) Low Frequency (LF)
c) Medium Frequency (MF) d) Super High Frequency (SHF)
14) An associated BS collects the information gathered by the sensors on a
__________ basis.
a) Data-centric b) Data-collection
c) Data-owner d) None of these

_________________

Set P
*SLRTX363* SLR-TX – 363
-3-


Seat
No.

T.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
mobile computing
Day and Date : Tuesday, 27-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instruction: Make suitable assumptions if necessary and state them clearly.

SECTION – I

2. Attempt any four : (4�4=16)

A) What is spread spectrum ? Explain with neat diagram.

B) Differentiate among 1G, 2G, 3G and 4G.

C) Draw the sinusoidal wave and represent amplitude, frequency, cycle,


wavelength on it.

D) Compare AM, FM, PM.

E) How MACA avoids problem of exposed terminals ?

3. Attempt any one : (6�1=6)

A) Illustrate CDMA, two transmitters A and B are transmitting at same frequency


and power, the keys and data of A and B are as given below :

Ad = 1, Ak = 110110

Bd = 0, Bk = 101101 8

B) Explain the architecture of GSM with neat diagram.

4. Attempt the following : (6�1=6)


What is MANET ? What are characteristics and application of MANET ?
Set P
SLR-TX – 363 -4- *SLRTX363*
SECTION – II

5. Attempt any four : (4�4=16)


A) Discuss how packet delivery takes place to and from mobile node with
suitable diagram.
B) What is Hawaii ? Why is it used ? Give and discuss its basic architecture.
C) Write a short note on agent advertisement in mobile IP.
D) Give DHCP configuration. Discuss in detail how client gets initialized via
DHCP.
E) What are advantages and disadvantages of wireless LAN.

6. Attempt any one : (6�1=6)


A) Explain overall architecture of android system with suitable diagram.
B) What is NFC ? How RFID and NFC are related ? Give and discuss general
architecture of NFC enabled phones.

7. Attempt the following : (6�1=6)


Which are the classical enhancements to TCP for mobility ? Explain any three
in detail.

_________________

Set P
*SLRTX363* SLR-TX – 363
Seat
No.

Set Q

T.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
mobile computing
Day and Date : Tuesday, 27-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions: 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book on Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) I-TCP stands for ___________
a) Indirect TCP b) Interrelated TCP
c) Inactive TCP d) Indicated TCP
2) Number of devices can be connected in one piconet is ___________
a) 6 b) 8 c) 10 d) 4
3) Emergency number is which type of service provided by GSM ?
a) Bearer b) Tele
c) Supplementary d) None of these
4) Foreign agents and home agents advertise their presence periodically
using special ______________ messages.
a) Agent advertisement b) Foreign agent advertisement
c) Home agent advertisement d) Periodic agent advertisement
5) ______________ is used for initial connection setup between MS and BTS.
a) Access burst b) Dummy burst
c) Frequency burst d) Synchronization burst
P.T.O.
SLR-TX – 363 -2- *SLRTX363*
6) ______________ range is used for communication under water.
a) Infrared (IR) b) Low Frequency (LF)
c) Medium Frequency (MF) d) Super High Frequency (SHF)
7) An associated BS collects the information gathered by the sensors on a
__________ basis.
a) Data-centric b) Data-collection
c) Data-owner d) None of these
8) Android applications are made up of ____________
a) Loosely tied components b) Tightly tied components
c) Coupled components d) None of above
9) Mandatory for mobile IP is ___________ encapsulation as specified for
mobile IP.
a) IP-in-IP b) Minimal
c) Generic routing d) Maximum
10) ___________ is popularly known as Wi-Fi.
a) IEEE 802.11a b) IEEE 802.11b
c) IEEE 802.11g d) IEEE 802.11n
11) “Every terminal has its own frequency, uninterrupted”, is true for
a) sdma b) tdma
c) fdma d) cdma
12) Example of explicit reservation is
a) prma b) dama
c) Reservation tdma d) csma
13) Spread spectrum is resistant to ___________ interference.
a) Narrow band b) Broad band
c) Wide band d) All of the above
14) Sky waves are
a) 2 – 30 MHz b) 4 – 40 MHz
c) 1 – 10 MHz d) 2 – 20 MHz

_________________

Set Q
*SLRTX363* SLR-TX – 363
-3-


Seat
No.

T.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
mobile computing
Day and Date : Tuesday, 27-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instruction: Make suitable assumptions if necessary and state them clearly.

SECTION – I

2. Attempt any four : (4�4=16)

A) What is spread spectrum ? Explain with neat diagram.

B) Differentiate among 1G, 2G, 3G and 4G.

C) Draw the sinusoidal wave and represent amplitude, frequency, cycle,


wavelength on it.

D) Compare AM, FM, PM.

E) How MACA avoids problem of exposed terminals ?

3. Attempt any one : (6�1=6)

A) Illustrate CDMA, two transmitters A and B are transmitting at same frequency


and power, the keys and data of A and B are as given below :

Ad = 1, Ak = 110110

Bd = 0, Bk = 101101 8

B) Explain the architecture of GSM with neat diagram.

4. Attempt the following : (6�1=6)


What is MANET ? What are characteristics and application of MANET ?
Set Q
SLR-TX – 363 -4- *SLRTX363*
SECTION – II

5. Attempt any four : (4�4=16)


A) Discuss how packet delivery takes place to and from mobile node with
suitable diagram.
B) What is Hawaii ? Why is it used ? Give and discuss its basic architecture.
C) Write a short note on agent advertisement in mobile IP.
D) Give DHCP configuration. Discuss in detail how client gets initialized via
DHCP.
E) What are advantages and disadvantages of wireless LAN.

6. Attempt any one : (6�1=6)


A) Explain overall architecture of android system with suitable diagram.
B) What is NFC ? How RFID and NFC are related ? Give and discuss general
architecture of NFC enabled phones.

7. Attempt the following : (6�1=6)


Which are the classical enhancements to TCP for mobility ? Explain any three
in detail.

_________________

Set Q
*SLRTX363* SLR-TX – 363
Seat
No.

Set R

T.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
mobile computing
Day and Date : Tuesday, 27-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions: 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book on Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) Example of explicit reservation is
a) prma b) dama
c) Reservation tdma d) csma
2) Spread spectrum is resistant to ___________ interference.
a) Narrow band b) Broad band
c) Wide band d) All of the above
3) Sky waves are
a) 2 – 30 MHz b) 4 – 40 MHz c) 1 – 10 MHz d) 2 – 20 MHz
4) I-TCP stands for ___________
a) Indirect TCP b) Interrelated TCP
c) Inactive TCP d) Indicated TCP
5) Number of devices can be connected in one piconet is ___________
a) 6 b) 8 c) 10 d) 4
6) Emergency number is which type of service provided by GSM ?
a) Bearer b) Tele
c) Supplementary d) None of these
P.T.O.
SLR-TX – 363 -2- *SLRTX363*
7) Foreign agents and home agents advertise their presence periodically
using special ______________ messages.
a) Agent advertisement
b) Foreign agent advertisement
c) Home agent advertisement
d) Periodic agent advertisement
8) ______________ is used for initial connection setup between MS and BTS.
a) Access burst
b) Dummy burst
c) Frequency burst
d) Synchronization burst
9) ______________ range is used for communication under water.
a) Infrared (IR) b) Low Frequency (LF)
c) Medium Frequency (MF) d) Super High Frequency (SHF)
10) An associated BS collects the information gathered by the sensors on a
__________ basis.
a) Data-centric b) Data-collection
c) Data-owner d) None of these
11) Android applications are made up of ____________
a) Loosely tied components b) Tightly tied components
c) Coupled components d) None of above
12) Mandatory for mobile IP is ___________ encapsulation as specified for
mobile IP.
a) IP-in-IP b) Minimal
c) Generic routing d) Maximum
13) ___________ is popularly known as Wi-Fi.
a) IEEE 802.11a b) IEEE 802.11b
c) IEEE 802.11g d) IEEE 802.11n
14) “Every terminal has its own frequency, uninterrupted”, is true for
a) sdma b) tdma
c) fdma d) cdma

_________________

Set R
*SLRTX363* SLR-TX – 363
-3-


Seat
No.

T.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
mobile computing
Day and Date : Tuesday, 27-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instruction: Make suitable assumptions if necessary and state them clearly.

SECTION – I

2. Attempt any four : (4�4=16)

A) What is spread spectrum ? Explain with neat diagram.

B) Differentiate among 1G, 2G, 3G and 4G.

C) Draw the sinusoidal wave and represent amplitude, frequency, cycle,


wavelength on it.

D) Compare AM, FM, PM.

E) How MACA avoids problem of exposed terminals ?

3. Attempt any one : (6�1=6)

A) Illustrate CDMA, two transmitters A and B are transmitting at same frequency


and power, the keys and data of A and B are as given below :

Ad = 1, Ak = 110110

Bd = 0, Bk = 101101 8

B) Explain the architecture of GSM with neat diagram.

4. Attempt the following : (6�1=6)


What is MANET ? What are characteristics and application of MANET ?
Set R
SLR-TX – 363 -4- *SLRTX363*
SECTION – II

5. Attempt any four : (4�4=16)


A) Discuss how packet delivery takes place to and from mobile node with
suitable diagram.
B) What is Hawaii ? Why is it used ? Give and discuss its basic architecture.
C) Write a short note on agent advertisement in mobile IP.
D) Give DHCP configuration. Discuss in detail how client gets initialized via
DHCP.
E) What are advantages and disadvantages of wireless LAN.

6. Attempt any one : (6�1=6)


A) Explain overall architecture of android system with suitable diagram.
B) What is NFC ? How RFID and NFC are related ? Give and discuss general
architecture of NFC enabled phones.

7. Attempt the following : (6�1=6)


Which are the classical enhancements to TCP for mobility ? Explain any three
in detail.

_________________

Set R
*SLRTX363* SLR-TX – 363
Seat
No.

Set S

T.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
mobile computing
Day and Date : Tuesday, 27-11-2018 Max. Marks : 70
Time : 10.00 a.m. to 1.00 p.m.

Instructions: 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book on Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1�14=14)


1) Emergency number is which type of service provided by GSM ?
a) Bearer b) Tele
c) Supplementary d) None of these
2) Foreign agents and home agents advertise their presence periodically
using special ______________ messages.
a) Agent advertisement
b) Foreign agent advertisement
c) Home agent advertisement
d) Periodic agent advertisement
3) ______________ is used for initial connection setup between MS and BTS.
a) Access burst b) Dummy burst
c) Frequency burst d) Synchronization burst
4) ______________ range is used for communication under water.
a) Infrared (IR) b) Low Frequency (LF)
c) Medium Frequency (MF) d) Super High Frequency (SHF)
P.T.O.
SLR-TX – 363 -2- *SLRTX363*
5) An associated BS collects the information gathered by the sensors on a
__________ basis.
a) Data-centric b) Data-collection
c) Data-owner d) None of these
6) Android applications are made up of ____________
a) Loosely tied components b) Tightly tied components
c) Coupled components d) None of above
7) Mandatory for mobile IP is ___________ encapsulation as specified for
mobile IP.
a) IP-in-IP b) Minimal
c) Generic routing d) Maximum
8) ___________ is popularly known as Wi-Fi.
a) IEEE 802.11a b) IEEE 802.11b
c) IEEE 802.11g d) IEEE 802.11n
9) “Every terminal has its own frequency, uninterrupted”, is true for
a) sdma b) tdma
c) fdma d) cdma
10) Example of explicit reservation is
a) prma b) dama
c) Reservation tdma d) csma
11) Spread spectrum is resistant to ___________ interference.
a) Narrow band b) Broad band
c) Wide band d) All of the above
12) Sky waves are
a) 2 – 30 MHz b) 4 – 40 MHz c) 1 – 10 MHz d) 2 – 20 MHz
13) I-TCP stands for ___________
a) Indirect TCP b) Interrelated TCP
c) Inactive TCP d) Indicated TCP
14) Number of devices can be connected in one piconet is ___________
a) 6 b) 8 c) 10 d) 4

_________________

Set S
*SLRTX363* SLR-TX – 363
-3-


Seat
No.

T.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
mobile computing
Day and Date : Tuesday, 27-11-2018 Marks : 56
Time : 10.00 a.m. to 1.00 p.m.

Instruction: Make suitable assumptions if necessary and state them clearly.

SECTION – I

2. Attempt any four : (4�4=16)

A) What is spread spectrum ? Explain with neat diagram.

B) Differentiate among 1G, 2G, 3G and 4G.

C) Draw the sinusoidal wave and represent amplitude, frequency, cycle,


wavelength on it.

D) Compare AM, FM, PM.

E) How MACA avoids problem of exposed terminals ?

3. Attempt any one : (6�1=6)

A) Illustrate CDMA, two transmitters A and B are transmitting at same frequency


and power, the keys and data of A and B are as given below :

Ad = 1, Ak = 110110

Bd = 0, Bk = 101101 8

B) Explain the architecture of GSM with neat diagram.

4. Attempt the following : (6�1=6)


What is MANET ? What are characteristics and application of MANET ?
Set S
SLR-TX – 363 -4- *SLRTX363*
SECTION – II

5. Attempt any four : (4�4=16)


A) Discuss how packet delivery takes place to and from mobile node with
suitable diagram.
B) What is Hawaii ? Why is it used ? Give and discuss its basic architecture.
C) Write a short note on agent advertisement in mobile IP.
D) Give DHCP configuration. Discuss in detail how client gets initialized via
DHCP.
E) What are advantages and disadvantages of wireless LAN.

6. Attempt any one : (6�1=6)


A) Explain overall architecture of android system with suitable diagram.
B) What is NFC ? How RFID and NFC are related ? Give and discuss general
architecture of NFC enabled phones.

7. Attempt the following : (6�1=6)


Which are the classical enhancements to TCP for mobility ? Explain any three
in detail.

_________________

Set S
*SLRTX364* SLR-TX – 364

Seat
No. Set P
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Self Learning (HSS/technical) – network setup and
management tools
Day and Date : Wednesday, 28-11-2018 Total Marks : 50
Time : 10.00 a.m. to 12.00 noon

Instructions : 1) Q. No. 1 is compulsory. It should be solved in Answer


Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Marks : 10

1. Choose the correct answer : (1×10=10)


1) A modem is a network device which
A) Converts analog signal to digital signal
B) Acts as a relay
C) Convert analog signal to digital data
D) None of these
2) ________ management is the set of functions that detect, isolate and correct
malfunctions in a network.
A) Device B) Error
C) Network D) Fault
3) Performance Management is closely related to
A) Fault Management B) Risk Management
C) Security Management D) Configuration Management
4) SOA from the web service is
A) Set Oriented Architecture B) Service Open Architecture
C) Service Oriented Architecture D) None of these

P.T.O.
SLR-TX –364 -2- *SLRTX364*

5) Which of the following filters the unwanted information ?


A) Sality B) Firewall
C) Logic Bomb D) All of these
6) Hub is a multiport
A) Bridge B) Repeater
C) Router D) Gateway
7) Which is the fastest port for data transfer ?
A) Parallel B) Fire Wire 800
C) Serial D) USB 3.0
8) __________ protocol works at the application layer.
A) HTTP B) FTP
C) SMTP D) All of these
9) OSPF is used for
A) Creation of packets
B) Simulation of packets
C) Shortest path routing of packets
D) None of these
10) Switch works at __________ layer.
A) Data Link B) Physical
C) Session D) All

______________

Set P
*SLRTX364* -3- SLR-TX –364
Seat
No.

T.E. (CSE) (Part – II) (CGPA) Examination, 2018


self learning (hss/Technical) – network setup and
management tools
Day and Date : Wednesday, 28-11-2018 Marks : 40
Time : 10.00 a.m. to 12.00 noon

Attempt any four : (10×4=40)

2. Write a note on :
1) Hub
2) Switches.

3. What is Network Interface Card (NIC) ? Explain various functions of NIC.

4. Explain Abstract Syntax Notation One (ASN.1). Explain objects and Data types
in ASN.1.

5. Write a note on Security Management.

6. What is Fault ? Which are the five – step process involved in Fault Management ?
Explain Fault Detection in detail.

7. Write a note on :
1) Cryptography
2) Network Topology.

____________

Set P
Set P
*SLRTX364* SLR-TX – 364

Seat
No. Set Q
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Self Learning (HSS/technical) – network setup and
management tools

Day and Date : Wednesday, 28-11-2018 Total Marks : 50


Time : 10.00 a.m. to 12.00 noon

Instructions : 1) Q. No. 1 is compulsory. It should be solved in Answer


Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Marks : 10

1. Choose the correct answer : (1×10=10)


1) OSPF is used for
A) Creation of packets
B) Simulation of packets
C) Shortest path routing of packets
D) None of these
2) Switch works at __________ layer.
A) Data Link B) Physical
C) Session D) All
3) Which is the fastest port for data transfer ?
A) Parallel B) Fire Wire 800
C) Serial D) USB 3.0
4) __________ protocol works at the application layer.
A) HTTP B) FTP
C) SMTP D) All of these

P.T.O.
SLR-TX –364 -2- *SLRTX364*

5) A modem is a network device which


A) Converts analog signal to digital signal
B) Acts as a relay
C) Convert analog signal to digital data
D) None of these
6) ________ management is the set of functions that detect, isolate and correct
malfunctions in a network.
A) Device B) Error
C) Network D) Fault
7) Performance Management is closely related to
A) Fault Management B) Risk Management
C) Security Management D) Configuration Management
8) SOA from the web service is
A) Set Oriented Architecture B) Service Open Architecture
C) Service Oriented Architecture D) None of these
9) Which of the following filters the unwanted information ?
A) Sality B) Firewall
C) Logic Bomb D) All of these
10) Hub is a multiport
A) Bridge B) Repeater
C) Router D) Gateway

______________

Set Q
*SLRTX364* -3- SLR-TX –364
Seat
No.

T.E. (CSE) (Part – II) (CGPA) Examination, 2018


self learning (hss/Technical) – network setup and
management tools
Day and Date : Wednesday, 28-11-2018 Marks : 40
Time : 10.00 a.m. to 12.00 noon

Attempt any four : (10×4=40)

2. Write a note on :
1) Hub
2) Switches.

3. What is Network Interface Card (NIC) ? Explain various functions of NIC.

4. Explain Abstract Syntax Notation One (ASN.1). Explain objects and Data types
in ASN.1.

5. Write a note on Security Management.

6. What is Fault ? Which are the five – step process involved in Fault Management ?
Explain Fault Detection in detail.

7. Write a note on :
1) Cryptography
2) Network Topology.

____________

Set Q
Set Q
*SLRTX364* SLR-TX – 364

Seat
No. Set R
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Self Learning (HSS/technical) – network setup and
management tools

Day and Date : Wednesday, 28-11-2018 Total Marks : 50


Time : 10.00 a.m. to 12.00 noon

Instructions : 1) Q. No. 1 is compulsory. It should be solved in Answer


Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Marks : 10

1. Choose the correct answer : (1×10=10)


1) Which of the following filters the unwanted information ?
A) Sality B) Firewall
C) Logic Bomb D) All of these
2) Hub is a multiport
A) Bridge B) Repeater
C) Router D) Gateway
3) OSPF is used for
A) Creation of packets
B) Simulation of packets
C) Shortest path routing of packets
D) None of these
4) Switch works at __________ layer.
A) Data Link B) Physical
C) Session D) All

P.T.O.
SLR-TX –364 -2- *SLRTX364*

5) Performance Management is closely related to


A) Fault Management B) Risk Management
C) Security Management D) Configuration Management
6) SOA from the web service is
A) Set Oriented Architecture B) Service Open Architecture
C) Service Oriented Architecture D) None of these
7) A modem is a network device which
A) Converts analog signal to digital signal
B) Acts as a relay
C) Convert analog signal to digital data
D) None of these
8) ________ management is the set of functions that detect, isolate and correct
malfunctions in a network.
A) Device B) Error
C) Network D) Fault
9) Which is the fastest port for data transfer ?
A) Parallel B) Fire Wire 800
C) Serial D) USB 3.0
10) __________ protocol works at the application layer.
A) HTTP B) FTP
C) SMTP D) All of these

______________

Set R
*SLRTX364* -3- SLR-TX –364
Seat
No.

T.E. (CSE) (Part – II) (CGPA) Examination, 2018


self learning (hss/Technical) – network setup and
management tools
Day and Date : Wednesday, 28-11-2018 Marks : 40
Time : 10.00 a.m. to 12.00 noon

Attempt any four : (10×4=40)

2. Write a note on :
1) Hub
2) Switches.

3. What is Network Interface Card (NIC) ? Explain various functions of NIC.

4. Explain Abstract Syntax Notation One (ASN.1). Explain objects and Data types
in ASN.1.

5. Write a note on Security Management.

6. What is Fault ? Which are the five – step process involved in Fault Management ?
Explain Fault Detection in detail.

7. Write a note on :
1) Cryptography
2) Network Topology.

____________

Set R
Set R
*SLRTX364* SLR-TX – 364

Seat
No. Set S
T.E. (CSE) (Part – II) (CGPA) Examination, 2018
Self Learning (HSS/technical) – network setup and
management tools

Day and Date : Wednesday, 28-11-2018 Total Marks : 50


Time : 10.00 a.m. to 12.00 noon

Instructions : 1) Q. No. 1 is compulsory. It should be solved in Answer


Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Marks : 10

1. Choose the correct answer : (1×10=10)


1) Performance Management is closely related to
A) Fault Management B) Risk Management
C) Security Management D) Configuration Management
2) SOA from the web service is
A) Set Oriented Architecture B) Service Open Architecture
C) Service Oriented Architecture D) None of these
3) Which of the following filters the unwanted information ?
A) Sality B) Firewall
C) Logic Bomb D) All of these
4) Hub is a multiport
A) Bridge B) Repeater
C) Router D) Gateway
5) Which is the fastest port for data transfer ?
A) Parallel B) Fire Wire 800
C) Serial D) USB 3.0
P.T.O.
SLR-TX –364 -2- *SLRTX364*

6) __________ protocol works at the application layer.


A) HTTP B) FTP
C) SMTP D) All of these
7) OSPF is used for
A) Creation of packets
B) Simulation of packets
C) Shortest path routing of packets
D) None of these
8) Switch works at __________ layer.
A) Data Link B) Physical
C) Session D) All
9) A modem is a network device which
A) Converts analog signal to digital signal
B) Acts as a relay
C) Convert analog signal to digital data
D) None of these
10) ________ management is the set of functions that detect, isolate and correct
malfunctions in a network.
A) Device B) Error
C) Network D) Fault

______________

Set S
*SLRTX364* -3- SLR-TX –364
Seat
No.

T.E. (CSE) (Part – II) (CGPA) Examination, 2018


self learning (hss/Technical) – network setup and
management tools
Day and Date : Wednesday, 28-11-2018 Marks : 40
Time : 10.00 a.m. to 12.00 noon

Attempt any four : (10×4=40)

2. Write a note on :
1) Hub
2) Switches.

3. What is Network Interface Card (NIC) ? Explain various functions of NIC.

4. Explain Abstract Syntax Notation One (ASN.1). Explain objects and Data types
in ASN.1.

5. Write a note on Security Management.

6. What is Fault ? Which are the five – step process involved in Fault Management ?
Explain Fault Detection in detail.

7. Write a note on :
1) Cryptography
2) Network Topology.

____________

Set S
Set S
*SLRTX365* SLR-TX – 365
Seat
No. Set P
T.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
software licensing and practices
(self Learning – HSS/ Technical)
Day and Date : Wednesday, 28-11-2018 Total Marks : 50
Time : 10.00 a.m. to 12.00 noon
Instruction : All questions are compulsory.

1. Attempt any five of the following : (5�6=30)


1) Write a short note on Open Source Software Licensing.
2) Compare Copyright and Contract.
3) What is Warranty ? Explain with example.
4) Explain Classic Proprietary Licence.
5) Discuss issues with respect to Patents.
6) Explain in detail about Forking.

2. Attempt any two of the following : (2�10=20)


1) Discuss Application and its Philosophy.
2) Describe issues with Copyrights.
3) Explain the choice of Open Source or Free Software Licensing.

___________________
*SLRTX366* SLR-TX – 366

Seat
No. Set P
T.E. (C.S.E.) (Part – II) (CGPA) Examination, 2018
Self-learning (HSS/Technical)
COMPUTER MODELING AND SIMULATION
Day and Date : Wednesday, 28-11-2018 Max. Marks : 50
Time : 10.00 a.m. to 12.00 noon

Instructions : 1) Q. No. 1 is compulsory. It should be solved in Answer Book


Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
MCQ/Objective Type Questions
Marks : 10

1. Choose the correct answer : 10


1) The term _________ is used to describe activities and events in the
environment that affect the system.
a) endogenous b) exogenous
c) event d) simulation
2) A _________ is defined as a representation of a system for the purpose of
studying the system.
a) system b) event c) model d) activity
3) ________ is defined as an instantaneous occurrence that may change the
state of the system.
a) component b) model c) activity d) event
4) NAM is
a) Network Analyzer b) Network Animator
c) Network Analysis Machine d) None of these
5) NS has two different types of event schedulers; _______ and ________
a) real time and virtual b) real time and non real time
c) discrete and continuous d) none of these
6) TCL is
a) Tool command language b) Terminal common language
c) Terminal command language d) Text command language

P.T.O.
SLR-TX – 366 -2- *SLRTX366*

7) Simulation can be used to


a) verify analytic solutions
b) determine the requirements
c) reinforce analytic solution methodologies
d) all of the above
8) Static simulations can be also called as
a) Monte Carlo simulation b) Stephan Carlo simulation
c) Newton Raphson d) None of these
9) __________ is a subprogram that updates system state when a particular
type of event occurs.
a) Simulation clock b) Statistical routine
c) Timing routine d) Event routine
10) To simulate is to try to _________ the features, appearance and characteristics
of a real system.
a) Develop b) Duplicate c) Analyze d) Multiply

______________

Set P
*SLRTX366* -3- SLR-TX – 366
Seat
No.

T.E. (C.S.E.) (Part – II) (CGPA) Examination, 2018


Self-learning (HSS/Technical)
COMPUTER MODELING AND SIMULATION

Day and Date : Wednesday, 28-11-2018 Marks : 40


Time : 10.00 a.m. to 12.00 noon

2. Attempt any four (each 10 marks) : (4×10=40)


1) Describe when simulation is appropriate tool and when it is not.
2) Explain different types of simulation model.
3) What is OTcl ? Explain features of OTcl with sample script.
4) Describe event scheduler in detail. Explain different types of event
schedulers.
5) Explain ns packet format with neat diagram.
6) Explain features and applications of TCL.
_____________________

Set P
Set P
*SLRTX366* SLR-TX – 366

Seat
No. Set Q
T.E. (C.S.E.) (Part – II) (CGPA) Examination, 2018
Self-learning (HSS/Technical)
COMPUTER MODELING AND SIMULATION
Day and Date : Wednesday, 28-11-2018 Max. Marks : 50
Time : 10.00 a.m. to 12.00 noon

Instructions : 1) Q. No. 1 is compulsory. It should be solved in Answer Book


Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
MCQ/Objective Type Questions
Marks : 10

1. Choose the correct answer : 10


1) __________ is a subprogram that updates system state when a particular
type of event occurs.
a) Simulation clock b) Statistical routine
c) Timing routine d) Event routine
2) To simulate is to try to _________ the features, appearance and characteristics
of a real system.
a) Develop b) Duplicate c) Analyze d) Multiply
3) Simulation can be used to
a) verify analytic solutions
b) determine the requirements
c) reinforce analytic solution methodologies
d) all of the above
4) Static simulations can be also called as
a) Monte Carlo simulation b) Stephan Carlo simulation
c) Newton Raphson d) None of these
5) The term _________ is used to describe activities and events in the
environment that affect the system.
a) endogenous b) exogenous
c) event d) simulation

P.T.O.
SLR-TX – 366 -2- *SLRTX366*

6) A _________ is defined as a representation of a system for the purpose of


studying the system.
a) system b) event c) model d) activity
7) ________ is defined as an instantaneous occurrence that may change the
state of the system.
a) component b) model c) activity d) event
8) NAM is
a) Network Analyzer b) Network Animator
c) Network Analysis Machine d) None of these
9) NS has two different types of event schedulers; _______ and ________
a) real time and virtual b) real time and non real time
c) discrete and continuous d) none of these
10) TCL is
a) Tool command language b) Terminal common language
c) Terminal command language d) Text command language

______________

Set Q
*SLRTX366* -3- SLR-TX – 366
Seat
No.

T.E. (C.S.E.) (Part – II) (CGPA) Examination, 2018


Self-learning (HSS/Technical)
COMPUTER MODELING AND SIMULATION

Day and Date : Wednesday, 28-11-2018 Marks : 40


Time : 10.00 a.m. to 12.00 noon

2. Attempt any four (each 10 marks) : (4×10=40)


1) Describe when simulation is appropriate tool and when it is not.
2) Explain different types of simulation model.
3) What is OTcl ? Explain features of OTcl with sample script.
4) Describe event scheduler in detail. Explain different types of event
schedulers.
5) Explain ns packet format with neat diagram.
6) Explain features and applications of TCL.
_____________________

Set Q
Set Q
*SLRTX366* SLR-TX – 366

Seat
No. Set R
T.E. (C.S.E.) (Part – II) (CGPA) Examination, 2018
Self-learning (HSS/Technical)
COMPUTER MODELING AND SIMULATION
Day and Date : Wednesday, 28-11-2018 Max. Marks : 50
Time : 10.00 a.m. to 12.00 noon

Instructions : 1) Q. No. 1 is compulsory. It should be solved in Answer Book


Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
MCQ/Objective Type Questions
Marks : 10

1. Choose the correct answer : 10

1) NS has two different types of event schedulers; _______ and ________


a) real time and virtual b) real time and non real time
c) discrete and continuous d) none of these
2) TCL is
a) Tool command language b) Terminal common language
c) Terminal command language d) Text command language
3) __________ is a subprogram that updates system state when a particular
type of event occurs.
a) Simulation clock b) Statistical routine
c) Timing routine d) Event routine
4) To simulate is to try to _________ the features, appearance and characteristics
of a real system.
a) Develop b) Duplicate c) Analyze d) Multiply
5) ________ is defined as an instantaneous occurrence that may change the
state of the system.
a) component b) model c) activity d) event
6) NAM is
a) Network Analyzer b) Network Animator
c) Network Analysis Machine d) None of these
P.T.O.
SLR-TX – 366 -2- *SLRTX366*

7) The term _________ is used to describe activities and events in the


environment that affect the system.
a) endogenous b) exogenous
c) event d) simulation
8) A _________ is defined as a representation of a system for the purpose of
studying the system.
a) system b) event c) model d) activity
9) Simulation can be used to
a) verify analytic solutions
b) determine the requirements
c) reinforce analytic solution methodologies
d) all of the above
10) Static simulations can be also called as
a) Monte Carlo simulation b) Stephan Carlo simulation
c) Newton Raphson d) None of these
______________

Set R
*SLRTX366* -3- SLR-TX – 366
Seat
No.

T.E. (C.S.E.) (Part – II) (CGPA) Examination, 2018


Self-learning (HSS/Technical)
COMPUTER MODELING AND SIMULATION

Day and Date : Wednesday, 28-11-2018 Marks : 40


Time : 10.00 a.m. to 12.00 noon

2. Attempt any four (each 10 marks) : (4×10=40)


1) Describe when simulation is appropriate tool and when it is not.
2) Explain different types of simulation model.
3) What is OTcl ? Explain features of OTcl with sample script.
4) Describe event scheduler in detail. Explain different types of event
schedulers.
5) Explain ns packet format with neat diagram.
6) Explain features and applications of TCL.
_____________________

Set R
Set R
*SLRTX366* SLR-TX – 366

Seat
No. Set S
T.E. (C.S.E.) (Part – II) (CGPA) Examination, 2018
Self-learning (HSS/Technical)
COMPUTER MODELING AND SIMULATION
Day and Date : Wednesday, 28-11-2018 Max. Marks : 50
Time : 10.00 a.m. to 12.00 noon

Instructions : 1) Q. No. 1 is compulsory. It should be solved in Answer Book


Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
MCQ/Objective Type Questions
Marks : 10

1. Choose the correct answer : 10


1) ________ is defined as an instantaneous occurrence that may change the
state of the system.
a) component b) model c) activity d) event
2) NAM is
a) Network Analyzer b) Network Animator
c) Network Analysis Machine d) None of these
3) NS has two different types of event schedulers; _______ and ________
a) real time and virtual b) real time and non real time
c) discrete and continuous d) none of these
4) TCL is
a) Tool command language b) Terminal common language
c) Terminal command language d) Text command language
5) Simulation can be used to
a) verify analytic solutions
b) determine the requirements
c) reinforce analytic solution methodologies
d) all of the above
6) Static simulations can be also called as
a) Monte Carlo simulation b) Stephan Carlo simulation
c) Newton Raphson d) None of these

P.T.O.
SLR-TX – 366 -2- *SLRTX366*

7) __________ is a subprogram that updates system state when a particular


type of event occurs.
a) Simulation clock b) Statistical routine
c) Timing routine d) Event routine
8) To simulate is to try to _________ the features, appearance and characteristics
of a real system.
a) Develop b) Duplicate c) Analyze d) Multiply
9) The term _________ is used to describe activities and events in the
environment that affect the system.
a) endogenous b) exogenous
c) event d) simulation
10) A _________ is defined as a representation of a system for the purpose of
studying the system.
a) system b) event c) model d) activity

______________

Set S
*SLRTX366* -3- SLR-TX – 366
Seat
No.

T.E. (C.S.E.) (Part – II) (CGPA) Examination, 2018


Self-learning (HSS/Technical)
COMPUTER MODELING AND SIMULATION

Day and Date : Wednesday, 28-11-2018 Marks : 40


Time : 10.00 a.m. to 12.00 noon

2. Attempt any four (each 10 marks) : (4×10=40)


1) Describe when simulation is appropriate tool and when it is not.
2) Explain different types of simulation model.
3) What is OTcl ? Explain features of OTcl with sample script.
4) Describe event scheduler in detail. Explain different types of event
schedulers.
5) Explain ns packet format with neat diagram.
6) Explain features and applications of TCL.
_____________________

Set S
Set S
*SLRTX367* SLR-TX – 367
Seat
No.
Set P
T.E. (CSE) (Part – II) Examination, 2018
artificial intelligence (Old)
Day and Date : Friday, 21-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) Al research is that ___________ requires knowledge.
a) intelligence b) solution c) facts d) inference
2) Which search method takes less memory ?
a) Breadth-First search b) Depth-First search
c) Optimal search d) Linear search
3) Which is not a property of representation of knowledge ?
a) Inferential Adequacy b) Representational Adequacy
c) Representational Verification d) Inferential Efficiency
4) What is state space ?
a) The whole problem
b) Your definition to a problem
c) Problem you design
d) Representing your problem with variable and parameter
5) The first requirement of a good control strategy is that it causes
a) motion b) acceleration c) efficient d) performance
6) A _____________ is a special kind of local maximum.
a) plateau b) ridge
c) heuristic function d) all
7) An __________ attributes are used in predicate logic.
a) Facts and isa b) Object and is
c) Instance and Isa d) None of these

P.T.O.
SLR-TX – 367 -2- *SLRTX367*
8) A difference table is used in _______ algorithm.
a) generate and test b) constraint satisfaction
c) problem reduction d) mean-end analysis
9) The _____________ at which representation of objects at the knowledge level
are defined in terms of symbols that can be manipulated by programs.
a) Symbol level b) Representation level
c) Data level d) Knowledge level
10) The Generate-Test algorithm is a ___________ search procedure is
generate distance complete solutions must be generated before they can
be tested.
a) Generate and Test b) Depth-first
c) Breadth-first search d) All
11) AND-OR graphs are the part of the ________.
a) Production rules b) Problem characteristics
c) Problem reduction d) None of above
12) Constraint satisfaction is a search procedure that operate in a space of
________ sets.
a) conditional b) inverse c) reverse d) constraint
13) Solving a Cryptarithmetic problem is a ___________ example.
a) Constraint satisfaction b) Depth-first search
c) Best first search d) All
14) The ______________ process centers around the detection of differences
between current state and goal state.
a) mean analysis b) means-ends analysis
c) median-ends analysis d) both a and b
15) Truths in some relevant world is called as
a) relations b) mappings c) facts d) data store
16) Expert system use _____________ representation for knowledge.
a) architectural b) structural c) formal d) symbolic
17) The development of MYCIN began at ______________ university.
a) Stanford b) Haward c) Cambridge d) Boston
18) CASNET is based on
a) Decision trees b) Associative network
c) Neural network d) Blackboard architecture
19) ______________ networks in which we preserve the formalism and rely
instead on the modularity of the world we are trying to model.
a) CASNET b) Structural c) Bayesian d) None of these
20) _____________ is computerized advice-giver, that is capable of reasoning
but which is usually confined to a rather narrow field of knowledge.
a) Communication system b) Knowledge system
c) Common system d) Expert system
_________________ Set P
*SLRTX367* -3- SLR-TX – 367
Seat
No.

T.E. (CSE) (Part – II) Examination, 2018
artificial intelligence (Old)

Day and Date : Friday, 21-12-2018 Marks : 80


Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any four : (5×4=20)


a) Define AI and explain AI any one technique in detail.
b) Differentiate between best first search and depth first search algorithms.
c) Explain Means- Ends analysis algorithm.
d) Explain constraint satisfaction algorithm by using suitable example.
e) What are the different issues in knowledge representation ?
f) Describe the frame problem in detail.

3. Explain production system characteristics and also describe issues in the design
of search programs. 10
OR

Explain following algorithms in detail. 10


a) Generate and test algorithm.
b) Hill climbing algorithm.

4. Write note on (any two) : (2×5=10)

a) The level of the model.

b) Problem characteristics.

c) Representation and mappings.

Set P
SLR-TX – 367 -4- *SLRTX367*

SECTION – II

5. Attempt any four : (5×4=20)

a) Explain resolution in knowledge representation techniques.

b) Explain Bayesian Networks with an example.

c) What is resolution in knowledge representation techniques ?

d) Explain non monotonic reasoning.

e) Explain conceptual dependency used in slot and filter structure.

f) What are the different characteristic features of expert system ?

6. Explain Bayesian Networks and Demster Shafer Theory in detail. 10


OR

6. Explain Semantic Nets and Frames in used in slot and filter structure. 10

7. What is an expert system ? Also explain importance and all applications of


expert system. 10

_____________________

Set P
*SLRTX367* SLR-TX – 367
Seat
No.
Set Q
T.E. (CSE) (Part – II) Examination, 2018
artificial intelligence (Old)
Day and Date : Friday, 21-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) Expert system use _____________ representation for knowledge.
a) architectural b) structural c) formal d) symbolic
2) The development of MYCIN began at ______________ university.
a) Stanford b) Haward c) Cambridge d) Boston
3) CASNET is based on
a) Decision trees b) Associative network
c) Neural network d) Blackboard architecture
4) ______________ networks in which we preserve the formalism and rely
instead on the modularity of the world we are trying to model.
a) CASNET b) Structural c) Bayesian d) None of these
5) _____________ is computerized advice-giver, that is capable of reasoning
but which is usually confined to a rather narrow field of knowledge.
a) Communication system b) Knowledge system
c) Common system d) Expert system
6) Al research is that ___________ requires knowledge.
a) intelligence b) solution c) facts d) inference
7) Which search method takes less memory ?
a) Breadth-First search b) Depth-First search
c) Optimal search d) Linear search
8) Which is not a property of representation of knowledge ?
a) Inferential Adequacy b) Representational Adequacy
c) Representational Verification d) Inferential Efficiency

P.T.O.
SLR-TX – 367 -2- *SLRTX367*
9) What is state space ?
a) The whole problem
b) Your definition to a problem
c) Problem you design
d) Representing your problem with variable and parameter
10) The first requirement of a good control strategy is that it causes
a) motion b) acceleration c) efficient d) performance
11) A _____________ is a special kind of local maximum.
a) plateau b) ridge
c) heuristic function d) all
12) An __________ attributes are used in predicate logic.
a) Facts and isa b) Object and is
c) Instance and Isa d) None of these
13) A difference table is used in _______ algorithm.
a) generate and test b) constraint satisfaction
c) problem reduction d) mean-end analysis
14) The _____________ at which representation of objects at the knowledge level
are defined in terms of symbols that can be manipulated by programs.
a) Symbol level b) Representation level
c) Data level d) Knowledge level
15) The Generate-Test algorithm is a ___________ search procedure is
generate distance complete solutions must be generated before they can
be tested.
a) Generate and Test b) Depth-first
c) Breadth-first search d) All
16) AND-OR graphs are the part of the ________.
a) Production rules b) Problem characteristics
c) Problem reduction d) None of above
17) Constraint satisfaction is a search procedure that operate in a space of
________ sets.
a) conditional b) inverse c) reverse d) constraint
18) Solving a Cryptarithmetic problem is a ___________ example.
a) Constraint satisfaction b) Depth-first search
c) Best first search d) All
19) The ______________ process centers around the detection of differences
between current state and goal state.
a) mean analysis b) means-ends analysis
c) median-ends analysis d) both a and b
20) Truths in some relevant world is called as
a) relations b) mappings c) facts d) data store
_________________ Set Q
*SLRTX367* -3- SLR-TX – 367
Seat
No.

T.E. (CSE) (Part – II) Examination, 2018
artificial intelligence (Old)

Day and Date : Friday, 21-12-2018 Marks : 80


Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any four : (5×4=20)


a) Define AI and explain AI any one technique in detail.
b) Differentiate between best first search and depth first search algorithms.
c) Explain Means- Ends analysis algorithm.
d) Explain constraint satisfaction algorithm by using suitable example.
e) What are the different issues in knowledge representation ?
f) Describe the frame problem in detail.

3. Explain production system characteristics and also describe issues in the design
of search programs. 10
OR

Explain following algorithms in detail. 10


a) Generate and test algorithm.
b) Hill climbing algorithm.

4. Write note on (any two) : (2×5=10)

a) The level of the model.

b) Problem characteristics.

c) Representation and mappings.

Set Q
SLR-TX – 367 -4- *SLRTX367*

SECTION – II

5. Attempt any four : (5×4=20)

a) Explain resolution in knowledge representation techniques.

b) Explain Bayesian Networks with an example.

c) What is resolution in knowledge representation techniques ?

d) Explain non monotonic reasoning.

e) Explain conceptual dependency used in slot and filter structure.

f) What are the different characteristic features of expert system ?

6. Explain Bayesian Networks and Demster Shafer Theory in detail. 10


OR

6. Explain Semantic Nets and Frames in used in slot and filter structure. 10

7. What is an expert system ? Also explain importance and all applications of


expert system. 10

_____________________

Set Q
*SLRTX367* SLR-TX – 367
Seat
No.
Set R
T.E. (CSE) (Part – II) Examination, 2018
artificial intelligence (Old)
Day and Date : Friday, 21-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) AND-OR graphs are the part of the ________.
a) Production rules b) Problem characteristics
c) Problem reduction d) None of above
2) Constraint satisfaction is a search procedure that operate in a space of
________ sets.
a) conditional b) inverse c) reverse d) constraint
3) Solving a Cryptarithmetic problem is a ___________ example.
a) Constraint satisfaction b) Depth-first search
c) Best first search d) All
4) The ______________ process centers around the detection of differences
between current state and goal state.
a) mean analysis b) means-ends analysis
c) median-ends analysis d) both a and b
5) Truths in some relevant world is called as
a) relations b) mappings c) facts d) data store
6) Expert system use _____________ representation for knowledge.
a) architectural b) structural c) formal d) symbolic
7) The development of MYCIN began at ______________ university.
a) Stanford b) Haward c) Cambridge d) Boston
8) CASNET is based on
a) Decision trees b) Associative network
c) Neural network d) Blackboard architecture
P.T.O.
SLR-TX – 367 -2- *SLRTX367*
9) ______________ networks in which we preserve the formalism and rely
instead on the modularity of the world we are trying to model.
a) CASNET b) Structural c) Bayesian d) None of these
10) _____________ is computerized advice-giver, that is capable of reasoning
but which is usually confined to a rather narrow field of knowledge.
a) Communication system b) Knowledge system
c) Common system d) Expert system
11) Al research is that ___________ requires knowledge.
a) intelligence b) solution c) facts d) inference
12) Which search method takes less memory ?
a) Breadth-First search b) Depth-First search
c) Optimal search d) Linear search
13) Which is not a property of representation of knowledge ?
a) Inferential Adequacy b) Representational Adequacy
c) Representational Verification d) Inferential Efficiency
14) What is state space ?
a) The whole problem
b) Your definition to a problem
c) Problem you design
d) Representing your problem with variable and parameter
15) The first requirement of a good control strategy is that it causes
a) motion b) acceleration c) efficient d) performance
16) A _____________ is a special kind of local maximum.
a) plateau b) ridge
c) heuristic function d) all
17) An __________ attributes are used in predicate logic.
a) Facts and isa b) Object and is
c) Instance and Isa d) None of these
18) A difference table is used in _______ algorithm.
a) generate and test b) constraint satisfaction
c) problem reduction d) mean-end analysis
19) The _____________ at which representation of objects at the knowledge level
are defined in terms of symbols that can be manipulated by programs.
a) Symbol level b) Representation level
c) Data level d) Knowledge level
20) The Generate-Test algorithm is a ___________ search procedure is
generate distance complete solutions must be generated before they can
be tested.
a) Generate and Test b) Depth-first
c) Breadth-first search d) All Set R
_________________
*SLRTX367* -3- SLR-TX – 367
Seat
No.

T.E. (CSE) (Part – II) Examination, 2018
artificial intelligence (Old)

Day and Date : Friday, 21-12-2018 Marks : 80


Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any four : (5×4=20)


a) Define AI and explain AI any one technique in detail.
b) Differentiate between best first search and depth first search algorithms.
c) Explain Means- Ends analysis algorithm.
d) Explain constraint satisfaction algorithm by using suitable example.
e) What are the different issues in knowledge representation ?
f) Describe the frame problem in detail.

3. Explain production system characteristics and also describe issues in the design
of search programs. 10
OR

Explain following algorithms in detail. 10


a) Generate and test algorithm.
b) Hill climbing algorithm.

4. Write note on (any two) : (2×5=10)

a) The level of the model.

b) Problem characteristics.

c) Representation and mappings.

Set R
SLR-TX – 367 -4- *SLRTX367*

SECTION – II

5. Attempt any four : (5×4=20)

a) Explain resolution in knowledge representation techniques.

b) Explain Bayesian Networks with an example.

c) What is resolution in knowledge representation techniques ?

d) Explain non monotonic reasoning.

e) Explain conceptual dependency used in slot and filter structure.

f) What are the different characteristic features of expert system ?

6. Explain Bayesian Networks and Demster Shafer Theory in detail. 10


OR

6. Explain Semantic Nets and Frames in used in slot and filter structure. 10

7. What is an expert system ? Also explain importance and all applications of


expert system. 10

_____________________

Set R
*SLRTX367* SLR-TX – 367
Seat
No.
Set S
T.E. (CSE) (Part – II) Examination, 2018
artificial intelligence (Old)
Day and Date : Friday, 21-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) A _____________ is a special kind of local maximum.
a) plateau b) ridge
c) heuristic function d) all
2) An __________ attributes are used in predicate logic.
a) Facts and isa b) Object and is
c) Instance and Isa d) None of these
3) A difference table is used in _______ algorithm.
a) generate and test b) constraint satisfaction
c) problem reduction d) mean-end analysis
4) The _____________ at which representation of objects at the knowledge level
are defined in terms of symbols that can be manipulated by programs.
a) Symbol level b) Representation level
c) Data level d) Knowledge level
5) The Generate-Test algorithm is a ___________ search procedure is
generate distance complete solutions must be generated before they can
be tested.
a) Generate and Test b) Depth-first
c) Breadth-first search d) All
6) AND-OR graphs are the part of the ________.
a) Production rules b) Problem characteristics
c) Problem reduction d) None of above
7) Constraint satisfaction is a search procedure that operate in a space of
________ sets.
a) conditional b) inverse c) reverse d) constraint
P.T.O.
SLR-TX – 367 -2- *SLRTX367*
8) Solving a Cryptarithmetic problem is a ___________ example.
a) Constraint satisfaction b) Depth-first search
c) Best first search d) All
9) The ______________ process centers around the detection of differences
between current state and goal state.
a) mean analysis b) means-ends analysis
c) median-ends analysis d) both a and b
10) Truths in some relevant world is called as
a) relations b) mappings c) facts d) data store
11) Expert system use _____________ representation for knowledge.
a) architectural b) structural c) formal d) symbolic
12) The development of MYCIN began at ______________ university.
a) Stanford b) Haward c) Cambridge d) Boston
13) CASNET is based on
a) Decision trees b) Associative network
c) Neural network d) Blackboard architecture
14) ______________ networks in which we preserve the formalism and rely
instead on the modularity of the world we are trying to model.
a) CASNET b) Structural c) Bayesian d) None of these
15) _____________ is computerized advice-giver, that is capable of reasoning
but which is usually confined to a rather narrow field of knowledge.
a) Communication system b) Knowledge system
c) Common system d) Expert system
16) Al research is that ___________ requires knowledge.
a) intelligence b) solution c) facts d) inference
17) Which search method takes less memory ?
a) Breadth-First search b) Depth-First search
c) Optimal search d) Linear search
18) Which is not a property of representation of knowledge ?
a) Inferential Adequacy b) Representational Adequacy
c) Representational Verification d) Inferential Efficiency
19) What is state space ?
a) The whole problem
b) Your definition to a problem
c) Problem you design
d) Representing your problem with variable and parameter
20) The first requirement of a good control strategy is that it causes
a) motion b) acceleration c) efficient d) performance
_________________

Set S
*SLRTX367* -3- SLR-TX – 367
Seat
No.

T.E. (CSE) (Part – II) Examination, 2018
artificial intelligence (Old)

Day and Date : Friday, 21-12-2018 Marks : 80


Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any four : (5×4=20)


a) Define AI and explain AI any one technique in detail.
b) Differentiate between best first search and depth first search algorithms.
c) Explain Means- Ends analysis algorithm.
d) Explain constraint satisfaction algorithm by using suitable example.
e) What are the different issues in knowledge representation ?
f) Describe the frame problem in detail.

3. Explain production system characteristics and also describe issues in the design
of search programs. 10
OR

Explain following algorithms in detail. 10


a) Generate and test algorithm.
b) Hill climbing algorithm.

4. Write note on (any two) : (2×5=10)

a) The level of the model.

b) Problem characteristics.

c) Representation and mappings.

Set S
SLR-TX – 367 -4- *SLRTX367*

SECTION – II

5. Attempt any four : (5×4=20)

a) Explain resolution in knowledge representation techniques.

b) Explain Bayesian Networks with an example.

c) What is resolution in knowledge representation techniques ?

d) Explain non monotonic reasoning.

e) Explain conceptual dependency used in slot and filter structure.

f) What are the different characteristic features of expert system ?

6. Explain Bayesian Networks and Demster Shafer Theory in detail. 10


OR

6. Explain Semantic Nets and Frames in used in slot and filter structure. 10

7. What is an expert system ? Also explain importance and all applications of


expert system. 10

_____________________

Set S
*SLRTX368* SLR-TX – 368
Seat
No.

Set P
B.E. (Computer Science and Engineering) (Part – I)
(CGPA) Examination, 2018
Advanced Computer Architecture
Day and Date : Thursday, 29-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) __________ parallelism which arises from the logic of a problem solution.
a) Functional parallelism b) Data parallelism
c) Regular d) Coarse grained
2) Output dependence and ____________ are called as name
dependences.
a) True data dependence b) Anti dependence
c) Control dependence d) Structural dependence
3) Success rate of 1-bit branch prediction is __________
a) 70% b) 100% c) 90% d) 80%
4) In dynamic scheduling instructions are scheduled by __________
a) Hardware b) Software
c) Both hardware and software d) None of these
5) Pipelining and __________ are used as basic parallel techniques.
a) Replication b) Data parallelism
c) Function parallelism d) Process level parallelism

P.T.O.
SLR-TX – 368 -2- *SLRTX368*

6) Which of the following factor influence vector execution time ?


a) Length of operand vector b) Structural hazards
c) Data dependencies d) All of the options
7) Basic vector architecture have __________ vector registers.
a) 16 b) 32 c) 64 d) 8
8) One to one mapping is known as __________
a) Complete fine granularity b) Coarse granularity
c) Partial fine granularity d) None of above
9) __________ is an example for COMA machines.
a) KSR-1 b) DDM
c) Both a) and b) d) None of above
10) In MPP there is square array of ____________ active processing
elements.
a) 64 * 64 b) 256 * 256 c) 16 * 16 d) 128 * 128
11) __________ is a special purpose memory for data format conversion.
a) Associative memory b) Systolic memory
c) Flash memory d) Staging memory
12) Performance of CM5 machine for matrix multiply is _________ MFLOPS.
a) 128 b) 64 c) 100 d) 164
13) __________ is a solution for Remote load as well as synchronization
problems.
a) Use of cache memory
b) Pre fetching
c) Threads and fast context switching
d) None of above
14) Pyramid is combination of ___________
a) NN and hypercube b) NN and Mesh
c) NN, Mesh and tree d) NN and tree
_____________________

Set P
*SLRTX368* -3- SLR-TX – 368
Seat
No.

B.E. (Computer Science and Engineering) (Part – I)
(CGPA) Examination, 2018
Advanced Computer Architecture
Day and Date : Thursday, 29-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three questions : (3×4=12)


1) Explain concept of concurrent and parallel execution with suitable
diagram.
2) Explain vector length and vector stride.
3) What is hazard ? Explain different types of hazards.
4) Write a vector program to implement operation DAXPY.

3. Answer any two questions : (2×8=16)


1) Explain 1-bit and 2-bit prediction schemes with suitable diagram.
2) Explain score boarding with suitable diagram.
3) Explain basic vector architecture with suitable diagram.

SECTION – II

4. Answer any three questions : (3×4=12)


1) List and explain alternative architectural classes.
2) List and explain problems of scalable computers with suitable example.
3) List and explain main design issues of scalable MIMD computers.
4) Explain static data flow machine with suitable diagram.

Set P
SLR-TX – 368 -4- *SLRTX368*

5. List and explain aspects of CM5 system design. (1×8=8)


OR
5. Explain MPP processing element IC with suitable diagram. (1×8=8)

6. List and explain operators used for construction of data flow graphs and draw
data flow graph for following FORTRAN program. (1×8=8)
P=X+Y
Q = P/Y
R=X*P
S=R–Q
T=R*P
U = S/T

_____________________

Set P
*SLRTX368* SLR-TX – 368
Seat
No.

Set Q
B.E. (Computer Science and Engineering) (Part – I)
(CGPA) Examination, 2018
Advanced Computer Architecture
Day and Date : Thursday, 29-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) One to one mapping is known as __________
a) Complete fine granularity b) Coarse granularity
c) Partial fine granularity d) None of above
2) __________ is an example for COMA machines.
a) KSR-1 b) DDM
c) Both a) and b) d) None of above
3) In MPP there is square array of ____________ active processing
elements.
a) 64 * 64 b) 256 * 256 c) 16 * 16 d) 128 * 128
4) __________ is a special purpose memory for data format conversion.
a) Associative memory b) Systolic memory
c) Flash memory d) Staging memory
5) Performance of CM5 machine for matrix multiply is _________ MFLOPS.
a) 128 b) 64 c) 100 d) 164

P.T.O.
SLR-TX – 368 -2- *SLRTX368*

6) __________ is a solution for Remote load as well as synchronization


problems.
a) Use of cache memory
b) Pre fetching
c) Threads and fast context switching
d) None of above
7) Pyramid is combination of ___________
a) NN and hypercube b) NN and Mesh
c) NN, Mesh and tree d) NN and tree
8) __________ parallelism which arises from the logic of a problem solution.
a) Functional parallelism b) Data parallelism
c) Regular d) Coarse grained
9) Output dependence and ____________ are called as name
dependences.
a) True data dependence b) Anti dependence
c) Control dependence d) Structural dependence
10) Success rate of 1-bit branch prediction is __________
a) 70% b) 100% c) 90% d) 80%
11) In dynamic scheduling instructions are scheduled by __________
a) Hardware b) Software
c) Both hardware and software d) None of these
12) Pipelining and __________ are used as basic parallel techniques.
a) Replication b) Data parallelism
c) Function parallelism d) Process level parallelism
13) Which of the following factor influence vector execution time ?
a) Length of operand vector b) Structural hazards
c) Data dependencies d) All of the options
14) Basic vector architecture have __________ vector registers.
a) 16 b) 32 c) 64 d) 8
_____________________

Set Q
*SLRTX368* -3- SLR-TX – 368
Seat
No.

B.E. (Computer Science and Engineering) (Part – I)
(CGPA) Examination, 2018
Advanced Computer Architecture
Day and Date : Thursday, 29-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three questions : (3×4=12)


1) Explain concept of concurrent and parallel execution with suitable
diagram.
2) Explain vector length and vector stride.
3) What is hazard ? Explain different types of hazards.
4) Write a vector program to implement operation DAXPY.

3. Answer any two questions : (2×8=16)


1) Explain 1-bit and 2-bit prediction schemes with suitable diagram.
2) Explain score boarding with suitable diagram.
3) Explain basic vector architecture with suitable diagram.

SECTION – II

4. Answer any three questions : (3×4=12)


1) List and explain alternative architectural classes.
2) List and explain problems of scalable computers with suitable example.
3) List and explain main design issues of scalable MIMD computers.
4) Explain static data flow machine with suitable diagram.

Set Q
SLR-TX – 368 -4- *SLRTX368*

5. List and explain aspects of CM5 system design. (1×8=8)


OR
5. Explain MPP processing element IC with suitable diagram. (1×8=8)

6. List and explain operators used for construction of data flow graphs and draw
data flow graph for following FORTRAN program. (1×8=8)
P=X+Y
Q = P/Y
R=X*P
S=R–Q
T=R*P
U = S/T

_____________________

Set Q
*SLRTX368* SLR-TX – 368
Seat
No.

Set R
B.E. (Computer Science and Engineering) (Part – I)
(CGPA) Examination, 2018
Advanced Computer Architecture
Day and Date : Thursday, 29-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) Pipelining and __________ are used as basic parallel techniques.
a) Replication b) Data parallelism
c) Function parallelism d) Process level parallelism
2) Which of the following factor influence vector execution time ?
a) Length of operand vector b) Structural hazards
c) Data dependencies d) All of the options
3) Basic vector architecture have __________ vector registers.
a) 16 b) 32 c) 64 d) 8
4) One to one mapping is known as __________
a) Complete fine granularity b) Coarse granularity
c) Partial fine granularity d) None of above
5) __________ is an example for COMA machines.
a) KSR-1 b) DDM
c) Both a) and b) d) None of above

P.T.O.
SLR-TX – 368 -2- *SLRTX368*

6) In MPP there is square array of ____________ active processing


elements.
a) 64 * 64 b) 256 * 256 c) 16 * 16 d) 128 * 128
7) __________ is a special purpose memory for data format conversion.
a) Associative memory b) Systolic memory
c) Flash memory d) Staging memory
8) Performance of CM5 machine for matrix multiply is _________ MFLOPS.
a) 128 b) 64 c) 100 d) 164
9) __________ is a solution for Remote load as well as synchronization
problems.
a) Use of cache memory
b) Pre fetching
c) Threads and fast context switching
d) None of above
10) Pyramid is combination of ___________
a) NN and hypercube b) NN and Mesh
c) NN, Mesh and tree d) NN and tree
11) __________ parallelism which arises from the logic of a problem solution.
a) Functional parallelism b) Data parallelism
c) Regular d) Coarse grained
12) Output dependence and ____________ are called as name
dependences.
a) True data dependence b) Anti dependence
c) Control dependence d) Structural dependence
13) Success rate of 1-bit branch prediction is __________
a) 70% b) 100% c) 90% d) 80%
14) In dynamic scheduling instructions are scheduled by __________
a) Hardware b) Software
c) Both hardware and software d) None of these
_____________________

Set R
*SLRTX368* -3- SLR-TX – 368
Seat
No.

B.E. (Computer Science and Engineering) (Part – I)
(CGPA) Examination, 2018
Advanced Computer Architecture
Day and Date : Thursday, 29-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three questions : (3×4=12)


1) Explain concept of concurrent and parallel execution with suitable
diagram.
2) Explain vector length and vector stride.
3) What is hazard ? Explain different types of hazards.
4) Write a vector program to implement operation DAXPY.

3. Answer any two questions : (2×8=16)


1) Explain 1-bit and 2-bit prediction schemes with suitable diagram.
2) Explain score boarding with suitable diagram.
3) Explain basic vector architecture with suitable diagram.

SECTION – II

4. Answer any three questions : (3×4=12)


1) List and explain alternative architectural classes.
2) List and explain problems of scalable computers with suitable example.
3) List and explain main design issues of scalable MIMD computers.
4) Explain static data flow machine with suitable diagram.

Set R
SLR-TX – 368 -4- *SLRTX368*

5. List and explain aspects of CM5 system design. (1×8=8)


OR
5. Explain MPP processing element IC with suitable diagram. (1×8=8)

6. List and explain operators used for construction of data flow graphs and draw
data flow graph for following FORTRAN program. (1×8=8)
P=X+Y
Q = P/Y
R=X*P
S=R–Q
T=R*P
U = S/T

_____________________

Set R
*SLRTX368* SLR-TX – 368
Seat
No.

Set S
B.E. (Computer Science and Engineering) (Part – I)
(CGPA) Examination, 2018
Advanced Computer Architecture
Day and Date : Thursday, 29-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) In MPP there is square array of ____________ active processing
elements.
a) 64 * 64 b) 256 * 256 c) 16 * 16 d) 128 * 128
2) __________ is a special purpose memory for data format conversion.
a) Associative memory b) Systolic memory
c) Flash memory d) Staging memory
3) Performance of CM5 machine for matrix multiply is _________ MFLOPS.
a) 128 b) 64 c) 100 d) 164
4) __________ is a solution for Remote load as well as synchronization
problems.
a) Use of cache memory
b) Pre fetching
c) Threads and fast context switching
d) None of above

P.T.O.
SLR-TX – 368 -2- *SLRTX368*

5) Pyramid is combination of ___________


a) NN and hypercube b) NN and Mesh
c) NN, Mesh and tree d) NN and tree
6) __________ parallelism which arises from the logic of a problem solution.
a) Functional parallelism b) Data parallelism
c) Regular d) Coarse grained
7) Output dependence and ____________ are called as name
dependences.
a) True data dependence b) Anti dependence
c) Control dependence d) Structural dependence
8) Success rate of 1-bit branch prediction is __________
a) 70% b) 100% c) 90% d) 80%
9) In dynamic scheduling instructions are scheduled by __________
a) Hardware b) Software
c) Both hardware and software d) None of these
10) Pipelining and __________ are used as basic parallel techniques.
a) Replication b) Data parallelism
c) Function parallelism d) Process level parallelism
11) Which of the following factor influence vector execution time ?
a) Length of operand vector b) Structural hazards
c) Data dependencies d) All of the options
12) Basic vector architecture have __________ vector registers.
a) 16 b) 32 c) 64 d) 8
13) One to one mapping is known as __________
a) Complete fine granularity b) Coarse granularity
c) Partial fine granularity d) None of above
14) __________ is an example for COMA machines.
a) KSR-1 b) DDM
c) Both a) and b) d) None of above
_____________________

Set S
*SLRTX368* -3- SLR-TX – 368
Seat
No.

B.E. (Computer Science and Engineering) (Part – I)
(CGPA) Examination, 2018
Advanced Computer Architecture
Day and Date : Thursday, 29-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three questions : (3×4=12)


1) Explain concept of concurrent and parallel execution with suitable
diagram.
2) Explain vector length and vector stride.
3) What is hazard ? Explain different types of hazards.
4) Write a vector program to implement operation DAXPY.

3. Answer any two questions : (2×8=16)


1) Explain 1-bit and 2-bit prediction schemes with suitable diagram.
2) Explain score boarding with suitable diagram.
3) Explain basic vector architecture with suitable diagram.

SECTION – II

4. Answer any three questions : (3×4=12)


1) List and explain alternative architectural classes.
2) List and explain problems of scalable computers with suitable example.
3) List and explain main design issues of scalable MIMD computers.
4) Explain static data flow machine with suitable diagram.

Set S
SLR-TX – 368 -4- *SLRTX368*

5. List and explain aspects of CM5 system design. (1×8=8)


OR
5. Explain MPP processing element IC with suitable diagram. (1×8=8)

6. List and explain operators used for construction of data flow graphs and draw
data flow graph for following FORTRAN program. (1×8=8)
P=X+Y
Q = P/Y
R=X*P
S=R–Q
T=R*P
U = S/T

_____________________

Set S
*SLRTX369* SLR-TX – 369
Seat
No.
Set P
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
DISTRIBUTED SYSTEMS

Day and Date : Saturday, 1-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14�1=14)


1) A __________ system consists of concurrent processors accessing
distributed resources.
a) Distributed b) Concurrent
c) Isolated d) None of these
2) Following is one of the feature of message passing systems.
a) Maintainability b) Correctness
c) Economy d) None of these
3) Whose state consists of the execution status and scheduling information
of the process ?
a) Thread’s b) Node’s c) Process’s d) All
4) ____________ is the relocation of a process from its source node to
destination node.
a) Process Allocation b) Process Elimination
c) Process termination d) Process Migration
5) ___________ requires each node to read the other node’s clock value.
a) Clock synchronization b) Process synchronization
c) Event synchronization d) All

P.T.O.
SLR-TX – 369 -2- *SLRTX369*
6) Threads are a popular way to improve application performance through
parallelism.
a) False b) True
7) For proper synchronization in distributed systems
a) Prevention from the deadlock is must
b) Prevention from the starvation is must
c) Prevention from the deadlock and starvation is must
d) None of the mentioned
8) The concept of _________ forms the basis for under unifying different
non-token based mutual exclusion algorithm.
a) Optimization b) Concurrency
c) Authorization d) Information scheme
9) In Maekawa’s algorithm, a site can grant permission to _________ site at
a time.
a) Many site b) Requesting site
c) Current site d) Only one
10) A ____________ is a collection of name which may or may not share an
identical resolution mechanism.
a) Naming b) Name resolution
c) Name space d) Name server
11) In ____________ sharing a file is open at multiple clients and at least
one client has it open for writing.
a) Sequential write b) Client-initiated
c) Server-initiated d) Concurrent-write
12) IVY means
a) Integrated virtual memory at DSM
b) International shared virtual memory at Yale
c) Integrated shared virtual memory at Yale
d) None of the above
13) Grid basically perform function of ________
a) Computer b) Unused CPU
c) Resource discovery d) Resource
14) In grid computing, a _________ determine where the job should be
scheduled to run.
a) Scheduler b) CPU c) Co-ordinator d) User

_____________
Set P
*SLRTX369* -3- SLR-TX – 369
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
DISTRIBUTED SYSTEMS

Day and Date : Saturday, 1-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3�4=12)


a) Explain evolution of distributed computing system.
b) Explain the message passing system in distributed system.
c) Describe process synchronization in distributed system.
d) Explain Mutual Exclusion in distributed system.
e) Describe Failure Handling in distributed system.

3. Attempt any one : (8�1=8)


a) Explain all process migration mechanisms in detail.
b) Explain minicomputer model, workstation model and workstation server
model in detail.

4. What are the different issues in interprocess communication ? 8

SECTION – II

5. Answer any three : (4�3=12)


1) Explain Suzuki-Kasami’s broadcast algorithm.
2) State and explain components of load distribution algorithm.
3) Explain any two design issues of distributed file system.
4) Explain working of grid computing.

Set P
SLR-TX – 369 -4- *SLRTX369*
6. Answer any one : (1�8=8)
1) Explain different mechanism for building distributed file system.
2) Explain sender initiated load distributing algorithm.

7. Answer any one : (1�8=8)


1) Explain Ho-Ramamoorthy centralized deadlock detection algorithm.
2) What is grid ? Explain different types of grid.

_____________

Set P
*SLRTX369* SLR-TX – 369
Seat
No.
Set Q
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
DISTRIBUTED SYSTEMS

Day and Date : Saturday, 1-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14�1=14)


1) The concept of _________ forms the basis for under unifying different
non-token based mutual exclusion algorithm.
a) Optimization b) Concurrency
c) Authorization d) Information scheme
2) In Maekawa’s algorithm, a site can grant permission to _________ site at
a time.
a) Many site b) Requesting site
c) Current site d) Only one
3) A ____________ is a collection of name which may or may not share an
identical resolution mechanism.
a) Naming b) Name resolution
c) Name space d) Name server
4) In ____________ sharing a file is open at multiple clients and at least
one client has it open for writing.
a) Sequential write b) Client-initiated
c) Server-initiated d) Concurrent-write

P.T.O.
SLR-TX – 369 -2- *SLRTX369*
5) IVY means
a) Integrated virtual memory at DSM
b) International shared virtual memory at Yale
c) Integrated shared virtual memory at Yale
d) None of the above
6) Grid basically perform function of ________
a) Computer b) Unused CPU
c) Resource discovery d) Resource
7) In grid computing, a _________ determine where the job should be
scheduled to run.
a) Scheduler b) CPU c) Co-ordinator d) User
8) A __________ system consists of concurrent processors accessing
distributed resources.
a) Distributed b) Concurrent
c) Isolated d) None of these
9) Following is one of the feature of message passing systems.
a) Maintainability b) Correctness
c) Economy d) None of these
10) Whose state consists of the execution status and scheduling information
of the process ?
a) Thread’s b) Node’s c) Process’s d) All
11) ____________ is the relocation of a process from its source node to
destination node.
a) Process Allocation b) Process Elimination
c) Process termination d) Process Migration
12) ___________ requires each node to read the other node’s clock value.
a) Clock synchronization b) Process synchronization
c) Event synchronization d) All
13) Threads are a popular way to improve application performance through
parallelism.
a) False b) True
14) For proper synchronization in distributed systems
a) Prevention from the deadlock is must
b) Prevention from the starvation is must
c) Prevention from the deadlock and starvation is must
d) None of the mentioned

_____________

Set Q
*SLRTX369* -3- SLR-TX – 369
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
DISTRIBUTED SYSTEMS

Day and Date : Saturday, 1-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3�4=12)


a) Explain evolution of distributed computing system.
b) Explain the message passing system in distributed system.
c) Describe process synchronization in distributed system.
d) Explain Mutual Exclusion in distributed system.
e) Describe Failure Handling in distributed system.

3. Attempt any one : (8�1=8)


a) Explain all process migration mechanisms in detail.
b) Explain minicomputer model, workstation model and workstation server
model in detail.

4. What are the different issues in interprocess communication ? 8

SECTION – II

5. Answer any three : (4�3=12)


1) Explain Suzuki-Kasami’s broadcast algorithm.
2) State and explain components of load distribution algorithm.
3) Explain any two design issues of distributed file system.
4) Explain working of grid computing.

Set Q
SLR-TX – 369 -4- *SLRTX369*
6. Answer any one : (1�8=8)
1) Explain different mechanism for building distributed file system.
2) Explain sender initiated load distributing algorithm.

7. Answer any one : (1�8=8)


1) Explain Ho-Ramamoorthy centralized deadlock detection algorithm.
2) What is grid ? Explain different types of grid.

_____________

Set Q
*SLRTX369* SLR-TX – 369
Seat
No.
Set R
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
DISTRIBUTED SYSTEMS

Day and Date : Saturday, 1-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14�1=14)


1) ___________ requires each node to read the other node’s clock value.
a) Clock synchronization b) Process synchronization
c) Event synchronization d) All
2) Threads are a popular way to improve application performance through
parallelism.
a) False b) True
3) For proper synchronization in distributed systems
a) Prevention from the deadlock is must
b) Prevention from the starvation is must
c) Prevention from the deadlock and starvation is must
d) None of the mentioned
4) The concept of _________ forms the basis for under unifying different
non-token based mutual exclusion algorithm.
a) Optimization b) Concurrency
c) Authorization d) Information scheme
5) In Maekawa’s algorithm, a site can grant permission to _________ site at
a time.
a) Many site b) Requesting site
c) Current site d) Only one
P.T.O.
SLR-TX – 369 -2- *SLRTX369*
6) A ____________ is a collection of name which may or may not share an
identical resolution mechanism.
a) Naming b) Name resolution
c) Name space d) Name server
7) In ____________ sharing a file is open at multiple clients and at least
one client has it open for writing.
a) Sequential write b) Client-initiated
c) Server-initiated d) Concurrent-write
8) IVY means
a) Integrated virtual memory at DSM
b) International shared virtual memory at Yale
c) Integrated shared virtual memory at Yale
d) None of the above
9) Grid basically perform function of ________
a) Computer b) Unused CPU
c) Resource discovery d) Resource
10) In grid computing, a _________ determine where the job should be
scheduled to run.
a) Scheduler b) CPU c) Co-ordinator d) User
11) A __________ system consists of concurrent processors accessing
distributed resources.
a) Distributed b) Concurrent
c) Isolated d) None of these
12) Following is one of the feature of message passing systems.
a) Maintainability b) Correctness
c) Economy d) None of these
13) Whose state consists of the execution status and scheduling information
of the process ?
a) Thread’s b) Node’s c) Process’s d) All
14) ____________ is the relocation of a process from its source node to
destination node.
a) Process Allocation b) Process Elimination
c) Process termination d) Process Migration

_____________

Set R
*SLRTX369* -3- SLR-TX – 369
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
DISTRIBUTED SYSTEMS

Day and Date : Saturday, 1-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3�4=12)


a) Explain evolution of distributed computing system.
b) Explain the message passing system in distributed system.
c) Describe process synchronization in distributed system.
d) Explain Mutual Exclusion in distributed system.
e) Describe Failure Handling in distributed system.

3. Attempt any one : (8�1=8)


a) Explain all process migration mechanisms in detail.
b) Explain minicomputer model, workstation model and workstation server
model in detail.

4. What are the different issues in interprocess communication ? 8

SECTION – II

5. Answer any three : (4�3=12)


1) Explain Suzuki-Kasami’s broadcast algorithm.
2) State and explain components of load distribution algorithm.
3) Explain any two design issues of distributed file system.
4) Explain working of grid computing.

Set R
SLR-TX – 369 -4- *SLRTX369*
6. Answer any one : (1�8=8)
1) Explain different mechanism for building distributed file system.
2) Explain sender initiated load distributing algorithm.

7. Answer any one : (1�8=8)


1) Explain Ho-Ramamoorthy centralized deadlock detection algorithm.
2) What is grid ? Explain different types of grid.

_____________

Set R
*SLRTX369* SLR-TX – 369
Seat
No.
Set S
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
DISTRIBUTED SYSTEMS

Day and Date : Saturday, 1-12-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14�1=14)


1) A ____________ is a collection of name which may or may not share an
identical resolution mechanism.
a) Naming b) Name resolution
c) Name space d) Name server
2) In ____________ sharing a file is open at multiple clients and at least
one client has it open for writing.
a) Sequential write b) Client-initiated
c) Server-initiated d) Concurrent-write
3) IVY means
a) Integrated virtual memory at DSM
b) International shared virtual memory at Yale
c) Integrated shared virtual memory at Yale
d) None of the above
4) Grid basically perform function of ________
a) Computer b) Unused CPU
c) Resource discovery d) Resource

P.T.O.
SLR-TX – 369 -2- *SLRTX369*
5) In grid computing, a _________ determine where the job should be
scheduled to run.
a) Scheduler b) CPU c) Co-ordinator d) User
6) A __________ system consists of concurrent processors accessing
distributed resources.
a) Distributed b) Concurrent
c) Isolated d) None of these
7) Following is one of the feature of message passing systems.
a) Maintainability b) Correctness
c) Economy d) None of these
8) Whose state consists of the execution status and scheduling information
of the process ?
a) Thread’s b) Node’s c) Process’s d) All
9) ____________ is the relocation of a process from its source node to
destination node.
a) Process Allocation b) Process Elimination
c) Process termination d) Process Migration
10) ___________ requires each node to read the other node’s clock value.
a) Clock synchronization b) Process synchronization
c) Event synchronization d) All
11) Threads are a popular way to improve application performance through
parallelism.
a) False b) True
12) For proper synchronization in distributed systems
a) Prevention from the deadlock is must
b) Prevention from the starvation is must
c) Prevention from the deadlock and starvation is must
d) None of the mentioned
13) The concept of _________ forms the basis for under unifying different
non-token based mutual exclusion algorithm.
a) Optimization b) Concurrency
c) Authorization d) Information scheme
14) In Maekawa’s algorithm, a site can grant permission to _________ site at
a time.
a) Many site b) Requesting site
c) Current site d) Only one

_____________

Set S
*SLRTX369* -3- SLR-TX – 369
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
DISTRIBUTED SYSTEMS

Day and Date : Saturday, 1-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3�4=12)


a) Explain evolution of distributed computing system.
b) Explain the message passing system in distributed system.
c) Describe process synchronization in distributed system.
d) Explain Mutual Exclusion in distributed system.
e) Describe Failure Handling in distributed system.

3. Attempt any one : (8�1=8)


a) Explain all process migration mechanisms in detail.
b) Explain minicomputer model, workstation model and workstation server
model in detail.

4. What are the different issues in interprocess communication ? 8

SECTION – II

5. Answer any three : (4�3=12)


1) Explain Suzuki-Kasami’s broadcast algorithm.
2) State and explain components of load distribution algorithm.
3) Explain any two design issues of distributed file system.
4) Explain working of grid computing.

Set S
SLR-TX – 369 -4- *SLRTX369*
6. Answer any one : (1�8=8)
1) Explain different mechanism for building distributed file system.
2) Explain sender initiated load distributing algorithm.

7. Answer any one : (1�8=8)


1) Explain Ho-Ramamoorthy centralized deadlock detection algorithm.
2) What is grid ? Explain different types of grid.

_____________

Set S
*SLTX370* SLR-TX – 370

Seat
No. Set P
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Modern database system
Day and Date : Tuesday, 4-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Assume suitable data, if necessary.
3) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) A heterogeneous distributed database is which of the following ?
a) The same DBMS is used at each location and data are not distributed
across all nodes
b) The same DBMS is used at each location and data are distributed across
all nodes
c) A different DBMS is used at each location and data are not distributed
across all nodes
d) A different DBMS is used at each location and data are distributed across
all nodes
2) The real use of the Two-phase commit protocol is
a) Deadlock will not occur b) Concurrency control can be avoided
c) Atomicity, i.e. all-or-nothing d) None of the above
3) What is the default HDFS block size ?
a) 32 MB b) 64 KB c) 128 KB d) 64 MB
4) Some of the columns of a relation are at different site is which of the following ?
a) Data Replication b) Horizontal Partitioning
c) Vertical Partitioning d) Horizontal and Vertical Partitioning
5) A star schema has what type of relationship between a dimension and fact
table ?
a) Many-to-many b) One-to-one
c) One-to-many d) All of the above
P.T.O.
SLR-TX – 370 -2- *SLTX370*
6) A semijoin is which of the following ?
a) Only the joining attributes are sent from one site to another and then all
of the rows are returned
b) All of the attributes are sent from one site to another and then all of the
rows are returned
c) Only the joining attributes are sent from one site to another and then
only the required rows are returned
d) All of the attributes are sent from one site to another and then only the
required rows are returned
7) Which algorithm uses equality comparison on a key attribute with a primary
index to retrieve a single record that satisfies the corresponding equality
condition ?
a) A2 b) A4 c) A5 d) A6
8) Parallel execution of multiple individual operations within a given query is
called
a) Interoperation b) Intraoperation c) Interquery d) Intraquery
9) _______NameNode is used when the Primary NameNode goes down.
a) Rack b) Data c) Secondary d) None of above
10) In a __________the system makes repeated requests for tuples from the
operation at the top of the pipeline.
a) Demand-driven pipeline b) Producer-driven pipeline
c) Demand pipeline d) All of the mentioned
11) MongoDB is
a) RDBMS b) Document-oriented DBMS
c) Objet Oriented DBMS d) Key-value store
12) Select item name, color, clothes size, sum (quantity) from sales group by
rollup (item name, color, clothes size); How many grouping is possible in
this rollup ?
a) 8 b) 4 c) 2 d) 3
13) Number of block transfers from disk and number of disk seeks are used to
estimate cost of
a) Query-execution plan b) Query-evaluation plan
c) Query-processing plan d) Query-implementing plan
14) Hadoop was first introduced by
a) Doug Laney b) Brewer
c) Carlo Strozzi d) Doug cutting
______________

Set P
*SLTX370* -3- SLR-TX – 370
Seat
No.

B.E. (CSE) (Part – I) (CGPA) Examination, 2018


Modern database system
Day and Date : Tuesday, 4-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Assume suitable data, if necessary.

SECTION – I

2. Answer any three : (3×4=12)


1) Explain a typical transaction server system with diagram.
2) Explain two cases of fragment and replicate join with diagram.
3) Consider the data warehouse storing sales details of various cloths sold.
Using this example describe the following OLAP operations
1) Cube 2) Rollup
4) Explain association rules and clustering applications of Data Mining.

3. Answer any two : (2×8=16)


1) What is data warehouse ? Draw its architecture and explain the star schema
of data warehouse.
2) What do you mean by I/O parallelism ? Explain various partitioning techniques
in detail with their comparison.
3) Explain any four locking protocols used to handle concurrency control in
distributed databases.

SECTION – II

4. Answer any three : (3×4=12)


1) Give any four Equivalence rules.
2) Explain worst case and best case cost of Nested loop join for two relations
R and S w.r.t. following.
a) No. of block transfer b) Seek time
3) Give the difference between SQL and NoSQL.
4) Explain External sort-merge algorithm with example diagram.

Set P
SLR-TX – 370 -4- *SLTX370*

5. Answer any two : (2×8=16)


1) Explain following concepts with SQL query examples in Object based
Databases.
a) Structured types
b) Type inheritance
c) Table inheritance
d) Array and multiset
2) Define Query Processing. Explain different steps involved in Query
processing with diagram. What are different measures of Query cost ?
3) Explain high level architecture of Hadoop with the help of diagram. With
one example explain how Map Reduce works.

_____________________

Set P
*SLTX370* SLR-TX – 370

Seat
No. Set Q
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Modern database system
Day and Date : Tuesday, 4-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Assume suitable data, if necessary.
3) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Parallel execution of multiple individual operations within a given query is
called
a) Interoperation b) Intraoperation
c) Interquery d) Intraquery
2) _______NameNode is used when the Primary NameNode goes down.
a) Rack b) Data
c) Secondary d) None of above
3) In a __________the system makes repeated requests for tuples from the
operation at the top of the pipeline.
a) Demand-driven pipeline b) Producer-driven pipeline
c) Demand pipeline d) All of the mentioned
4) MongoDB is
a) RDBMS b) Document-oriented DBMS
c) Objet Oriented DBMS d) Key-value store
5) Select item name, color, clothes size, sum (quantity) from sales group by
rollup (item name, color, clothes size); How many grouping is possible in
this rollup ?
a) 8 b) 4
c) 2 d) 3

P.T.O.
SLR-TX – 370 -2- *SLTX370*
6) Number of block transfers from disk and number of disk seeks are used to
estimate cost of
a) Query-execution plan b) Query-evaluation plan
c) Query-processing plan d) Query-implementing plan
7) Hadoop was first introduced by
a) Doug Laney b) Brewer c) Carlo Strozzi d) Doug cutting
8) A heterogeneous distributed database is which of the following ?
a) The same DBMS is used at each location and data are not distributed
across all nodes
b) The same DBMS is used at each location and data are distributed across
all nodes
c) A different DBMS is used at each location and data are not distributed
across all nodes
d) A different DBMS is used at each location and data are distributed across
all nodes
9) The real use of the Two-phase commit protocol is
a) Deadlock will not occur b) Concurrency control can be avoided
c) Atomicity, i.e. all-or-nothing d) None of the above
10) What is the default HDFS block size ?
a) 32 MB b) 64 KB c) 128 KB d) 64 MB
11) Some of the columns of a relation are at different site is which of the following ?
a) Data Replication b) Horizontal Partitioning
c) Vertical Partitioning d) Horizontal and Vertical Partitioning
12) A star schema has what type of relationship between a dimension and fact
table ?
a) Many-to-many b) One-to-one c) One-to-many d) All of the above
13) A semijoin is which of the following ?
a) Only the joining attributes are sent from one site to another and then all
of the rows are returned
b) All of the attributes are sent from one site to another and then all of the
rows are returned
c) Only the joining attributes are sent from one site to another and then
only the required rows are returned
d) All of the attributes are sent from one site to another and then only the
required rows are returned
14) Which algorithm uses equality comparison on a key attribute with a primary
index to retrieve a single record that satisfies the corresponding equality
condition ?
a) A2 b) A4 c) A5 d) A6
______________
Set Q
*SLTX370* -3- SLR-TX – 370
Seat
No.

B.E. (CSE) (Part – I) (CGPA) Examination, 2018


Modern database system
Day and Date : Tuesday, 4-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Assume suitable data, if necessary.

SECTION – I

2. Answer any three : (3×4=12)


1) Explain a typical transaction server system with diagram.
2) Explain two cases of fragment and replicate join with diagram.
3) Consider the data warehouse storing sales details of various cloths sold.
Using this example describe the following OLAP operations
1) Cube 2) Rollup
4) Explain association rules and clustering applications of Data Mining.

3. Answer any two : (2×8=16)


1) What is data warehouse ? Draw its architecture and explain the star schema
of data warehouse.
2) What do you mean by I/O parallelism ? Explain various partitioning techniques
in detail with their comparison.
3) Explain any four locking protocols used to handle concurrency control in
distributed databases.

SECTION – II

4. Answer any three : (3×4=12)


1) Give any four Equivalence rules.
2) Explain worst case and best case cost of Nested loop join for two relations
R and S w.r.t. following.
a) No. of block transfer b) Seek time
3) Give the difference between SQL and NoSQL.
4) Explain External sort-merge algorithm with example diagram.

Set Q
SLR-TX – 370 -4- *SLTX370*

5. Answer any two : (2×8=16)


1) Explain following concepts with SQL query examples in Object based
Databases.
a) Structured types
b) Type inheritance
c) Table inheritance
d) Array and multiset
2) Define Query Processing. Explain different steps involved in Query
processing with diagram. What are different measures of Query cost ?
3) Explain high level architecture of Hadoop with the help of diagram. With
one example explain how Map Reduce works.

_____________________

Set Q
*SLTX370* SLR-TX – 370

Seat
No. Set R
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Modern database system
Day and Date : Tuesday, 4-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Assume suitable data, if necessary.
3) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) A star schema has what type of relationship between a dimension and fact
table ?
a) Many-to-many b) One-to-one
c) One-to-many d) All of the above
2) A semijoin is which of the following ?
a) Only the joining attributes are sent from one site to another and then all
of the rows are returned
b) All of the attributes are sent from one site to another and then all of the
rows are returned
c) Only the joining attributes are sent from one site to another and then
only the required rows are returned
d) All of the attributes are sent from one site to another and then only the
required rows are returned
3) Which algorithm uses equality comparison on a key attribute with a primary
index to retrieve a single record that satisfies the corresponding equality
condition ?
a) A2 b) A4 c) A5 d) A6
4) Parallel execution of multiple individual operations within a given query is
called
a) Interoperation b) Intraoperation c) Interquery d) Intraquery
P.T.O.
SLR-TX – 370 -2- *SLTX370*
5) _______NameNode is used when the Primary NameNode goes down.
a) Rack b) Data c) Secondary d) None of above
6) In a __________the system makes repeated requests for tuples from the
operation at the top of the pipeline.
a) Demand-driven pipeline b) Producer-driven pipeline
c) Demand pipeline d) All of the mentioned
7) MongoDB is
a) RDBMS b) Document-oriented DBMS
c) Objet Oriented DBMS d) Key-value store
8) Select item name, color, clothes size, sum (quantity) from sales group by
rollup (item name, color, clothes size); How many grouping is possible in
this rollup ?
a) 8 b) 4 c) 2 d) 3
9) Number of block transfers from disk and number of disk seeks are used to
estimate cost of
a) Query-execution plan b) Query-evaluation plan
c) Query-processing plan d) Query-implementing plan
10) Hadoop was first introduced by
a) Doug Laney b) Brewer
c) Carlo Strozzi d) Doug cutting
11) A heterogeneous distributed database is which of the following ?
a) The same DBMS is used at each location and data are not distributed
across all nodes
b) The same DBMS is used at each location and data are distributed across
all nodes
c) A different DBMS is used at each location and data are not distributed
across all nodes
d) A different DBMS is used at each location and data are distributed across
all nodes
12) The real use of the Two-phase commit protocol is
a) Deadlock will not occur b) Concurrency control can be avoided
c) Atomicity, i.e. all-or-nothing d) None of the above
13) What is the default HDFS block size ?
a) 32 MB b) 64 KB c) 128 KB d) 64 MB
14) Some of the columns of a relation are at different site is which of the following ?
a) Data Replication b) Horizontal Partitioning
c) Vertical Partitioning d) Horizontal and Vertical Partitioning

______________
Set R
*SLTX370* -3- SLR-TX – 370
Seat
No.

B.E. (CSE) (Part – I) (CGPA) Examination, 2018


Modern database system
Day and Date : Tuesday, 4-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Assume suitable data, if necessary.

SECTION – I

2. Answer any three : (3×4=12)


1) Explain a typical transaction server system with diagram.
2) Explain two cases of fragment and replicate join with diagram.
3) Consider the data warehouse storing sales details of various cloths sold.
Using this example describe the following OLAP operations
1) Cube 2) Rollup
4) Explain association rules and clustering applications of Data Mining.

3. Answer any two : (2×8=16)


1) What is data warehouse ? Draw its architecture and explain the star schema
of data warehouse.
2) What do you mean by I/O parallelism ? Explain various partitioning techniques
in detail with their comparison.
3) Explain any four locking protocols used to handle concurrency control in
distributed databases.

SECTION – II

4. Answer any three : (3×4=12)


1) Give any four Equivalence rules.
2) Explain worst case and best case cost of Nested loop join for two relations
R and S w.r.t. following.
a) No. of block transfer b) Seek time
3) Give the difference between SQL and NoSQL.
4) Explain External sort-merge algorithm with example diagram.

Set R
SLR-TX – 370 -4- *SLTX370*

5. Answer any two : (2×8=16)


1) Explain following concepts with SQL query examples in Object based
Databases.
a) Structured types
b) Type inheritance
c) Table inheritance
d) Array and multiset
2) Define Query Processing. Explain different steps involved in Query
processing with diagram. What are different measures of Query cost ?
3) Explain high level architecture of Hadoop with the help of diagram. With
one example explain how Map Reduce works.

_____________________

Set R
*SLTX370* SLR-TX – 370

Seat
No. Set S
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Modern database system
Day and Date : Tuesday, 4-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Assume suitable data, if necessary.
3) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) In a __________the system makes repeated requests for tuples from the
operation at the top of the pipeline.
a) Demand-driven pipeline b) Producer-driven pipeline
c) Demand pipeline d) All of the mentioned
2) MongoDB is
a) RDBMS b) Document-oriented DBMS
c) Objet Oriented DBMS d) Key-value store
3) Select item name, color, clothes size, sum (quantity) from sales group by
rollup (item name, color, clothes size); How many grouping is possible in
this rollup ?
a) 8 b) 4
c) 2 d) 3
4) Number of block transfers from disk and number of disk seeks are used to
estimate cost of
a) Query-execution plan b) Query-evaluation plan
c) Query-processing plan d) Query-implementing plan
5) Hadoop was first introduced by
a) Doug Laney b) Brewer
c) Carlo Strozzi d) Doug cutting

P.T.O.
SLR-TX – 370 -2- *SLTX370*
6) A heterogeneous distributed database is which of the following ?
a) The same DBMS is used at each location and data are not distributed
across all nodes
b) The same DBMS is used at each location and data are distributed across
all nodes
c) A different DBMS is used at each location and data are not distributed
across all nodes
d) A different DBMS is used at each location and data are distributed across
all nodes
7) The real use of the Two-phase commit protocol is
a) Deadlock will not occur b) Concurrency control can be avoided
c) Atomicity, i.e. all-or-nothing d) None of the above
8) What is the default HDFS block size ?
a) 32 MB b) 64 KB c) 128 KB d) 64 MB
9) Some of the columns of a relation are at different site is which of the following ?
a) Data Replication b) Horizontal Partitioning
c) Vertical Partitioning d) Horizontal and Vertical Partitioning
10) A star schema has what type of relationship between a dimension and fact
table ?
a) Many-to-many b) One-to-one
c) One-to-many d) All of the above
11) A semijoin is which of the following ?
a) Only the joining attributes are sent from one site to another and then all
of the rows are returned
b) All of the attributes are sent from one site to another and then all of the
rows are returned
c) Only the joining attributes are sent from one site to another and then
only the required rows are returned
d) All of the attributes are sent from one site to another and then only the
required rows are returned
12) Which algorithm uses equality comparison on a key attribute with a primary
index to retrieve a single record that satisfies the corresponding equality
condition ?
a) A2 b) A4 c) A5 d) A6
13) Parallel execution of multiple individual operations within a given query is
called
a) Interoperation b) Intraoperation c) Interquery d) Intraquery
14) _______NameNode is used when the Primary NameNode goes down.
a) Rack b) Data c) Secondary d) None of above

______________
Set S
*SLTX370* -3- SLR-TX – 370
Seat
No.

B.E. (CSE) (Part – I) (CGPA) Examination, 2018


Modern database system
Day and Date : Tuesday, 4-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) Assume suitable data, if necessary.

SECTION – I

2. Answer any three : (3×4=12)


1) Explain a typical transaction server system with diagram.
2) Explain two cases of fragment and replicate join with diagram.
3) Consider the data warehouse storing sales details of various cloths sold.
Using this example describe the following OLAP operations
1) Cube 2) Rollup
4) Explain association rules and clustering applications of Data Mining.

3. Answer any two : (2×8=16)


1) What is data warehouse ? Draw its architecture and explain the star schema
of data warehouse.
2) What do you mean by I/O parallelism ? Explain various partitioning techniques
in detail with their comparison.
3) Explain any four locking protocols used to handle concurrency control in
distributed databases.

SECTION – II

4. Answer any three : (3×4=12)


1) Give any four Equivalence rules.
2) Explain worst case and best case cost of Nested loop join for two relations
R and S w.r.t. following.
a) No. of block transfer b) Seek time
3) Give the difference between SQL and NoSQL.
4) Explain External sort-merge algorithm with example diagram.

Set S
SLR-TX – 370 -4- *SLTX370*

5. Answer any two : (2×8=16)


1) Explain following concepts with SQL query examples in Object based
Databases.
a) Structured types
b) Type inheritance
c) Table inheritance
d) Array and multiset
2) Define Query Processing. Explain different steps involved in Query
processing with diagram. What are different measures of Query cost ?
3) Explain high level architecture of Hadoop with the help of diagram. With
one example explain how Map Reduce works.

_____________________

Set S
*SLRTX371* SLR-TX – 371

Seat
No.
Set P
B.E. (Computer Science and Engineering) (Part – I) (CGPA) Examination, 2018
Elective – I : HUMAN COMPUTER INTERACTION
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) ___________ reasoning derives the logically necessary conclusion from
the given premises.
A) Deductive B) Inductive C) Abductive D) None of these
2) ___________ controls and displays are organized to reflect the order of
their use in a typical interaction.
A) Functional B) Sequential C) Frequency D) None of these
3) The multiplicity of ways in which the user and system exchange information is
A) Learnability B) Flexibility C) Robustness D) None of these
4) QOC is
A) Query-Objective-Control B) Question-Option-Criterion
C) Question-Objective-Consistent D) None of these
5) ___________ focuses on the user’s ability to determine the effect of future
interactions.
A) Predictability B) Synthesizability
C) Familiarity D) Generalizability
6) ___________ can be used as a means of describing the user’s day-to-day
activities.
A) Storyboarding B) Workshops
C) Brainstorming D) Pencil and paper exercises
P.T.O.
SLR-TX – 371 -2- *SLRTX371*
7) Which utterance points of clarification and elaborations ?
A) Substantive B) Annotative
C) Procedural D) None of these
8) Capturing common understanding is
A) Computer-mediated Communication
B) Meeting and Decision Support System
C) Shared Applications and Artifacts
D) None of these
9) Some hypertexts are downloaded or installed permanently on a computer is
A) On the computer delivery technique
B) On the web delivery technique
C) On the move delivery technique
D) None of these
10) __________authoring tools are becoming prevalent with the success of
Flash.
A) Map B) Audio
C) Video D) Animation
11) Social form of filtering allows groups of users to combine their evaluations
to help one another to find interesting items in large collections
A) Multilingual Searchers B) Faceted Metadata
C) Collaborative filtering D) None of these
12) Simple scripting language and easy to produce graphical interfaces - by
using
A) Help and Documentation
B) Rapid Prototyping
C) Education and E-learning
D) Collaboration and Community
13) Users can allow retrieving of sub-collections and of the query parameters
is known as
A) Details-on-Demand task B) Relate Task
C) History Task D) Extract Task
14) ____________ allow documents to be linked in a non-linear fashion.
A) Hypertext B) Video
C) Animation D) Text
________________

Set P
*SLRTX371* -3- SLR-TX – 371
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA) Examination, 2018


Elective – I : HUMAN COMPUTER INTERACTION
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any four of the following : (4×4=16)


a) Explain the problem-solving process of finding a solution.
b) Explain any devices for virtual reality and 3D interaction.
c) Explain Local and global structure of navigation design.
d) Explain evaluation through monitoring physiological responses.
e) Explain GOMS.
f) What you mean by direct manipulation ? Explain.

3. Answer any two of the following : (6×2=12)


a) Define and explain the Ergonomics of Interaction.
b) Explain the OSTA Methodology.
c) Explain the organizational issues that affect the acceptance and relevance
of information and communication systems.

SECTION – II

4. Answer any four of the following : (4×4=16)


a) Explain the importance of quality of service.
b) Write a note on groupware systems.
c) Explain multimedia document searches in information search.
d) Write a note on Ubiquitous Computing.
e) Define Hypertext. And explain the relationship between hypertext, multimedia
and www.
f) Explain static and dynamic web content.

Set P
SLR-TX – 371 -4- *SLRTX371*

5. Answer any two of the following : (6×2=12)


a) Explain OAI Model for website design.
b) Write a note on Virtual Reality and Augmented Reality devices and
applications.
c) Explain the issues of web technology.

_____________________

Set P
*SLRTX371* SLR-TX – 371

Seat
No.
Set Q
B.E. (Computer Science and Engineering) (Part – I) (CGPA) Examination, 2018
Elective – I : HUMAN COMPUTER INTERACTION
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) Capturing common understanding is
A) Computer-mediated Communication
B) Meeting and Decision Support System
C) Shared Applications and Artifacts
D) None of these
2) Some hypertexts are downloaded or installed permanently on a computer is
A) On the computer delivery technique
B) On the web delivery technique
C) On the move delivery technique
D) None of these
3) __________authoring tools are becoming prevalent with the success of
Flash.
A) Map B) Audio
C) Video D) Animation
4) Social form of filtering allows groups of users to combine their evaluations
to help one another to find interesting items in large collections
A) Multilingual Searchers
B) Faceted Metadata
C) Collaborative filtering
D) None of these
P.T.O.
SLR-TX – 371 -2- *SLRTX371*
5) Simple scripting language and easy to produce graphical interfaces - by
using
A) Help and Documentation
B) Rapid Prototyping
C) Education and E-learning
D) Collaboration and Community
6) Users can allow retrieving of sub-collections and of the query parameters
is known as
A) Details-on-Demand task B) Relate Task
C) History Task D) Extract Task
7) ____________ allow documents to be linked in a non-linear fashion.
A) Hypertext B) Video
C) Animation D) Text
8) ___________ reasoning derives the logically necessary conclusion from
the given premises.
A) Deductive B) Inductive C) Abductive D) None of these
9) ___________ controls and displays are organized to reflect the order of
their use in a typical interaction.
A) Functional B) Sequential C) Frequency D) None of these
10) The multiplicity of ways in which the user and system exchange information is
A) Learnability B) Flexibility C) Robustness D) None of these
11) QOC is
A) Query-Objective-Control B) Question-Option-Criterion
C) Question-Objective-Consistent D) None of these
12) ___________ focuses on the user’s ability to determine the effect of future
interactions.
A) Predictability B) Synthesizability
C) Familiarity D) Generalizability
13) ___________ can be used as a means of describing the user’s day-to-day
activities.
A) Storyboarding B) Workshops
C) Brainstorming D) Pencil and paper exercises
14) Which utterance points of clarification and elaborations ?
A) Substantive B) Annotative
C) Procedural D) None of these
________________

Set Q
*SLRTX371* -3- SLR-TX – 371
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA) Examination, 2018


Elective – I : HUMAN COMPUTER INTERACTION
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any four of the following : (4×4=16)


a) Explain the problem-solving process of finding a solution.
b) Explain any devices for virtual reality and 3D interaction.
c) Explain Local and global structure of navigation design.
d) Explain evaluation through monitoring physiological responses.
e) Explain GOMS.
f) What you mean by direct manipulation ? Explain.

3. Answer any two of the following : (6×2=12)


a) Define and explain the Ergonomics of Interaction.
b) Explain the OSTA Methodology.
c) Explain the organizational issues that affect the acceptance and relevance
of information and communication systems.

SECTION – II

4. Answer any four of the following : (4×4=16)


a) Explain the importance of quality of service.
b) Write a note on groupware systems.
c) Explain multimedia document searches in information search.
d) Write a note on Ubiquitous Computing.
e) Define Hypertext. And explain the relationship between hypertext, multimedia
and www.
f) Explain static and dynamic web content.

Set Q
SLR-TX – 371 -4- *SLRTX371*

5. Answer any two of the following : (6×2=12)


a) Explain OAI Model for website design.
b) Write a note on Virtual Reality and Augmented Reality devices and
applications.
c) Explain the issues of web technology.

_____________________

Set Q
*SLRTX371* SLR-TX – 371

Seat
No.
Set R
B.E. (Computer Science and Engineering) (Part – I) (CGPA) Examination, 2018
Elective – I : HUMAN COMPUTER INTERACTION
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) ___________ focuses on the user’s ability to determine the effect of future
interactions.
A) Predictability
B) Synthesizability
C) Familiarity
D) Generalizability
2) ___________ can be used as a means of describing the user’s day-to-day
activities.
A) Storyboarding B) Workshops
C) Brainstorming D) Pencil and paper exercises
3) Which utterance points of clarification and elaborations ?
A) Substantive
B) Annotative
C) Procedural
D) None of these
4) Capturing common understanding is
A) Computer-mediated Communication
B) Meeting and Decision Support System
C) Shared Applications and Artifacts
D) None of these
P.T.O.
SLR-TX – 371 -2- *SLRTX371*
5) Some hypertexts are downloaded or installed permanently on a computer is
A) On the computer delivery technique
B) On the web delivery technique
C) On the move delivery technique
D) None of these
6) __________authoring tools are becoming prevalent with the success of
Flash.
A) Map B) Audio
C) Video D) Animation
7) Social form of filtering allows groups of users to combine their evaluations
to help one another to find interesting items in large collections
A) Multilingual Searchers B) Faceted Metadata
C) Collaborative filtering D) None of these
8) Simple scripting language and easy to produce graphical interfaces - by
using
A) Help and Documentation
B) Rapid Prototyping
C) Education and E-learning
D) Collaboration and Community
9) Users can allow retrieving of sub-collections and of the query parameters
is known as
A) Details-on-Demand task B) Relate Task
C) History Task D) Extract Task
10) ____________ allow documents to be linked in a non-linear fashion.
A) Hypertext B) Video C) Animation D) Text
11) ___________ reasoning derives the logically necessary conclusion from
the given premises.
A) Deductive B) Inductive C) Abductive D) None of these
12) ___________ controls and displays are organized to reflect the order of
their use in a typical interaction.
A) Functional B) Sequential C) Frequency D) None of these
13) The multiplicity of ways in which the user and system exchange information is
A) Learnability B) Flexibility C) Robustness D) None of these
14) QOC is
A) Query-Objective-Control B) Question-Option-Criterion
C) Question-Objective-Consistent D) None of these
________________

Set R
*SLRTX371* -3- SLR-TX – 371
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA) Examination, 2018


Elective – I : HUMAN COMPUTER INTERACTION
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any four of the following : (4×4=16)


a) Explain the problem-solving process of finding a solution.
b) Explain any devices for virtual reality and 3D interaction.
c) Explain Local and global structure of navigation design.
d) Explain evaluation through monitoring physiological responses.
e) Explain GOMS.
f) What you mean by direct manipulation ? Explain.

3. Answer any two of the following : (6×2=12)


a) Define and explain the Ergonomics of Interaction.
b) Explain the OSTA Methodology.
c) Explain the organizational issues that affect the acceptance and relevance
of information and communication systems.

SECTION – II

4. Answer any four of the following : (4×4=16)


a) Explain the importance of quality of service.
b) Write a note on groupware systems.
c) Explain multimedia document searches in information search.
d) Write a note on Ubiquitous Computing.
e) Define Hypertext. And explain the relationship between hypertext, multimedia
and www.
f) Explain static and dynamic web content.

Set R
SLR-TX – 371 -4- *SLRTX371*

5. Answer any two of the following : (6×2=12)


a) Explain OAI Model for website design.
b) Write a note on Virtual Reality and Augmented Reality devices and
applications.
c) Explain the issues of web technology.

_____________________

Set R
*SLRTX371* SLR-TX – 371

Seat
No.
Set S
B.E. (Computer Science and Engineering) (Part – I) (CGPA) Examination, 2018
Elective – I : HUMAN COMPUTER INTERACTION
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) __________authoring tools are becoming prevalent with the success of
Flash.
A) Map B) Audio
C) Video D) Animation
2) Social form of filtering allows groups of users to combine their evaluations
to help one another to find interesting items in large collections
A) Multilingual Searchers B) Faceted Metadata
C) Collaborative filtering D) None of these
3) Simple scripting language and easy to produce graphical interfaces - by
using
A) Help and Documentation
B) Rapid Prototyping
C) Education and E-learning
D) Collaboration and Community
4) Users can allow retrieving of sub-collections and of the query parameters
is known as
A) Details-on-Demand task
B) Relate Task
C) History Task
D) Extract Task
P.T.O.
SLR-TX – 371 -2- *SLRTX371*
5) ____________ allow documents to be linked in a non-linear fashion.
A) Hypertext B) Video
C) Animation D) Text
6) ___________ reasoning derives the logically necessary conclusion from
the given premises.
A) Deductive B) Inductive C) Abductive D) None of these
7) ___________ controls and displays are organized to reflect the order of
their use in a typical interaction.
A) Functional B) Sequential C) Frequency D) None of these
8) The multiplicity of ways in which the user and system exchange information is
A) Learnability B) Flexibility C) Robustness D) None of these
9) QOC is
A) Query-Objective-Control B) Question-Option-Criterion
C) Question-Objective-Consistent D) None of these
10) ___________ focuses on the user’s ability to determine the effect of future
interactions.
A) Predictability B) Synthesizability
C) Familiarity D) Generalizability
11) ___________ can be used as a means of describing the user’s day-to-day
activities.
A) Storyboarding B) Workshops
C) Brainstorming D) Pencil and paper exercises
12) Which utterance points of clarification and elaborations ?
A) Substantive B) Annotative
C) Procedural D) None of these
13) Capturing common understanding is
A) Computer-mediated Communication
B) Meeting and Decision Support System
C) Shared Applications and Artifacts
D) None of these
14) Some hypertexts are downloaded or installed permanently on a computer is
A) On the computer delivery technique
B) On the web delivery technique
C) On the move delivery technique
D) None of these
________________

Set S
*SLRTX371* -3- SLR-TX – 371
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA) Examination, 2018


Elective – I : HUMAN COMPUTER INTERACTION
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any four of the following : (4×4=16)


a) Explain the problem-solving process of finding a solution.
b) Explain any devices for virtual reality and 3D interaction.
c) Explain Local and global structure of navigation design.
d) Explain evaluation through monitoring physiological responses.
e) Explain GOMS.
f) What you mean by direct manipulation ? Explain.

3. Answer any two of the following : (6×2=12)


a) Define and explain the Ergonomics of Interaction.
b) Explain the OSTA Methodology.
c) Explain the organizational issues that affect the acceptance and relevance
of information and communication systems.

SECTION – II

4. Answer any four of the following : (4×4=16)


a) Explain the importance of quality of service.
b) Write a note on groupware systems.
c) Explain multimedia document searches in information search.
d) Write a note on Ubiquitous Computing.
e) Define Hypertext. And explain the relationship between hypertext, multimedia
and www.
f) Explain static and dynamic web content.

Set S
SLR-TX – 371 -4- *SLRTX371*

5. Answer any two of the following : (6×2=12)


a) Explain OAI Model for website design.
b) Write a note on Virtual Reality and Augmented Reality devices and
applications.
c) Explain the issues of web technology.

_____________________

Set S
*SLRTX372* SLR-TX – 372
Seat
No.
Set P

B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – I : DIgital signal processing
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1�14=14)
1) Discrete-time signals are __________
a) Continuous in amplitude and continuous in time
b) Continuous in amplitude and discrete in time
c) Discrete in amplitude and discrete in time
d) Discrete in amplitude and continuous in time
2) Both continuous-time and discrete-time signals are further classified as
a) Deterministic and non-deterministic signals
b) Periodic and a periodic signals
c) Even and odd signal
d) Any one of the given option
3) Laplace transform plays a very important role in
a) Analysis of analog signals
b) Analysis of systems
c) Solving linear constant coefficient differential equations
d) All of the options
4) What is the ROC of the signal x(n) = δ(n-k), k > 0 ?
a) z = 0 b) z = ∞
c) Entire z-plane, except at z = 0 d) Entire z-plane, except at z = ∞
5) What is the ROC of z-transform of finite duration anti-causal sequence ?
a) z = 0 b) z = ∞
c) Entire z-plane, except at z = 0 d) Entire z-plane, except at z = ∞
6) The advantage of representing the digital system in block diagram form is/are
a) Just by inspection, the computation algorithm can be easily written
b) The hardware requirement can be easily determined
c) The relation between the output and the input can be determined
d) All of the options P.T.O.
SLR-TX – 372 -2- *SLRTX372*
7) What is the duration of the unit sample response of a digital filter ?
a) Finite b) Infinite c) Impulse (very small) d) Zero
8) The magnitude response of Butterworth filter has
1. Flat stop band
2. Flat pass band
3. Tapering pass band
4. Tapering stop band
a) 1 and 2 are correct b) 2 and 4 are correct
c) 2 and 3 are correct d) All the four are correct
9) For a system function H(s) to be stable
a) The zeros lie in left half of the s plane b) The zeros lie in right half of the s plane
c) The poles lie in left half of the s plane d) The poles lie in right half of the s plane
10) Which of the following is true regarding the number of computations required to
compute DFT at any one value of ‘k’ ?
a) 4N – 2 real multiplications and 4N real additions
b) 4N real multiplications and 4N – 4 real additions
c) 4N – 2 real multiplications and 4N + 2 real additions
d) 4N real multiplications and 4N – 2 real additions
11) If x(n) and X(k) are an N-point DFT pair, then X(k + N) = ?
a) X(– k) b) – X (k)
c) X(k) d) None of the mentioned
12) Which of the following is introduced in the frequency sampling realization of the
FIR filter ?
a) Poles are more in number on unit circle
b) Zeros are more in number on the unit circle
c) Poles and zeros at equally spaced points on the unit circle
d) None of the mentioned
13) Which of the following is the second generation processor ?
a) TMS320C1X b) TMS320C2X
c) Both option a) and b) d) None of the option
14) Both discrete-time and continues-time signals can be modeled using the
following _________ method.
a) A linear difference/differential equation
b) The impulse response sequence
c) A state variable or matrix
d) Any one of the given option

_____________

Set P
*SLRTX372* -3- SLR-TX – 372
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
Elective – I : DIgital signal processing
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three questions : (3�4=12)


1) What are the advantages of digital signal processing over analog signal
processing ?
2) Determine the z-transform for the analog input signal x(t) = e– at applied to digital
filter.
3) Determine the parallel realization of the IIR digital filter transfer function.
H(z) = 3 (2z2 + 5z + 4)/(2z + 1) (z + 2)
4) Explain the linearity and shift of a sequence properties of the discrete Fourier series.

3. Answer any two questions : (2�8=16)


1) What are the applications of DSP ?
2) What are the important properties of the ROC for the z-transform.
3) Explain the following properties of the discrete Fourier series.
a) Duality
b) Symmetry
c) Periodic concolution.

SECTION – II

4. Answer any three questions : (3�4=12)


1) Explain basic system for discrete-time filtering of continuous-time signals with
block diagram.
2) Explain the flow graph of 8-point DFT using the butterfly computation.
3) With neat diagram, explain full duplex analog voice privacy system for
transmitter and receiver.
Set P
SLR-TX – 372 -4- *SLRTX372*
4) What are the salient features required for efficient performance of DSP
operation ?
5) Write a note on Bilinear transformation. 8
OR
Write note on following filters :
a) Low pass
b) High pass
c) Band pass
d) Band stop.
6) Explain the following filters :
a) Time domain filters
b) Frequency domain filters (IIR). 8
_____________

Set P
*SLRTX372* SLR-TX – 372
Seat Set Q
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – I : DIgital signal processing
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1�14=14)
1) The magnitude response of Butterworth filter has
1. Flat stop band
2. Flat pass band
3. Tapering pass band
4. Tapering stop band
a) 1 and 2 are correct b) 2 and 4 are correct
c) 2 and 3 are correct d) All the four are correct
2) For a system function H(s) to be stable
a) The zeros lie in left half of the s plane b) The zeros lie in right half of the s plane
c) The poles lie in left half of the s plane d) The poles lie in right half of the s plane
3) Which of the following is true regarding the number of computations required to
compute DFT at any one value of ‘k’ ?
a) 4N – 2 real multiplications and 4N real additions
b) 4N real multiplications and 4N – 4 real additions
c) 4N – 2 real multiplications and 4N + 2 real additions
d) 4N real multiplications and 4N – 2 real additions
4) If x(n) and X(k) are an N-point DFT pair, then X(k + N) = ?
a) X(– k) b) – X (k)
c) X(k) d) None of the mentioned
5) Which of the following is introduced in the frequency sampling realization of the
FIR filter ?
a) Poles are more in number on unit circle
b) Zeros are more in number on the unit circle
c) Poles and zeros at equally spaced points on the unit circle
d) None of the mentioned
P.T.O.
SLR-TX – 372 -2- *SLRTX372*
6) Which of the following is the second generation processor ?
a) TMS320C1X b) TMS320C2X
c) Both option a) and b) d) None of the option
7) Both discrete-time and continues-time signals can be modeled using the
following _________ method.
a) A linear difference/differential equation
b) The impulse response sequence
c) A state variable or matrix
d) Any one of the given option
8) Discrete-time signals are __________
a) Continuous in amplitude and continuous in time
b) Continuous in amplitude and discrete in time
c) Discrete in amplitude and discrete in time
d) Discrete in amplitude and continuous in time
9) Both continuous-time and discrete-time signals are further classified as
a) Deterministic and non-deterministic signals
b) Periodic and a periodic signals
c) Even and odd signal
d) Any one of the given option
10) Laplace transform plays a very important role in
a) Analysis of analog signals
b) Analysis of systems
c) Solving linear constant coefficient differential equations
d) All of the options
11) What is the ROC of the signal x(n) = δ(n-k), k > 0 ?
a) z = 0 b) z = ∞
c) Entire z-plane, except at z = 0 d) Entire z-plane, except at z = ∞
12) What is the ROC of z-transform of finite duration anti-causal sequence ?
a) z = 0 b) z = ∞
c) Entire z-plane, except at z = 0 d) Entire z-plane, except at z = ∞
13) The advantage of representing the digital system in block diagram form is/are
a) Just by inspection, the computation algorithm can be easily written
b) The hardware requirement can be easily determined
c) The relation between the output and the input can be determined
d) All of the options
14) What is the duration of the unit sample response of a digital filter ?
a) Finite b) Infinite c) Impulse (very small) d) Zero

_____________

Set Q
*SLRTX372* -3- SLR-TX – 372
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
Elective – I : DIgital signal processing
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three questions : (3�4=12)


1) What are the advantages of digital signal processing over analog signal
processing ?
2) Determine the z-transform for the analog input signal x(t) = e– at applied to digital
filter.
3) Determine the parallel realization of the IIR digital filter transfer function.
H(z) = 3 (2z2 + 5z + 4)/(2z + 1) (z + 2)
4) Explain the linearity and shift of a sequence properties of the discrete Fourier series.

3. Answer any two questions : (2�8=16)


1) What are the applications of DSP ?
2) What are the important properties of the ROC for the z-transform.
3) Explain the following properties of the discrete Fourier series.
a) Duality
b) Symmetry
c) Periodic concolution.

SECTION – II

4. Answer any three questions : (3�4=12)


1) Explain basic system for discrete-time filtering of continuous-time signals with
block diagram.
2) Explain the flow graph of 8-point DFT using the butterfly computation.
3) With neat diagram, explain full duplex analog voice privacy system for
transmitter and receiver.
Set Q
SLR-TX – 372 -4- *SLRTX372*
4) What are the salient features required for efficient performance of DSP
operation ?
5) Write a note on Bilinear transformation. 8
OR
Write note on following filters :
a) Low pass
b) High pass
c) Band pass
d) Band stop.
6) Explain the following filters :
a) Time domain filters
b) Frequency domain filters (IIR). 8
_____________

Set Q
*SLRTX372* SLR-TX – 372
Seat
No.
Set R

B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – I : DIgital signal processing
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1�14=14)
1) What is the ROC of z-transform of finite duration anti-causal sequence ?
a) z = 0 b) z = ∞
c) Entire z-plane, except at z = 0 d) Entire z-plane, except at z = ∞
2) The advantage of representing the digital system in block diagram form is/are
a) Just by inspection, the computation algorithm can be easily written
b) The hardware requirement can be easily determined
c) The relation between the output and the input can be determined
d) All of the options
3) What is the duration of the unit sample response of a digital filter ?
a) Finite b) Infinite c) Impulse (very small) d) Zero
4) The magnitude response of Butterworth filter has
1. Flat stop band
2. Flat pass band
3. Tapering pass band
4. Tapering stop band
a) 1 and 2 are correct b) 2 and 4 are correct
c) 2 and 3 are correct d) All the four are correct
5) For a system function H(s) to be stable
a) The zeros lie in left half of the s plane b) The zeros lie in right half of the s plane
c) The poles lie in left half of the s plane d) The poles lie in right half of the s plane
6) Which of the following is true regarding the number of computations required to
compute DFT at any one value of ‘k’ ?
a) 4N – 2 real multiplications and 4N real additions
b) 4N real multiplications and 4N – 4 real additions
c) 4N – 2 real multiplications and 4N + 2 real additions
d) 4N real multiplications and 4N – 2 real additions
P.T.O.
SLR-TX – 372 -2- *SLRTX372*
7) If x(n) and X(k) are an N-point DFT pair, then X(k + N) = ?
a) X(– k) b) – X (k)
c) X(k) d) None of the mentioned
8) Which of the following is introduced in the frequency sampling realization of the
FIR filter ?
a) Poles are more in number on unit circle
b) Zeros are more in number on the unit circle
c) Poles and zeros at equally spaced points on the unit circle
d) None of the mentioned
9) Which of the following is the second generation processor ?
a) TMS320C1X b) TMS320C2X
c) Both option a) and b) d) None of the option
10) Both discrete-time and continues-time signals can be modeled using the
following _________ method.
a) A linear difference/differential equation
b) The impulse response sequence
c) A state variable or matrix
d) Any one of the given option
11) Discrete-time signals are __________
a) Continuous in amplitude and continuous in time
b) Continuous in amplitude and discrete in time
c) Discrete in amplitude and discrete in time
d) Discrete in amplitude and continuous in time
12) Both continuous-time and discrete-time signals are further classified as
a) Deterministic and non-deterministic signals
b) Periodic and a periodic signals
c) Even and odd signal
d) Any one of the given option
13) Laplace transform plays a very important role in
a) Analysis of analog signals
b) Analysis of systems
c) Solving linear constant coefficient differential equations
d) All of the options
14) What is the ROC of the signal x(n) = δ(n-k), k > 0 ?
a) z = 0 b) z = ∞
c) Entire z-plane, except at z = 0 d) Entire z-plane, except at z = ∞

_____________

Set R
*SLRTX372* -3- SLR-TX – 372
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
Elective – I : DIgital signal processing
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three questions : (3�4=12)


1) What are the advantages of digital signal processing over analog signal
processing ?
2) Determine the z-transform for the analog input signal x(t) = e– at applied to digital
filter.
3) Determine the parallel realization of the IIR digital filter transfer function.
H(z) = 3 (2z2 + 5z + 4)/(2z + 1) (z + 2)
4) Explain the linearity and shift of a sequence properties of the discrete Fourier series.

3. Answer any two questions : (2�8=16)


1) What are the applications of DSP ?
2) What are the important properties of the ROC for the z-transform.
3) Explain the following properties of the discrete Fourier series.
a) Duality
b) Symmetry
c) Periodic concolution.

SECTION – II

4. Answer any three questions : (3�4=12)


1) Explain basic system for discrete-time filtering of continuous-time signals with
block diagram.
2) Explain the flow graph of 8-point DFT using the butterfly computation.
3) With neat diagram, explain full duplex analog voice privacy system for
transmitter and receiver.
Set R
SLR-TX – 372 -4- *SLRTX372*
4) What are the salient features required for efficient performance of DSP
operation ?
5) Write a note on Bilinear transformation. 8
OR
Write note on following filters :
a) Low pass
b) High pass
c) Band pass
d) Band stop.
6) Explain the following filters :
a) Time domain filters
b) Frequency domain filters (IIR). 8
_____________

Set R
*SLRTX372* SLR-TX – 372
Seat
No.
Set S

B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – I : DIgital signal processing
Day and Date : Thursday, 6-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1�14=14)
1) Which of the following is true regarding the number of computations required to
compute DFT at any one value of ‘k’ ?
a) 4N – 2 real multiplications and 4N real additions
b) 4N real multiplications and 4N – 4 real additions
c) 4N – 2 real multiplications and 4N + 2 real additions
d) 4N real multiplications and 4N – 2 real additions
2) If x(n) and X(k) are an N-point DFT pair, then X(k + N) = ?
a) X(– k) b) – X (k)
c) X(k) d) None of the mentioned
3) Which of the following is introduced in the frequency sampling realization of the
FIR filter ?
a) Poles are more in number on unit circle
b) Zeros are more in number on the unit circle
c) Poles and zeros at equally spaced points on the unit circle
d) None of the mentioned
4) Which of the following is the second generation processor ?
a) TMS320C1X b) TMS320C2X
c) Both option a) and b) d) None of the option
5) Both discrete-time and continues-time signals can be modeled using the
following _________ method.
a) A linear difference/differential equation
b) The impulse response sequence
c) A state variable or matrix
d) Any one of the given option P.T.O.
SLR-TX – 372 -2- *SLRTX372*
6) Discrete-time signals are __________
a) Continuous in amplitude and continuous in time
b) Continuous in amplitude and discrete in time
c) Discrete in amplitude and discrete in time
d) Discrete in amplitude and continuous in time
7) Both continuous-time and discrete-time signals are further classified as
a) Deterministic and non-deterministic signals
b) Periodic and a periodic signals
c) Even and odd signal
d) Any one of the given option
8) Laplace transform plays a very important role in
a) Analysis of analog signals
b) Analysis of systems
c) Solving linear constant coefficient differential equations
d) All of the options
9) What is the ROC of the signal x(n) = δ(n-k), k > 0 ?
a) z = 0 b) z = ∞
c) Entire z-plane, except at z = 0 d) Entire z-plane, except at z = ∞
10) What is the ROC of z-transform of finite duration anti-causal sequence ?
a) z = 0 b) z = ∞
c) Entire z-plane, except at z = 0 d) Entire z-plane, except at z = ∞
11) The advantage of representing the digital system in block diagram form is/are
a) Just by inspection, the computation algorithm can be easily written
b) The hardware requirement can be easily determined
c) The relation between the output and the input can be determined
d) All of the options
12) What is the duration of the unit sample response of a digital filter ?
a) Finite b) Infinite c) Impulse (very small) d) Zero
13) The magnitude response of Butterworth filter has
1. Flat stop band
2. Flat pass band
3. Tapering pass band
4. Tapering stop band
a) 1 and 2 are correct b) 2 and 4 are correct
c) 2 and 3 are correct d) All the four are correct
14) For a system function H(s) to be stable
a) The zeros lie in left half of the s plane b) The zeros lie in right half of the s plane
c) The poles lie in left half of the s plane d) The poles lie in right half of the s plane
_____________

Set S
*SLRTX372* -3- SLR-TX – 372
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
Elective – I : DIgital signal processing
Day and Date : Thursday, 6-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three questions : (3�4=12)


1) What are the advantages of digital signal processing over analog signal
processing ?
2) Determine the z-transform for the analog input signal x(t) = e– at applied to digital
filter.
3) Determine the parallel realization of the IIR digital filter transfer function.
H(z) = 3 (2z2 + 5z + 4)/(2z + 1) (z + 2)
4) Explain the linearity and shift of a sequence properties of the discrete Fourier series.

3. Answer any two questions : (2�8=16)


1) What are the applications of DSP ?
2) What are the important properties of the ROC for the z-transform.
3) Explain the following properties of the discrete Fourier series.
a) Duality
b) Symmetry
c) Periodic concolution.

SECTION – II

4. Answer any three questions : (3�4=12)


1) Explain basic system for discrete-time filtering of continuous-time signals with
block diagram.
2) Explain the flow graph of 8-point DFT using the butterfly computation.
3) With neat diagram, explain full duplex analog voice privacy system for
transmitter and receiver.
Set S
SLR-TX – 372 -4- *SLRTX372*
4) What are the salient features required for efficient performance of DSP
operation ?
5) Write a note on Bilinear transformation. 8
OR
Write note on following filters :
a) Low pass
b) High pass
c) Band pass
d) Band stop.
6) Explain the following filters :
a) Time domain filters
b) Frequency domain filters (IIR). 8
_____________

Set S
*SLRTX373* SLR-TX – 373
Seat
No. Set P
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Software Testing and Quality Assurance (Elective – I)
Day and Date : Thursday, 6-12-20182018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.00 .

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.
5) Figures must be drawn wherever necessary.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)



1) This approach involves testing software system after development work is completed.
a) Total Quality Management b) Big Bang
c) Destruction d) Demonstration
2) To check whether a right process is followed or not during development life cycle is termed
as
a) Validation b) Verification
c) Quality Assurance d) Quality Control
3) ____________ testing is done on the basis of internal structures of software as defined
by requirements, designs, coding standards and guidelines as well as the functional and
non-functional requirement specifications.
a) White box b) Black box
c) Gray box d) None of the above
4) The simplest form of path testing is called
a) Line Coverage Testing b) Equivalence Partitioning
c) Branch Coverage Testing d) None
5) In ___________ testing, the software tester has access to the program’s code and can
examine it for clues to help him with his testing.
a) White Box b) Black Box
c) Beta d) Gamma
P.T.O.
SLR-TX – 373 -2- *SLRTX373*
6) ____________ is performed without any formal test plan, test strategies, test scenario,
test data or test cases.
a) Adhoc Testing b) Sanity Testing
c) Execution Testing d) All
7) This testing talks about the system resources required by the transactions that have been
planned to be undertaken.
a) Sanity Testing b) Stress Testing
c) Usability Testing d) Compatibility Testing
8) Bug can be described as
a) Minimal b) Singular c) Reproducible d) All
9) Test Planning is a job that should involve _________ from across the entire product team.
a) Testers b) Developers
c) Key players only d) all
10) Cost of quality depends on
a) Prevention b) Appraisals c) Failure d) All
11) This is a software quality assurance activity that focuses on the identification and
assessment of potential hazards that may affect software negatively and causes an entire
system to fail
a) Software Reliability b) Software Availability
c) Software Safety d) All
12) Quality views are
a) Transcendental b) Users c) Manufacturer d) All
13) __________ are tools used to control and operate the software being tested.
a) Viewers and Monitors b) Drivers
c) Stubs d) Stress and Load Tools
14) _____________ doesn’t know anything about the software being tested. It just clicks or
types randomly.
a) Smart monkey b) Dumb monkey
c) Semi-Smart monkey d) All

___________

Set P
*SLRTX373* -3- SLR-TX – 373
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Software Testing and Quality Assurance (Elective – I)
Day and Date : Thursday, 6-12-20182018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.00 .

Instructions : 1) Figures to the right indicate full marks.


2) Assume suitable data if necessary.
3) Figures must be drawn wherever necessary.
SECTION – I
2. Answer the following questions (any three) : (3×4=12)
A) What are the important features of testing process ?
B) What are the different skills required by tester ?
C) Write note on Testing Vs Debugging.
D) Explain Smoke Testing and Sanity testing.
E) What is proposal testing and requirement testing ?
3. Answer any two questions. (2×8=16)
A) Explain Defect Life Cycle.
B) Explain V and V model.
C) Explain Graphical user Interface testing with different advantages and disadvantages.

SECTION – II
4. Answer the following questions (any three) : (3×4=12)
A) Explain the McCall’s Quality Factors.
B) Explain in brief severity and priority of bugs.
C) Explain Elements of Software Quality Assurance.
D) Write note on Six Sigma Standard.
E) Explain Viewers and Monitors test tool in detail.
5. Answer any two questions. (2×8=16)
A) Explain Test Design, Test Cases and Test Procedure.
B) Explain ISO 9000 and CMM Quality Standard.
C) Explain in detail the Selenium testing tool.

___________

Set P
Set P
*SLRTX373* SLR-TX – 373
Seat
No. Set Q
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Software Testing and Quality Assurance (Elective – I)
Day and Date : Thursday, 6-12-20182018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.00 .

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.
5) Figures must be drawn wherever necessary.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Bug can be described as
a) Minimal b) Singular c) Reproducible d) All
2) Test Planning is a job that should involve _________ from across the entire product team.
a) Testers b) Developers
c) Key players only d) all
3) Cost of quality depends on
a) Prevention b) Appraisals c) Failure d) All
4) This is a software quality assurance activity that focuses on the identification and
assessment of potential hazards that may affect software negatively and causes an entire
system to fail
a) Software Reliability b) Software Availability
c) Software Safety d) All
5) Quality views are
a) Transcendental b) Users c) Manufacturer d) All
6) __________ are tools used to control and operate the software being tested.
a) Viewers and Monitors b) Drivers
c) Stubs d) Stress and Load Tools

P.T.O.
SLR-TX – 373 -2- *SLRTX373*
7) _____________ doesn’t know anything about the software being tested. It just clicks or
types randomly.
a) Smart monkey b) Dumb monkey
c) Semi-Smart monkey d) All

8) This approach involves testing software system after development work is completed.
a) Total Quality Management b) Big Bang
c) Destruction d) Demonstration
9) To check whether a right process is followed or not during development life cycle is termed
as
a) Validation b) Verification
c) Quality Assurance d) Quality Control
10) ____________ testing is done on the basis of internal structures of software as defined
by requirements, designs, coding standards and guidelines as well as the functional and
non-functional requirement specifications.
a) White box b) Black box
c) Gray box d) None of the above
11) The simplest form of path testing is called
a) Line Coverage Testing b) Equivalence Partitioning
c) Branch Coverage Testing d) None
12) In ___________ testing, the software tester has access to the program’s code and can
examine it for clues to help him with his testing.
a) White Box b) Black Box
c) Beta d) Gamma
13) ____________ is performed without any formal test plan, test strategies, test scenario,
test data or test cases.
a) Adhoc Testing b) Sanity Testing
c) Execution Testing d) All
14) This testing talks about the system resources required by the transactions that have been
planned to be undertaken.
a) Sanity Testing b) Stress Testing
c) Usability Testing d) Compatibility Testing


___________

Set Q
*SLRTX373* -3- SLR-TX – 373
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Software Testing and Quality Assurance (Elective – I)
Day and Date : Thursday, 6-12-20182018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.00 .

Instructions : 1) Figures to the right indicate full marks.


2) Assume suitable data if necessary.
3) Figures must be drawn wherever necessary.
SECTION – I
2. Answer the following questions (any three) : (3×4=12)
A) What are the important features of testing process ?
B) What are the different skills required by tester ?
C) Write note on Testing Vs Debugging.
D) Explain Smoke Testing and Sanity testing.
E) What is proposal testing and requirement testing ?
3. Answer any two questions. (2×8=16)
A) Explain Defect Life Cycle.
B) Explain V and V model.
C) Explain Graphical user Interface testing with different advantages and disadvantages.

SECTION – II
4. Answer the following questions (any three) : (3×4=12)
A) Explain the McCall’s Quality Factors.
B) Explain in brief severity and priority of bugs.
C) Explain Elements of Software Quality Assurance.
D) Write note on Six Sigma Standard.
E) Explain Viewers and Monitors test tool in detail.
5. Answer any two questions. (2×8=16)
A) Explain Test Design, Test Cases and Test Procedure.
B) Explain ISO 9000 and CMM Quality Standard.
C) Explain in detail the Selenium testing tool.

___________


Set Q
Set Q
*SLRTX373* SLR-TX – 373
Seat
No. Set R
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Software Testing and Quality Assurance (Elective – I)
Day and Date : Thursday, 6-12-20182018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.00 .

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.
5) Figures must be drawn wherever necessary.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) In ___________ testing, the software tester has access to the program’s code and can
examine it for clues to help him with his testing.
a) White Box b) Black Box
c) Beta d) Gamma
2) ____________ is performed without any formal test plan, test strategies, test scenario,
test data or test cases.
a) Adhoc Testing b) Sanity Testing
c) Execution Testing d) All
3) This testing talks about the system resources required by the transactions that have been
planned to be undertaken.
a) Sanity Testing b) Stress Testing
c) Usability Testing d) Compatibility Testing
4) Bug can be described as
a) Minimal b) Singular c) Reproducible d) All
5) Test Planning is a job that should involve _________ from across the entire product team.
a) Testers b) Developers
c) Key players only d) all

P.T.O.
SLR-TX – 373 -2- *SLRTX373*
6) Cost of quality depends on
a) Prevention b) Appraisals c) Failure d) All
7) This is a software quality assurance activity that focuses on the identification and
assessment of potential hazards that may affect software negatively and causes an entire
system to fail
a) Software Reliability b) Software Availability
c) Software Safety d) All
8) Quality views are
a) Transcendental b) Users c) Manufacturer d) All
9) __________ are tools used to control and operate the software being tested.
a) Viewers and Monitors b) Drivers
c) Stubs d) Stress and Load Tools
10) _____________ doesn’t know anything about the software being tested. It just clicks or
types randomly.
a) Smart monkey b) Dumb monkey
c) Semi-Smart monkey d) All

11) This approach involves testing software system after development work is completed.
a) Total Quality Management b) Big Bang
c) Destruction d) Demonstration
12) To check whether a right process is followed or not during development life cycle is termed
as
a) Validation b) Verification
c) Quality Assurance d) Quality Control
13) ____________ testing is done on the basis of internal structures of software as defined
by requirements, designs, coding standards and guidelines as well as the functional and
non-functional requirement specifications.
a) White box b) Black box
c) Gray box d) None of the above
14) The simplest form of path testing is called
a) Line Coverage Testing b) Equivalence Partitioning
c) Branch Coverage Testing d) None

___________

Set R
*SLRTX373* -3- SLR-TX – 373
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Software Testing and Quality Assurance (Elective – I)
Day and Date : Thursday, 6-12-20182018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.00 .

Instructions : 1) Figures to the right indicate full marks.


2) Assume suitable data if necessary.
3) Figures must be drawn wherever necessary.
SECTION – I
2. Answer the following questions (any three) : (3×4=12)
A) What are the important features of testing process ?
B) What are the different skills required by tester ?
C) Write note on Testing Vs Debugging.
D) Explain Smoke Testing and Sanity testing.
E) What is proposal testing and requirement testing ?
3. Answer any two questions. (2×8=16)
A) Explain Defect Life Cycle.
B) Explain V and V model.
C) Explain Graphical user Interface testing with different advantages and disadvantages.

SECTION – II
4. Answer the following questions (any three) : (3×4=12)
A) Explain the McCall’s Quality Factors.
B) Explain in brief severity and priority of bugs.
C) Explain Elements of Software Quality Assurance.
D) Write note on Six Sigma Standard.
E) Explain Viewers and Monitors test tool in detail.
5. Answer any two questions. (2×8=16)
A) Explain Test Design, Test Cases and Test Procedure.
B) Explain ISO 9000 and CMM Quality Standard.
C) Explain in detail the Selenium testing tool.

___________


Set R
Set R
*SLRTX373* SLR-TX – 373
Seat
No. Set S
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Software Testing and Quality Assurance (Elective – I)
Day and Date : Thursday, 6-12-20182018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.00 .

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.
5) Figures must be drawn wherever necessary.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Cost of quality depends on
a) Prevention b) Appraisals c) Failure d) All
2) This is a software quality assurance activity that focuses on the identification and
assessment of potential hazards that may affect software negatively and causes an entire
system to fail
a) Software Reliability b) Software Availability
c) Software Safety d) All
3) Quality views are
a) Transcendental b) Users c) Manufacturer d) All
4) __________ are tools used to control and operate the software being tested.
a) Viewers and Monitors b) Drivers
c) Stubs d) Stress and Load Tools
5) _____________ doesn’t know anything about the software being tested. It just clicks or
types randomly.
a) Smart monkey b) Dumb monkey
c) Semi-Smart monkey d) All

6) This approach involves testing software system after development work is completed.
a) Total Quality Management b) Big Bang
c) Destruction d) Demonstration
P.T.O.
SLR-TX – 373 -2- *SLRTX373*
7) To check whether a right process is followed or not during development life cycle is termed
as
a) Validation b) Verification
c) Quality Assurance d) Quality Control
8) ____________ testing is done on the basis of internal structures of software as defined
by requirements, designs, coding standards and guidelines as well as the functional and
non-functional requirement specifications.
a) White box b) Black box
c) Gray box d) None of the above
9) The simplest form of path testing is called
a) Line Coverage Testing b) Equivalence Partitioning
c) Branch Coverage Testing d) None
10) In ___________ testing, the software tester has access to the program’s code and can
examine it for clues to help him with his testing.
a) White Box b) Black Box
c) Beta d) Gamma
11) ____________ is performed without any formal test plan, test strategies, test scenario,
test data or test cases.
a) Adhoc Testing b) Sanity Testing
c) Execution Testing d) All
12) This testing talks about the system resources required by the transactions that have been
planned to be undertaken.
a) Sanity Testing b) Stress Testing
c) Usability Testing d) Compatibility Testing
13) Bug can be described as
a) Minimal b) Singular c) Reproducible d) All
14) Test Planning is a job that should involve _________ from across the entire product team.
a) Testers b) Developers
c) Key players only d) all


___________

Set S
*SLRTX373* -3- SLR-TX – 373
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Software Testing and Quality Assurance (Elective – I)
Day and Date : Thursday, 6-12-20182018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.00 .

Instructions : 1) Figures to the right indicate full marks.


2) Assume suitable data if necessary.
3) Figures must be drawn wherever necessary.
SECTION – I
2. Answer the following questions (any three) : (3×4=12)
A) What are the important features of testing process ?
B) What are the different skills required by tester ?
C) Write note on Testing Vs Debugging.
D) Explain Smoke Testing and Sanity testing.
E) What is proposal testing and requirement testing ?
3. Answer any two questions. (2×8=16)
A) Explain Defect Life Cycle.
B) Explain V and V model.
C) Explain Graphical user Interface testing with different advantages and disadvantages.

SECTION – II
4. Answer the following questions (any three) : (3×4=12)
A) Explain the McCall’s Quality Factors.
B) Explain in brief severity and priority of bugs.
C) Explain Elements of Software Quality Assurance.
D) Write note on Six Sigma Standard.
E) Explain Viewers and Monitors test tool in detail.
5. Answer any two questions. (2×8=16)
A) Explain Test Design, Test Cases and Test Procedure.
B) Explain ISO 9000 and CMM Quality Standard.
C) Explain in detail the Selenium testing tool.

___________


Set S
Set S
*SLRTX374* SLR-TX – 374

Seat
No. Set P
B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – i : business intelligence
Day and Date : Thursday, 6-12-2018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Assume suitable data if necessary.
3) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) ________ is a broad category of applications and technologies for gathering,
storing, analyzing and providing access to data to help enterprise users
make better business decisions.
a) Data mart b) Business information warehouse
c) Business intelligence d) Business warehouse
2) Data Warehouse bus matrix is a combination of
a) Dimensions and detailed facts b) Dimensions and data marts
c) Facts and data marts d) Only dimensions
3) ________ modeling is suitable for Analysis and not for Modification.
a) Relational b) Object-oriented
c) Dimensional d) Both relational and Dimensional
4) _________cardinality exists between dimension tables to fact table.
a) one-to-many b) many-to-one
c) many-to-many d) none of the above

P.T.O.
SLR-TX – 374 -2- *SLRTX374*

5) Multiple dimension tables and multiple fact tables are present in


a) star-schema b) snowflake schema
c) galaxy schema d) none of the above
6) Keys that do not have in-built meaning and are independent of operational
system keys are called
a) Primary key b) Surrogate key
c) Foreign keys d) None of the above
7) Which of the following is/are category of Fact attributes ?
a) Additive Measures b) Semi-additive
c) Non-additive d) All the above
8) ________ is a systematic examination of the quality, scope and context of
data sources.
a) ETL b) Data cleansing
c) Data Profiling d) None of the above
9) A __________ is used to define roles for different users to enforce security
in ETL.
a) Web Server b) Domain Name Server
c) LDAP Server d) OLAP Server
10) Clever processing algorithms, parallel processing and patent hardware are
required to
a) reduce storage b) reduce data latency
c) clean the data d) none of the above
11) In pyramid data model, base of the pyramid represents
a) Data marts b) Enterprise data warehouse
c) OLPT data sources d) None of the above
12) Drill across reports can be generated using conforming dimensions.
a) True b) False
13) Compliance includes
a) Proof of the complete transaction flow that changed any data results
b) Fully documented algorithms for allocations, adjustments and derivations
c) Neither a) nor b)
d) Both a) and b)
14) Data Integration is a _______ view of the customer.
a) 90 degree b) 180 degree c) 360 degree d) None
______________

Set P
*SLRTX374* -3- SLR-TX – 374
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
Elective – i : business intelligence

Day and Date : Thursday, 6-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.

SECTION – I

2. Answer any three : (3×4=12)

a) What is Business Intelligence ? List the functions of Business intelligence.

b) List the differences between Star schema and Snowflake schema.

c) Draw information package diagram for automaker sales analysis.

d) Illustrate four steps of dimensional modeling with example.

3. Answer any one : (1×8=8)


a) Draw Technical architecture of Business intelligence system and explain
the functions of Front room and Back room components.

b) What is role-based security approach ? List the provisions used in security


policy of data warehouse.

4. Write down the characteristics of fact table attributes and dimension table
attributes. 8

Set P
SLR-TX – 374 -4- *SLRTX374*

SECTION – II
5. Answer any three : (3×4=12)
a) Explain the concept of data quality via data profiling.
b) What is data Integration ? Explain.
c) List different types of Business Intelligence Applications and state their
functions.
d) Why Business Intelligence Applications are important ?

6. Answer any one : (1×8=8)


a) Mention the user delivery Interfaces and Legacy licenses requirements in
ETL.
b) What are the Business requirements and Archiving and lineage requirements
in ETL ?

7. Explain the subsystems of Managing the ETL Environment. 8

____________

Set P
*SLRTX374* SLR-TX – 374

Seat
No. Set Q
B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – i : business intelligence
Day and Date : Thursday, 6-12-2018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Assume suitable data if necessary.
3) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) ________ is a systematic examination of the quality, scope and context of
data sources.
a) ETL b) Data cleansing
c) Data Profiling d) None of the above
2) A __________ is used to define roles for different users to enforce security
in ETL.
a) Web Server b) Domain Name Server
c) LDAP Server d) OLAP Server
3) Clever processing algorithms, parallel processing and patent hardware are
required to
a) reduce storage b) reduce data latency
c) clean the data d) none of the above
4) In pyramid data model, base of the pyramid represents
a) Data marts b) Enterprise data warehouse
c) OLPT data sources d) None of the above
P.T.O.
SLR-TX – 374 -2- *SLRTX374*

5) Drill across reports can be generated using conforming dimensions.


a) True b) False
6) Compliance includes
a) Proof of the complete transaction flow that changed any data results
b) Fully documented algorithms for allocations, adjustments and derivations
c) Neither a) nor b)
d) Both a) and b)
7) Data Integration is a _______ view of the customer.
a) 90 degree b) 180 degree c) 360 degree d) None
8) ________ is a broad category of applications and technologies for gathering,
storing, analyzing and providing access to data to help enterprise users
make better business decisions.
a) Data mart b) Business information warehouse
c) Business intelligence d) Business warehouse
9) Data Warehouse bus matrix is a combination of
a) Dimensions and detailed facts b) Dimensions and data marts
c) Facts and data marts d) Only dimensions
10) ________ modeling is suitable for Analysis and not for Modification.
a) Relational b) Object-oriented
c) Dimensional d) Both relational and Dimensional
11) _________cardinality exists between dimension tables to fact table.
a) one-to-many b) many-to-one
c) many-to-many d) none of the above
12) Multiple dimension tables and multiple fact tables are present in
a) star-schema b) snowflake schema
c) galaxy schema d) none of the above
13) Keys that do not have in-built meaning and are independent of operational
system keys are called
a) Primary key b) Surrogate key
c) Foreign keys d) None of the above
14) Which of the following is/are category of Fact attributes ?
a) Additive Measures b) Semi-additive
c) Non-additive d) All the above
______________
Set Q
*SLRTX374* -3- SLR-TX – 374
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
Elective – i : business intelligence

Day and Date : Thursday, 6-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.

SECTION – I

2. Answer any three : (3×4=12)

a) What is Business Intelligence ? List the functions of Business intelligence.

b) List the differences between Star schema and Snowflake schema.

c) Draw information package diagram for automaker sales analysis.

d) Illustrate four steps of dimensional modeling with example.

3. Answer any one : (1×8=8)


a) Draw Technical architecture of Business intelligence system and explain
the functions of Front room and Back room components.

b) What is role-based security approach ? List the provisions used in security


policy of data warehouse.

4. Write down the characteristics of fact table attributes and dimension table
attributes. 8

Set Q
SLR-TX – 374 -4- *SLRTX374*

SECTION – II

5. Answer any three : (3×4=12)

a) Explain the concept of data quality via data profiling.


b) What is data Integration ? Explain.
c) List different types of Business Intelligence Applications and state their
functions.
d) Why Business Intelligence Applications are important ?

6. Answer any one : (1×8=8)


a) Mention the user delivery Interfaces and Legacy licenses requirements in
ETL.
b) What are the Business requirements and Archiving and lineage requirements
in ETL ?

7. Explain the subsystems of Managing the ETL Environment. 8

____________

Set Q
*SLRTX374* SLR-TX – 374

Seat
No. Set R
B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – i : business intelligence
Day and Date : Thursday, 6-12-2018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Assume suitable data if necessary.
3) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Multiple dimension tables and multiple fact tables are present in
a) star-schema b) snowflake schema
c) galaxy schema d) none of the above
2) Keys that do not have in-built meaning and are independent of operational
system keys are called
a) Primary key b) Surrogate key
c) Foreign keys d) None of the above
3) Which of the following is/are category of Fact attributes ?
a) Additive Measures b) Semi-additive
c) Non-additive d) All the above
4) ________ is a systematic examination of the quality, scope and context of
data sources.
a) ETL b) Data cleansing
c) Data Profiling d) None of the above

P.T.O.
SLR-TX – 374 -2- *SLRTX374*

5) A __________ is used to define roles for different users to enforce security


in ETL.
a) Web Server b) Domain Name Server
c) LDAP Server d) OLAP Server
6) Clever processing algorithms, parallel processing and patent hardware are
required to
a) reduce storage b) reduce data latency
c) clean the data d) none of the above
7) In pyramid data model, base of the pyramid represents
a) Data marts b) Enterprise data warehouse
c) OLPT data sources d) None of the above
8) Drill across reports can be generated using conforming dimensions.
a) True b) False
9) Compliance includes
a) Proof of the complete transaction flow that changed any data results
b) Fully documented algorithms for allocations, adjustments and derivations
c) Neither a) nor b)
d) Both a) and b)
10) Data Integration is a _______ view of the customer.
a) 90 degree b) 180 degree c) 360 degree d) None
11) ________ is a broad category of applications and technologies for gathering,
storing, analyzing and providing access to data to help enterprise users
make better business decisions.
a) Data mart b) Business information warehouse
c) Business intelligence d) Business warehouse
12) Data Warehouse bus matrix is a combination of
a) Dimensions and detailed facts b) Dimensions and data marts
c) Facts and data marts d) Only dimensions
13) ________ modeling is suitable for Analysis and not for Modification.
a) Relational b) Object-oriented
c) Dimensional d) Both relational and Dimensional
14) _________cardinality exists between dimension tables to fact table.
a) one-to-many b) many-to-one
c) many-to-many d) none of the above
______________
Set R
*SLRTX374* -3- SLR-TX – 374
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
Elective – i : business intelligence

Day and Date : Thursday, 6-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.

SECTION – I

2. Answer any three : (3×4=12)

a) What is Business Intelligence ? List the functions of Business intelligence.

b) List the differences between Star schema and Snowflake schema.

c) Draw information package diagram for automaker sales analysis.

d) Illustrate four steps of dimensional modeling with example.

3. Answer any one : (1×8=8)


a) Draw Technical architecture of Business intelligence system and explain
the functions of Front room and Back room components.

b) What is role-based security approach ? List the provisions used in security


policy of data warehouse.

4. Write down the characteristics of fact table attributes and dimension table
attributes. 8

Set R
SLR-TX – 374 -4- *SLRTX374*

SECTION – II
5. Answer any three : (3×4=12)
a) Explain the concept of data quality via data profiling.
b) What is data Integration ? Explain.
c) List different types of Business Intelligence Applications and state their
functions.
d) Why Business Intelligence Applications are important ?

6. Answer any one : (1×8=8)


a) Mention the user delivery Interfaces and Legacy licenses requirements in
ETL.
b) What are the Business requirements and Archiving and lineage requirements
in ETL ?

7. Explain the subsystems of Managing the ETL Environment. 8

____________

Set R
*SLRTX374* SLR-TX – 374

Seat
No. Set S
B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – i : business intelligence
Day and Date : Thursday, 6-12-2018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) Assume suitable data if necessary.
3) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Clever processing algorithms, parallel processing and patent hardware are
required to
a) reduce storage b) reduce data latency
c) clean the data d) none of the above
2) In pyramid data model, base of the pyramid represents
a) Data marts b) Enterprise data warehouse
c) OLPT data sources d) None of the above
3) Drill across reports can be generated using conforming dimensions.
a) True b) False
4) Compliance includes
a) Proof of the complete transaction flow that changed any data results
b) Fully documented algorithms for allocations, adjustments and derivations
c) Neither a) nor b)
d) Both a) and b)
5) Data Integration is a _______ view of the customer.
a) 90 degree b) 180 degree c) 360 degree d) None
P.T.O.
SLR-TX – 374 -2- *SLRTX374*

6) ________ is a broad category of applications and technologies for gathering,


storing, analyzing and providing access to data to help enterprise users
make better business decisions.
a) Data mart b) Business information warehouse
c) Business intelligence d) Business warehouse
7) Data Warehouse bus matrix is a combination of
a) Dimensions and detailed facts b) Dimensions and data marts
c) Facts and data marts d) Only dimensions
8) ________ modeling is suitable for Analysis and not for Modification.
a) Relational b) Object-oriented
c) Dimensional d) Both relational and Dimensional
9) _________cardinality exists between dimension tables to fact table.
a) one-to-many b) many-to-one
c) many-to-many d) none of the above
10) Multiple dimension tables and multiple fact tables are present in
a) star-schema b) snowflake schema
c) galaxy schema d) none of the above
11) Keys that do not have in-built meaning and are independent of operational
system keys are called
a) Primary key b) Surrogate key
c) Foreign keys d) None of the above
12) Which of the following is/are category of Fact attributes ?
a) Additive Measures b) Semi-additive
c) Non-additive d) All the above
13) ________ is a systematic examination of the quality, scope and context of
data sources.
a) ETL b) Data cleansing
c) Data Profiling d) None of the above
14) A __________ is used to define roles for different users to enforce security
in ETL.
a) Web Server b) Domain Name Server
c) LDAP Server d) OLAP Server
______________

Set S
*SLRTX374* -3- SLR-TX – 374
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
Elective – i : business intelligence

Day and Date : Thursday, 6-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.

SECTION – I

2. Answer any three : (3×4=12)

a) What is Business Intelligence ? List the functions of Business intelligence.

b) List the differences between Star schema and Snowflake schema.

c) Draw information package diagram for automaker sales analysis.

d) Illustrate four steps of dimensional modeling with example.

3. Answer any one : (1×8=8)


a) Draw Technical architecture of Business intelligence system and explain
the functions of Front room and Back room components.

b) What is role-based security approach ? List the provisions used in security


policy of data warehouse.

4. Write down the characteristics of fact table attributes and dimension table
attributes. 8

Set S
SLR-TX – 374 -4- *SLRTX374*

SECTION – II
5. Answer any three : (3×4=12)
a) Explain the concept of data quality via data profiling.
b) What is data Integration ? Explain.
c) List different types of Business Intelligence Applications and state their
functions.
d) Why Business Intelligence Applications are important ?

6. Answer any one : (1×8=8)


a) Mention the user delivery Interfaces and Legacy licenses requirements in
ETL.
b) What are the Business requirements and Archiving and lineage requirements
in ETL ?

7. Explain the subsystems of Managing the ETL Environment. 8

____________

Set S
*SLRTX375* SLR-TX – 375
Seat
No.

Set P
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Object Oriented Modeling and Design (Elective – II)
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) Which of the following is not a part of DFD ?
a) process b) data flow
c) event d) actor
2) Object’s interact with each other with the help of ___________
a) messages b) role
c) port d) protocol
3) Class model gives __________ structure of project.
a) static b) dynamic
c) static and dynamic d) none of these
4) Which of the following is correct representation ?
a) “stereotype name” b) <stereotype name>
c) <<stereotype name>> d) $stereotype name$
5) __________ is data value held by object in class.
a) Object instance b) Attribute
c) Event d) State

P.T.O.
SLR-TX – 375 -2- *SLRTX375*

6) State diagram is a graph whose nodes are __________


a) states b) operations
c) objects d) events
7) Links are implemented as __________ in programming.
a) functions b) data types
c) structures d) pointer
8) Interaction model describes interaction between __________
a) objects b) classes
c) operations d) methods
9) _________ model provides graphic representation of system.
a) Class b) Object
c) State d) Dynamic
10) OO Development is way of __________
a) thinking b) programming
c) designing d) testing
11) A qualified association relates two __________
a) object, classes and qualifier b) a role and qualifier
c) roll names d) object classes
12) An activity is associated with ___________
a) event b) state
c) condition d) transaction
13) I) A state has duration.
II) An event has no duration.
a) only II is true b) only I is true
c) both I and II are true d) both I and II are false
14) Notation used from analysis to implementation are ___________
a) same b) different
c) depends on designer d) depends on depth
_____________________

Set P
*SLRTX375* -3- SLR-TX – 375
Seat
No.

B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Object Oriented Modeling and Design (Elective – II)
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Explain advanced dynamic modelling concepts. 8

3. Draw and explain state diagram for phone call system. 8


OR

What is link ? How it differ from association ?

4. Write notes on (any three) : (4×3=12)


a) DFD
b) Generalization and inheritance
c) Class diagram
d) OMT methodology.

SECTION – II

5. Explain collaboration diagram in detail. 8

6. Explain activity diagram with example. 8


OR
What is meant by component ? Explain its use in OOD.

7. Write notes on (any three) : (4×3=12)


a) Use case diagram
b) Process and thread
c) Pattern categories
d) Interaction diagram.
_____________________

Set P
SLR-TX – 375 -4- *SLRTX375*

Set P
*SLRTX375* SLR-TX – 375
Seat
No.

Set Q
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Object Oriented Modeling and Design (Elective – II)
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) Interaction model describes interaction between __________
a) objects b) classes
c) operations d) methods
2) _________ model provides graphic representation of system.
a) Class b) Object
c) State d) Dynamic
3) OO Development is way of __________
a) thinking b) programming
c) designing d) testing
4) A qualified association relates two __________
a) object, classes and qualifier b) a role and qualifier
c) roll names d) object classes
5) An activity is associated with ___________
a) event b) state
c) condition d) transaction

P.T.O.
SLR-TX – 375 -2- *SLRTX375*

6) I) A state has duration.


II) An event has no duration.
a) only II is true b) only I is true
c) both I and II are true d) both I and II are false
7) Notation used from analysis to implementation are ___________
a) same b) different
c) depends on designer d) depends on depth
8) Which of the following is not a part of DFD ?
a) process b) data flow
c) event d) actor
9) Object’s interact with each other with the help of ___________
a) messages b) role
c) port d) protocol
10) Class model gives __________ structure of project.
a) static b) dynamic
c) static and dynamic d) none of these
11) Which of the following is correct representation ?
a) “stereotype name” b) <stereotype name>
c) <<stereotype name>> d) $stereotype name$
12) __________ is data value held by object in class.
a) Object instance b) Attribute
c) Event d) State
13) State diagram is a graph whose nodes are __________
a) states b) operations
c) objects d) events
14) Links are implemented as __________ in programming.
a) functions b) data types
c) structures d) pointer
_____________________

Set Q
*SLRTX375* -3- SLR-TX – 375
Seat
No.

B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Object Oriented Modeling and Design (Elective – II)
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Explain advanced dynamic modelling concepts. 8

3. Draw and explain state diagram for phone call system. 8


OR

What is link ? How it differ from association ?

4. Write notes on (any three) : (4×3=12)


a) DFD
b) Generalization and inheritance
c) Class diagram
d) OMT methodology.

SECTION – II

5. Explain collaboration diagram in detail. 8

6. Explain activity diagram with example. 8


OR
What is meant by component ? Explain its use in OOD.

7. Write notes on (any three) : (4×3=12)


a) Use case diagram
b) Process and thread
c) Pattern categories
d) Interaction diagram.
_____________________

Set Q
SLR-TX – 375 -4- *SLRTX375*

Set Q
*SLRTX375* SLR-TX – 375
Seat
No.

Set R
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Object Oriented Modeling and Design (Elective – II)
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) __________ is data value held by object in class.
a) Object instance b) Attribute
c) Event d) State
2) State diagram is a graph whose nodes are __________
a) states b) operations
c) objects d) events
3) Links are implemented as __________ in programming.
a) functions b) data types
c) structures d) pointer
4) Interaction model describes interaction between __________
a) objects b) classes
c) operations d) methods
5) _________ model provides graphic representation of system.
a) Class b) Object
c) State d) Dynamic

P.T.O.
SLR-TX – 375 -2- *SLRTX375*

6) OO Development is way of __________


a) thinking b) programming
c) designing d) testing
7) A qualified association relates two __________
a) object, classes and qualifier b) a role and qualifier
c) roll names d) object classes
8) An activity is associated with ___________
a) event b) state
c) condition d) transaction
9) I) A state has duration.
II) An event has no duration.
a) only II is true b) only I is true
c) both I and II are true d) both I and II are false
10) Notation used from analysis to implementation are ___________
a) same b) different
c) depends on designer d) depends on depth
11) Which of the following is not a part of DFD ?
a) process b) data flow
c) event d) actor
12) Object’s interact with each other with the help of ___________
a) messages b) role
c) port d) protocol
13) Class model gives __________ structure of project.
a) static b) dynamic
c) static and dynamic d) none of these
14) Which of the following is correct representation ?
a) “stereotype name” b) <stereotype name>
c) <<stereotype name>> d) $stereotype name$
_____________________

Set R
*SLRTX375* -3- SLR-TX – 375
Seat
No.

B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Object Oriented Modeling and Design (Elective – II)
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Explain advanced dynamic modelling concepts. 8

3. Draw and explain state diagram for phone call system. 8


OR

What is link ? How it differ from association ?

4. Write notes on (any three) : (4×3=12)


a) DFD
b) Generalization and inheritance
c) Class diagram
d) OMT methodology.

SECTION – II

5. Explain collaboration diagram in detail. 8

6. Explain activity diagram with example. 8


OR
What is meant by component ? Explain its use in OOD.

7. Write notes on (any three) : (4×3=12)


a) Use case diagram
b) Process and thread
c) Pattern categories
d) Interaction diagram.
_____________________

Set R
SLR-TX – 375 -4- *SLRTX375*

Set R
*SLRTX375* SLR-TX – 375
Seat
No.

Set S
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Object Oriented Modeling and Design (Elective – II)
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (1×14=14)


1) OO Development is way of __________
a) thinking b) programming
c) designing d) testing
2) A qualified association relates two __________
a) object, classes and qualifier b) a role and qualifier
c) roll names d) object classes
3) An activity is associated with ___________
a) event b) state
c) condition d) transaction
4) I) A state has duration.
II) An event has no duration.
a) only II is true b) only I is true
c) both I and II are true d) both I and II are false
5) Notation used from analysis to implementation are ___________
a) same b) different
c) depends on designer d) depends on depth
P.T.O.
SLR-TX – 375 -2- *SLRTX375*

6) Which of the following is not a part of DFD ?


a) process b) data flow
c) event d) actor
7) Object’s interact with each other with the help of ___________
a) messages b) role
c) port d) protocol
8) Class model gives __________ structure of project.
a) static b) dynamic
c) static and dynamic d) none of these
9) Which of the following is correct representation ?
a) “stereotype name” b) <stereotype name>
c) <<stereotype name>> d) $stereotype name$
10) __________ is data value held by object in class.
a) Object instance b) Attribute
c) Event d) State
11) State diagram is a graph whose nodes are __________
a) states b) operations
c) objects d) events
12) Links are implemented as __________ in programming.
a) functions b) data types
c) structures d) pointer
13) Interaction model describes interaction between __________
a) objects b) classes
c) operations d) methods
14) _________ model provides graphic representation of system.
a) Class b) Object
c) State d) Dynamic
_____________________

Set S
*SLRTX375* -3- SLR-TX – 375
Seat
No.

B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Object Oriented Modeling and Design (Elective – II)
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Explain advanced dynamic modelling concepts. 8

3. Draw and explain state diagram for phone call system. 8


OR

What is link ? How it differ from association ?

4. Write notes on (any three) : (4×3=12)


a) DFD
b) Generalization and inheritance
c) Class diagram
d) OMT methodology.

SECTION – II

5. Explain collaboration diagram in detail. 8

6. Explain activity diagram with example. 8


OR
What is meant by component ? Explain its use in OOD.

7. Write notes on (any three) : (4×3=12)


a) Use case diagram
b) Process and thread
c) Pattern categories
d) Interaction diagram.
_____________________

Set S
SLR-TX – 375 -4- *SLRTX375*

Set S
*SLRTX376* SLR-TX – 376
Seat
Set P
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Wireless Adhoc Network (Elective II)

Day and Date : Saturday, 8-12-2018 , -2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose correct answer : 14


1) The L2CAP protocol header contains
a) Logical Channels identification bits
b) RFCOMM
c) Active bits
d) Control bits
2) ACL is ___________ Unlicensed National Information Infrastructure.
a) Asynchronous contact less b) Asynchronous connection link
c) Asynchronous connection less d) None of these
3) UNII stands for
a) Understanding National Information Infrastructure
b) Undestined Node In Infrastructure
c) Unlicensed Node Information Infrastructure
d) Unlicensed National Information Infrastructure
4) Which of the following is energy saving routing strategy ?
a) Nearest-Neighbor b) Random finding
c) Both d) None
P.T.O.
SLR-TX – 376 -2- *SLRTX376*
5) RF-Layer of Bluetooth is built on a synchronous fast-frequency hopping
paradigm with a symbol rate of 1 Mbps operating in a publically available
___________ ISM band.
a) 2.4 GHz b) 2.4 THz c) 1.5 GHz d) 1.5 THz
6) __________ bit node addressing inside Piconets.
a) 6 b) 5 c) 2 d) 3
7) ___________ is generally refer to any reduction in the strength of a signal.
a) Attenuation b) AWGN c) Fading d) None
8) In ________ model, error free transmission is provided if the distance is
suitably lower than the distance from the destination node to any other node
in network.
a) Physical b) Protocol c) RBS d) None
9) In __________, tentative multi-hop route from source to destination is
created.
a) RBS b) DP c) ONRBS d) None
10) The mobility status of a node can be described in terms of its
a) Mobility direction b) Speed
c) Range d) None
11) The regulatory body in charge of the national radio frequency resources is the
a) Frequency Committee of Communication
b) Federal Communications Commission
c) Federal Committee of Communication
d) Frequency Communication Commission
12) Distance between two neighboring nodes of regular grid topology is
a) spatial density b) dlink c) theta d) none of these
13) SDP stands for
a) Service Datagram Protocol b) Standard Discovery Protocol
c) Standard Datagram Protocol d) Service Discovery Protocol
14) Link communication model in Adhoc Wireless scenario without INI is defined
as
a) r(t) = f(t) + s(a) + wthermal + wint(t) b) r(t) = f(t) s(a) + wthermal
c) r(t) = f(t) s(a) + wthermal + wint(t) d) r(t) = f(t) + s(a) + wthermal
____________
Set P

*SLRTX376* -3- SLR-TX – 376
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Wireless Adhoc Network (Elective II)

Day and Date : Saturday, 8-12-2018, -2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.
Instructions : 1) All questions are compulsory.
2) Figures to the right indicate full marks.
SECTION – I
2. Attempt any three questions : 12
1) What is Fading ? Explain its types with neat diagram.
2) Define Quasi-Regular Topology with neat diagram.
3) Explain Reactive and Proactive protocol in detail.
4) Write a short note on MAC protocols.
3. Attempt any two questions: 16
1) Explain in detail definitions of Quasi Regular topology with neat diagram.
2) Draw and explain Link communication model in Adhoc wireless scenario
with INI and without INI. Also derive an expression for them.
3) Explain with neat diagram Bluetooth Technological Design.
SECTION – II
4. Attempt any three questions : 12
1) Write a short note on Two-Dimensional Poisson Topology.
2) Derive the equation for average sustainable number of hops for Transport
Capacity.
3) List out five assumptions of Transport Capacity in Adhoc Wireless Network.
4) Explain ONRBS and RBS switching model in details.
5. Attempt any two questions : 16
1) What are the switching schemes in Route Reservation ? Explain any one
of them in details.
2) Explain performance matrix in Transmission power for Adhoc wireless
network.
3) Explain Aggregate Effective transport capacity with ideal and realistic
scenario.
___________________ Set P
Set P
*SLRTX376* SLR-TX – 376
Seat
Set Q
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Wireless Adhoc Network (Elective II)

Day and Date : Saturday, 8-12-2018 , -2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose correct answer : 14


1) In ________ model, error free transmission is provided if the distance is
suitably lower than the distance from the destination node to any other node
in network.
a) Physical b) Protocol c) RBS d) None
2) In __________, tentative multi-hop route from source to destination is
created.
a) RBS b) DP c) ONRBS d) None
3) The mobility status of a node can be described in terms of its
a) Mobility direction b) Speed
c) Range d) None
4) The regulatory body in charge of the national radio frequency resources is the
a) Frequency Committee of Communication
b) Federal Communications Commission
c) Federal Committee of Communication
d) Frequency Communication Commission
P.T.O.
SLR-TX – 376 -2- *SLRTX376*
5) Distance between two neighboring nodes of regular grid topology is
a) spatial density b) dlink c) theta d) none of these
6) SDP stands for
a) Service Datagram Protocol b) Standard Discovery Protocol
c) Standard Datagram Protocol d) Service Discovery Protocol
7) Link communication model in Adhoc Wireless scenario without INI is defined
as
a) r(t) = f(t) + s(a) + wthermal + wint(t) b) r(t) = f(t) s(a) + wthermal
c) r(t) = f(t) s(a) + wthermal + wint(t) d) r(t) = f(t) + s(a) + wthermal
8) The L2CAP protocol header contains
a) Logical Channels identification bits
b) RFCOMM
c) Active bits
d) Control bits
9) ACL is ___________ Unlicensed National Information Infrastructure.
a) Asynchronous contact less b) Asynchronous connection link
c) Asynchronous connection less d) None of these
10) UNII stands for
a) Understanding National Information Infrastructure
b) Undestined Node In Infrastructure
c) Unlicensed Node Information Infrastructure
d) Unlicensed National Information Infrastructure
11) Which of the following is energy saving routing strategy ?
a) Nearest-Neighbor b) Random finding
c) Both d) None
12) RF-Layer of Bluetooth is built on a synchronous fast-frequency hopping
paradigm with a symbol rate of 1 Mbps operating in a publically available
___________ ISM band.
a) 2.4 GHz b) 2.4 THz c) 1.5 GHz d) 1.5 THz
13) __________ bit node addressing inside Piconets.
a) 6 b) 5 c) 2 d) 3
14) ___________ is generally refer to any reduction in the strength of a signal.
a) Attenuation b) AWGN c) Fading d) None
____________
Set Q

*SLRTX376* -3- SLR-TX – 376
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Wireless Adhoc Network (Elective II)

Day and Date : Saturday, 8-12-2018, -2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.
Instructions : 1) All questions are compulsory.
2) Figures to the right indicate full marks.
SECTION – I
2. Attempt any three questions : 12
1) What is Fading ? Explain its types with neat diagram.
2) Define Quasi-Regular Topology with neat diagram.
3) Explain Reactive and Proactive protocol in detail.
4) Write a short note on MAC protocols.
3. Attempt any two questions: 16
1) Explain in detail definitions of Quasi Regular topology with neat diagram.
2) Draw and explain Link communication model in Adhoc wireless scenario
with INI and without INI. Also derive an expression for them.
3) Explain with neat diagram Bluetooth Technological Design.
SECTION – II
4. Attempt any three questions : 12
1) Write a short note on Two-Dimensional Poisson Topology.
2) Derive the equation for average sustainable number of hops for Transport
Capacity.
3) List out five assumptions of Transport Capacity in Adhoc Wireless Network.
4) Explain ONRBS and RBS switching model in details.
5. Attempt any two questions : 16
1) What are the switching schemes in Route Reservation ? Explain any one
of them in details.
2) Explain performance matrix in Transmission power for Adhoc wireless
network.
3) Explain Aggregate Effective transport capacity with ideal and realistic
scenario.
___________________ Set Q
Set Q
*SLRTX376* SLR-TX – 376
Seat
Set R
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Wireless Adhoc Network (Elective II)

Day and Date : Saturday, 8-12-2018 , -2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose correct answer : 14


1) RF-Layer of Bluetooth is built on a synchronous fast-frequency hopping
paradigm with a symbol rate of 1 Mbps operating in a publically available
___________ ISM band.
a) 2.4 GHz b) 2.4 THz c) 1.5 GHz d) 1.5 THz
2) __________ bit node addressing inside Piconets.
a) 6 b) 5 c) 2 d) 3
3) ___________ is generally refer to any reduction in the strength of a signal.
a) Attenuation b) AWGN c) Fading d) None
4) In ________ model, error free transmission is provided if the distance is
suitably lower than the distance from the destination node to any other node
in network.
a) Physical b) Protocol c) RBS d) None
5) In __________, tentative multi-hop route from source to destination is
created.
a) RBS b) DP c) ONRBS d) None
P.T.O.
SLR-TX – 376 -2- *SLRTX376*
6) The mobility status of a node can be described in terms of its
a) Mobility direction b) Speed
c) Range d) None
7) The regulatory body in charge of the national radio frequency resources is the
a) Frequency Committee of Communication
b) Federal Communications Commission
c) Federal Committee of Communication
d) Frequency Communication Commission
8) Distance between two neighboring nodes of regular grid topology is
a) spatial density b) dlink c) theta d) none of these
9) SDP stands for
a) Service Datagram Protocol b) Standard Discovery Protocol
c) Standard Datagram Protocol d) Service Discovery Protocol
10) Link communication model in Adhoc Wireless scenario without INI is defined
as
a) r(t) = f(t) + s(a) + wthermal + wint(t) b) r(t) = f(t) s(a) + wthermal
c) r(t) = f(t) s(a) + wthermal + wint(t) d) r(t) = f(t) + s(a) + wthermal
11) The L2CAP protocol header contains
a) Logical Channels identification bits
b) RFCOMM
c) Active bits
d) Control bits
12) ACL is ___________ Unlicensed National Information Infrastructure.
a) Asynchronous contact less b) Asynchronous connection link
c) Asynchronous connection less d) None of these
13) UNII stands for
a) Understanding National Information Infrastructure
b) Undestined Node In Infrastructure
c) Unlicensed Node Information Infrastructure
d) Unlicensed National Information Infrastructure
14) Which of the following is energy saving routing strategy ?
a) Nearest-Neighbor b) Random finding
c) Both d) None
____________ Set R

*SLRTX376* -3- SLR-TX – 376
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Wireless Adhoc Network (Elective II)

Day and Date : Saturday, 8-12-2018, -2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.
Instructions : 1) All questions are compulsory.
2) Figures to the right indicate full marks.
SECTION – I
2. Attempt any three questions : 12
1) What is Fading ? Explain its types with neat diagram.
2) Define Quasi-Regular Topology with neat diagram.
3) Explain Reactive and Proactive protocol in detail.
4) Write a short note on MAC protocols.
3. Attempt any two questions: 16
1) Explain in detail definitions of Quasi Regular topology with neat diagram.
2) Draw and explain Link communication model in Adhoc wireless scenario
with INI and without INI. Also derive an expression for them.
3) Explain with neat diagram Bluetooth Technological Design.
SECTION – II
4. Attempt any three questions : 12
1) Write a short note on Two-Dimensional Poisson Topology.
2) Derive the equation for average sustainable number of hops for Transport
Capacity.
3) List out five assumptions of Transport Capacity in Adhoc Wireless Network.
4) Explain ONRBS and RBS switching model in details.
5. Attempt any two questions : 16
1) What are the switching schemes in Route Reservation ? Explain any one
of them in details.
2) Explain performance matrix in Transmission power for Adhoc wireless
network.
3) Explain Aggregate Effective transport capacity with ideal and realistic
scenario.
___________________ Set R
Set R
*SLRTX376* SLR-TX – 376
Seat
Set S
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Wireless Adhoc Network (Elective II)

Day and Date : Saturday, 8-12-2018 , -2018 Max. Marks : 70


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) Figures to the right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose correct answer : 14


1) The mobility status of a node can be described in terms of its
a) Mobility direction b) Speed
c) Range d) None
2) The regulatory body in charge of the national radio frequency resources is the
a) Frequency Committee of Communication
b) Federal Communications Commission
c) Federal Committee of Communication
d) Frequency Communication Commission
3) Distance between two neighboring nodes of regular grid topology is
a) spatial density b) dlink c) theta d) none of these
4) SDP stands for
a) Service Datagram Protocol b) Standard Discovery Protocol
c) Standard Datagram Protocol d) Service Discovery Protocol
P.T.O.
SLR-TX – 376 -2- *SLRTX376*
5) Link communication model in Adhoc Wireless scenario without INI is defined
as
a) r(t) = f(t) + s(a) + wthermal + wint(t) b) r(t) = f(t) s(a) + wthermal
c) r(t) = f(t) s(a) + wthermal + wint(t) d) r(t) = f(t) + s(a) + wthermal

6) The L2CAP protocol header contains


a) Logical Channels identification bits
b) RFCOMM
c) Active bits
d) Control bits
7) ACL is ___________ Unlicensed National Information Infrastructure.
a) Asynchronous contact less b) Asynchronous connection link
c) Asynchronous connection less d) None of these
8) UNII stands for
a) Understanding National Information Infrastructure
b) Undestined Node In Infrastructure
c) Unlicensed Node Information Infrastructure
d) Unlicensed National Information Infrastructure
9) Which of the following is energy saving routing strategy ?
a) Nearest-Neighbor b) Random finding
c) Both d) None
10) RF-Layer of Bluetooth is built on a synchronous fast-frequency hopping
paradigm with a symbol rate of 1 Mbps operating in a publically available
___________ ISM band.
a) 2.4 GHz b) 2.4 THz c) 1.5 GHz d) 1.5 THz
11) __________ bit node addressing inside Piconets.
a) 6 b) 5 c) 2 d) 3
12) ___________ is generally refer to any reduction in the strength of a signal.
a) Attenuation b) AWGN c) Fading d) None
13) In ________ model, error free transmission is provided if the distance is
suitably lower than the distance from the destination node to any other node
in network.
a) Physical b) Protocol c) RBS d) None
14) In __________, tentative multi-hop route from source to destination is
created.
a) RBS b) DP c) ONRBS d) None
____________ Set S
*SLRTX376* -3- SLR-TX – 376
Seat
No.
B.E. (CSE) (Part – I) (CGPA) Examination, 2018
Wireless Adhoc Network (Elective II)

Day and Date : Saturday, 8-12-2018, -2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m..00 .m. to .00 .m.
Instructions : 1) All questions are compulsory.
2) Figures to the right indicate full marks.
SECTION – I
2. Attempt any three questions : 12
1) What is Fading ? Explain its types with neat diagram.
2) Define Quasi-Regular Topology with neat diagram.
3) Explain Reactive and Proactive protocol in detail.
4) Write a short note on MAC protocols.
3. Attempt any two questions: 16
1) Explain in detail definitions of Quasi Regular topology with neat diagram.
2) Draw and explain Link communication model in Adhoc wireless scenario
with INI and without INI. Also derive an expression for them.
3) Explain with neat diagram Bluetooth Technological Design.
SECTION – II
4. Attempt any three questions : 12
1) Write a short note on Two-Dimensional Poisson Topology.
2) Derive the equation for average sustainable number of hops for Transport
Capacity.
3) List out five assumptions of Transport Capacity in Adhoc Wireless Network.
4) Explain ONRBS and RBS switching model in details.
5. Attempt any two questions : 16
1) What are the switching schemes in Route Reservation ? Explain any one
of them in details.
2) Explain performance matrix in Transmission power for Adhoc wireless
network.
3) Explain Aggregate Effective transport capacity with ideal and realistic
scenario.
___________________ Set S
Set S
*SLRTX377* SLR-TX – 377
Seat
No.
Set P
B.E. (Computer Science & Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – II : intelligent systems
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
N.B. : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes
in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) What were the two main streams of research that led to the evolution and development
of the concept of Decision Support Systems ?
A) Theoretical studies of organizational decision making and technical work on interactive
computer systems
B) Theoretical studies of organizational behaviour and technical work on relational data
bases
C) Empirical studies of graphical displays and technical work on artificial intelligence
D) None of these
2) What should be a major characteristic of a DSS ?
A) Automates decision making
B) Includes a spreadsheet model
C) Responds quickly to the changing needs of decision makers
D) None of these
3) In which of Steven Alter’s categories of DSS would you place data warehouses ?
A) Analysis Information systems B) Accounting and financial models
C) Data analysis systems D) None of these
4) What would one conclude after visiting DSS-related sites on the World-Wide Web ?
A) There is limited support for DSS researchers and practitioners on the World-Wide
Web
B) The Web is where the DSS research and development action is occurring
C) The quality and value of DSS-related Web sites is outstanding
D) None of these
5) What is a data warehouse ?
A) A database application that searches for hidden patterns in a data base
B) A database designed to support decision making in organizations. It is batch updated
and structured for rapid on -line queries and managerial summaries
C) An interactive computer based system which helps decision makers utilize data and
models to identify and solve problems and make decisions
D) None of these
P.T.O.
SLR-TX – 377 -2- *SLRTX377*
6) What general type of DSS would include file drawer sytems, data warehouses, On-line
Analytical Processing (OLAP) systems, and executive information systems ?
A) Communications-Driven DSS B) Data-Driven DSS
C) Document-Driven DSS D) None of these
7) What type of computerized system recordes current information and emphasizes data
integrity and consistency ?
A) Data Analysis System B) File Drawer System
C) Transaction Processing System D) None of these
8) What is the most important component of a Decision Support System ?
A) Architecture and network design B) Database
C) User interface D) None of these
9) Which of the following web sites provides organized information on a wide variety of
Decision Support Systems topics ?
A) http://DSSRResources.COM B) http://www.usatoday.com
C) http://www.zoogdisney.com D) http://www.hotmail.com
10) What category of software technology enables analysts, managers and executives to
gain insight into data through fast, consistent, interactive access to a wide variety of
possible views of information that has been transformed from raw data to reflect the real
dimensionality of the enterprise as understood by the user.
A) Data Warehouse software
B) On-line Analytical Processing (OLAP) software
C) On-line Transaction Processing (OLTP) software
D) None of these
11) Which of the following level of managers develop short- and medium- range plans,
schedules, and budgets and specify the policies, procedures, and business objectives
for their sub-units of the company ?
A) Strategic B) Tactical C) Operational D) None of these
12) Information that is outdated, inaccurate, or hard to understand would be very meaningful,
useful or valuable to you or other business professionals.
A) True B) False
13) Information has three dimensions. There are
A) Time, consent and form B) Time, content and form
C) Cost, content and form D) None of these
14) The growth of corporate intranets, extranets, as well as the web, has accelerated the
development and use of “executive class” information delivery and decision support
software tools by lower levels of management and by individuals and teams of business
professionals. This dramatic expansion has opened the door to the use of which of the
following tool ?
A) Business Intelligence (BI) B) Business Knowledge (BK)
C) Business Ideas (BI) D) None of these
_________________

Set P
*SLRTX377* -3- SLR-TX – 377
Seat
No.

B.E. (Computer Science & Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – II : intelligent systems

Day and Date : Saturday, 8-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×2=8)

a) What are Expert Systems ?

b) What is a DSS ?

c) What is DSS development ?

d) List the phases of decision making probes.

e) What are ANN’s ?

3. Attempt any two : (2×5=10)

a) List characteristics and capabilities of DSS.

b) Illustrate the DSS development.

c) How does a KBMS work ?

4. Attempt any one : 10

a) What is prototyping ? State the steps involved.

b) What are the components of a DSS ? Illustrate each.

Set P
SLR-TX – 377 -4- *SLRTX377*

SECTION – II

5. Attempt any four : (4×2=8)

a) What is a Group decision making ?


b) What is an Executive IS ?
c) Compare between ERP and SCM.
d) What is Knowledge management ?
e) What is the role of people in KM ?

6. Attempt any two : (2×5=10)

a) What is the impact of MSS ?

b) What are the approaches to knowledge management ?

c) How is success ensured in management ?

7. Attempt any one : 10


a) State characteristics of MRP, ERP and SCM.
b) State the impact of MSS.

_____________________

Set P
*SLRTX377* SLR-TX – 377
Seat
No.
Set Q
B.E. (Computer Science & Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – II : intelligent systems
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
N.B. : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes
in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) What is the most important component of a Decision Support System ?
A) Architecture and network design B) Database
C) User interface D) None of these
2) Which of the following web sites provides organized information on a wide variety of
Decision Support Systems topics ?
A) http://DSSRResources.COM B) http://www.usatoday.com
C) http://www.zoogdisney.com D) http://www.hotmail.com
3) What category of software technology enables analysts, managers and executives to
gain insight into data through fast, consistent, interactive access to a wide variety of
possible views of information that has been transformed from raw data to reflect the real
dimensionality of the enterprise as understood by the user.
A) Data Warehouse software
B) On-line Analytical Processing (OLAP) software
C) On-line Transaction Processing (OLTP) software
D) None of these
4) Which of the following level of managers develop short- and medium- range plans,
schedules, and budgets and specify the policies, procedures, and business objectives
for their sub-units of the company ?
A) Strategic B) Tactical C) Operational D) None of these
5) Information that is outdated, inaccurate, or hard to understand would be very meaningful,
useful or valuable to you or other business professionals.
A) True B) False
6) Information has three dimensions. There are
A) Time, consent and form B) Time, content and form
C) Cost, content and form D) None of these

P.T.O.
SLR-TX – 377 -2- *SLRTX377*
7) The growth of corporate intranets, extranets, as well as the web, has accelerated the
development and use of “executive class” information delivery and decision support
software tools by lower levels of management and by individuals and teams of business
professionals. This dramatic expansion has opened the door to the use of which of the
following tool ?
A) Business Intelligence (BI) B) Business Knowledge (BK)
C) Business Ideas (BI) D) None of these
8) What were the two main streams of research that led to the evolution and development
of the concept of Decision Support Systems ?
A) Theoretical studies of organizational decision making and technical work on interactive
computer systems
B) Theoretical studies of organizational behaviour and technical work on relational data
bases
C) Empirical studies of graphical displays and technical work on artificial intelligence
D) None of these
9) What should be a major characteristic of a DSS ?
A) Automates decision making
B) Includes a spreadsheet model
C) Responds quickly to the changing needs of decision makers
D) None of these
10) In which of Steven Alter’s categories of DSS would you place data warehouses ?
A) Analysis Information systems B) Accounting and financial models
C) Data analysis systems D) None of these
11) What would one conclude after visiting DSS-related sites on the World-Wide Web ?
A) There is limited support for DSS researchers and practitioners on the World-Wide
Web
B) The Web is where the DSS research and development action is occurring
C) The quality and value of DSS-related Web sites is outstanding
D) None of these
12) What is a data warehouse ?
A) A database application that searches for hidden patterns in a data base
B) A database designed to support decision making in organizations. It is batch updated
and structured for rapid on -line queries and managerial summaries
C) An interactive computer based system which helps decision makers utilize data and
models to identify and solve problems and make decisions
D) None of these
13) What general type of DSS would include file drawer sytems, data warehouses, On-line
Analytical Processing (OLAP) systems, and executive information systems ?
A) Communications-Driven DSS B) Data-Driven DSS
C) Document-Driven DSS D) None of these
14) What type of computerized system recordes current information and emphasizes data
integrity and consistency ?
A) Data Analysis System B) File Drawer System
C) Transaction Processing System D) None of these
_________________
Set Q
*SLRTX377* -3- SLR-TX – 377
Seat
No.

B.E. (Computer Science & Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – II : intelligent systems

Day and Date : Saturday, 8-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×2=8)

a) What are Expert Systems ?

b) What is a DSS ?

c) What is DSS development ?

d) List the phases of decision making probes.

e) What are ANN’s ?

3. Attempt any two : (2×5=10)

a) List characteristics and capabilities of DSS.

b) Illustrate the DSS development.

c) How does a KBMS work ?

4. Attempt any one : 10

a) What is prototyping ? State the steps involved.

b) What are the components of a DSS ? Illustrate each.

Set Q
SLR-TX – 377 -4- *SLRTX377*

SECTION – II

5. Attempt any four : (4×2=8)

a) What is a Group decision making ?


b) What is an Executive IS ?
c) Compare between ERP and SCM.
d) What is Knowledge management ?
e) What is the role of people in KM ?

6. Attempt any two : (2×5=10)

a) What is the impact of MSS ?

b) What are the approaches to knowledge management ?

c) How is success ensured in management ?

7. Attempt any one : 10


a) State characteristics of MRP, ERP and SCM.
b) State the impact of MSS.

_____________________

Set Q
*SLRTX377* SLR-TX – 377
Seat
No.
Set R
B.E. (Computer Science & Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – II : intelligent systems
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
N.B. : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes
in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) What is a data warehouse ?
A) A database application that searches for hidden patterns in a data base
B) A database designed to support decision making in organizations. It is batch updated
and structured for rapid on -line queries and managerial summaries
C) An interactive computer based system which helps decision makers utilize data and
models to identify and solve problems and make decisions
D) None of these
2) What general type of DSS would include file drawer sytems, data warehouses, On-line
Analytical Processing (OLAP) systems, and executive information systems ?
A) Communications-Driven DSS B) Data-Driven DSS
C) Document-Driven DSS D) None of these
3) What type of computerized system recordes current information and emphasizes data
integrity and consistency ?
A) Data Analysis System B) File Drawer System
C) Transaction Processing System D) None of these
4) What is the most important component of a Decision Support System ?
A) Architecture and network design B) Database
C) User interface D) None of these
5) Which of the following web sites provides organized information on a wide variety of
Decision Support Systems topics ?
A) http://DSSRResources.COM B) http://www.usatoday.com
C) http://www.zoogdisney.com D) http://www.hotmail.com

P.T.O.
SLR-TX – 377 -2- *SLRTX377*
6) What category of software technology enables analysts, managers and executives to
gain insight into data through fast, consistent, interactive access to a wide variety of
possible views of information that has been transformed from raw data to reflect the real
dimensionality of the enterprise as understood by the user.
A) Data Warehouse software
B) On-line Analytical Processing (OLAP) software
C) On-line Transaction Processing (OLTP) software
D) None of these
7) Which of the following level of managers develop short- and medium- range plans,
schedules, and budgets and specify the policies, procedures, and business objectives
for their sub-units of the company ?
A) Strategic B) Tactical C) Operational D) None of these
8) Information that is outdated, inaccurate, or hard to understand would be very meaningful,
useful or valuable to you or other business professionals.
A) True B) False
9) Information has three dimensions. There are
A) Time, consent and form B) Time, content and form
C) Cost, content and form D) None of these
10) The growth of corporate intranets, extranets, as well as the web, has accelerated the
development and use of “executive class” information delivery and decision support
software tools by lower levels of management and by individuals and teams of business
professionals. This dramatic expansion has opened the door to the use of which of the
following tool ?
A) Business Intelligence (BI) B) Business Knowledge (BK)
C) Business Ideas (BI) D) None of these
11) What were the two main streams of research that led to the evolution and development
of the concept of Decision Support Systems ?
A) Theoretical studies of organizational decision making and technical work on interactive
computer systems
B) Theoretical studies of organizational behaviour and technical work on relational data
bases
C) Empirical studies of graphical displays and technical work on artificial intelligence
D) None of these
12) What should be a major characteristic of a DSS ?
A) Automates decision making
B) Includes a spreadsheet model
C) Responds quickly to the changing needs of decision makers
D) None of these
13) In which of Steven Alter’s categories of DSS would you place data warehouses ?
A) Analysis Information systems B) Accounting and financial models
C) Data analysis systems D) None of these
14) What would one conclude after visiting DSS-related sites on the World-Wide Web ?
A) There is limited support for DSS researchers and practitioners on the World-Wide
Web
B) The Web is where the DSS research and development action is occurring
C) The quality and value of DSS-related Web sites is outstanding
D) None of these
_________________
Set R
*SLRTX377* -3- SLR-TX – 377
Seat
No.

B.E. (Computer Science & Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – II : intelligent systems

Day and Date : Saturday, 8-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×2=8)

a) What are Expert Systems ?

b) What is a DSS ?

c) What is DSS development ?

d) List the phases of decision making probes.

e) What are ANN’s ?

3. Attempt any two : (2×5=10)

a) List characteristics and capabilities of DSS.

b) Illustrate the DSS development.

c) How does a KBMS work ?

4. Attempt any one : 10

a) What is prototyping ? State the steps involved.

b) What are the components of a DSS ? Illustrate each.

Set R
SLR-TX – 377 -4- *SLRTX377*

SECTION – II

5. Attempt any four : (4×2=8)

a) What is a Group decision making ?


b) What is an Executive IS ?
c) Compare between ERP and SCM.
d) What is Knowledge management ?
e) What is the role of people in KM ?

6. Attempt any two : (2×5=10)

a) What is the impact of MSS ?

b) What are the approaches to knowledge management ?

c) How is success ensured in management ?

7. Attempt any one : 10


a) State characteristics of MRP, ERP and SCM.
b) State the impact of MSS.

_____________________

Set R
*SLRTX377* SLR-TX – 377
Seat
No.
Set S
B.E. (Computer Science & Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – II : intelligent systems
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
N.B. : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes
in Answer Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) What category of software technology enables analysts, managers and executives to
gain insight into data through fast, consistent, interactive access to a wide variety of
possible views of information that has been transformed from raw data to reflect the real
dimensionality of the enterprise as understood by the user.
A) Data Warehouse software
B) On-line Analytical Processing (OLAP) software
C) On-line Transaction Processing (OLTP) software
D) None of these
2) Which of the following level of managers develop short- and medium- range plans,
schedules, and budgets and specify the policies, procedures, and business objectives
for their sub-units of the company ?
A) Strategic B) Tactical C) Operational D) None of these
3) Information that is outdated, inaccurate, or hard to understand would be very meaningful,
useful or valuable to you or other business professionals.
A) True B) False
4) Information has three dimensions. There are
A) Time, consent and form B) Time, content and form
C) Cost, content and form D) None of these
5) The growth of corporate intranets, extranets, as well as the web, has accelerated the
development and use of “executive class” information delivery and decision support
software tools by lower levels of management and by individuals and teams of business
professionals. This dramatic expansion has opened the door to the use of which of the
following tool ?
A) Business Intelligence (BI) B) Business Knowledge (BK)
C) Business Ideas (BI) D) None of these P.T.O.
SLR-TX – 377 -2- *SLRTX377*
6) What were the two main streams of research that led to the evolution and development
of the concept of Decision Support Systems ?
A) Theoretical studies of organizational decision making and technical work on interactive
computer systems
B) Theoretical studies of organizational behaviour and technical work on relational data
bases
C) Empirical studies of graphical displays and technical work on artificial intelligence
D) None of these
7) What should be a major characteristic of a DSS ?
A) Automates decision making
B) Includes a spreadsheet model
C) Responds quickly to the changing needs of decision makers
D) None of these
8) In which of Steven Alter’s categories of DSS would you place data warehouses ?
A) Analysis Information systems B) Accounting and financial models
C) Data analysis systems D) None of these
9) What would one conclude after visiting DSS-related sites on the World-Wide Web ?
A) There is limited support for DSS researchers and practitioners on the World-Wide
Web
B) The Web is where the DSS research and development action is occurring
C) The quality and value of DSS-related Web sites is outstanding
D) None of these
10) What is a data warehouse ?
A) A database application that searches for hidden patterns in a data base
B) A database designed to support decision making in organizations. It is batch updated
and structured for rapid on -line queries and managerial summaries
C) An interactive computer based system which helps decision makers utilize data and
models to identify and solve problems and make decisions
D) None of these
11) What general type of DSS would include file drawer sytems, data warehouses, On-line
Analytical Processing (OLAP) systems, and executive information systems ?
A) Communications-Driven DSS B) Data-Driven DSS
C) Document-Driven DSS D) None of these
12) What type of computerized system recordes current information and emphasizes data
integrity and consistency ?
A) Data Analysis System B) File Drawer System
C) Transaction Processing System D) None of these
13) What is the most important component of a Decision Support System ?
A) Architecture and network design B) Database
C) User interface D) None of these
14) Which of the following web sites provides organized information on a wide variety of
Decision Support Systems topics ?
A) http://DSSRResources.COM B) http://www.usatoday.com
C) http://www.zoogdisney.com D) http://www.hotmail.com

_________________ Set S
*SLRTX377* -3- SLR-TX – 377
Seat
No.

B.E. (Computer Science & Engineering) (Part – I) (CGPA)
Examination, 2018
Elective – II : intelligent systems

Day and Date : Saturday, 8-12-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.


2) Figures to the right indicate full marks.

SECTION – I

2. Attempt any four : (4×2=8)

a) What are Expert Systems ?

b) What is a DSS ?

c) What is DSS development ?

d) List the phases of decision making probes.

e) What are ANN’s ?

3. Attempt any two : (2×5=10)

a) List characteristics and capabilities of DSS.

b) Illustrate the DSS development.

c) How does a KBMS work ?

4. Attempt any one : 10

a) What is prototyping ? State the steps involved.

b) What are the components of a DSS ? Illustrate each.

Set S
SLR-TX – 377 -4- *SLRTX377*

SECTION – II

5. Attempt any four : (4×2=8)

a) What is a Group decision making ?


b) What is an Executive IS ?
c) Compare between ERP and SCM.
d) What is Knowledge management ?
e) What is the role of people in KM ?

6. Attempt any two : (2×5=10)

a) What is the impact of MSS ?

b) What are the approaches to knowledge management ?

c) How is success ensured in management ?

7. Attempt any one : 10


a) State characteristics of MRP, ERP and SCM.
b) State the impact of MSS.

_____________________

Set S
*SLRTX378* SLR-TX – 378

Seat
No. Set P
B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
mobile application development (Elective – II)
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
N. B. : 1) All questions are compulsory.
2) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
3) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct option : 14


1) Parent class of Service
a) Object b) Context
c) Context wrapper d) Context Theme Wrapper
2) When content provider would be activated ?
a) Using Intent b) Using SQLite
c) Using Content Resolver d) None of the above
3) What are the Direct subclasses of Activity ?
a) Account Authenticator Activity b) Activity Group
c) Expandable List Activity d) All of the above
4) Which are the screen sizes in Android ?
a) Small b) Normal
c) Large d) All of the above
5) You can shut down an activity by calling its _________ method.
a) onDestory() b) finishActivity()
c) finish() d) none of the above

P.T.O.
SLR-TX – 378 -2- *SLRTX378*

6) If you want share the data accross the all applications, you should go for ?
a) Shared Preferences b) Internal Storage
c) SQLite Databases d) Content provider
7) What is the name of the folder that contains the mp3 music file ?
a) raw b) res c) drawable d) layout
8) Permission needed to access location using gps are
a) ACCESS_FINE_LOCATION b) ACCESS_COARSE_LOCATION
c) Both a) and b) d) None
9) _________ property in xml file decide transparency of the drawable object
in view animation.
a) FromXScale, toXScale b) FromAlpha, toAlpha
c) FromDegrees, toDegrees d) None
10) ________ element in XML is used to indicate multiple animation effect has
to be applied for view object in view animation.
a) raw b) collection c) set d) none
11) _________ permission is needed create files on sd card.
a) UPDATE_EXTERNAL_STORAGE
b) WRITE_EXTERNAL_STORAGE
c) MODIFY_EXTERNAL_STORAGE
d) None
12) _________ method in Cursor returns number of rows in selection query
result set.
a) getColumnCount b) getCount
c) getRowCount d) None
13) Shared preference entry can be deleted by _________ method.
a) remove and commit b) delete and commit
c) remove d) delete
14) ________ is valid sqlite statement to delete entry in sqlite database table.
Tablename : student columns : {studentname, rollno, percentage)
SqliteDatabase db=helper.getWritable();//assume helper is object of class
extended from SqliteOpenHelper
a) db.delete(“student”,“rollno=l”,null);
b) db.execSQL(“delete from student where rollno=1”);
c) both a) and b)
d) none
______________

Set P
*SLRTX378* -3- SLR-TX – 378
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
mobile application development (Elective – II)
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
N. B. : All questions are compulsory.

SECTION – I
2. Attempt any three : (3×4=12)
a) Define mobile native platforms with example.
b) Elaborate Local and Remote binding concepts of Services.
c) Outline the process of Intent resolution.
d) Define Layouts with example.
3. Attempt any one : (1×8=8)
a) Illustrate Activity Lifecycle states and respective callback methods.
b) Describe various logical components of an Android App with proper
example.
4. Elaborate the procedure with pseudo code to navigate between Activities and
exchange data between them. (1×8=8)
SECTION – II
5. Attempt any three : (3×4=12)
a) Write a note on Cursor and Content value classes.
b) Explain black box testing.
c) Explain frame animation.
d) What is LBS ? Explain cell triangulation method.
6. Attempt any one : (1×8=8)
a) Explain steps to upload signed app on playstore.
b) Explain types of sensor along with steps to access accelerometer.
7. Explain shared preference in detail. Write code for function to add data and
remove data in shared preference file. (1×8=8)
____________
Set P
Set P
*SLRTX378* SLR-TX – 378

Seat
No. Set Q
B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
mobile application development (Elective – II)
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
N. B. : 1) All questions are compulsory.
2) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
3) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct option : 14


1) Permission needed to access location using gps are
a) ACCESS_FINE_LOCATION b) ACCESS_COARSE_LOCATION
c) Both a) and b) d) None
2) _________ property in xml file decide transparency of the drawable object
in view animation.
a) FromXScale, toXScale b) FromAlpha, toAlpha
c) FromDegrees, toDegrees d) None
3) ________ element in XML is used to indicate multiple animation effect has
to be applied for view object in view animation.
a) raw b) collection c) set d) none
4) _________ permission is needed create files on sd card.
a) UPDATE_EXTERNAL_STORAGE
b) WRITE_EXTERNAL_STORAGE
c) MODIFY_EXTERNAL_STORAGE
d) None
5) _________ method in Cursor returns number of rows in selection query
result set.
a) getColumnCount b) getCount
c) getRowCount d) None
P.T.O.
SLR-TX – 378 -2- *SLRTX378*

6) Shared preference entry can be deleted by _________ method.


a) remove and commit b) delete and commit
c) remove d) delete
7) ________ is valid sqlite statement to delete entry in sqlite database table.
Tablename : student columns : {studentname, rollno, percentage)
SqliteDatabase db=helper.getWritable();//assume helper is object of class
extended from SqliteOpenHelper
a) db.delete(“student”,“rollno=l”,null);
b) db.execSQL(“delete from student where rollno=1”);
c) both a) and b)
d) none
8) Parent class of Service
a) Object b) Context
c) Context wrapper d) Context Theme Wrapper
9) When content provider would be activated ?
a) Using Intent b) Using SQLite
c) Using Content Resolver d) None of the above
10) What are the Direct subclasses of Activity ?
a) Account Authenticator Activity b) Activity Group
c) Expandable List Activity d) All of the above
11) Which are the screen sizes in Android ?
a) Small b) Normal
c) Large d) All of the above
12) You can shut down an activity by calling its _________ method.
a) onDestory() b) finishActivity()
c) finish() d) none of the above
13) If you want share the data accross the all applications, you should go for ?
a) Shared Preferences b) Internal Storage
c) SQLite Databases d) Content provider
14) What is the name of the folder that contains the mp3 music file ?
a) raw b) res c) drawable d) layout
______________
Set Q
*SLRTX378* -3- SLR-TX – 378
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
mobile application development (Elective – II)
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
N. B. : All questions are compulsory.

SECTION – I
2. Attempt any three : (3×4=12)
a) Define mobile native platforms with example.
b) Elaborate Local and Remote binding concepts of Services.
c) Outline the process of Intent resolution.
d) Define Layouts with example.
3. Attempt any one : (1×8=8)
a) Illustrate Activity Lifecycle states and respective callback methods.
b) Describe various logical components of an Android App with proper
example.
4. Elaborate the procedure with pseudo code to navigate between Activities and
exchange data between them. (1×8=8)
SECTION – II
5. Attempt any three : (3×4=12)
a) Write a note on Cursor and Content value classes.
b) Explain black box testing.
c) Explain frame animation.
d) What is LBS ? Explain cell triangulation method.
6. Attempt any one : (1×8=8)
a) Explain steps to upload signed app on playstore.
b) Explain types of sensor along with steps to access accelerometer.
7. Explain shared preference in detail. Write code for function to add data and
remove data in shared preference file. (1×8=8)
____________
Set Q
Set Q
*SLRTX378* SLR-TX – 378

Seat
No. Set R
B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
mobile application development (Elective – II)
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
N. B. : 1) All questions are compulsory.
2) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
3) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct option : 14


1) You can shut down an activity by calling its _________ method.
a) onDestory() b) finishActivity()
c) finish() d) none of the above
2) If you want share the data accross the all applications, you should go for ?
a) Shared Preferences b) Internal Storage
c) SQLite Databases d) Content provider
3) What is the name of the folder that contains the mp3 music file ?
a) raw b) res c) drawable d) layout
4) Permission needed to access location using gps are
a) ACCESS_FINE_LOCATION b) ACCESS_COARSE_LOCATION
c) Both a) and b) d) None
5) _________ property in xml file decide transparency of the drawable object
in view animation.
a) FromXScale, toXScale b) FromAlpha, toAlpha
c) FromDegrees, toDegrees d) None

P.T.O.
SLR-TX – 378 -2- *SLRTX378*

6) ________ element in XML is used to indicate multiple animation effect has


to be applied for view object in view animation.
a) raw b) collection c) set d) none
7) _________ permission is needed create files on sd card.
a) UPDATE_EXTERNAL_STORAGE
b) WRITE_EXTERNAL_STORAGE
c) MODIFY_EXTERNAL_STORAGE
d) None
8) _________ method in Cursor returns number of rows in selection query
result set.
a) getColumnCount b) getCount
c) getRowCount d) None
9) Shared preference entry can be deleted by _________ method.
a) remove and commit b) delete and commit
c) remove d) delete
10) ________ is valid sqlite statement to delete entry in sqlite database table.
Tablename : student columns : {studentname, rollno, percentage)
SqliteDatabase db=helper.getWritable();//assume helper is object of class
extended from SqliteOpenHelper
a) db.delete(“student”,“rollno=l”,null);
b) db.execSQL(“delete from student where rollno=1”);
c) both a) and b)
d) none
11) Parent class of Service
a) Object b) Context
c) Context wrapper d) Context Theme Wrapper
12) When content provider would be activated ?
a) Using Intent b) Using SQLite
c) Using Content Resolver d) None of the above
13) What are the Direct subclasses of Activity ?
a) Account Authenticator Activity b) Activity Group
c) Expandable List Activity d) All of the above
14) Which are the screen sizes in Android ?
a) Small b) Normal
c) Large d) All of the above
______________
Set R
*SLRTX378* -3- SLR-TX – 378
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
mobile application development (Elective – II)
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
N. B. : All questions are compulsory.

SECTION – I
2. Attempt any three : (3×4=12)
a) Define mobile native platforms with example.
b) Elaborate Local and Remote binding concepts of Services.
c) Outline the process of Intent resolution.
d) Define Layouts with example.
3. Attempt any one : (1×8=8)
a) Illustrate Activity Lifecycle states and respective callback methods.
b) Describe various logical components of an Android App with proper
example.
4. Elaborate the procedure with pseudo code to navigate between Activities and
exchange data between them. (1×8=8)
SECTION – II
5. Attempt any three : (3×4=12)
a) Write a note on Cursor and Content value classes.
b) Explain black box testing.
c) Explain frame animation.
d) What is LBS ? Explain cell triangulation method.
6. Attempt any one : (1×8=8)
a) Explain steps to upload signed app on playstore.
b) Explain types of sensor along with steps to access accelerometer.
7. Explain shared preference in detail. Write code for function to add data and
remove data in shared preference file. (1×8=8)
____________
Set R
Set R
*SLRTX378* SLR-TX – 378

Seat
No. Set S
B.E. (Computer Science and Engineering) (Part – I) (CGPA)
Examination, 2018
mobile application development (Elective – II)
Day and Date : Saturday, 8-12-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
N. B. : 1) All questions are compulsory.
2) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
3) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct option : 14


1) ________ element in XML is used to indicate multiple animation effect has
to be applied for view object in view animation.
a) raw b) collection c) set d) none
2) _________ permission is needed create files on sd card.
a) UPDATE_EXTERNAL_STORAGE
b) WRITE_EXTERNAL_STORAGE
c) MODIFY_EXTERNAL_STORAGE
d) None
3) _________ method in Cursor returns number of rows in selection query
result set.
a) getColumnCount b) getCount
c) getRowCount d) None
4) Shared preference entry can be deleted by _________ method.
a) remove and commit b) delete and commit
c) remove d) delete

P.T.O.
SLR-TX – 378 -2- *SLRTX378*
5) ________ is valid sqlite statement to delete entry in sqlite database table.
Tablename : student columns : {studentname, rollno, percentage)
SqliteDatabase db=helper.getWritable();//assume helper is object of class
extended from SqliteOpenHelper
a) db.delete(“student”,“rollno=l”,null);
b) db.execSQL(“delete from student where rollno=1”);
c) both a) and b)
d) none
6) Parent class of Service
a) Object b) Context
c) Context wrapper d) Context Theme Wrapper
7) When content provider would be activated ?
a) Using Intent b) Using SQLite
c) Using Content Resolver d) None of the above
8) What are the Direct subclasses of Activity ?
a) Account Authenticator Activity b) Activity Group
c) Expandable List Activity d) All of the above
9) Which are the screen sizes in Android ?
a) Small b) Normal
c) Large d) All of the above
10) You can shut down an activity by calling its _________ method.
a) onDestory() b) finishActivity()
c) finish() d) none of the above
11) If you want share the data accross the all applications, you should go for ?
a) Shared Preferences b) Internal Storage
c) SQLite Databases d) Content provider
12) What is the name of the folder that contains the mp3 music file ?
a) raw b) res c) drawable d) layout
13) Permission needed to access location using gps are
a) ACCESS_FINE_LOCATION b) ACCESS_COARSE_LOCATION
c) Both a) and b) d) None
14) _________ property in xml file decide transparency of the drawable object
in view animation.
a) FromXScale, toXScale b) FromAlpha, toAlpha
c) FromDegrees, toDegrees d) None
______________
Set S
*SLRTX378* -3- SLR-TX – 378
Seat
No.

B.E. (Computer Science and Engineering) (Part – I) (CGPA)


Examination, 2018
mobile application development (Elective – II)
Day and Date : Saturday, 8-12-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
N. B. : All questions are compulsory.

SECTION – I
2. Attempt any three : (3×4=12)
a) Define mobile native platforms with example.
b) Elaborate Local and Remote binding concepts of Services.
c) Outline the process of Intent resolution.
d) Define Layouts with example.
3. Attempt any one : (1×8=8)
a) Illustrate Activity Lifecycle states and respective callback methods.
b) Describe various logical components of an Android App with proper
example.
4. Elaborate the procedure with pseudo code to navigate between Activities and
exchange data between them. (1×8=8)
SECTION – II
5. Attempt any three : (3×4=12)
a) Write a note on Cursor and Content value classes.
b) Explain black box testing.
c) Explain frame animation.
d) What is LBS ? Explain cell triangulation method.
6. Attempt any one : (1×8=8)
a) Explain steps to upload signed app on playstore.
b) Explain types of sensor along with steps to access accelerometer.
7. Explain shared preference in detail. Write code for function to add data and
remove data in shared preference file. (1×8=8)
____________
Set S
Set S
*SLRTX379* SLR-TX – 379
Seat
No.

Set P
B.E. (CSE) (Part – I) (Old) Examination, 2018
Network Security
Day and Date : Tuesday, 18-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20
1. Choose the correct answer : 20
1) A process that is designed to detect, prevent or recover from security attack is
a) Security b) Security mechanism
c) Security services d) Threat
2) OSI security architecture focuses on
a) Security attacks b) Security mechanism
c) Security services d) All the above
3) Rail fence technique comes under __________ technique of encryption.
a) Substitution b) Poly alphabetic
c) Transposition d) Blinding
4) Rotor machine is the important application of the principle of multiple stages
of encryption
a) True b) False c) Can’t say d) None of above
5) The most widely used encryption scheme is based on DES is not adopted
by NIST.
a) True b) False c) Can’t say d) None of above
6) A _________ cipher is one in which a block of plaintext is treated as a whole
and used to produce a cipher text block of equal length.
a) block b) stream c) digit d) none of above

P.T.O.
SLR-TX – 379 -2- *SLRTX379*

7) The term _________ and __________ were introduced by Claude Shannon


to capture the two basic building blocks for any cryptographic system.
a) possible and feasible b) infeasible and feasible
c) diffusion and confusion d) all of above
8) The difficulty of attacking RSA is based on difficulty of finding the prime
factors of a composite number.
a) True b) False c) Can’t say d) None of above
9) In RSA, both sender and receiver must know the value of ___________
a) e b) d c) n d) none of above
10) One means of forming a MAC is to combine a cryptographic hash function
in some fashion with a secret key.
a) True b) False c) Can’t say d) None of above
11) Triple DES algorithm uses the key size of
a) 56 bits b) 64 bits c) 128 bits d) 256 bits
12) Anderson identified three classes of intruder namely Misfeasor, Masquerade
and ___________
a) Suspicious user b) Clandestine c) Cliff stoll d) None of above
13) In S/MIME, S indicates
a) Safety b) Serial c) Secure d) Set
14) IPSec encompasses which of the following functional area
a) Authentication b) Confidentiality
c) Key management d) All above
15) ________ provides security services between TCP and applications that
uses TCP.
a) SSL b) HTTP c) SA d) SHA
16) Which of the following server is sued by Kerberos ?
a) Authentication server b) Notarization server
c) Ticket-Granting server d) Both a) and c)
17) Password selection strategies uses which of the following technique.
a) User education b) Reactive password checking
c) Proactive password checking d) All above
18) The set of services provided depends on options selected at the time of
_________ establishment.
a) AH b) ESP c) SA d) None of above
19) In IPSec, transport and tunnel modes are supported by
a) AH b) ESP c) PGP d) Both a) and b)
20) In Web Security, users will trust a personalized service that their profile is
not misused.
a) True b) False c) Can’t say d) None of above
_____________________
Set P
*SLRTX379* -3- SLR-TX – 379
Seat
No.

B.E. (CSE) (Part – I) (Old) Examination, 2018
Network Security
Day and Date : Tuesday, 18-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any four (each carries 5 marks) : 20


a) Explain play fair Cipher with help of example.
b) What is the purpose of S-boxes in DES algorithm ? Explain.
c) Explain Hash functions and security of Hash functions.
d) What is stream and block cipher ? Compare between them.
e) Write a note on :Digital signatures.

3. Attempt any one : 10


a) What is passive and active attack ? List and explain all types of active
attacks.
b) Describe three basic uses of message authentication code with diagram.

4. Explain the RSA algorithm with the help of suitable example. 10

SECTION – II

5. Attempt any four (Each carries 5 marks) : 20


a) What is Kerberos ? List the requirements of Kerberos.
b) List and explain the functions of S/MIME.
c) Explain transport and tunnel mode of IPSec.
d) Describe privacy consideration in Web Services.
e) Explain security and privacy aspects of service oriented architecture.

6. Attempt any one : 10


A) What is intrusion detection ? Explain different approaches to intrusion
detection.
B) Describe X.509 authentication service. Draw and explain X.509 formats.

7. What is SET ? Describe the key features of SET and SET participant with
diagram. 10
_____________________

Set P
SLR-TX – 379 -4- *SLRTX379*

Set P
*SLRTX379* SLR-TX – 379
Seat
No.

Set Q
B.E. (CSE) (Part – I) (Old) Examination, 2018
Network Security
Day and Date : Tuesday, 18-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20
1. Choose the correct answer : 20
1) Which of the following server is sued by Kerberos ?
a) Authentication server b) Notarization server
c) Ticket-Granting server d) Both a) and c)
2) Password selection strategies uses which of the following technique.
a) User education b) Reactive password checking
c) Proactive password checking d) All above
3) The set of services provided depends on options selected at the time of
_________ establishment.
a) AH b) ESP c) SA d) None of above
4) In IPSec, transport and tunnel modes are supported by
a) AH b) ESP c) PGP d) Both a) and b)
5) In Web Security, users will trust a personalized service that their profile is
not misused.
a) True b) False c) Can’t say d) None of above
6) A process that is designed to detect, prevent or recover from security attack is
a) Security b) Security mechanism
c) Security services d) Threat
7) OSI security architecture focuses on
a) Security attacks b) Security mechanism
c) Security services d) All the above
P.T.O.
SLR-TX – 379 -2- *SLRTX379*

8) Rail fence technique comes under __________ technique of encryption.


a) Substitution b) Poly alphabetic
c) Transposition d) Blinding
9) Rotor machine is the important application of the principle of multiple stages
of encryption
a) True b) False c) Can’t say d) None of above
10) The most widely used encryption scheme is based on DES is not adopted
by NIST.
a) True b) False c) Can’t say d) None of above
11) A _________ cipher is one in which a block of plaintext is treated as a whole
and used to produce a cipher text block of equal length.
a) block b) stream c) digit d) none of above
12) The term _________ and __________ were introduced by Claude Shannon
to capture the two basic building blocks for any cryptographic system.
a) possible and feasible b) infeasible and feasible
c) diffusion and confusion d) all of above
13) The difficulty of attacking RSA is based on difficulty of finding the prime
factors of a composite number.
a) True b) False c) Can’t say d) None of above
14) In RSA, both sender and receiver must know the value of ___________
a) e b) d c) n d) none of above
15) One means of forming a MAC is to combine a cryptographic hash function
in some fashion with a secret key.
a) True b) False c) Can’t say d) None of above
16) Triple DES algorithm uses the key size of
a) 56 bits b) 64 bits c) 128 bits d) 256 bits
17) Anderson identified three classes of intruder namely Misfeasor, Masquerade
and ___________
a) Suspicious user b) Clandestine c) Cliff stoll d) None of above
18) In S/MIME, S indicates
a) Safety b) Serial c) Secure d) Set
19) IPSec encompasses which of the following functional area
a) Authentication b) Confidentiality
c) Key management d) All above
20) ________ provides security services between TCP and applications that
uses TCP.
a) SSL b) HTTP c) SA d) SHA
_____________________

Set Q
*SLRTX379* -3- SLR-TX – 379
Seat
No.

B.E. (CSE) (Part – I) (Old) Examination, 2018
Network Security
Day and Date : Tuesday, 18-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any four (each carries 5 marks) : 20


a) Explain play fair Cipher with help of example.
b) What is the purpose of S-boxes in DES algorithm ? Explain.
c) Explain Hash functions and security of Hash functions.
d) What is stream and block cipher ? Compare between them.
e) Write a note on :Digital signatures.

3. Attempt any one : 10


a) What is passive and active attack ? List and explain all types of active
attacks.
b) Describe three basic uses of message authentication code with diagram.

4. Explain the RSA algorithm with the help of suitable example. 10

SECTION – II

5. Attempt any four (Each carries 5 marks) : 20


a) What is Kerberos ? List the requirements of Kerberos.
b) List and explain the functions of S/MIME.
c) Explain transport and tunnel mode of IPSec.
d) Describe privacy consideration in Web Services.
e) Explain security and privacy aspects of service oriented architecture.

6. Attempt any one : 10


A) What is intrusion detection ? Explain different approaches to intrusion
detection.
B) Describe X.509 authentication service. Draw and explain X.509 formats.

7. What is SET ? Describe the key features of SET and SET participant with
diagram. 10
_____________________

Set Q
SLR-TX – 379 -4- *SLRTX379*

Set Q
*SLRTX379* SLR-TX – 379
Seat
No.

Set R
B.E. (CSE) (Part – I) (Old) Examination, 2018
Network Security
Day and Date : Tuesday, 18-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20
1. Choose the correct answer : 20
1) Triple DES algorithm uses the key size of
a) 56 bits b) 64 bits c) 128 bits d) 256 bits
2) Anderson identified three classes of intruder namely Misfeasor, Masquerade
and ___________
a) Suspicious user b) Clandestine c) Cliff stoll d) None of above
3) In S/MIME, S indicates
a) Safety b) Serial c) Secure d) Set
4) IPSec encompasses which of the following functional area
a) Authentication b) Confidentiality
c) Key management d) All above
5) ________ provides security services between TCP and applications that
uses TCP.
a) SSL b) HTTP c) SA d) SHA
6) Which of the following server is sued by Kerberos ?
a) Authentication server b) Notarization server
c) Ticket-Granting server d) Both a) and c)
7) Password selection strategies uses which of the following technique.
a) User education b) Reactive password checking
c) Proactive password checking d) All above

P.T.O.
SLR-TX – 379 -2- *SLRTX379*

8) The set of services provided depends on options selected at the time of


_________ establishment.
a) AH b) ESP c) SA d) None of above
9) In IPSec, transport and tunnel modes are supported by
a) AH b) ESP c) PGP d) Both a) and b)
10) In Web Security, users will trust a personalized service that their profile is
not misused.
a) True b) False c) Can’t say d) None of above
11) A process that is designed to detect, prevent or recover from security attack is
a) Security b) Security mechanism
c) Security services d) Threat
12) OSI security architecture focuses on
a) Security attacks b) Security mechanism
c) Security services d) All the above
13) Rail fence technique comes under __________ technique of encryption.
a) Substitution b) Poly alphabetic
c) Transposition d) Blinding
14) Rotor machine is the important application of the principle of multiple stages
of encryption
a) True b) False c) Can’t say d) None of above
15) The most widely used encryption scheme is based on DES is not adopted
by NIST.
a) True b) False c) Can’t say d) None of above
16) A _________ cipher is one in which a block of plaintext is treated as a whole
and used to produce a cipher text block of equal length.
a) block b) stream c) digit d) none of above
17) The term _________ and __________ were introduced by Claude Shannon
to capture the two basic building blocks for any cryptographic system.
a) possible and feasible b) infeasible and feasible
c) diffusion and confusion d) all of above
18) The difficulty of attacking RSA is based on difficulty of finding the prime
factors of a composite number.
a) True b) False c) Can’t say d) None of above
19) In RSA, both sender and receiver must know the value of ___________
a) e b) d c) n d) none of above
20) One means of forming a MAC is to combine a cryptographic hash function
in some fashion with a secret key.
a) True b) False c) Can’t say d) None of above
_____________________

Set R
*SLRTX379* -3- SLR-TX – 379
Seat
No.

B.E. (CSE) (Part – I) (Old) Examination, 2018
Network Security
Day and Date : Tuesday, 18-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any four (each carries 5 marks) : 20


a) Explain play fair Cipher with help of example.
b) What is the purpose of S-boxes in DES algorithm ? Explain.
c) Explain Hash functions and security of Hash functions.
d) What is stream and block cipher ? Compare between them.
e) Write a note on :Digital signatures.

3. Attempt any one : 10


a) What is passive and active attack ? List and explain all types of active
attacks.
b) Describe three basic uses of message authentication code with diagram.

4. Explain the RSA algorithm with the help of suitable example. 10

SECTION – II

5. Attempt any four (Each carries 5 marks) : 20


a) What is Kerberos ? List the requirements of Kerberos.
b) List and explain the functions of S/MIME.
c) Explain transport and tunnel mode of IPSec.
d) Describe privacy consideration in Web Services.
e) Explain security and privacy aspects of service oriented architecture.

6. Attempt any one : 10


A) What is intrusion detection ? Explain different approaches to intrusion
detection.
B) Describe X.509 authentication service. Draw and explain X.509 formats.

7. What is SET ? Describe the key features of SET and SET participant with
diagram. 10
_____________________

Set R
SLR-TX – 379 -4- *SLRTX379*

Set R
*SLRTX379* SLR-TX – 379
Seat
No.

Set S
B.E. (CSE) (Part – I) (Old) Examination, 2018
Network Security
Day and Date : Tuesday, 18-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

N.B. : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20
1. Choose the correct answer : 20
1) A _________ cipher is one in which a block of plaintext is treated as a whole
and used to produce a cipher text block of equal length.
a) block b) stream c) digit d) none of above
2) The term _________ and __________ were introduced by Claude Shannon
to capture the two basic building blocks for any cryptographic system.
a) possible and feasible b) infeasible and feasible
c) diffusion and confusion d) all of above
3) The difficulty of attacking RSA is based on difficulty of finding the prime
factors of a composite number.
a) True b) False c) Can’t say d) None of above
4) In RSA, both sender and receiver must know the value of ___________
a) e b) d c) n d) none of above
5) One means of forming a MAC is to combine a cryptographic hash function
in some fashion with a secret key.
a) True b) False c) Can’t say d) None of above
6) Triple DES algorithm uses the key size of
a) 56 bits b) 64 bits c) 128 bits d) 256 bits
7) Anderson identified three classes of intruder namely Misfeasor, Masquerade
and ___________
a) Suspicious user b) Clandestine c) Cliff stoll d) None of above
P.T.O.
SLR-TX – 379 -2- *SLRTX379*

8) In S/MIME, S indicates
a) Safety b) Serial c) Secure d) Set
9) IPSec encompasses which of the following functional area
a) Authentication b) Confidentiality
c) Key management d) All above
10) ________ provides security services between TCP and applications that
uses TCP.
a) SSL b) HTTP c) SA d) SHA
11) Which of the following server is sued by Kerberos ?
a) Authentication server b) Notarization server
c) Ticket-Granting server d) Both a) and c)
12) Password selection strategies uses which of the following technique.
a) User education b) Reactive password checking
c) Proactive password checking d) All above
13) The set of services provided depends on options selected at the time of
_________ establishment.
a) AH b) ESP c) SA d) None of above
14) In IPSec, transport and tunnel modes are supported by
a) AH b) ESP c) PGP d) Both a) and b)
15) In Web Security, users will trust a personalized service that their profile is
not misused.
a) True b) False c) Can’t say d) None of above
16) A process that is designed to detect, prevent or recover from security attack is
a) Security b) Security mechanism
c) Security services d) Threat
17) OSI security architecture focuses on
a) Security attacks b) Security mechanism
c) Security services d) All the above
18) Rail fence technique comes under __________ technique of encryption.
a) Substitution b) Poly alphabetic
c) Transposition d) Blinding
19) Rotor machine is the important application of the principle of multiple stages
of encryption
a) True b) False c) Can’t say d) None of above
20) The most widely used encryption scheme is based on DES is not adopted
by NIST.
a) True b) False c) Can’t say d) None of above
_____________________

Set S
*SLRTX379* -3- SLR-TX – 379
Seat
No.

B.E. (CSE) (Part – I) (Old) Examination, 2018
Network Security
Day and Date : Tuesday, 18-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Attempt any four (each carries 5 marks) : 20


a) Explain play fair Cipher with help of example.
b) What is the purpose of S-boxes in DES algorithm ? Explain.
c) Explain Hash functions and security of Hash functions.
d) What is stream and block cipher ? Compare between them.
e) Write a note on :Digital signatures.

3. Attempt any one : 10


a) What is passive and active attack ? List and explain all types of active
attacks.
b) Describe three basic uses of message authentication code with diagram.

4. Explain the RSA algorithm with the help of suitable example. 10

SECTION – II

5. Attempt any four (Each carries 5 marks) : 20


a) What is Kerberos ? List the requirements of Kerberos.
b) List and explain the functions of S/MIME.
c) Explain transport and tunnel mode of IPSec.
d) Describe privacy consideration in Web Services.
e) Explain security and privacy aspects of service oriented architecture.

6. Attempt any one : 10


A) What is intrusion detection ? Explain different approaches to intrusion
detection.
B) Describe X.509 authentication service. Draw and explain X.509 formats.

7. What is SET ? Describe the key features of SET and SET participant with
diagram. 10
_____________________

Set S
SLR-TX – 379 -4- *SLRTX379*

Set S
*SLRTX380* SLR-TX – 380

Seat
No.
Set P
B.E. (Computer Science and Engg.) (Part – I) (Old)
Examination, 2018
object oriented modelling and design (Elective)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in Answer


Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t forget
to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (1×20=20)


1) By encapsulation in object-oriented modelling we mean
a) Encapsulating data and programs
b) Hiding attributes of an object from users
c) Hiding operations on object from users
d) Hiding implementation details of methods from users of objects
2) Link is connection among
a) classes b) entity c) packages d) none
3) The fact that the same operation may apply to two or more classes is called what ?
a) Inheritance b) Polymorphism
c) Encapsulation d) Multiple classification
4) Pattern identifies a specific ________ that are above the single classes and instances.
a) Encapsulation b) Abstraction
c) Polymorphism d) None of the above
5) The subscribers are
a) Developer b) Observers
c) Software Tester d) Designer
6) ______ is a collection of operations that are used to specify a service of a class or a
component.
a) Abstraction b) Objects c) Classes d) Interface
7) The specification is a contract between the ______ and the __________ of the class.
i. Producer ii. Designer iii. Consumer iv. Software Tester
a) i and ii b) i and iii c) ii and iv d) iii and iv
8) Functional transformations are expressed in terms of
a) Primitive operators of the language b) Calls to subprograms
c) Both a) and b) d) None of the above
P.T.O.
SLR-TX – 380 -2- *SLRTX380*

9) Data Flow Diagram is part of


a) Object Model b) Dynamic Model
c) Behavioural Model d) Functional Model
10) A ________ is an abstraction of the attribute values and links of an object.
a) Event b) State c) Use cases d) DFD
11) What is the programming style of the object oriented conceptual model ?
a) Invariant relationships
b) Algorithms
c) Classes and objects
d) Goals, often expressed in a predicate calculus
12) What shows the configuration of run time processing nodes and the components that live on them ?
a) Deployment Diagram b) Component Diagram
c) Collaboration Diagram d) Sequence Diagram
13) A collaboration is a society of
a) classes and functions
b) classes and objects
c) objects and interfaces
d) classes, interfaces and other elements
14) You apply the use case diagram to model _________ view of a system.
a) Dynamic use case b) Static use case
c) Model use case d) None of the above
15) A _______ is the special attribute that reduces the effective multiplicity of an association.
a) Role Name b) Qualifier c) Link Attribute d) None of the above
16) A __________ transforms data values in data flow diagram.
a) Data store b) Actor c) Data flow d) Processes
17) __________ represents a named object that is dispatched asynchronously by one object and they
received by another.
a) Signals b) Events c) State d) Activity
18) The use case diagram are important for _________ behavioural element.
a) Visualizing b) Specifying c) Documenting d) All of the above
19) A
ll software development methodologies emphasize the importance of first ________ then
_____
i. Testing ii. Communication/Planning
iii. Designing iv. Coding
a) i and ii b) iv and i c) iii and ii d) iii and iv
20) Aggregation is a ________ relationship between object classes.
a) Part-whole
b) Hierarchical
c) Unqualified
d) Qualified

______________
Set P
*SLRTX380* -3- SLR-TX – 380
Seat
No.

B.E. (Computer Science and Engg.) (Part – I) (Old)


Examination, 2018
object oriented modelling and design (Elective)
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.
SECTION – I

2. Attempt any 4 : (5×4=20)


1) Explain modelling as a design technique in detail.
2) Write a note on Generalization and Inheritance.
3) What is Multiple Inheritance ? Explain it in briefly with an example.
4) Explain OMT as a software engineering methodology and the OMT methodology.
5) Explain functional modelling in detail.

3. Explain DFD in detail. Also draw DFD for “Hotel Management System”. 10
OR
Explain the impact of an object oriented approach and the overview of analysis with the problem
statement. 10
4. Write the comparison of Object model, Dynamic model and Functional model in detail. 10 

SECTION – II

5. Attempt any four : (4×5=20)


1) What is Use Case ? Explain Use Case diagram.
2) Explain the use of database system for the implementation of OMT.
3) What is deployment ? Explain it with “ATM machine deployment diagram”.
4) Explain the robustness in object oriented style.
5) What is pattern ? What makes a pattern ?

6. Attempt any one : 10


1) Draw a deployment diagram for Home Network.
(Hint: Modern homes usually have a network of interconnected devices of different kinds and with
various types of connections and communication protocols. It contains cable modem, wireless
router, various computers and devices.)
2) Write a short note on :
i) Component diagram
ii) Deployment diagram
7. What is Interaction ? Explain Interaction diagram and activity diagram in detail with example. 10

Set P
____________________
Set P
*SLRTX380* SLR-TX – 380

Seat
No.
Set Q
B.E. (Computer Science and Engg.) (Part – I) (Old)
Examination, 2018
object oriented modelling and design (Elective)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in Answer


Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t forget
to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (1×20=20)


1) A __________ transforms data values in data flow diagram.
a) Data store b) Actor c) Data flow d) Processes
2) __________ represents a named object that is dispatched asynchronously by one object and they
received by another.
a) Signals b) Events c) State d) Activity
3) The use case diagram are important for _________ behavioural element.
a) Visualizing b) Specifying c) Documenting d) All of the above
4) A
ll software development methodologies emphasize the importance of first ________ then
_____
i. Testing ii. Communication/Planning
iii. Designing iv. Coding
a) i and ii b) iv and i c) iii and ii d) iii and iv
5) Aggregation is a ________ relationship between object classes.
a) Part-whole b) Hierarchical
c) Unqualified d) Qualified
6) By encapsulation in object-oriented modelling we mean
a) Encapsulating data and programs
b) Hiding attributes of an object from users
c) Hiding operations on object from users
d) Hiding implementation details of methods from users of objects
7) Link is connection among
a) classes b) entity c) packages d) none
8) The fact that the same operation may apply to two or more classes is called what ?
a) Inheritance b) Polymorphism
c) Encapsulation d) Multiple classification
P.T.O.
SLR-TX – 380 -2- *SLRTX380*

9) Pattern identifies a specific ________ that are above the single classes and instances.
a) Encapsulation b) Abstraction
c) Polymorphism d) None of the above
10) The subscribers are
a) Developer b) Observers
c) Software Tester d) Designer
11) ______ is a collection of operations that are used to specify a service of a class or a
component.
a) Abstraction b) Objects c) Classes d) Interface
12) The specification is a contract between the ______ and the __________ of the class.
i. Producer ii. Designer iii. Consumer iv. Software Tester
a) i and ii b) i and iii c) ii and iv d) iii and iv
13) Functional transformations are expressed in terms of
a) Primitive operators of the language b) Calls to subprograms
c) Both a) and b) d) None of the above
14) Data Flow Diagram is part of
a) Object Model b) Dynamic Model
c) Behavioural Model d) Functional Model
15) A ________ is an abstraction of the attribute values and links of an object.
a) Event b) State c) Use cases d) DFD
16) What is the programming style of the object oriented conceptual model ?
a) Invariant relationships
b) Algorithms
c) Classes and objects
d) Goals, often expressed in a predicate calculus
17) What shows the configuration of run time processing nodes and the components that live on them ?
a) Deployment Diagram b) Component Diagram
c) Collaboration Diagram d) Sequence Diagram
18) A collaboration is a society of
a) classes and functions
b) classes and objects
c) objects and interfaces
d) classes, interfaces and other elements
19) You apply the use case diagram to model _________ view of a system.
a) Dynamic use case b) Static use case
c) Model use case d) None of the above
20) A _______ is the special attribute that reduces the effective multiplicity of an association.
a) Role Name b) Qualifier c) Link Attribute d) None of the above

______________

Set Q
*SLRTX380* -3- SLR-TX – 380
Seat
No.

B.E. (Computer Science and Engg.) (Part – I) (Old)


Examination, 2018
object oriented modelling and design (Elective)
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.
SECTION – I

2. Attempt any 4 : (5×4=20)


1) Explain modelling as a design technique in detail.
2) Write a note on Generalization and Inheritance.
3) What is Multiple Inheritance ? Explain it in briefly with an example.
4) Explain OMT as a software engineering methodology and the OMT methodology.
5) Explain functional modelling in detail.

3. Explain DFD in detail. Also draw DFD for “Hotel Management System”. 10
OR
Explain the impact of an object oriented approach and the overview of analysis with the problem
statement. 10
4. Write the comparison of Object model, Dynamic model and Functional model in detail. 10 

SECTION – II

5. Attempt any four : (4×5=20)


1) What is Use Case ? Explain Use Case diagram.
2) Explain the use of database system for the implementation of OMT.
3) What is deployment ? Explain it with “ATM machine deployment diagram”.
4) Explain the robustness in object oriented style.
5) What is pattern ? What makes a pattern ?

6. Attempt any one : 10


1) Draw a deployment diagram for Home Network.
(Hint: Modern homes usually have a network of interconnected devices of different kinds and with
various types of connections and communication protocols. It contains cable modem, wireless
router, various computers and devices.)
2) Write a short note on :
i) Component diagram
ii) Deployment diagram
7. What is Interaction ? Explain Interaction diagram and activity diagram in detail with example. 10

Set Q
____________________
Set Q
*SLRTX380* SLR-TX – 380

Seat
No.
Set R
B.E. (Computer Science and Engg.) (Part – I) (Old)
Examination, 2018
object oriented modelling and design (Elective)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in Answer


Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t forget
to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (1×20=20)


1) What is the programming style of the object oriented conceptual model ?
a) Invariant relationships
b) Algorithms
c) Classes and objects
d) Goals, often expressed in a predicate calculus
2) What shows the configuration of run time processing nodes and the components that live on them ?
a) Deployment Diagram b) Component Diagram
c) Collaboration Diagram d) Sequence Diagram
3) A collaboration is a society of
a) classes and functions
b) classes and objects
c) objects and interfaces
d) classes, interfaces and other elements
4) You apply the use case diagram to model _________ view of a system.
a) Dynamic use case b) Static use case
c) Model use case d) None of the above
5) A _______ is the special attribute that reduces the effective multiplicity of an association.
a) Role Name b) Qualifier c) Link Attribute d) None of the above
6) A __________ transforms data values in data flow diagram.
a) Data store b) Actor c) Data flow d) Processes
7) __________ represents a named object that is dispatched asynchronously by one object and they
received by another.
a) Signals b) Events c) State d) Activity
8) The use case diagram are important for _________ behavioural element.
a) Visualizing b) Specifying c) Documenting d) All of the above
P.T.O.
SLR-TX – 380 -2- *SLRTX380*

9) A
ll software development methodologies emphasize the importance of first ________ then
_____
i. Testing ii. Communication/Planning
iii. Designing iv. Coding
a) i and ii b) iv and i c) iii and ii d) iii and iv
10) Aggregation is a ________ relationship between object classes.
a) Part-whole
b) Hierarchical
c) Unqualified
d) Qualified
11) By encapsulation in object-oriented modelling we mean
a) Encapsulating data and programs
b) Hiding attributes of an object from users
c) Hiding operations on object from users
d) Hiding implementation details of methods from users of objects
12) Link is connection among
a) classes b) entity c) packages d) none
13) The fact that the same operation may apply to two or more classes is called what ?
a) Inheritance b) Polymorphism
c) Encapsulation d) Multiple classification
14) Pattern identifies a specific ________ that are above the single classes and instances.
a) Encapsulation b) Abstraction
c) Polymorphism d) None of the above
15) The subscribers are
a) Developer b) Observers
c) Software Tester d) Designer
16) ______ is a collection of operations that are used to specify a service of a class or a
component.
a) Abstraction b) Objects c) Classes d) Interface
17) The specification is a contract between the ______ and the __________ of the class.
i. Producer ii. Designer iii. Consumer iv. Software Tester
a) i and ii b) i and iii c) ii and iv d) iii and iv
18) Functional transformations are expressed in terms of
a) Primitive operators of the language b) Calls to subprograms
c) Both a) and b) d) None of the above
19) Data Flow Diagram is part of
a) Object Model b) Dynamic Model
c) Behavioural Model d) Functional Model
20) A ________ is an abstraction of the attribute values and links of an object.
a) Event b) State c) Use cases d) DFD

______________
Set R
*SLRTX380* -3- SLR-TX – 380
Seat
No.

B.E. (Computer Science and Engg.) (Part – I) (Old)


Examination, 2018
object oriented modelling and design (Elective)
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.
SECTION – I

2. Attempt any 4 : (5×4=20)


1) Explain modelling as a design technique in detail.
2) Write a note on Generalization and Inheritance.
3) What is Multiple Inheritance ? Explain it in briefly with an example.
4) Explain OMT as a software engineering methodology and the OMT methodology.
5) Explain functional modelling in detail.

3. Explain DFD in detail. Also draw DFD for “Hotel Management System”. 10
OR
Explain the impact of an object oriented approach and the overview of analysis with the problem
statement. 10
4. Write the comparison of Object model, Dynamic model and Functional model in detail. 10 

SECTION – II

5. Attempt any four : (4×5=20)


1) What is Use Case ? Explain Use Case diagram.
2) Explain the use of database system for the implementation of OMT.
3) What is deployment ? Explain it with “ATM machine deployment diagram”.
4) Explain the robustness in object oriented style.
5) What is pattern ? What makes a pattern ?

6. Attempt any one : 10


1) Draw a deployment diagram for Home Network.
(Hint: Modern homes usually have a network of interconnected devices of different kinds and with
various types of connections and communication protocols. It contains cable modem, wireless
router, various computers and devices.)
2) Write a short note on :
i) Component diagram
ii) Deployment diagram
7. What is Interaction ? Explain Interaction diagram and activity diagram in detail with example. 10

Set R
____________________
Set R
*SLRTX380* SLR-TX – 380

Seat
No.
Set S
B.E. (Computer Science and Engg.) (Part – I) (Old)
Examination, 2018
object oriented modelling and design (Elective)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30 minutes in Answer


Book Page No. 3. Each question carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t forget
to mention, Q.P. Set (P/Q/R/S) on Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (1×20=20)


1) ______ is a collection of operations that are used to specify a service of a class or a
component.
a) Abstraction b) Objects c) Classes d) Interface
2) The specification is a contract between the ______ and the __________ of the class.
i. Producer ii. Designer iii. Consumer iv. Software Tester
a) i and ii b) i and iii c) ii and iv d) iii and iv
3) Functional transformations are expressed in terms of
a) Primitive operators of the language b) Calls to subprograms
c) Both a) and b) d) None of the above
4) Data Flow Diagram is part of
a) Object Model b) Dynamic Model
c) Behavioural Model d) Functional Model
5) A ________ is an abstraction of the attribute values and links of an object.
a) Event b) State c) Use cases d) DFD
6) What is the programming style of the object oriented conceptual model ?
a) Invariant relationships
b) Algorithms
c) Classes and objects
d) Goals, often expressed in a predicate calculus
7) What shows the configuration of run time processing nodes and the components that live on them ?
a) Deployment Diagram b) Component Diagram
c) Collaboration Diagram d) Sequence Diagram
8) A collaboration is a society of
a) classes and functions b) classes and objects
c) objects and interfaces d) classes, interfaces and other elements
P.T.O.
SLR-TX – 380 -2- *SLRTX380*

9) You apply the use case diagram to model _________ view of a system.
a) Dynamic use case b) Static use case
c) Model use case d) None of the above
10) A _______ is the special attribute that reduces the effective multiplicity of an association.
a) Role Name b) Qualifier c) Link Attribute d) None of the above
11) A __________ transforms data values in data flow diagram.
a) Data store b) Actor c) Data flow d) Processes
12) __________ represents a named object that is dispatched asynchronously by one object and they
received by another.
a) Signals b) Events c) State d) Activity
13) The use case diagram are important for _________ behavioural element.
a) Visualizing b) Specifying c) Documenting d) All of the above
14) A
ll software development methodologies emphasize the importance of first ________ then
_____
i. Testing ii. Communication/Planning
iii. Designing iv. Coding
a) i and ii b) iv and i c) iii and ii d) iii and iv
15) Aggregation is a ________ relationship between object classes.
a) Part-whole
b) Hierarchical
c) Unqualified
d) Qualified
16) By encapsulation in object-oriented modelling we mean
a) Encapsulating data and programs
b) Hiding attributes of an object from users
c) Hiding operations on object from users
d) Hiding implementation details of methods from users of objects
17) Link is connection among
a) classes b) entity c) packages d) none
18) The fact that the same operation may apply to two or more classes is called what ?
a) Inheritance b) Polymorphism
c) Encapsulation d) Multiple classification
19) Pattern identifies a specific ________ that are above the single classes and instances.
a) Encapsulation b) Abstraction
c) Polymorphism d) None of the above
20) The subscribers are
a) Developer b) Observers
c) Software Tester d) Designer

______________

Set S
*SLRTX380* -3- SLR-TX – 380
Seat
No.

B.E. (Computer Science and Engg.) (Part – I) (Old)


Examination, 2018
object oriented modelling and design (Elective)
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.
SECTION – I

2. Attempt any 4 : (5×4=20)


1) Explain modelling as a design technique in detail.
2) Write a note on Generalization and Inheritance.
3) What is Multiple Inheritance ? Explain it in briefly with an example.
4) Explain OMT as a software engineering methodology and the OMT methodology.
5) Explain functional modelling in detail.

3. Explain DFD in detail. Also draw DFD for “Hotel Management System”. 10
OR
Explain the impact of an object oriented approach and the overview of analysis with the problem
statement. 10
4. Write the comparison of Object model, Dynamic model and Functional model in detail. 10 

SECTION – II

5. Attempt any four : (4×5=20)


1) What is Use Case ? Explain Use Case diagram.
2) Explain the use of database system for the implementation of OMT.
3) What is deployment ? Explain it with “ATM machine deployment diagram”.
4) Explain the robustness in object oriented style.
5) What is pattern ? What makes a pattern ?

6. Attempt any one : 10


1) Draw a deployment diagram for Home Network.
(Hint: Modern homes usually have a network of interconnected devices of different kinds and with
various types of connections and communication protocols. It contains cable modem, wireless
router, various computers and devices.)
2) Write a short note on :
i) Component diagram
ii) Deployment diagram
7. What is Interaction ? Explain Interaction diagram and activity diagram in detail with example. 10

Set S
____________________
Set S
*SLRTX381* SLR-TX – 381
Seat
No.
Set P

B.E. (CSE) (Part – I) (Old) Examination, 2018


Information retrieval (Elective)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose correct the answers : (1×20=20)


1) Documents have no match in vector model if cosine value is
a) zero b) one c) ninety d) sixty
2) Structural queries allow querying based on
a) text b) structure
c) text and structure d) none of these
3) In Boolean Model index term weights are __________ values.
a) hexadecimal b) octal c) binary d) decimal
4) An inverted file is ________ oriented mechanism.
a) sentences b) data c) word d) letter
5) Use of IR is more concerned with retrieving
a) information b) data c) words d) sentences
6) Recall is fraction of relevant and _________ documents.
a) modified b) deleted
c) retrieved d) whole text collection
7) SGML stands for
a) Structured Generalized Markup Language
b) Standard Generalized Markup Language
c) Sequential Generalized Markup Language
d) Soft Generalized Markup Language
P.T.O.
SLR-TX – 381 -2- *SLRTX381*
8) Phrase query is sequence of ________ queries.
a) boolean b) single word c) proximity d) context
9) _________ is the technique used in allowing error pattern matching.
a) distance function b) LCS
c) edit distance d) None of these
10) Precision is the ratio of retrieved and __________ documents.
a) relevant b) non relevant
c) all doc. of database d) modified
11) Object index is pair of
a) (BI, IMH) b) (MF, IMH) c) (BI, MF) d) none of these
12) MULTOS stands for
a) Multimedia Office Server b) Multimedia Offline Server
c) Multimedia Oriented Server d) Multimedia Online Server
13) GEMINI has also been applied for colour images with the ______ project
of IBM.
a) QDIC b) QCIC c) QBIC d) QQIC
14) Trying all possible pattern positions in text is _______ algorithm.
a) KMP b) Boyer-Moore Family
c) BF d) None of these
15) TIFF Stands for
a) Tagged Image Frame Format b) Tagged Image File Format
c) Tagged Image Form Format d) None of the above
16) Harvest uses __________ architecture.
a) client /server b) centralized c) distributed d) none of these
17) Crawler is the ________ that sends request to different remote web servers.
a) process b) program c) data d) information
18) An important Meta data format is
a) MARC b) CARC c) FARC d) DARC
19) MULTOS data model is based on ________ architecture.
a) client b) server c) client-server d) Two-tier
20) Digital Libraries are the part of _______ information infrastructure.
a) whole b) global c) domestic d) none of these
__________

Set P
*SLRTX381* -3- SLR-TX – 381
Seat
No.

B.E. (CSE) (Part – I) (Old) Examination, 2018


Information retrieval (Elective)
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Explain SGML, XML, and HTML in detail. 10

3. Attempt any one : 10


a) Keyword Based Querying
b) Boolean Model

4. Write notes on (any four) : (5×4=20)


a) Difference between data retrieval and information retrieval.
b) BF algorithm.
c) Structural Queries.
d) KMP .
e) Vector Model.

SECTION – II

5. Describe MULTOS Query Language Form. 10

6. Attempt any one : 10


a) Architectural issues of Digital Library.
b) Problems posed by web.

7. Write notes on (any four) : (5×4=20)


a) Data Retrieval Steps
b) Document Model
c) Browsing in Web
d) GEMINI
e) MULTOS Data Model.
___________

Set P
Set P
*SLRTX381* SLR-TX – 381
Seat
No.
Set Q

B.E. (CSE) (Part – I) (Old) Examination, 2018


Information retrieval (Elective)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose correct the answers : (1×20=20)


1) Harvest uses __________ architecture.
a) client /server b) centralized c) distributed d) none of these
2) Crawler is the ________ that sends request to different remote web servers.
a) process b) program c) data d) information
3) An important Meta data format is
a) MARC b) CARC c) FARC d) DARC
4) MULTOS data model is based on ________ architecture.
a) client b) server c) client-server d) Two-tier
5) Digital Libraries are the part of _______ information infrastructure.
a) whole b) global c) domestic d) none of these
6) Documents have no match in vector model if cosine value is
a) zero b) one c) ninety d) sixty
7) Structural queries allow querying based on
a) text b) structure
c) text and structure d) none of these
8) In Boolean Model index term weights are __________ values.
a) hexadecimal b) octal c) binary d) decimal
P.T.O.
SLR-TX – 381 -2- *SLRTX381*
9) An inverted file is ________ oriented mechanism.
a) sentences b) data c) word d) letter
10) Use of IR is more concerned with retrieving
a) information b) data c) words d) sentences
11) Recall is fraction of relevant and _________ documents.
a) modified b) deleted
c) retrieved d) whole text collection
12) SGML stands for
a) Structured Generalized Markup Language
b) Standard Generalized Markup Language
c) Sequential Generalized Markup Language
d) Soft Generalized Markup Language
13) Phrase query is sequence of ________ queries.
a) boolean b) single word c) proximity d) context
14) _________ is the technique used in allowing error pattern matching.
a) distance function b) LCS
c) edit distance d) None of these
15) Precision is the ratio of retrieved and __________ documents.
a) relevant b) non relevant
c) all doc. of database d) modified
16) Object index is pair of
a) (BI, IMH) b) (MF, IMH) c) (BI, MF) d) none of these
17) MULTOS stands for
a) Multimedia Office Server b) Multimedia Offline Server
c) Multimedia Oriented Server d) Multimedia Online Server
18) GEMINI has also been applied for colour images with the ______ project
of IBM.
a) QDIC b) QCIC c) QBIC d) QQIC
19) Trying all possible pattern positions in text is _______ algorithm.
a) KMP b) Boyer-Moore Family
c) BF d) None of these
20) TIFF Stands for
a) Tagged Image Frame Format b) Tagged Image File Format
c) Tagged Image Form Format d) None of the above
__________

Set Q
*SLRTX381* -3- SLR-TX – 381
Seat
No.

B.E. (CSE) (Part – I) (Old) Examination, 2018


Information retrieval (Elective)
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Explain SGML, XML, and HTML in detail. 10

3. Attempt any one : 10


a) Keyword Based Querying
b) Boolean Model

4. Write notes on (any four) : (5×4=20)


a) Difference between data retrieval and information retrieval.
b) BF algorithm.
c) Structural Queries.
d) KMP .
e) Vector Model.

SECTION – II

5. Describe MULTOS Query Language Form. 10

6. Attempt any one : 10


a) Architectural issues of Digital Library.
b) Problems posed by web.

7. Write notes on (any four) : (5×4=20)


a) Data Retrieval Steps
b) Document Model
c) Browsing in Web
d) GEMINI
e) MULTOS Data Model.
___________

Set Q
Set Q
*SLRTX381* SLR-TX – 381
Seat
No.
Set R

B.E. (CSE) (Part – I) (Old) Examination, 2018


Information retrieval (Elective)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose correct the answers : (1×20=20)


1) Object index is pair of
a) (BI, IMH) b) (MF, IMH) c) (BI, MF) d) none of these
2) MULTOS stands for
a) Multimedia Office Server b) Multimedia Offline Server
c) Multimedia Oriented Server d) Multimedia Online Server
3) GEMINI has also been applied for colour images with the ______ project
of IBM.
a) QDIC b) QCIC c) QBIC d) QQIC
4) Trying all possible pattern positions in text is _______ algorithm.
a) KMP b) Boyer-Moore Family
c) BF d) None of these
5) TIFF Stands for
a) Tagged Image Frame Format b) Tagged Image File Format
c) Tagged Image Form Format d) None of the above
6) Harvest uses __________ architecture.
a) client /server b) centralized c) distributed d) none of these

P.T.O.
SLR-TX – 381 -2- *SLRTX381*
7) Crawler is the ________ that sends request to different remote web servers.
a) process b) program c) data d) information
8) An important Meta data format is
a) MARC b) CARC c) FARC d) DARC
9) MULTOS data model is based on ________ architecture.
a) client b) server c) client-server d) Two-tier
10) Digital Libraries are the part of _______ information infrastructure.
a) whole b) global c) domestic d) none of these
11) Documents have no match in vector model if cosine value is
a) zero b) one c) ninety d) sixty
12) Structural queries allow querying based on
a) text b) structure
c) text and structure d) none of these
13) In Boolean Model index term weights are __________ values.
a) hexadecimal b) octal c) binary d) decimal
14) An inverted file is ________ oriented mechanism.
a) sentences b) data c) word d) letter
15) Use of IR is more concerned with retrieving
a) information b) data c) words d) sentences
16) Recall is fraction of relevant and _________ documents.
a) modified b) deleted
c) retrieved d) whole text collection
17) SGML stands for
a) Structured Generalized Markup Language
b) Standard Generalized Markup Language
c) Sequential Generalized Markup Language
d) Soft Generalized Markup Language
18) Phrase query is sequence of ________ queries.
a) boolean b) single word c) proximity d) context
19) _________ is the technique used in allowing error pattern matching.
a) distance function b) LCS
c) edit distance d) None of these
20) Precision is the ratio of retrieved and __________ documents.
a) relevant b) non relevant
c) all doc. of database d) modified
__________
Set R
*SLRTX381* -3- SLR-TX – 381
Seat
No.

B.E. (CSE) (Part – I) (Old) Examination, 2018


Information retrieval (Elective)
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Explain SGML, XML, and HTML in detail. 10

3. Attempt any one : 10


a) Keyword Based Querying
b) Boolean Model

4. Write notes on (any four) : (5×4=20)


a) Difference between data retrieval and information retrieval.
b) BF algorithm.
c) Structural Queries.
d) KMP .
e) Vector Model.

SECTION – II

5. Describe MULTOS Query Language Form. 10

6. Attempt any one : 10


a) Architectural issues of Digital Library.
b) Problems posed by web.

7. Write notes on (any four) : (5×4=20)


a) Data Retrieval Steps
b) Document Model
c) Browsing in Web
d) GEMINI
e) MULTOS Data Model.
___________

Set R
Set R
*SLRTX381* SLR-TX – 381
Seat
No.
Set S

B.E. (CSE) (Part – I) (Old) Examination, 2018


Information retrieval (Elective)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 10.00 a.m. to 1.00 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose correct the answers : (1×20=20)


1) Recall is fraction of relevant and _________ documents.
a) modified b) deleted
c) retrieved d) whole text collection
2) SGML stands for
a) Structured Generalized Markup Language
b) Standard Generalized Markup Language
c) Sequential Generalized Markup Language
d) Soft Generalized Markup Language
3) Phrase query is sequence of ________ queries.
a) boolean b) single word c) proximity d) context
4) _________ is the technique used in allowing error pattern matching.
a) distance function b) LCS
c) edit distance d) None of these
5) Precision is the ratio of retrieved and __________ documents.
a) relevant b) non relevant
c) all doc. of database d) modified
6) Object index is pair of
a) (BI, IMH) b) (MF, IMH) c) (BI, MF) d) none of these
P.T.O.
SLR-TX – 381 -2- *SLRTX381*
7) MULTOS stands for
a) Multimedia Office Server b) Multimedia Offline Server
c) Multimedia Oriented Server d) Multimedia Online Server
8) GEMINI has also been applied for colour images with the ______ project
of IBM.
a) QDIC b) QCIC c) QBIC d) QQIC
9) Trying all possible pattern positions in text is _______ algorithm.
a) KMP b) Boyer-Moore Family
c) BF d) None of these
10) TIFF Stands for
a) Tagged Image Frame Format b) Tagged Image File Format
c) Tagged Image Form Format d) None of the above
11) Harvest uses __________ architecture.
a) client /server b) centralized c) distributed d) none of these
12) Crawler is the ________ that sends request to different remote web servers.
a) process b) program c) data d) information
13) An important Meta data format is
a) MARC b) CARC c) FARC d) DARC
14) MULTOS data model is based on ________ architecture.
a) client b) server c) client-server d) Two-tier
15) Digital Libraries are the part of _______ information infrastructure.
a) whole b) global c) domestic d) none of these
16) Documents have no match in vector model if cosine value is
a) zero b) one c) ninety d) sixty
17) Structural queries allow querying based on
a) text b) structure
c) text and structure d) none of these
18) In Boolean Model index term weights are __________ values.
a) hexadecimal b) octal c) binary d) decimal
19) An inverted file is ________ oriented mechanism.
a) sentences b) data c) word d) letter
20) Use of IR is more concerned with retrieving
a) information b) data c) words d) sentences
__________

Set S
*SLRTX381* -3- SLR-TX – 381
Seat
No.

B.E. (CSE) (Part – I) (Old) Examination, 2018


Information retrieval (Elective)
Day and Date : Wednesday, 19-12-2018 Marks : 80
Time : 10.00 a.m. to 1.00 p.m.

SECTION – I

2. Explain SGML, XML, and HTML in detail. 10

3. Attempt any one : 10


a) Keyword Based Querying
b) Boolean Model

4. Write notes on (any four) : (5×4=20)


a) Difference between data retrieval and information retrieval.
b) BF algorithm.
c) Structural Queries.
d) KMP .
e) Vector Model.

SECTION – II

5. Describe MULTOS Query Language Form. 10

6. Attempt any one : 10


a) Architectural issues of Digital Library.
b) Problems posed by web.

7. Write notes on (any four) : (5×4=20)


a) Data Retrieval Steps
b) Document Model
c) Browsing in Web
d) GEMINI
e) MULTOS Data Model.
___________

Set S
Set S
*SLRTX382* SLR-TX – 382

Seat
No. Set P
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Management Information system
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) _________ covers the planning, control and administration of the operations
of a concern.
a) Management b) Information c) System d) Transaction
2) The _________ are informed about the progress, achievements and
shortfalls in the activity and the targets.
a) Logical managers b) Functional managers
c) Customers d) Top level managers
3) The information of MIS comes from the
a) Internal source b) External source
c) Both internal and external source d) None of the above
4) The basic components of DSS is are
a) Database b) Model base
c) DSS software system d) All of the above
5) GDSS means
a) Group Decision Support System
b) Group Dedicated Support System
c) General Decision Support System
d) Group Decision Service System
6) _________ competitive strategy develop products and services which are
different from what the competition offers.
a) Cost leadership b) Differentiation c) Cost focus d) Tactical

P.T.O.
SLR-TX – 382 -2- *SLRTX382*
7) _________ systems are developed in response to corporate business
initiative and give competitive advantage to the organization.
a) Operational information b) Decision information
c) Strategic information d) All
8) Who are the primary users of SCM systems ?
a) Sales, marketing, customer service
b) Accounting, finance, logistics and production
c) Customers, resellers, partners, suppliers and distributors
d) All of the above
9) What are the primary business benefits of an ERP system ?
a) Sales forecasts, sales strategies and marketing campaigns
b) Market demand, resource and capacity constraints and real-time
scheduling
c) Forecasting, planning, purchasing , material management, warehousing,
inventory and distribution
d) All of the above
10) Who are the primary users of ERP systems ?
a) Sales, marketing, customer service
b) Accounting, finance, logistics and production
c) Customers, resellers, partners, suppliers and distributors
d) All of the above
11) If configured correctly, the _________ will prevent interaction with your
computer after a specified time period.
a) firewall b) Filter c) Screen saver d) Popup blocker
12) To recover files from a backup, you perform a
a) Restore b) Scan c) Unerase d) Copy
13) Which segment do eBay, Amazon.com belong ?
a) B2Bs b) B2Cs c) C2Bs d) C2Cs
14) Which type of e-commerce focuses on consumers dealing with each
other ?
a) B2B b) B2C c) C2B d) C2C
______________

Set P
*SLRTX382* -3- SLR-TX – 382
Seat
No.
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Management Information system
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
SECTION – I

2. Attempt any four : (4×4=16)


a) What are the different uses of Management Information System ?
b) What are the different characteristics of MIS ?
c) How GDSS can enhance group decision-making in the organization ?
d) What is ESS ? Explain benefits of ESS.
e) What is the concept of strategic information system ?
f) Describe overview of system development life cycle.

3. Attempt any two : (6×2=12)


a) Explain about Information System Software in detail.
b) What is Decision Support Systems (DSS) and also explain characteristics
and applications of decision support systems.
c) Explain causes of information system success and failure in detail.

SECTION – II

4. Attempt any three : (4×3=12)


1) Explain managing information resources in information system.
2) Explain security audit.
3) Explain the concept of e-commerce.
4) Explain the role of CIO.

5. What is ERP ? Explain need features, advantages and growth of ERP. 8


OR
What is e-commerce ? Explain the different types and applications of e-commerce.

6. Write note on : 8
1) Payment Gateway in e-commerce.
2) Supply Chain Management (SCM).
_____________________ Set P
Set P
*SLRTX382* SLR-TX – 382

Seat
No. Set Q
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Management Information system
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Who are the primary users of SCM systems ?
a) Sales, marketing, customer service
b) Accounting, finance, logistics and production
c) Customers, resellers, partners, suppliers and distributors
d) All of the above
2) What are the primary business benefits of an ERP system ?
a) Sales forecasts, sales strategies and marketing campaigns
b) Market demand, resource and capacity constraints and real-time
scheduling
c) Forecasting, planning, purchasing , material management, warehousing,
inventory and distribution
d) All of the above
3) Who are the primary users of ERP systems ?
a) Sales, marketing, customer service
b) Accounting, finance, logistics and production
c) Customers, resellers, partners, suppliers and distributors
d) All of the above
4) If configured correctly, the _________ will prevent interaction with your
computer after a specified time period.
a) firewall b) Filter c) Screen saver d) Popup blocker
5) To recover files from a backup, you perform a
a) Restore b) Scan c) Unerase d) Copy

P.T.O.
SLR-TX – 382 -2- *SLRTX382*
6) Which segment do eBay, Amazon.com belong ?
a) B2Bs b) B2Cs c) C2Bs d) C2Cs
7) Which type of e-commerce focuses on consumers dealing with each
other ?
a) B2B b) B2C c) C2B d) C2C
8) _________ covers the planning, control and administration of the operations
of a concern.
a) Management b) Information c) System d) Transaction
9) The _________ are informed about the progress, achievements and
shortfalls in the activity and the targets.
a) Logical managers b) Functional managers
c) Customers d) Top level managers
10) The information of MIS comes from the
a) Internal source b) External source
c) Both internal and external source d) None of the above
11) The basic components of DSS is are
a) Database b) Model base
c) DSS software system d) All of the above
12) GDSS means
a) Group Decision Support System
b) Group Dedicated Support System
c) General Decision Support System
d) Group Decision Service System
13) _________ competitive strategy develop products and services which are
different from what the competition offers.
a) Cost leadership b) Differentiation c) Cost focus d) Tactical
14) _________ systems are developed in response to corporate business
initiative and give competitive advantage to the organization.
a) Operational information b) Decision information
c) Strategic information d) All
______________

Set Q
*SLRTX382* -3- SLR-TX – 382
Seat
No.
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Management Information system
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
SECTION – I

2. Attempt any four : (4×4=16)


a) What are the different uses of Management Information System ?
b) What are the different characteristics of MIS ?
c) How GDSS can enhance group decision-making in the organization ?
d) What is ESS ? Explain benefits of ESS.
e) What is the concept of strategic information system ?
f) Describe overview of system development life cycle.

3. Attempt any two : (6×2=12)


a) Explain about Information System Software in detail.
b) What is Decision Support Systems (DSS) and also explain characteristics
and applications of decision support systems.
c) Explain causes of information system success and failure in detail.

SECTION – II

4. Attempt any three : (4×3=12)


1) Explain managing information resources in information system.
2) Explain security audit.
3) Explain the concept of e-commerce.
4) Explain the role of CIO.

5. What is ERP ? Explain need features, advantages and growth of ERP. 8


OR
What is e-commerce ? Explain the different types and applications of e-commerce.

6. Write note on : 8
1) Payment Gateway in e-commerce.
2) Supply Chain Management (SCM).
_____________________ Set Q
Set Q
*SLRTX382* SLR-TX – 382

Seat
No. Set R
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Management Information system
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) GDSS means
a) Group Decision Support System
b) Group Dedicated Support System
c) General Decision Support System
d) Group Decision Service System
2) _________ competitive strategy develop products and services which are
different from what the competition offers.
a) Cost leadership b) Differentiation c) Cost focus d) Tactical
3) _________ systems are developed in response to corporate business
initiative and give competitive advantage to the organization.
a) Operational information b) Decision information
c) Strategic information d) All
4) Who are the primary users of SCM systems ?
a) Sales, marketing, customer service
b) Accounting, finance, logistics and production
c) Customers, resellers, partners, suppliers and distributors
d) All of the above
5) What are the primary business benefits of an ERP system ?
a) Sales forecasts, sales strategies and marketing campaigns
b) Market demand, resource and capacity constraints and real-time
scheduling
c) Forecasting, planning, purchasing , material management, warehousing,
inventory and distribution
d) All of the above P.T.O.
SLR-TX – 382 -2- *SLRTX382*
6) Who are the primary users of ERP systems ?
a) Sales, marketing, customer service
b) Accounting, finance, logistics and production
c) Customers, resellers, partners, suppliers and distributors
d) All of the above
7) If configured correctly, the _________ will prevent interaction with your
computer after a specified time period.
a) firewall b) Filter c) Screen saver d) Popup blocker
8) To recover files from a backup, you perform a
a) Restore b) Scan c) Unerase d) Copy
9) Which segment do eBay, Amazon.com belong ?
a) B2Bs b) B2Cs c) C2Bs d) C2Cs
10) Which type of e-commerce focuses on consumers dealing with each
other ?
a) B2B b) B2C c) C2B d) C2C
11) _________ covers the planning, control and administration of the operations
of a concern.
a) Management b) Information c) System d) Transaction
12) The _________ are informed about the progress, achievements and
shortfalls in the activity and the targets.
a) Logical managers b) Functional managers
c) Customers d) Top level managers
13) The information of MIS comes from the
a) Internal source b) External source
c) Both internal and external source d) None of the above
14) The basic components of DSS is are
a) Database b) Model base
c) DSS software system d) All of the above
______________

Set R
*SLRTX382* -3- SLR-TX – 382
Seat
No.
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Management Information system
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
SECTION – I

2. Attempt any four : (4×4=16)


a) What are the different uses of Management Information System ?
b) What are the different characteristics of MIS ?
c) How GDSS can enhance group decision-making in the organization ?
d) What is ESS ? Explain benefits of ESS.
e) What is the concept of strategic information system ?
f) Describe overview of system development life cycle.

3. Attempt any two : (6×2=12)


a) Explain about Information System Software in detail.
b) What is Decision Support Systems (DSS) and also explain characteristics
and applications of decision support systems.
c) Explain causes of information system success and failure in detail.

SECTION – II

4. Attempt any three : (4×3=12)


1) Explain managing information resources in information system.
2) Explain security audit.
3) Explain the concept of e-commerce.
4) Explain the role of CIO.

5. What is ERP ? Explain need features, advantages and growth of ERP. 8


OR
What is e-commerce ? Explain the different types and applications of e-commerce.

6. Write note on : 8
1) Payment Gateway in e-commerce.
2) Supply Chain Management (SCM).
_____________________ Set R
Set R
*SLRTX382* SLR-TX – 382

Seat
No. Set S
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Management Information system
Day and Date : Monday, 19-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Who are the primary users of ERP systems ?
a) Sales, marketing, customer service
b) Accounting, finance, logistics and production
c) Customers, resellers, partners, suppliers and distributors
d) All of the above
2) If configured correctly, the _________ will prevent interaction with your
computer after a specified time period.
a) firewall b) Filter c) Screen saver d) Popup blocker
3) To recover files from a backup, you perform a
a) Restore b) Scan c) Unerase d) Copy
4) Which segment do eBay, Amazon.com belong ?
a) B2Bs b) B2Cs c) C2Bs d) C2Cs
5) Which type of e-commerce focuses on consumers dealing with each
other ?
a) B2B b) B2C c) C2B d) C2C
6) _________ covers the planning, control and administration of the operations
of a concern.
a) Management b) Information c) System d) Transaction
7) The _________ are informed about the progress, achievements and
shortfalls in the activity and the targets.
a) Logical managers b) Functional managers
c) Customers d) Top level managers
P.T.O.
SLR-TX – 382 -2- *SLRTX382*
8) The information of MIS comes from the
a) Internal source b) External source
c) Both internal and external source d) None of the above
9) The basic components of DSS is are
a) Database b) Model base
c) DSS software system d) All of the above
10) GDSS means
a) Group Decision Support System
b) Group Dedicated Support System
c) General Decision Support System
d) Group Decision Service System
11) _________ competitive strategy develop products and services which are
different from what the competition offers.
a) Cost leadership b) Differentiation c) Cost focus d) Tactical
12) _________ systems are developed in response to corporate business
initiative and give competitive advantage to the organization.
a) Operational information b) Decision information
c) Strategic information d) All
13) Who are the primary users of SCM systems ?
a) Sales, marketing, customer service
b) Accounting, finance, logistics and production
c) Customers, resellers, partners, suppliers and distributors
d) All of the above
14) What are the primary business benefits of an ERP system ?
a) Sales forecasts, sales strategies and marketing campaigns
b) Market demand, resource and capacity constraints and real-time
scheduling
c) Forecasting, planning, purchasing , material management, warehousing,
inventory and distribution
d) All of the above
______________

Set S
*SLRTX382* -3- SLR-TX – 382
Seat
No.
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Management Information system
Day and Date : Monday, 19-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
SECTION – I

2. Attempt any four : (4×4=16)


a) What are the different uses of Management Information System ?
b) What are the different characteristics of MIS ?
c) How GDSS can enhance group decision-making in the organization ?
d) What is ESS ? Explain benefits of ESS.
e) What is the concept of strategic information system ?
f) Describe overview of system development life cycle.

3. Attempt any two : (6×2=12)


a) Explain about Information System Software in detail.
b) What is Decision Support Systems (DSS) and also explain characteristics
and applications of decision support systems.
c) Explain causes of information system success and failure in detail.

SECTION – II

4. Attempt any three : (4×3=12)


1) Explain managing information resources in information system.
2) Explain security audit.
3) Explain the concept of e-commerce.
4) Explain the role of CIO.

5. What is ERP ? Explain need features, advantages and growth of ERP. 8


OR
What is e-commerce ? Explain the different types and applications of e-commerce.

6. Write note on : 8
1) Payment Gateway in e-commerce.
2) Supply Chain Management (SCM).
_____________________ Set S
Set S
*SLRTX383* SLR-TX – 383

Seat
No. Set P
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Information and Cyber Security
Day and Date : Tuesday, 20-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) In DES algorithm, if input of an s-box is 110011 then we look for _____ row
of s-box to obtain output.
A) 0 B) 1 C) 2 D) 3
2) Which of the following(s) is (are) block cipher ?
A) DES B) AES C) RC5 D) All of above
3) What is the plaintext of the following ciphertext “I dp d erb” (using Caesar
cipher decryption method k = 3) ?
A) i am a boy B) i am a toy
C) j is b bos D) j am b bos
4) Which of the following algorithm is not used for asymmetric key cryptography ?
A) RSA B) Diffi-Hellman
C) Electronic code book algorithm D) None of mentioned
5) ITU-T Recommendation X-800 defines
A) Security Attack B) Security Service
C) Security Mechanism D) All of above
6) With the ________ mode if there is an error in a block of the transmitted
ciphertext only the corresponding plaintext block is affected.
A) ECB B) CTR C) CBC D) TSR

P.T.O.
SLR-TX – 383 -2- *SLRTX383*
7) gcd(11, –5) and gcd (–11, 5) are ________ and ________ respectively.
A) 1, 1 B) 2, 3 C) 1, 5 D) 2, 5
8) “It is easy to generate a code given a message, but virtually impossible to
generate a message given a code” describes the __________ hash function
property.
A) Collision resistance B) Strong Collision resistance
C) Preimage resistance D) Second preimage resistance
9) SSL Record protocol provides
A) Confidentiality B) Message Intigrity
C) Availability D) Both A) and B)
10) PGP provide _______ and __________ service that can be used for
electronic mail and file storage applications.
A) Integrity, Confidentiality B) Confidentiality, Authentication
C) Integrity, Authentication D) None of above
11) ______ is an open encryption and security specification designed to protect
credit card transaction on internet.
A) SSL B) KET C) SET D) SMTP
12) Following is a tool which attempt to make activity on the internet
untraceable.
A) Proxy Server B) Anonymizer
C) Logic Bomb D) Spywares
13) _______ infect the storage media on which OS is stored and which is
used to start the computer system.
A) Program virus B) Multipartite virus
C) Boot Sector virus D) Polymorphic virus
14) _____ is a software program, self-replicating in nature, which spread through
network also it can send copies through the network with or without user
intervention.
A) Antivirus B) Computer Worm
C) Computer Virus D) All of these

______________

Set P
*SLRTX383* -3- SLR-TX – 383
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


Information and Cyber Security
Day and Date : Tuesday, 20-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three : (3×4=12)


1) Give the encryption and decryption function of Caesar cipher and encrypt
the message with Caesar Cipher technique with key = 3;
“defend the east wall of the castle”
2) Differentiate between conventional encryption and public key encryption.
3) Write a note on Rotor Machine.
4) List and explain message authentication functions.
5) Explain the term confusion and diffusion.

3. Answer any two : (2×8=16)


1) Perform encryption and decryption using RSA
A) p = 3, q = 11, e = 7, M = 5
B) P = 5, q = 11, e = 3, M = 9
2) what are the strength of DES algorithm and explain in detail working of
single round of DES with diagram.
3) Explain different types of security attack.

Set P
SLR-TX – 383 -4- *SLRTX383*

SECTION – II

4. Answer any three : (3×4=12)


1) What is IPSec ? List the application of IPSec.
2) Write short note on transport mode and tunnel mode.
3) Explain the concept of steganography.
4) What is random password ? And give the guidelines applicable to the
password policies.
5) What is phishing ? How it work ?

5. Answer any two : (2×8=16)


1) Explain in detail classification of cybercrime.
2) What are different types of viruses ? Explain in detail.
3) Explain with respect to SSL protocol.
a) Architecture and services
b) SSL Record Protocol.
_____________________

Set P
*SLRTX383* SLR-TX – 383

Seat
No. Set Q
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Information and Cyber Security
Day and Date : Tuesday, 20-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) “It is easy to generate a code given a message, but virtually impossible to
generate a message given a code” describes the __________ hash function
property.
A) Collision resistance B) Strong Collision resistance
C) Preimage resistance D) Second preimage resistance
2) SSL Record protocol provides
A) Confidentiality B) Message Intigrity
C) Availability D) Both A) and B)
3) PGP provide _______ and __________ service that can be used for
electronic mail and file storage applications.
A) Integrity, Confidentiality B) Confidentiality, Authentication
C) Integrity, Authentication D) None of above
4) ______ is an open encryption and security specification designed to protect
credit card transaction on internet.
A) SSL B) KET C) SET D) SMTP
5) Following is a tool which attempt to make activity on the internet
untraceable.
A) Proxy Server B) Anonymizer
C) Logic Bomb D) Spywares
P.T.O.
SLR-TX – 383 -2- *SLRTX383*
6) _______ infect the storage media on which OS is stored and which is
used to start the computer system.
A) Program virus B) Multipartite virus
C) Boot Sector virus D) Polymorphic virus
7) _____ is a software program, self-replicating in nature, which spread through
network also it can send copies through the network with or without user
intervention.
A) Antivirus B) Computer Worm
C) Computer Virus D) All of these
8) In DES algorithm, if input of an s-box is 110011 then we look for _____ row
of s-box to obtain output.
A) 0 B) 1 C) 2 D) 3
9) Which of the following(s) is (are) block cipher ?
A) DES B) AES C) RC5 D) All of above
10) What is the plaintext of the following ciphertext “I dp d erb” (using Caesar
cipher decryption method k = 3) ?
A) i am a boy B) i am a toy
C) j is b bos D) j am b bos
11) Which of the following algorithm is not used for asymmetric key cryptography ?
A) RSA B) Diffi-Hellman
C) Electronic code book algorithm D) None of mentioned
12) ITU-T Recommendation X-800 defines
A) Security Attack B) Security Service
C) Security Mechanism D) All of above
13) With the ________ mode if there is an error in a block of the transmitted
ciphertext only the corresponding plaintext block is affected.
A) ECB B) CTR C) CBC D) TSR
14) gcd(11, –5) and gcd (–11, 5) are ________ and ________ respectively.
A) 1, 1 B) 2, 3 C) 1, 5 D) 2, 5

______________

Set Q
*SLRTX383* -3- SLR-TX – 383
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


Information and Cyber Security
Day and Date : Tuesday, 20-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three : (3×4=12)


1) Give the encryption and decryption function of Caesar cipher and encrypt
the message with Caesar Cipher technique with key = 3;
“defend the east wall of the castle”
2) Differentiate between conventional encryption and public key encryption.
3) Write a note on Rotor Machine.
4) List and explain message authentication functions.
5) Explain the term confusion and diffusion.

3. Answer any two : (2×8=16)


1) Perform encryption and decryption using RSA
A) p = 3, q = 11, e = 7, M = 5
B) P = 5, q = 11, e = 3, M = 9
2) what are the strength of DES algorithm and explain in detail working of
single round of DES with diagram.
3) Explain different types of security attack.

Set Q
SLR-TX – 383 -4- *SLRTX383*

SECTION – II

4. Answer any three : (3×4=12)


1) What is IPSec ? List the application of IPSec.
2) Write short note on transport mode and tunnel mode.
3) Explain the concept of steganography.
4) What is random password ? And give the guidelines applicable to the
password policies.
5) What is phishing ? How it work ?

5. Answer any two : (2×8=16)


1) Explain in detail classification of cybercrime.
2) What are different types of viruses ? Explain in detail.
3) Explain with respect to SSL protocol.
a) Architecture and services
b) SSL Record Protocol.
_____________________

Set Q
*SLRTX383* SLR-TX – 383

Seat
No. Set R
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Information and Cyber Security
Day and Date : Tuesday, 20-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) ITU-T Recommendation X-800 defines
A) Security Attack B) Security Service
C) Security Mechanism D) All of above
2) With the ________ mode if there is an error in a block of the transmitted
ciphertext only the corresponding plaintext block is affected.
A) ECB B) CTR
C) CBC D) TSR
3) gcd(11, –5) and gcd (–11, 5) are ________ and ________ respectively.
A) 1, 1 B) 2, 3
C) 1, 5 D) 2, 5
4) “It is easy to generate a code given a message, but virtually impossible to
generate a message given a code” describes the __________ hash function
property.
A) Collision resistance B) Strong Collision resistance
C) Preimage resistance D) Second preimage resistance
5) SSL Record protocol provides
A) Confidentiality B) Message Intigrity
C) Availability D) Both A) and B)

P.T.O.
SLR-TX – 383 -2- *SLRTX383*
6) PGP provide _______ and __________ service that can be used for
electronic mail and file storage applications.
A) Integrity, Confidentiality B) Confidentiality, Authentication
C) Integrity, Authentication D) None of above
7) ______ is an open encryption and security specification designed to protect
credit card transaction on internet.
A) SSL B) KET C) SET D) SMTP
8) Following is a tool which attempt to make activity on the internet
untraceable.
A) Proxy Server B) Anonymizer
C) Logic Bomb D) Spywares
9) _______ infect the storage media on which OS is stored and which is
used to start the computer system.
A) Program virus B) Multipartite virus
C) Boot Sector virus D) Polymorphic virus
10) _____ is a software program, self-replicating in nature, which spread through
network also it can send copies through the network with or without user
intervention.
A) Antivirus B) Computer Worm
C) Computer Virus D) All of these
11) In DES algorithm, if input of an s-box is 110011 then we look for _____ row
of s-box to obtain output.
A) 0 B) 1 C) 2 D) 3
12) Which of the following(s) is (are) block cipher ?
A) DES B) AES C) RC5 D) All of above
13) What is the plaintext of the following ciphertext “I dp d erb” (using Caesar
cipher decryption method k = 3) ?
A) i am a boy B) i am a toy
C) j is b bos D) j am b bos
14) Which of the following algorithm is not used for asymmetric key cryptography ?
A) RSA B) Diffi-Hellman
C) Electronic code book algorithm D) None of mentioned

______________

Set R
*SLRTX383* -3- SLR-TX – 383
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


Information and Cyber Security
Day and Date : Tuesday, 20-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three : (3×4=12)


1) Give the encryption and decryption function of Caesar cipher and encrypt
the message with Caesar Cipher technique with key = 3;
“defend the east wall of the castle”
2) Differentiate between conventional encryption and public key encryption.
3) Write a note on Rotor Machine.
4) List and explain message authentication functions.
5) Explain the term confusion and diffusion.

3. Answer any two : (2×8=16)


1) Perform encryption and decryption using RSA
A) p = 3, q = 11, e = 7, M = 5
B) P = 5, q = 11, e = 3, M = 9
2) what are the strength of DES algorithm and explain in detail working of
single round of DES with diagram.
3) Explain different types of security attack.

Set R
SLR-TX – 383 -4- *SLRTX383*

SECTION – II

4. Answer any three : (3×4=12)


1) What is IPSec ? List the application of IPSec.
2) Write short note on transport mode and tunnel mode.
3) Explain the concept of steganography.
4) What is random password ? And give the guidelines applicable to the
password policies.
5) What is phishing ? How it work ?

5. Answer any two : (2×8=16)


1) Explain in detail classification of cybercrime.
2) What are different types of viruses ? Explain in detail.
3) Explain with respect to SSL protocol.
a) Architecture and services
b) SSL Record Protocol.
_____________________

Set R
*SLRTX383* SLR-TX – 383

Seat
No. Set S
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Information and Cyber Security
Day and Date : Tuesday, 20-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) PGP provide _______ and __________ service that can be used for
electronic mail and file storage applications.
A) Integrity, Confidentiality B) Confidentiality, Authentication
C) Integrity, Authentication D) None of above
2) ______ is an open encryption and security specification designed to protect
credit card transaction on internet.
A) SSL B) KET C) SET D) SMTP
3) Following is a tool which attempt to make activity on the internet
untraceable.
A) Proxy Server B) Anonymizer
C) Logic Bomb D) Spywares
4) _______ infect the storage media on which OS is stored and which is
used to start the computer system.
A) Program virus B) Multipartite virus
C) Boot Sector virus D) Polymorphic virus
5) _____ is a software program, self-replicating in nature, which spread through
network also it can send copies through the network with or without user
intervention.
A) Antivirus B) Computer Worm
C) Computer Virus D) All of these
P.T.O.
SLR-TX – 383 -2- *SLRTX383*

6) In DES algorithm, if input of an s-box is 110011 then we look for _____ row
of s-box to obtain output.
A) 0 B) 1 C) 2 D) 3
7) Which of the following(s) is (are) block cipher ?
A) DES B) AES C) RC5 D) All of above
8) What is the plaintext of the following ciphertext “I dp d erb” (using Caesar
cipher decryption method k = 3) ?
A) i am a boy B) i am a toy
C) j is b bos D) j am b bos
9) Which of the following algorithm is not used for asymmetric key cryptography ?
A) RSA B) Diffi-Hellman
C) Electronic code book algorithm D) None of mentioned
10) ITU-T Recommendation X-800 defines
A) Security Attack B) Security Service
C) Security Mechanism D) All of above
11) With the ________ mode if there is an error in a block of the transmitted
ciphertext only the corresponding plaintext block is affected.
A) ECB B) CTR C) CBC D) TSR
12) gcd(11, –5) and gcd (–11, 5) are ________ and ________ respectively.
A) 1, 1 B) 2, 3 C) 1, 5 D) 2, 5
13) “It is easy to generate a code given a message, but virtually impossible to
generate a message given a code” describes the __________ hash function
property.
A) Collision resistance B) Strong Collision resistance
C) Preimage resistance D) Second preimage resistance
14) SSL Record protocol provides
A) Confidentiality B) Message Intigrity
C) Availability D) Both A) and B)

______________

Set S
*SLRTX383* -3- SLR-TX – 383
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


Information and Cyber Security
Day and Date : Tuesday, 20-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Answer any three : (3×4=12)


1) Give the encryption and decryption function of Caesar cipher and encrypt
the message with Caesar Cipher technique with key = 3;
“defend the east wall of the castle”
2) Differentiate between conventional encryption and public key encryption.
3) Write a note on Rotor Machine.
4) List and explain message authentication functions.
5) Explain the term confusion and diffusion.

3. Answer any two : (2×8=16)


1) Perform encryption and decryption using RSA
A) p = 3, q = 11, e = 7, M = 5
B) P = 5, q = 11, e = 3, M = 9
2) what are the strength of DES algorithm and explain in detail working of
single round of DES with diagram.
3) Explain different types of security attack.

Set S
SLR-TX – 383 -4- *SLRTX383*

SECTION – II

4. Answer any three : (3×4=12)


1) What is IPSec ? List the application of IPSec.
2) Write short note on transport mode and tunnel mode.
3) Explain the concept of steganography.
4) What is random password ? And give the guidelines applicable to the
password policies.
5) What is phishing ? How it work ?

5. Answer any two : (2×8=16)


1) Explain in detail classification of cybercrime.
2) What are different types of viruses ? Explain in detail.
3) Explain with respect to SSL protocol.
a) Architecture and services
b) SSL Record Protocol.
_____________________

Set S
*SLRTX384* SLR-TX – 384

Seat
No. Set P
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Data warehousing and Mining (Elective – III)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Which of the following are data mining task ?
a) Classification b) SQL query c) Trigger d) None of these
2) In data mining output is Fuzzy.
a) True b) False
3) _________ is an approach to handle missing data.
a) Ignore the missing value b) Assume a value for missing data
c) Fill missing value manually d) All the above
4) Which of the following is a measure task in data preprocessing ?
a) Data transformation b) Classification
c) Clustering d) None of above
5) Which among the following is an example of spatial databases ?
a) Stock price database b) Daily temperature
c) VLSI database d) Super market transaction
6) _________ is one of the method to handle noisy data.
a) Catching b) Crawling
c) Binning d) None of the above
7) Full form of SPADE is
a) Sequential Pattern Discovery using Equivalence Classes
b) Serial Pattern Discovery using Equal Closure
c) Sequence Pattern Disclosure using Equal Classes
d) None
P.T.O.
SLR-TX – 384 -2- *SLRTX384*
8) Which of the following is collection of data object that are similar to one
another within same group ?
a) Partition b) Grid c) Cluster d) Table
9) Classification rules are extracted from
a) Root node b) Decision tree c) Siblings d) Branches
10) In clustering class labels are
a) Known b) Unknown c) Can’t say d) None of these
11) The “IF” - part of a rule is known as
a) Rule antecedent b) Rule consequent
c) Action d) None of these
12) Trend analysis can be done on __________ data.
a) Spatial b) Transaction data
c) Temporal d) None
13) Social network mining can be done by
a) Graph mining b) Tree mining c) Tree pruning d) None
14) _________ is a spatial database primitive.
a) Time b) Direction
c) Transaction item d) None

______________

Set P
*SLRTX384* -3- SLR-TX – 384
Seat
No.
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Data warehousing and Mining (Elective – III)

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I
2. Answer any three of the following : (3×4=12)
1) Explain difference between database processing versus data mining
processing.
2) What are difficulties in Data mining processing ?
3) Explain what do you mean by supervised and unsupervised learning ?
4) Explain OLTP vs OLAP in detail.

3. Solve any one of the following : (1×8=8)


1) Explain classification by decision tree induction.
2) Explain data warehouse design process in detail.

4. Explain KDD process in detail with diagram. 8

SECTION – II

5. Answer any three of the following : (3×4=12)


1) Explain k-means clustering method.
2) Explain in brief spatial data mining and its primitives.
3) Write a note on web mining.
4) Write a note on PAM algorithm.

6. Solve any one of the following : (1×8=8)


1) Explain graph mining and its applications.
2) Explain agglomerative algorithm with example.

7. Explain any five data mining applications in detail. 8

_____________________
Set P
Set P
*SLRTX384* SLR-TX – 384

Seat
No. Set Q
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Data warehousing and Mining (Elective – III)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Which of the following is collection of data object that are similar to one
another within same group ?
a) Partition b) Grid c) Cluster d) Table
2) Classification rules are extracted from
a) Root node b) Decision tree c) Siblings d) Branches
3) In clustering class labels are
a) Known b) Unknown c) Can’t say d) None of these
4) The “IF” - part of a rule is known as
a) Rule antecedent b) Rule consequent
c) Action d) None of these
5) Trend analysis can be done on __________ data.
a) Spatial b) Transaction data
c) Temporal d) None
6) Social network mining can be done by
a) Graph mining b) Tree mining c) Tree pruning d) None
7) _________ is a spatial database primitive.
a) Time b) Direction
c) Transaction item d) None
8) Which of the following are data mining task ?
a) Classification b) SQL query c) Trigger d) None of these

P.T.O.
SLR-TX – 384 -2- *SLRTX384*
9) In data mining output is Fuzzy.
a) True b) False
10) _________ is an approach to handle missing data.
a) Ignore the missing value b) Assume a value for missing data
c) Fill missing value manually d) All the above
11) Which of the following is a measure task in data preprocessing ?
a) Data transformation b) Classification
c) Clustering d) None of above
12) Which among the following is an example of spatial databases ?
a) Stock price database b) Daily temperature
c) VLSI database d) Super market transaction
13) _________ is one of the method to handle noisy data.
a) Catching b) Crawling
c) Binning d) None of the above
14) Full form of SPADE is
a) Sequential Pattern Discovery using Equivalence Classes
b) Serial Pattern Discovery using Equal Closure
c) Sequence Pattern Disclosure using Equal Classes
d) None

______________

Set Q
*SLRTX384* -3- SLR-TX – 384
Seat
No.
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Data warehousing and Mining (Elective – III)

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I
2. Answer any three of the following : (3×4=12)
1) Explain difference between database processing versus data mining
processing.
2) What are difficulties in Data mining processing ?
3) Explain what do you mean by supervised and unsupervised learning ?
4) Explain OLTP vs OLAP in detail.

3. Solve any one of the following : (1×8=8)


1) Explain classification by decision tree induction.
2) Explain data warehouse design process in detail.

4. Explain KDD process in detail with diagram. 8

SECTION – II

5. Answer any three of the following : (3×4=12)


1) Explain k-means clustering method.
2) Explain in brief spatial data mining and its primitives.
3) Write a note on web mining.
4) Write a note on PAM algorithm.

6. Solve any one of the following : (1×8=8)


1) Explain graph mining and its applications.
2) Explain agglomerative algorithm with example.

7. Explain any five data mining applications in detail. 8

_____________________
Set Q
Set Q
*SLRTX384* SLR-TX – 384

Seat
No. Set R
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Data warehousing and Mining (Elective – III)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Which among the following is an example of spatial databases ?
a) Stock price database b) Daily temperature
c) VLSI database d) Super market transaction
2) _________ is one of the method to handle noisy data.
a) Catching b) Crawling
c) Binning d) None of the above
3) Full form of SPADE is
a) Sequential Pattern Discovery using Equivalence Classes
b) Serial Pattern Discovery using Equal Closure
c) Sequence Pattern Disclosure using Equal Classes
d) None
4) Which of the following is collection of data object that are similar to one
another within same group ?
a) Partition b) Grid c) Cluster d) Table
5) Classification rules are extracted from
a) Root node b) Decision tree c) Siblings d) Branches
6) In clustering class labels are
a) Known b) Unknown c) Can’t say d) None of these
7) The “IF” - part of a rule is known as
a) Rule antecedent b) Rule consequent
c) Action d) None of these
P.T.O.
SLR-TX – 384 -2- *SLRTX384*
8) Trend analysis can be done on __________ data.
a) Spatial b) Transaction data
c) Temporal d) None
9) Social network mining can be done by
a) Graph mining b) Tree mining c) Tree pruning d) None
10) _________ is a spatial database primitive.
a) Time b) Direction
c) Transaction item d) None
11) Which of the following are data mining task ?
a) Classification b) SQL query c) Trigger d) None of these
12) In data mining output is Fuzzy.
a) True b) False
13) _________ is an approach to handle missing data.
a) Ignore the missing value b) Assume a value for missing data
c) Fill missing value manually d) All the above
14) Which of the following is a measure task in data preprocessing ?
a) Data transformation b) Classification
c) Clustering d) None of above

______________

Set R
*SLRTX384* -3- SLR-TX – 384
Seat
No.
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Data warehousing and Mining (Elective – III)

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I
2. Answer any three of the following : (3×4=12)
1) Explain difference between database processing versus data mining
processing.
2) What are difficulties in Data mining processing ?
3) Explain what do you mean by supervised and unsupervised learning ?
4) Explain OLTP vs OLAP in detail.

3. Solve any one of the following : (1×8=8)


1) Explain classification by decision tree induction.
2) Explain data warehouse design process in detail.

4. Explain KDD process in detail with diagram. 8

SECTION – II

5. Answer any three of the following : (3×4=12)


1) Explain k-means clustering method.
2) Explain in brief spatial data mining and its primitives.
3) Write a note on web mining.
4) Write a note on PAM algorithm.

6. Solve any one of the following : (1×8=8)


1) Explain graph mining and its applications.
2) Explain agglomerative algorithm with example.

7. Explain any five data mining applications in detail. 8

_____________________
Set R
Set R
*SLRTX384* SLR-TX – 384

Seat
No. Set S
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Data warehousing and Mining (Elective – III)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) In clustering class labels are
a) Known b) Unknown c) Can’t say d) None of these
2) The “IF” - part of a rule is known as
a) Rule antecedent b) Rule consequent
c) Action d) None of these
3) Trend analysis can be done on __________ data.
a) Spatial b) Transaction data
c) Temporal d) None
4) Social network mining can be done by
a) Graph mining b) Tree mining c) Tree pruning d) None
5) _________ is a spatial database primitive.
a) Time b) Direction
c) Transaction item d) None
6) Which of the following are data mining task ?
a) Classification b) SQL query c) Trigger d) None of these
7) In data mining output is Fuzzy.
a) True b) False
8) _________ is an approach to handle missing data.
a) Ignore the missing value b) Assume a value for missing data
c) Fill missing value manually d) All the above

P.T.O.
SLR-TX – 384 -2- *SLRTX384*
9) Which of the following is a measure task in data preprocessing ?
a) Data transformation b) Classification
c) Clustering d) None of above
10) Which among the following is an example of spatial databases ?
a) Stock price database b) Daily temperature
c) VLSI database d) Super market transaction
11) _________ is one of the method to handle noisy data.
a) Catching b) Crawling
c) Binning d) None of the above
12) Full form of SPADE is
a) Sequential Pattern Discovery using Equivalence Classes
b) Serial Pattern Discovery using Equal Closure
c) Sequence Pattern Disclosure using Equal Classes
d) None
13) Which of the following is collection of data object that are similar to one
another within same group ?
a) Partition b) Grid c) Cluster d) Table
14) Classification rules are extracted from
a) Root node b) Decision tree c) Siblings d) Branches

______________

Set S
*SLRTX384* -3- SLR-TX – 384
Seat
No.
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
Data warehousing and Mining (Elective – III)

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I
2. Answer any three of the following : (3×4=12)
1) Explain difference between database processing versus data mining
processing.
2) What are difficulties in Data mining processing ?
3) Explain what do you mean by supervised and unsupervised learning ?
4) Explain OLTP vs OLAP in detail.

3. Solve any one of the following : (1×8=8)


1) Explain classification by decision tree induction.
2) Explain data warehouse design process in detail.

4. Explain KDD process in detail with diagram. 8

SECTION – II

5. Answer any three of the following : (3×4=12)


1) Explain k-means clustering method.
2) Explain in brief spatial data mining and its primitives.
3) Write a note on web mining.
4) Write a note on PAM algorithm.

6. Solve any one of the following : (1×8=8)


1) Explain graph mining and its applications.
2) Explain agglomerative algorithm with example.

7. Explain any five data mining applications in detail. 8

_____________________
Set S
Set S
*SLRTX385* SLR-TX – 385
Seat
No.

Set P
B.E. (Computer Science and Engineering) (Part – II)
(CGPA) Examination, 2018
Elective – III : Image Processing
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) The range of values spanned by the gray scale is called as __________ of
an image.
a) Resolution b) Histogram
c) Dynamic range d) Contrast
2) Black color in image processing is usually represented by the
a) 0 b) 1 c) 255 d) 256
3) Image enhancement approaches fall into two broad categories
a) Spatial domain methods and frequency domain methods
b) Image sensing and acquisition
c) Visible and infrared bands
d) None of these
4) DFT stands for
a) Discrete Fourier transform b) Digital function transform
c) Digital frequency tranform d) None of these

P.T.O.
SLR-TX – 385 -2- *SLRTX385*

5) To remove the correlated image data which of the following image transform
is used.
a) DCT b) DFT
c) K – L transform d) Walsh
6) What is image ?
a) Picture b) Matrix of pixel
c) Collection of pixel d) All of these
7) Detect the three basic types of gray-level discontinuities
a) Points b) Lines c) Edges d) All of these
8) If salt as well as pepper noise is present then it is called
a) Uni-polar b) Bipolar
c) Tri-polar d) Quadra-polar
9) Entropy is measured in terms of
a) bytes/pixel b) bits/pixel
c) both a) and b) d) None of these
10) Hough transform is ___________ processing technique used for edge
linking.
a) Local b) Global c) Point d) Histogram
11) __________ are used to represent a boundary connected by a connected
sequence of straight line segments of specified length and direction.
a) Signatures b) Skeletons
c) Chain codes d) Boundary descriptors
12) A measure of the degree to which a pure color is diluted by white light is
given by
a) Hue b) Intensity c) Cyan d) Saturation
13) For a 8-bit gray scale image, 0-255 is the
a) Gray scale b) Gray level
c) Intensity level d) None of these
14) If the pixels of an image are shuffled then the parameter that may
change is
a) Histogram b) Mean c) Entropy d) Covariance
_____________________

Set P
*SLRTX385* -3- SLR-TX – 385
Seat
No.

B.E. (Computer Science and Engineering) (Part – II)


(CGPA) Examination, 2018
Elective – III : Image Processing

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I

2. Attempt any four : 20

1) What do you mean sampling and quantization ? Explain in detail.

2) Write note on : Region based segmentation.

3) Compare spatial and frequency domain methods.

4) Discuss any four low level image processing operations.

5) Write note on : Geometric transformation.

3. Write note on following, also give its application : 8

1) Contrast stretching

2) Intensity level slicing

3) Bit plane slicing

4) Histogram processing.

OR

Explain different techniques to sharpen the image in frequency domain.

Set P
SLR-TX – 385 -4- *SLRTX385*

SECTION – II

4. Attempt any four : 20

1) Explain length of a boundary.

2) Specify the various image representation approaches.

3) What is DFT ? Explain.

4) Write note on wavelet transform.

5) What is segmentation ? Explain.

5. Define image compression. Explain the characteristics of lossy and lossless


compression. 8

OR

Define chain codes. Explain the three different types of polygonal


approximations.

_____________________

Set P
*SLRTX385* SLR-TX – 385
Seat
No.

Set Q
B.E. (Computer Science and Engineering) (Part – II)
(CGPA) Examination, 2018
Elective – III : Image Processing
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) If salt as well as pepper noise is present then it is called
a) Uni-polar b) Bipolar
c) Tri-polar d) Quadra-polar
2) Entropy is measured in terms of
a) bytes/pixel b) bits/pixel
c) both a) and b) d) None of these
3) Hough transform is ___________ processing technique used for edge
linking.
a) Local b) Global c) Point d) Histogram
4) __________ are used to represent a boundary connected by a connected
sequence of straight line segments of specified length and direction.
a) Signatures b) Skeletons
c) Chain codes d) Boundary descriptors
5) A measure of the degree to which a pure color is diluted by white light is
given by
a) Hue b) Intensity c) Cyan d) Saturation

P.T.O.
SLR-TX – 385 -2- *SLRTX385*

6) For a 8-bit gray scale image, 0-255 is the


a) Gray scale b) Gray level
c) Intensity level d) None of these
7) If the pixels of an image are shuffled then the parameter that may
change is
a) Histogram b) Mean c) Entropy d) Covariance
8) The range of values spanned by the gray scale is called as __________ of
an image.
a) Resolution b) Histogram
c) Dynamic range d) Contrast
9) Black color in image processing is usually represented by the
a) 0 b) 1 c) 255 d) 256
10) Image enhancement approaches fall into two broad categories
a) Spatial domain methods and frequency domain methods
b) Image sensing and acquisition
c) Visible and infrared bands
d) None of these
11) DFT stands for
a) Discrete Fourier transform b) Digital function transform
c) Digital frequency tranform d) None of these
12) To remove the correlated image data which of the following image transform
is used.
a) DCT b) DFT
c) K – L transform d) Walsh
13) What is image ?
a) Picture b) Matrix of pixel
c) Collection of pixel d) All of these
14) Detect the three basic types of gray-level discontinuities
a) Points b) Lines c) Edges d) All of these
_____________________

Set Q
*SLRTX385* -3- SLR-TX – 385
Seat
No.

B.E. (Computer Science and Engineering) (Part – II)


(CGPA) Examination, 2018
Elective – III : Image Processing

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I

2. Attempt any four : 20

1) What do you mean sampling and quantization ? Explain in detail.

2) Write note on : Region based segmentation.

3) Compare spatial and frequency domain methods.

4) Discuss any four low level image processing operations.

5) Write note on : Geometric transformation.

3. Write note on following, also give its application : 8

1) Contrast stretching

2) Intensity level slicing

3) Bit plane slicing

4) Histogram processing.

OR

Explain different techniques to sharpen the image in frequency domain.

Set Q
SLR-TX – 385 -4- *SLRTX385*

SECTION – II

4. Attempt any four : 20

1) Explain length of a boundary.

2) Specify the various image representation approaches.

3) What is DFT ? Explain.

4) Write note on wavelet transform.

5) What is segmentation ? Explain.

5. Define image compression. Explain the characteristics of lossy and lossless


compression. 8

OR

Define chain codes. Explain the three different types of polygonal


approximations.

_____________________

Set Q
*SLRTX385* SLR-TX – 385
Seat
No.

Set R
B.E. (Computer Science and Engineering) (Part – II)
(CGPA) Examination, 2018
Elective – III : Image Processing
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) To remove the correlated image data which of the following image transform
is used.
a) DCT b) DFT
c) K – L transform d) Walsh
2) What is image ?
a) Picture b) Matrix of pixel
c) Collection of pixel d) All of these
3) Detect the three basic types of gray-level discontinuities
a) Points b) Lines c) Edges d) All of these
4) If salt as well as pepper noise is present then it is called
a) Uni-polar b) Bipolar
c) Tri-polar d) Quadra-polar
5) Entropy is measured in terms of
a) bytes/pixel b) bits/pixel
c) both a) and b) d) None of these

P.T.O.
SLR-TX – 385 -2- *SLRTX385*

6) Hough transform is ___________ processing technique used for edge


linking.
a) Local b) Global c) Point d) Histogram
7) __________ are used to represent a boundary connected by a connected
sequence of straight line segments of specified length and direction.
a) Signatures b) Skeletons
c) Chain codes d) Boundary descriptors
8) A measure of the degree to which a pure color is diluted by white light is
given by
a) Hue b) Intensity c) Cyan d) Saturation
9) For a 8-bit gray scale image, 0-255 is the
a) Gray scale b) Gray level
c) Intensity level d) None of these
10) If the pixels of an image are shuffled then the parameter that may
change is
a) Histogram b) Mean c) Entropy d) Covariance
11) The range of values spanned by the gray scale is called as __________ of
an image.
a) Resolution b) Histogram
c) Dynamic range d) Contrast
12) Black color in image processing is usually represented by the
a) 0 b) 1 c) 255 d) 256
13) Image enhancement approaches fall into two broad categories
a) Spatial domain methods and frequency domain methods
b) Image sensing and acquisition
c) Visible and infrared bands
d) None of these
14) DFT stands for
a) Discrete Fourier transform b) Digital function transform
c) Digital frequency tranform d) None of these
_____________________

Set R
*SLRTX385* -3- SLR-TX – 385
Seat
No.

B.E. (Computer Science and Engineering) (Part – II)


(CGPA) Examination, 2018
Elective – III : Image Processing

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I

2. Attempt any four : 20

1) What do you mean sampling and quantization ? Explain in detail.

2) Write note on : Region based segmentation.

3) Compare spatial and frequency domain methods.

4) Discuss any four low level image processing operations.

5) Write note on : Geometric transformation.

3. Write note on following, also give its application : 8

1) Contrast stretching

2) Intensity level slicing

3) Bit plane slicing

4) Histogram processing.

OR

Explain different techniques to sharpen the image in frequency domain.

Set R
SLR-TX – 385 -4- *SLRTX385*

SECTION – II

4. Attempt any four : 20

1) Explain length of a boundary.

2) Specify the various image representation approaches.

3) What is DFT ? Explain.

4) Write note on wavelet transform.

5) What is segmentation ? Explain.

5. Define image compression. Explain the characteristics of lossy and lossless


compression. 8

OR

Define chain codes. Explain the three different types of polygonal


approximations.

_____________________

Set R
*SLRTX385* SLR-TX – 385
Seat
No.

Set S
B.E. (Computer Science and Engineering) (Part – II)
(CGPA) Examination, 2018
Elective – III : Image Processing
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : 14


1) Hough transform is ___________ processing technique used for edge
linking.
a) Local b) Global c) Point d) Histogram
2) __________ are used to represent a boundary connected by a connected
sequence of straight line segments of specified length and direction.
a) Signatures b) Skeletons
c) Chain codes d) Boundary descriptors
3) A measure of the degree to which a pure color is diluted by white light is
given by
a) Hue b) Intensity c) Cyan d) Saturation
4) For a 8-bit gray scale image, 0-255 is the
a) Gray scale b) Gray level
c) Intensity level d) None of these
5) If the pixels of an image are shuffled then the parameter that may
change is
a) Histogram b) Mean c) Entropy d) Covariance
P.T.O.
SLR-TX – 385 -2- *SLRTX385*

6) The range of values spanned by the gray scale is called as __________ of


an image.
a) Resolution b) Histogram
c) Dynamic range d) Contrast
7) Black color in image processing is usually represented by the
a) 0 b) 1 c) 255 d) 256
8) Image enhancement approaches fall into two broad categories
a) Spatial domain methods and frequency domain methods
b) Image sensing and acquisition
c) Visible and infrared bands
d) None of these
9) DFT stands for
a) Discrete Fourier transform b) Digital function transform
c) Digital frequency tranform d) None of these
10) To remove the correlated image data which of the following image transform
is used.
a) DCT b) DFT
c) K – L transform d) Walsh
11) What is image ?
a) Picture b) Matrix of pixel
c) Collection of pixel d) All of these
12) Detect the three basic types of gray-level discontinuities
a) Points b) Lines c) Edges d) All of these
13) If salt as well as pepper noise is present then it is called
a) Uni-polar b) Bipolar
c) Tri-polar d) Quadra-polar
14) Entropy is measured in terms of
a) bytes/pixel b) bits/pixel
c) both a) and b) d) None of these
_____________________

Set S
*SLRTX385* -3- SLR-TX – 385
Seat
No.

B.E. (Computer Science and Engineering) (Part – II)


(CGPA) Examination, 2018
Elective – III : Image Processing

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I

2. Attempt any four : 20

1) What do you mean sampling and quantization ? Explain in detail.

2) Write note on : Region based segmentation.

3) Compare spatial and frequency domain methods.

4) Discuss any four low level image processing operations.

5) Write note on : Geometric transformation.

3. Write note on following, also give its application : 8

1) Contrast stretching

2) Intensity level slicing

3) Bit plane slicing

4) Histogram processing.

OR

Explain different techniques to sharpen the image in frequency domain.

Set S
SLR-TX – 385 -4- *SLRTX385*

SECTION – II

4. Attempt any four : 20

1) Explain length of a boundary.

2) Specify the various image representation approaches.

3) What is DFT ? Explain.

4) Write note on wavelet transform.

5) What is segmentation ? Explain.

5. Define image compression. Explain the characteristics of lossy and lossless


compression. 8

OR

Define chain codes. Explain the three different types of polygonal


approximations.

_____________________

Set S
*SLRTX386* SLR-TX – 386

Seat
No. Set P
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
INFORMATION RETRIEVAL (elective – III) (CGPA)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : 14
1) The order in which the words are listed in a dictionary or telephone guide is
called
a) Lexicographical order b) Chronological order
c) Archival order d) None of the above
2) Index terms are generally
a) Nouns b) Adverbs c) Adjectives d) Connectives
3) All the documents in an IR system are stored in
a) Secondary memory b) Central repository system
c) Tape drive d) All of these
4) An information retrieval model is a ___________ model.
a) Single b) Double
c) Quadruple d) None of the above
5) Boolean model is a simple retrieval model based on _________ theory.
a) Logic b) Set and binary
c) Octal number d) Relational
6) Phrase is a sequence of __________ queries.
a) Double word b) Single word
c) Boolean d) Vector
7) Abusive availability of commercial information disguised in form of
informational content is
a) Web spam b) Web crawling
c) Web hosting d) None of these
P.T.O.
SLR-TX – 386 -2- *SLRTX386*

8) Sequential scanning may be slow, because


i) Distance computation might be expensive
ii) The database size ‘N’ might be huge
iii) It uses spatial access method
iv) None of these
a) ii and iii b) i and ii c) i and iii d) only iv
9) MULTOS data model is based on
a) Client architecture b) Server architecture
c) Client/server architecture d) None of the above
10) Multimedia system contain
a) Only text b) Images and graphics
c) Sound and Video d) All above ‘3’ options
11) LOB data types in the multimedia data support can be used to stored
a) Large unstructured data object b) Binary large object
c) Character large object data d) None of the above
12) Metacrawler and savvy search are the example of
a) Metasearches b) Crawlers
c) Gatherers d) Brokers
13) Harvest uses a _________ architecture, to gather and distribute data.
a) Distributed b) Hybrid
c) Centralized d) None of these
14) GEMINI approach is based on
a) ‘Quick-and-dirty’ test b) ‘Quick’ test
c) SGML d) HTML
______________

Set P
*SLRTX386* -3- SLR-TX – 386
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) Examination, 2018


INFORMATION RETRIEVAL (elective – III) (CGPA)

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)


a) State the difference between data retrieval and information retrieval.
b) Write a short note on information retrieval.
c) Define and describe the Boolean model for information retrieval.
d) In brief explain the probabilistic model.
e) Explain the concept of recall and precision.

3. Attempt any two : (2×8=16)


a) With a neat block schematic explain the process of retrieving information.
b) Explain the construction of suffix arrays for large text.
c) How BM (Boyer-Moore Family) algorithm works for the following pattern
“abracadabra” ?

SECTION – II

4. Attempt any three : (3×4=12)


a) Explain attribute predicates, structural predicates and semantic
predicates.
b) Explain the MULTOS data model using conceptual structure in detail with
example.
c) Discuss any four challenges posed by web.
d) Explain spatial access methods of multimedia IR indexing and searching.

Set P
SLR-TX – 386 -4- *SLRTX386*

5. Attempt any one : (1×8=8)


a) Explain the basic idea of GEMINI and show how GEMINI overcomes the
two disadvantages of sequential searching.
OR
b) Explain the architectural issues in the digital libraries in details.

6. Attempting this question is compulsory : (1×8=8)


Explain and draw the complete conceptual structure of the type generic-letter
and business-product-letter using the MULTOS data model.
_____________________

Set P
*SLRTX386* SLR-TX – 386

Seat
No. Set Q
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
INFORMATION RETRIEVAL (elective – III) (CGPA)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : 14
1) Sequential scanning may be slow, because
i) Distance computation might be expensive
ii) The database size ‘N’ might be huge
iii) It uses spatial access method
iv) None of these
a) ii and iii b) i and ii c) i and iii d) only iv
2) MULTOS data model is based on
a) Client architecture b) Server architecture
c) Client/server architecture d) None of the above
3) Multimedia system contain
a) Only text b) Images and graphics
c) Sound and Video d) All above ‘3’ options
4) LOB data types in the multimedia data support can be used to stored
a) Large unstructured data object b) Binary large object
c) Character large object data d) None of the above
5) Metacrawler and savvy search are the example of
a) Metasearches b) Crawlers
c) Gatherers d) Brokers
P.T.O.
SLR-TX – 386 -2- *SLRTX386*

6) Harvest uses a _________ architecture, to gather and distribute data.


a) Distributed b) Hybrid
c) Centralized d) None of these
7) GEMINI approach is based on
a) ‘Quick-and-dirty’ test b) ‘Quick’ test
c) SGML d) HTML
8) The order in which the words are listed in a dictionary or telephone guide is
called
a) Lexicographical order b) Chronological order
c) Archival order d) None of the above
9) Index terms are generally
a) Nouns b) Adverbs c) Adjectives d) Connectives
10) All the documents in an IR system are stored in
a) Secondary memory b) Central repository system
c) Tape drive d) All of these
11) An information retrieval model is a ___________ model.
a) Single b) Double
c) Quadruple d) None of the above
12) Boolean model is a simple retrieval model based on _________ theory.
a) Logic b) Set and binary
c) Octal number d) Relational
13) Phrase is a sequence of __________ queries.
a) Double word b) Single word
c) Boolean d) Vector
14) Abusive availability of commercial information disguised in form of
informational content is
a) Web spam b) Web crawling
c) Web hosting d) None of these
______________

Set Q
*SLRTX386* -3- SLR-TX – 386
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) Examination, 2018


INFORMATION RETRIEVAL (elective – III) (CGPA)

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)


a) State the difference between data retrieval and information retrieval.
b) Write a short note on information retrieval.
c) Define and describe the Boolean model for information retrieval.
d) In brief explain the probabilistic model.
e) Explain the concept of recall and precision.

3. Attempt any two : (2×8=16)


a) With a neat block schematic explain the process of retrieving information.
b) Explain the construction of suffix arrays for large text.
c) How BM (Boyer-Moore Family) algorithm works for the following pattern
“abracadabra” ?

SECTION – II

4. Attempt any three : (3×4=12)


a) Explain attribute predicates, structural predicates and semantic
predicates.
b) Explain the MULTOS data model using conceptual structure in detail with
example.
c) Discuss any four challenges posed by web.
d) Explain spatial access methods of multimedia IR indexing and searching.

Set Q
SLR-TX – 386 -4- *SLRTX386*

5. Attempt any one : (1×8=8)


a) Explain the basic idea of GEMINI and show how GEMINI overcomes the
two disadvantages of sequential searching.
OR
b) Explain the architectural issues in the digital libraries in details.

6. Attempting this question is compulsory : (1×8=8)


Explain and draw the complete conceptual structure of the type generic-letter
and business-product-letter using the MULTOS data model.
_____________________

Set Q
*SLRTX386* SLR-TX – 386

Seat
No. Set R
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
INFORMATION RETRIEVAL (elective – III) (CGPA)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : 14
1) Boolean model is a simple retrieval model based on _________ theory.
a) Logic b) Set and binary
c) Octal number d) Relational
2) Phrase is a sequence of __________ queries.
a) Double word b) Single word
c) Boolean d) Vector
3) Abusive availability of commercial information disguised in form of
informational content is
a) Web spam b) Web crawling
c) Web hosting d) None of these
4) Sequential scanning may be slow, because
i) Distance computation might be expensive
ii) The database size ‘N’ might be huge
iii) It uses spatial access method
iv) None of these
a) ii and iii b) i and ii c) i and iii d) only iv
5) MULTOS data model is based on
a) Client architecture b) Server architecture
c) Client/server architecture d) None of the above

P.T.O.
SLR-TX – 386 -2- *SLRTX386*

6) Multimedia system contain


a) Only text b) Images and graphics
c) Sound and Video d) All above ‘3’ options
7) LOB data types in the multimedia data support can be used to stored
a) Large unstructured data object b) Binary large object
c) Character large object data d) None of the above
8) Metacrawler and savvy search are the example of
a) Metasearches b) Crawlers
c) Gatherers d) Brokers
9) Harvest uses a _________ architecture, to gather and distribute data.
a) Distributed b) Hybrid
c) Centralized d) None of these
10) GEMINI approach is based on
a) ‘Quick-and-dirty’ test b) ‘Quick’ test
c) SGML d) HTML
11) The order in which the words are listed in a dictionary or telephone guide is
called
a) Lexicographical order b) Chronological order
c) Archival order d) None of the above
12) Index terms are generally
a) Nouns b) Adverbs c) Adjectives d) Connectives
13) All the documents in an IR system are stored in
a) Secondary memory b) Central repository system
c) Tape drive d) All of these
14) An information retrieval model is a ___________ model.
a) Single b) Double
c) Quadruple d) None of the above
______________

Set R
*SLRTX386* -3- SLR-TX – 386
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) Examination, 2018


INFORMATION RETRIEVAL (elective – III) (CGPA)

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)


a) State the difference between data retrieval and information retrieval.
b) Write a short note on information retrieval.
c) Define and describe the Boolean model for information retrieval.
d) In brief explain the probabilistic model.
e) Explain the concept of recall and precision.

3. Attempt any two : (2×8=16)


a) With a neat block schematic explain the process of retrieving information.
b) Explain the construction of suffix arrays for large text.
c) How BM (Boyer-Moore Family) algorithm works for the following pattern
“abracadabra” ?

SECTION – II

4. Attempt any three : (3×4=12)


a) Explain attribute predicates, structural predicates and semantic
predicates.
b) Explain the MULTOS data model using conceptual structure in detail with
example.
c) Discuss any four challenges posed by web.
d) Explain spatial access methods of multimedia IR indexing and searching.

Set R
SLR-TX – 386 -4- *SLRTX386*

5. Attempt any one : (1×8=8)


a) Explain the basic idea of GEMINI and show how GEMINI overcomes the
two disadvantages of sequential searching.
OR
b) Explain the architectural issues in the digital libraries in details.

6. Attempting this question is compulsory : (1×8=8)


Explain and draw the complete conceptual structure of the type generic-letter
and business-product-letter using the MULTOS data model.
_____________________

Set R
*SLRTX386* SLR-TX – 386

Seat
No. Set S
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
INFORMATION RETRIEVAL (elective – III) (CGPA)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first 30


minutes in Answer Book Page No. 3. Each question carries
one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : 14
1) Multimedia system contain
a) Only text b) Images and graphics
c) Sound and Video d) All above ‘3’ options
2) LOB data types in the multimedia data support can be used to stored
a) Large unstructured data object b) Binary large object
c) Character large object data d) None of the above
3) Metacrawler and savvy search are the example of
a) Metasearches b) Crawlers
c) Gatherers d) Brokers
4) Harvest uses a _________ architecture, to gather and distribute data.
a) Distributed b) Hybrid
c) Centralized d) None of these
5) GEMINI approach is based on
a) ‘Quick-and-dirty’ test b) ‘Quick’ test
c) SGML d) HTML
6) The order in which the words are listed in a dictionary or telephone guide is
called
a) Lexicographical order b) Chronological order
c) Archival order d) None of the above
P.T.O.
SLR-TX – 386 -2- *SLRTX386*

7) Index terms are generally


a) Nouns b) Adverbs c) Adjectives d) Connectives
8) All the documents in an IR system are stored in
a) Secondary memory b) Central repository system
c) Tape drive d) All of these
9) An information retrieval model is a ___________ model.
a) Single b) Double
c) Quadruple d) None of the above
10) Boolean model is a simple retrieval model based on _________ theory.
a) Logic b) Set and binary
c) Octal number d) Relational
11) Phrase is a sequence of __________ queries.
a) Double word b) Single word
c) Boolean d) Vector
12) Abusive availability of commercial information disguised in form of
informational content is
a) Web spam b) Web crawling
c) Web hosting d) None of these
13) Sequential scanning may be slow, because
i) Distance computation might be expensive
ii) The database size ‘N’ might be huge
iii) It uses spatial access method
iv) None of these
a) ii and iii b) i and ii c) i and iii d) only iv
14) MULTOS data model is based on
a) Client architecture b) Server architecture
c) Client/server architecture d) None of the above
______________

Set S
*SLRTX386* -3- SLR-TX – 386
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) Examination, 2018


INFORMATION RETRIEVAL (elective – III) (CGPA)

Day and Date : Thursday, 22-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (3×4=12)


a) State the difference between data retrieval and information retrieval.
b) Write a short note on information retrieval.
c) Define and describe the Boolean model for information retrieval.
d) In brief explain the probabilistic model.
e) Explain the concept of recall and precision.

3. Attempt any two : (2×8=16)


a) With a neat block schematic explain the process of retrieving information.
b) Explain the construction of suffix arrays for large text.
c) How BM (Boyer-Moore Family) algorithm works for the following pattern
“abracadabra” ?

SECTION – II

4. Attempt any three : (3×4=12)


a) Explain attribute predicates, structural predicates and semantic
predicates.
b) Explain the MULTOS data model using conceptual structure in detail with
example.
c) Discuss any four challenges posed by web.
d) Explain spatial access methods of multimedia IR indexing and searching.

Set S
SLR-TX – 386 -4- *SLRTX386*

5. Attempt any one : (1×8=8)


a) Explain the basic idea of GEMINI and show how GEMINI overcomes the
two disadvantages of sequential searching.
OR
b) Explain the architectural issues in the digital libraries in details.

6. Attempting this question is compulsory : (1×8=8)


Explain and draw the complete conceptual structure of the type generic-letter
and business-product-letter using the MULTOS data model.
_____________________

Set S
*SLRTX387* SLR-TX – 387

Seat
No.
Set P
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
cloud computing (Elective – III)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1×14=14)
1) Which of the following architectural standards is working with cloud computing
industry ?
a) Service-oriented architecture b) Standardized web services
c) Web-application frameworks d) All of the mentioned
2) Which of the following is one of the unique attribute of Cloud Computing ?
a) utility type of delivery b) elasticity
c) low barrier to entry d) all of the mentioned
3) Which of the following is a virtual machine technology now owned by Oracle
that can run various operating systems ?
a) V machines b) Virtual Box
c) Thought Police d) None of the mentioned
4) The technology used to distribute service requests to resources is referred
to as
a) load performing b) load scheduling
c) load balancing d) all of the mentioned
5) Point out the correct statement
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control
structures
c) SaaS is an operating environment with applications, management, and
the user interface
d) All of the mentioned
P.T.O.
SLR-TX – 387 -2- *SLRTX387*
6) Which of the following area of cloud computing is uniquely troublesome ?
a) Auditing b) Data integrity
c) e-Discovery for legal compliance d) All of the mentioned
7) Which of the following is cross-platform API based on generalizing the major
cloud vendors APIs ?
a) Deltacloud b) Simple Cloud API
c) Design Cloud d) All of the mentioned
8) ___________ supports load balancing.
a) Amazon b) Sales Force
c) Microsoft Azure d) All of the mentioned
9) Which of the following network resources can be load balanced ?
a) Connections through intelligent switches
b) DNS
c) Storage resources
d) All of the mentioned
10) An operating system running on a Type _____ VM is a full virtualization.
a) 1 b) 2
c) 3 d) All of the mentioned
11) Which of the following is application and infrastructure management software
for hybrid multi-clouds ?
a) VMware Hyperic b) Webmetrics
c) Univa UD d) Tapinsystems
12) How many aspects needs to be considered while assessing network
capacity ?
a) one b) two
c) three d) all of the mentioned
13) Which of the following service provider provides the highest level of service ?
a) SaaS b) PaaS
c) IaaS d) All of the mentioned
14) For the __________ model, the security boundary may be defined for the
vendor to include the software framework and middleware layer.
a) SaaS b) PaaS
c) IaaS d) All of the mentioned
________________

Set P
*SLRTX387* -3- SLR-TX – 387
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


cloud computing (Elective – III)
Day and Date : Thursday, 22-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) All questions are compulsory.
2) Figures to right indicate full marks.
SECTION – I

2. Attempt any three : (3×4=12)


a) Discuss benefits and challenges of cloud computing.
b) Which are the building blocks of private cloud ? Explain any two in detail.
c) Write short note on public cloud.
d) Explain server security challenges in cloud computing.

3. Attempt any one : (1×8=8)


a) Discuss role of virtualization in cloud computing.
b) Give cloud security reference model and explain the same.

4. Give implementation steps for any one of the public cloud ( AWS, Windows
Azure, IBM or Rackspace). 8
SECTION – II

5. Attempt any three questions : (4×3=12)


a) Explain selection criteria for cloud deployment.
b) Explain future technology trends in cloud computing service models.
c) Explain various Biz clouds focused on Education industry domains.
d) Explain advantages and disadvantages of multi cloud management.
e) Explain security issues with multi cloud architecture.

6. Attempt any one question : (1×8=8)


a) Explain Multi-Cloud management concept.
b) Explain current issues in cloud computing.

7. Attempt the following question : (1×8=8)


Explain various Biz clouds focused on retail industry domains.

_____________________
Set P
Set P
*SLRTX387* SLR-TX – 387

Seat
No.
Set Q
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
cloud computing (Elective – III)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1×14=14)
1) ___________ supports load balancing.
a) Amazon b) Sales Force
c) Microsoft Azure d) All of the mentioned
2) Which of the following network resources can be load balanced ?
a) Connections through intelligent switches
b) DNS
c) Storage resources
d) All of the mentioned
3) An operating system running on a Type _____ VM is a full virtualization.
a) 1 b) 2
c) 3 d) All of the mentioned
4) Which of the following is application and infrastructure management software
for hybrid multi-clouds ?
a) VMware Hyperic b) Webmetrics
c) Univa UD d) Tapinsystems
5) How many aspects needs to be considered while assessing network
capacity ?
a) one b) two
c) three d) all of the mentioned
6) Which of the following service provider provides the highest level of service ?
a) SaaS b) PaaS
c) IaaS d) All of the mentioned
P.T.O.
SLR-TX – 387 -2- *SLRTX387*
7) For the __________ model, the security boundary may be defined for the
vendor to include the software framework and middleware layer.
a) SaaS b) PaaS
c) IaaS d) All of the mentioned
8) Which of the following architectural standards is working with cloud computing
industry ?
a) Service-oriented architecture b) Standardized web services
c) Web-application frameworks d) All of the mentioned
9) Which of the following is one of the unique attribute of Cloud Computing ?
a) utility type of delivery b) elasticity
c) low barrier to entry d) all of the mentioned
10) Which of the following is a virtual machine technology now owned by Oracle
that can run various operating systems ?
a) V machines b) Virtual Box
c) Thought Police d) None of the mentioned
11) The technology used to distribute service requests to resources is referred
to as
a) load performing b) load scheduling
c) load balancing d) all of the mentioned
12) Point out the correct statement
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control
structures
c) SaaS is an operating environment with applications, management, and
the user interface
d) All of the mentioned
13) Which of the following area of cloud computing is uniquely troublesome ?
a) Auditing b) Data integrity
c) e-Discovery for legal compliance d) All of the mentioned
14) Which of the following is cross-platform API based on generalizing the major
cloud vendors APIs ?
a) Deltacloud b) Simple Cloud API
c) Design Cloud d) All of the mentioned
________________

Set Q
*SLRTX387* -3- SLR-TX – 387
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


cloud computing (Elective – III)
Day and Date : Thursday, 22-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) All questions are compulsory.
2) Figures to right indicate full marks.
SECTION – I

2. Attempt any three : (3×4=12)


a) Discuss benefits and challenges of cloud computing.
b) Which are the building blocks of private cloud ? Explain any two in detail.
c) Write short note on public cloud.
d) Explain server security challenges in cloud computing.

3. Attempt any one : (1×8=8)


a) Discuss role of virtualization in cloud computing.
b) Give cloud security reference model and explain the same.

4. Give implementation steps for any one of the public cloud ( AWS, Windows
Azure, IBM or Rackspace). 8
SECTION – II

5. Attempt any three questions : (4×3=12)


a) Explain selection criteria for cloud deployment.
b) Explain future technology trends in cloud computing service models.
c) Explain various Biz clouds focused on Education industry domains.
d) Explain advantages and disadvantages of multi cloud management.
e) Explain security issues with multi cloud architecture.

6. Attempt any one question : (1×8=8)


a) Explain Multi-Cloud management concept.
b) Explain current issues in cloud computing.

7. Attempt the following question : (1×8=8)


Explain various Biz clouds focused on retail industry domains.

_____________________
Set Q
Set Q
*SLRTX387* SLR-TX – 387

Seat
No.
Set R
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
cloud computing (Elective – III)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1×14=14)
1) Point out the correct statement
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control
structures
c) SaaS is an operating environment with applications, management, and
the user interface
d) All of the mentioned
2) Which of the following area of cloud computing is uniquely troublesome ?
a) Auditing b) Data integrity
c) e-Discovery for legal compliance d) All of the mentioned
3) Which of the following is cross-platform API based on generalizing the major
cloud vendors APIs ?
a) Deltacloud b) Simple Cloud API
c) Design Cloud d) All of the mentioned
4) ___________ supports load balancing.
a) Amazon b) Sales Force
c) Microsoft Azure d) All of the mentioned
5) Which of the following network resources can be load balanced ?
a) Connections through intelligent switches
b) DNS
c) Storage resources
d) All of the mentioned
P.T.O.
SLR-TX – 387 -2- *SLRTX387*
6) An operating system running on a Type _____ VM is a full virtualization.
a) 1 b) 2
c) 3 d) All of the mentioned
7) Which of the following is application and infrastructure management software
for hybrid multi-clouds ?
a) VMware Hyperic b) Webmetrics
c) Univa UD d) Tapinsystems
8) How many aspects needs to be considered while assessing network
capacity ?
a) one b) two
c) three d) all of the mentioned
9) Which of the following service provider provides the highest level of service ?
a) SaaS b) PaaS
c) IaaS d) All of the mentioned
10) For the __________ model, the security boundary may be defined for the
vendor to include the software framework and middleware layer.
a) SaaS b) PaaS
c) IaaS d) All of the mentioned
11) Which of the following architectural standards is working with cloud computing
industry ?
a) Service-oriented architecture b) Standardized web services
c) Web-application frameworks d) All of the mentioned
12) Which of the following is one of the unique attribute of Cloud Computing ?
a) utility type of delivery b) elasticity
c) low barrier to entry d) all of the mentioned
13) Which of the following is a virtual machine technology now owned by Oracle
that can run various operating systems ?
a) V machines b) Virtual Box
c) Thought Police d) None of the mentioned
14) The technology used to distribute service requests to resources is referred
to as
a) load performing b) load scheduling
c) load balancing d) all of the mentioned
________________

Set R
*SLRTX387* -3- SLR-TX – 387
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


cloud computing (Elective – III)
Day and Date : Thursday, 22-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) All questions are compulsory.
2) Figures to right indicate full marks.
SECTION – I

2. Attempt any three : (3×4=12)


a) Discuss benefits and challenges of cloud computing.
b) Which are the building blocks of private cloud ? Explain any two in detail.
c) Write short note on public cloud.
d) Explain server security challenges in cloud computing.

3. Attempt any one : (1×8=8)


a) Discuss role of virtualization in cloud computing.
b) Give cloud security reference model and explain the same.

4. Give implementation steps for any one of the public cloud ( AWS, Windows
Azure, IBM or Rackspace). 8
SECTION – II

5. Attempt any three questions : (4×3=12)


a) Explain selection criteria for cloud deployment.
b) Explain future technology trends in cloud computing service models.
c) Explain various Biz clouds focused on Education industry domains.
d) Explain advantages and disadvantages of multi cloud management.
e) Explain security issues with multi cloud architecture.

6. Attempt any one question : (1×8=8)


a) Explain Multi-Cloud management concept.
b) Explain current issues in cloud computing.

7. Attempt the following question : (1×8=8)


Explain various Biz clouds focused on retail industry domains.

_____________________
Set R
Set R
*SLRTX387* SLR-TX – 387

Seat
No.
Set S
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
cloud computing (Elective – III)
Day and Date : Thursday, 22-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.
4) Figures to right indicate full marks.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1×14=14)
1) An operating system running on a Type _____ VM is a full virtualization.
a) 1 b) 2
c) 3 d) All of the mentioned
2) Which of the following is application and infrastructure management software
for hybrid multi-clouds ?
a) VMware Hyperic b) Webmetrics
c) Univa UD d) Tapinsystems
3) How many aspects needs to be considered while assessing network
capacity ?
a) one b) two
c) three d) all of the mentioned
4) Which of the following service provider provides the highest level of service ?
a) SaaS b) PaaS
c) IaaS d) All of the mentioned
5) For the __________ model, the security boundary may be defined for the
vendor to include the software framework and middleware layer.
a) SaaS b) PaaS
c) IaaS d) All of the mentioned
6) Which of the following architectural standards is working with cloud computing
industry ?
a) Service-oriented architecture b) Standardized web services
c) Web-application frameworks d) All of the mentioned
P.T.O.
SLR-TX – 387 -2- *SLRTX387*
7) Which of the following is one of the unique attribute of Cloud Computing ?
a) utility type of delivery b) elasticity
c) low barrier to entry d) all of the mentioned
8) Which of the following is a virtual machine technology now owned by Oracle
that can run various operating systems ?
a) V machines b) Virtual Box
c) Thought Police d) None of the mentioned
9) The technology used to distribute service requests to resources is referred
to as
a) load performing b) load scheduling
c) load balancing d) all of the mentioned
10) Point out the correct statement
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control
structures
c) SaaS is an operating environment with applications, management, and
the user interface
d) All of the mentioned
11) Which of the following area of cloud computing is uniquely troublesome ?
a) Auditing b) Data integrity
c) e-Discovery for legal compliance d) All of the mentioned
12) Which of the following is cross-platform API based on generalizing the major
cloud vendors APIs ?
a) Deltacloud b) Simple Cloud API
c) Design Cloud d) All of the mentioned
13) ___________ supports load balancing.
a) Amazon b) Sales Force
c) Microsoft Azure d) All of the mentioned
14) Which of the following network resources can be load balanced ?
a) Connections through intelligent switches
b) DNS
c) Storage resources
d) All of the mentioned
________________

Set S
*SLRTX387* -3- SLR-TX – 387
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


cloud computing (Elective – III)
Day and Date : Thursday, 22-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) All questions are compulsory.
2) Figures to right indicate full marks.
SECTION – I

2. Attempt any three : (3×4=12)


a) Discuss benefits and challenges of cloud computing.
b) Which are the building blocks of private cloud ? Explain any two in detail.
c) Write short note on public cloud.
d) Explain server security challenges in cloud computing.

3. Attempt any one : (1×8=8)


a) Discuss role of virtualization in cloud computing.
b) Give cloud security reference model and explain the same.

4. Give implementation steps for any one of the public cloud ( AWS, Windows
Azure, IBM or Rackspace). 8
SECTION – II

5. Attempt any three questions : (4×3=12)


a) Explain selection criteria for cloud deployment.
b) Explain future technology trends in cloud computing service models.
c) Explain various Biz clouds focused on Education industry domains.
d) Explain advantages and disadvantages of multi cloud management.
e) Explain security issues with multi cloud architecture.

6. Attempt any one question : (1×8=8)


a) Explain Multi-Cloud management concept.
b) Explain current issues in cloud computing.

7. Attempt the following question : (1×8=8)


Explain various Biz clouds focused on retail industry domains.

_____________________
Set S
Set S
*SLRTX388* SLR-TX – 388

Seat
No.
Set P
B.E. (Computer Science and Engineering) (Part – II) (CGPA Pattern)
Examination, 2018
storage aRea network (Elective – IV)
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1×14=14)
1) I/O requests to disk storage on a SAN are called
a) File I/Os b) SAN I/Os c) Block I/Os d) Disk I/Os
2) What is the name of raid module in a Linux kernel ?
a) lvm b) raidsoft
c) md d) none of the mentioned
3) What is the most basic level of storage ?
a) SAN b) DAS c) NAS d) ISCSI
4) Which topology is best suited for medium sized enterprise ?
a) NAS b) SAN
c) DAS d) None of the mentioned
5) Which FC layer is responsible for exchange/frame and sequence
management ?
a) Layer 0 b) Layer 1 c) Layer 2 d) Layer 4 (ULP)
6) Which of the following backup technique is most space efficient ?
a) Full backup b) Incremental backup
c) Differential backup d) All of the mentioned
7) Network level virtualization in a SAN fabric can be implemented by having
virtualization engine running in
a) HBA b) FC switch
c) Raid array d) None of the mentioned P.T.O.
SLR-TX – 388 -2- *SLRTX388*
8) SMI-S Standard uses
a) Java RMI b) CIM-XML/HTTP
c) CORBA d) .NET
9) What is the unique characteristic of RAID 6 (Choose one) ?
a) Distributed parity
b) Striping
c) Two independent distributed parity
d) Mirroring
10) Backup of the source data can be created
a) On the same device b) On another device
c) At some other location d) All of the mentioned
11) Which are all the statements valid statements w.r.t. volume manager ?
a) Achieve protection against single/multiple disk failures
b) Sustain system/node failure
c) Get better performance compared to using individual disk
d) All of the mentioned
12) This is the pooling of physical storage from multiple network storage devices
into what appears to be a single storage device that is managed from a
central console.
a) Server provisioning b) Data mining
c) Disk/Tape virtualization d) None of the mentioned
13) There are endless rules and regulations in this area of storage
technology.
a) Data Protection b) Data Storage Management
c) Database Management d) Meta Data Management
14) Which command is used to view NFS shared directories ?
a) share b) shareall c) sharetab d) dfshares

________________

Set P
*SLRTX388* -3- SLR-TX – 388
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) (CGPA Pattern)


Examination, 2018
storage aRea network (Elective – IV)
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Solve any four : (4×4=16)
a) Explain instant copy and remote mirroring.
b) Explain storage centric IT architecture.
c) Explain point to point topology of fibre SAN.
d) Explain shared disk file system.
e) Explain definition of storage virtualization with neat diagram.
3. Solve any two : (2×6=12)
a) Limitations of server centric architecture and application of storage centric
architecture.
b) Explain fibre channel protocol stack.
c) Explain storage virtualization on various levels of storage network.
SECTION – II
4. Solve any four : (4×4=16)
a) How clustering is used for load distribution ?
b) Write a note on dynamic tape library sharing.
c) What are different components of server backup ?
d) Write and explain general condition of network backup.
e) Explain Network management data protocol.
5. Solve any two : (2×6=12)
a) Explain adaptability and scalability of IT system.
b) Explain any two next generation backup.
c) Write performance bottleneck of network backup.
_____________________

Set P
Set P
*SLRTX388* SLR-TX – 388

Seat
No.
Set Q
B.E. (Computer Science and Engineering) (Part – II) (CGPA Pattern)
Examination, 2018
storage aRea network (Elective – IV)
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1×14=14)
1) SMI-S Standard uses
a) Java RMI b) CIM-XML/HTTP
c) CORBA d) .NET
2) What is the unique characteristic of RAID 6 (Choose one) ?
a) Distributed parity
b) Striping
c) Two independent distributed parity
d) Mirroring
3) Backup of the source data can be created
a) On the same device b) On another device
c) At some other location d) All of the mentioned
4) Which are all the statements valid statements w.r.t. volume manager ?
a) Achieve protection against single/multiple disk failures
b) Sustain system/node failure
c) Get better performance compared to using individual disk
d) All of the mentioned
5) This is the pooling of physical storage from multiple network storage devices
into what appears to be a single storage device that is managed from a
central console.
a) Server provisioning b) Data mining
c) Disk/Tape virtualization d) None of the mentioned P.T.O.
SLR-TX – 388 -2- *SLRTX388*
6) There are endless rules and regulations in this area of storage
technology.
a) Data Protection b) Data Storage Management
c) Database Management d) Meta Data Management
7) Which command is used to view NFS shared directories ?
a) share b) shareall c) sharetab d) dfshares
8) I/O requests to disk storage on a SAN are called
a) File I/Os b) SAN I/Os c) Block I/Os d) Disk I/Os
9) What is the name of raid module in a Linux kernel ?
a) lvm b) raidsoft
c) md d) none of the mentioned
10) What is the most basic level of storage ?
a) SAN b) DAS c) NAS d) ISCSI
11) Which topology is best suited for medium sized enterprise ?
a) NAS b) SAN
c) DAS d) None of the mentioned
12) Which FC layer is responsible for exchange/frame and sequence
management ?
a) Layer 0 b) Layer 1 c) Layer 2 d) Layer 4 (ULP)
13) Which of the following backup technique is most space efficient ?
a) Full backup b) Incremental backup
c) Differential backup d) All of the mentioned
14) Network level virtualization in a SAN fabric can be implemented by having
virtualization engine running in
a) HBA b) FC switch
c) Raid array d) None of the mentioned

________________

Set Q
*SLRTX388* -3- SLR-TX – 388
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) (CGPA Pattern)


Examination, 2018
storage aRea network (Elective – IV)
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Solve any four : (4×4=16)
a) Explain instant copy and remote mirroring.
b) Explain storage centric IT architecture.
c) Explain point to point topology of fibre SAN.
d) Explain shared disk file system.
e) Explain definition of storage virtualization with neat diagram.
3. Solve any two : (2×6=12)
a) Limitations of server centric architecture and application of storage centric
architecture.
b) Explain fibre channel protocol stack.
c) Explain storage virtualization on various levels of storage network.
SECTION – II
4. Solve any four : (4×4=16)
a) How clustering is used for load distribution ?
b) Write a note on dynamic tape library sharing.
c) What are different components of server backup ?
d) Write and explain general condition of network backup.
e) Explain Network management data protocol.
5. Solve any two : (2×6=12)
a) Explain adaptability and scalability of IT system.
b) Explain any two next generation backup.
c) Write performance bottleneck of network backup.
_____________________

Set Q
Set Q
*SLRTX388* SLR-TX – 388

Seat
No.
Set R
B.E. (Computer Science and Engineering) (Part – II) (CGPA Pattern)
Examination, 2018
storage aRea network (Elective – IV)
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1×14=14)
1) Which FC layer is responsible for exchange/frame and sequence
management ?
a) Layer 0 b) Layer 1 c) Layer 2 d) Layer 4 (ULP)
2) Which of the following backup technique is most space efficient ?
a) Full backup b) Incremental backup
c) Differential backup d) All of the mentioned
3) Network level virtualization in a SAN fabric can be implemented by having
virtualization engine running in
a) HBA b) FC switch
c) Raid array d) None of the mentioned
4) SMI-S Standard uses
a) Java RMI b) CIM-XML/HTTP
c) CORBA d) .NET
5) What is the unique characteristic of RAID 6 (Choose one) ?
a) Distributed parity
b) Striping
c) Two independent distributed parity
d) Mirroring
6) Backup of the source data can be created
a) On the same device b) On another device
c) At some other location d) All of the mentioned
P.T.O.
SLR-TX – 388 -2- *SLRTX388*
7) Which are all the statements valid statements w.r.t. volume manager ?
a) Achieve protection against single/multiple disk failures
b) Sustain system/node failure
c) Get better performance compared to using individual disk
d) All of the mentioned
8) This is the pooling of physical storage from multiple network storage devices
into what appears to be a single storage device that is managed from a
central console.
a) Server provisioning b) Data mining
c) Disk/Tape virtualization d) None of the mentioned
9) There are endless rules and regulations in this area of storage
technology.
a) Data Protection b) Data Storage Management
c) Database Management d) Meta Data Management
10) Which command is used to view NFS shared directories ?
a) share b) shareall c) sharetab d) dfshares
11) I/O requests to disk storage on a SAN are called
a) File I/Os b) SAN I/Os c) Block I/Os d) Disk I/Os
12) What is the name of raid module in a Linux kernel ?
a) lvm b) raidsoft
c) md d) none of the mentioned
13) What is the most basic level of storage ?
a) SAN b) DAS c) NAS d) ISCSI
14) Which topology is best suited for medium sized enterprise ?
a) NAS b) SAN
c) DAS d) None of the mentioned

________________

Set R
*SLRTX388* -3- SLR-TX – 388
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) (CGPA Pattern)


Examination, 2018
storage aRea network (Elective – IV)
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Solve any four : (4×4=16)
a) Explain instant copy and remote mirroring.
b) Explain storage centric IT architecture.
c) Explain point to point topology of fibre SAN.
d) Explain shared disk file system.
e) Explain definition of storage virtualization with neat diagram.
3. Solve any two : (2×6=12)
a) Limitations of server centric architecture and application of storage centric
architecture.
b) Explain fibre channel protocol stack.
c) Explain storage virtualization on various levels of storage network.
SECTION – II
4. Solve any four : (4×4=16)
a) How clustering is used for load distribution ?
b) Write a note on dynamic tape library sharing.
c) What are different components of server backup ?
d) Write and explain general condition of network backup.
e) Explain Network management data protocol.
5. Solve any two : (2×6=12)
a) Explain adaptability and scalability of IT system.
b) Explain any two next generation backup.
c) Write performance bottleneck of network backup.
_____________________

Set R
Set R
*SLRTX388* SLR-TX – 388

Seat
No.
Set S
B.E. (Computer Science and Engineering) (Part – II) (CGPA Pattern)
Examination, 2018
storage aRea network (Elective – IV)
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
MCQ/Objective Type Questions
Duration : 30 Minutes Marks : 14
1. Choose the correct answer : (1×14=14)
1) Backup of the source data can be created
a) On the same device b) On another device
c) At some other location d) All of the mentioned
2) Which are all the statements valid statements w.r.t. volume manager ?
a) Achieve protection against single/multiple disk failures
b) Sustain system/node failure
c) Get better performance compared to using individual disk
d) All of the mentioned
3) This is the pooling of physical storage from multiple network storage devices
into what appears to be a single storage device that is managed from a
central console.
a) Server provisioning b) Data mining
c) Disk/Tape virtualization d) None of the mentioned
4) There are endless rules and regulations in this area of storage
technology.
a) Data Protection b) Data Storage Management
c) Database Management d) Meta Data Management
5) Which command is used to view NFS shared directories ?
a) share b) shareall
c) sharetab d) dfshares
P.T.O.
SLR-TX – 388 -2- *SLRTX388*
6) I/O requests to disk storage on a SAN are called
a) File I/Os b) SAN I/Os c) Block I/Os d) Disk I/Os
7) What is the name of raid module in a Linux kernel ?
a) lvm b) raidsoft
c) md d) none of the mentioned
8) What is the most basic level of storage ?
a) SAN b) DAS c) NAS d) ISCSI
9) Which topology is best suited for medium sized enterprise ?
a) NAS b) SAN
c) DAS d) None of the mentioned
10) Which FC layer is responsible for exchange/frame and sequence
management ?
a) Layer 0 b) Layer 1 c) Layer 2 d) Layer 4 (ULP)
11) Which of the following backup technique is most space efficient ?
a) Full backup b) Incremental backup
c) Differential backup d) All of the mentioned
12) Network level virtualization in a SAN fabric can be implemented by having
virtualization engine running in
a) HBA b) FC switch
c) Raid array d) None of the mentioned
13) SMI-S Standard uses
a) Java RMI b) CIM-XML/HTTP
c) CORBA d) .NET
14) What is the unique characteristic of RAID 6 (Choose one) ?
a) Distributed parity
b) Striping
c) Two independent distributed parity
d) Mirroring
________________

Set S
*SLRTX388* -3- SLR-TX – 388
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) (CGPA Pattern)


Examination, 2018
storage aRea network (Elective – IV)
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I
2. Solve any four : (4×4=16)
a) Explain instant copy and remote mirroring.
b) Explain storage centric IT architecture.
c) Explain point to point topology of fibre SAN.
d) Explain shared disk file system.
e) Explain definition of storage virtualization with neat diagram.
3. Solve any two : (2×6=12)
a) Limitations of server centric architecture and application of storage centric
architecture.
b) Explain fibre channel protocol stack.
c) Explain storage virtualization on various levels of storage network.
SECTION – II
4. Solve any four : (4×4=16)
a) How clustering is used for load distribution ?
b) Write a note on dynamic tape library sharing.
c) What are different components of server backup ?
d) Write and explain general condition of network backup.
e) Explain Network management data protocol.
5. Solve any two : (2×6=12)
a) Explain adaptability and scalability of IT system.
b) Explain any two next generation backup.
c) Write performance bottleneck of network backup.
_____________________

Set S
Set S
*SLRTX389* SLR-TX – 389
Seat
No.
Set P

B.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
Elective – IV : Web 2.0 And RicH internet APplication
Day and Date : Monday, 26-11-2018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative :


1) Mashups are generally ___________ or hosted online.
a) Client applications b) Server side
c) Both a) and b) d) None of the above
2) ___________ is to protect data and passwords.
a) Encryption b) Authentication
c) Authorization d) Non-repudiation
3) ___________ function creates a message digest out of a message.
a) Encryption b) Decryption
c) Hash d) None of the above
4) Message ________ means that the sender and the receiver expect privacy.
a) Confidentiality b) Integrity
c) Authentication d) None of the above
5) Which of the following jQuery method removes all child nodes from the
set of matched elements ?
a) empty ( ) b) delete ( )
c) remove (expr) d) None of the above

P.T.O.
SLR-TX – 389 -2- *SLRTX389*
6) Which of the following is true about Web services ?
a) Web services are open standard (XML, SOAP, HTTP etc.) based Web
applications
b) Web services interact with other web applications for the purpose of
exchanging data
c) Web services can convert your existing applications into web-applications
d) All of the above
7) What are all the controls of AJAX ?
a) Script Manager b) Script
c) Manager d) None of the above
8) AJAX stands for
a) Asynchronous Javascript and XML
b) Abstract JSON and XML
c) Another Java Abstraction for X-windows
d) Another Java and XML Library
9) Validation kind of parsers is
a) Well-formed b) Well-documented
c) Non-validating and validating d) None of the above
10) Which of the following HTTP method more secure ?
a) GET b) DELETE c) POST d) PUT
11) The primary goal of the ________ protocol is to provide a private channel
between communicating application, which ensures privacy of data
authentication of the partners and integrity.
a) SSL b) ESP c) TSL d) PSL
12) A piece of icon or image on a web page associated with another web
page is called
a) url b) hyperlink
c) plugin d) none of the mentioned
13) What is the name of the DLL that contains Ajax control tool kit ?
a) Controltoolkit.dll b) Ajaxcontroltoolkit.dll
c) ajax.dll d) Allcontroltoolkit.dll
14) XPath is syntax for defining parts of __________
a) XML document b) HTML document
c) DTD document d) All of the above
_____________

Set P
*SLRTX389* -3- SLR-TX – 389
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
Elective – IV : Web 2.0 And RicH internet APplication
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (4�3=12)


1) What is a web feed ?
2) What is the different between Web 1.0 and Web 2.0 ?
3) Mention what are the HTTP methods supported by REST.
4) What are all the controls of Ajax ?
5) Explain the working of XSLT.

3. Attempt any two : (2�8=16)


1) Explain syndication and microformats in brief.
2) Explain XLink, XPath and XForms with an example.
3) What is REST ? Explain in brief.

SECTION – II

4. Attempt any three : (4�3=12)


1) Why we use mashups ? Explain in detail.
2) What is JSON and how JSON can be served in WS ?
3) What are the Business strategies in web 2.0 ?
4) How the message encryption is done in web security ?

5. Attempt any two : (2�8=16)


1) Give a syntax rules for XQuery.
2) Define authentication and authorization in web.
3) Explain Mapping mashup. Give an example for mapping mashup.
_____________

Set P
Set P
*SLRTX389* SLR-TX – 389
Seat
No.
Set Q

B.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
Elective – IV : Web 2.0 And RicH internet APplication
Day and Date : Monday, 26-11-2018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative :


1) AJAX stands for
a) Asynchronous Javascript and XML
b) Abstract JSON and XML
c) Another Java Abstraction for X-windows
d) Another Java and XML Library
2) Validation kind of parsers is
a) Well-formed b) Well-documented
c) Non-validating and validating d) None of the above
3) Which of the following HTTP method more secure ?
a) GET b) DELETE c) POST d) PUT
4) The primary goal of the ________ protocol is to provide a private channel
between communicating application, which ensures privacy of data
authentication of the partners and integrity.
a) SSL b) ESP c) TSL d) PSL
5) A piece of icon or image on a web page associated with another web
page is called
a) url b) hyperlink
c) plugin d) none of the mentioned
P.T.O.
SLR-TX – 389 -2- *SLRTX389*
6) What is the name of the DLL that contains Ajax control tool kit ?
a) Controltoolkit.dll b) Ajaxcontroltoolkit.dll
c) ajax.dll d) Allcontroltoolkit.dll
7) XPath is syntax for defining parts of __________
a) XML document b) HTML document
c) DTD document d) All of the above
8) Mashups are generally ___________ or hosted online.
a) Client applications b) Server side
c) Both a) and b) d) None of the above
9) ___________ is to protect data and passwords.
a) Encryption b) Authentication
c) Authorization d) Non-repudiation
10) ___________ function creates a message digest out of a message.
a) Encryption b) Decryption
c) Hash d) None of the above
11) Message ________ means that the sender and the receiver expect privacy.
a) Confidentiality b) Integrity
c) Authentication d) None of the above
12) Which of the following jQuery method removes all child nodes from the
set of matched elements ?
a) empty ( ) b) delete ( )
c) remove (expr) d) None of the above
13) Which of the following is true about Web services ?
a) Web services are open standard (XML, SOAP, HTTP etc.) based Web
applications
b) Web services interact with other web applications for the purpose of
exchanging data
c) Web services can convert your existing applications into web-applications
d) All of the above
14) What are all the controls of AJAX ?
a) Script Manager b) Script
c) Manager d) None of the above

_____________

Set Q
*SLRTX389* -3- SLR-TX – 389
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
Elective – IV : Web 2.0 And RicH internet APplication
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (4�3=12)


1) What is a web feed ?
2) What is the different between Web 1.0 and Web 2.0 ?
3) Mention what are the HTTP methods supported by REST.
4) What are all the controls of Ajax ?
5) Explain the working of XSLT.

3. Attempt any two : (2�8=16)


1) Explain syndication and microformats in brief.
2) Explain XLink, XPath and XForms with an example.
3) What is REST ? Explain in brief.

SECTION – II

4. Attempt any three : (4�3=12)


1) Why we use mashups ? Explain in detail.
2) What is JSON and how JSON can be served in WS ?
3) What are the Business strategies in web 2.0 ?
4) How the message encryption is done in web security ?

5. Attempt any two : (2�8=16)


1) Give a syntax rules for XQuery.
2) Define authentication and authorization in web.
3) Explain Mapping mashup. Give an example for mapping mashup.
_____________

Set Q
Set Q
*SLRTX389* SLR-TX – 389
Seat
No.
Set R

B.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
Elective – IV : Web 2.0 And RicH internet APplication
Day and Date : Monday, 26-11-2018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative :


1) Which of the following jQuery method removes all child nodes from the
set of matched elements ?
a) empty ( ) b) delete ( )
c) remove (expr) d) None of the above
2) Which of the following is true about Web services ?
a) Web services are open standard (XML, SOAP, HTTP etc.) based Web
applications
b) Web services interact with other web applications for the purpose of
exchanging data
c) Web services can convert your existing applications into web-applications
d) All of the above
3) What are all the controls of AJAX ?
a) Script Manager b) Script
c) Manager d) None of the above
4) AJAX stands for
a) Asynchronous Javascript and XML
b) Abstract JSON and XML
c) Another Java Abstraction for X-windows
d) Another Java and XML Library P.T.O.
SLR-TX – 389 -2- *SLRTX389*
5) Validation kind of parsers is
a) Well-formed b) Well-documented
c) Non-validating and validating d) None of the above
6) Which of the following HTTP method more secure ?
a) GET b) DELETE c) POST d) PUT
7) The primary goal of the ________ protocol is to provide a private channel
between communicating application, which ensures privacy of data
authentication of the partners and integrity.
a) SSL b) ESP c) TSL d) PSL
8) A piece of icon or image on a web page associated with another web
page is called
a) url b) hyperlink
c) plugin d) none of the mentioned
9) What is the name of the DLL that contains Ajax control tool kit ?
a) Controltoolkit.dll b) Ajaxcontroltoolkit.dll
c) ajax.dll d) Allcontroltoolkit.dll
10) XPath is syntax for defining parts of __________
a) XML document b) HTML document
c) DTD document d) All of the above
11) Mashups are generally ___________ or hosted online.
a) Client applications b) Server side
c) Both a) and b) d) None of the above
12) ___________ is to protect data and passwords.
a) Encryption b) Authentication
c) Authorization d) Non-repudiation
13) ___________ function creates a message digest out of a message.
a) Encryption b) Decryption
c) Hash d) None of the above
14) Message ________ means that the sender and the receiver expect privacy.
a) Confidentiality b) Integrity
c) Authentication d) None of the above
_____________

Set R
*SLRTX389* -3- SLR-TX – 389
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
Elective – IV : Web 2.0 And RicH internet APplication
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (4�3=12)


1) What is a web feed ?
2) What is the different between Web 1.0 and Web 2.0 ?
3) Mention what are the HTTP methods supported by REST.
4) What are all the controls of Ajax ?
5) Explain the working of XSLT.

3. Attempt any two : (2�8=16)


1) Explain syndication and microformats in brief.
2) Explain XLink, XPath and XForms with an example.
3) What is REST ? Explain in brief.

SECTION – II

4. Attempt any three : (4�3=12)


1) Why we use mashups ? Explain in detail.
2) What is JSON and how JSON can be served in WS ?
3) What are the Business strategies in web 2.0 ?
4) How the message encryption is done in web security ?

5. Attempt any two : (2�8=16)


1) Give a syntax rules for XQuery.
2) Define authentication and authorization in web.
3) Explain Mapping mashup. Give an example for mapping mashup.
_____________

Set R
Set R
*SLRTX389* SLR-TX – 389
Seat
No.
Set S

B.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
Elective – IV : Web 2.0 And RicH internet APplication
Day and Date : Monday, 26-11-2018 Total Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No.
3 only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose correct alternative :


1) Which of the following HTTP method more secure ?
a) GET b) DELETE c) POST d) PUT
2) The primary goal of the ________ protocol is to provide a private channel
between communicating application, which ensures privacy of data
authentication of the partners and integrity.
a) SSL b) ESP c) TSL d) PSL
3) A piece of icon or image on a web page associated with another web
page is called
a) url b) hyperlink
c) plugin d) none of the mentioned
4) What is the name of the DLL that contains Ajax control tool kit ?
a) Controltoolkit.dll b) Ajaxcontroltoolkit.dll
c) ajax.dll d) Allcontroltoolkit.dll
5) XPath is syntax for defining parts of __________
a) XML document b) HTML document
c) DTD document d) All of the above

P.T.O.
SLR-TX – 389 -2- *SLRTX389*
6) Mashups are generally ___________ or hosted online.
a) Client applications b) Server side
c) Both a) and b) d) None of the above
7) ___________ is to protect data and passwords.
a) Encryption b) Authentication
c) Authorization d) Non-repudiation
8) ___________ function creates a message digest out of a message.
a) Encryption b) Decryption
c) Hash d) None of the above
9) Message ________ means that the sender and the receiver expect privacy.
a) Confidentiality b) Integrity
c) Authentication d) None of the above
10) Which of the following jQuery method removes all child nodes from the
set of matched elements ?
a) empty ( ) b) delete ( )
c) remove (expr) d) None of the above
11) Which of the following is true about Web services ?
a) Web services are open standard (XML, SOAP, HTTP etc.) based Web
applications
b) Web services interact with other web applications for the purpose of
exchanging data
c) Web services can convert your existing applications into web-applications
d) All of the above
12) What are all the controls of AJAX ?
a) Script Manager b) Script
c) Manager d) None of the above
13) AJAX stands for
a) Asynchronous Javascript and XML
b) Abstract JSON and XML
c) Another Java Abstraction for X-windows
d) Another Java and XML Library
14) Validation kind of parsers is
a) Well-formed b) Well-documented
c) Non-validating and validating d) None of the above
_____________
Set S
*SLRTX389* -3- SLR-TX – 389
Seat
No.

B.E. (Computer Science and Engineering) (Part – II) (CGPA)


Examination, 2018
Elective – IV : Web 2.0 And RicH internet APplication
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

SECTION – I

2. Attempt any three : (4�3=12)


1) What is a web feed ?
2) What is the different between Web 1.0 and Web 2.0 ?
3) Mention what are the HTTP methods supported by REST.
4) What are all the controls of Ajax ?
5) Explain the working of XSLT.

3. Attempt any two : (2�8=16)


1) Explain syndication and microformats in brief.
2) Explain XLink, XPath and XForms with an example.
3) What is REST ? Explain in brief.

SECTION – II

4. Attempt any three : (4�3=12)


1) Why we use mashups ? Explain in detail.
2) What is JSON and how JSON can be served in WS ?
3) What are the Business strategies in web 2.0 ?
4) How the message encryption is done in web security ?

5. Attempt any two : (2�8=16)


1) Give a syntax rules for XQuery.
2) Define authentication and authorization in web.
3) Explain Mapping mashup. Give an example for mapping mashup.
_____________

Set S
Set S
*SLRTX390* SLR-TX – 390
Seat
No. Set P
B.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
Artificial Neural Networks (Elective – IV)

Day and Date : Monday, 26-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Widrow-Hoff learning law is a special case of __________ learning law.
a) Hardlimit b) Hebbs c) Delta d) Correlation
2) Delta learning law is applicable only if the activation function is differentiable.
a) True b) False c) Can’t say d) None
3) In _________, group of input patterns corresponds to the same output
pattern.
a) Pattern Mapping b) Pattern Classification
c) Pattern Association d) None
4) MaxNet is Competitive Neural Network.
a) True b) False c) Can’t say d) None
5) _________ neural network is used for Consonant Vowel Recognition.
a) Multilayer Perceptron b) Adaline
c) Time-delay neural networks d) None

P.T.O.
SLR-TX – 390 -2- *SLRTX390*
6) Competitive neural network is used for
a) Pattern Association b) Pattern Storage
c) Pattern Grouping d) None
7) There exists central control for processing information in brain as in
computer.
a) True b) False c) Can’t say d) None
8) Which of the following model has ability to learn ?
a) McCulloch-pitts model
b) Perceptron model
c) Both Perceptron and McCulloch-Pitts model
d) None
9) __________ carry signal from one cell body to another cell body.
a) Dendrite b) Synapse c) Axon d) None
10) In Perceptron learning law, weight can be initialized to any random value.
a) True b) False c) Can’t say d) None
11) Convolutional network is multilayer feedforward neural network.
a) True b) False c) Can’t say d) None
12) Feedforward neural network is used for
a) Pattern Association b) Pattern Classification
c) Pattern Mapping d) All of these
13) In supervised learning, for given set of input target output is known.
a) True b) False c) Can’t say d) None
14) In Hebbs law, weights are initialized to any random value.
a) True b) False c) Can’t say d) None

____________

Set P
*SLRTX390* -3- SLR-TX – 390
Seat
No.
B.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
Artificial Neural Networks (Elective – IV)

Day and Date : Monday, 26-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I
2. Answer any four of the following : (4×4=16)
a) Describe Adaline Model.
b) Explain Widrow-Hoff learning law.
c) What is linear separability ? Explain with example.
d) Explain Perceptron learning law.
e) Describe McCulloch-Pitts Model.
f) Explain Hebb’s learning law.

3. Answer any two of the following : (2×6=12)


1) Explain the working of Backpropagation algorithm in detail. Also derive
weight change rule for input to hidden weights and hidden to output weights.
2) Explain briefly the terms Cellbody, Axon, Synapse and Dendrite with
reference to Biological Neural Network.
3) Design and Train Perceptron Neural Network to recognize following pattern.
(Initialize learning rate eta = 0.3, Weights w1 = 0.2, w2 = 0.3, bias b = 0.1)
Input 1 Input 2 Output
1 1 0
1 0 0
0 1 1
0 0 0
Find number of Iterations/Epoch required to train the network and also
determine updated weight values.
Set P
SLR-TX – 390 -4- *SLRTX390*
SECTION – II

4. Answer any four of the following : (4×4=16)


a) Explain Pattern Mapping.
b) Differentiate between Feedforward and Feedback Neural Network.
c) Explain the working of Hamming Neural Network.
d) Differentiate between Pattern Association and Pattern Classification.
e) Explain working of MaxNet Competitive Network.
f) Differentiate between Feedback and Competitive Neural Network.

5. Answer any two of the following : (2×6=12)


a) Explain application of neural network in recognition of consonant vowel
segments.
b) Explain application of Hamming Network in Recognition of Olympic Game
Symbols.
c) Explain application of neural network NETTalk in conversion of text to
speech.
_______________

Set P
*SLRTX390* SLR-TX – 390
Seat
No. Set Q
B.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
Artificial Neural Networks (Elective – IV)

Day and Date : Monday, 26-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) Which of the following model has ability to learn ?
a) McCulloch-pitts model
b) Perceptron model
c) Both Perceptron and McCulloch-Pitts model
d) None
2) __________ carry signal from one cell body to another cell body.
a) Dendrite b) Synapse c) Axon d) None
3) In Perceptron learning law, weight can be initialized to any random value.
a) True b) False c) Can’t say d) None
4) Convolutional network is multilayer feedforward neural network.
a) True b) False c) Can’t say d) None

P.T.O.
SLR-TX – 390 -2- *SLRTX390*
5) Feedforward neural network is used for
a) Pattern Association b) Pattern Classification
c) Pattern Mapping d) All of these
6) In supervised learning, for given set of input target output is known.
a) True b) False c) Can’t say d) None
7) In Hebbs law, weights are initialized to any random value.
a) True b) False c) Can’t say d) None
8) Widrow-Hoff learning law is a special case of __________ learning law.
a) Hardlimit b) Hebbs c) Delta d) Correlation
9) Delta learning law is applicable only if the activation function is differentiable.
a) True b) False c) Can’t say d) None
10) In _________, group of input patterns corresponds to the same output
pattern.
a) Pattern Mapping b) Pattern Classification
c) Pattern Association d) None
11) MaxNet is Competitive Neural Network.
a) True b) False c) Can’t say d) None
12) _________ neural network is used for Consonant Vowel Recognition.
a) Multilayer Perceptron b) Adaline
c) Time-delay neural networks d) None
13) Competitive neural network is used for
a) Pattern Association b) Pattern Storage
c) Pattern Grouping d) None
14) There exists central control for processing information in brain as in
computer.
a) True b) False c) Can’t say d) None

____________

Set Q
*SLRTX390* -3- SLR-TX – 390
Seat
No.
B.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
Artificial Neural Networks (Elective – IV)

Day and Date : Monday, 26-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I
2. Answer any four of the following : (4×4=16)
a) Describe Adaline Model.
b) Explain Widrow-Hoff learning law.
c) What is linear separability ? Explain with example.
d) Explain Perceptron learning law.
e) Describe McCulloch-Pitts Model.
f) Explain Hebb’s learning law.

3. Answer any two of the following : (2×6=12)


1) Explain the working of Backpropagation algorithm in detail. Also derive
weight change rule for input to hidden weights and hidden to output weights.
2) Explain briefly the terms Cellbody, Axon, Synapse and Dendrite with
reference to Biological Neural Network.
3) Design and Train Perceptron Neural Network to recognize following pattern.
(Initialize learning rate eta = 0.3, Weights w1 = 0.2, w2 = 0.3, bias b = 0.1)
Input 1 Input 2 Output
1 1 0
1 0 0
0 1 1
0 0 0
Find number of Iterations/Epoch required to train the network and also
determine updated weight values.
Set Q
SLR-TX – 390 -4- *SLRTX390*
SECTION – II

4. Answer any four of the following : (4×4=16)


a) Explain Pattern Mapping.
b) Differentiate between Feedforward and Feedback Neural Network.
c) Explain the working of Hamming Neural Network.
d) Differentiate between Pattern Association and Pattern Classification.
e) Explain working of MaxNet Competitive Network.
f) Differentiate between Feedback and Competitive Neural Network.

5. Answer any two of the following : (2×6=12)


a) Explain application of neural network in recognition of consonant vowel
segments.
b) Explain application of Hamming Network in Recognition of Olympic Game
Symbols.
c) Explain application of neural network NETTalk in conversion of text to
speech.
_______________

Set Q
*SLRTX390* SLR-TX – 390
Seat
No. Set R
B.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
Artificial Neural Networks (Elective – IV)

Day and Date : Monday, 26-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) _________ neural network is used for Consonant Vowel Recognition.
a) Multilayer Perceptron b) Adaline
c) Time-delay neural networks d) None
2) Competitive neural network is used for
a) Pattern Association b) Pattern Storage
c) Pattern Grouping d) None
3) There exists central control for processing information in brain as in
computer.
a) True b) False c) Can’t say d) None
4) Which of the following model has ability to learn ?
a) McCulloch-pitts model
b) Perceptron model
c) Both Perceptron and McCulloch-Pitts model
d) None
P.T.O.
SLR-TX – 390 -2- *SLRTX390*
5) __________ carry signal from one cell body to another cell body.
a) Dendrite b) Synapse c) Axon d) None
6) In Perceptron learning law, weight can be initialized to any random value.
a) True b) False c) Can’t say d) None
7) Convolutional network is multilayer feedforward neural network.
a) True b) False c) Can’t say d) None
8) Feedforward neural network is used for
a) Pattern Association b) Pattern Classification
c) Pattern Mapping d) All of these
9) In supervised learning, for given set of input target output is known.
a) True b) False c) Can’t say d) None
10) In Hebbs law, weights are initialized to any random value.
a) True b) False c) Can’t say d) None
11) Widrow-Hoff learning law is a special case of __________ learning law.
a) Hardlimit b) Hebbs c) Delta d) Correlation
12) Delta learning law is applicable only if the activation function is differentiable.
a) True b) False c) Can’t say d) None
13) In _________, group of input patterns corresponds to the same output
pattern.
a) Pattern Mapping b) Pattern Classification
c) Pattern Association d) None
14) MaxNet is Competitive Neural Network.
a) True b) False c) Can’t say d) None

____________

Set R
*SLRTX390* -3- SLR-TX – 390
Seat
No.
B.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
Artificial Neural Networks (Elective – IV)

Day and Date : Monday, 26-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I
2. Answer any four of the following : (4×4=16)
a) Describe Adaline Model.
b) Explain Widrow-Hoff learning law.
c) What is linear separability ? Explain with example.
d) Explain Perceptron learning law.
e) Describe McCulloch-Pitts Model.
f) Explain Hebb’s learning law.

3. Answer any two of the following : (2×6=12)


1) Explain the working of Backpropagation algorithm in detail. Also derive
weight change rule for input to hidden weights and hidden to output weights.
2) Explain briefly the terms Cellbody, Axon, Synapse and Dendrite with
reference to Biological Neural Network.
3) Design and Train Perceptron Neural Network to recognize following pattern.
(Initialize learning rate eta = 0.3, Weights w1 = 0.2, w2 = 0.3, bias b = 0.1)
Input 1 Input 2 Output
1 1 0
1 0 0
0 1 1
0 0 0
Find number of Iterations/Epoch required to train the network and also
determine updated weight values.
Set R
SLR-TX – 390 -4- *SLRTX390*
SECTION – II

4. Answer any four of the following : (4×4=16)


a) Explain Pattern Mapping.
b) Differentiate between Feedforward and Feedback Neural Network.
c) Explain the working of Hamming Neural Network.
d) Differentiate between Pattern Association and Pattern Classification.
e) Explain working of MaxNet Competitive Network.
f) Differentiate between Feedback and Competitive Neural Network.

5. Answer any two of the following : (2×6=12)


a) Explain application of neural network in recognition of consonant vowel
segments.
b) Explain application of Hamming Network in Recognition of Olympic Game
Symbols.
c) Explain application of neural network NETTalk in conversion of text to
speech.
_______________

Set R
*SLRTX390* SLR-TX – 390
Seat
No. Set S
B.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
Artificial Neural Networks (Elective – IV)

Day and Date : Monday, 26-11-2018 Total Marks : 70


Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on
Top of Page.
3) All questions are compulsory.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 14

1. Choose the correct answer : (14×1=14)


1) In Perceptron learning law, weight can be initialized to any random value.
a) True b) False c) Can’t say d) None
2) Convolutional network is multilayer feedforward neural network.
a) True b) False c) Can’t say d) None
3) Feedforward neural network is used for
a) Pattern Association b) Pattern Classification
c) Pattern Mapping d) All of these
4) In supervised learning, for given set of input target output is known.
a) True b) False c) Can’t say d) None
5) In Hebbs law, weights are initialized to any random value.
a) True b) False c) Can’t say d) None
6) Widrow-Hoff learning law is a special case of __________ learning law.
a) Hardlimit b) Hebbs c) Delta d) Correlation
P.T.O.
SLR-TX – 390 -2- *SLRTX390*
7) Delta learning law is applicable only if the activation function is differentiable.
a) True b) False c) Can’t say d) None
8) In _________, group of input patterns corresponds to the same output
pattern.
a) Pattern Mapping b) Pattern Classification
c) Pattern Association d) None
9) MaxNet is Competitive Neural Network.
a) True b) False c) Can’t say d) None
10) _________ neural network is used for Consonant Vowel Recognition.
a) Multilayer Perceptron b) Adaline
c) Time-delay neural networks d) None
11) Competitive neural network is used for
a) Pattern Association b) Pattern Storage
c) Pattern Grouping d) None
12) There exists central control for processing information in brain as in
computer.
a) True b) False c) Can’t say d) None
13) Which of the following model has ability to learn ?
a) McCulloch-pitts model
b) Perceptron model
c) Both Perceptron and McCulloch-Pitts model
d) None
14) __________ carry signal from one cell body to another cell body.
a) Dendrite b) Synapse c) Axon d) None

____________

Set S
*SLRTX390* -3- SLR-TX – 390
Seat
No.
B.E. (Computer Science and Engineering) (Part – II) (CGPA)
Examination, 2018
Artificial Neural Networks (Elective – IV)

Day and Date : Monday, 26-11-2018 Marks : 56


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I
2. Answer any four of the following : (4×4=16)
a) Describe Adaline Model.
b) Explain Widrow-Hoff learning law.
c) What is linear separability ? Explain with example.
d) Explain Perceptron learning law.
e) Describe McCulloch-Pitts Model.
f) Explain Hebb’s learning law.

3. Answer any two of the following : (2×6=12)


1) Explain the working of Backpropagation algorithm in detail. Also derive
weight change rule for input to hidden weights and hidden to output weights.
2) Explain briefly the terms Cellbody, Axon, Synapse and Dendrite with
reference to Biological Neural Network.
3) Design and Train Perceptron Neural Network to recognize following pattern.
(Initialize learning rate eta = 0.3, Weights w1 = 0.2, w2 = 0.3, bias b = 0.1)
Input 1 Input 2 Output
1 1 0
1 0 0
0 1 1
0 0 0
Find number of Iterations/Epoch required to train the network and also
determine updated weight values.
Set S
SLR-TX – 390 -4- *SLRTX390*
SECTION – II

4. Answer any four of the following : (4×4=16)


a) Explain Pattern Mapping.
b) Differentiate between Feedforward and Feedback Neural Network.
c) Explain the working of Hamming Neural Network.
d) Differentiate between Pattern Association and Pattern Classification.
e) Explain working of MaxNet Competitive Network.
f) Differentiate between Feedback and Competitive Neural Network.

5. Answer any two of the following : (2×6=12)


a) Explain application of neural network in recognition of consonant vowel
segments.
b) Explain application of Hamming Network in Recognition of Olympic Game
Symbols.
c) Explain application of neural network NETTalk in conversion of text to
speech.
_______________

Set S
*SLRTX391* SLR-TX – 391

Seat
No. Set P
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
BIG DATA ANALYTICS (Elective – IV)
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) All questions are compulsory.
3) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) _______ used to transmit data between web server and web application.
a) XML b) JSON
c) Both a) and b) d) None
2) MS-Excels are under the category of _________ data.
a) Structured data b) Semi-structured data
c) Unstructured data d) None
3) Real time processing deals with __________ characteristic of data.
a) Variety b) Velocity
c) Variability d) Volume
4) The 3V’s term of big data was first introduced by
a) Doug Laney b) Brewer
c) Carlo Strozzi d) Doug Cutting
5) _________ has no support for ACID properties.
a) SQL b) MySQL
c) NewSQL d) NoSQL

P.T.O.
SLR-TX – 391 -2- *SLRTX391*

6) A coordinated processing of a program by multiple processors, each working


on different part of the program and using its own operating system and
memory is called
a) In memory analysis b) Distributed system
c) Massively parallel processing d) Shared disk
7) Node manager is responsible for launching application
a) Resources b) Job c) Containers d) None
8) Which of the following format is supported by MongoDB ?
a) XML b) SQL
c) BSON d) All of the mentioned
9) Core MongoDB operation are
a) Create, Select, Update, Delete
b) Create, Read, Update, Delete
c) Create, Read, Update, Drop
d) None
10) Which of the following is correct command to update a document ?
a) db.books.update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8})
b) db.books.find( ).update({item:“book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8})
c) db.books.update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8},{multi:true})
d) db.books.find( ).update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8},
{multi:true})
11) Which of the following is wide column store ?
a) MongoDB b) Cassandra c) Riak d) Redis
12) MetaStore contains _________ of Hive tables.
a) System catalog b) Drivers
c) Database d) CLI
13) The interactive mode of pig is
a) Pig Engine b) Grunt c) ETL d) Pig Latin
14) In Cassandra __________ is called peer to peer communication protocol
used for intra ring communications.
a) Anti-Entropy b) Gossip protocol
c) Hinted Handoffs d) All

______________
Set P
*SLRTX391* -3- SLR-TX – 391
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


BIG DATA ANALYTICS (Elective – IV)
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) All questions are compulsory.

SECTION – I

2. Answer any four : (4×4=16)


a) Explain unstructured data and its different sources.
b) What is big data ? Explain different characteristic of big data.
c) Write difference between NOSQL and NewSQL.
d) Explain Hoodoop 1.0 and Hadoop 2.0.
e) Explain massively parallel processing terminologies used in big data.

3. Answer any two : (6×2=12)


a) Explain high level architecture of Hadoop with its components.
b) Describe YARN architecture in detail.
c) What is big data analytics ? Explain classification of Big Data Analytics.

SECTION – II

4. Answer any four : (4×4=16)


1) Explain different CRUD operations in MongoDB.
2) List out features of Hive.
3) What is pig ? Explain its features.

Set P
SLR-TX – 391 -4- *SLRTX391*

4) Write MongoDB query for an objective given below.


Create a collection “food” and insert 5 documents into the food collection by
“_id” and “fruits” array. Check these documents are present in food collection.
Find that document from food collection where “grapes” is present in 2nd
index position of the fruit array.
5) Write difference between MongoDB and SQL.

5. Answer any two : (6×2=12)


1) Explain CRUD operations in Cassandra with example query.
2) What is MongoDB ? Explain Map reduce programming in MongoDB with
example.
3) What is pig philosophy ? Explain ETL processing in Pig.

____________

Set P
*SLRTX391* SLR-TX – 391

Seat
No. Set Q
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
BIG DATA ANALYTICS (Elective – IV)
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) All questions are compulsory.
3) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Which of the following format is supported by MongoDB ?
a) XML b) SQL
c) BSON d) All of the mentioned
2) Core MongoDB operation are
a) Create, Select, Update, Delete
b) Create, Read, Update, Delete
c) Create, Read, Update, Drop
d) None
3) Which of the following is correct command to update a document ?
a) db.books.update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8})
b) db.books.find( ).update({item:“book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8})
c) db.books.update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8},{multi:true})
d) db.books.find( ).update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8},
{multi:true})
4) Which of the following is wide column store ?
a) MongoDB b) Cassandra c) Riak d) Redis
P.T.O.
SLR-TX – 391 -2- *SLRTX391*

5) MetaStore contains _________ of Hive tables.


a) System catalog b) Drivers
c) Database d) CLI
6) The interactive mode of pig is
a) Pig Engine b) Grunt c) ETL d) Pig Latin
7) In Cassandra __________ is called peer to peer communication protocol
used for intra ring communications.
a) Anti-Entropy b) Gossip protocol
c) Hinted Handoffs d) All
8) _______ used to transmit data between web server and web application.
a) XML b) JSON
c) Both a) and b) d) None
9) MS-Excels are under the category of _________ data.
a) Structured data b) Semi-structured data
c) Unstructured data d) None
10) Real time processing deals with __________ characteristic of data.
a) Variety b) Velocity
c) Variability d) Volume
11) The 3V’s term of big data was first introduced by
a) Doug Laney b) Brewer
c) Carlo Strozzi d) Doug Cutting
12) _________ has no support for ACID properties.
a) SQL b) MySQL
c) NewSQL d) NoSQL
13) A coordinated processing of a program by multiple processors, each working
on different part of the program and using its own operating system and
memory is called
a) In memory analysis b) Distributed system
c) Massively parallel processing d) Shared disk
14) Node manager is responsible for launching application
a) Resources b) Job c) Containers d) None

______________

Set Q
*SLRTX391* -3- SLR-TX – 391
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


BIG DATA ANALYTICS (Elective – IV)
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) All questions are compulsory.

SECTION – I

2. Answer any four : (4×4=16)


a) Explain unstructured data and its different sources.
b) What is big data ? Explain different characteristic of big data.
c) Write difference between NOSQL and NewSQL.
d) Explain Hoodoop 1.0 and Hadoop 2.0.
e) Explain massively parallel processing terminologies used in big data.

3. Answer any two : (6×2=12)


a) Explain high level architecture of Hadoop with its components.
b) Describe YARN architecture in detail.
c) What is big data analytics ? Explain classification of Big Data Analytics.

SECTION – II

4. Answer any four : (4×4=16)


1) Explain different CRUD operations in MongoDB.
2) List out features of Hive.
3) What is pig ? Explain its features.

Set Q
SLR-TX – 391 -4- *SLRTX391*

4) Write MongoDB query for an objective given below.


Create a collection “food” and insert 5 documents into the food collection by
“_id” and “fruits” array. Check these documents are present in food collection.
Find that document from food collection where “grapes” is present in 2nd
index position of the fruit array.
5) Write difference between MongoDB and SQL.

5. Answer any two : (6×2=12)


1) Explain CRUD operations in Cassandra with example query.
2) What is MongoDB ? Explain Map reduce programming in MongoDB with
example.
3) What is pig philosophy ? Explain ETL processing in Pig.

____________

Set Q
*SLRTX391* SLR-TX – 391

Seat
No. Set R
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
BIG DATA ANALYTICS (Elective – IV)
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) All questions are compulsory.
3) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) _________ has no support for ACID properties.
a) SQL b) MySQL c) NewSQL d) NoSQL
2) A coordinated processing of a program by multiple processors, each working
on different part of the program and using its own operating system and
memory is called
a) In memory analysis b) Distributed system
c) Massively parallel processing d) Shared disk
3) Node manager is responsible for launching application
a) Resources b) Job c) Containers d) None
4) Which of the following format is supported by MongoDB ?
a) XML b) SQL
c) BSON d) All of the mentioned
5) Core MongoDB operation are
a) Create, Select, Update, Delete
b) Create, Read, Update, Delete
c) Create, Read, Update, Drop
d) None
P.T.O.
SLR-TX – 391 -2- *SLRTX391*

6) Which of the following is correct command to update a document ?


a) db.books.update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8})
b) db.books.find( ).update({item:“book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8})
c) db.books.update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8},{multi:true})
d) db.books.find( ).update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8},
{multi:true})
7) Which of the following is wide column store ?
a) MongoDB b) Cassandra c) Riak d) Redis
8) MetaStore contains _________ of Hive tables.
a) System catalog b) Drivers
c) Database d) CLI
9) The interactive mode of pig is
a) Pig Engine b) Grunt c) ETL d) Pig Latin
10) In Cassandra __________ is called peer to peer communication protocol
used for intra ring communications.
a) Anti-Entropy b) Gossip protocol
c) Hinted Handoffs d) All
11) _______ used to transmit data between web server and web application.
a) XML b) JSON
c) Both a) and b) d) None
12) MS-Excels are under the category of _________ data.
a) Structured data b) Semi-structured data
c) Unstructured data d) None
13) Real time processing deals with __________ characteristic of data.
a) Variety b) Velocity
c) Variability d) Volume
14) The 3V’s term of big data was first introduced by
a) Doug Laney b) Brewer
c) Carlo Strozzi d) Doug Cutting

______________

Set R
*SLRTX391* -3- SLR-TX – 391
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


BIG DATA ANALYTICS (Elective – IV)
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) All questions are compulsory.

SECTION – I

2. Answer any four : (4×4=16)


a) Explain unstructured data and its different sources.
b) What is big data ? Explain different characteristic of big data.
c) Write difference between NOSQL and NewSQL.
d) Explain Hoodoop 1.0 and Hadoop 2.0.
e) Explain massively parallel processing terminologies used in big data.

3. Answer any two : (6×2=12)


a) Explain high level architecture of Hadoop with its components.
b) Describe YARN architecture in detail.
c) What is big data analytics ? Explain classification of Big Data Analytics.

SECTION – II

4. Answer any four : (4×4=16)


1) Explain different CRUD operations in MongoDB.
2) List out features of Hive.
3) What is pig ? Explain its features.

Set R
SLR-TX – 391 -4- *SLRTX391*

4) Write MongoDB query for an objective given below.


Create a collection “food” and insert 5 documents into the food collection by
“_id” and “fruits” array. Check these documents are present in food collection.
Find that document from food collection where “grapes” is present in 2nd
index position of the fruit array.
5) Write difference between MongoDB and SQL.

5. Answer any two : (6×2=12)


1) Explain CRUD operations in Cassandra with example query.
2) What is MongoDB ? Explain Map reduce programming in MongoDB with
example.
3) What is pig philosophy ? Explain ETL processing in Pig.

____________

Set R
*SLRTX391* SLR-TX – 391

Seat
No. Set S
B.E. (CSE) (Part – II) (CGPA) Examination, 2018
BIG DATA ANALYTICS (Elective – IV)
Day and Date : Monday, 26-11-2018 Max. Marks : 70
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Figures to the right indicate full marks.
2) All questions are compulsory.
3) Q. No. 1 is compulsory. It should be solved in first 30
minutes in Answer Book Page No. 3. Each question
carries one mark.
4) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 14

1. Choose the correct alternative : (14×1=14)


1) Which of the following is correct command to update a document ?
a) db.books.update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8})
b) db.books.find( ).update({item:“book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8})
c) db.books.update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8},{multi:true})
d) db.books.find( ).update({item:’book”,qty:{$gt:7},{$set:{x:5},$inc:{y:8},
{multi:true})
2) Which of the following is wide column store ?
a) MongoDB b) Cassandra c) Riak d) Redis
3) MetaStore contains _________ of Hive tables.
a) System catalog b) Drivers
c) Database d) CLI
4) The interactive mode of pig is
a) Pig Engine b) Grunt c) ETL d) Pig Latin

P.T.O.
SLR-TX – 391 -2- *SLRTX391*

5) In Cassandra __________ is called peer to peer communication protocol


used for intra ring communications.
a) Anti-Entropy b) Gossip protocol
c) Hinted Handoffs d) All
6) _______ used to transmit data between web server and web application.
a) XML b) JSON
c) Both a) and b) d) None
7) MS-Excels are under the category of _________ data.
a) Structured data b) Semi-structured data
c) Unstructured data d) None
8) Real time processing deals with __________ characteristic of data.
a) Variety b) Velocity c) Variability d) Volume
9) The 3V’s term of big data was first introduced by
a) Doug Laney b) Brewer
c) Carlo Strozzi d) Doug Cutting
10) _________ has no support for ACID properties.
a) SQL b) MySQL c) NewSQL d) NoSQL
11) A coordinated processing of a program by multiple processors, each working
on different part of the program and using its own operating system and
memory is called
a) In memory analysis b) Distributed system
c) Massively parallel processing d) Shared disk
12) Node manager is responsible for launching application
a) Resources b) Job c) Containers d) None
13) Which of the following format is supported by MongoDB ?
a) XML b) SQL
c) BSON d) All of the mentioned
14) Core MongoDB operation are
a) Create, Select, Update, Delete
b) Create, Read, Update, Delete
c) Create, Read, Update, Drop
d) None
______________
Set S
*SLRTX391* -3- SLR-TX – 391
Seat
No.

B.E. (CSE) (Part – II) (CGPA) Examination, 2018


BIG DATA ANALYTICS (Elective – IV)
Day and Date : Monday, 26-11-2018 Marks : 56
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Figures to the right indicate full marks.


2) All questions are compulsory.

SECTION – I

2. Answer any four : (4×4=16)


a) Explain unstructured data and its different sources.
b) What is big data ? Explain different characteristic of big data.
c) Write difference between NOSQL and NewSQL.
d) Explain Hoodoop 1.0 and Hadoop 2.0.
e) Explain massively parallel processing terminologies used in big data.

3. Answer any two : (6×2=12)


a) Explain high level architecture of Hadoop with its components.
b) Describe YARN architecture in detail.
c) What is big data analytics ? Explain classification of Big Data Analytics.

SECTION – II

4. Answer any four : (4×4=16)


1) Explain different CRUD operations in MongoDB.
2) List out features of Hive.
3) What is pig ? Explain its features.

Set S
SLR-TX – 391 -4- *SLRTX391*

4) Write MongoDB query for an objective given below.


Create a collection “food” and insert 5 documents into the food collection by
“_id” and “fruits” array. Check these documents are present in food collection.
Find that document from food collection where “grapes” is present in 2nd
index position of the fruit array.
5) Write difference between MongoDB and SQL.

5. Answer any two : (6×2=12)


1) Explain CRUD operations in Cassandra with example query.
2) What is MongoDB ? Explain Map reduce programming in MongoDB with
example.
3) What is pig philosophy ? Explain ETL processing in Pig.

____________

Set S
*SLRTX392* SLR-TX – 392
Seat
No. Set P
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
mobile Computing (Old)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries one
mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) Characteristics of communication device is/are
a) Fixed and wired/wireless b) Mobile and wired/wireless
c) Options a and b d) None of the options
2) _________ configuration describes the typical desktop computer in an office.
a) Fixed and wired b) Mobile and wired
c) Fixed and wireless d) Mobile and wireless
3) _________ are typically used for directed microwave links and fixed satellite services.
a) Super high frequencies b) Infra red
c) Low frequency d) High frequency
4) Several directed antennas can be combined on a single pole to construct a ________ antenna.
a) Simple b) Directional c) Sectorized d) Diversity
5) Radio waves can exhibit _________ fundamental propagation behaviors depending on their
frequency.
a) Ground wave b) Sky wave
c) Line of sight d) All of the options
6) Multiplexing describes how several users can share a medium with ________ interference.
a) Minimum b) No
c) Either minimum or no d) None of the options
7) The task of multiplexing is to assign space, time, frequency and code to each communication
channel with a
a) Minimum of interference and a maximum of medium utilization
b) Maximum of interference and a maximum of medium utilization
c) Minimum of interference and a minimum of medium utilization
d) Maximum of interference and a minimum of medium utilization

P.T.O.
SLR-TX – 392 -2- *SLRTX392*
8) Advantage of TDMA is
a) Very simple, increases capacity per km2
b) Established, fully digital, very flexible
c) Simple established, robust
d) Flexible, less planning needed, soft handover
9) The idea of SDMA is
a) Segment space into cells/sectors
b) Segment sending time into disjoint time slots
c) Segment the frequency band into disjoint sub-bands
d) Spread the spectrum using orthogonal codes
10) The idea of FDMA is
a) Segment space into cells/sectors
b) Segment sending time into disjoint time slots
c) Segment the frequency band into disjoint sub-bands
d) Spread the spectrum using orthogonal codes
11) Supplementary services offered by GSM is/are
a) Identification of call b) Redirection of call
c) Forwarding of call d) All of the options
12) Primary goal of IEEE 802.11 is/are
a) Simple WLAN b) Robust WLAN c) Option a and b d) None of the above
13) Elimination-yield non preemptive priority multiple access (EY-NPMA) divides the medium
access of different competing nodes into __________ phases.
a) Prioritization b) Contention c) Transmission d) None of the option
14) Elimination-yield non preemptive priority multiple access (EY-NPMA) has
a) Elimination phase b) Yield phase
c) Both elimination phase and yield phase d) None of these
15) ad-hoc piconets has
a) limited coverage b) no infrastructure c) option a and b d) none of the options
16) _________ is the mechanism of taking a packet consisting of packet header and data and
putting it into the data part of a new packet.
a) Decapsulation b) Encapsulation c) Tunneling d) None of the options
17) The optimized mobile IP protocol needs _________ messages.
a) Binding request/update b) Binding acknowledgement
c) Binding warning d) All of the options
18) In traditional TCP data transmission takes place using
a) network adaptors b) fiber optics c) copper wires d) all of the options
19) Advantages of M-TCP is/are
a) It maintains the TCP end to end semantics
b) If the MH is disconnected, it avoids useless retransmission
c) Since it does not buffer data in the SH as I-TCp does, it is not necessary to forward buffers
to a new SH
d) All of the options
20) Advantages of indirect TCP is
a) Isolation of wireless link, simple
b) Transparent for end to end connection, MAC integration possible
c) Maintains end to end semantics, handles long term and frequent disconnections
d) Simple and efficient
____________
Set P
*SLRTX392* -3- SLR-TX – 392
Seat
No.
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
mobile Computing (Old)

Day and Date : Wednesday, 19-12-2018 Marks : 80

Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.

2) Figures to right indicate full marks.

Section – i

2. Solve any four questions : (4×5=20)

1) Write a note on follow on services and location aware services.

2) Explain any two applications of wireless communication.

3) With neat diagram, explain how modulation takes in a transmitter and demodulation in a receiver.

4) Explain Classical aloha and Slotted aloha.

5) Show four possible handover scenarios in GSM and explain each one

3. With neat diagram explain the following :

a) Advanced frequency shift keying.

b) Advanced phase shift keying.

OR

Write a note on following :

a) PRMA packet reservation multiple access.

b) Multiple access with collision avoidance. 10

4. Explain the algorithms used for security services in GSM. 10

Set P
SLR-TX – 392 -4- *SLRTX392*

Section – iI

5. Solve any four questions : (4×5=20)

1) With neat diagram explain Bluetooth scatternet.

2) Explain the three phases of elimination-yield non preemptive priority multiple access (EY-NPMA).

3) Explain the following entities that are used in Mobile IP. Mobile node, Correspondent node, Home

network, Foreign network and care of address.

4) What are the advantages of I-TCP ?

5) What are the advantages of Mobile TCP ?

6. With neat diagram explain the following architecture :

a) Architecture of an infrastructure based IEEE 802.11.

b) Architecture of IEEE 802.11 ad-hoc wireless LANs.

OR

With neat diagram explain the IEEE 802.11 protocol architecture bridging and management. 10

7. Explain the working mechanism and list the advantages and disadvantages of following approach :

Fast and selective retransmission and recovery, snooping TCP. 10

___________

Set P
*SLRTX392* SLR-TX – 392
Seat
No. Set Q
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
mobile Computing (Old)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries one
mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) _________ is the mechanism of taking a packet consisting of packet header and data and
putting it into the data part of a new packet.
a) Decapsulation b) Encapsulation c) Tunneling d) None of the options
2) The optimized mobile IP protocol needs _________ messages.
a) Binding request/update b) Binding acknowledgement
c) Binding warning d) All of the options
3) In traditional TCP data transmission takes place using
a) network adaptors b) fiber optics c) copper wires d) all of the options
4) Advantages of M-TCP is/are
a) It maintains the TCP end to end semantics
b) If the MH is disconnected, it avoids useless retransmission
c) Since it does not buffer data in the SH as I-TCp does, it is not necessary to forward buffers
to a new SH
d) All of the options
5) Advantages of indirect TCP is
a) Isolation of wireless link, simple
b) Transparent for end to end connection, MAC integration possible
c) Maintains end to end semantics, handles long term and frequent disconnections
d) Simple and efficient
6) Characteristics of communication device is/are
a) Fixed and wired/wireless b) Mobile and wired/wireless
c) Options a and b d) None of the options
7) _________ configuration describes the typical desktop computer in an office.
a) Fixed and wired b) Mobile and wired
c) Fixed and wireless d) Mobile and wireless

P.T.O.
SLR-TX – 392 -2- *SLRTX392*
8) _________ are typically used for directed microwave links and fixed satellite services.
a) Super high frequencies b) Infra red
c) Low frequency d) High frequency
9) Several directed antennas can be combined on a single pole to construct a ________ antenna.
a) Simple b) Directional c) Sectorized d) Diversity
10) Radio waves can exhibit _________ fundamental propagation behaviors depending on their
frequency.
a) Ground wave b) Sky wave
c) Line of sight d) All of the options
11) Multiplexing describes how several users can share a medium with ________ interference.
a) Minimum b) No
c) Either minimum or no d) None of the options
12) The task of multiplexing is to assign space, time, frequency and code to each communication
channel with a
a) Minimum of interference and a maximum of medium utilization
b) Maximum of interference and a maximum of medium utilization
c) Minimum of interference and a minimum of medium utilization
d) Maximum of interference and a minimum of medium utilization
13) Advantage of TDMA is
a) Very simple, increases capacity per km2
b) Established, fully digital, very flexible
c) Simple established, robust
d) Flexible, less planning needed, soft handover
14) The idea of SDMA is
a) Segment space into cells/sectors
b) Segment sending time into disjoint time slots
c) Segment the frequency band into disjoint sub-bands
d) Spread the spectrum using orthogonal codes
15) The idea of FDMA is
a) Segment space into cells/sectors
b) Segment sending time into disjoint time slots
c) Segment the frequency band into disjoint sub-bands
d) Spread the spectrum using orthogonal codes
16) Supplementary services offered by GSM is/are
a) Identification of call b) Redirection of call
c) Forwarding of call d) All of the options
17) Primary goal of IEEE 802.11 is/are
a) Simple WLAN b) Robust WLAN c) Option a and b d) None of the above
18) Elimination-yield non preemptive priority multiple access (EY-NPMA) divides the medium
access of different competing nodes into __________ phases.
a) Prioritization b) Contention c) Transmission d) None of the option
19) Elimination-yield non preemptive priority multiple access (EY-NPMA) has
a) Elimination phase b) Yield phase
c) Both elimination phase and yield phase d) None of these
20) ad-hoc piconets has
a) limited coverage b) no infrastructure c) option a and b d) none of the options
____________

Set Q
*SLRTX392* -3- SLR-TX – 392
Seat
No.
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
mobile Computing (Old)

Day and Date : Wednesday, 19-12-2018 Marks : 80

Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.

2) Figures to right indicate full marks.

Section – i

2. Solve any four questions : (4×5=20)

1) Write a note on follow on services and location aware services.

2) Explain any two applications of wireless communication.

3) With neat diagram, explain how modulation takes in a transmitter and demodulation in a receiver.

4) Explain Classical aloha and Slotted aloha.

5) Show four possible handover scenarios in GSM and explain each one

3. With neat diagram explain the following :

a) Advanced frequency shift keying.

b) Advanced phase shift keying.

OR

Write a note on following :

a) PRMA packet reservation multiple access.

b) Multiple access with collision avoidance. 10

4. Explain the algorithms used for security services in GSM. 10

Set Q
SLR-TX – 392 -4- *SLRTX392*

Section – iI

5. Solve any four questions : (4×5=20)

1) With neat diagram explain Bluetooth scatternet.

2) Explain the three phases of elimination-yield non preemptive priority multiple access (EY-NPMA).

3) Explain the following entities that are used in Mobile IP. Mobile node, Correspondent node, Home

network, Foreign network and care of address.

4) What are the advantages of I-TCP ?

5) What are the advantages of Mobile TCP ?

6. With neat diagram explain the following architecture :

a) Architecture of an infrastructure based IEEE 802.11.

b) Architecture of IEEE 802.11 ad-hoc wireless LANs.

OR

With neat diagram explain the IEEE 802.11 protocol architecture bridging and management. 10

7. Explain the working mechanism and list the advantages and disadvantages of following approach :

Fast and selective retransmission and recovery, snooping TCP. 10

___________

Set Q
*SLRTX392* SLR-TX – 392
Seat
No. Set R
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
mobile Computing (Old)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries one
mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) Supplementary services offered by GSM is/are
a) Identification of call b) Redirection of call
c) Forwarding of call d) All of the options
2) Primary goal of IEEE 802.11 is/are
a) Simple WLAN b) Robust WLAN c) Option a and b d) None of the above
3) Elimination-yield non preemptive priority multiple access (EY-NPMA) divides the medium
access of different competing nodes into __________ phases.
a) Prioritization b) Contention c) Transmission d) None of the option
4) Elimination-yield non preemptive priority multiple access (EY-NPMA) has
a) Elimination phase b) Yield phase
c) Both elimination phase and yield phase d) None of these
5) ad-hoc piconets has
a) limited coverage b) no infrastructure c) option a and b d) none of the options
6) _________ is the mechanism of taking a packet consisting of packet header and data and
putting it into the data part of a new packet.
a) Decapsulation b) Encapsulation c) Tunneling d) None of the options
7) The optimized mobile IP protocol needs _________ messages.
a) Binding request/update b) Binding acknowledgement
c) Binding warning d) All of the options
8) In traditional TCP data transmission takes place using
a) network adaptors b) fiber optics c) copper wires d) all of the options
9) Advantages of M-TCP is/are
a) It maintains the TCP end to end semantics
b) If the MH is disconnected, it avoids useless retransmission
c) Since it does not buffer data in the SH as I-TCp does, it is not necessary to forward buffers
to a new SH
d) All of the options

P.T.O.
SLR-TX – 392 -2- *SLRTX392*
10) Advantages of indirect TCP is
a) Isolation of wireless link, simple
b) Transparent for end to end connection, MAC integration possible
c) Maintains end to end semantics, handles long term and frequent disconnections
d) Simple and efficient
11) Characteristics of communication device is/are
a) Fixed and wired/wireless b) Mobile and wired/wireless
c) Options a and b d) None of the options
12) _________ configuration describes the typical desktop computer in an office.
a) Fixed and wired b) Mobile and wired
c) Fixed and wireless d) Mobile and wireless
13) _________ are typically used for directed microwave links and fixed satellite services.
a) Super high frequencies b) Infra red
c) Low frequency d) High frequency
14) Several directed antennas can be combined on a single pole to construct a ________ antenna.
a) Simple b) Directional c) Sectorized d) Diversity
15) Radio waves can exhibit _________ fundamental propagation behaviors depending on their
frequency.
a) Ground wave b) Sky wave
c) Line of sight d) All of the options
16) Multiplexing describes how several users can share a medium with ________ interference.
a) Minimum b) No
c) Either minimum or no d) None of the options
17) The task of multiplexing is to assign space, time, frequency and code to each communication
channel with a
a) Minimum of interference and a maximum of medium utilization
b) Maximum of interference and a maximum of medium utilization
c) Minimum of interference and a minimum of medium utilization
d) Maximum of interference and a minimum of medium utilization
18) Advantage of TDMA is
a) Very simple, increases capacity per km2
b) Established, fully digital, very flexible
c) Simple established, robust
d) Flexible, less planning needed, soft handover
19) The idea of SDMA is
a) Segment space into cells/sectors
b) Segment sending time into disjoint time slots
c) Segment the frequency band into disjoint sub-bands
d) Spread the spectrum using orthogonal codes
20) The idea of FDMA is
a) Segment space into cells/sectors
b) Segment sending time into disjoint time slots
c) Segment the frequency band into disjoint sub-bands
d) Spread the spectrum using orthogonal codes
____________

Set R
*SLRTX392* -3- SLR-TX – 392
Seat
No.
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
mobile Computing (Old)

Day and Date : Wednesday, 19-12-2018 Marks : 80

Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.

2) Figures to right indicate full marks.

Section – i

2. Solve any four questions : (4×5=20)

1) Write a note on follow on services and location aware services.

2) Explain any two applications of wireless communication.

3) With neat diagram, explain how modulation takes in a transmitter and demodulation in a receiver.

4) Explain Classical aloha and Slotted aloha.

5) Show four possible handover scenarios in GSM and explain each one

3. With neat diagram explain the following :

a) Advanced frequency shift keying.

b) Advanced phase shift keying.

OR

Write a note on following :

a) PRMA packet reservation multiple access.

b) Multiple access with collision avoidance. 10

4. Explain the algorithms used for security services in GSM. 10

Set R
SLR-TX – 392 -4- *SLRTX392*

Section – iI

5. Solve any four questions : (4×5=20)

1) With neat diagram explain Bluetooth scatternet.

2) Explain the three phases of elimination-yield non preemptive priority multiple access (EY-NPMA).

3) Explain the following entities that are used in Mobile IP. Mobile node, Correspondent node, Home

network, Foreign network and care of address.

4) What are the advantages of I-TCP ?

5) What are the advantages of Mobile TCP ?

6. With neat diagram explain the following architecture :

a) Architecture of an infrastructure based IEEE 802.11.

b) Architecture of IEEE 802.11 ad-hoc wireless LANs.

OR

With neat diagram explain the IEEE 802.11 protocol architecture bridging and management. 10

7. Explain the working mechanism and list the advantages and disadvantages of following approach :

Fast and selective retransmission and recovery, snooping TCP. 10

___________

Set R
*SLRTX392* SLR-TX – 392
Seat
No. Set S
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
mobile Computing (Old)
Day and Date : Wednesday, 19-12-2018 Max. Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question carries one
mark.
2) Answer MCQ/Objective type questions on Page No. 3 only. Don’t
forget to mention, Q.P. Set (P/Q/R/S) on Top of Page.
3) Figures to right indicate full marks.

MCQ/Objective Type Questions

Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20×1=20)


1) Multiplexing describes how several users can share a medium with ________ interference.
a) Minimum b) No
c) Either minimum or no d) None of the options
2) The task of multiplexing is to assign space, time, frequency and code to each communication
channel with a
a) Minimum of interference and a maximum of medium utilization
b) Maximum of interference and a maximum of medium utilization
c) Minimum of interference and a minimum of medium utilization
d) Maximum of interference and a minimum of medium utilization
3) Advantage of TDMA is
a) Very simple, increases capacity per km2
b) Established, fully digital, very flexible
c) Simple established, robust
d) Flexible, less planning needed, soft handover
4) The idea of SDMA is
a) Segment space into cells/sectors
b) Segment sending time into disjoint time slots
c) Segment the frequency band into disjoint sub-bands
d) Spread the spectrum using orthogonal codes
5) The idea of FDMA is
a) Segment space into cells/sectors
b) Segment sending time into disjoint time slots
c) Segment the frequency band into disjoint sub-bands
d) Spread the spectrum using orthogonal codes
6) Supplementary services offered by GSM is/are
a) Identification of call b) Redirection of call
c) Forwarding of call d) All of the options

P.T.O.
SLR-TX – 392 -2- *SLRTX392*
7) Primary goal of IEEE 802.11 is/are
a) Simple WLAN b) Robust WLAN c) Option a and b d) None of the above
8) Elimination-yield non preemptive priority multiple access (EY-NPMA) divides the medium
access of different competing nodes into __________ phases.
a) Prioritization b) Contention c) Transmission d) None of the option
9) Elimination-yield non preemptive priority multiple access (EY-NPMA) has
a) Elimination phase b) Yield phase
c) Both elimination phase and yield phase d) None of these
10) ad-hoc piconets has
a) limited coverage b) no infrastructure c) option a and b d) none of the options
11) _________ is the mechanism of taking a packet consisting of packet header and data and
putting it into the data part of a new packet.
a) Decapsulation b) Encapsulation c) Tunneling d) None of the options
12) The optimized mobile IP protocol needs _________ messages.
a) Binding request/update b) Binding acknowledgement
c) Binding warning d) All of the options
13) In traditional TCP data transmission takes place using
a) network adaptors b) fiber optics c) copper wires d) all of the options
14) Advantages of M-TCP is/are
a) It maintains the TCP end to end semantics
b) If the MH is disconnected, it avoids useless retransmission
c) Since it does not buffer data in the SH as I-TCp does, it is not necessary to forward buffers
to a new SH
d) All of the options
15) Advantages of indirect TCP is
a) Isolation of wireless link, simple
b) Transparent for end to end connection, MAC integration possible
c) Maintains end to end semantics, handles long term and frequent disconnections
d) Simple and efficient
16) Characteristics of communication device is/are
a) Fixed and wired/wireless b) Mobile and wired/wireless
c) Options a and b d) None of the options
17) _________ configuration describes the typical desktop computer in an office.
a) Fixed and wired b) Mobile and wired
c) Fixed and wireless d) Mobile and wireless
18) _________ are typically used for directed microwave links and fixed satellite services.
a) Super high frequencies b) Infra red
c) Low frequency d) High frequency
19) Several directed antennas can be combined on a single pole to construct a ________ antenna.
a) Simple b) Directional c) Sectorized d) Diversity
20) Radio waves can exhibit _________ fundamental propagation behaviors depending on their
frequency.
a) Ground wave b) Sky wave
c) Line of sight d) All of the options
____________

Set S
*SLRTX392* -3- SLR-TX – 392
Seat
No.
B.E. (Computer Science and Engineering) (Part – II) Examination, 2018
mobile Computing (Old)

Day and Date : Wednesday, 19-12-2018 Marks : 80

Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) All questions are compulsory.

2) Figures to right indicate full marks.

Section – i

2. Solve any four questions : (4×5=20)

1) Write a note on follow on services and location aware services.

2) Explain any two applications of wireless communication.

3) With neat diagram, explain how modulation takes in a transmitter and demodulation in a receiver.

4) Explain Classical aloha and Slotted aloha.

5) Show four possible handover scenarios in GSM and explain each one

3. With neat diagram explain the following :

a) Advanced frequency shift keying.

b) Advanced phase shift keying.

OR

Write a note on following :

a) PRMA packet reservation multiple access.

b) Multiple access with collision avoidance. 10

4. Explain the algorithms used for security services in GSM. 10

Set S
SLR-TX – 392 -4- *SLRTX392*

Section – iI

5. Solve any four questions : (4×5=20)

1) With neat diagram explain Bluetooth scatternet.

2) Explain the three phases of elimination-yield non preemptive priority multiple access (EY-NPMA).

3) Explain the following entities that are used in Mobile IP. Mobile node, Correspondent node, Home

network, Foreign network and care of address.

4) What are the advantages of I-TCP ?

5) What are the advantages of Mobile TCP ?

6. With neat diagram explain the following architecture :

a) Architecture of an infrastructure based IEEE 802.11.

b) Architecture of IEEE 802.11 ad-hoc wireless LANs.

OR

With neat diagram explain the IEEE 802.11 protocol architecture bridging and management. 10

7. Explain the working mechanism and list the advantages and disadvantages of following approach :

Fast and selective retransmission and recovery, snooping TCP. 10

___________

Set S
*SLRTX393* SLR-TX – 393
Seat
No. Set P
B.E. (Computer Science and Engg.) (Part – II) Examination, 2018
data mining (elective – II) (Old)
Day and Date : Thursday, 20-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20�1=20)


1) In data mining output is precise.
a) True b) False
2) ___________ is an approach to handle missing data.
a) Ignore the missing value b) Assume a value for missing data
c) Fill missing value manually d) All the above
3) ___________ is unsupervised learning.
a) Classification b) Regression
c) Clustering d) None of above
4) Which of the following is a measure task in data preprocessing
a) Data reduction b) Classification
c) Clustering d) None of above
5) Which among the following is an example of spatial databases ?
a) Transaction database b) Daily humidity
c) VLSI database d) Video data
6) _____________ is one of the method to handle noisy data.
a) Catching b) Crawling c) Binning d) None of the above
7) Full form of SPADE is ________________
a) Sequential Pattern Discovery using Equivalence classes
b) Serial Pattern Discovery using Equal Closure
c) Sequence Pattern Disclosure using Equal Classes
d) None
P.T.O.
SLR-TX – 393 -2- *SLRTX393*
8) In clustering class labels of training data are ____________
a) Known b) Unknown c) Predefined d) None of above
9) In classification by decision tree method root node contains __________
a) NULL b) Values c) Links d) None of above
10) Choosing the splitting attribute is required in classification by __________
method.
a) Decision tree b) K means
c) Nearest neighbor d) All of above
11) _______________ is a spatial database primitive.
a) Time b) Direction
c) Transaction item d) None
12) Seasonal effects will be seen in __________ data.
a) Spatial b) Transaction item sets
c) Time series d) None of above
13) Dendrogram is a data structure used to solve _____________ problems.
a) Agglomerative clustering b) Classification
c) k-means d) Dendrogram
14) ______________ is an approach to index spatial data represented as
MBRs.
a) Quad Tree b) B-Tree c) R-Tree d) None of above
15) Stream data is a type of data which is _______________
a) Ordered b) Continuous
c) Changing and fast d) All the above
16) The “Then” – part of a rule is known as ______________
a) Rule Antecedent b) Rule Consequent
c) Action d) None of these
17) “Find all houses south to bus stand” is a __________ type of query.
a) Temporal b) Spatial c) Web Content d) None of these
18) Mining biochemical structure is an application of ____________
a) Time series analysis b) Image mining
c) Graph mining d) None of these
19) BIRCH algorithm is used for ______________
a) Clustering b) Classification
c) Association rule generation d) None of these
20) K-means clustering is a ___________ clustering method.
a) Partitional b) Sampling c) Hierarchical d) Categorical
___________________
Set P
*SLRTX393* -3- SLR-TX – 393
Seat
no.

B.E. (Computer Science and Engg.) (Part – II) Examination, 2018


data mining (elective – II) (Old)

Day and Date : Thursday, 20-12-2018 Marks : 80


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I

2. Solve any four : (4�5=20)


a) Explain difference between database processing versus data mining
processing.
b) Why there is a need of data preprocessing ?
c) What are difficulties in data mining processing ?
d) What is difference between supervised and unsupervised learning ?
e) Describe any five data mining applications.

3. With neat diagram, explain KDD process in detail. 10


OR
Explain in detail how Bayesian classification is done ? Explain with example.

4. Explain KNN classification algorithm with example. 10

SECTION – II

5. Solve any four : (4�5=20)


a) What do you mean by web usage mining ? Explain.
b) Write a note on graph data mining.

Set P
SLR-TX – 393 -4- *SLRTX393*
c) Explain page rank and clever in detail.
d) Write a note on Web usage mining.
e) Explain K-means partitioning algorithm.

6. Explain frequent itemset mining using appriori algorithm with suitable example. 10
OR
Write in detail note on temporal data mining.

7. Write short notes on : 10


a) R-trees
b) Spatial data mining.

_____________________

Set P
*SLRTX393* SLR-TX – 393
Seat
No. Set Q
B.E. (Computer Science and Engg.) (Part – II) Examination, 2018
data mining (elective – II) (Old)
Day and Date : Thursday, 20-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20�1=20)


1) The “Then” – part of a rule is known as ______________
a) Rule Antecedent b) Rule Consequent
c) Action d) None of these
2) “Find all houses south to bus stand” is a __________ type of query.
a) Temporal b) Spatial c) Web Content d) None of these
3) Mining biochemical structure is an application of ____________
a) Time series analysis b) Image mining
c) Graph mining d) None of these
4) BIRCH algorithm is used for ______________
a) Clustering b) Classification
c) Association rule generation d) None of these
5) K-means clustering is a ___________ clustering method.
a) Partitional b) Sampling c) Hierarchical d) Categorical
6) In data mining output is precise.
a) True b) False
7) ___________ is an approach to handle missing data.
a) Ignore the missing value b) Assume a value for missing data
c) Fill missing value manually d) All the above
8) ___________ is unsupervised learning.
a) Classification b) Regression
c) Clustering d) None of above
P.T.O.
SLR-TX – 393 -2- *SLRTX393*
9) Which of the following is a measure task in data preprocessing
a) Data reduction b) Classification
c) Clustering d) None of above
10) Which among the following is an example of spatial databases ?
a) Transaction database b) Daily humidity
c) VLSI database d) Video data
11) _____________ is one of the method to handle noisy data.
a) Catching b) Crawling c) Binning d) None of the above
12) Full form of SPADE is ________________
a) Sequential Pattern Discovery using Equivalence classes
b) Serial Pattern Discovery using Equal Closure
c) Sequence Pattern Disclosure using Equal Classes
d) None
13) In clustering class labels of training data are ____________
a) Known b) Unknown c) Predefined d) None of above
14) In classification by decision tree method root node contains __________
a) NULL b) Values c) Links d) None of above
15) Choosing the splitting attribute is required in classification by __________
method.
a) Decision tree b) K means
c) Nearest neighbor d) All of above
16) _______________ is a spatial database primitive.
a) Time b) Direction
c) Transaction item d) None
17) Seasonal effects will be seen in __________ data.
a) Spatial b) Transaction item sets
c) Time series d) None of above
18) Dendrogram is a data structure used to solve _____________ problems.
a) Agglomerative clustering b) Classification
c) k-means d) Dendrogram
19) ______________ is an approach to index spatial data represented as
MBRs.
a) Quad Tree b) B-Tree c) R-Tree d) None of above
20) Stream data is a type of data which is _______________
a) Ordered b) Continuous
c) Changing and fast d) All the above
___________________

Set Q
*SLRTX393* -3- SLR-TX – 393
Seat
no.

B.E. (Computer Science and Engg.) (Part – II) Examination, 2018


data mining (elective – II) (Old)

Day and Date : Thursday, 20-12-2018 Marks : 80


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I

2. Solve any four : (4�5=20)


a) Explain difference between database processing versus data mining
processing.
b) Why there is a need of data preprocessing ?
c) What are difficulties in data mining processing ?
d) What is difference between supervised and unsupervised learning ?
e) Describe any five data mining applications.

3. With neat diagram, explain KDD process in detail. 10


OR
Explain in detail how Bayesian classification is done ? Explain with example.

4. Explain KNN classification algorithm with example. 10

SECTION – II

5. Solve any four : (4�5=20)


a) What do you mean by web usage mining ? Explain.
b) Write a note on graph data mining.

Set Q
SLR-TX – 393 -4- *SLRTX393*
c) Explain page rank and clever in detail.
d) Write a note on Web usage mining.
e) Explain K-means partitioning algorithm.

6. Explain frequent itemset mining using appriori algorithm with suitable example. 10
OR
Write in detail note on temporal data mining.

7. Write short notes on : 10


a) R-trees
b) Spatial data mining.

_____________________

Set Q
*SLRTX393* SLR-TX – 393
Seat
No. Set R
B.E. (Computer Science and Engg.) (Part – II) Examination, 2018
data mining (elective – II) (Old)
Day and Date : Thursday, 20-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20�1=20)


1) _______________ is a spatial database primitive.
a) Time b) Direction
c) Transaction item d) None
2) Seasonal effects will be seen in __________ data.
a) Spatial b) Transaction item sets
c) Time series d) None of above
3) Dendrogram is a data structure used to solve _____________ problems.
a) Agglomerative clustering b) Classification
c) k-means d) Dendrogram
4) ______________ is an approach to index spatial data represented as
MBRs.
a) Quad Tree b) B-Tree c) R-Tree d) None of above
5) Stream data is a type of data which is _______________
a) Ordered b) Continuous
c) Changing and fast d) All the above
6) The “Then” – part of a rule is known as ______________
a) Rule Antecedent b) Rule Consequent
c) Action d) None of these
7) “Find all houses south to bus stand” is a __________ type of query.
a) Temporal b) Spatial c) Web Content d) None of these
P.T.O.
SLR-TX – 393 -2- *SLRTX393*
8) Mining biochemical structure is an application of ____________
a) Time series analysis b) Image mining
c) Graph mining d) None of these
9) BIRCH algorithm is used for ______________
a) Clustering b) Classification
c) Association rule generation d) None of these
10) K-means clustering is a ___________ clustering method.
a) Partitional b) Sampling c) Hierarchical d) Categorical
11) In data mining output is precise.
a) True b) False
12) ___________ is an approach to handle missing data.
a) Ignore the missing value b) Assume a value for missing data
c) Fill missing value manually d) All the above
13) ___________ is unsupervised learning.
a) Classification b) Regression
c) Clustering d) None of above
14) Which of the following is a measure task in data preprocessing
a) Data reduction b) Classification
c) Clustering d) None of above
15) Which among the following is an example of spatial databases ?
a) Transaction database b) Daily humidity
c) VLSI database d) Video data
16) _____________ is one of the method to handle noisy data.
a) Catching b) Crawling c) Binning d) None of the above
17) Full form of SPADE is ________________
a) Sequential Pattern Discovery using Equivalence classes
b) Serial Pattern Discovery using Equal Closure
c) Sequence Pattern Disclosure using Equal Classes
d) None
18) In clustering class labels of training data are ____________
a) Known b) Unknown c) Predefined d) None of above
19) In classification by decision tree method root node contains __________
a) NULL b) Values c) Links d) None of above
20) Choosing the splitting attribute is required in classification by __________
method.
a) Decision tree b) K means
c) Nearest neighbor d) All of above
___________________

Set R
*SLRTX393* -3- SLR-TX – 393
Seat
no.

B.E. (Computer Science and Engg.) (Part – II) Examination, 2018


data mining (elective – II) (Old)

Day and Date : Thursday, 20-12-2018 Marks : 80


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I

2. Solve any four : (4�5=20)


a) Explain difference between database processing versus data mining
processing.
b) Why there is a need of data preprocessing ?
c) What are difficulties in data mining processing ?
d) What is difference between supervised and unsupervised learning ?
e) Describe any five data mining applications.

3. With neat diagram, explain KDD process in detail. 10


OR
Explain in detail how Bayesian classification is done ? Explain with example.

4. Explain KNN classification algorithm with example. 10

SECTION – II

5. Solve any four : (4�5=20)


a) What do you mean by web usage mining ? Explain.
b) Write a note on graph data mining.

Set R
SLR-TX – 393 -4- *SLRTX393*
c) Explain page rank and clever in detail.
d) Write a note on Web usage mining.
e) Explain K-means partitioning algorithm.

6. Explain frequent itemset mining using appriori algorithm with suitable example. 10
OR
Write in detail note on temporal data mining.

7. Write short notes on : 10


a) R-trees
b) Spatial data mining.

_____________________

Set R
*SLRTX393* SLR-TX – 393
Seat
No. Set S
B.E. (Computer Science and Engg.) (Part – II) Examination, 2018
data mining (elective – II) (Old)
Day and Date : Thursday, 20-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.
Instructions : 1) Q. No. 1 is compulsory. It should be solved in first
30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3
only. Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top
of Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct answer : (20�1=20)


1) _____________ is one of the method to handle noisy data.
a) Catching b) Crawling c) Binning d) None of the above
2) Full form of SPADE is ________________
a) Sequential Pattern Discovery using Equivalence classes
b) Serial Pattern Discovery using Equal Closure
c) Sequence Pattern Disclosure using Equal Classes
d) None
3) In clustering class labels of training data are ____________
a) Known b) Unknown c) Predefined d) None of above
4) In classification by decision tree method root node contains __________
a) NULL b) Values c) Links d) None of above
5) Choosing the splitting attribute is required in classification by __________
method.
a) Decision tree b) K means
c) Nearest neighbor d) All of above
6) _______________ is a spatial database primitive.
a) Time b) Direction
c) Transaction item d) None
7) Seasonal effects will be seen in __________ data.
a) Spatial b) Transaction item sets
c) Time series d) None of above
P.T.O.
SLR-TX – 393 -2- *SLRTX393*
8) Dendrogram is a data structure used to solve _____________ problems.
a) Agglomerative clustering b) Classification
c) k-means d) Dendrogram
9) ______________ is an approach to index spatial data represented as
MBRs.
a) Quad Tree b) B-Tree c) R-Tree d) None of above
10) Stream data is a type of data which is _______________
a) Ordered b) Continuous
c) Changing and fast d) All the above
11) The “Then” – part of a rule is known as ______________
a) Rule Antecedent b) Rule Consequent
c) Action d) None of these
12) “Find all houses south to bus stand” is a __________ type of query.
a) Temporal b) Spatial c) Web Content d) None of these
13) Mining biochemical structure is an application of ____________
a) Time series analysis b) Image mining
c) Graph mining d) None of these
14) BIRCH algorithm is used for ______________
a) Clustering b) Classification
c) Association rule generation d) None of these
15) K-means clustering is a ___________ clustering method.
a) Partitional b) Sampling c) Hierarchical d) Categorical
16) In data mining output is precise.
a) True b) False
17) ___________ is an approach to handle missing data.
a) Ignore the missing value b) Assume a value for missing data
c) Fill missing value manually d) All the above
18) ___________ is unsupervised learning.
a) Classification b) Regression
c) Clustering d) None of above
19) Which of the following is a measure task in data preprocessing
a) Data reduction b) Classification
c) Clustering d) None of above
20) Which among the following is an example of spatial databases ?
a) Transaction database b) Daily humidity
c) VLSI database d) Video data
___________________

Set S
*SLRTX393* -3- SLR-TX – 393
Seat
no.

B.E. (Computer Science and Engg.) (Part – II) Examination, 2018


data mining (elective – II) (Old)

Day and Date : Thursday, 20-12-2018 Marks : 80


Time : 2.30 p.m. to 5.30 p.m.

Instruction : All questions are compulsory.

SECTION – I

2. Solve any four : (4�5=20)


a) Explain difference between database processing versus data mining
processing.
b) Why there is a need of data preprocessing ?
c) What are difficulties in data mining processing ?
d) What is difference between supervised and unsupervised learning ?
e) Describe any five data mining applications.

3. With neat diagram, explain KDD process in detail. 10


OR
Explain in detail how Bayesian classification is done ? Explain with example.

4. Explain KNN classification algorithm with example. 10

SECTION – II

5. Solve any four : (4�5=20)


a) What do you mean by web usage mining ? Explain.
b) Write a note on graph data mining.

Set S
SLR-TX – 393 -4- *SLRTX393*
c) Explain page rank and clever in detail.
d) Write a note on Web usage mining.
e) Explain K-means partitioning algorithm.

6. Explain frequent itemset mining using appriori algorithm with suitable example. 10
OR
Write in detail note on temporal data mining.

7. Write short notes on : 10


a) R-trees
b) Spatial data mining.

_____________________

Set S
*SLRTX394* SLR-TX – 394
Seat
No.
Set P

B.E. (CSE) (Part – II) (Old) Examination, 2018


software testing and quality assurance (stqa) (Elective – II)
Day and Date : Thursday, 20-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct option :  20


1) Following is one of the view of software quality
a) Product view b) Sales view
c) Consumer view d) Process view
2) SQC means
a) Software Quality Control b) Statistical Quality Control
c) Structural Quality Control d) None of these
3) ________ testing is called as functional testing technique.
a) White box b) Regression c) Black box d) System
4) Shewhart cycle is also called as _____ cycle.
a) Edward cycle b) Software life cycle
c) Juse cycle d) PDCA
5) Quality is design’s __________ attribute.
a) External b) Internal c) Implicit d) All
6) The code in the unit was reused with fewer than 25% modifications is called as
a) reused verbatim b) slightly modified
c) extensively modified d) new reused document
7) ________ are entities required by a process activity.
a) Products b) Facts c) Resources d) Designs
P.T.O.
SLR-TX – 394 -2- *SLRTX394*
8) ________ plots are constructed from three summary statistics the median,
the upper quartile and the lower quartile.
a) scatter b) control c) implicit d) box
9) The _________ addresses the sequence in which instructions are executed
in a program.
a) control structure b) data structure
c) data flow d) none of these
10) _______ complexity where the resource is computer memory.
a) Error b) Space c) Time d) Design
11) ________ data flow testing is performed by analyzing the source code and
it does not involve actual execution of source code.
a) Dynamic b) Linear c) Static d) Compound
12) A __________ error occurs when an input value causes the program to
execute the wrong path.
a) internal b) static c) system d) domain
13) A control flow graph is a detailed ________ representation of a program unit.
a) graphical b) analytical c) structural d) linear
14) Failure ________ is a measure of the reliability of a software system
operating in a given environment.
a) density b) intensity c) quantity d) none of these
15) Tabular representation is one of the _________ profile in software reliability.
a) reliable b) professional c) operational d) none of these
16) In _______ characteristics, a test engineer must be very attentive to the details.
a) competent b) considerate c) critical d) comprehensive
17) The _______ concerns the extent to which a product meets user needs and
expectations.
a) user view b) product view
c) value based view d) transcendental view
18) Maintainability quality factor falls into _________ quality category.
a) product transition b) product revision
c) product operation d) all
19) A Quality _________ is an attribute of a quality factor that is related to
software development.
a) component b) assurance c) criterion d) none of these
20) Quality factor represents a _________ characteristic of a system.
a) static b) dynamic c) linear d) behavioral
__________

Set P
*SLRTX394* -3- SLR-TX – 394
Seat
No.

B.E. (CSE) (Part – II) (Old) Examination, 2018


software testing and quality assurance (stqa) (Elective – II)
Day and Date : Thursday, 20-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.

Section – I

2. Attempt any four (Each carries 5 marks) : 20


1) Explain white-box testing in detail.
2) Explain objectives of testing with an example.
3) Describe software measurement validation.
4) Explain box plot and scatter plot simple analysis technique in software
measurement.
5) Explain software size and length in measurement of software engineering.
6) Which data structures are used in software engineering measurement ?

3. Define software quality. Also explain software quality revolution in detail. 10


OR

What are the different types of coupling and cohesion used in models of
modularity and information flow in software engineering measurement. 10

4. Write note on (any two) : 10


1) Test Levels
2) Overview of statistical test
3) Object oriented metrics.

Set P
SLR-TX – 394 -4- *SLRTX394*
Section – II

5. Attempt any four (each carries 5 marks) : 20


1) Explain concept of domain testing.
2) Explain five views of software quality in detail.
3) What are the different factors influencing software reliability ?
4) Explain acceptance testing in detail.
5) Explain the structure of software quality assurance group.
6) What are the six phases of recruiting test Engineer ?

6. Define software reliability and also explain applications of software reliability. 10


OR
Explain black box testing in detail. 10

7. Explain McCalls Quality Factors and Criteria in detail.


Also explain relationship between McCall’s quality factors and quality criteria. 10
___________

Set P
*SLRTX394* SLR-TX – 394
Seat
No.
Set Q

B.E. (CSE) (Part – II) (Old) Examination, 2018


software testing and quality assurance (stqa) (Elective – II)
Day and Date : Thursday, 20-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct option :  20


1) In _______ characteristics, a test engineer must be very attentive to the details.
a) competent b) considerate c) critical d) comprehensive
2) The _______ concerns the extent to which a product meets user needs and
expectations.
a) user view b) product view
c) value based view d) transcendental view
3) Maintainability quality factor falls into _________ quality category.
a) product transition b) product revision
c) product operation d) all
4) A Quality _________ is an attribute of a quality factor that is related to
software development.
a) component b) assurance c) criterion d) none of these
5) Quality factor represents a _________ characteristic of a system.
a) static b) dynamic c) linear d) behavioral
6) Following is one of the view of software quality
a) Product view b) Sales view
c) Consumer view d) Process view

P.T.O.
SLR-TX – 394 -2- *SLRTX394*
7) SQC means
a) Software Quality Control b) Statistical Quality Control
c) Structural Quality Control d) None of these
8) ________ testing is called as functional testing technique.
a) White box b) Regression c) Black box d) System
9) Shewhart cycle is also called as _____ cycle.
a) Edward cycle b) Software life cycle
c) Juse cycle d) PDCA
10) Quality is design’s __________ attribute.
a) External b) Internal c) Implicit d) All
11) The code in the unit was reused with fewer than 25% modifications is called as
a) reused verbatim b) slightly modified
c) extensively modified d) new reused document
12) ________ are entities required by a process activity.
a) Products b) Facts c) Resources d) Designs
13) ________ plots are constructed from three summary statistics the median,
the upper quartile and the lower quartile.
a) scatter b) control c) implicit d) box
14) The _________ addresses the sequence in which instructions are executed
in a program.
a) control structure b) data structure
c) data flow d) none of these
15) _______ complexity where the resource is computer memory.
a) Error b) Space c) Time d) Design
16) ________ data flow testing is performed by analyzing the source code and
it does not involve actual execution of source code.
a) Dynamic b) Linear c) Static d) Compound
17) A __________ error occurs when an input value causes the program to
execute the wrong path.
a) internal b) static c) system d) domain
18) A control flow graph is a detailed ________ representation of a program unit.
a) graphical b) analytical c) structural d) linear
19) Failure ________ is a measure of the reliability of a software system
operating in a given environment.
a) density b) intensity c) quantity d) none of these
20) Tabular representation is one of the _________ profile in software reliability.
a) reliable b) professional c) operational d) none of these
__________
Set Q
*SLRTX394* -3- SLR-TX – 394
Seat
No.

B.E. (CSE) (Part – II) (Old) Examination, 2018


software testing and quality assurance (stqa) (Elective – II)
Day and Date : Thursday, 20-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.

Section – I

2. Attempt any four (Each carries 5 marks) : 20


1) Explain white-box testing in detail.
2) Explain objectives of testing with an example.
3) Describe software measurement validation.
4) Explain box plot and scatter plot simple analysis technique in software
measurement.
5) Explain software size and length in measurement of software engineering.
6) Which data structures are used in software engineering measurement ?

3. Define software quality. Also explain software quality revolution in detail. 10


OR

What are the different types of coupling and cohesion used in models of
modularity and information flow in software engineering measurement. 10

4. Write note on (any two) : 10


1) Test Levels
2) Overview of statistical test
3) Object oriented metrics.

Set Q
SLR-TX – 394 -4- *SLRTX394*
Section – II

5. Attempt any four (each carries 5 marks) : 20


1) Explain concept of domain testing.
2) Explain five views of software quality in detail.
3) What are the different factors influencing software reliability ?
4) Explain acceptance testing in detail.
5) Explain the structure of software quality assurance group.
6) What are the six phases of recruiting test Engineer ?

6. Define software reliability and also explain applications of software reliability. 10


OR
Explain black box testing in detail. 10

7. Explain McCalls Quality Factors and Criteria in detail.


Also explain relationship between McCall’s quality factors and quality criteria. 10
___________

Set Q
*SLRTX394* SLR-TX – 394
Seat
No.
Set R

B.E. (CSE) (Part – II) (Old) Examination, 2018


software testing and quality assurance (stqa) (Elective – II)
Day and Date : Thursday, 20-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct option :  20


1) ________ data flow testing is performed by analyzing the source code and
it does not involve actual execution of source code.
a) Dynamic b) Linear c) Static d) Compound
2) A __________ error occurs when an input value causes the program to
execute the wrong path.
a) internal b) static c) system d) domain
3) A control flow graph is a detailed ________ representation of a program unit.
a) graphical b) analytical c) structural d) linear
4) Failure ________ is a measure of the reliability of a software system
operating in a given environment.
a) density b) intensity c) quantity d) none of these
5) Tabular representation is one of the _________ profile in software reliability.
a) reliable b) professional c) operational d) none of these
6) In _______ characteristics, a test engineer must be very attentive to the details.
a) competent b) considerate c) critical d) comprehensive
7) The _______ concerns the extent to which a product meets user needs and
expectations.
a) user view b) product view
c) value based view d) transcendental view
P.T.O.
SLR-TX – 394 -2- *SLRTX394*
8) Maintainability quality factor falls into _________ quality category.
a) product transition b) product revision
c) product operation d) all
9) A Quality _________ is an attribute of a quality factor that is related to
software development.
a) component b) assurance c) criterion d) none of these
10) Quality factor represents a _________ characteristic of a system.
a) static b) dynamic c) linear d) behavioral
11) Following is one of the view of software quality
a) Product view b) Sales view
c) Consumer view d) Process view
12) SQC means
a) Software Quality Control b) Statistical Quality Control
c) Structural Quality Control d) None of these
13) ________ testing is called as functional testing technique.
a) White box b) Regression c) Black box d) System
14) Shewhart cycle is also called as _____ cycle.
a) Edward cycle b) Software life cycle
c) Juse cycle d) PDCA
15) Quality is design’s __________ attribute.
a) External b) Internal c) Implicit d) All
16) The code in the unit was reused with fewer than 25% modifications is called as
a) reused verbatim b) slightly modified
c) extensively modified d) new reused document
17) ________ are entities required by a process activity.
a) Products b) Facts c) Resources d) Designs
18) ________ plots are constructed from three summary statistics the median,
the upper quartile and the lower quartile.
a) scatter b) control c) implicit d) box
19) The _________ addresses the sequence in which instructions are executed
in a program.
a) control structure b) data structure
c) data flow d) none of these
20) _______ complexity where the resource is computer memory.
a) Error b) Space c) Time d) Design
__________
Set R
*SLRTX394* -3- SLR-TX – 394
Seat
No.

B.E. (CSE) (Part – II) (Old) Examination, 2018


software testing and quality assurance (stqa) (Elective – II)
Day and Date : Thursday, 20-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.

Section – I

2. Attempt any four (Each carries 5 marks) : 20


1) Explain white-box testing in detail.
2) Explain objectives of testing with an example.
3) Describe software measurement validation.
4) Explain box plot and scatter plot simple analysis technique in software
measurement.
5) Explain software size and length in measurement of software engineering.
6) Which data structures are used in software engineering measurement ?

3. Define software quality. Also explain software quality revolution in detail. 10


OR

What are the different types of coupling and cohesion used in models of
modularity and information flow in software engineering measurement. 10

4. Write note on (any two) : 10


1) Test Levels
2) Overview of statistical test
3) Object oriented metrics.

Set R
SLR-TX – 394 -4- *SLRTX394*
Section – II

5. Attempt any four (each carries 5 marks) : 20


1) Explain concept of domain testing.
2) Explain five views of software quality in detail.
3) What are the different factors influencing software reliability ?
4) Explain acceptance testing in detail.
5) Explain the structure of software quality assurance group.
6) What are the six phases of recruiting test Engineer ?

6. Define software reliability and also explain applications of software reliability. 10


OR
Explain black box testing in detail. 10

7. Explain McCalls Quality Factors and Criteria in detail.


Also explain relationship between McCall’s quality factors and quality criteria. 10
___________

Set R
*SLRTX394* SLR-TX – 394
Seat
No.
Set S

B.E. (CSE) (Part – II) (Old) Examination, 2018


software testing and quality assurance (stqa) (Elective – II)
Day and Date : Thursday, 20-12-2018 Total Marks : 100
Time : 2.30 p.m. to 5.30 p.m.

Instructions : 1) Q. No. 1 is compulsory. It should be solved in first


30 minutes in Answer Book Page No. 3. Each question
carries one mark.
2) Answer MCQ/Objective type questions on Page No. 3 only.
Don’t forget to mention, Q.P. Set (P/Q/R/S) on Top of
Page.

MCQ/Objective Type Questions


Duration : 30 Minutes Marks : 20

1. Choose the correct option :  20


1) The code in the unit was reused with fewer than 25% modifications is called as
a) reused verbatim b) slightly modified
c) extensively modified d) new reused document
2) ________ are entities required by a process activity.
a) Products b) Facts c) Resources d) Designs
3) ________ plots are constructed from three summary statistics the median,
the upper quartile and the lower quartile.
a) scatter b) control c) implicit d) box
4) The _________ addresses the sequence in which instructions are executed
in a program.
a) control structure b) data structure
c) data flow d) none of these
5) _______ complexity where the resource is computer memory.
a) Error b) Space c) Time d) Design
6) ________ data flow testing is performed by analyzing the source code and
it does not involve actual execution of source code.
a) Dynamic b) Linear c) Static d) Compound

P.T.O.
SLR-TX – 394 -2- *SLRTX394*
7) A __________ error occurs when an input value causes the program to
execute the wrong path.
a) internal b) static c) system d) domain
8) A control flow graph is a detailed ________ representation of a program unit.
a) graphical b) analytical c) structural d) linear
9) Failure ________ is a measure of the reliability of a software system
operating in a given environment.
a) density b) intensity c) quantity d) none of these
10) Tabular representation is one of the _________ profile in software reliability.
a) reliable b) professional c) operational d) none of these
11) In _______ characteristics, a test engineer must be very attentive to the details.
a) competent b) considerate c) critical d) comprehensive
12) The _______ concerns the extent to which a product meets user needs and
expectations.
a) user view b) product view
c) value based view d) transcendental view
13) Maintainability quality factor falls into _________ quality category.
a) product transition b) product revision
c) product operation d) all
14) A Quality _________ is an attribute of a quality factor that is related to
software development.
a) component b) assurance c) criterion d) none of these
15) Quality factor represents a _________ characteristic of a system.
a) static b) dynamic c) linear d) behavioral
16) Following is one of the view of software quality
a) Product view b) Sales view
c) Consumer view d) Process view
17) SQC means
a) Software Quality Control b) Statistical Quality Control
c) Structural Quality Control d) None of these
18) ________ testing is called as functional testing technique.
a) White box b) Regression c) Black box d) System
19) Shewhart cycle is also called as _____ cycle.
a) Edward cycle b) Software life cycle
c) Juse cycle d) PDCA
20) Quality is design’s __________ attribute.
a) External b) Internal c) Implicit d) All
__________
Set S
*SLRTX394* -3- SLR-TX – 394
Seat
No.

B.E. (CSE) (Part – II) (Old) Examination, 2018


software testing and quality assurance (stqa) (Elective – II)
Day and Date : Thursday, 20-12-2018 Marks : 80
Time : 2.30 p.m. to 5.30 p.m.

Section – I

2. Attempt any four (Each carries 5 marks) : 20


1) Explain white-box testing in detail.
2) Explain objectives of testing with an example.
3) Describe software measurement validation.
4) Explain box plot and scatter plot simple analysis technique in software
measurement.
5) Explain software size and length in measurement of software engineering.
6) Which data structures are used in software engineering measurement ?

3. Define software quality. Also explain software quality revolution in detail. 10


OR

What are the different types of coupling and cohesion used in models of
modularity and information flow in software engineering measurement. 10

4. Write note on (any two) : 10


1) Test Levels
2) Overview of statistical test
3) Object oriented metrics.

Set S
SLR-TX – 394 -4- *SLRTX394*
Section – II

5. Attempt any four (each carries 5 marks) : 20


1) Explain concept of domain testing.
2) Explain five views of software quality in detail.
3) What are the different factors influencing software reliability ?
4) Explain acceptance testing in detail.
5) Explain the structure of software quality assurance group.
6) What are the six phases of recruiting test Engineer ?

6. Define software reliability and also explain applications of software reliability. 10


OR
Explain black box testing in detail. 10

7. Explain McCalls Quality Factors and Criteria in detail.


Also explain relationship between McCall’s quality factors and quality criteria. 10
___________

Set S

Potrebbero piacerti anche