Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Total 24 6 28
Note: All End Examinations (Theory and Practical) are of three hours duration.
T – Tutorial L-Theory P- Practical C – Credits
9.2 PREREQUISITES:
University End
Session Marks Total Marks
Exam Marks
Mid Semester Test
There shall be two midterm examinations.
Each midterm examination consists of subjective type and objective type
tests.
The subjective test is for 10 marks of 60 minutes duration.
Subjective test of shall contain 4 questions; the student has to answer2
questions, each carrying 5 marks.
The objective type test is for 10 marks of 20 minutes duration. It consists of
10 Multiple choice and 10 objective type questions, the student has to 75 100
answer all the questions and each carries half mark.
First midterm examination shall be conducted for the first two and half
units of syllabus and second midterm examination shall be conducted for
the remaining portion.
Assignment
Five marks are earmarked for assignments.
There shall be two assignments in every theory course. Marks shall be
awarded considering the average of two assignments in each course.
COURSE OBJECTIVES:
I. Define the structure and design principles of programming languages.
II. Describe the skills in analyzing and using the features of programming languages.
III. Describe the preliminary concepts like context - free grammars, Backus - Naur
form, parse trees.
IV. State various data types of different programming languages.
V. Summarize the difference between logic programming and functional programming
languages.
VI. Express the role of variable declarations in programming languages, in particular to
binding, scope, and substitution of variables.
VII. Demonstrate the use of scripting languages.
Blooms
Course Objectives Course Outcomes
Level
I. Define the structure and design principles of a) Students will be able to List out Basic
BL 1
programming languages. Concepts of Programming Language
II, Explain the skills in analyzing and using the a) Students will be able to Describe Basic
BL 2
features of programming languages. Concepts of Programming Language
b) Students will be able to Solve whether
III. Illustrate the preliminary concepts like context-
the grammar is Unambiguous or BL 3
free grammars, Backus-Naurform, parsetrees.
ambiguous and construct a parse tree
c) Students will be able to correlate with
IV. Analyze various data types of different the basic concepts of Variables, Storage,
BL 4
programming languages. Binding and Scope rules of different
languages with data types
V. Compare between logic programming and a) Students will be able to Support Basic
BL 5
functional programming languages. Concepts of Programming Language
VI. Generalize the role of variable declarations in d) Students will be able to
BL 6
programming languages, in particular to binding, plan a Concurrency Control Mechanism
Proficiency
Program Outcomes Level
assessed by
An ability to apply the knowledge of mathematics, Computing, Science and Assignment,
A S
engineering to solve Computer Science and Engineering problems. Exercises
An ability to design and conduct engineering experiments, as well as to analyze
B S Exercises
and interpret data
An ability to design and construct a hardware and software system component,
C S Exercises
or process to meet desired needs, within realistic constraints.
Graduates will demonstrate an ability to visualize and work on laboratory and
D S Exercises
Multi-disciplinary tasks individually or as a member within the teams.
An ability to demonstrate skills to use the techniques, modern engineering
E Tools, Software and equipment’s necessary to analyze computer engineering H Exercises
Problems
An ability to recognize the global issues like green initiatives and alternate
G energy sources and to take technology to villages and to recognize the rural N .......
requirement
The broad education necessary to understand the impact of engineering Seminars,
H S
solutions in a global, economic, environmental, and societal context Discussions
Graduate will develop confidence for self-education and acquire new
I knowledge in the computing discipline and ability and practice for Multi- H Exercises
disciplinary tasks as a member within the teams
Seminars, Paper
J To communicate effectively S
Presentation
An ability to use the techniques, skills and modern engineering tools necessary Exercises,
K H
for Engineering practice. Discussions
Graduates are able to participate and succeed in competitive examination like
L S Exams, Discussions
GRE, GATE, TOEFL, GMAT etc.
The use of current application software and the design and use of operating
systems and the analysis, design, testing and documentation of computer S Exercises
programs for the use in Computer Science and engineering technologies.
N = None S = Supportive H = Highly Related
9.7 SYLLABUS:
UNIT - I
Preliminary Concepts : Reasons for studying concepts of programming languages,
programming domains, Language evaluation criteria, influences on language design,
Language categories, Programming paradigms – Imperative, Object Oriented, functional
TEXT BOOKS
1. Concepts of Programming Languages, Robert W Sebesta, Eighth Edition Pearson
Education, 2008.
2. Programming Language Design Concepts, D. A. Watt, Wiley Dreamtech, Rp-2007.
REFERENCES
1. Programming Languages, Second Edition, A.B. Tucker, R.E. Noonan, TMH.
2. Programming Languages, K.C. Louden, Second Edition, Thomson, 2003.
3. LISP Patric Henry Winston and Paul Hom Pearson Education.
4. Programming in PROLOG – W.F. Clocksin and C.S.Mellish, Fifth Edition, Springer.
5. Programming Python, M.Lutz, Third Edition, O’reilly, SPD, rp-2007.
6. Core Python Programming, Chun, Second Edition, Pearson Education, 2007.
7. Guide to Programming with Python, Michael Dawson, Thomson, 2008.
Course
Lecture
Learning Blooms Levels Topics to be covered Reference
No.
Outcomes
Reasons for studying, concepts of programming
1 T1 pg:1.2
Reviews the Remembering / languages.
concepts of Knowledge http://nptel.ac.in/courses/106102067/1
2 T1 pg:1.5
Progamming domains.
Language Evaluation Criteria, influences on T1 pg:1.7-
3-4 To Devalop the
Applying / Language design. 1.19
Programming
Application http://nptel.ac.in/courses/106102067/1
5 languages T1 pg:1.22
Language categories.
Programming Paradigms – Imperative ,Object
List out various
Remembering / Oriented, functional Programming , Logic
7-8 programming T1 pg:1.25
Knowledge Programming.
paradigms.
http://nptel.ac.in/courses/106102067/1
Recall the design
Remembering / Programming Language Implementation – T1 pg:2.2-
9-10 issues of
Knowledge Compilation and Virtual Machines, 2.22
implementation.
11-12 Programming environments T1 pg:1.32
General Problem of describing Syntax and
Semantics,
13 1)http://nptel.ac.in/courses/106102067/2 T1 pg:3.3
Recall various 2)http://nptel.ac.in/courses/106102067/5
Remembering / 3)http://nptel.ac.in/courses/106102067/6
programming
Knowledge
environments. Formal methods of describing syntax -BNF,
EBNF for common programming languages
14-17 T1 pg:3.5
features.
http://nptel.ac.in/courses/106102067/38
parse trees, ambiguous grammars. T1 pg:3.6-
18
http://nptel.ac.in/courses/106102067/4 3.7
Elaborates the Attribute grammars.
19 T1 pg:3.20
features of Understanding / http://nptel.ac.in/courses/106102067/3
attribute Comprehension denotational semantics and axiomatic semantics
20-22 T1 pg:3.27
grammars. for common programming language features.
SESSION PLANNER
Text/
Date Date
Unit Class Reference Session Objectives
Topic planned conducted
book
1. By the end of the session
student will identify concepts
Preliminary Concepts: of PPL
L1 T1
Introduction 2.. By the end of the session
student will understand
concepts of PPL
1. By the end of the session
student will identify concepts
Reasons for studying of for studying PPL
L2 T2
PPL 2.. By the end of the session
student will understand
concepts of for studying PPL
1. By the end of the session
student will identify concepts
Concepts of
of Programming domains
programming
L3 T1 2.. By the end of the session
languages,
student will understand
Programming domains
concepts of Programming
domains
1. By the end of the session
student will identify concepts
of Language Evaluation
I L4, Language Evaluation Criteria
T1
L5 Criteria 2.. By the end of the session
student will understand
concepts of Language
Evaluation Criteria
1. By the end of the session
student will identify concepts
of Influences on Language
Influences on design
L6 T1
Language design 2.. By the end of the session
student will understand
concepts of Influences on
Language design
1. By the end of the session
Language categories student will identify concepts
&Programming of Language categories
L7 Paradigms – T1 2.. By the end of the session
imperative, object student will understand
oriented concepts of Language
categories
1. By the end of the session
student will identify concepts
of functional Programming ,
functional Logic Programming
L8 Programming , Logic T1 2. By the end of the session
Programming student will understand
concepts of functional
Programming , Logic
Programming
L9, Programming 1. By the end of the session
T1
L10 Language student will identify concepts
,Denotational semantics
2.. By the end of the session
student will understand
concepts of Axiomatic
semantics ,Denotation
semantics
1. By the end of the session
student will identify concepts
of operational and denotation
Differences between
semantics
L20 operational and T1
2.. By the end of the session
denotation semantics
student will understand
concepts of operational and
denotation semantics
1. By the end of the session
student will identify concepts
of Data types: Introduction,
Data types: primitive, character, user
Introduction, defined
L21 T1
primitive, character, 2.. By the end of the session
user defined student will understand
concepts of Data types:
Introduction, primitive,
character, user defined
1. By the end of the session
student will identify concepts
L22, of Array
Array T1
L23 2.. By the end of the session
student will understand
concepts of Array
1. By the end of the session
student will identify concepts
of Associative, Record,
II L24,L Associative, Record, Union
T1
25 Union 2.. By the end of the session
student will understand
concepts of Associative,
Record, Union
1. By the end of the session
student will identify concepts
Pointer and reference of Pointer
L26 T1
types 2.. By the end of the session
student will understand
concepts of Pointer
1. By the end of the session
student will identify concepts
of Names, Variables,
Concept of binding, Type
Names, Variables,
checking
L27 Concept of binding, T1
2.. By the end of the session
Type checking
student will understand
concepts of Names,
Variables, Concept of
binding, Type checking
1. By the end of the session
Strong typing, Type
student will identify concepts
compatibility, Named
L28 T2 of Strong typing, Type
constants, Variable
compatibility, Named
initialization
constants, Variable
initialization
2.. By the end of the session
student will understand
concepts of Strong typing,
Type compatibility, Named
constants, Variable
initialization
CLASS TEST UNIT 3
1. By the end of the session
student will identify concepts
Expressions and
of Expressions and
Statements:
Statements
L29 Arithmetic relational T1
2.. By the end of the session
and Boolean
student will understand
expressions
concepts of Expressions and
Statements
1. By the end of the session
student will identify concepts
Short circuit of Short circuit evaluation
L30 evaluation , mixed T1 2.. By the end of the session
mode assignment student will understand
concepts of Short circuit
evaluation
1. By the end of the session
student will identify concepts
of Assignment Statements,
Assignment Control Structures Statement
Statements, Control Level, Compound statements
L31 Structures Statement T1 2.. By the end of the session
Level, Compound student will understand
statements concepts of Assignment
Statements, Control
Structures Statement Level,
Compound statements
1. By the end of the session
student will identify concepts
of Selection, Iteration
L32 Selection, Iteration T1 2.. By the end of the session
student will understand
concepts of Selection,
Iteration
1. By the end of the session
student will identify concepts
of Unconditional Statements
Unconditional
L33 T1 2.. By the end of the session
Statements
student will understand
concepts of Unconditional
Statements
1. By the end of the session
student will identify concepts
of guarded commands-
selection, iteration
guarded commands-
L34 T1 2.. By the end of the session
selection, iteration
student will understand
concepts of guarded
commands-selection,
iteration
CLASS TEST UNIT-2
III L35 Subprograms and T2 1. By the end of the session
of LISP, ML
2.. By the end of the session
student will understand
concepts of LISP, ML
1. By the end of the session
HASKELL, Scoping student will identify concepts
rule in common T1 of HASKELL
L62
LISP,ML AND R5 2.. By the end of the session
HASKELL, student will understand
concepts of HASKELL
1. By the end of the session
student will identify concepts
Applications of FPL,
of Applications of FPL
Comparison of FPL
L63 R5 2.. By the end of the session
and imperative
student will understand
languages
concepts of Applications of
FPL
1. By the end of the session
student will identify concepts
Scripting language: of Scripting language
L64 introduction, Key R5 2.. By the end of the session
concepts student will understand
concepts of Scripting
language
1. By the end of the session
student will identify concepts
of PYTHON
L65 Case study: PYTHON R5
2.. By the end of the session
student will understand
PYTHON
CLASS TEST UNIT-5
L66 REVISION
C. S S S S H S S
D. S
E. S S S S H S S
F. H S S
S=Supportive H=Highly Related
UNIT-1
1. Which of the following language is widely used for Scientific Applications?
[March 2000]
A. ALGOL60
B. COBOL
C. LISP
D. FORTRAN
Answer : C
2. Which of the following languages support Independent Compilation? [ ] [March
2005]
A. ADA
B. FORTRAN90
C. FORTRAN II to FORTRAN77
D. C++
Answer: C
3. According to Von Neumann architecture, the central feature of imperative
Languages is [March2009]
A. registers
B. variables
C. identifiers
D. keywords
Answer: C
4. ________ is the first functional programming language [ ] [March 2011]
A. Ada
B. LISP
C. prolog
D. none
Answer : B
5. The following is the widely used programming language developed for Artificial
Intelligence [ ] [March 2007]
A. LISP
B. FORTRAN
C. COBOL
D. ALGOL 60
Answer : A
6. What is the post condition for x = 2 * y + 3 { x> 25 } [ ] [March 2005]
A. y>11
B. x > 25
C. y > 14
D. y > 13
Answer: B
7. Which of the following is a device that can be used to generate the sentences of a
______language? [ ] [March 2013]
A. Language generator
B. Language recognizers
C. Program generator
D. Sentence generator
Answer A
8. When a grammar rule has its LHS also appearing at the beginning of its RHS
called [ ] [March 2011]
A. Right recursive
B. Left recursive
C. Recursion
D. A&B
Answer B
9. Which attributes are used to pass semantic information up a parse tree [ ] [March
2005]
A. Synthesized attributes
B. Inherited attributes
C. Hirarchial attributes
D. None
Answer A
10. Which parser trace and build the parse tree in preorder [ ][March 2000]
A. Bottom up
B. Top down
C. Only up
D. Up and down
Answer B
11. ________ refers to a collection of tools used in the development of software
programs [ ][March 2009]
A. Programming Environment
B. Programming
C. Aliasing
D. Environment
Answer B
12. An ____ is a logical statement that is assumed to be true[ ] [March 2011]
A. Axiom
B. Socket
C. Stack
D. Static
Answer A
13. The Logical expressions are called [ ] [March 2013]
A. Assertions
B. Semantics
C. Strings
D. Symbols
Answer A
14. The abstractions in a BNF description or grammar are often called __________ [ ]
[March2014]
A. Rules
B. Conditions
C. Non terminals
D. Terminals
Answer C
15. A Sentence generation is called a ___________ [ ] [March 2006]
A. Statement
B. Token
C. Derivation
D. BNF
Answer C
16. The __________ of a language is category of its lexemes [ ] [March 2009]
A. String
B. Statements
C. Token
D. None of the above
Answer C
17. Which of the following is a natural notation for describing syntax [ ] [March 2011]
A. Regular grammar
B. Automata
C. Context-free grammar
D. Backus-Naur Form
Answer D
18 Which of the following gather the characters of the source program into lexical
units [ ] [March 2009]
A. Lexical Analyzer
B. Syntax Analyzer
C. Parse Tree
D. Code Generator
Answer A
19. Languages designed on Von Neumann architecture are called as [ ] [March 2005]
A. Imperative Languages
B. OOPL
C. Explicit Languages
D. Prolog Language
Answer A
20. List of commands put in a file is known as [ ] [March 2000]
A. Tag
B. Language
C. Script
D. Program
Answer C
UNIT II
1. In c and C++ the asterisk (*) denotes the operation. [ ] [March 2005]
A. dereferencing
B. negation
C. referencing
D. address
Answer A
2. The ------- of a variable is the time between creation and termination [ ] [March
2009]
A. context
B. scope
C. range
D. life time
Answer D
3. The associatively of postfix + + operator in C + + is [ ] [March 2011]
A. Right
B. depends on expression
C. any order
D. Left
Answer A
4. The following Type compatibility is described in Semantics [ ] [March 2013]
A. structured
B. static
C. denotional
D. dynamic
Answer B
5. The following type is one in which the variables have arrange of values that
consists of memory addresses and a special value nil [ ] [March 2011]
A. enumerated
B. pointer
C. derived
D. Linked List
Answer B
8. The following language has pointer concept [ ] [March 2009]
A. java
B. C++
C. DHTML
D. HTML
Answer B
9. The first high level programming to include pointer variables was [ ] [March 2005]
A. For tran
B. PL/1
C. ALGOL 60
D. ADA
Answer B
10. _____data type specifically available in a language for business applications
[March 2000]
A. int
B. double
C. decimal
D. float
Answer C
11. The following type stores values as sequences of characters [ ] [March 2009]
A. boolean
B. float
C. int
D. string
Answer D
12. __________is the first functional programming language [ ] [March 2011]
A. Ada
B. LISP
C. prolog
D. none
Answer B
13. A _________is a type whose variables are allowed to store different type values in
same memory [ ] [March 2009]
A. record
B. union
C. associative array
D. array
Answer B
14. Dynamic type checking allowed in [ ] [March 2010]
A. C
B. PHP
C. Java Script
D. B&C
Answer D
15. Variables that are dynamically allocated from the heap is called [ ] [March 2013]
A. Static variables
B. Dynamic variables
C. heap dynamic variables
D. A&B
Answer C
16. The following language does not use the equals sign for assignment operator [ ]
[March2012]
A. ALGOL 6 0
B. C
C. BAS C
D. C++
Answer A
17. In FORTRAN 90, Loop parameters are evaluated [ ] [March 2011]
A. thrice
B. only once
C. twice
D. every time
Answer B
18. Logical expressions are called [ ] [March 2009]
A. axioms
B. conditions
C. assertions
D. subjects
Answer C
19. The equality operator in Fortran95 is _______________. [ ] [March 2005]
A. .EQ
B. EQUAL
C. ==
D. none
Answer A
20 __________ is bound to value only once [ ] [March 2000]
A. Static variable
B. Dynamic variable
C. Named constant
D. both (a) & (b)
Answer C
UNIT III
1. The first actual parameteris bound to the first formal parameter and so forth,
such parameters are called POSITIONAL PARAMETERS. [March 2000]
2. An OVERLOADED SUBPROGRAM is one that has the same name as another
subprogram in the same referencing environment. [March 2005]
3. A GENERIC sub program is one whose computation can be done on data of different
types in different calls. [March 2009]
4. The three semantic models are IN MODE, OUT MODE, INOUT MODE.
5. C uses PASS-BY-VALUE and pass-by-reference semantics is achieved by using
POINTERS as parameters. [March 2011]
6. An OVERLOADED SUBPROGRAM is a subprogram that has the same name as
another subprogram in the same referencing environment. [March 2009]
7. The invocation of a co routine is called a RESUME. [March 2010]
8. Only one processor but all of the executing programs in such a system appear to run
concurrently, while sharing the process this is called as QUASI-CONCURRENCY.
[March 2011]
9. A POLYMORPHIC subprogram takes parameters of different types on different
activations. [March 2005]
10. Overloaded subprograms provide a particular kind of polymorphism called AD HOC
POLYMORPHISM. [March 2000]
11. Block concept was introduced by [ ] [March 2009]
A. Fortran
B. ALGOL60
C. PL/I
D. Ada
Answer B
12. Multiple selector statement in C is [ ] [March 2013]
A. Case
B. switch
C. goto
D. continue
Answer C
13. Parameters in subprogram header are called [ ] [March 2012]
A. formal parameters
B. actual parameters
C. local variables
D. global variables
Answer A
14. Loop.. end loop is used in [ ] [March 2010]
A. FORTRAN
B. PASCAL
C. Ada
D. C
Answer C
UNIT-IV
1. An ABSTRACTION is a view or representation of an entity that includes only the
most significant attributes. [March 2000]
2. The concept of PROCESS ABSTRACTION is the oldest in programming language
design. [March 2005]
3. An instance of an abstract data type is called an OBJECT. [March 2009]
4. The concept of data abstraction had its origins in SIMULA 67. [March 2005]
5. The encapsulating constructs in ADA are called PACKAGES. [March 2011]
6. Package that provides interface of the encapsulation is called SPECIFICATION
PACKAGE. [March 2012]
7. Package which provides implementation of entities in specification package are called
BODY PACKAGE. [March 2013]
8. Data defined in C++ class are called DATA MEMBERS and the functions defined in a
class are called MEMBER FUNCTIONS. [March 2011]
9. Heap-Dynamic class objects are created with the NEW operator and destroyed with the
DELETE operator. [March 2005]
10. Object oriented programming has its roots in SIMULA 67. [March 2000]
11. The special processing that may be required when an exception is detected is called
EXCEPTION HANDLING. [March 2009]
12. In some situations it is necessary to complete some computations regardless of how
subprogram execution terminates such a computation is called FINALIZATION.
[March 2013]
13. The java system includes two predefined exception classes that are subclasses of
Throwable, ERROR and EXCEPTION. [March 2009]
14. Programming that uses a form of symbolic logic as a programming language is called
LOGIC PROGRAMMING. [March 2011]
15. The form of implementation of prolog is sometimes called as EDINBURGH
SYNTAX. [March 2012]
16. The first implementation of Edinburg syntax is done on DEC system10. [March 2014]
17. All the statements in prolog are constructed from TERM. [March 2011]
18. In rule statement the left part representing then statement is called CONSEQUENT
where as if part at the right side is called the ANTECEDENT. [March 2009]
19. PROPOSITIONS are the logical statements that may evaluate either true or false.
[March 2005]
20. Queries in prolog are called GOALS, when a goal is a composite proposition its facts
are called SUBGOALS. [March 2000]
UNIT-V
1. In FPL a mathematical function is a plot between members of two sets called
DOMAIN SET and RANGE SET. [March 2000]
2. A method called as the Lambda notation is used for defining NAMELESS functions.
3. (car L)= (car(car L)). [March 2005]
4. Original LISP contains two types of data ATOMS and LISTS. [March 2009]
5. ML has EXCEPTION HANDLING and a MODULE facility for implementing
abstract data types. [March 2011]
6. ML is a STRONGLY typed language. [March 2010]
7. Haskell uses NON STRICT semantics. [March 2011]
8. ML uses STRICT SEMANTICS. [March 2009]
9. HASKELL is designed by THOMPSON 1999. [March 2005]
10. In LISP ,function calls are specified using [ ] [March 2000]
A. Postfix
B. Cambridge polish
C. Infix
D. reverse polish
Answer B
11. In the original LISP the number of data types available was [ ] [March 2011]
A. 1
B. 2
C. 3
D. 4
Answer B
12. CAR in LISP returns the following element of a list [ ] [March 2010]
A. first
B. last
C. tail
D. second
Answer A
13. Following is the keyword used to defina a function in LISP [March 2012]
A. FUN
B. DEFINE
C. CAR
D. LIST
Answer B
14. Function declaration in ML can be done using the keyword [ ] [March 2013]
A. function
B. procedure
C. DEFINE
D. fun
Answer D
15. The method of defining infinite lists in Haskell is [ ] [March 2014]
A. Linked List
B. Lambda expression
C. List comprehension
D. Not possible
Answer C
16. For logic programming, following symbolic logic is used [ ] [March 2011]
A. Integration
B. Relational Algebra
C. Relational Calculus
Answer C
17. A function is [ ] [March 2011]
A. Parameter
B. Function Symbol
C. Compound Term
D. None
Answer B
18. “implies” logical connections is represented using [ ] [March 2009]
A. C
B. „E
C. E‟
D. ø
Answer B
19. CDR in LISP returns the following element of a list [ ] [March 2005]
A. Last and first elements
B. Last but one element
C. remainder of a given list after CAR is removed
D. Entire list except the last element
Answer C
20. Which of the following are scripting languages [ ] [March 2000]
A. HTML
B. C
C. Ada
D. COBOL
Answer A
Blooms
Course
S. No Questions Taxonomy
Outcome
Level
UNIT –I
1. Define Programming Language. Knowledge a
2. Difference between sentence and sentential form. Analysis b
3. Define Syntax and Semantics. Knowledge a
4. Differentiate between Syntax and Semantics. Analysis b
5. Write BNF notation for i) For loop ii) if-else condition Synthesis c
6. Give grammars for simple assignment statements. Comprehension c
7. Give an un ambiguous grammar for if-then-else. Comprehension c
8. Define Parse trees. Knowledge a
9. Define Denotational semantics. Knowledge a
10. Define Operational semantics. Knowledge a
11. Define Axiomatic semantics. Knowledge a
12. Differentiate compiler and interpreter. Analysis b
13. Describe language recognizers. Knowledge a
14. Describe generators. Knowledge a
15. Distinguish simplicity and orthogonally Comprehension c
UNIT –II
1. Distinguish static and dynamic scoping. Comprehension c
2. Define associative arrays. Knowledge a
3. Define guarded commands? Knowledge a
4. Distinguish named type and structure type compatibility. Comprehension c
5. List the merits of sub range types. Knowledge a
6. Differentiate union and enumeration. Analysis b
7. Define data type. Knowledge a
8. List the merits of type checking. Knowledge a
9. Define user defined data type. Knowledge a
10. Define widening and narrowing conversions? Knowledge a
UNIT -III
1. Define scope and lifetime of a variable. Knowledge a
2. Differentiate shallow and deep binding. Analysis b
3. Define subprogram. Knowledge a
4. Define procedures. Knowledge a
5. Define local referencing environment. Knowledge a
6. Differentiate static and dynamic binding. Analysis b
UNIT –IV
1 Define an exception. Knowledge a
2 Define a thread. Knowledge a
S. Blooms Course
Question
No Taxonomy Level Outcome
UNIT –I
Discuss language evaluation criteria and the characteristics that affect
1. Comprehension c
them.
2. List the potential benefits of studying programming language concept. Knowledge a
Comprehension,
Explain syntax of a “for” statement in PASCAL using BNF notation
3. Synthesis, b/c/d
and syntax graphs.
Evaluation
Comprehension,
Explain syntax of declaration statement in PASCAL using BNF
4. Synthesis, b/c/d
notation and syntax graphs.
Evaluation
Compute the weakest precondition for each of the following simple
assignment statements and post conditions.
a=2*(b-1)-1{a>0}
5. Application e
b=(c+10)/3 {b>6}
a=a+2*b-1 {a>1}
X=2*y+x-1 {x>11}
Write BNF notation for following: Application,
6. d/e
a)For loop b)If-else condition c)Structure definition Synthesis
Define left most derivation. Prove that the following grammar is
ambiguous.
<program>->begin<stmt_list>end
<stmt_list>-><stmt>
|<stmt>;<stmt_list>
7 Knowledge a
<stmt>-><var>=<expression>
<var>-> A|B|C
<expression>-><var>+<var>
|<var>-<var>
|<var>
Evaluation
Knowledge,
3. Describe briefly about Monitors. Comprehension, d
Evaluation
4. Discuss Object Oriented Programming in SMALLTALK. Comprehension c
Application,
5. Write about goal statements and simple arithmetic in PROLOG. d/e
Synthesis
Define binary semaphore. What is counting semaphore? What are the
6. Knowledge a
primary problems with using semaphores to provide synchronization?
Explain the following terms:
• process synchronization Comprehension,
7 • race condition Synthesis, b/c/d
• binary semaphores Evaluation
• MIMD
Comprehension,
8 Explain different types of propositions present in logic programming. Synthesis, d
Evaluation
Knowledge,
Describe the cooperation synchronization and competition
9 Comprehension, d
synchronization in message passing.
Evaluation
Discuss how dining philosopher’s problem and producer consumer
10 Comprehension c
problem are solved using concurrency in Ada.
UNIT – V
Application,
1 Write about control constraints in Python. d/e
Synthesis
Application,
2 Write about data abstraction in Python. d/e
Synthesis
Application,
3 Write about data types and structures of LISP and LISP interpreter. d/e
Synthesis
4 List the ways in which ML is significantly different from scheme. Knowledge a
Knowledge,
5 Describe the scoping rule in common LISP, ML and HASKELL. Comprehension, c
Evaluation
Comprehension,
6 Explain the characteristics of scripting languages. Synthesis, c
Evaluation
7 Discuss in detail about the python primitive types. Comprehension c
Comprehension,
8 Explain about LISP functional programming language. Synthesis, b
Evaluation
9 Discuss and trace the Python code to find the factorial of a number. Comprehension c
Discuss and trace the Python code to print the Fibonacci series
10 Comprehension c
between the given ranges of numbers.
Blooms
S. Course
Questions Taxonomy
No Outcome
Level
UNIT –I
Give some reasons why computer scientist and professional software
1 developers should study general concepts of language design and Comprehension c
evaluation.
Write reasons for the statement: “Exception handling is very Application,
2 d/e
important, but often neglected by programming languages”. Synthesis
UNIT – II
List what advantages does java’s break statement have over C’s and
1 Knowledge a
C++’s break statement.
State whether static binding is more reliable or dynamic binding.
2 Knowledge a
Explain why.
UNIT -III
Analysis ,
1. Compare the parameter passing mechanisms of ALGOL and ADA. c/d
Evaluation
State the importance of Local Referencing Environments with suitable
2. Knowledge a
examples.
3. Discuss about different parameter passing methods of Ada language. Comprehension c
UNIT –IV
Discuss the reasons for using exception handlers in a programming
Comprehensi
1. language. What if there exist programming languages with no exception c
on
handlers.
Comprehensi
2. Give the sample code to factorial of a number in PROLOG language. c
on
Sketch the importance of logic programming languages over functional
3. Understand a
programming languages.
UNIT -V
Application,
1. Write features of Haskell that makes very different from schema. d/e
Synthesis
Blooms
Course
S. Taxonomy
Questions Outcome
No Level
UNIT –I
1 Define Programming Language. Knowledge a
2 Difference between sentence and sentential form. Analysis b
3 Define Syntax and Semantics. Knowledge a
4 Differentiate between Syntax and Semantics. Analysis a
5 Write BNF notation for i) Forloop ii) if-else condition Synthesis b
6 Give grammars for simple assignment statements. Comprehension c
7 Give an un ambiguous grammar for if-then-else. Comprehension c
Blooms
Course
S. No Questions Taxonomy
Outcome
Level
UNIT –I
1 Discusslanguageevaluationcriteriaandthecharacteristicsthataffect them. Comprehension c
2 List the potential benefits of studying programming language concept. Knowledge a
Comprehensio
Explain syntax of a “for” statement in PASCAL using BNF notation and b/c
3 n, Synthesis,
syntax graphs. /d
Evaluation
Comprehensio
Explain syntax of declaration statement in PASCAL using BNF notation b/c
4 n, Synthesis,
and syntax graphs. /d
Evaluation
Compute the weakest pre condition for each of the following simple
assignment statements and post conditions.
a=2*(b-1)-1{a>0}
5 Application e
b=(c+10)/3{b>6}
a=a+2*b-1 {a>1}
X=2*y+x-1{x>11}
Applicatio
Write BNF notation for following: a) For loop b)If-else condition c) Structure
6 n, e/b
definition
Synthesis
Define left most derivation. Prove that the following grammar is
ambiguous.
<program>->begin<stmt_list>end
<stmt_list>-><stmt>
|<stmt>;<stmt_list>
7 Knowledge a
<stmt>-><var>=<expression>
<var>->A|B|C
<expression>-><var>+<var>
|<var>-<var>
|<var>
State the given grammar is ambiguous.
<assign>-><id>=<expr>
<id>->A|B|C
8 <expr>-><expr>+<expr> Knowledge a
|<expr>*<expr>
|(<expr>)
|<id>
9 List the three general methods of implementing a programming language. Knowledge a
Comprehensio b/
10 Explain different aspects of the costs of a programming language. n, Synthesis, c/
Evaluation d
UNIT -II
1 Define heterogeneous array. Discuss the design issues of arrays. Knowledge a
Comprehensio b/
2 Explain in detail the design issues of arithmetic expressions. n, Synthesis, c/
Evaluation d
Discuss structural and name equivalence for types. Give an example of a
3 Comprehension c
language used for each approach.
Evaluation
Knowledge,
Describe the cooperation synchronization and competition synchronization
9 Comprehensio c
in message passing.
n, Evaluation
Discuss how dining philosopher’s problem and producer consumer problem
10 Comprehension c
are solved using concurrency in Ada.
UNIT –V
Application,
1 Write about control constraints in Python. d/e
Synthesis
Application,
2 Write about data abstraction in Python. d
Synthesis
Application,
3 Write about data types and structures of LISP and LISP interpreter. d
Synthesis
4 List the ways in which ML is significantly different from scheme. Knowledge a
Knowledge,
5 Describe the scoping rule in common LISP, ML and HASKELL. Comprehension,
d
Evaluation
Comprehensio
6 Explain the characteristics of scripting languages. n, Synthesis,
d
Evaluation
7 Discuss in detail about the python primitive types. Comprehension d
Comprehensio
8 Explain about LISP functional programming language. n, Synthesis,
c
Evaluation
9 Discuss and trace the Python code to find the factorial of a number. Comprehension b
Discuss and trace the Python code to print the Fibonacci series between the
10 Comprehension b
given ranges of numbers.
Blooms
S. Course
Question Taxonomy
No Outcome
Level
UNIT –I
Give some reasons why computer scientist and professional software
1 developers should study general concepts of language design and Comprehension
d
evaluation.
Write reasons for the statement: “Exception handling Is very Application,
2 c
important, but often neglected by programming languages”. Synthesis
Write reasons for the statement: “A programming language can be
compiled or interpreted”. Give relative advantages and disadvantages Application,
3
of compilation and interpretation. Give examples of compiled and Synthesis c
interpreted languages.
UNIT -II
List what advantages does java’s break statement have over C’s and
1 Knowledge
C++’s break statement. b
State whether static binding is more reliable or dynamic binding. Explain
2 Knowledge b
why.
UNIT -III
Analysis ,
1 Compare the parameter passing mechanisms of ALGOL and ADA. c
Evaluation
State the importance of Local Referencing Environments with
2 Knowledge b
suitable examples.
3 Discuss about different parameter passing methods of Ada language. Comprehension c
UNIT –IV
10.2 PREREQUISITES:
University End
Session Marks Total Marks
Exam Marks
There shall be 2 Mid Term Examinations. Each Mid Term
Examination consists of a Subjective Test and an Objective Test. The
Subjective Test is for duration of 1 hr and the Objective Test is for
duration of 30 minutes. The Objective Test consists of 10 multiple choice
and 10 fill in the blanks type questions. The student has to answer all the
questions and each question carries Half Mark. The subjective test is for
10 marks and the objective test will be for 10 marks. Subjective test
in midterm examinations shall contain 4 questions, with each question
having part a) and part b). Each question will carry 5 marks and the student
75 100
needs to answer any 2 questions. First midterm examination shall be
conducted for the first four units of syllabus and second midterm
examination shall be conducted for the remaining four units. The
objective question paper and the key will be received from JNTUH
University. Five marks are earmarked for assignments. There shall be
two assignments and the marks shall be awarded considering the best
of two assignments in each course. Marks shall be awarded
considering the best of two Mid Term Examinations in each course
reason whatsoever, will get Zero Mark (s)
2 I Assignment 5
3 II Mid Examination 90minutes 20
4 II Assignment 5
5 External Examination 3 hours 75
COURSE OBJECTIVES:
I. Memorize and recognize Intellectual Property and its rights on nationally and
internationally.
II. Classify Intellectual Property and prepares strategies, process in acquisition of rights
against those Intellectual Property.
III. Identify and examine issues of infringement of rights against Intellectual Property and
comply with Intellectual Property Law.
IV. Analyze and formulate the steps involved in Intellectual Property.
S. BLOOMS
COURSE OUTCOMES
NO LEVELS
Understanding /
a. Understands the legal issues on Intellectual Property Rights
Comprehension
Understanding /
b. An Ability to register a trade mark, copyrights, patents.
Comprehension
Predict issues related to Intellectual property rights on trademarks, copyrights and Analyzing /
c.
patents. Analysis
Understanding /
Summarize and evaluate trade secrets, unfair competition which is being adopted by Comprehension&
d.
various firms. Evaluating /
Evaluation
Proficiency
Program Outcomes Level
assessed by
An ability to apply knowledge of computing, mathematical foundations,
algorithmic principles, and computer science and engineering theory in N --
a
the modeling and design of computer-based systems to real-world
problems (fundamental engineering analysis skills)
An ability to design and conduct experiments, as well as to analyze and N --
b
interpret data (information retrieval skills)
An ability to design , implement, and evaluate a computer
-based system, process, component, or program to meet desired needs,
N --
c within realistic constraints such as economic, environmental, social,
political, health and safety, manufacturability, and sustainability
(Creative Skills)
An ability to function effectively on multi-disciplinary teams (team N --
d
work)
An ability to analyze a problem, identify, formulate and use the
N --
e appropriate computing and engineering requirements for obtaining its
solution(engineering problem solving skills)
An understanding of professional, ethical, legal, security and social N --
f
issues and responsibilities (professional integrity)
10.7 SYLLABUS
UNIT - I
INTRODUCTION TO INTELLECTUAL PROPERTY: Introduction, types of intellectual
property, international organizations, agencies and treaties, importance of intellectual
property rights
UNIT - II
TRADEMARKS: Purpose and function of trademarks, acquisition of trade mark rights,
protectable matter, selecting and evaluating trade mark' trade mark registration processes.
UNIT – III
LAW OF COPY RIGHTS: Fundamental of copy right law, originality of material, rights of
reproduction, rights to perform the work publicly, copy right ownership issues, copy right
registration, notice of copy right' international copy right law.
LAW OF PATENTS: Foundation of patent law, patent searching process' ownership rights
and transfer.
UNIT - IV
TRADE SECRETS: Trade secretes law, determination of trade secrete status' liability for
misappropriations of trade secrets, protection for submission, trade secrete litigation.
UNFAIR COMPETITION: Misappropriation right of publicity, false advertising.
UNIT – V
NEW DEVELOPMENT OF INTELLECTUAL PROPERTY: New developments in trade
mark law; copy right law patent law, intellectual property audits'. International overview on
intellectual property, international - trade mark law, copy right law, international patent law,
and international development trade secrets law.
List of Text Books / References / Websites / Journals / Others
TEXT BOOKS:
1. Deborah. E. Bouchoux (2009), Intellectual property, Cengage learning, India.
2. Deborah. E. Bouchoux (2001), Protecting your companies intellectual property,
AMACOM, USA.
REFERENCE BOOKS:
1. Prabuddaganguli (2003), Intellectual property right, Tata McGraw Hill Publishing
company ltd., India.
2. Robert Hisrich, Michael P. Peter, Dean A. Shepherd (2010), Entrepreneurship, Tata
McGraw Hill., India.
Lecture Blooms
Course Learning Outcomes Topics to be covered Reference
No. Levels
Introduction, types of intellectual
1 Recognize the intellectual Property. Understand T1: 1
property.
Identify International organization on International organizations – WIPO,
2 Understand T1: 3
Intellectual Property. GATT,INTA
International Agencies and Treaties –
Memorize Agencies and Treaties on
3-5 Remember Madrid Protocol, Paris convention, T1:10
Intellectual Property.
Berne Union
Describe the intellectual property Importance of intellectual property
6-8 Understand T1: 1
right rights
9- 12 Recall the concept of trademarks. Understand Purpose and function of trademarks T1:19
Summarize right of trade mark
13-15 Understand Acquisition of trade mark rights T1:22
rights.
Analyze and Evaluate selection Analyze/Evalu Selecting and evaluating trademarks,
18- 22 T1:41-45
of trade mark ate Trademark registration processes.
23- 25 Outline the concept of copyright. Understand Fundamental of copy right law. T1:185
Classify and Describe right and originality of material, rights of
26- 28 Apply T1: 193
material of copy right. reproduction
Identify and infer rights of works to Rights to perform the work publicly,
29- 34 Understand T1: 198
be publicly issued copy right ownership issues
Prepare and formulate process for copy right registration, notice of copy
34- 36 Apply T1:201
registration and notice of copy right right ‘international copy right law
37- 38 Outline the concept of patent Law Understand Foundation of patent law. T1: 225
Patent searching process' ownership
39- 42 Summarize transfer of patent Law Understand T1:225
rights and transfer.
43 -44 Relate to trade secrete law Analyze Trade secrete law T1: 469
56-57 Define Intellectual property Audit Remember Intellectual property audits T1:515
Review of the International property International overview on intellectual
58 Evaluate T1:521
laws property
Analyze new developments in
59-63 Analyze International trade mark law. T1:525
Intellectual Property
Examine and outline new Copy right law, international patent
64-65 Analyze T1:288
developments in trade mark law, and international development
To Recall recent development in
66-67 Remember trade secrets law T1:484
International trade secrets
Program Outcomes
Course
Objectives
a b c D e F g h i j k l m n
I. S H H H
II. H S H H H
III. S H
IV. H S S S
a. S H H S
S
b. S H S S H S H S S
c. H S H S H
d. S S H S H H
10.11 OBJECTIVEQUESTIONS
UNIT I
1. The preliminary search is often called as
A. First search
B. basic search
C. knock out search
D. full search
Answer B
2. TMEP stands for
A. trademark management exam procedure
MLR Institute of Technology, Dundigal, Hyd-500043 Page 41
Department of CSE
B. 8years
C. 10 years
D. 20years
Answer C
11. -------------------are not protected by copyrights
A. ideas
B. copy
C. facts
D. procedures
Answer A
12. A _____ is a material object from which a work can be reproduced or
communicated
A. Phonorecords
B. fixation
C. idea
D. copy
Answer A
13. -------------- must be filed for each class of goods named in the application
A. Document
B. data card
C. specimen
D. valid note
Answer A
14. The period within which the amendment to allege use cannot be filed is called the
A. Lock period
B. dead period
C. slack period
D. blackout period
Answer A
15. The copy right protection is not available for _________&_________
A. Facts & copy
B. ideas& procedures
C. grades & ideas
D. copy &procedures
Answer C
16. Trademark registration does not create trademark
A. Laws
B. rights
C. events
D. values
Answer B
17. Computer software programs such as windows and word perfect are considered
A. Literary works
B. dramatic works
C. Choreographic works
D. architectural works
Answer A
18. ---------------- is considered a mute performance with expressive communication
A. Mime
B. gestures
C. dramatic
D. pantomime
Answer D
19. The law that requires extensive knowledge of engineering and the science
A. Legal rights
B. patent law
C. Copyright law
D. trade secret law
Answer B
20. Copyright law protects works of
A. Ownership
B. authorship
C. relationship
D. friendship
Answer B
UNIT II
1. Trademark law is part of the law of
A. Fair competition
B. unfair competition
C. ownership
D. authorship
Answer B
2. A trade name is the name of a business and also may function as a
A. Copyright
B. patent
C. trade secrets
D. trademark
Answer A
3. The overall appearance of a product or service is
A. Trade secret
B. trade mark
C. service mark
D. trade dress
Answer D
4. ---------------- occurs when a similar mark adversely affects the reputation of a
distinctive mark.
A. Declaration
B. prosecution
C. fixation
D. dilution
Answer D
5. Graphic icon that functions to identify the source for various products or services
from one company
A. Hallmark
B. trade mark
C. service mark
D. House mark
Answer A
6. Agreement granting limited trademark rights
A. Trademark license
B. License
C. Registration
D. Dilution
Answer A
7. Any form of business can own a
A. Copyright
B. patent
C. trade secrets
D. trademark
Answer D
8. Trademarks rights may be transferred in the form of a
A. License
B. assignment
C. license / assignment
D. None
Answer C
9. Assignment of federally registered trademark should be recorded with the patent
and------ office
A. Copyright
B. patent
C. trade secrets
D. trademark
Answer D
10. Initial pleading filed by the petitioner in an opposition proceedings is
A. Notice
B. petition
C. Notice of opposition
D. Rejection
Answer C
11. Initial pleading filed by the petitioner in an Cancellation proceedings is
A. Notice
B. Petition to Cancel
C. Notice of opposition
D. Rejection
Answer B
12. The court order, instructing the infringer to stop the infringing activity is known
as an
A. Injunction
B. Junction
C. Rejection
D. objection
Answer A
13. A set of statement to be used directly or indirectly in a computer to bring about a
certain result
A. Current program
B. derivative work
C. dilution
D. computer program
Answer D
UNIT III
1. A trademark or service mark that is federally registered is identified by the
symbol
A. ®
B. ©
C. ™
D. @
Answer A
2. A “whittling away” or weakening of the famous mark distinction is
A. Blur’s
B. blurring
C. blurred
D. blared
Answer B
3. When famous mark is damaged by an unpleasant or unwholesome use of a similar
Mark is
A. Tarnishment
B. punishment
C. distinctiveness
D. membership
Answer A
4. The act that is used to protect against other forms of unfair competition
A. Espionage act
B. patent act
C. Lanham act
D. dilution act
Answer C
5. The federal trademark dilution act was passed enabling owners of famous mark in
A. 1978
B. 1989
C. 1990
D. 1995
Answer D
6. The graphic symbols that may use stylized lettering or concise imagery is
A. Names
B. works
C. logos
D. symbols
Answer C
7. Anything that serves to differentiate the goods or services is
A. Logos
B. device
C. symbols
D. names
Answer B
8. Color combination are protectable as
A. Trade secret
B. copyright
C. trademarks
D. trade dress
Answer D
9. a floral fragrance applied to yarn was registered as a first scent in the year
A. 1978
B. 1989
C. 1990
D. 1995
Answer C
10. Mark used by members of a cooperative, association collective group, organization
to Signify or indicate membership is
A. Collective mark
B. house mark
C. suggestive mark
D. famous mark
Answer A
11. Mark that functions to denote the source of various products or services from one
Company is
A. Collective mark
B. house mark
C. suggestive mark
D. famous mark
Answer B
12. The mark alludes to or hints at the nature or quality of the goods
A. Collective mark
B. house mark
C. famous mark
D. suggestive mark
Answer D
13. Terms that describes an entire group or class of good is
A. Rationale terms
B. generic terms
C. initial terms
D. final terms
Answer B
14. An agreement to restrict the grant of proprietary right to one person is
A. Exclusive license
B. inclusive license
C. Collective license
D. generic license
Answer A
15. Primary copyright record made for each version of a particular work is
A. Basic registration
B. initial registration
C. First registration
D. last registration
Answer A
16. Request for an order of the court is
A. Emotion
B. judgment
C. promotion
D. motion
Answer D
17. Relief awarded by the court as a result of the judge or jury’s verdict is
A. Judgment
B. punishment
C. permission
D. license
Answer A
18. The mark used by a collective membership organization is referred as _________
A. House mark
B. collective mark
C. suggestive mark
D. famous mark
Answer B
19. The mark which is used in conjunction with a trademark or service mark is
A. Famous mark
B. suggestive mark
C. certification mark
D. Service mark
Answer C
20. Work that combines authorship in two or more media is
A. Compilations works
B. derivative works
C. Multimedia works
D. collective works
Answer B
UNIT IV
1. Trade secrets are also protected under principles of state
A. Contract law
B. patent law
C. Copyright law
D. trade secret law
Answer A
2. A system of legal rules derived from the precedents and principles established by
court decisions.
A. Contract law
B. patent law
C. Copyright law
D. common law
Answer D
3. Copyright law does not exist separate from
A. Contract law
B. patent law
C. Copyright law
D. trade secret law
Answer D
4. Disassembly and examination of products thatare available to the public
A. Reverse engineering
B. security engineering
C. Employee engineering
D. Civil engineering
Answer A
5. A confidentiality agreement is also known as
A. Disclosure agreement
B. nondisclosure agreement
C. Agreement
D. exit agreement
Answer B
6. An exit agreement is similar to an
A. Disclosure agreement
B. nondisclosure agreement
C. Confidential agreement
D. exit agreement
Answer C
7. A covenant not to compete is a contract that restrains a person from engaging in a
A. Business
B. trade
C. profession
D. all of the above
Answer D
8. Contract by which one party promises to submit an idea and the other party
promises to evaluate the idea is called
A. Evaluation agreement
B. disclosure agreement
C. Confidential agreement
D. exit agreement
Answer A
9. Agreement whereby one party pays the other for the opportunity to later exploit
an Idea or work
A. Disclosure agreement
B. evaluation agreement
C. Option agreement
D. confidential agreement
Answer C
10. A special relationship of trust, confidence, or responsibility between persons is
called
A. Fiduciary relationship
B. relationship
C. Friendship
D. special relationship
Answer A
11. Copyright law does not protect
A. Ideas
B. copy
C. facts
D. procedures
Answer A
12. The illegal acquisition of trade secrets through theft, bribery etc. Is called
A. Improper means
B. proper means
C. other means
D. electronic means
Answer D
13. The authority of a court to hear a certain type of case is
A. Law
B. jurisdiction
C. judgment
D. rights
Answer C
14. The parties in litigation are governed by rules of ---------procedure
A. Facts
B. ideas
C. civil
D. procedures
Answer C
15. The court hearing in which the parties present their facts and evidence to a judge
or jury
A. Civil
B. trial
C. instructions
D. facts
Answer B
16. That act that makes it a federal crime to steal a trade secret or to receive
or possess trade secret information knowing that it is
A. Theft
B. misused
C. loss
D. stolen
Answer D
17. The civil cover sheet is a form required for use by the court in maintaining
A. Finance records
B. accounts records
C. Statistical records
D. project records
Answer C
18. The uniform trade secret act created in --------- and amended in --------
A. 1979&1985
B. 1985&1989
C. 1990&1995
D. 1979&1986
Answer A
19. The act that is to provide protection against high-tech thefts of trade secrets
A. Statues and contract law
B. Lanham act
C. Economic espionage act
D. uniform trade secret act
Answer C
20. Which act permits a court to order the return of all trade secrets and related
materials
A. Statues and contract law
B. Lanham act
C. Economic espionage act
D. Uniform trade secret act
Answer D
UNIT V
1. The procedure acquiring international protection vary from country to country
and the process is often
A. Expensive
B. Expensive& Complex
C. Complex & Expensive
D. Complex
Answer B
2. Only a few countries besides the United States grant trademark right based on use
in
A. Commerce
B. Economics
C. Science
D. Arts
Answer A
3. The new renewal period for all the marks is
A. 5years
B. 8years
C. 10 years
D. 20years
Answer C
4. The length of period for trademark protection may vary from 5 to
A. 5years
B. 10years
C. 15 years
D. 20years
Answer C
5. The period of time between filing an application and obtaining a registration may
vary in Belgium is
A. 1month
B. 2months
C. 3months
D. 4months
Answer B
6. The period of time between filing an application and obtaining a registration may
vary in Japan is
A. 1Year
B. 2Years
C. 3years
D. 4Years
Answer D
7. Some countries register trademarks automatically without any
A. Permissions
B. oppositions
C. Examinations
D. Preparations
Answer C
8. Some countries do not register
A. Famous mark
B. suggestive mark
C. Certification mark
D. Service mark
Answer D
9. A list of Paris convention countries is provided at the
A. Indian websites
B. National websites
C. PTO website
D. POT website
Answer C
10. Several companies including Ethiopia, Laos, and Pakistan are not parties to the
A. Paris convention
B. Madrid Protocol
C. European Community
D. Berne Convention
Answer A
11. The European Community has adopted a new form of trade protection known as
A. Trademark
B. Community trademark
C. Famous mark
D. Service mark
Answer B
12. OHIM means
A. Officer for Harmonization in the internal Market
B. Office for Harmon in the internal Market
C. Office for Harmonization in the international Market
D. Office for Harmonization in the internal Market
Answer D
13. Members of the Paris Convention are known as
A. Convention Countries
B. European Convention
C. Berne Convention
D. Rome Convention
Answer A
14. The European Patent office (EPO) is a------------- patent office
A. Lingual
B. Trilingual
C. Multiple
D.
Answer B
15. A trademark infringement lawsuit may involve additional claims
A. Declaration
B. prosecution
C. fixation
D. dilution
Answer D
16. The agreement that to be recorded either with the national trademark office
orwith a government agency
A. License
B. Registration
C. dilution
D. Declaration
Answer A
17. The trademark owners must either register the trademark or be qualified as the --
--------Of the trademark
A. Registration
B. dilution
C. License
D. Declaration
Answer C
18. The PTO will forward the international application to the
A. OHIM
B. WIPO
C. TMEP
D. EPO
Answer B
19. The Paris Convention treaty limits
A. Piracy
B. mock print
C. duplicate
D. photocopy
Answer A
20. Rules of proper trademark usage can be summarized in a company’s
A. Magazine
B. License
C. Register
D. Handbook
Answer D
Blooms
S. Course
Questions Taxonomy
No Outcome
level
UNIT – I
Indicate whether the following items would be protectable as
trademarks, copyrights, patents and trade secrets:
There are a number of international organizations, agencies and treaties
that promote the use and protection of intellectual property such as
INTA, WIPO, Madrid Protocol, and Paris convention etc.,
(i) A Vaccum cleaner
1. Apply c
(ii) The name of a new type of ice cream
(iii) A company’s plans for its future business operations
and possible mergers
(iv) A new type of rose
(v) A new slogan to be used by Burger king
(vi) A new novel by Toni Morrison
How long will patent protection for this invention last? A patent was
issued on January 28, 2003, to Hoffman-LaRoche Inc. for a new type of
2. Apply c
compound to treat Alzheimer’s disease. The application was filed on
August 10, 2000.
3. The novel Moby Dick was written in 1851 and its author, Herman Apply c
Blooms
S. Course
Questions Taxonomy
No Outcome
level
UNIT – I
Justify: Many of the rights ownership common to real and personal
1. property are also common to intellectual property. Intellectual property Analyze d
can be bought, sold and licensed.
Discuss the types of intellectual property The term “Intellectual
property” is usually thought of as comprising four separate, but often
2. Understand a
overlapping legal fields: trademarks, copyrights, patents and trade
secrets..
Explain the concept of protecting valuable business information.
It consists of any valuable business information that, if known by a
3. Understand a
competitor, would afford the competitor some benefit or advantage.
There is no limit to the type of information that can be protected.
Explain the concept of protecting valuable business information. It
consists of any valuable business information that, if known by a
4. Understand a
competitor, would afford the competitor some benefit or advantage.
There is no limit to the type of information that can be protected
Discuss along with its types. “A grant permitted to its Owner to prevent
others from making, using or selling an invention. This protection is also
5. Analyze d
available for useful, novel and no obvious inventions. Discuss along with
its types.
UNIT – II
Classify the following marks as trademarks, service marks, collective
marks or certification marks:
i. AMERICAN MEDICAL ASSOCIATION (to indicate membership in
1. Apply c
registrants organization) ii. COMET (for cleaner)
iii. MIDAS MUFFLER (for car repair services)
iv. OPRAH (for television shows) v. CHEF BOYARDEE (for pasta)
2. The design of a microphone be trademarked if the design is the most Apply
years.
Renee is an employee of Harris Manufacturing Inc. Renee inadvertently
2. published Harris’s customer list on the Internet where the list has been Evaluate e
available for two weeks. Is this IP infringement?
Al Dyer recently registered the domain name gap.com with Acme
Registrars. Mr.Dyer has no relationship with Gap Inc. and has written
3. Analyze d
Gap Inc. a letter offering to sell the domain name to it for $10000. What
can Gap Inc. do to protect its mark GAP®?
Can a trademark owner secure a trademark registration for NAPA
4. Apply c
VALLEY OAK BARREL for wine made in the state of Washington?
If a mark has been registered in Germany, is the PTO obligated to
5. Analyze d
register it in the United States?
S. Blooms
Questions Course Outcomes
No Taxonomy
UNIT-I
1 What rights does the Intellectual Property owner have? Remember a
2 How should one protect IPRs in a joint development project? Remember a
3 What are the legislations covering IPRs in India? Remember a
4 Who are responsible for administration of IPRs in the country? Remember a
5 Briefly explain about the agencies and treaties regarding IPR. Understand b
UNIT-II
1 What can be registered as a trade mark in India? Remember a
2 What is a service mark and collective mark? Remember a
3 What is the purpose and function of a trade mark? Remember a
4 Write a note on acquisition of trade mark rights. Apply c
5 What do you mean by a protectable matter? Remember a
UNIT-III
1 How can the owner of a copyrighted work be identified? Apply c
2 What do the term “patent pending” and “patent applied for” mean? Remember a
If two or more persons work together to make an invention, to whom
3 Understand b
will the patent be granted?
4 What is a Patent? Remember a
5 What kind of protection does a patent offer? Remember a
UNIT-IV
1 What does it mean to "misappropriate" a trade secret? Remember a
2 What do you mean by the term unfair competition? Remember a
3 When Can an Employee Develop A Business On His Own Time? Remember a
4 What is misappropriation right of publicity? Explain. Apply c
5 Write a note on false advertising. Remember a
UNIT-V
Explain the terms and conditions involved in today’s scenario to register
1 Understand b
a patent.
2 State the new trade mark law. Analyze c
3 State the new copy rights law. Analyze c
4 State the new patents law. Analyze c
5 State the most recently set up law on trade secrets. Analyze c
Blooms
S. Course
Questions Taxonomy
No Outcome
level
Unit – I
1.Explain IPR infringing goods? Understand b
2.Explain is the role of customs in IPR enforcement? Understand b
3.Explain do I do when I have made a discovery? Understand b
4.Explain the importance of IPR. Understand b
5.Describe the various agencies of IPR in INDIA? Understand b
UNIT – II
1.
Explain the trade mark registration process. Understand b
2.
Describe selecting and evaluating a trade mark? Understand b
Describe the grounds for objection or refusal to register a trade mark in b
3. Understand
India?
4.
Explain the benefits of Indian trademark registration? Understand b
5.
Explain the common law trademark rights? Understand b
UNIT – III
1.Describe the need for patents Understand b
2.Explain the meaning of originality of a material? Understand b
3.List some of the copy right ownership issues. Understand b
4.State is the foundation of patent law? Understand b
5.Explain is the patent searching process? Understand b
UNIT IV
1.Explain the factors determine whether something is a “trade secret”? Understand b
Describe does one choose whether to patent something or keep it as a b
2. Understand
trade secret?
Describe the kinds of monetary damages are available for trade secret b
3. Understand
misappropriation?
Explain undisclosed know-how and business information? What are b
4. Understand
trade secrets?
5.Explain the effects of misappropriation of trade secrets? Understand b
UNIT – V
1.Explain can auditing of intellectual property be carried out? Understand b
2.State who is authorized to conduct auditing of intellectual property? Understand b
Explain the terms and conditions for new development of intellectual b
3. Understand
property?
4.State a note on laws of IPR in INDIA. Understand b
5.Explain the importance of setting up laws for intellectual property. Understand b
S. Blooms Course
Questions
No Taxonomy level Outcome
UNIT – I
1. Justify: Many of the rights ownership common to real and personal Analyze d
Blooms Course
S. No Questions
Taxonomy Outcomes
UNIT I
1 What are IPR infringing goods? Remember 1
2 What is the role of customs in IPR enforcement? Remember 1
3 What do I do when I have made a discovery? Remember 1
4 Explain the importance of IPR. Understand 2
5 What are the various agencies of IPR in INDIA? Remember 1
UNIT II
1 Explain the trade mark registration process. Understand 2
2 What is selecting and evaluating a trade mark? Remember 1
What are grounds for objection or refusal to register a trade mark in
3 Understand 2
India?
11.2 PREREQUISITE(S):
University End
Session Marks Total Marks
Exam Marks
There shall be two midterm examinations. Each midterm
examination consists of essay paper, objective paper and
assignment.
The essay paper is for 10 marks of 60 minutes duration and shall
contain 4questions. The student has to answer 2 questions, each
carrying 5 marks.
The objective paper is for 10 marks of 20 minutes duration. It
consists of 10multiple choice and 10 fill-in-the blank questions, the
student has to answer all the questions and each carries half mark.
75 100
First midterm examination shall be conducted for the first two and
half units of syllabus and second midterm examination shall be
conducted for the remaining portion.
Five marks are earmarked for assignments. There shall be two
assignments in every theory course. Assignments are usually issued
at the time of commencement of the semester. These are of problem
solving in nature with critical thinking.
Marks shall be awarded considering the average of two midterm
tests in each course.
COURSE OBJECTIVES:
I. Be familiar with basic Software engineering methods and practices, and its
applications.
II. Master the implementation of software engineering layered technology and Process
frame work.
III. Be familiar with software measurement and software risks.
IV. Be familiar with software requirements and the SRS documents.
V. Be familiar with role of project management including planning, scheduling, risk
management.
VI. Master the implementation of different software architectural styles.
BLOOMS
S NO COURSE OUTCOMES
LEVELS
Explain fundamental knowledge in mathematics, programming and computer Understanding /
a.
systems. Comprehension
Apply basic knowledge and understanding of the analysis, synthesis and design of Applying /
b.
complex systems. Application
Applying /
c. Apply software engineering principles and techniques.
Application
Creating /
d. Design and evaluate large-scale software systems.
Synthesis
Applying /
e. Apply the notations used to analyze the performance of algorithms.
Application
Creating /
f. Demonstrate ethical standards and legal responsibilities.
Synthesis
Explain to communicate and coordinate competently by listening, speaking, reading Understanding /
g.
and writing. Comprehension
Understanding /
h. Explain the principles, tools and practices of IT project management.
Comprehension
Illustrate the managing time, processes and resources effectively by prioritizing Understanding /
i.
competing demands. Comprehension
Applying /
j. Apply the fundamental knowledge of science in emerging technologies.
Application
Applying /
k. Develop as an effective member or leader of software engineering teams.
Application
Analyzing /
l. Experiment different testing methods.
Analysis
Proficiency
Program Outcomes Level
assessed by
Engineering knowledge: Apply the knowledge of mathematics,
Assignments,
A science, engineering fundamentals, and an engineering specialization to H
Tutorials
the solution of complex engineering problems
Problem analysis: Identify, formulate, review research literature, and
analyze complex engineering problems reaching substantiated
B H Assignments
conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
Problem analysis: Identify, formulate, review research literature, and
analyze complex engineering problems reaching substantiated
C S Mini Projects
conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
Conduct investigations of complex problems: Use research-based
knowledge and research methods including design of experiments,
D S Projects
analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.
Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and
E S Mini Projects
modeling to complex engineering activities with an understanding of the
limitations.
The engineer and society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and
F N --
the consequent responsibilities relevant to the professional engineering
practice.
Environment and sustainability: Understand the impact of the
Professional engineering solutions in societal and environmental
G N --
Contexts, and demonstrate the knowledge of, and need for sustainable
development.
Ethics: Apply ethical principles and commit to professional ethics and
H N --
responsibilities and norms of the engineering practice.
Individual and team work: Function effectively as an individual, and as
I a member or leader in diverse teams, and in multi disciplinary S Mini Projects
settings.
Communication: Communicate effectively on complex engineering
activities with the engineering community and with society at large, such
J as, being able to comprehend and write effective reports and design N --
documentation, make effective presentations, and give and receive
clear instructions.
Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and apply
K H Mini Projects
these to one’s own work, as a member and leader in a team, to manage
projects and in multidisciplinary environments.
Life-long learning: Recognize the need for, and have the preparation and
L ability to engage in independent and life-long learning in the S Projects
broadest context of technological change.
An ability to recognize the importance of professional development by
pursuing postgraduate studies or face competitive examinations that N --
M
offer challenging and rewarding careers in computing (successful career
and Immediate employment)
The use of current application software and the design and use of
operating systems and the analysis, design, testing and documentation of
N S Exercises
computer programs for the use in Computer Science and engineering
technologies.
N= None S= Supportive H = Highly Related
11.7. SYLLABUS
UNIT-I
Introduction to Software Engineering: The evolving role of software, Changing Nature of
Software, legacy software, Software Myths.
A Generic View of Process: Software engineering-A layered technology, a process
framework, The Capability Maturity Model Integration (CMMI), Process Patterns, Process
Assessment, personal and team process models.
Process Models: The Waterfall model, Incremental process models, Evolutionary Process
Models, Specialized Process Models, The Unified Process.
UNIT-II
Software Requirements: Functional and non-Functional Requirements, User Requirements,
System Requirements, Interface Specification, the software requirement document.
Requirement engineering process: Feasibility studies, Requirements elicitation and analysis,
requirements validation, Requirements management. System models: Context Models,
behavioral models, Data models, object models, structured method
UNIT-III
Design Engineering: Design process and design quality, Design concepts, the design model,
pattern based software design. Creating an Architectural Design: Software architecture, Data
design, Architectural Styles and patterns, Architectural design, assessing alternative
architectural designs, mapping data flow into software architecture. Modeling Component-
level design: designing class –based components, conducting component-level design, object
constraint language, designing conventional components. Performing User interface design:
Golden rules, User interface analysis and design, interface analysis, interface design steps,
Design evaluation
UNIT-IV
Testing Strategies: A strategic approach to software testing, test strategies for conventional
software, Black-Box and White-Box testing, Validation testing, System testing, the art of
Debugging.
Product metrics: Software Quality, Frame work for Product metrics, Metrics for Analysis
Model, Metrics for Design Model, Metrics for source code, Metrics for testing, Metrics for
maintenance.
Metrics for Process and Products: Software Measurement, Metrics for software quality.
UNIT-V
Risk management: Reactive vs. Proactive Risk strategies, software risks, Risk identification,
Risk projection, Risk refinement, RMMM, RMMM plan.
Quality Management: Quality concepts, software quality assurance, Software Reviews,
Formal technical Reviews, Statistical Software quality Assurance, Software reliability, The
ISO 9000 quality standards.
TEXT BOOKS:
1. Software engineering a practitioner’s approach, Roger S Pressman, sixth edition
McGraw Hill International Edition.
2. Software Engineering, Ian Sommerville, seventh edition, Pearson education
REFERENCES:
1. Software Engineering, a Precise Approach, PankajJalote, Wiley India, 2010.
2. Software Engineering: A primer, Waman S Jawadekar, Tata McGraw-Hill, 2008.
3. Fundamentals of Software Engineering, Rajib Mall, PHI, 2005
d H S S S
e H H
f H
S= Supportive H = Highly Related
UNIT-I
1. The statement of an organization’s commitment to quality is a Policy
A. Vision
B. Mission
C. Principle
D. Goal
Answer: A
2. Which of the following is not a defect metric?
A. Location
B. Cause
C. Time to fix
D. All the above
Answer: D
3. Quality improvement programs may require the product itself to be changed.
A. True
B. False
Answer: True
4. Which of the following does not form a part of a workbench?
A. Standards
B. Quality attributes
C. Quality Control
D. Procedures
E. Rework
Answer: C
5. The focus on the product is highest during
A. A walkthrough
B. A checkpoint review
C. An inspection
Answer: B
6. During an inspection, inspectors normally make suggestions on correcting the
defects found.
A. True
B. False
Answer: True
7. Modifying existing standards to better match the need of a project or environment
is Definition
A. Standard for a standard
B. Tailoring
C. Customization
D. None of the above
Answer: B
8. The term “benchmarking” means
A. Comparing with past data from your organization
B. Comparing with result of a market survey
C. Comparing with the results of a customer survey
D. None of the above
Answer: D
9. An example of deployment of a quality approach is: The degree to which the
approach embodies effective evaluation cycles
A. The appropriate and effective application to all product and service characteristics
B. The effectiveness of the use of tools, techniques, and methods
C. The contribution of outcomes and effects to quality improvement
D. The significance of improvement to the company’s business
Answer: C
10. The concept of continuous improvement as applied to quality means: Employees
will continue to get better
A. Processes will be improved by a lot of small improvements
B. Processes will be improved through a few large improvements
C. Improved technology will be added to the process, such as acquiring CASE tools
D. The functionality of the products will be enhanced
Answer: C
11. The activity which includes confirming understanding, brainstorming and testing
ideas is a
A. Code walkthrough
B. Inspection
C. Review
D. Structured walkthrough
Answer: C
12. The following can be considered to measure quality:
A. Customer satisfaction
B. Defects
C. Rework
D. All of the above
Answer: D
13. the most common reason for the presence of large number of bugs in a software
product is
A. Incompetence of the developer
B. Incompetence of the tester
C. Bad requirements
D. Wrong use of tools and techniques
Answer: C
14. System Test Plan will not include Approach
A. Pass/Fail criteria
B. Risks
C. Suspension and Resumption criteria
D. None of the above
Answer: A
15. Function Point is not a measure of
A. Effort
B. Complexity
C. Usability
D. All of the above
Answer: B
16. Quality assurance personnel must not be involved in changing work products.
A. True
B. False
Answer: True
17. The purpose of cost-of-quality computations is to show how much is being spent
for the quality control and quality assurance program.
A. True
B. False
Answer: False
18. Method by which release from the requirements of a specific standard may be
obtained for a specific situation is a Tailoring
A. Customization\
B. Force field analysis
C. Waiver
D. None of the above
Answer: B
19. Measure designed to minimize the probability of modification, destruction, or
inability to retrieve software or data is
A. Preventive security
B. Corrective security
C. Protective security
D. None of the above
Answer: C
20. Quality assurance is a function responsible for
A. Controlling quality
B. Managing quality
C. Inspections
D. Removal of defects
Answer: C
UNIT-II
1. The word management in quality assurance describes many different functions,
encompassing
A. Policy management
B. Human resource management, safety control
C. Component control and management of other resources and daily schedules
D. None of the above
Answer: C
2. With defined process in SEI’s process model, organization will achieve the
foundation for major and continuing process.
a. True
b. False
Answer: A
3. Statistical process control help to identify the __________ of process problems
which are causing defects.
A. Root cause
B. Nature
C. Person/persons involve
D. All of the above
E. None of the above
Answer: B
4. Requirement s engineering is a generic process that does not vary from one
software project to another
A. True
B. False
Answer: B
5. During project inception the internet of the tasks are to determine
A. Basic problem understanding
B. Nature of the solution needed
C. People who want a solution
D. None of the above
Answer: C
6. Three things that make requirements elicitation difficult are problems of
A. Budgeting
B. Scope
C. Understanding
D. Volatility
Answer: A
7. A stakeholder is anyone who will purchase the completed software system under
development or
A. True
B. False
Answer: C
8. It is relatively common for different customers to propose conflicting
requirements, each arguing that his version is the right one.
A. True
B. False
Answer: B
9. Which of the following is not one of the context-free questions that would be used
during project inception?
A. What will be the economic benefit from a good solution?
B. Who is behind the request for work?
C. Who will pay for the work?
D. Who will use the solution?
Answer: A
10. In collaborative requirements gathering the facilitator
A. Arranges the meeting place
B. Cannot be a customer
C. Controls the meeting
D. Must be an outsider
Answer: C
11. Which of the following is not one of the requirement classifications used in
Quality Functions Deployment?
A. Exciting
B. Expected
C. Mandatory
D. Normal
Answer: C
12. The work products produced during requirement elicitation will vary depending
on the
A. Size of the budget
B. Size of the product being built
C. Software process being used
D. Stakeholder’s needs
Answer : A
13. Developers and customers create use-cases to help the software team understand
how differ rent classes of end-users will use functions.
A. True
B. False
Answer: A
14. Use-case actors are always people, never system devices.
A. True
B. False
Answer: B
15. The result of the requirements engineering task is an analysis model that defines
which of the following problem domains?
A. Information
B. Functional
C. Behavioral
D. All of the above
Answer: C
16. Analysis patterns facilitate the transformation of the analysis model into a design
model by suggesting reliable solutions to common problems
A. True
B. False
Answer: B
17. In win-win negotiation, the custome4r’s needs are met even though the developers
need may not be.
A. True
B. False
Answer: A
18. Complexity measurements are quantitative values accumulated by a pre-
determined method for measuring complexity of a
A. Software engineering process
B. Software product
C. Database
D. Project team
Answer : B
19. Function points provide an objective measure of the application system that can be
used to compare different kinds of application systems
A. Size
B. Complexity
C. Performance
D. Operation ease
Answer : C
20. Which of the following is not relevant in quantifying the amount of information
processing function?
A. External inquiry
B. Software platform
C. External output
D. Logical internal file
Answer : D
UNIT-III
1. Function point analysis requires information on hardware and software for the
application system.
A. True
B. False
Answer: B
2. Statistical methods are used to differentiate random variation from
A. Standards
B. Assignable variation
C. Control limits
D. Specification limits
Answer: C
3. Random causes of process problems can be ____________ eliminated
A. Sometimes
B. Never
C. Rarely
D. Always
Answer : D
4. Which two factors must be considered when developing acceptance criteria?
A. Match with requirements
B. Ability to benchmark system
C. Schedule of system delivery
Answer: B
C. Performance
D. Maintainability
Answer : A
12. Which statement about a prototype is true?
A. It is a functional model of the entire system
B. It is the complete untested product ready for final review by the customer
C. It is necessary in order to accurately verify that the product is progressing in
accordance with requirements specifications
D. It is a full-scale model of the entire system at some partial stage in development
showing the functional form of the system
Answer: C
13. What is usability in software engineering?
A. The ability of the end user to use the product successfully
B. A measure of the relative effort required to learn how to use a software product
C. The degree to which the product integrates with the environment in which it is used
D. A metric that describes the degree to which a software product meets its
requirements
Answer : B
14. Software ___________ it work done to enhance software functionally, correct
errors and improve the performance of software
A. Re-design
B. Maintenance
C. Corrections
D. Re-engineering
Answer : C
15. How is an application’s “version” different from its “release”?
A. A release is a small change to an earlier release
B. A version is a small change made to an earlier version
C. Versions the one made available to customers and a release is a change to a previous
version
D. A release is the one made available to customers and a version is a change to a
previous release.
Answer : B
16. Which two steps is part of a typical post-implementation review?
A. Briefly describe the general impact of the system on the managers, users, and
customers.
B. Outline the traceability matrix mapping requirements to function points to test cases
to test results
C. Generate an architectural baseline from which to measure risk, success factors, and
customer satisfaction
D. Describe the primary project management methodology and systems developments
methodology used to develop the system
Answer : B
17. Which of the following is not one of the broad categories used to classify
operations?
A. Computation
B. Data manipulation
C. Event monitors
D. Transformers
Answer : C
UNIT-IV
1. An important step in interface design is
A. Modeling
B. Interface analysis
C. Physical environment in which the objects should work
D. Definition of interface objects and the action applied on them
Answer : C
2. Name and two design evaluation techniques
A. Application accessibility and internationalization
B. Feedback and amount of learning required by users
C. User request help and page layout
D. System response time and user help facilities
Answer : B
3. The two characteristics of system response time are
A. Length and variability
B. Menu and labeling
C. Analysis and patterns
D. Speed and time
Answer : C
4. First level prototype is evaluated by
A. Developer
B. User
C. Designer
D. Tester
Answer : B
5. To collect qualitative data, ___________ can be distributed to users of the
prototype
A. CASE tools
B. Reusable components the design
C. Use cases
D. Questionnaires
Answer : D
6. The unit test focuses on ______ and ______ within the boundaries of a component
A. Inconsistencies and omissions
B. Outright errors and quality
C. Internal processing logic and data structures
D. Verification and validation on units
Answer : C
7. A systematic technique for constructing the software architecture while interfacing
to uncover errors is called
A. Unit testing
B. Integration testing
C. System testing
D. Smoke testing
Answer : B
8. ________ testing is the re-execution of some subset of tests that have already been
conducted to ensure that changes have not propagated
A. Regression testing
B. Smoke testing
C. Integration testing
D. Sandwich testing
Answer : C
9. The process of uncovering errors, diagnosing them and correcting them is called
A. Testing
B. Planning
C. Debugging
D. Designing
Answer : B
10. Initially, tests focus on each component individually for functionality of the
comment and this test is called
A. Unit testing
B. Integration testing
C. System testing
D. Basis path testing
Answer : B
11. In an object oriented testing strategy the focus of testing is
A. A unit
B. A class
C. A package
D. A component
Answer : C
12. ________ tests for subordinate levels ________ testing uses top-down tests for
upper levels of the program structure, coupled with bottom-up
A. Sandwich testing
B. Integration testing
C. Smoke testing
D. Regression testing
Answer : B
13. Which one of these belongs to integration testing in the OO context?
A. Class testing
B. Thread based testing
C. Validation testing
D. Formal technical testing
Answer : D
14. Software is tested to uncover_________ that were made inadvertently as it was
designed and constructed
A. Faults
B. Errors
C. Bugs
D. Mistakes
Answer : C
15. ________ testing is designed to test the run-time performance of software within
the context of an integrated system
A. Integration testing
B. Performance testing
C. System testing
D. Validation testing
Answer : D
16. Brute force, backtracking, because elimination are strategies used in
A. Art of debugging
B. System testing
C. Smoke testing
D. Performance testing
Answer : B
17. Recovery testing is a part of integration testing
A. True
B. False
Answer : B
18. Validation testing begins at the culmination of _______ testing
A. System testing
B. Smoke testing
C. Integration testing
D. OO testing
Answer : C
19. Software ___________ is how easily a computer program can be tested
A. Testability
B. Operability
C. Decomposability
D. Stability
Answer : B
20. During security testing the tester plays the role of the individual who desire to
A. Debug the system
B. Identify errors during integration
C. Penetrate the system
D. Check for validations
Answer : C
UNIT-V
1. Function Point measures are programming language dependent.
A. True
B. False
Answer : B
2. _______ is a detailed sequence of steps that describes the interaction between the
user and the
A. Key classes
B. Support classes
C. Scenario scripts
D. Subs systems
Answer : C
3. A__________ is an aggregation of classes that support a function that is visible to
the end-user of a system
A. Scenarion scripts
B. Key classes
C. Support classes
D. Sub systems
Answer : C
4. Mention any two web engineering project metrics
A. Scenario scripts and number of key classes
B. Number of support classes and subsystems
C. Numbers of static pages and number of internal page link
D. Use cases and lines of code
Answer : C
5. __________ metrics are derived by normalizing quality and / or productivity
measures by considering the size of the software that has been produced
A. Direct
B. Indirect
C. Size oriented
D. Process oriented
Answer : B
6. ___________ is the degree to which the software performs its required function.
A. Correctness
B. Integrity
C. Usability
D. Maintainability
Answer : D
7. the most common measure for correctness is _____________
A. KLOC
B. Function point
C. Security
D. Defects per KLOC
Answer : D
8. COCOMO stands for
A. Customer cost model
B. Constructive cost model
C. Consistent cost model
D. Configuration cost model
Answer : B
9. the most common measure for correctness is ----------------------
A. KLOC
B. Function point
C. Security
18. The reason for refining risks is to break them into smaller units having different
consequences.
A. true
B. false
Answer : B
19. Building an excellent product or system that no one really want is
A. technical risk
B. business risk
C. known risk
D. project risk
Answer : C
20. The risk which gives the degree of uncertainty that the project schedule will be
maintained and that the product will be delivered in time is ----------------
A. known risk
B. unknown risk
C. schedule risk
D. technical risk
Answer : B
Blooms
Course
Question Taxonomy
S. No Outcome
Level
UNIT – I
1 Explain is legacy software? Knowledge 1
2 Demonstrate all the applications of software? Knowledge 2
3 List the types of software myths? Knowledge 2
4 Discuss the architecture of layered technology? Understand 2
5 List all the umbrella activities in process framework? Understand 2
6 Explain is process pattern? Knowledge 2
7 List the types of software models? Understand 2
8 List the types other software process models? Understand 2
9 Explain software component? explain its uses Understand 2
10 Explain process assessment? Knowledge 2
11 List the models in CMMI? Knowledge 2
12 Explain the levels in continuous model in CMMI? Understand 2
13 Compare between perspective and iterative process models? Understand 2
14 Explain staged model in CMMI? Knowledge 2
15 Write the other name of waterfall model and who invented waterfall model? Understand 2
16 Explain boehm model? Understand 2
17 List the phases in unified process model?? Understand 2
18 List the types of patterns? Knowledge 3
19 Explain PSP and TSP? Knowledge 3
20 Explain high speed adaptation model? Understand 3
UNIT – II
1 Explain the kinds of system requirements? Knowledge 3
Blooms
Course
S. No Question Taxonomy
Outcome
Level
UNIT - I
1 Explain the evolving role of software? Knowledge 1
2 Define software and explain the various characteristics of software? Knowledge 2
Blooms
Course
S. No Question Taxonomy
Outcome
Level
UNIT – I
1. Explain specialized process models? Knowledge 3
2. Explain different software applications? Knowledge 3
3. Explain the paradigms do you think would be most effective? Why? Understand 3
4. Explain product and process are related? Understand 3
5. Explain personal and team process models? Understand 3
6. Explain process frame work activities? Knowledge 3
7. Explain the purpose of process assessment? Knowledge 3
8. Explain changing nature of software in detail? Knowledge 3
Explain and contrast perspective process models and iterative process
9. Understand 3
models?
10. Explain about the evolutionary process models? Understand 3
UNIT – II
1. Explain design processing along with its quality? Knowledge 6
2. Explain the design concepts in software engineering? Understand 6
3. Explain pattern based software design in a detail manner? Understand 6
4. Elaborate model for the design? Understand 6
5. Discuss architectural styles and patterns? Knowledge 6
6. Explain with a neat diagram of architectural design? Knowledge 6
7. Elaborate modeling component level design? Knowledge 6
8. Describe mapping data flow into a software architecture? Understand 6
9. Explain the guide lines of component level design? Understand 6
10. Describe the way of conducting a component level design? Understand 6
UNIT – III
1. Explain about Metrics for software quality? Knowledge
2. Explain strategic approach to software testing Understand 7
3. Describe test strategies for conventional software Understand 7
4. Describe validation testing Understand 7
5. Write a long notes on system testing Knowledge 7
6. Demonstrate art of debugging Knowledge 7
7. Discuss a framework for product metrics Knowledge 7
8. Demonstrate metrics for analysis model Understand 7
9. List the metrics for the design model Understand 7
10. Describe metrics for source code and for testing Understand 7
UNIT IV
1 Explain about software risks? Knowledge 8
Elaborate the concepts of Risk management Reactive Proactive Risk
2 Understand 8
strategies?
3 Explain about RMMM Plan? Understand 8
4 Explain about Quality concepts? Knowledge 9
5 Explain software quality assurance? Understand 9
6 Explain about formal technical reviews? Understand 9
7 Explain in detail ISO 9000 quality standards? Understand 9
8 Discuss risk refinement? Knowledge 9
9 Compare reactive with proactive risk strategies? Knowledge 9
10 Discuss software reliability? Understand 9
UNIT-V
12 Demonstrate statistical SQA? Understand 9
13 Define software reliability along with its terms? Understand 9
14 Explain risk projection in detail? Understand 9
15 Explain seven principals of risk management? Knowledge 9
16 Explain software reviews in brief? Knowledge 9
17 Explain six sigma for software engineering? Knowledge 9
18 Explain quality management with their terms? Understand 9
19 Demonstrate risk identification? Understand 9
20 Describe developing a risk table? Understand 9
Blooms
Course
S. No Question Taxonomy
Outcome
Level
UNIT-1
Describe “Software myth”? Discuss on various types of software myths
1 Remember 2
and the true aspects of these myths?
2 Explain software Engineering? Explain the software engineering layers? Understand 4
3 Explain in detail the capability Maturity Model Integration (CMMI)? Understand 3
Describe with the help of the diagram discuss in detail waterfall model.
4 Understand 4
Give certain reasons for its failure?
5 Explain briefly on (a) the incremental model (b) The RAD Model? Understand 4
UNIT-II
1 Compare functional requirements with nonfunctional requirements? Remember 2
2 Explain requirement engineering process? Remember 2
3 Discuss briefly how requirement validation is done? Remember 2
Discuss your knowledge of how an ATM is used; develop a set of use
4 cases that could serve as a basis for understanding the requirements for an Understand 2
ATM system?
Describe four types of non-functional requirements that maybe placed on a
5 Understand 4
system. Give examples of each of these types of requirement?
UNIT-III
Explain a two level process? Why should system design be finished before
1 the detailed design, rather starting the detailed design after the Understand 3
requirements specification? Explain with the help of a suitable example
Discuss briefly the following fundamental concepts of software design:
2 Understand 3
i) Abstraction, ii) Modularity, iii) Information hiding
Explain briefly the following: i)Coupling between the modules, ii)The
3 Understand 3
internal Cohesion of a module
4 Explain software design? Explain data flow oriented design? Understand 3
5 Explain the goals of the user interface design? Remember 4
UNIT – IV
Explain about the importance of test strategies for conventional
1 Remember 3
software?
2 Discuss black box testing in a detailed view? Remember 3
3 Compare black box testing with white box testing? Understand 3
4 Compare validation testing and system testing? Remember 3
Blooms
Course
S. No Question Taxonomy
Outcome
Level
UNIT – I
1 Explain is legacy software? Knowledge 1
2 Demonstrate all the applications of software? Knowledge 2
3 List the types of software myths? Knowledge 2
4 Discuss the architecture of layered technology? Understand 2
5 List all the umbrella activities in process framework? Understand 2
6 Explain is process pattern? Knowledge 2
7 List the types of software models? Understand 2
8 List the types other software process models? Understand 2
9 Explain software component? explain its uses Understand 2
10 Explain process assessment? Knowledge 2
11 List the models in CMMI? Knowledge 2
12 Explain the levels in continuous model in CMMI? Understand 2
13 Compare between perspective and iterative process models? Understand 2
14 Explain staged model in CMMI? Knowledge 2
15 Write the other name of waterfall model and who invented waterfall model? Understand 2
16 Explain boehm model? Understand 2
17 List the phases in unified process model?? Understand 2
18 List the types of patterns? Knowledge 3
19 Explain PSP and TSP? Knowledge 3
20 Explain high speed adaptation model? Understand 3
UNIT – II
1 Explain the kinds of system requirements? Knowledge 3
2 Explain functional requirement? Knowledge 3
3 Explain nonfunctional requirement? Understand 3
4 Explain domain requirements? Understand 3
5 List kinds of nonfunctional requirements? Knowledge 3
6 Explain example of functional requirement? Understand 3
7 Explain user requirements in detail? Understand 3
8 Explain system requirement in detail? Understand 4
9 Explain interface and list out how many types of there and what are they? Knowledge 4
10 Explain the term stake holder? Knowledge 4
11 Explain requirements gathering?? Knowledge 4
Blooms
Course
S. No Question Taxonomy
Outcome
Level
UNIT - I
1 Explain the evolving role of software? Knowledge 1
2 Define software and explain the various characteristics of software? Knowledge 2
Describe “Software myth”? Discuss on various types of software myths
3 Knowledge 2
and the true aspects of these myths?
4 Explain software Engineering? Explain the software engineering layers? Understand 2
5 Explain in detail the capability Maturity Model Integration (CMMI)? Understand 2
Describe with the help of the diagram discuss in detail waterfall model.
6 Knowledge 2
Give certain reasons for its failure?
7 Explain briefly on (a) the incremental model (b) The RAD Model? Understand 2
8 Explain the Spiral model in detail? Understand 2
Describe With the help of the diagram explain the concurrent
9 Understand 2
development model?
10 Explain unified process? Elaborate on the unified process work products? Knowledge 3
UNIT – II
1 Write short notes on user requirements. What is requirements? Knowledge 3
2 Compare functional requirements with nonfunctional requirements? Knowledge 3
Explain briefly the following: Coupling between the modules,
3 Understand 5
ii)The internal Cohesion of a module
Discuss the fundamental principles of structured design. Write
4 Knowledge 5
notes on transform analysis.
5 Explain software architecture in a detail manner? Understand 5
6 Explain software design? Explain data flow oriented design? Understand 5
7 Explain the goals of the user interface design? Understand 5
8 Discuss briefly about the golden rules for the user interface design? Knowledge 5
9 Discuss interface design steps in a brief manner Knowledge 6
10 Explain how the design is evaluated? Understand 6
UNIT – III
1 Explain about the importance of test strategies for conventional software? Knowledge 6
2 Discuss black box testing in a detailed view? Apply 6
3 Compare black box testing with white box testing? Apply 6
4 Compare validation testing and system testing? Knowledge 6
5 Discuss software quality factors? Discuss their relative importance? Understand 7
6 Discuss an overview of quality metrics? Understand 7
Explain should we perform the Validation test–the software developer or
7 Apply 7
the software user? Justify your answer?
8 Explain about Product metrics? Knowledge 7
9 Explain about Metrics for maintenance? Knowledge 7
10 Explain in detail about Software Measurement? Understand 7
UNIT IV
1 Explain about software risks? Knowledge 8
Elaborate the concepts of Risk management Reactive vs Proactive Risk
2 Understand 8
strategies?
3 Explain about RMMM Plan? Understand 8
4 Explain about Quality concepts? Knowledge 9
Understand 5
5 Explain software quality assurance?
UNIT-V
6 Explain about formal technical reviews? Understand 9
7 Explain in detail ISO 9000 quality standards? Understand 9
8 Discuss risk refinement? Knowledge 9
9 Compare reactive with proactive risk strategies? Knowledge 9
10 Discuss software reliability? Understand 9
12.2 PREREQUISITE(S):
University End
Session Marks Total Marks
Exam Marks
There shall be 2 midterm examinations. Each midterm Examination
Consists of subjective type and Objective type tests.
The subjective test is for 10 marks, with duration of 1 hour. Subjective test
of each semester shall contain 4 questions; the student has to answer2
questions, each carrying 5 marks.
The objective type test is for10 marks with duration of 20 minutes. It
consists of 10 Multiple choice and 10 objective type questions, the student
75 100
has to answer all the questions and each carries half mark.
First midterm examination shall be conducted for the first four units of
syllabus and second midterm examination shall be conducted for the
Remaining portion.
Five marks are marked for assignments. There shall be two assignments in
every theory course. Marks shall be awarded considering the average of
two assignments in each course
COURSE OBJECTIVES:
I. Identify the major concepts of language translation and phases of compiler design
II. Discuss the common forms of parsers
III. Extend the knowledge of parser by parsing LL parser and LR parser
IV. Demonstrate intermediate code using technique of syntax directed translation
V. Illustrate the various optimization techniques for designing various optimizing
compilers
VI. Construct machine dependent optimizations that are effective in improving the
quality of output code
ES. BLOOMS
COURSE OUTCOMES
NO LEVELS
Understand the compiler construction tools and Describes the Functionality of each Understanding /
a.
stage of compilation process Comprehension
Able to construct Grammars for Natural Languages and find the Syntactical Applying /
b.
Errors/Semantic errors during the compilations using parsing techniques Application
Understanding /
c. Understand the different representations of intermediate code.
Comprehension
Applying /
d. Able to construct new compiler for new languages.
Application
Applying /
e. Able to participate in GATE, PGECET and other competitive examinations
Application
Proficiency
Program Outcomes Level
assessed by
An ability to apply the knowledge of mathematics, Computing,
A Science and engineering to solve Computer Science and Engineering S Exercises
problems.
An ability to design and conduct engineering experiments, as well as to
B
analyze and interpret data.
An ability to design and construct a hardware and software system,
C H Exercises
component, or process to meet desired needs, within realistic constraints.
Graduates will demonstrate an ability to visualize and work on
D laboratory and Multi-disciplinary tasks individually or as a member
within the teams.
An ability to demonstrate skills to use the techniques, modern
E engineering Tools, Software and equipment’s necessary to analyze H Assignments
computer Problems.
12.7 SYLLABUS:
UNIT – I
Overview of Compilation: Phases of Compilation – Lexical Analysis, Regular Grammar and
regular expression for common programming language features, pass and Phases of
translation, interpretation, bootstrapping, data structures in compilation – LEX lexical
analyzer generator.
Top down Parsing: Context frees grammars, Top down parsing – Backtracking, LL (1),
recursive descent parsing, Predictive parsing, Preprocessing steps required for predictive
parsing.
UNIT – II
Bottom up parsing: Shift Reduce parsing, LR and LALR parsing, Error recovery in parsing ,
handling ambiguous grammar, YACC – automatic parser generator.
UNIT – III
Semantic analysis: Intermediate forms of source Programs – abstract syntax tree, polish
notation and three address codes. Attributed grammars, Syntax directed translation,
Conversion of popular Programming languages language Constructs into Intermediate code
forms, Type checker.
Symbol Tables: Symbol table format, organization for block structures languages, hashing,
tree structures representation of scope information. Block structures and non block structure
storage allocation: static, Runtime stack and heap storage allocation, storage allocation for
arrays, strings and records.
UNIT –IV
Code optimization: Consideration for Optimization, Scope of Optimization, local
optimization, loop optimization, frequency reduction, folding, DAG representation.
Data flow analysis: Flow graph, data flow equation, global optimization, redundant sub
expression elimination, Induction variable elements, Live variable analysis, Copy
propagation.
UNIT – V
Object code generation: Object code forms, machine dependent code optimization, register
allocation and assignment generic code generation algorithms, DAG for register allocation.
TEXT BOOKS:
1. Principles of compiler design -A.V. Aho .J.D.Ullman; Pearson Education.
2. Modern Compiler Implementation in C- Andrew N. Appel, Cambridge University
Press.
REFERENCES:
1. lex & yacc – John R. Levine, Tony Mason, Doug Brown, O’reilly
2. Modern Compiler Design- Dick Grune, Henry E. Bal, Cariel T. H. Jacobs, Wiley
dreamtech.
3. Engineering a Compiler-Cooper & Linda, Elsevier.
4. Compiler Construction, Louden, Thomson.
Lecture
Course Learning Outcomes Blooms Levels Topics to be covered Reference
No.
Overview of Compilation Introduction
Understanding / to compilation process. T1:1.1-1.4,
L1 Understand the basic compilers
Comprehension http://nptel.ac.in/courses/106108052/2 T2:1.2
#
Interpretation
Understanding / http://nptel.ac.in/courses/106108052/2 T1:1.1-1.4,
L2 Understand the basic compilers
Comprehension # T2:1.2
http://nptel.ac.in/courses/106108113/
Understand the difference Understanding / Pass and Phases of translation T1:1.1-1.4,
L3
between Pass and Phases Comprehension http://nptel.ac.in/courses/106108052/1 T2:1.2
Phases of Compilation
• Lexical Analysis Phase
• Syntax Analysis Phase
• Semantic Analysis Phase
Understand the Phases of Understanding /
L4 • Intermediate Analysis Phase T1:1.4-1.8
Compilation Comprehension
• Code optimization Analysis Phase
• Code generation Analysis Phase
http://nptel.ac.in/courses/106108052/2
#
Phases of Compilation
• Lexical Analysis Phase
• Syntax Analysis Phase
• Semantic Analysis Phase
Understand the Phases of Understanding /
L5 • Intermediate Analysis Phase T1:1.4-1.8
Compilation Comprehension
• Code optimization Analysis Phase
• Code generation Analysis Phase
http://nptel.ac.in/courses/106108052/2
#
Lexical Analysis:
Applying / • Lexemes
L6 Construct Lexical Analysis T1:35-3.7
Application • Tokens
http://nptel.ac.in/courses/106104123/2
Relate common programming Regular Grammar and regular
Remembering /
L7 languages are converting into expression for common programming T1:3.3,T2:2.3
Knowledge
regular grammar and expression. language features
L8 Relate common programming Remembering / Regular Grammar and regular T1:3.3,T2:2.3
available equations.
http://nptel.ac.in/courses/106108052/2
#
global optimization
Understand the global Understanding / Structural level equation
L55 T1:10.10
optimization Comprehension Numbered level equation
http://nptel.ac.in/courses/106108052/1
Understand the global redundant sub expression elimination
Understanding /
L56 optimization of redundant sub http://nptel.ac.in/courses/106108052/1 T1:10.11
Comprehension
expression elimination 7
Induction variable elements
Identify the dependent variable of
available expression
Understand Induction variable Understanding /
L57 Identify the which is linked with T1:10.12
elements Comprehension
dependent variable.
http://nptel.ac.in/courses/106108052/2
4
Live variable analysis
Identify the which the live variable
Understand Live variable Understanding / Based on basic block and given
L58 T1:10.12
analysis Comprehension expression.
http://nptel.ac.in/courses/106108052/2
4
Live variable analysis
Identify the which is the live variable
Understand Live variable Understanding /
L59 Based on basic block and given T1:10.13
analysis Comprehension
expression.
http://nptel.ac.in/courses/106108052/2
Copy propagation
Identify the which is the copy
statement in three address code
Understand Copy propagation of Understanding /
L60 Based on basic block and given T1:10.14
local Optimization Comprehension
expression.
http://nptel.ac.in/courses/106108052/2
4
Object code generation: Object code
forms
Understand various Object code Understanding /
L61 Absolute code T1:10.15
forms Comprehension
Reloadable code
Assembler code
Machine dependent code optimization
Graph Coloring
Understand various code Understanding / Register allocation
L62 T1:10.16
optimization Techniques Comprehension Global optimization
http://nptel.ac.in/courses/106108113/
http://nptel.ac.in/courses/106108052/3
Register allocation and Assignment
Most frequent used variables
Understand various Register
Understanding / Local /global Register allocation and
L63 allocation and Assignment T1:10.17
Comprehension Assignment
techniques
http://nptel.ac.in/courses/106108052/1
3
Generic code generation algorithms
Understand Generic code Understanding / Construct three address code
L64 T1:10.18
generation Algorithms Comprehension Construct Assembly code
Assign the register
DAG for register allocation.
Understand various applications Understanding /
L65 Labeling Algorithm T1:10.19-23
DAG Comprehension
Heuristic Algorithm
http://nptel.ac.in/courses/106108052/3
8
UNIT-I
1. Match the followings: [Gate-1990]
Group I Group II
A. Lexical Analysis p. DAG’s
B. Code optimization q. Syntax tree
C. Code generation r. Pushdown Automaton
D. Abelian Group’s s. Finite Automaton
Answer: a-q, b-p, c-r, d-s
2. Which of the following strings can definitely be said to be token without looking at
the next input character while compiling a pascql program? [Gate-1995]
I. Begin II. Program III.<>
A. I
B. II
C. III
D. All
Answer: C
Explanation:
<> symbol is said to be token without looking at the next input character while
compiling a Pascal program.
3. Type checking is normally done during [Gate-1998]
A. Lexical Analysis
B. Syntax Analysis
C. Syntax Directed Translation
D. Code Optimization
Answer: Syntax Analysis
Explanation: Type checking is normally done durig syntax analysis. In practice, there
are a number of tasks that might be conducted during syntax analysis phase such as
performing type checking and other kinds of semantic analysis like generating
intermediate code.
4. The number of tokens in the FORTRAN statement DO 10 I= 1.25 is [Gate-
1999]
A. 3
B. 4
C. 5
D. 6
Answer: C
Explanation:
DO
10
I Number of tokens=5
=
1.25
5. The ‘C’ language is [NET-DEC-2012]
A. Context free language
B. Context sensitive language
C. Regular language
D. None of the above
Answer: B
Exp: Because a context free language is powerful to describe the concept of
programming language and also describe the syntax of programming languages.
6. In analyzing the compilation of PL/I program, the term “lexical analysis” is
associated with [APSET-2013]
A. recognition of basic syntactic constructs through reductions
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix
D. use of macro processor to produce more optimal assembly code
Answer: B
7. In a compiler the module that checks every character of the source text is called
[APSET-2012]
A. the code generator
B. the code optimizer
C. the lexical analyzer
D. the syntax analyzer.
Answer: C
8. In machine language the operand can be [NET-DEC-2013]
A. an addressable register
B. the location of an instruction in memory
C. aabbab
D. abbbba
Answer: aabbab
18. Consider the grammar [Gate-2013]
SABSc | Abc
BA AB
Abab
BbAB
Aaaa
Which of the following sentences can be derived by this grammar?
A. abc
B. aab
C. abcc
D. abbc
Answer: abc
19. The language generated by the above grammar is the set of all strings, made up of
a, b, c such that [Gate-2013]
A. The number of a’s, b’s and c’s will be equal
B. a’s always precedes b’s
C. b’s always precedes c’s
D. The number of a’s, b’s , and c’s are the same and the a’s precedes the b’s which
precedes the c’s.
Answer: The number of a’s, b’s , and c’s are the same and the a’s precedes the b’s
which precedes the c’s.
Explanation: Generate some of the strings that can be derived from start state and verify
that they fall into the category covered by The number of a’s, b’s , and c’s are the same
and the a’s precedes the b’s which precedes the c’s.
20. Consider the following grammar [Gate-2006]
S FR
R*S | ε
Fid
In the predictive parser table. M of this grammar, the entries M [S,id] and M[R, $]
respectively are
A. { SFR} and { Rε}
B. {SFR} and {R*S }
C. { SFR} and { }
D. { Fid } and { Rε}
Answer: { SFR} and { Rε}
UNIT-II
1. Which of the following are Error Recovery Techniques [GATE-2010]
A. Global-Correction III
B. Phrase-Level Error Recovery
C. Error-Production
D. All
Answer: D
2. The minimum value of k in LR (k) is [GATE2009]
A. 1
B. 0
C. 2
D. 3
Answer: B
3. ----------- are the constructed data types. [GATE-2005]
A. Arrays
B. Structures
C. Pointer
D. All
Answer: D
4. 4. There are ------ representations used for these address code. [GATE-2011]
A. 1
B. 2
C. 3
D. 4
Answer: C
5. While performing type checking --- special basic types are needed. [APSET-2010]
A. 1
B. 2
C. 3
D. 4
Answer: C
6. Indirect triples are used to implement [NET-2008]
A. Infix notation
B. Postfix notation
C. Three address code
D. Prefix notation
Answer: C
7. A Sound Type system eliminates--, when the target program runs.[NET-2006]
A. Type Error
B. Runtime Error
C. Compiler Type Errors
D. Done
Answer: A
8. Implicit Type Conversion is called -------------- [GATE-2009]
A. Coercion
B. Correction
C. C-Type
D. None
Answer: A
9. ---determines the type of a language construct from the way it is used. [GATE-
2006]
A. Type Synthesis
B. Type Reference
C. Type Inference
D. All
Answer: B
10. ----------- are the constructed data types. [GATE-2005]
A. Arrays
B. Structures
C. Pointer
D. All
Answer: D
11. 4. There are ------ representations used for these address code. [GATE-2004]
A. 1
B. 2
C. 3
D. 4
Answer: C
12. While performing type checking ------ special basic types are needed.[GATE-2001]
A. 1
B. 2
C. 3
D. 4
Answer: C
13. Indirect triples are used to implement [GATE-2002]
A. Infix notation
B. Postfix notation
C. Three address code
D. Prefix notation
Answer: C
14. A collection of syntactic rule is called a [GATE-2001]
A. Grammar
B. NFA
C. Sentence
D. Language
Answer: A
15. In operator precedence parsing precedence relations are defined [GATE-2005]
A. For all pair of non-terminals
B. Set strings of symbols over given
C. Set of all alphabets
D. Only for a certain pair of terminals
Answer: D
16. Which Type is the context free Grammar [GATE-2005]
A. Type 3
B. Type 2
C. Type 1
D. Type 0
Answer: B
17. A Sound Type system eliminates---, when the target program runs.[GATE-2006]
A. Type Error
B. Runtime Error
C. Compiler Type Errors
D. Done
Answer: A
18. 9. Implicit Type Conversion is called -------------- [GATE-2007]
A. Coercion
B. Correction
C. C-Type
D. None
Answer: A
19. 10. ------determines the type of a language construct from the way it is used.
[GATE-2005]
A. Type Synthesis
B. Type Reference
C. Type Inference
D. All
Answer: B
20. Which of the following are Error Recovery Techniques [GATE-2003]
A. Global-Correction III
B. Phrase-Level Error Recovery
C. Error-Production
D. All
Answer: D
UNIT-III
1. The storage strategy in which activation record is maintained even after the
execution of a procedure is completed is [GATE-2004]
A. Stack allocation
B. Heap allocation
C. Static allocation
D. Dynamic allocation
Answer: C
2. The following symbol table implementation has the minimum access time.[GATE-
2002]
A. hash table
B. search tree
C. linear list
D. self-organizing list
Answer: B
3. Uniform symbol table [GATE-2005]
A. Contains all constants in the program
B. Is a permanent table of decision rules in the form of patterns for matching with the
uniform symbol table to discover syntactic structure
C. Consists of full or partial list of tokens as they appear in program created by
lexical analysis and used for syntax analysis and interpretation
D. A permanent table which lists all keywords and special symbols of language in
symbolic form
Answer: C
4. The storage strategy in which activation record is maintained even after the
execution of a procedure is completed. [GATE-2006]
A. Stack allocation
B. Heap allocation
C. Static allocation
D. Dynamic allocation
Answer: B
5. Which of the following parameter passing mechanism has the feature, that
operations on the formal parameters do not affect values in the activation record
of the caller? [GATE-2000]
A. call-by-value
B. call-by reference
C. call-by-name
D. call-by-procedure
Answer: A
6. ----- data structure gives intermediate performance to implement symbol tables.
[GATE-2003]
A. hash tables
B. trees
C. both
D. linear list
Answer: B
7. ------ analyzer phase refers symbol table for type conflict issue. [GATE02003]
A. semantic
B. syntactic
C. lexical
D. none
Answer: A
8. -------- is are used as the key to accessing the scope information from symbol
table. [GATE2006]
A. procedure name
B. nesting depth
C. both
D. none
Answer: C
9. A hash function is defined as F(key) = key mod 7 with linear probing is used to
insert the keys 37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then in
which location the key 11 is stored. [GATE-2007]
A. 6
B. 5
C. 1
D. 4
Answer: D
10. A compiler uses a data structure called _________________ to keep track of scope
and binding information about names. [GATE-2013]
A. Symbol Table
B. Hash table
C. Both
D. None
Answer: A
11. Uniform symbol table [GATE-2012]
A. Contains all constants in program
B. Is a permanent table of decision rules in the form of patterns for matching with the
uniform symbol table to discover syntactic structure
C. Consists of full or partial list of tokens as they appear in program created by
lexical analysis and used for syntax analysis and interpretation
D. A permanent table which lists all key words and special symbols of language in
symbolic form
Answer: C
12. When inserted the characters of the string:
KRPCSNYTJM into hash table of size 10 by using hash function H (X) = (ORD (X)-
ORD ('A') + 1) mod 10 and linear probing to resolve collisions. Insertions that cause
collisions are [GATE2004]
A. C, S
B. Y, M
C. J, M
D. S, T
Answer: C
13. A hash function is defined as F(key) = key mod 7 with linear probing is used to
insert the keys37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then in
which location the key 11 is stored.[GATE-2005]
A. 6
B. 5
C. 1
D. 4
Answer: B
14. A hash function is defined as F (key) = key mod 7 with linear probing is used to
insert the keys37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then
following key is stored as the last element[GATE-2004]
A. 98
B. 56
C. 11
D. 48
Answer: D
15. The storage strategy in which activation record is maintained even after the
execution of a procedure is completed is [GATE-2006]
A. Stack allocation
B. Heap allocation
C. Static allocation
D. Dynamic allocation
Answer: B
16. The following symbol table implementation has the minimum access time.[GATE-
2008]
A. hash table
B. search tree
C. linear list
D. self-organizing list
Answer: A
17. In the search trees implementation the expected time required to enter 'n' names
and make 'm' enquiries is proportional to [GATE-2007]
A. (n +m) log n
B. (m +n) log m
C. m n log n
D. m n log m
Answer: A
18. Time is independent of number of entries in a symbol table among [GATE2008]
A. Linear list
B. Search tree
C. Hash table
D. Self-organizing lists
Answer: C
19. Based on the property of locality of reference the symbol table is implemented in
[GATE2009]
A. Linear list
B. search tree
C. hash table
D. self-organizing list
Answer: C
20. Access time of symbol table will be logarithmic if it is implemented by[GATE-
2011]
A. linear list
B. search tree
C. hash table
D. self-organizing list
Answer:
UNIT-IV
1. A region of validity every name possesses in the source program is[Gate-1990]
A. Scope
B. Life time
C. Binding
D. Domain
Answer: B
2. An optimized compiler [Gate-1991]
A. Is optimized to occupy less space
B. Is optimized to take less time for execution
C. Optimized the code
D. Optimized to small typing font
Answer: C
3. Object language program than the most obvious for a given source program is
[Gate-2001]
A. Code generation
B. Code optimization
C. Code execution
D. Code debugging
Answer: C
4. The "90-10" rule states that [APSET-2006]
A. 90 % of code is executed in 10 % of time
B. 90 % of time is spent in 10 % of code
C. 90 % of time is spent in correcting 10 % of errors
D. 10 % of time is spent in correcting 90 % of errors
Answer: B
5. The most heavily travelled parts of programs are [NET-2007]
A. Inner loops
B. Constants
C. Static variables
D. Global variables
Answer: D
6. Machine independent code optimization can be applied to [NET-2003]
A. Source code
B. Intermediate representation
C. Object code
D. Run-time output
Answer: A
7. At a point in a program if the value of variable can be used subsequently, then that
variable is [NET-2005]
A. Dead
B. Duplicate
C. Aliasing
D. Live
Answer: D
8. The region of validity every name possesses in the source program is [GATE-1998]
A. Scope
B. Life time
C. Binding
D. Domain
Answer: A
9. Which of the following is not a peephole optimization? [GATE 2011]
A. Removal of unreachable code
B. Elimination of multiple groups
C. Elimination of loop invariant compilation
D. Loop unrolling
Answer: C
10. At point p if no matter what path is taken from p, the expression e will be
evaluated before any of its operands are defined, then expression e is said to be
[GATE-2008]
A. Lazy
B. Late
C. Busy
D. Dummy
Answer: B
11. The evaluation which avoids the action at all which is clearly advantageous
[GATE-2001]
A. Late
B. Lazy
C. Critical
D. Smart
Answer: C
12. Which of the following comments about peep hole optimization are false.
[GATE-1997]
A. It is applied to small part of the code
B. It can be used to optimize intermediate code
C. To get the best out of this, it has to be applied repeatedly
D. It can be applied to the code that is contiguous
Answer: C
13. Shorter equivalent sequence. [GATE-2005]
A. Peep hole optimizer
B. Assembler
C. Linker
D. Loader
Answer: A
14. The evaluation ordering in which we know beforehand that will have to perform
the action anyway, but we find it advantageous to perform it as late as possible
[GATE-2007]
A. Late
B. Lazy
C. Critical
D. Smart
Answer: A
15. The evaluation ordering in which, code for node is issued as soon as the code for all
of its Operands has been issued [GATE-2009]
A. Early
B. Late
C. Lazy
D. Critical
Answer: C
16. Peep-hole optimization is form of [GATE-2011]
A. Local optimization
B. Constant folding
C. Copy propagation
D. Data flow analysis
Answer: A
17. If the transformation of a program can be performed by looking only at
statements in basic block then it is said to be [GATE-2010]
A. Local
B. Global
C. Algebraic
D. Matrix
Answer: C
18. If E was previously computed and the values of variable in E have not changed
since previous computation, then an occurrence of an expression E is[ GATE-
2008]
A. Copy propagation
B. Dead code
C. Common sub expressions
D. Constant folding
Answer: C
19. In block B if s occurs in B and there is no subsequent assignment to y within B,
then the copy statement s:x :=y is [GATE-2006]
A. Generated
B. Killed
C. Blocked
D. Dead
Answer: A
20. In block B if x or y is assigned there and s is not in B then s: x :=y is[GATE-2005]
A. Generated
B. Killed
C. Blocked
D. Dead
Answer: B
UNIT-V
1. The following cannot be used to identify loops [NET-2008]
A. Depth first ordering
B. Reducible graphs
C. Dominators
D. Flow chart
Answer: D
2. Replacement of a string concatenation operator "||" by an addition is example for
[GATE-2009]
A. Strength reduction
B. Operator overriding
C. Operator over loading
D. Operator elimination
Answer: A
3. The replacement of an expensive operation by a cheaper one [GATE-2001]
A. Operator overriding
B. Operator overloading
C. Reduction in strength
D. Operator elimination
Answer: C
4. The loop which does not contain any other loops are [GATE-2000]
A. Natural loop
B. Inner loop
C. Main loop
D. Nested loop
Answer: B
5. Identify the basic blocks in the following code 10 goto 20 20 goto 10 [GATE-2006]
A. Go to 20
B. Go to 10
C. Two independent basic blocks
D. Both statements in one block
Answer: C
6. Loop is collection of nodes that [NET-2008]
A. Is loosely connected
B. Is strongly connected with several entries
C. Is having several entries
D. Is strongly connected with unique entry
Answer: D
7. n loop optimization technique a loop whose body is rarely executed is [GATE-
2008]
A. Dead code
B. Blank code
C. Redundant code
D. Blank stripper
Answer: D
8. If the following optimization is attempted, count of number of jumps to each label
can be found from symbol table of that label [GATE-2007]
A. Back tracking
B. Peephole optimization
C. Dynamic programming
D. Global optimization
Answer: B
9. The use of the following greatly improves the code when pushing or popping a
stack, as in parameter passing [GATE-2000]
A. Flow of control
B. Auto increment addressing modes
C. Auto decrement addressing modes
D. Both auto increment and auto decrement addressing modes
Answer: D
10. The following can be done through peephole optimization [GATE-2007]
A. Dynamic programming
B. Greedy method
C. Unreachable code elimination
D. Code generation
Answer: C
11. The following algebraic identities can be eliminated through peephole optimization
[GATE-2009]
A. x:=x+0
B. x:=x*1
C. x:=x+0 and x:=x*1
D. Jumps over jumps
Answer: C
12. Replacing the exponent operator by the shift of multiplication is [GATE-2000]
A. Constant folding
B. Reduction in strength
C. Copy propagation
D. Elimination of dead variables
Answer: B
13. Method to improve the target program by examining a short sequence of target
instructions [GATE-2011]
A. Back tracking
B. Peephole optimization
C. Dynamic programming
D. Global optimization
Answer: B
14. Program transformation that is not characteristic of peephole optimization
[GATE-2002]
A. Redundant instruction elimination
B. Flow of control optimization
C. Back patching
D. Use of machine idioms
Answer: C
15. The following is the small moving window in target program [GATE-2000]
A. Screen saver
B. Graphics
C. Peephole
D. Greedy window
Answer: C
16. Use of machine idioms is one of the characteristic of [GATE-2012]
A. Back tracking
B. Peephole optimization
C. Dynamic programming
D. Global optimization
Answer: B
17. Peephole optimization is to eliminate [GATE-2011]
A. Constant folding
B. Jumps over jumps
C. Copy propagation
D. Elimination of dead variables
Answer: B
18. Machine independent optimization is [GATE-2014]
A. Register allocation
B. Frequency reduction
C. Data intermixed with instructions
D. Machine features instructions
Answer: C
19. Computing two or more identical computations to a place in the program where
the computation can be done once and the result to used in the entire original
places is [GATE-2015]
A. Replacing
B. Profiling
C. Hoisting
D. Rearranging
Answer: B
20. Deducing at compile time that the value of an expression is a constant and using
that constant instead is [GATE-2013]
A. Constant folding
B. Constant deduction
C. Macro substitution
D. Copy propagation
Answer: A
Blooms
Course
S. No Question Taxonomy
Outcome
Level
UNIT – I
1 Define Complier briefly? Understand a
2 Explain the cousins of compiler? Understand b
3 Define the two main parts of compilation? What they perform? Understand c
4 How many phases does analysis consists? Understand e
5 Define and explain the Loader? Remember d
6 Explain about preprocessor? Remember a
7 State the general phases of a compiler? Understand b
8 State the rules, and define regular expression? Remember c
9 Explain a lexeme and Define regular sets? Remember e
10 Explain the issues of lexical analyzer? Understand d
13 List common methods for associating actual and formal parameters? Understand a
14 List various forms of target programs? Remember e
15 Define back patching? Understand d
16 List different data structures used for symbol table? Remember c
17 Explain the steps to search an entry in the hash table? Understand c
18 List the different types of type checking? Explain? Understand e
19 Explain general activation record? Understand d
20 State the difference between heap storage and hash table? Understand d
UNIT – IV
1 Explain the principle sources of optimization? Understand d
2 Explain the patterns used for code optimization? Understand c
3 Define the 3 areas of code optimization? Understand c
4 Define local optimization? Understand a
5 Define constant folding? Understand e
6 List the advantages of the organization of code optimizer? Understand d
7 Define Common Sub expressions? Understand c
8 Explain Dead Code? Understand c
9 Explain the techniques used for loop optimization and Reduction in strength? Understand a
Mention the issues to be considered while applying the techniques for code
10 Understand e
Optimization?
11 List the different data flow properties? Understand a
12 Explain inner loops? Understand e
13 Define flow graph? Understand d
14 Define a DAG? Mention its Apply? Understand c
15 Define peephole optimization? Understand c
16 Explain machine instruction for operations and copy statement? Understand a
17 Analyze global data flow? Understand d
18 Explain about live variable analysis? Understand c
19 Define the term copy propagation? Understand c
20 Explain data flow equation? Understand c
UNIT – V
1 Explain about machine dependent and machine independent optimization? Remember e
2 Explain the role of code generator in a compiler? Understand a
3 Write in detail the issues in the design of code generator. Apply e
Show the code sequence generated by the simple code generation
Algorithm
4 u := a – c Apply d
v := t + u
d := v + u//d live at the end
5 Explain the instructions and address modes of the target machine? Understand c
Identify the register descriptor target code for the source language
6 Statement“(a-b) + (a-c) + (a-c);” Understand c
The 3AC for this can be written ast := a – b
7 Mention the properties that a code generator should possess. Apply a
8 How do you calculate the cost of an instruction? Understand d
9 How will you map names to values? Understand c
10 Generate the code for x: =x+1 for target machine? Understand e
d := a – d
y := a – d
Write the next-use information for each line of the basic block?
Blooms
Course
S. No. Question Taxonomy
Outcome
Level
UNIT – I
Consider the following fragment of C code:
float i, j;
1 Apply 1
i = i*70+j+2;
Write the output at all phases of the compiler for above „C‟ code.
Construct an NFA for regular expression R= (aa | b) * ab convert it into an
2 Remember 2
equivalent DFA.
Describe the languages denoted by the following regular expressions.
3 (0+1)*0(0+1)(0+1) Remember 2
0*10*10*10*
Explain with one example how LEX program perform lexical
4 analysis for the following PASCAL patterns Identifiers, Comments, Apply 3
Numerical constants, Keywords, Arithmetic operators?
Check whether the following grammar is a LL(1)grammar
SiEtS|iEtSeS|a
5 Apply 4
Eb
Also define the FIRST and Followers.
Consider the grammar below
6 E->E+E|E-E|E*E|E/E|a|b Apply 4
Obtain left most and right most derivation for the string a+b*a+b.
Define ambiguous grammar? Test whether the following grammar is
7 ambiguous or not. Apply 4
E->E+E|E-E|E*E|E/E|E↑|(E)|-E|id
8 State the limitations of recursive descent parser? Remember 4
Convert the following grammar into LL(1)grammar,
9 Apply 4
S->ABC A->aA|C B->b C->c.
Write a recursive descent parser for the grammar.
bexpr->bexpr or bterm|bterm
10 bterm->bterm and bfactor|bfactor Apply 4
bfactor->notebfactor|(bexpr)|true|false.
Where or, and, not,(,),true, false are terminals of the grammar.
UNIT – II
Explain the common conflicts that can be encountered in a shift-reduce
1 Apply 5
parser?
2 Explain LALR parsing, justify how it is efficient over SLR parsing. Remember 5
3 Discuss error recovery in LL and LR parsing. Remember 5
UNIT – III
Suppose that the type of each identifier is a sub range of integers, for
expressions with operators +, -, *, div and mod, as in Pascal. Write type-
1 Understand 7
checking rules that assign to each sub expression the sub range its value must
lie in.
Define type expression? Write type expression for the following types. i.
2 Functions whose domains are functions from integers to pointers to integers Understand 7
and whose ranges are records consisting of an integer and a character.
Blooms
Course
S. No. Question Taxonomy
Outcome
Level
UNIT – I
Explain about the different phases of a compiler, showing the output of each
Create
1. phase, using the example of the following statement: position : = initial + rate 2
Analyzing
* 60http://nptel.ac.in/courses/106108113/module1/Lecture1.pdf
Explain compiler and interpreter with suitable diagram
2. Analyzing 3
http://textofvideo.nptel.iitm.ac.in/106105084/lec28.pdf
Differentiate between pass and Phase
3. Analyzing 3
http://www.nptel.ac.in/courses/112108150/pdf/Lecture_Notes/MLN_07.pdf
Create the different sections of LEX program with Example
4. Create 2
http://textofvideo.nptel.iitm.ac.in/106108052/lec1.pdf.
Determine the input buffer scheme for scanning the source program. How the
use of sentinels can improve its performance? Describe in detail
5. Evaluate 1
http://nptel.ac.in/courses/Webcourse-contents/IIT-
KANPUR/compilers/download/ska-sl1.pdf
UNIT- II
Specify what are the issues of Top-Down Parsing techniques
1. http://nptel.ac.in/courses/Webcourse-contents/IIT- Creating 4
KANPUR/compilers/ui/Course_home-4-11.htm
Explain back tracking with example
2. Apply 5
http://nptel.ac.in/courses/106105078/pdf/Lesson%2009.pdf
Create recursive descent parser for the following grammar.
3. Creating 3
http://nptel.ac.in/courses/Webcourse-contents/IIT-
KANPUR/compilers/ui/Course_home-4-11.htm
Create SLR parsing table for the following grammar.
S AS|b
4. A SA|a Creating 5
http://nptel.ac.in/courses/Webcourse-contents/IIT-
KANPUR/compilers/ui/Course_home-4-11.htm
Create predictive parse table for the following grammar.
E E + T| T
T T F| F
5. Creating 6
F F * |a |b
http://nptel.ac.in/courses/Webcourse-contents/IIT-
KANPUR/compilers/ui/Course_home-4-9.htm
UNIT-III
Create SLR parsing table for the following grammar.
S AS|b
1. A SA|a Creating 5
http://nptel.ac.in/courses/Webcourse-contents/IIT-
KANPUR/compilers/ui/Course_home-4-11.htm
Create LALR parsing table for the following grammar
2. S Aa | bAc | Bc | bBa Creating 5
Ad
Bd
http://nptel.ac.in/courses/Webcourse-contents/IIT-
KANPUR/compilers/ui/Course_home-4-9.htm
Discover What are the common conflicts that can be encountered in shift –
reduce parser.
3. http://textofvideo.nptel.iitm.ac.in/106108113/lec9.pdf Apply 6
http://nptel.ac.in/courses/Webcourse-contents/IIT-
KANPUR/compilers/ui/Course_home-4-9.htm
Create SLR parsing table for the following grammar.
R R ′|′ R | RR | R*| (R) | a | b
4. Creating 5
http://nptel.ac.in/courses/Webcourse-contents/IIT-
KANPUR/compilers/ui/Course_home-4-11.htm
Prepare What is an operator grammar? Give an example.
5. Apply 6
www.nptel.ac.in/syllabus/106104072/
UNIT-IV
Create the DAG for the following basic block
D := B_C
E :=A+B
1. Create 3
B := B+C
A := E-D
www.nptel.ac.in/courses/.../instr-sched-3.pdf
Determine What are the legal evaluation orders and names for the values at
the nodes for the DAG of problem (a).
2. i. Assuming A, B and C are alive at the end of the basic block? Evaluate 10
ii. Assuming only A is live at the end?
www.nptel.ac.in/courses/.../instr-sched-3.pdf
Explain different principal sources of optimization technique with suitable
examples
3. www.nptel.ac.in/courses/111105039 Apply 11
www.nptel.ac.in/courses/106108056/
www.nptel.ac.in/.../OPTIMIZATION%20METH.
Explain in detail the Optimization technique “strength reduction”.
www.nptel.ac.in/courses/111105039
4. Apply 12
www.nptel.ac.in/courses/106108056/
www.nptel.ac.in/.../OPTIMIZATION%20METH.
Summarize What is a DAG. Explain its applications
www.nptel.ac.in/courses/.../local-opt-part-2.pdf
5. www.nptel.ac.in/courses/106108052/7 Create 8
www.nptel.ac.in/courses/115102023/
www.textofvideo.nptel.iitm.ac.in/.../lec8.pdf
UNIT-V
Explain different machine dependent code optimization techniques
1. www.nptel.ac.in/courses/.../intro-to-optim-2.pdf Creating 10
www.textofvideo.nptel.iitm.ac.in/.../lec2.pdf
Explain the different issues in the design of a code generator.
www.nptel.ac.in/courses/.../code-gen-part-1.pdf
2. Creating 15
www.nptel.ac.in/courses/.../code-gen-part-3.pdf
www.nptel.ac.in/courses/106108052/9
Explain the concept of object code forms.
www.nptel.ac.in/courses/106108052/1
3. www.textofvideo.nptel.iitm.ac.in/.../lec25.pdf Creating 12
www.textofvideo.nptel.iitm.ac.in/.../lec26.pdf
www.textofvideo.nptel.iitm.ac.in/.../lec38.pdf
Compute various Register allocation optimization techniques with an
examplewww.textofvideo.nptel.iitm.ac.in/.../lec11.pdf
4. Apply 11
www.nptel.ac.in/courses/106108052/12
www.nptel.ac.in/courses/106108113/11
Create an algorithm for processing Macro Definition
5. Creating 14
www.nptel.ac.in/courses/.../lecture2.pdf
www.textofvideo.nptel.iitm.ac.in/.../lec7.pdf
www.textofvideo.nptel.iitm.ac.in/.../lec1.pdf
Blooms
Course
S. No Question Taxonomy
Outcome
Level
UNIT - I
Define compiler? State various phases of a compiler and explain them in
1 Understand 1
detail.
Explain the various phases of a compiler in detail. Also Write down the
2 Apply 1
output for the following expression after each phase a: =b*c-d.
3 Explain the cousins of a Compiler? Explain them in detail. Understand 1
Describe how various phases could be combined as a pass in a compiler?
4 Remember 3
Also briefly explain Compiler construction tools.
For the following expression
5 Position:=initial+ rate*60 Apply 1
Write down the output after each phase
6 Explain the role Lexical Analyzer and issues of Lexical Analyzer. Remember 1
7 Differentiate the pass and phase in compiler construction? Remember 1
8 Explain single pass and multi pass compiler? With example? Understand 1
9 Define bootstrapping concept in brief? Understand 1
10 Explain the general format of a LEX program with example? Understand 3
Construct the predictive parser the following grammar:
S->(L)|a
11 L->L,S|S. Apply 4
Construct the behavior of the parser on the sentence (a, a) using the
grammar specified above
Explain the algorithm for finding the FIRST and FOLLOW positions for
a given non-terminal.
ii) Consider the grammar,
E ->TE‟
E->+TE‟|@
12 Understand 4
T ->FT‟
T->*FT‟|@
F->(E)|id.
Construct a predictive parsing table for the grammar given above. Verify
whether the input string id + id * id is accepted by the grammar or not.
Prepare the predictive parser for the following grammar:
S->a|b|(T)
T ->T, S|S
Write down the necessary algorithms and define FIRST and
13 FOLLOW. Show the behavior of the parser in the sentences, Apply 4
i.
(a,(a,a))
ii.
(((a,a),a,(a),a)
Explain operator grammar? Draw the precedence function graph for the
following table.
A ( ) , $
> > >
14 Understand 4
( < < = <
) > > >
, < < > >
$ < <
UNIT – II
Consider the grammar E
E + E|E *E|(E)| id
1 Show the sequence of moves made by the shift-reduce parser on the Apply 5
input id1+id2*id3 and determine whether the given string is accepted
by the parser or not.
i) State shift-reduce parsing? Explain in detail the conflicts that may
occur during shift-reduce parsing.
2 ii)For the grammar given below, calculate the operator precedence Understand 5
relation and the precedence functions
EE + E|E- E|E * E|E / E|E E|(E)|-E|id
Prepare a canonical parsing table for the grammar given below
3 SCC Analysis 5
CcC|d
Analyze whether the following grammar is SLR (1) or not. Explain your
answer with reasons.
SLR
4 SR Apply 5
L* R
RL
L id
Consider the grammar given below.
EE + T
ETT
TT * F
TF
5 Apply 5
F(E)
Fid
Prepare LR parsing table for the above grammar .Give the moves of
LR parser on id * id + id
ii) Briefly explain error recovery in LR parsing.
UNIT – III
Explain with an example to generate the intermediate code for the flow of
1 Apply 8
control statements?
2 List the various ways of calling the procedures? Explain in detail? Analysis 6
Explain 3addresscodes and mention its types. How would you implement
3 Apply 8
the three address statements? Explain with suitable examples?
Explain how declaration is done in a procedure using syntax directed
4 Apply 7
translation?
a) Write a note on the specification of a simple type checker.
5 b) Define a type expression? Explain the equivalence of type Analysis 7
expressions with an appropriate example.
Generate the three-address code for the following C program
fragment
while(a > b)
{
6 if (c < d) Understand 8
x = y + z;
else
x = y - z;
}
Generate the code for the following C statements using its
equivalent
three address code.
7 a=b+1 Understand 8
x = y+3
y = a/b
a = b+c
a := b + c
x := a + b
b := a – d
c := b + c
d := a – d
y := a – d
Write the next-use information for each line of the basic block?
13.2 PREREQUISITES:
University End
Session Marks Total Marks
Exam Marks
There shall be 2 midterm examinations. Each midterm examination
consists of subjective type and objective type tests. The subjective test is for
10 marks, with duration of 1 hour. Subjective test of each semester shall
contain 4 questions; the student has to answer 2 questions, each
carrying5marks.
The objective type test is for 10 marks with duration of 20minutes. It
consists of10 multiple choice and 10 objective type questions, the student
75 100
have to answer all the questions and each carry half mark.
First midterm examination shall be conducted for the first two and half units
of syllabus and second midterm examination shall be conducted for the
remaining portion.
Five marks are earmarked for assignments. There shall be two assignments
in every theory course. Marks shall be awarded considering the average of
two assignments in each course.
COURSE OBJECTIVES:
I. To understand main components of OS and their working
II. To study the operations performed by OS as a resource Manager
III. To understand the scheduling policies of OS
IV. To understand the different memory management techniques.
V. To understand process concurrency and synchronization
VI. To understand the concepts of input/output, storage and file management
VII. To study different OS and compare their features.
Proficiency
Program Outcomes Level
Assessed by
An ability to apply knowledge of computing, mathematical
foundations, algorithmic principles, and computer science and
Assignment, Exams,
a engineering theory in the modeling and design of computer-based S
Lectures
systems to real-world problems (fundamental engineering analysis
Skills).
Lectures
An ability to design and conduct experiments, as well as to analyze
b S Assignments
and interpret data (information retrieval skills).
, Tutorials
An ability to design and construct a hardware and software system,
Assignments,
c component, or process to meet desired needs, within realistic H
tutorials, lectures
constraints.
An ability to function effectively on multi-disciplinary teams
d N -
(teamwork).
An ability to analyze a problem, and identify, formulate and use the
Lectures
e appropriate computing and engineering requirements for obtaining H
Tutorials
its solution (engineering problem solving skills).
An understanding of professional, ethical, legal, security and social Lectures
f S
issues and responsibilities (professional integrity). Assignments
An ability to communicate effectively, both in writing and orally
g N -
(speaking / writing skills).
The broad education necessary to analyze the local and global
h impact of computing and engineering solutions on individuals, S Examination
organizations, and society (engineering impact assessment skills).
13.7 SYLLABUS:
UNIT -I
Operating System Introduction :Operating Systems objectives and functions, computer
system architecture, OS structure, OS Operations, Evolution of Operating Systems-Simple
batch, Multi programmed, time shared, Personal Computer, Parallel, Distributed systems,
Real Time Systems, Special Purpose systems, Operating System Services, User OS interface,
system calls, Types of System calls, System Programs, Operating System Design and
Implementation, OS Structure, Virtual Machines.
UNIT -II
ProcessandCPUScheduling–Processconcepts–heProcess,ProcessState,ProcessControlBlock,
Threads, Process scheduling-Scheduling queues, Schedulers, Context Switch, Preemptive
scheduling, Dispatcher, Scheduling criteria, Scheduling algorithms, Multi-Processor
Scheduling, Real Time Scheduling, Thread scheduling, Case studies: Linux, windows.
Process Coordination-Process synchronization, the critical- section problem, Peterson’s
Solution, synchronization Hardware, semaphores, classic problems of synchronization,
monitors. Case studies UNIX, Linux, Windows.
UNIT -III
Memory Management and Virtual Memory- Logical & Physical Address, Swapping,
contiguous memory allocation, paging, structure of the page table, segmentation,
Segmentation with Paging, virtual memory, demand paging, Performance of Demand Paging,
page-Replacement, algorithms, Allocation of frames, Thrashing.
UNIT -IV
File system Interface- the concept of a file, Access Methods, Directory structure, File
system mounting, file sharing, protection.
FileSystemimplementation-
Filesystemstructure,filesystemimplementation,FileSystemStructure, File System
Implementation, Allocation methods, Free space Management, Directory Implementation,
Efficiency and Performance, Directory implementation, directory implementation, allocation
methods, free-space management, efficiency and performance,
Mass-storage structure: overview of Mass-storage structure, Disk structure, disk
TEXT BOOK:
1. Operating System Principles. Abraham Silberchatz, Peter B.Galvin Greg Gagne,
th
8 Edition, Wiley Student Edition.
th
2. Operating Systems-Internals and Design Principles, W.Stallings 6 Edition, Pearson
REFERENCE BOOKS:
rd
1. Modern Operating Systems, Andrew S Tenenbaum, 3 Edition, PHI
nd
2. Operating System A Concept Based Approach, 2 Edition, D.M. Dhamdhere ,TMH
3. Principals of Operating Systems, B.L Stuart, Cengage learning India Edition
nd
4. Operating Systems, A.S.Godbole, 2 Edition, TMH
5. An Introduction to Operating Systems, P.C.P Bhatt, PHI
6. Operating Systems, S.Haldar and A.A. Aravind, Person Education
13.8 COURSEPLAN:
The course plan is meant as a guideline. There may probably be changes
Lecture
Course Learning Outcomes Blooms Levels Topics to be covered Reference
No.
Understand the purpose of Operating Operating System Overview:
system. Explain the objectives and Understanding / Introduction, OS operations.
L1 T1:1.1-1.5
functionality of modern operating Comprehension http://nptel.ac.in/courses/10610
system. 8101/1
Describe how operating systems have Evolution of Operating
evolved over time from primitive batch Systems. T1:1.9-1.10
L2 Creating / Synthesis
systems to sophisticated multi user http://nptel.ac.in/courses/10610 T2: 1.2
systems. 8101/1
Operating system structures:
Explain the services provided by the T1:1.4, 1.6-
Operating System Services,
OS. Describe the functions of a Understanding / 1.8, 2.1-
L3-L4 System calls.
contemporary operating system with Comprehension 2.3
http://nptel.ac.in/courses/10610
respect to convenience, efficiency.
8101/3
Explain the concepts of logical layer, System Programs Operating
Understanding / T1 :2.5,2.6
benefits of building abstract layers in System Design and
L5-L6 Comprehension R1: 1.6
hierarchical fashion. Implementation
Virtual Machine
Explain the importance of Virtual Understanding /
L7 http://nptel.ac.in/courses/10610 T2:2.5
Machine. Comprehension
8101/3
Distinguish between a resource, a Process Management : Process
program and process. Understanding / Concept, Process State T1:3.1
L8
Explain the different states that a task Comprehension http://nptel.ac.in/courses/10610 T2: 3.1-3.2
may pass through. 8101/3
Explain the data structure needed to T1:3.1,
Understanding /
L9 support the management of many tasks. Process Control Block, Threads 4.1-4.5
Comprehension
Describe the difference between T2: 3.3, T2:
8101/9
Principals of Protection,
Explain the mechanism available in an Understanding / Domain of Protection,
L55 T1:14.2-14.3
OS to control access to resources. Comprehension http://nptel.ac.in/courses/10610
8101/10
Access Matrix, Implementation
L56- Describe the access control matrix and
Creating / Synthesis Access Matrix, Access Control, T1:14.4-14.7
L58 how it relates to ACL and C-Lists,
Revocation of Access Rights
L59- Describe Capability based system and Capability Based System,
Creating / Synthesis T1:14.8-14.9
L60 Language based protection. Language Based Protection.
UNIT-I
1. _____ is a large kernel, including scheduling file system, networking, device
drivers, memory management and more.
A. Monolithic kernel
B. Micro kernel
C. Macro kernel
D. Mini kernel
Answer: A
2. The two central themes of modern operating system are...............
A. Multiprogramming and Distributed processing
B. Multiprogramming and Central Processing
Answer: B
9. Which of the following is an operating system call?
A. CREATE
B. LINK
C. SYSTEM
D. All the above
Answer: D
10. What is Shell?
A. It is a hardware component.
B. It is a command interpreter
C. It is a part in compiler
D. It is a tool in CPU scheduling.
Answer: B
11. Let the time taken to switch between user and kernel modes of execution be t1
while the time taken to switch between two processes be t2. Which of the following
is TRUE?
A. t1 > t2
B. t1 = t2
C. t1 < t2
D. Nothing can be said about the relation between t1 and t2
Answer: C
12. Which concept explains the working of an Operating System?
A. It is event driven
B. It is object oriented
C. It is procedure based system software
D. It is a collection of procedures that interact with each other
Answer: A
13. Which of these is/are the desirable features of an Operating system
A. Extensible
B. Portable
C. Reliable
D. All of the above
Answer: D
14. More than one word are put in one cache block to
A. exploit the temporal locality of reference in a program
B. exploit the spatial locality of reference in a program
C. reduce the miss penalty
D. none of the above
Answer: B
15. Which of the following statements is false?
A. Virtual memory implements the translation of a program’s address space into
physical memory address space
B. Virtual memory allows each program to exceed the size of the primary memory
C. Virtual memory increases the degree of multiprogramming
D. Virtual memory reduces the context switching overhead
Answer: D
16. Which of the following need not necessarily be saved on a context switch between
processes?
A. General purpose registers
B. Translation look-aside buffer
C. Program counter
D. All of the above
Answer: B
17. Where does the swap space reside?
A. RAM
B. Disk
C. ROM
D. On-chip cache
Answer: B
18. Increasing the RAM of a computer typically improves performance because:
A. Virtual memory increases
B. Larger RAMs are faster
C. Fewer page faults occur
D. Fewer segmentation faults occur
Answer: C
19. What is the swap space in the disk used for?
A. Saving temporary html pages
B. Saving process data
C. Storing the super-block
D. Storing device drivers
Answer: B
20. What is operating system?
A. collection of programs that manages hardware resources
B. system service provider to the application programs
C. link to interface the hardware and application programs
D. all of the mentioned
Answer: D
UNIT-II
1. Process is _________
A. A program in execution
B. An instance of a program running on a computer.
C. The entity that can be assigned to and executed
D. All of the above.
Answer: D
2. Switching the CPU to another process requires to save state of the old process and
loading new process state is called as
A. Process Blocking
B. Context Switch
C. Time Sharing
D. None of the above.
Answer: B
3. A Thread
A. Is a light weight process where the context switching is low
B. Is a light weight process where the context switching is high
C. Is used to speed up paging.
D. None of the above
Answer: A
4. To avoid the race condition, the number of processes that may be simultaneously
inside their critical section is
A. 8
B. 1
C. 16
D. 0
Answer: B
5. The strategy of allowing processes that are logically run able to be temporarily
suspended is called
A. Preemptive Scheduling
B. Non Preemptive Scheduling
C. Shortest Job first
D. First come First Serve.
Answer: A
6. Inter process communication
A. Is required for all processes
B. Is used done via disk drives
C. Is never necessary
D. Allows processes to synchronize activity.
Answer: D
7. Following is/are the reasons for process suspension
A. Swapping parent process
B. Inter request
C. Timing
D. All the above.
Answer: D
8. ............. Executes must frequently and makes the fine grained decision of which
process to execute the next.
A. Long-term scheduling
B. Medium-term scheduling
C. Short-term scheduling
D. None of the above
Answer: C
9. State which statement is true for Suspended process?
i) The process is not immediately available for execution.
ii) The process may be removed from suspended state automatically without removal
order.
A. i only
B. ii only
C. i and ii only
D. None.
Answer: C
10. For which of the following policy can we expect the average waiting time to be the
shortest?
A. First Come first served
B. Last come first served
C. Longest job last
D. Random selection of jobs.
Answer: D
11. Consider the following code fragment:
if (fork() == 0)
{ a = a + 5; printf("%d,%d\n", a, &a); }
B. -1
C. 1
D. 2
Answer D
15. The following two functions P1 and P2 that share a variable B with an initial value
of 2 execute concurrently.
P1()
{
C = B – 1;
B = 2*C;
}
P2()
{
D = 2 * B;
B = D - 1;
}
The number of distinct values that B can possibly take after the execution is
A. 3
B. 2
C. 5
D. 4
Answer A
16. A certain computation generates two arrays a and b such that a[i]=f(i) for 0 ≤ i < n
and b[i]=g(a[i]) for 0 ≤ i < n. Suppose this computation is decomposed into two
concurrent processes X and Y such that X computes the array a and Y computes
the array b. The processes employ two binary semaphores R and S, both initialized
to zero. The array a is shared by the two processes. The structures of the processes
are shown below.
Process X: Process Y:
private i; private i;
for (i=0; i < n; i++) { for (i=0; i < n; i++) {
a[i] = f(i); EntryY(R, S);
ExitX(R, S); b[i]=g(a[i]);
} }
Which one of the following represents the CORRECT implementations of ExitX and
EntryY?
(A)
ExitX(R, S) {
P(R);
V(S);
}
EntryY (R, S) {
P(S);
V(R);
}
(B)
ExitX(R, S) {
V(R);
V(S);
}
EntryY(R, S) {
P(R);
P(S);
}
(C)
ExitX(R, S) {
P(S);
V(R);
}
EntryY(R, S) {
V(S);
P(R);
}
(D)
ExitX(R, S) {
V(R);
P(S);
}
EntryY(R, S) {
V(S);
P(R);
}
Answer C
17. A shared variable x, initialized to zero, is operated on by four concurrent processes
W, X, Y, Z as follows. Each of the processes W and X reads x from memory,
increments by one, stores it to memory, and then terminates. Each of the processes
Y and Z reads x from memory, decrements by two, stores it to memory, and then
terminates. Each process before reading x invokes the P operation (i.e., wait) on a
counting semaphore S and invokes the V operation (i.e., signal) on the semaphore
S after storing x to memory. Semaphore S is initialized to two. What is the
maximum possible value of x after all processes complete execution?
A. -2
B. -1
C. 1
D. 2
Answer D
18. A process executes the code
fork();
fork();
fork(); Gate 2006
The total number of child processes created is
A. 3
B. 4
C. 7
D. 8
Answer C
19. Fetch_And_Add(X,i) is an atomic Read-Modify-Write instruction that reads the
value of memory location X, increments it by the value i, and returns the old value
of X. It is used in the pseudocode shown below to implement a busy-wait lock. L is
an unsigned integer shared variable initialized to 0. The value of 0 corresponds to
lock being available, while any non-zero value corresponds to the lock being not
available. Gate 2008
AcquireLock(L){
while (Fetch_And_Add(L,1))
L = 1;
}
ReleaseLock(L){
L = 0;
}
This implementation
UNIT-III
1. Which of the following are encompassed within primary memory management
operations:
A. The allocation of main memory to programs
B. The garbage collection to achieve compaction
C. Managing the process control block
D. Protection to user data when a user exceeds his allocated data area allocation.
Answer:
2. Once a program is compiled, it can be loaded for execution
A. Only from the compiler generated starting address
B. Anywhere in the main memory
C. User needs to specify where the compiled code is to be loaded
D. It is loaded starting from address 0 in the main memory
Answer: D
3. Indicate which amongst the following statements are true for virtual memory.
A. It allows for multiple users to use the system
B. It enhances scope for multi-programming
C. It extends the address space
D. It reduces external fragmentation as well as internal fragmentation.
Answer: A
4. Paging was prompted by what form of reasoning:
A. Because on compilation the program code is paginated.
B. Because program display a strong locality of reference.
C. Because we print programs on pages
D. None
Answer: A
5. Which of the following are the likely causes of thrashing?
A. Because there are too many users connected to the system
B. Because the page size was very small
C. Because we followed a first in first out policy
D. Because we followed a least recently used policy for page replacement
Answer: B
6. The typical page size may be
A. Usually between 10 and100 bytes
B. Usually of 512 to 2k bytes
C. More than 100 KB bytes but less than 1 MB
D. Minimally 1 MB
Answer: C
7. Which one of the following is the address generated by CPU?
A. physical address
B. absolute address
C. logical address
D. none of the mentioned
Answer: C
8. The address of a page table in memory is pointed by
A. stack pointer
B. page table base register
C. page register
D. program counter
Answer: B
9. The segment base contains the:
A. starting logical address of the process
B. starting physical address of the segment in memory
C. segment length
D. None of these
Answer: B
10. Each entry in a segment table has a:
A. segment base
B. segment peak
C. segment limit
D. segment value
Answer: A, C
11 A computer system supports 32-bit virtual addresses as well as 32-bit physical
addresses. Since the virtual address space is of the same size as the physical
address space, the operating system designers decide to get rid of the virtual
memory entirely. Which one of the following is true?
A. Efficient implementation of multi-user support is no longer possible
B. The processor cache organization can be made more efficient now
C. Hardware support for memory management is no longer needed
C. LRU
D. MRU
Answer A
17 The essential content(s) in each entry of a page table is / are
A. Virtual page number
B. Page frame number
C. Both virtual page number and page frame number
D. Access right information
Answer B
18 A system uses FIFO policy for page replacement. It has 4 page frames with no
pages loaded to begin with. The system first accesses 100 distinct pages in some
order and then accesses the same 100 pages but now in the reverse order. How
many page faults will occur?
A. 196
B. 192
C. 197
D. 195
Answer A
19 Let the page fault service time be 10ms in a computer with average memory access
time being 20ns. If one page fault is generated for every 10^6 memory accesses,
what is the effective access time for the memory?
A. 21ns
B. 30ns
C. 23ns
D. 35ns
Answer B
20 Consider the virtual page reference string
1, 2, 3, 2, 4, 1, 3, 2, 4, 1
On a demand paged virtual memory system running on a computer system that
main memory size of 3 pages frames which are initially empty. Let LRU, FIFO
and OPTIMAL denote the number of page faults under the corresponding page
replacements policy. Then
A. OPTIMAL < LRU < FIFO
B. OPTIMAL < FIFO < LRU
C. OPTIMAL = LRU
D. OPTIMAL = FIFO
Answer B
UNIT-IV
1. By using the specific system call, we can
A. open the file
B. read the file
C. write into the file
D. all of the mentioned
Answer: D
2. File type can be represented by
A. file name
B. file extension
C. file identifier
D. none of the mentioned
Answer: B
3. Data cannot be written to secondary storage unless written within a ______.
A. file
B. swap space
C. directory
D. text format
Answer: A
4. The information about all files is kept in:
A. swap space
B. operating system
C. separate directory structure
D. None of these
Answer: C
5. In UNIX, the open system call returns:
A. pointer to the entry in the open file table
B. pointer to the entry in the system wide table
C. a file to the process calling it
D. None of these
Answer: A
6. The directory can be viewed as a _________ that translates file names into their
directory entries.
A. symbol table
B. partition
C. swap space
D. cache
Answer: A
7. When a user job starts in a two level directory system, or a user logs in :
A. the users user file directory is searched
B. the system’s master file directory is searched
C. the master file directory is indexed by user name or account number, and each
entry points to the UFD for that user
D. All of these
Answer: B, C
8. In the tree structured directories,
A. the tree has the stem directory
B. the tree has the leaf directory
C. the tree has the root directory
D. All of these
Answer: C
9. A server crash and recovery will __________ to a client.
A. be visible
B. affect
C. be invisible
D. harm
Answer: C
10. The server must write all NFS data ___________.
A. synchronously
B. asynchronously
C. index-wise
D. None of these
Answer: A
11. A computer system supports 32-bit virtual addresses as well as 32-bit physical
addresses. Since the virtual address space is of the same size as the physical
address space, the operating system designers decide to get rid of the virtual
memory entirely. Which one of the following is true?
A. Efficient implementation of multi-user support is no longer possible
B. The processor cache organization can be made more efficient now
C. Hardware support for memory management is no longer needed
D. CPU scheduling can be made more efficient now
Answer C
12. A CPU generates 32-bit virtual addresses. The page size is 4 KB. The processor
has a translation look-aside buffer (TLB) which can hold a total of 128 page table
entries and is 4-way set associative. The minimum size of the TLB tag is:
A. 11 bits
B. 13 bits
C. 15 bits
D. 20 bits
Answer C
13. A virtual memory system uses First In First Out (FIFO) page replacement policy
and allocates a fixed number of frames to a process. Consider the following
statements:
P: Increasing the number of page frames allocated to a process sometimes
increases the page fault rate.
Q: Some programs do not exhibit locality of reference. Which one of the following
is TRUE?
Both P and Q are true, and Q is the reason for P(B) Both P and Q are true, but Q is not
the reason for P.
(C) P is false, but Q is true
(D) Both P and Q are false.
Answer (B)
14. A processor uses 36 bit physical addresses and 32 bit virtual addresses, with a page
frame size of 4 Kbytes. Each page table entry is of size 4 bytes. A three level page
table is used for virtual to physical address translation, where the virtual address
is used as follows
• Bits 30-31 are used to index into the first level page table
• Bits 21-29 are used to index into the second level page table
• Bits 12-20 are used to index into the third level page table, and
• Bits 0-11 are used as offset within the page
The number of bits required for addressing the next level page table (or page
frame) in the page table entry of the first, second and third level page tables are
respectively
A. 20, 20 and 20
B. 24, 24 and 24
C. 24, 24 and 20
D. 25, 25 and 24
Answer (D)
15. A multilevel page table is preferred in comparison to a single level page table for
translating virtual address to physical address because
A. It reduces the memory access time to read or write a memory location.
B. It helps to reduce the size of page table needed to implement the virtual address
space of a process.
C. It is required by the translation lookaside buffer.
D. It helps to reduce the number of page faults in page replacement algorithms.
Answer (B)
16. In which one of the following page replacement policies, Belady’s anomaly may
occur?
A. FIFO
B. Optimal
C. LRU
D. MRU
Answer (A)
17. The essential content(s) in each entry of a page table is / are
A. Virtual page number
B. Page frame number
C. Both virtual page number and page frame number
D. Access right information
Answer B
18. A system uses FIFO policy for page replacement. It has 4 page frames with no
pages loaded to begin with. The system first accesses 100 distinct pages in some
order and then accesses the same 100 pages but now in the reverse order. How
many page faults will occur?
A. 196
B. 192
C. 197
D. 195
Answer A
19. Let the page fault service time be 10ms in a computer with average memory access
time being 20ns. If one page fault is generated for every 10^6 memory accesses,
what is the effective access time for the memory?
A. 21ns
B. 30ns
C. 23ns
D. 35ns
Answer B
20. Consider the virtual page reference string
1, 2, 3, 2, 4, 1, 3, 2, 4, 1
On a demand paged virtual memory system running on a computer system that
main memory size of 3 pages frames which are initially empty. Let LRU, FIFO
and OPTIMAL denote the number of page faults under the corresponding page
replacements policy. Then
A. OPTIMAL < LRU < FIFO
B. OPTIMAL < FIFO < LRU
C. OPTIMAL = LRU
D. OPTIMAL = FIFO
Answer B
UNIT-V
1. A direct method of deadlock prevention is to prevent the occurrences of ................
A. Mutual Exclusion.
A. source file
B. object file
C. executable file
D. all of the mentioned
Answer: C
10. In asymmetric encryption
A. same key is used for encryption and decryption
B. different keys are used encryption and decryption
C. no key is required for encryption and decryption
D. none of the mentioned
Answer: B
11. Let m[0]…m[4] be mutexes (binary semaphores) and P[0] …. P[4] be processes.
Suppose each process P[i] executes the following:
wait (m[i]); wait(m[(i+1) mode 4]);
-- -- --
release (m[i]); release (m[(i+1)mod 4]);
This could cause
A. Thrashing
B. Deadlock
C. Starvation, but not deadlock
D. None of the above
Answer B
12. The enter_CS() and leave_CS() functions to implement critical section of a process
arerealized using test-and- set instruction as follows:
void enter_CS(X)
while test-and- set(X) ;
void leave_CS(X)
X = 0;
In the above solution, X is a memory location associated with the CS and is
initialized to 0. Now consider the following statements:
I. The above solution to CS problem is deadlock-free
II. The solution is starvation free.
III. The processes enter CS in FIFO order.
IV More than one process can enter CS at the same time.
Which of the above statements is TRUE?
A. I only
B. I and II
C. II and III
D. IV only
Answer A
13. Consider the following snapshot of a system running n processes. Process i is
holding Xi instances of a resource R, 1 <= i <= n. currently, all instances of R
are occupied. Further, for all i, process i has placed a request for an additional Yi
instances while holding the Xi instances it already has. There are exactly two
processes p and q such that Yp = Yq = 0. Which one of the following can serve as a
necessary condition to guarantee that the system is not approaching a deadlock?
A. min (Xp, Xq) < max (Yk) where k != p and k != q
B. Xp + Xq >= min (Yk) where k != p and k!= q
C. max (Xp, Xq) > 1
D. min (Xp, Xq) > 1
Answer B
14. Which of the following is NOT true of deadlock prevention and deadlock
avoidance schemes?
A. In deadlock prevention, the request for resources is always granted if the resulting
state is safe
B. In deadlock avoidance, the request for resources is always granted if the result
state is safe
C. Deadlock avoidance is less restrictive than deadlock prevention
D. Deadlock avoidance requires knowledge of resource requirements a priori
Answer A
15. Before proceeding with its execution, each process must acquire all the resources it
needs is called
A. pre-emption.
B. circular wait.
C. hold and wait
D. deadlock.
Answer C
16. In domain structure what is Access-right equal to ?
A. Access-right = object-name, rights-set
B. Access-right = read-name, write-set
C. Access-right = read-name, execute-set
D. Access-right = object-name, execute-set
Answer A
17. What does access matrix represent ?
A. Rows-Domains, Columns-Objects
B. Rows-Objects, Columns-Domains
C. Rows-Access List, Columns-Domains
D. Rows-Domains, Columns-Access list
Answer A
18. What are the three copy rights ?
A. Copy
B. transfer
C. limited copy
D. owner
Answer a,b,c
19. If we preempt a resource from a process, the process cannot continue with its
normal execution and it must be :
A. aborted
B. rolled back
C. terminated
D. queued
Answer B
20. Each request requires that the system consider the __________, _____________,
____________ to decide whether the current request can be satisfied or must wait
to avoid a future possible deadlock. (choose three)
A. resources currently available
B. processes that have previously been in the system
C. resources currently allocated to each process
D. future requests and releases of each process
Answer a, c and d
Blooms
Course
S. No. Question Taxonomy
Outcome
Level
UNIT – I
1. Justify language approach {Level V} Analyze f
2. Elaborate an operating system ?Explain Unix system structure {Level VI} Evaluate a
Modify various components of operating–system structure explains the simple
3. Create c
and layered approach of operating system in details. {Level VI}
a) In a multi programming and time –sharing environment, several users
share the systems imultaneously, This situation can result in various
security problem:
4. Analyze b
i) What are two such problem?
ii) Can be ensure the same degree of security in a time-shared machine as in a
dedicated machine? Explain your answer {Level V}
5. Purpose is dual Mode of Operation{Level V} Analyze f
UNIT – II
Construct an example to compare the Shortest Job First strategy of processor
1 scheduling with a Longest Job First strategy, in terms of processor utilization, Create d
turnaround time and throughput {Level VI}
Elaborate classic problems of synchronization.
2. Remember e
a) Compute the need for mutual exclusion?{Level VI}
(b) Justify a critical resource?{Level V} Create/
3 a
(c) Estimate a critical section?{Level VI} Evaluate
(d) Evaluate the starvation?{Level V}
In this problem you are to compare reading a file using a single-threading file
server and a multithreaded server. It takes 15 msec to get a request for work,
dispatch it, and do the rest of the necessary processing, assuming that the data
4 needed are in the block cache. If a disk operation is needed, as is the case Create c
one-thread of the time, an additional 75 msec is required, during which time
the thread sleeps. How many requests/sec can the server handle if it single
threaded? If it is multithreaded?{Level VI}
a) State and explain the various fields of a process control block.
b) Consider the following four processes, with the length of the CPU burst
given inmilli seconds.
Process Arrival time Burst time
P1 0 8
5. P2 1 4 Create f
P3 2 9
P4 3 5
Calculate the average waiting time for
i) Preemptive SJF schedule
ii) Non preemptive SJF schedule. {Level VI}
UNIT-III
1. Elaborate paging ?Compute Demand paging {Level VI} Create b
Estimate the page replacement Algorithms?
2. Evaluate c
Determine types of page replacement Algorithms{Level V}
3. Justify Segmentation and Thrashing {Level V} Evaluate c
Consider the following page-reference string 2 3 2 15 2 4 5 3 2 5 2 How
4. Create a
many pages faults occur for the following replacement algorithms, assuming
Process X Process Y
/*other code /*other code
for process X*/ for Process Y*/
while(true) while(true)
{ {
Var P=true; varQ = true;
While(var while(var
Q==true) P==true)
{ {
/*critical /*critical
section*/ section*/
varP=false; varQ=false;
} }
} }
/*other code /*other code
for Process X*/ for process Y*/
Here var P and var Q are shared variables and both are initialized to false.
Which one of the following statements is true.
Estimate the operating system contains 3 resources, the number of instance of
each resource type 7,7,10. The current allocation state is as shown below
Current allocation Maximum need
process
R1 R2 R3 R1 R2 R3
4. P1 2 2 3 3 6 8 Create c
P2 2 0 3 4 3 3
P3 1 2 4 3 4 4
1.Is the current allocation in a safe state
2. Can the request made by process p1(1 1 0) be granted? {Level VI}
5. Differentiate between capability lists and access lists? Analyze f
A Burroughs B7000/B6000 MCP file can be tagged as sensitive data. When
6. such a file is deleted, its storage area is overwritten by some random bits. Create C
Explain the purpose would such a scheme be useful
Blooms Program
S. No. Question Taxonomy Outcome
Level
UNIT – I
How does the distinction between kernel mode and user mode function as a
1
rudimentary form of protection (security) system? Justify. Apply c
UNIT – II
Suppose we have a single processor system, and jobs arrive at a rate of 10
jobs a Seconds, suppose each job takes an average of 50 milli-seconds to
1
complete. Assure that both distributions are exponential. What is the expected
Apply f
number of jobs in the system and the average time in the system?
1 867 211
2 111 99
3 498 302
2 a)0,99 b) 2,78 c) 1,265 c) 3,222 d)0,111 Apply d
Memory partition with used and unused block are given in the following fig.
Additional request 200k, 100k, and 50k (in the order) are received. At what
3. starting address will each of the additional requests be allocated for following Create c
allocation?
1. First fit 2. Best fit{Level VI}
Consider a paging hardware with a TLB. Assume that the entire page table and
all the pages are in the physical memory. It takes 10milliseconds to search the
4. TLB and 80 milliseconds to access the physical memory. If the TLB hit ratio is Apply f
0.6. Calculate the effective memory access time (in milliseconds) is
_________.(GATE : 2014, Paper III)
UNIT-IV
Suppose that we agree that 1 kilobyte is 1,024 bytes, 1 megabyte is1,0242
bytes, and 1 gigabyte is 1,0243 bytes. This progression continues hrough
terabytes, pet bytes, and Exabyte’s (1, 0246). Several proposed scientific
projects plan to record and store a few Exabyte’s of data duringthe next decade.
Calculate
1. a) How many disk drives would be required to hold 4exabytes of data? Apply d
b) How many magnetic tapes would be required to hold 4exabytes of data?
c) How many optical tapes would be required to hold 4exabytes of data
d) How many holographic storage cartridges would be required to hold 4
exabytes of data ?
e) How many cubic feet of storage space would each option require?
Consider a file currently consisting of 100 blocks. Assume that the file control
block (and the index block, in the case of indexed allocation)is already in
memory. Calculate how many disk I/O operations are required for contiguous,
linked, and indexed (single-level) allocation strategies, if, for one block, the
following conditions hold. In the contiguous-allocation case, assume that there
is no room to grow at the beginning but there is room to grow at the end. Also
2. assume that the block information to be added is stored in memory. Apply c
a) The block is added at the beginning.
b) The block is added in the middle.
c) The block is added at the end.
d) The block is removed from the beginning.
e) The block is removed from the middle.
f) The block is removed from the end.
Consider a hard disk with 16 recording surfaces (0 −15 ) having
16384cylinders (0 - 16383 ) and each cylinder contains 64 sectors (0 − 63 )
.Data storage capacity in each sector is 512 bytes. Data are organized cylinder–
3. wise and the addressing format is . A file of size 42797 KB is stored in the disk Apply b
and the starting disk location of the file is .Calculate is the cylinder number of
the last sector of the file, if it is stored in a contiguous manner?
(A) 1281 (B) 1282 (C) 1283 (D) 1284
4. Interpret briefly on mass storage structure? Evaluate b
A FAT (file allocation table) based file system is being used and the total
overhead of each entry in the FAT is 4 bytes in size. Given a 100 x 106bytes
5. disk on which the file system is stored and data block size is 103bytes, Apply d
Calculate the maximum size of a file that can be stored on this disk in units of
106 bytes .GATECSE: 2015
UNIT-V
Can a system detect that some of its processes are starving? Justify If you
1. answer “yes,” explain how it can. If you answer “no,” explain how the system Evaluate f
can deal with the starvation problem.
2. A possible method for preventing deadlocks is to have a single, higher order Evaluate c
resource that must be requested before any other resource. For example, if
multiple threads attempt to access the synchronization objects A· · · E,
deadlock is possible. (Such synchronization objects may include mutexes,
semaphores, condition variables, and the like.)We can prevent the deadlock by
adding a sixth object F. Whenever a thread wants to acquire the
synchronization lock for any object A· · · E, it must first acquire the lock for
object F. This solution is known as containment: the locks for objects A· · ·
Eare contained within the lock for object F. Compare this scheme with the
circular-wait scheme
Two processes X and Y need to access a critical section. Consider thefollowing
synchronization construct used by both the processes
Process X Process Y
/*other code /*other code
for process X*/ for Process Y*/
while(true) while(true)
{ {
Var P=true; varQ = true;
While(var while(var
Q==true) P==true)
3. Analyze b
{ {
/*critical /*critical
section*/ section*/
varP=false; varQ=false;
} }
} }
/*other code /*other code
for Process X*/ for process Y*/
Here var P and var Q are shared variables and both are initialized to false.
Which one of the following statements is true.
Estimate the operating system contains 3 resources, the number of instance of
each resource type 7,7,10. The current allocation state is as shown below
Current allocation Maximum need
process
R1 R2 R3 R1 R2 R3
4. P1 2 2 3 3 6 8 Create c
P2 2 0 3 4 3 3
P3 1 2 4 3 4 4
1.Is the current allocation in a safe state
2. Can the request made by process p1(1 1 0) be granted? {Level VI}
5. Differentiate between capability lists and access lists? Analyze f
A Burroughs B7000/B6000 MCP file can be tagged as sensitive data. When
6. such a file is deleted, its storage area is overwritten by some random bits. Create c
Explain the purpose would such a scheme be useful
Blooms
Course
S. No. Question Taxonomy
Outcome
Level
UNIT – I
1. Justify language approach {Level V} Analyze b
2. Elaborate an operating system ?Explain Unix system structure {Level VI} Evaluate a
Modify various components of operating–system structure explains the simple
3. Create f
and layered approach of operating system in details. {Level VI}
a) In a multi programming and time –sharing environment, several users
4. share the systems imultaneously, This situation can result in various security Analyze c
problem:
Consider a disk system with 100 cylinders. The requests to access the
cylinders occur in followingsequence:4, 34, 10, 7, 19, 73, 2, 15, 6,
2 20Assuming that the head is currently at cylinder 50, what is the time taken to Create c
satisfy all requests if it takes1ms to move from one cylinder to adjacent one
and shortest seek time first policy is used?{Level VI}
Consider a system that supports 5,000 users. Suppose that you want to
allow 4,990 of these users to be able to access one file. a). How would you
3 specify this protection scheme in UNIX? Create b
b) Can you suggest another protection scheme that can be used more
effectively for this purpose than the scheme provided by UNIX?{Level VI}
Justify various techniques implemented for free space management, discuss
4 Evaluate b
With suitable examples. {Level V}
(a) Elaborate different criteria for choosing a file organization. {Level VI}
5 (b) Formulate the indexed file, indexed sequential file organization.{Level Evaluate d
VI}
6 Elaborate allocation methods of secondary storage methods {Level VI} Create d
UNIT – V
a) justify is deadlock? State the necessary condition for deadlock? {level V} Evaluate&
1. f
b) compile any one Strategy of prevention {level VI} Create
Interpret how we elimination deadlock by resource preemption can-selection
2. Create c
a victim –Rollback-starvation {Level VI}
Determine how can we eliminating deadlock by aborting a process-Abort all
3. deadlock processes-Abort 1 process at a time until the deadlock cycle is Create b
eliminated {Level VI}
4. justify about system protection?{Level V} Evaluate c
Suppose that a system is in an unsafe state. Show that it is possible for the
processes to complete their execution without entering a deadlock state.
Answer: An unsafe state may not necessarily lead to dead lock, it just a
5. Evaluate f
system is in an unsafe state. Show that it is possible for the processes to
complete their execution without entering a deadlock state. Answer: An
unsafestate may not necessarily lead to deadlock, it just{Level VI}
Blooms Course
S. No. Question Taxonomy Outcome
Level
UNIT – I
How does the distinction between kernel mode and user mode
1 function as a rudimentary form of protection (security) system?
Apply a
Justify.
Explain using a simple system call as an example (e.g. getpid, or
uptime), what is generally involved in providing the result, from the
2
point of calling the function in the C library to the point where that Understand b
function returns?
In a multiprogramming and time-sharing environment, several users
share the system simultaneously. This situation can result in various
security problems?
3
c) Explain two such problems?
Apply a
d) Can we ensure the same degree of security in a time-shared machine as
we have in a dedicated machine? Explain your answer.
Explain why must the operating system be more careful when accessing
4 input to a system call (or producing the result) when the data is in memory
Understand a
instead of registers?
Discuss how a multi-threaded application can be supported by a user-
5 level threads package. It may be helpful to consider (and draw) the
Understand c
components of such a package, and the function they perform?
UNIT – II
14.1 COURSEOVERVIEW:
The course introduces main concepts of networking; application areas;
classification; reference models; transmission environment; technologies; routing
algorithms; IP, UDP and TCP protocols; reliable data transferring methods; application
protocols; network security; management systems; perspectives of communication networks.
The course structure consists of lectures in classroom and individual work.
14.2 PREREQUISITES:
University End
Session Marks Total Marks
Exam Marks
There shall be 2 midterm examinations. Each midterm examination
consists of subjective type and objective type tests. The subjective test is for
10 marks, with duration of 1 hour. Subjective test of each semester shall
contain 4 questions; the student has to answer 2 questions, each
carrying5marks.
The objective type test is for 10 marks with duration of 20minutes. It
consists of10 multiple choice and 10 objective type questions, the student
75 100
have to answer all the questions and each carry half mark.
First midterm examination shall be conducted for the first two and half units
of syllabus and second midterm examination shall be conducted for the
remaining portion.
Five marks are earmarked for assignments. There shall be two assignments
in every theory course. Marks shall be awarded considering the average of
two assignments in each course.
COURSEOBJECTIVES:
I. To introduce the fundamentals of various types of computer networks
II. To demonstrate the TCP/IP and OSI models with merits and demerits
III. To explore the various layers of OSI model
IV. To introduce UDP and TCP models
BLOOMS
S NO COURSE OUTCOMES
LEVELS
Understanding /
a Understand and explain computer networks and its components.
Comprehension
Remembering /
b Identify the different types of network topologies and protocols.
Knowledge
Enumerate the layers of the OSI model and TCP/IP. Explain the function(s) of Creating /
c
each layer. Synthesis
Creating /
d Understand and building the skills of sub netting and routing mechanisms.
Synthesis
Familiarity with the basic protocols of computer networks, and how they can Understanding /
e
be used to assist in network design and implementation. Comprehension
Understanding /
f Familiarity with UDP and TCP models
Comprehension
Assignments,
An ability to apply the knowledge of mathematics, Computing, Science
A H Tutorials,
and engineering to solve Computer Science and Engineering problems.
Exams
An ability to design and conduct engineering experiments, as well as to
B S Assignments, tutorials
analyze and interpret data.
An ability to design and construct a hardware and software system,
C H Assignments, Tests
component, or process to meet desired needs, within realistic constraints.
Graduates will demonstrate an ability to visualize and work on
D laboratory and Multi-disciplinary tasks individually or as a member N ------
within the teams.
An ability to demonstrate skills to use the techniques, modern
E engineering Tools, Software and equipments necessary to analyze H Assignments, Tests
computer engineering Problems.
F An understanding of professional, social and ethical responsibility S Lectures
An ability to recognize the global issues like green initiatives and
G S ----
alternate energy recognize the rural requirements.
The broad education necessary to understand the impact of engineering
H N Lectures
solutions in a global, economic, environmental, and societal context.
Graduate will develop confidence for self-education and acquire new
Assignments, Tutorials,
I knowledge in the computing discipline and ability and practice for H
Exams
Multi-disciplinary tasks as a member within the teams
J To communicate effectively N ------
An ability to use the techniques, skills and modern engineering tools
K H Assignment s, Tutorials
practice necessary for Engineering practice.
14.7 SYLLABUS:
UNIT 1
Over view if Internet: Protocol, Layering scenario, TCP/IP Protocol Suite: The OSI Model,
Internet history standards and administration, Compare OSI and TCP/IP reference model.
Physical Layer: Guided transmission media, wireless transmission media. DLL: design
issues, CRC Codes, Elementary DLL protocols, Sliding window protocol
UNIT 2
Multiple Access Protocols -ALOHA, SLOTTED ALOHA, CSMA ,Collision free protocols.
Ethernet-physical layer, Ethernet- MAC sub layer, DLL switching and use of bridges,
Learning bridges, spanning tree bridges ,Repeaters ,hubs, bridges, switches, Routers and
gateways
UNIT 3
Network layer design issues, Store and forward packet switching, Connectionless and
connection oriented networks, routing, count to infinity problem, Hierarchical routing.
Congestion control algorithms, Admission control
UNIT 4
Internetworking: tunneling, Internetwork routing, Packet fragmentation, IPV4 Protocol, IPV6
Protocol, IP addresses CIDR, IMCP, ARP, RARP, DHCP.
Transport layer: services provided, Addressing connection establishment, release Crash
recovery
UNIT 5
Internet transport protocols UDP-RPC, Real time transport protocol, Introduction to
TCP,TCP service model TCP Segment header, TCP Connection establishment, release, TCP
connection management modeling. TCP Sliding window protocol, TCP Congestion control,
Future of TCP.
Application layer- introduction, providing services, Application layer Paradigms, Client
server model, HTTP, FTP, Electronic mail, TELNET, DNS, SSH.
TEXT BOOKS:
1. Computer networks-Andrew S Tanenbaum, 4th edition, Pearson education
2. Data communication and networking-Behrouz. A. Forouzan , fifth edition, TMH, 2013
REFERENCE BOOKS:
1. An engineering approach to computer networks-S.KESHAV, 2nd Edition, Pearson
education.
2. Understanding communications and networks, 3rd edition, W.A.Shay, Cengage
learning
3. Introduction to computer networks and cyber security, Chwan-Hwa (John) Wu,j. David
Irwin, CRC Press
4. Computer networks, L.L Peterson and B.S Davie, 4th edition,, ELSEVIER
5. Computer networking: A top down approach featuring the internet, james F.Kurouse,
K.W ROSS , 3rdedition,pearson education
protocol
Discuss in detail about
Understanding / IPV6 Protocol
L31 frame structure of IPv6 T2 pg:596
Comprehension http://nptel.ac.in/courses/106105081/29
protocol
Understand how the
participation of a Understanding / IP addresses
L32 T2 pg:596
computer in a computer Comprehension http://nptel.ac.in/courses/106105081/32
network
Understand the method
for allocating IP
Understanding /
L33 addresses and routing CIDR T2 pg:667
Comprehension
Internet Protocol
packets.
Discuss in detail about
Understanding / ICMP
L34 message control T2pg:621
Comprehension http://nptel.ac.in/courses/106105081/28
protocol
Understand how to
Understanding / T2
L35 convert physical to IP ARP,RARP
Comprehension pg:612,618
address and vice versa
Discuss how to
distribute network Understanding /
L36 DHCP T2 pg:551
configuration Comprehension
parameters dynamically
Discuss the transport Creating /
L37 Transport layer: services provided to the upper layer T2 pg:693
layer design issues Synthesis
Discuss the elements of Creating /
L38 Addressing connection establishment, release . T2 pg:723
transport protocol Synthesis
Discuss the elements of Creating /
L39 Crash recovery T2 pg:729
transport protocol Synthesis
Discuss the connection Understanding / Internet transport protocols UDP
L40 T2 pg:709
less protocol service Comprehension http://nptel.ac.in/video.php?subjectId=106105081/30
Understand inter Understanding /
L41 Remote procedure call T2 pg:689
process communication Comprehension
Discuss how to
Creating /
L42 delivering audio and Real time transport protocol T2 pg:999
Synthesis
video over IP networks.
Discuss in detail about
Creating / Introduction to TCP
L43 connection oriented T2 pg:715
Synthesis http://nptel.ac.in/video.php?subjectId=106105081/31
protocol
Discuss how to achieve
Creating /
L44 Reliable, in-order, byte- TCP service model T2 pg:715
Synthesis
stream delivery
Discuss about header Creating /
L45 TCP Segment header T2 pg:721
format of TCP Synthesis
Understanding of the
Understanding / TCP Connection establishment, release
L46 connect, accept, and T2 pg:723
Comprehension
close functions
Discuss about packet
format, data transfer, Creating / TCP connection management modeling
L47 T2 pg:724
and connection Synthesis
management
Describe the features of
Understanding / TCP Sliding window protocol
L48 packet based data T1 pg:711
Comprehension http://nptel.ac.in/courses/106105081/35
transmission protocols
Describe how to avoid
Understanding / TCP Congestion control
L49 the congestions in the T2 pg:765
Comprehension http://nptel.ac.in/courses/106105081/35
internet
Describe how to Understanding /
L50 Future of TCP T2 pg:719
provide the methods to Comprehension
resend
missing/ corrupted
packets.
Discuss design issues of Creating /
L51 Application layer- introduction, services T2 pg:816
application layer Synthesis
Discuss the
Creating /
L52 relationships to the Application layer paradigms T2 pg: 820
Synthesis
other layers.
Illustrate the system
Creating /
L53 made up of both client Client server model T2 pg:823
Synthesis
and server software.
Discuss how to retrieve
interlinked resources
Creating / HTTP
L54 led to the establishment T2 pg:876
Synthesis http://nptel.ac.in/courses/106105081/40
of the World Wide
Web.
Discuss how to transfer
Creating / FTP
L55 files between computers T2 pg:887
Synthesis http://nptel.ac.in/courses/106105081/39
on a network.
Describe
communication within Understanding /
L56 Electronic mail T2 pg:891
a patient-physician Comprehension
relationship
Describe how to access
Understanding /
L57 remote computers over TELNET T2 pg:904
Comprehension
TCP/IP networks.
Describe to resolve
Understanding / DNS
L58 human readable T2 pg:910
Comprehension http://nptel.ac.in/courses/106105081/34
hostnames
Discuss administrating Creating /
L59 SSH T2 pg:907
the remote computers Synthesis
Program Outcomes
Course
Objectives A b c d e f g h i j k l m n
I H H H S H S H
II H S S S H S S H S H
III H H H H H S H H S
IV H H S S H S S H
S
S= Supportive H = Highly Related
14.10 MAPPINGCOURSEOUTCOMESLEADINGTOTHEACHIEVEMENTOF
PROGRAM OUTCOMES:
b H S S S H S S H S H
c H H H H H S H H S
d H H S S H S S H
S
e H S H H S H H S
f S S H
S= Supportive H = Highly Related
14.11 OBJECTIVEQUESTIONS
UNIT I
1. The computer network is
A. Network computer with cable
B. Network computer without cable
C. Both of the above
D. None of the above
Answer B
2. FDDI used which type of physical topology?
A. Bus
B. Ring
C. Star
D. Tree
Answer: C
3. FTP stands for
A. File transfer protocol
B. File transmission protocol
C. Form transfer protocol
D. Form transmission protocol
Answer: C
4. Ethernet system uses which of the following technology.
A. Bus
B. Ring
C. Star
D. Tree
Answer: B
5. Which of the following are the network services?
A. File service
B. Print service
C. Database service
D. All of the above
Answer: D
6. If all devices are connected to a central hub, then topology is called
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Tree Topology
Answer: B
MLR Institute of Technology, Dundigal, Hyd-500043 Page 173
Department of CSE
B. Link layer
C. Router layer
D. Broadcast layer
Answer: A
16. What is the name of the network topology in which there are bi-directional links
between each possible node?
A. Ring
B. Star
C. Tree
D. Mesh
Answer: A
17. What is the commonly used unit for measuring the speed of data transmission?
A. Bytes per second
B. Baud
C. Bits per second
D. Both B and C
Answer: D
18. Which of the communication modes support two way traffic but in only once
direction of a time?
A. Simplex
B. Half-duplex
C. Three - quarter's duplex
D. Full duplex
Answer: A
19. The loss in signal power as light travels down the fiber is called.............
A. Attenuation
B. Propagation
C. Scattering
D. Interruption
Answer: D
20. Which of the following TCP/IP protocols is used for transferring files form one
machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
Answer: A
UNIT II
1. A network that needs human beings to manually route signals is called....
A. Fiber Optic Network
B. Bus Network
C. T-switched network
D. Ring network
Answer: B
2. TCP/IP .................layer corresponds to the OSI models to three layers.
A. Application
B. Presentation
C. Session
D. Transport
Answer: A
3. Which of the transport layer protocols is connectionless?
A. UDP
B. TCP
C. FTP
D. Net
Answer: D
4. Which of the following applications allows a user to access and change remote files
without actual transfer?
A. DNS
B. FTP
C. NFS
D. Telnet
Answer: A
5. The data unit in the TCP/IP layer called a....
A. Message
B. Segment
C. Datagram
D. Frame
Answer: C
6. DNS can obtain the .................of host if its domain name is known and vice versa
A. Station address
B. IP address
C. Port address
D. ChecksuM
Answer: B
7. Which of the following OSI layers correspond to TCP/IP's application layer
A. Application
B. Presentation
C. Session
D. All of the above
Answer: D
8. Devices on one network can communicate with devices on another network via
a.......
A. File Server
B. Utility Server
C. Printer Server
D. Gateway
Answer: A
9. A communication device that combines transmissions from several I/O devices into
one line is a
A. Concentrator
B. Modifier
C. Multiplexer
D. Full duplex file
Answer: C
10. Which layers of the OSI determines the interface often system with the user?
A. Network
B. Application
C. Data link
D. Session
Answer: B
11. Which of the following of the TCP/IP protocols is the used for transferring files
from one machine to another?
A. FTP
B. SMTP
C. SNMP
D. Rpe
Answer: A
12. In which OSI layers does the FDDI protocol operate?
A. Physical
B. Data link
C. Network
D. A and B
Answer: D
13. In FDDI, data normally travel on..................
A. The primary ring
B. The Secondary ring
C. Both rings
D. Neither ring
Answer: A
14. The ............layer of OSI model can use the trailer of the frame for error detection
A. Physical
B. Data link
C. Transport
D. Presentation
Answer: B
15. In a ................topology, if there are n devices in a network, each device has n-1
ports for cables.
A. Mesh
B. Star
C. Bus
D. Ring
Answer: A
16. Another name for Usenet is
A. Gopher
B. Newsgroups
C. Browser
D. CERN
Answer: A
17. The standard suit of protocols used by the Internet, Intranets, extranets and some
other networks
A. TCP/IP
B. Protocol
C. Open system
D. Internet work processor
Answer: A
18. State whether the following is true or false
i. In bus topology, heavy Network traffic slows down the bus speed
ii. It is multipoint configuration
A. True, True
B. A) True, True
C. False, True
D. False, False
Answer: A
19. Which of the following is the logical topology?
A. Bus
B. Tree
C. Star
D. Both A and B
Answer: D
20. Which of the following is/ are the drawbacks of Ring Topology?
A. Failure of one computer, can affect the whole network
B. Adding or removing the computers disturbs the network activity.
C. If the central hub fails, the whole network fails to operate.
D. Both of A and B
Answer: D
UNIT III
1. Which of the following is not the layer of TCP/IP protocol?
A. Application Layer
B. Session Layer
C. Transport Layer
D. Internetwork layer
Answer: D
2. ................... address use 7 bits for the <network> and 24 bits for the <host>
portion of the IP address.
A. Class A
B. Class B
C. Class C
D. Class D
Answer: C
3. . ............. Addresses are reserved for multicasting.
A. Class B
B. Class C
C. Class D
D. Class E
Answer: A
4. State the following statement is true or false.
i) In class B addresses a total of more than 1 billion addresses can be formed.
ii) Class E addresses are reserved for future or experimental use.
A. True, False
B. True, True
C. False, True
D. False, False
Answer: B
5. Which of the following statement is true?
i) An address with all bits 1 is interpreted as all networks or all hosts.
ii) The class A network 128.0.0.0 is defined as the loopback network.
A. i only
B. ii only
C. Both A and B
D. None of the above
Answer: B
6. Which is not the Regional Internet Registers (RIR) of the following?
A. American Registry for Internet Numbers (ARIN)
B. Europeans Registry for Internet Numbers (ERIN)
C. Reseaux IP Europeans (RIPE)
D. Asia Pacific Network Information Centre (APNIC)
Answer: B
7. Match the following IEEE No to their corresponding Name for IEEE 802
standards for LANs.
i) 802.3 a) WiFi
ii) 802.11 b) WiMa
iii) 802.15.1 c) Ethernet
iv) 802.16 d) Bluetooth
A. i-b, ii-c, iii-d, iv-a
B. i-c, ii-d, iii-a, iv-b
C. i-c, ii-a, iii-d, iv-b
D. i-b, ii-d, iii-c, iv-a
Answer: A
8. . ........... was the first step in the evolution of Ethernet from a coaxial cable bus to
hub managed, twisted pair network.
A. Star LAN
B. Ring LAN
C. Mesh LAN
D. All of the above
Answer: D
9. . ............... Is the predominant form of Fast Ethernet, and runs over two pairs of
category 5 or above cable.
A. 100 BASE-T
B. 100 BASE-TX
C. 100 BASE-T4
D. 100 BASE-T2
Answer: B
10. IEEE 802.3ab defines Gigabit Ethernet transmission over unshielded twisted pair
(UTP) category 5, 5e or 6 cabling known as....................
A. 1000 BASE-T
B. 1000 BASE-SX
C. 1000 BASE-LX
D. 1000 BASE-CX
Answer: D
11. Which one of the following is not a function of network layer?
A. routing
B. inter-networking
C. congestion control
D. none of the mentioned
Answer: D
12. The 4 byte IP address consists of
A. network address
B. host address
C. both (a) and (b)
D. none of the mentioned
Answer: D
13. Which one of the following routing algorithm can be used for network layer
design?
A. shortest path algorithm
B. Multi destination routing
C. distance vector routing
D. all of the mentioned
Answer: A
14. A routing
A. contains the list of all destinations
B. data is not sent by packets
C. none of the mentioned
D. None
Answer: A
15. Which one of the following algorithm is not used for congestion control?
A. traffic aware routing
B. admission control
C. load shedding
D. none of the mentioned
Answer: B
16. ICMP is primarily used for
A. error and diagnostic functions
B. addressing
C. forwarding
D. none of the mentioned
Answer: B
17. What is stat frame deli meter (SFD) in ether net frame?
A. 10101010
B. 10101011
C. 00000000
D. 11111111
Answer: B
18. MAC address is of
A. 24 bits
B. 36 bits
C. 42 bits
D. 48 bits
Answer: A
19. What is auto negotiation?
A. a procedure by which two connected devices choose common transmission
parameters
B. a security algorithm
C. a routing algorithm
D. none of the mentioned
Answer: A
20. Ethernet in metropolitan area network (MAN) can be used as
A. puree ther net
UNIT IV
1. In asymmetric key cryptography, the private key is kept by
A. sender
B. receiver
C. all the connected devices
D. None
Answer: C
2. Which one of the following algorithm is not used in asymmetric-key
cryptography?
A. RSA algorithm
B. Diffie - hellman algorithm
C. electronic code book algorithm
D. none of the mentioned
Answer: C
3. Which of the following field in IPv4 datagram is not related to fragmentation?
A. Flags
B. Offset
C. TOS
D. Identifier
Answer: D
4. The TTL field has value 10. How many routers (max) can process this datagram?
A. 11
B. 5
C. 10
D. 1
Answer: A
5. If the value in protocol field is 17, the transport layer protocol used is ____.
A. TCP
B. UDP
C. Either of the mentioned
D. None of the mentioned
Answer: A
6. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission
delay is (in milliseconds)
A. 3.2
B. 32
C. 19.
D. None of the mentioned
Answer: A
7. What should be the flag value to indicate the last fragment?
A. 0
B. 1
C. TTl value
D. None of the mentioned
Answer: C
A. UDP broadcast
B. UDP unicast
C. TCP broadcast
D. TCP unicast
Answer: C
17. After obtaining the IP address, to prevent the IP conflict the client may use
A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer: B
18. What is DHCP snooping?
A. techniques applied to ensure the security of an existing DHCP infrastructure
B. encryption of the DHCP server requests
C. algorithm for DHCP
D. none of the mentioned
Answer: C
19. If DHCP snooping is configured on a LAN switch, then clients having specific
______ can access the network.
A. MAC address
B. IP address
C. both (a) and (b)
D. none of the mentioned
Answer: C
20. Which one of the following is a cryptographic protocol used to secure HTTP
connection?
A. stream control transmission protocol (SCTP)
B. transport layer security (TSL)
C. explicit congestion notification (ECN)
D. resource reservation protocol
Answer: B
UNIT V
1. SSH can be used in only
A. unix -like operating systems
B. windows
C. both (a) and (b)
D. none of the mentioned
Answer: A
2. FTP is built on _____ architecture
A. P2P
B. Both of the mentioned
C. None of the mentioned View
D. Client-server
Answer: A
3. FTP uses _____ parallel TCP connections to transfer a file
A. 1
B. 2
C. 3
D. 4
Answer: C
4. Identify the incorrect statement
A. FTP stands for File Transfer Protocol
B. FTP uses two parallel TCP connections
C. FTP sends its control information in-band
D. FTP sends exactly one file over the data connection
Answer: C
5. If 5 files are transfered from server A to client B in the same session. The number
of TCP connection between A and B is
A. 5
B. 6
C. 7
D. 8
Answer: D
6. FTP server
A. Mantains state
B. Is stateless
C. Has single TCP connection for a file transfer
D. None of the mentioned
Answer: C
7. The commands, from client to server, and replies, from server to client, are sent
across the control connection in ____ bit ASCII format
A. 8
B. 7
C. 3
D. 5
Answer: A
8. Find the FTP reply whose message is wrongly matched
A. 331 – Username OK, password required
B. 425 – Can’t open data connection
C. 452 – Error writing file
D. 452 – Can’t open data connection
Answer: A
9. Mode of data transfer in FTP, where all the is left to TCP
A. Stream mode
B. Block mode
C. Compressed mode
D. None of the mentioned
Answer: B
10. The password is sent to the server using _____ command
A. PASSWD
B. PASS
C. PASSWORD
D. None of the mentioned
Answer: C
11. Which standard TCP port is assigned for contacting SSH servers?
A. port 21
B. port 22
C. port 23
D. port 24
Answer: D
12. Which one of the following authentication method is used by SSH?
A. public-key
B. host based
C. password
D. of the mentioned
Answer: C
13. Which of the following is a form of DoSattack?
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. All of the mentioned
Answer: B
14. Packet sniffers involve
A. Active receiver
B. Passive receiver
C. Both of the mentioned
D. None of the mentioned
Answer: B
15. Electronic mail uses this Application layer protocol
A. SMTP
B. HTTP
C. FTP
D. SIP
Answer: C
16. This is a time-sensitive service
A. File transfer
B. File download
C. E-mail
D. Internet telephony
Answer: B
17. The packet of information at the application layer is called
A. Packet
B. Message
C. Segment
D. Frame
Answer: B
18. This is one of the architecture paradigms
A. Peer to peer
B. Client-server
C. HTTP
D. Both a and b
Answer: C
19. Application layer offers _______ service
A. End to end
B. Process to process
C. Both of the mentioned
D. None of the mentioned
Answer: B
20. Which field helps to check rearrangement of the fragments?
A. offset
B. flag
C. TTL
D. Identifier
Answer: A
Blooms
S. Course
Question Taxonomy
No Outcome
Level
UNIT-I
1 Define computer networks. Knowledge a
2 Difference between point to point and broadcasting transmission Analysis b
3 Define multicasting and broadcasting. Knowledge b
4 Differentiate guided and unguided transmission media Analysis d
Write the three criteria necessary for an effective and efficient
5 Synthesis c
network?
6 What is the advantage of distributed processing? Comprehension c
7 Give the factors that affect the performance of a network Comprehension b
8 Define CRC (Cyclic Redundancy Check) Knowledge b
9 Define Hamming distance Knowledge e
10 Define PROTOCOL Knowledge e
11 Define De facto and De jure standards Knowledge d
12 Differentiate DLL and transport layer functions Analysis b
13 Describe sliding window protocol. Knowledge a
14 Discuss the use of standards? Knowledge a
UNIT II
1 Distinguish Internet architecture and OSI architecture Comprehension a
2 Define in detail the error detection and error corrections Knowledge e
3 Define error control Knowledge e
4 Distinguish FDDI and basic token ring Comprehension a
5 List the merits of bridges Differentiate Knowledge e
6 Define role of VCI Knowledge e
7 List the the links operated on the physical media in detail Knowledge e
8 Define CSMA Knowledge d
9 Define some of the physical properties of Ethernet Knowledge e
UNIT III
1 Define Masking Knowledge d
2 Define the class field in IP address Knowledge c
3 Define different kinds of Multicast Routing Knowledge e
4 Distinguish between hostid and netid Comprehension e
5 List the merits of sub netting Knowledge c
6 Differentiate between physical and logical address Analysis e
UNIT IV
1 Define tunneling Knowledge a
2 Distinguish between IPV4 and IPV6 Comprehension c
3 List the merits of ICMP Knowledge d
4 Differentiate between ARP and RARP Analysis b
5 List the merits of bridges Knowledge c
6 Describe Link state routing algorithm Knowledge d
7 Define quality of service Knowledge f
8 Define congestion control algorithms Knowledge e
collision. Synthesis,
What are bridges? Give the characteristics of them. Compare
8 Knowledge a
bridges with routers.
9 Define Spanning tree bridges and Source routing bridges. Knowledge b
10 List the the limitations of bridges. Knowledge a
UNIT-III
Briefly explain the services provided by physical layer to network
1 Comprehension, a
layer.
Explain IPv6. Explain its advantages over IPv4. Also explain its Comprehension,
2 c
frame format. Synthesis,
3 Discuss network layer design issues. Comprehension b
Compare FDMA, TDMA and CDMA in terms of their ability to
4 Knowledge d
handle groups of stations?
Discuss with connection oriented and connection-less network
5 Knowledge e
routing.
6 Discuss about hierarchichal routing. Comprehension a
7 Explain basic IEEE 802.3 Ethernet MAC Data Frame. Comprehension, c
Briefly describe the reasons why a single organization may end up
8 Comprehension d
with multiple LANs and choose bridges.
9 Discuss the standard Ethernet cabling and cable topologies. Comprehension e
10 Describe the addressing mechanism in 802.11( Wi-Fi). Comprehension f
UNIT-IV
1 Describe shortest path algorithm with a suitable illustration Knowledge, b
2 Describe the distance vector routing algorithm Knowledge, c
Describe the frame format, operation and ring maintenance feature
3 Comprehension, a
of
4 IEEE 802.5 MAC protocol. Evaluation d
5 How a Token Ring LAN does operate? Discuss Knowledge e
Given the address 23.56.7.91 and the default class A mask, find the
6 Synthesis,Evaluation a
beginning address (network address).
7 Describe the functions of MAC sub layer. Comprehension, b
8 List out the advantages and drawbacks of ring topology. Synthesis, a
9 List out the advantages and drawbacks of bus topology. Evaluation c
UNIT-V
1 Write about TCP segment Header. Application, a
2 Differentiate between ISO-OSI and TCP/IP reference model. Analysis c
Write two ways in which computer applications differ from
3 Application,Synthesis c
network applications ?
4 List the features of SSH. Knowledge a
5 Describe DNS Knowledge, b
6 Explain DHCP Comprehension, c
Discuss the following terms with respect to ATM: VPI, UNI,
7 Comprehension f
synchronous, AAL, Cell , PVC.
8 Explain TELNET Comprehension, a
9 Discuss functions of application layer Comprehension b
10 Discuss electronic mail. Comprehension a
S. Blooms Course
Question
No Taxonomy Level Outcome
UNIT I
Draw a CRC encoder and decoder for CRC code with C (7, 4).
1 Knowledge f
Also explain how this CRC design works, with an example
If the transmitted code word is 10011000 and the received code Comprehension b
2
word is 11001001. What is the error word ? Write transmitted Application,
Blooms
Course
S. No. Question Taxonomy
Outcome
Level
UNIT-I
Define the following standard organizations: ISO, ITU-T, IEEE,
1 Knowledge b
ANSI, EIA, TIA, IAB, ETF, and IRTF.
Give a technical comparison between OSI & TCP/IP reference Comprehens
2 a
model. ion
Application,
3 Write the classification of Networks according to their size. a
Synthesis
Write the various design issues related to the layers in ISO-OSI
5 Knowledge b
model.
6 Write about TCP/IP Protocol suite Knowledge e
UNIT – II
1 List features of pure ALOHA and slotted ALOHA? Comprehension b
Blooms
S. Course
Question Taxonomy
No Outcome
Level
UNIT-I
Define computer networks? Discuss various types of networks
1 Comprehension a
topologiesin computer network. Also discuss various advantages and
disadvantages
2 List the applications of Computer Networks? Knowledge a
Comprehension,
3 Explain the following:- a) LAN b) MAN c) WAN d) ARPANET Synthesis, b
Evaluation
Comprehension,
Explain TCP/IP Model? Explain the functions and protocols and
4 Synthesis, b
services of each layer? Compare it with OSI Model.
Evaluation
Comprehension,
Explain IP addressing. How it is classified? How is subnet addressing is
5 Synthesis, d
performed?
Evaluation
Comprehension,
6 Explain the following: i. TCP ii. UDP Synthesis, f
Evaluation
7 Discuss star topology is commonly preferred? Knowledge a
8 State In what situations contention based MAC protocols are suitable? Knowledge b
Explain; Is there any relationship between transmission media and Comprehension,
9 a
topology? Synthesis,
Comprehension,
Explain vulnerable period. How it affects the performance in MAC
10 Synthesis, b
protocols?
Evaluation
UNIT-II
Discuss how throughput is improved in slotted ALOHA over pure
1 Knowledge c
ALOHA?
Comprehension,
Explain how performance is improved in CSMA/CD protocol
2 Synthesis, c
compared to CSMA protocol?
Evaluation
Discuss the parameter ‘a’? How does it affect the performance of the
3 Comprehension d
CSMA protocol?
4 Define point to point protocol. Explain the frame format of PPP. Knowledge d
5 Explain in detail CSMA Protocol in detail. Comprehension, d
Comprehension,
Explain pure ALOHA and slotted ALOHA? Consider the delay of both
6 Synthesis, f
at low load. Which one is less? Explain your answer
Evaluation
Comprehension,
7 Explain in detail CSMA/CD Protocol in detail. How it detects collision. f
Synthesis,
What are bridges? Give the characteristics of them. Compare bridges
8 Knowledge b
with routers.
9 Define Spanning tree bridges and Source routing bridges. Knowledge c
10 List the the limitations of bridges. Knowledge b
UNIT-III
Briefly explain the services provided by physical layer to network
1 Comprehension, d
layer.
Explain IPv6. Explain its advantages over IPv4. Also explain its frame Comprehension,
2 c
format. Synthesis,
3 Discuss network layer design issues. Comprehension e
Compare FDMA, TDMA and CDMA in terms of their ability to handle
4 Knowledge b
groups of stations?
Discuss with connection oriented and connection-less network
5 Knowledge c
routing.
6 Discuss about hierarchichal routing. Comprehension c
7 Explain basic IEEE 802.3 Ethernet MAC Data Frame. Comprehension, b
Briefly describe the reasons why a single organization may end up with
8 Comprehension b
multiple LANs and choose bridges
9 Discuss the standard Ethernet cabling and cable topologies. Comprehension b
10 Describe the addressing mechanism in 802.11( Wi-Fi). Comprehension c
UNIT-IV
1 Describe shortest path algorithm with a suitable illustration Knowledge, d
Blooms
S. Course
Question Taxonomy
No Outcome
Level
UNIT-I
Draw a CRC encoder and decoder for CRC code with C (7, 4). Also
1 Knowledge b
explain how this CRC design works, with an example.
If the transmitted code word is 10011000 and the received code word
2 is11001001. What is the error word? Write transmitted code word, Comprehension c
received code word and error word as polynomials.
Compare synchronous time division multiplexing with statistical time Application,
3 d
division multiplexing. Synthesis
UNIT-II
1 Explain remote bridges with a neat diagram. Comprehension b
A large population of ALOHA users manages to generate 50 requests
/sec , including both originals and retransmissions. Time is slotted in
the units of40 msec.
2 Knowledge c
i. What is the chance of success on the first attempt?
ii. What is the probability of exactly k collisions and then a success?
iii. What is the expected number of transmission attempts needed??
UNIT-III
Analysis ,
1 Compare IPV4 and IPV6. e
Evaluation
2 State the problems due to congestion.. Knowledge d
3 Discuss Link state routing algorithm. Comprehension d
UNIT-IV
1 Discuss distance vector algorithm. Comprehension e
Illustrate simplex, half-duplex and full duplex modes. Explain with
2 relevant examples for each. What mode is used when two people are Analysis b
communicating by a telephone line?
Using Differential Manchester encoding scheme, draw the time vs.
3 Understand c
amplitude graphs for the bit stream 0101101001.
UNIT-V
Objectives:
• To use Linux pertaining system for study of operating system concepts.
• To write the code to implement and modify various concepts in operating systems using
Linux.
List of Programs:
1. Simulate the following CPU scheduling algorithms
a) Round Robin b) SJF c) FCFS d) Priority
2. Simulate all file allocation strategies
a) Sequential b) Indexed c) Linked
3. Simulate MVT and MFT
4. Simulate all File Organization Techniques
a) Single level directory b) Two level c) Hierarchical d) DAG
5. Simulate Bankers Algorithm for Dead Lock Avoidance
6. Simulate Bankers Algorithm for Dead Lock Prevention
7. Simulate all page replacement algorithms
a) FIF b) LRU c) LFU Etc.
8. Simulate Paging Technique of memory management.
Oucomes:
• The course objectives ensure the development of students applied skills in operating
systems related areas.
• Student’s willg in knowledge in writing of software routines modules or implementing
various concepts of perating systems.
DATE OF DATE OF
S. NO WEEK NO EXPERIMENT NAME
PLANNED CONDUCTED
Simulate the following CPU Scheduling
1 WEEK 1 Algorithms
a) FCFS b) SJF
Simulate the following CPU Scheduling
2 WEEK 2 Algorithms
c) Round Robin d) Priority
Simulate file Allocation strategies:
3 WEEK 3
a)Sequential b) Indexed c) Linked
Simulate Multiple Programming with fixed
4 WEEK 4
Number of Tasks (MFT)
Simulate multiple Programming with
5 WEEK 5
Variable Number of Tasks (MVT)
Simulate Banker’s Algorithm for Deadlock
6 WEEK 6
Avoidance
7 WEEK 7 Simulate Algorithm for Deadlock Prevention.
Simulate page replacement algorithms:
8 WEEK 8
a) FIFO b) LRU c)LFU
Simulate Paging Technique of memory
9 WEEK 9
management
Simulate all file Organization Techniques
10 WEEK 10
a) Single level b) Two Level
Simulate all file Organization Techniques
11 WEEK 11
c) Hierarchical d) DAG
Objectives:
• To provide an understanding of the language translation peculiarities by designing a
complete translator for a mini language.
Inta[3] declares an array of three elements, referenced as a[0], a[1] and a[2]. Note also that
you should
Worry about the scoping of names.
A simple program written in this language is:
{ int a[3], t1, t2’
T1=2’
A[0]=1; a[1]=2; a [t1]=3;
T2=-(a[2]+t1*6)/a[2]-t1);
If t2>5 then
Print(t2);
Else {
Int t3;
T3=99;
T2=25;
T3=99;
T2=25;
Print(-t1+t2*t3); /* this is a comment
On 2 lines */
} endif }
1. Design a Lexical analyzer for the above language. The lexical analyzer should ignore
redundant spaces, tabs and newlines. It should also ignore comments. Although the
syntax specification states that identifiers can be arbitrarily long. You may restrict the
length to some reasonable value.
2. Implement the lexical analyzer using JLex, flex or lex or other lexical analyzer
generating tools.
3. Design Predictive parser for the given language
4. Design LALR bottom up parser for the above language.
5. Convert the BNF rules into Yacc form and write code to generate abstract syntax tree.
6. Write program to generate machine code from the abstract syntax tree generated by the
parser. The following instruction set may be considered as target code.
DATE OF DATE OF
S NO WEEK NO EXPERIMENT NAME
PLANNED CONDUCTED
4 4 Design of LALR