Sei sulla pagina 1di 23

Dronacharya College Of Engg. Gr.

Noida
Department of Computer Science & Information Technology

Questions for Sessional- II (CD)

1. consider the following code fragment ,Generate the quadruple for it


switch (a + b)
{
case 1: x = x + 1;
case 2: y = y + 2;
case 3: z = z + 3;
default: c = c -1;
}
Write its three-address statement code and quadruple representation.

2. Translate the following program segment into three-address segment:


Switch( a + b )
{
case 2: { x = y; break; }
case 5: { switch( x )
{
case 0:{ a = b + 1; break:}
case 1:{a = b + 3; break;}
default :{a = 2;}
}
break;
case 9: {x = y – 1; break;}
default: {a = 2;}
}

3. What is a basic-block? How can a sequence of three-address statements be


transformed into a list of basic blocks. Show it with example.

4. Explain the following categories of intermediate codes:


i. Three-address codes
ii. Quadruples
iii. Triples

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

5. Consider the following sequence of three address code:


(1) PROD =0
(2) I = 1
(3) T = 4*I
(4) T2 = addr( A )-4
(5) T3 = T2 [T1]
(6) T4 = addr( B )-4
(7) T5 = T4[T1]
(8) T6 = T3 * T5
(9) PROD = PROD + t6
(10) I = I+1
(11) If I <= 20 goto 3
(i) Find the basic blocks and construct a flow graph.
(ii) Eliminate common sub-expression
(iii)Move the loop invariant computation out of the loop.
(iv)Find the induction variables and eliminate them where possible.

6. Explain the backpatching. Also generate three address code for the following
program segment.
While( a < c and b > d) do
if a = 1 then
c = c + 1;
else
while( a <= d) do
a = a + 3;
7. What are the different data structures for the symbol table implementation.

8. Explain various allocation storage strategies. Which storage allocation model is


to be used if a language permits recursion?

9. What do you mean by heap allocation ? Explain the following terms releted to
heap allocation:
i) Fragmentation
ii) Free List
iii) Bit Map
iv) Reference Count

10. Explain activation record and display structure.

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

11. What is printed by the program given under :


a. Call–by-name
b. Call-by –reference
c. Call-by-value
Procedure PROC (X,Y,Z)
begin
Y = Y+1
Z=Z+X
end PROC
begin
A=2
B=3
C=1
PROC (A,A+C,A+B)
Print A
End
12. Define attributes of symbol table:
i) Class and related attributes
ii) Scope attributes

13. Give the algorithm for the elimination of local and global common sub-
expression. Discuss the algorithm with the help of an example.

14. Discuss loop optimization technique with suitable examples.

15. Describe how a for-statement can be systematically turned into a corresponding


while statement. Does it make sense to use this to generate code?

16. Discuss the algorithm for the elimination of induction variables with the help of
example. Also generalize this algorithm to the case where multiplicative
constants can be negative.

17. Suppose parameter are passed by value instead by reference. Can two names be
aliases of one another? What if copy-restore linkage is used?

18. What do you mean by code optimization? What are the areas of optimization?

19.. Construct DAG for the following code sequence:


A [I] = B
*P = C
D = A [J]
E = *P
*P = A [I]
Assume that :

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

a. P can point anywhere


b. P point to only B or D

20. i. What is global data flow analysis? What is its use in code optimization?

D1 I := 2
D2 J := I+1 B1

D3 I := 1 B2

D4 J := J+1 B3

D5 J := J- 4 B4

B5

Block IN[B] OUT[B]


B1 01111 11000
B2 11111 01111
B3 01111 00110
B4 00110 00101
B5 00111 00111

ii. consider the above given table and flow graph then find ud-chain for following
1. J at D2 in B1
2. I at D3 in B2
3. J at D4 in B3
4. I at D2 in B1
5. J at D5 in B4

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

Questions for Sessional- II (IS)

Q1-Write short notes on :


a) Information controls b) Denial of service c) Computer crime
d) Hacking e) Privacy of the Internet f) Encryption

Q2- Is there an ethical crisis in E- business today ? List the various “PAPA”
ethical issues related to how information system store and process information.

Q3- Why are controls needed for information system ? What are the various types of
Information system controls?

Q4-Discuss various security and ethical challenges as faced by MIS manager.

Q5- Identify several ways that business manager and professional help lessen
the harmful effects and increase the beneficial effects of the use of information
technology.

Q6-What has been the impact of e- business technologies on the work relationships,
activities and resources of managers.

Q7- List some of the problems faced by the manager of a global organization.

Q8-Identify various business reasons or business drivers behind global information


technology application.

Q9- Identify various cultural and geo economic challenges that confront the
managers in the management of global e business technologies.

Q10-List the major types of international business strategies. Do you believe


that the various firms will tend to strive towards the transnational model
over time?

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

Q11- Write short notes on :


a) Transborder dataflows c)Transnational strategies
b) Outsourcing information system operations

Q12- Explain the following:


a) Strategic management c) Operational management
b) Technical management d)Distributed management

Q13-Which planning technique would you prefer critical success factor ,


strategic opportunity matrix Explain your reasoning

Q14 Do you think BPR is prerequisite for implementing ERP in an organization? If


yes or no give justification o0f your answer.

Q15-ERP is the backbone of of E- business . ERP is a business operating system , the


equivalent of the windows operating system for back office operations comment.

Q16-Prove that SCM is an absolute requirement for the E- business initiatives of


many companies.

Q17- List some major application components of CRM. Why are the businesses
turning to CRM as a major customer centric business strategy?

Q18- Why should you procure? What do you mean by procurement management?

Q19- Write a short note on end user computing.

Q20- Explain the planning process. Discuss the hierarchy of planning.

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

Important Question For Semister Exam (CD)


SET-1

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

SET-2

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

SET-3
1. What is a cross compiler? How is bootstrapping of a compiler done to a
second machine.

2. What is the input buffering? How sentinel symbol is used to reduce the
number of comparisons in lexical analysis of the statements gives
algorithms to clarify.

3. Consider the following statement :


Firstvalue = nextvalue + rate* 19
Compile this statement in all six phases.

4 Construct the parsing table for the following LL (1) grammar:


SaA/B
A b B / a
B  c / bAc
5. Construct an LALR (1) parsing table for the following grammar:
DL :T
L  L id /id
T  integer
6. Construct an SLR parsing table for the following grammar:
S  A)
S  A,P/ ( P,P
P{num,num}
7. Eliminate the left recursion from the following grammar:
S  a / Λ / (t)
TTS/S
8. Construct the following grammar:
E  TE’
E’  +E / ε
T  FT’
T’  T / ε
F  PF’
F’  *F’ / ε

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

P  (E)/ a / b/ ε
(b) Compute FIRST and FOLLOW for each nnon-terminal of above
grammar.
(c) Show that the grammar is Wheather LL(1) or not.

9. Construct LR(0) parsing table for the following grammar:


E  E + T /T
T  T*F / F
F  (E) / id

10 Give the algorithm for computing precedence function .

11.Translate the following program segment into three-address segment:


Switch( a + b )
{
case 2: { x = y; break; }
case 5: { switch( x )
{
case 0:{ a = b + 1; break:}
case 1:{a = b + 3; break;}
default :{a = 2;}
}
break;
case 9: {x = y – 1; break;}
default: {a = 2;}
}

12. What is symbol table ? Discuss the various approaches used for
organization of symbol table.

13. What are the different data structures for the symbol table
implementation?

14 What are the various types of errors that may appear in compilation
process ? Explain the function of Error handling phase of a compiler.

15. i Explain global data flow analysis

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

D1 I := 2
D2 J := I+1 B1

D3 I := 1 B2

D4 J := J+1 B3

D5 J := J- 4 B4

B5

Block IN[B] OUT[B]


B1 01111 11000
B2 11111 01111
B3 01111 00110
B4 00110 00101
B5 00111 00111

ii consider the above given table and flow graph then find ud-chain for following
2. J at D2 in B1
3. I at D3 in B2
4. J at D4 in B3
5. I at D2 in B1
6. J at D5 in B4

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

Important Questions for Semester exams(IS)


SET-1

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

SET-2

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

SET-3
1. What is a system? How the feedback and control components can makes a system
more useful?
2. How an information system supports a company s business operation, decision
making by managers and give competitive advantage
3. What do you think prototyping has become a popular way to develop new
computer Based information system ?
4. What do you mean by CASE? What are the different categories of CASE tools?
5. Explain:
a)Testing and quality assurance
b)Control design
c) preparing system proposal
d) Feasibility study
6. Identify several groupware tools for E- communication , conferencing and
work management and give example of how they can enhance the
collaboration of teams and workgroups in business enterprise?
7. Give some business application of the internet. What business value do
companies derive from their business application on intranet.
8. What are the benefits and limitation of interactive marketing for business?
9. List some of the problems faced by the manager of a global organization also
identify various business reasons or business drivers behind global information
technology application.

PTO
Dronacharya College Of Engg. Gr. Noida
Department of Computer Science & Information Technology

10. How can a company use change management to minimize the resistance
and maximize the acceptance of changes in business and technology? Give
examples.

PTO