# Amityuniversity.de

Amity University , Mcqs , Books ,Notes , Projects

## MBA-IT/MCA-Question-bank (10)

MBA-IT/MCA-Question-bank

Saturday, 05 December 2015 11:12

### COMPUTER FUNDAMENTALS

COMPUTER FUNDAMENTALS

1. (a) Convert the following decimal numbers to binary equivalent :

(i)  39.37

(ii)  206.66

Add the numbers given in (i) and (ii) and convert the result into hexadecimal.

(b) Simplify the following Boolean function using four variable Karnaugh's map in

product of sum form :

F(A, B, C, D)=1;(0, 1, 3, 5, 7, 11, 15).

Also, draw the logic circuit for the simplified expression.

(a)Assume rotational speed of a disk is 3600 rpm, the disk has 125 sectors/track

and 512 bytes/sector. What is the data transfer rate and average latency time of the disk system.

(b)What makes the cache memory fast ? Explain different types of mapping techniques used incache memory organisation.

(e) Write the contents of the conditional flags  of the flag register of the 8086 microprocessor after subtraction of A and B is performed. Assume value of two 8 bit

numbers A and B are 11001100 and 00111001 respectively.

2. (a) Draw the logic diagram of 3 bit synchronous counter. Also, explain its working.

(b) Define the following terms :

(i)  Instruction Register

(ii)  Interrupts

(iii)  Interface

(iv)  Fetch cycle

(v) Multiplexer

(c) Which of the categories of Flynn's 3 classification suits parallel processing. Explain.

3. (a) What are Bit - Slice ALUs ? What is a main advantage of such ALUs.

(b) Explain the following Mnemonics of 8086 Instruction set, with an example of each.

(i)  XLAT

(ii)  DA A

(iii)  CMPS

(iv)  ROL and RCL

4. (a) Explain any four addressing modes with the help of an example each.

(b)  Explain the functioning of R-S flip-flop. How does J-K flip-flop overcome the

problem of RS flip-flop ?

(  c  )  Design and Explain an arithmetic pipelining 6 for floating point addition or subtraction. Show with a flow chart.

5. (a) Give at least three differences between each of the following :

(i)  Static dataflow and dynamic dataflow computers.

(ii)  Multiprocessors with crossbar switch and Multiprocessors with multipost

memory.

(iii)  Horizontal micro instructions and Vertical micro instructions.

(b)  Explain the problem of cache coherence in  multiprocessor system.

(  c  )  How does synchronisation take place in the  multiprocessor system ?

5 .What is the purpose of error detection  and correction code ? Explain the process of error correction through Hamming code.

Explain function of following commands :

(i) XLAT

(ii) LEA

(iii) xcHG

(iv) POP

6   . (a) What is meant by assembler directives ? Explain the function of the following directives:

(i) EQU

(ii) ASSUME

(iii) END

(iv) DUP

8. (a) Make diagram and explain pipeline processor.

(b) What is the purpose of addressing modes ? Explain modes in detail.

9. Write a short note on each of the following :

(i) Microprogramming

(ii) Microprogramcounter

(ii| Microinstruction sequencer

(iv) Bit-slice CPU

(v) Hardwired control unit

9  .  (a) Write an assembly program to reverse a 6 string stored in data segment. The reversed string should be stored at the same location where the original string was stored.

(b)  Convert the BCD number 732.58 to the 4 following :

(i)  Binary number

(ii)  Octal number

(iii)  Decimal number

(  c  )Design a combinational circuit that accepts a 4-bit binary number and generates an output '1' only when the input number has odd number of Ts otherwise the output is '0'.

(d) Explain the use of 'IDIV' and 'AAS' 5 instructions with the help of an example of each for 8086microprocessor.

(e) What is the role of a stack in handling the 5 interrupts ? What is the difference between the stack and normal read/write memory.

(f) Explain the Flynn's classification of 4 computers.

10  .  (a) Show that NAND gate is a functionally 5 complete set of gates.

(b)  Explain the difference between memory 4 mapped I/O and I/O mapped I/O.

(c  )  Give an example of the addition of two 6]  floating point operands using an arithmetic pipelineshow all the steps involved.

11.  (a) What is the need of many addressing modes 5 in a machine ? Give four addressing modes that must be present in a machine. Justify your selection.

(b) What is the need of a control unit ? Explain 6 the basic structure of this with the help of a diagram. Also, give one disadvantage of a hard wired control unit.

(c  ) Draw the logic diagram of a master-slave 4 flip flop using R-S flip flop and explain its working.

12.  (a) Explain the basic functioning of multiplexer 8 and demultiplexer. Design a circuit of 3 x8 demultiplexer using two 2 x 4 demultiplexer.

(b) Explain any four characteristics of a RISC 7 processor. What are the advantages of using largeregister file ? Explain this with the help of a diagram.

13 .  (a) What is a vector instruction ? Explain briefly the need of an array processor in the execution of a vector instruction.

(b) What is cache coherence ? Why is it important for shared memory

multip'rocessor systems ?

( c  )  List the differences between :

(i)  Constant Angular Velocity and Constant Linear velocity disk.

14.. (a) Perform following subtraction using 2's compfement t

(i) 1101100 - 1011001

(ii) 1100011 - 1100r0

(b) Differentiate between direct and indirect address instruction. How many memory references are required for each type of instruction to bring an , operand into a processor register ? E:<plain.

(c) Write an 8086 assembly language program to contJert a twodtgit BCD number passed in

Aecumulator (AX) to its binary equivalent. I

(d) Simplify the following expression using K-maps in sum of product form :

F (w, x, y, z) = n (5, 10, 12, 13, 14) Also, draw the logic circuit for the simplified

expression.

(e) Convert (3333)n to her<adecimal number.

(fl Draw the logic diagram oI Gbit a.len pari\$ checker. Explain its operation with the help of truth table.

15  . (a) How is a RISC processor better than a CISC processor ? Justify 5our answer.

(b) What is the difference between control flour and data flow computers ?

(c) What is the purpose of making data flow graph ? Mahe data flow graph for U = ( A * ( A + B ) - ( A + B ) , z B

(d) Give two differences between decoder and demultiplexer.

16. (a) An 8-bit register Rl contains 10101010. What should the value of the register R2 be such that the most signiticant 4-bits of Rl are

(i) selectivelycleared

(ii) selectively set

(iv) selec6vely complemented ?

Show the resulting operations.

(b) List {our zubctcles of an instruction cycle. Also list the 'arious micro-operations of these subcycles.

(c) Compare Static RAM with Dynamic RAM.

16. (a) Find the length of SEC code and SEC DED code for the follorvtng 15 bit data sequence :

1010 0101 1010 0101

h) Draw the diagram and explain the working of a JK master slave flipflop. How does its working differ from simple JK flipflop ?

(c) How is an index register related to the auto-increment mode of addressing

17. (a) Why does DMA have priorig over ihe CPU when both requesi a memory transfer ?

(b) Make the logic diagram of a 4-bit serial shift register  using JK flipflops. Show the steps to shift the binary number 1101, through this register'

(c) Give an example of the addition of two floating point operands using an arithmetic pipeline'Show all the stens involved.

18  . (c) Write an assembly language (8086) . 7 program to find the total number of

occurrences of the characters 'rsrr and rrrnrl in an array of characters stored in the

memory.

(d) An 8-bit data 1100 1010 is transmitted to a distant location. It is received as 1.110 1010. Explain how SEC code would detect this error.

(e) 'Perform following subtraction using L's complement :

(i) 11001010 10101101

(ii) 10011011 11000111

(f) What are the problems which prevent RISC pipetining to achieve maximum speed?

19. Explain the working of Ripple Counter. Also, draw a 3 bit ripple counter using a

suitable flip flops.

(b) Consider the following code  :

a - b - d

b - d * e

c : b + f

Draw the data flow graph for the above equations.

(c) Explain the following addressing modes with an example of each.

20  (a)   Explain the use of 'AAA'&'DAA' instructions with the help of an example

eackr, for 8086 microprocessor.

(b) Draw any two DMA configurations and explain the advantages and disadvantages of these configurations.

.

(c) Design a floating point number format as

per following specifications :

Base : Binary

Mantissa : 20 bit long

Exponent : Cah hold 1gt2a

Find the maximum and minimum value for the proposed presentation. How will zero

be represented in the format propose d by you ? Make suitable assumptions, if any.

21  (a)  .Compare any four features of a RISC processor to a CISC processor ?

(b) List four subcycles of an instruction cycle. Also, list the various micro-operations of

any two of these sub cycles.

( c  )  Why ROM is considered as a combinational circuit although it is a permanent memory ? How is a ROM will different from that of RAM ?

22.(a) Write a program in 8086 assembly language to multiply two 16 -bit integers.

(b) What is bus arbitration ? Explain the Daisy Chaining and Polling Bus Arbitration

methods with the help of diagrams for each.

(c) What is the need of an interrupt in a computer system ?

23.  (a) Simplify the following expression using Karnaugh's map in product of sum form :

F (W, X, Y , Z',)= I (0, 1, 2, 3, 4, 6, 7 , g, g,11, 15) Also, draw the logic circuit for the simplified

expression.

(b)  Subtract 1010100 - 1000011 using 2's complernent.

(d) Write an 8086 assembly language program to convert a 4-digit octal number to its decimal

equivalent

(e) List the registers that are used by the ALU to ,perform various tasksAlso, explain how these registers are used.

(f) What is a cache memory ? Explain about multiple levels of cache.

(g) Differentiate between RISC and CISC architectures.

24. (a)   Explain the DMA controller with block diagram. What is meant by a block transfer ?

(b)  What are the various phases of an instruction cycle ? Give the micro operation of :fetch and decode phases

Compare Static RAM with Dynamic RAM.

25 .(a)  Using NAND gate generate the AND and NOR functions.

(b) What is meant by "addressing mode" ? Explain why the different addressing modes are required. Explain any two addressing modes that need no address field at all. Givg suitable example for each.

(  c )  Explain the principles of vector processing. Also, explain various types of vector instructions and their execution.

26.  (a) Explain the direct and associative cache mapping.

(b)   Write a program in 8086 assembly language to find the user specified number in a list of 15 numbers which is stored in a specific location.

(  c  )  Write down the method of converting a binary number into its Gray Code equivalent. Also, give an example.

27.  (a) Design a 4-bit shift register, which is capable of shifting its binary information in both the directions aloqs with the facility of parallel loading.

(b) Diifferentiate between a hardwired control unit and a micro programmed control unit.

(c) What is the difference between a memory mapped I/O and a peripheral mapped l/O ?

(d) Draw the circuit diagram of RS flip flop and explain its working.

(e) Di fferentiate between MISD and SISD classification of computers as suggested by Flynn.

28.  (a)  Draw the logic circuit only after simplifying ? the following expression using K-Map:

(b) Convert (1224)s to octal number .

(c) Write an assembly language (8086) . program to find the total number of

occurrences of the characters 'rsrr and rrrnrlin an array of characters stored in the

memory.

(d) An 8-bit data 1100 1010 is transmitted to a 7 distant location. It is received as 1.110 1010. Explain how SEC code would detect this error.

(e) 'Perform following subtraction using L's complement :

(i) 11001010 10101101

(ii) 10011011 11000111

(f)  What are the problems which prevent RISC pipetining to achieve maximum speed?

29  .  (a) Explain the working of Ripple Counter. Also, draw a 3 bit ripple counter using a

suitable flip flops.

(b) Consider the

a - b - d

b - d * e

c : b + f

Draw the data flow graph for the above equations.

(c) Explain the following addressing modes

with an example of each.

30  .  (a)  Explain the use of 'AAA'&'DAA' instructions with the help of an example

eackr, for 8086 microprocessor.

(b) Draw any two DMA configurations and explain the advantages and disadvantages

of these configurations.

(c) Design a floating point number format as per following specifications :

Base : Binary

Mantissa : 20 bit long

Exponent : Cah hold 1gt2a

Find the maximum and minimum value for the proposed presentation. How will zero

be represented in the format propose d by you ? Make suitable assumptions, if any.

31.  (a)    Compare any four features of a RISC  processor to a CISC processor ?

(b) List four subcycles of an instruction cycle. Also, list the various micro-operations of

any two of these sub cycles.

( c ) Why ROM is considered as a combinational circuit although it is a permanent

memory ? How is a ROM will different from that of RAM ?

32.  (a)  Write a program in 8086 assembly language to multiply two 16 -bit integers.

(b) What is bus arbitration ? Explain the Daisy Chaining and Polling Bus Arbitration

methods with the help of diagrams for each.

(c) What is the need of an interrupt in a computer system ?

Saturday, 05 December 2015 11:03

### INTRODUCTION TO SOFTWARE

INTRODUCTION TO SOFTWARE.

1. (a) Design an algorithm and draw a 6 corresponding flow chart to convert binary

(b)Write a shell program to find Greatest 6 Common Divisor (GCD) for the two given

numbers.

(  c  ) Compare and contrast the disk space management methods, the linked list with

Bitmap method.

(d) Construct context-free grammar for conditional expression in "C" language.

(Example : x = (y < z) ? y : z;)

(e) Explain the differences between internal and external fragmentation.

2. (a) Explain the differences between the following :

(i) Third generation and fourth  generation languages.

(ii)  Function and subroutine.

(iii) Compiler and Interpreter.

(iv)  Discuss the functionality and 4 implementation of two pass assemble:.

3. (a) Discuss the similarities and differences  between paging and segmentation.

(b) What is the basic philosophy of X-Windows ? How is it different from the

rest of GUIs ?

4. (a) Define UNIX command for the following :

(i)  To count the number of users who are currently logged in.

(iii) To shut down the system at a particular time.

(iv) To print the file names and their file

sizes in the current directory.

(v) To terminate the particular process.

(b) List the major activities performed in the development of a software product. Also

mention the limitations of the development cycle.

5. (a) Explain the important features of CASE tools.

(b) What are conditions that characterize deadlock ? Explain the occurrence and

avoidance of deadlock graphically among 3 processes and 3 resources.

6 . (a)  Write a shell program to find the greatest prime number less than L00.

(b) Consider the following processes in the ready queue; assuming that all processes

entered the queue at the same time

Calculate the average turnaround time and average waiting time by using :

(i)  Round Robin (quantum:2) algorithm

(ii) SIF scheduling algorithm.

( c  ) What is Compiler ?   Explain the Compiler design phases in brief.

(d) Explain the qualities of software product and process in brief.

(e)Write a brief note on demand paging and segmentation

(b) Write qualities and key attributes that are essential for a system analyst. What is a

CASE tool and how it is relevant in software engineering ? Give examples.

(b)  Give features of UNIX environment.

9.  (a) Explain the following UNIX commands :

(i)  tee

(ii) cat

(iit) comm

(i") pwd

(b) Explain the file and directory structure in UNIX. Draw diagrams in support of your

10.  (a)  Write a short note on 4GL. What are its limitations ?

(b) Write short notes on nny two of the following :

(i) Access lists for file protection

(ii) System maintenance

(iii) Integration testing

( c  )  Suggest (with examples) any 2 requirement gathering techniques.

10 . (a) Explain Prototyping model in detail. What 8 is the difference between unit testing and integration testing ? Explain with the help of suitable examples

(b) Write a shell program to calculate the  average marks and percentage of a student in five subjects.

(  c  ) Explain different types of operating systems  and give one example for each.

(d) Explain the steps and tasks performed by a  two - pass assembler. Write one advantage of single - pass assembler over two – pass assembler and vice - versa.

11 .(a)  What is the criteria to select a CASE tool ? Explain any two CASE tools.

(b) What do you mean by feasibility analysis ?  Explain different categories of feasibility analysis in brief.

12 . Write down UNIX commands for the following operations :

(i) To save the output of a command in a file

(ii)  To change the password of a user.

(iii) To kill a running process.

(iv) To list down the files and directions.

(b) What is dynamic memory allocation ? What  is the advantage of dynamic memory allocation over static memory allocation and vice - versa ?

(  c   )  Explain UNIX file system in brief.

13. (a) Draw the architecture and explain any four key features of X - WINDOWS.

(b) How is a directory in WINDOWS  categorised in terms of its file structure ? Give diagrams.

14. . (a) Write an algorithm and draw a flowchart to find the greatest prime number less than 512.

(b) What is a deadlock ? Explain essential  requirements or conditions for deadlock to occur.

15  .   (a) Design an algorithm and draw a corresponding flow . chart to check whether a given year is a leap year or not. 7

(b) Ust the conditions that characterize a deadlock. Explain the occurence and avoidance of deadlock

graphically among 3 processes and 3 resources

(d) What is a debugging system ? Describe the functions and capabilities of an interactive debugging sysiem.

16  . (a) Define the main differences between Network operating system and Distributed operating system.

(b) Construct a Context Free Grammar for the following

'C' statements : 6

(i) fuithmeticExpression

(ii)   For Loop

17  . "[n multiprogramming environment, sharing of code and data can greatly reduce the real storage needed by a group of process€s to run efficiently." For each of the following gpes of systems, outline briefly how sharing can be implemented :

(i) Partition

(ii) Paging

(iii) Segmentation

18 .   (a) What is a system call ? Give four different examples  of system calls in UNIX operating system

. (b) Write a shell program to display the alternate digits in a 4 digit decimal number. 5

(example:5694

- 5, 9 are altemite digns

6, 4 are alternate digits)

19  .  (a)  What is the basic purpose of program control ? Explain the significance of Gantt chart and PERT charts with an example for each

(b) What is the basic philosophy of X-Windows ? How is it different from rest of the Guls

20. (a)   Describe with the help of an example, the macro facility and its implementation

within an assembler.

(b) Consider the following processes in the ready queue (at the same time).

C-alculate the average tumaround time and average waiting time for the processes given by:

(i) FCFS

(ii) RR (quantum=2)

(c) Explain the principle of the following Non-contiguous Allocation schemes :

(ii) Indexed allocation

(d) Write a shell program to find the average marks secured by a student in 5 subjects.

(e) Give notes (in brief) on :

(i) vi editor

(ii) Next software

21  .   (a) Give UNIX commands for :

(i)  to kill the last background job ?

(ii) delete all files in the current directory and subdirectory.

(iii) to go to end of line in vi editor.

(b) What is the role of a System Analyst in Software Engineering ?

(  c  )   Describe the role of 4GUs in the applications development.

22.  (a) Write an algorithm and draw a corresponding flowchart to reverse a given

4diglt number.

(b) With the help of a neat diagram, explain the address translation scheme in a

segmented system.

23  . (a) Explain various mechanisms (atleast two) to protect a file in a multi-user environment.

With the help of a suitable example for eactu explain the features and objective of the

following:

(i)  Gantt chart

(ii) PERT chart

24  .  Give a brief note on file and directory  structure in UNIX.

Write short notes on a?ry tuto of the following:

(i)  Virtual Memory

(ii) Pipes and Filters in UNIX

(iii) X-Windows

25 . (a)

Design an algorithm and draw a corresponding flq,v chart to generate the fibonacci series.

(b) Write a shell program directorie s / files existing us€r. to count the number of in a gir,ren directory by the us€r.

(c) Explain the concept of Demand paging. Also, discuss the implementation of demand paging scheme with

the help of a diagram.

(d) Mention the general principles of systems investigation and also explain all the stages of systems

investigation.

26.  . (a) Write context free grammar (CFG) for a "Goto statement" and "For loop" in C language.

(b) What is meant by Segmentation ? With the help of a diagram, explain the address translation scheme in

a segmentation system.

27  .  . (a) Explain the use of the following UNIX commands, their syntax and an example for each :

(i) nohup

(ii) cp

(iii) mv

(iv) rmdir

(v) cal

(b) What are Fourth Generation Languages (4GL's) ? How do thny help to solve the problems ? Also, mention their limitations.

28  .(a)   Write a shell program to check whether the given substring' is existing in the string or not

(b) Exlain the following  Disk scheduring argorithms with

(i) FCFS

(ii) Shortest seek time first scheduling

(iii) Scan scheduling

29  .  (a)   Explain the functional overview of the Macintosh toolbox. List any two applications which can be run on this O/S.

(b) With the help of an example application, explain the client /server model.

30  .   (a) Explain the working of a 2-pass assembler in detail .

(b) Write a shell program to copy the contents of fileT to anothe r f ileZ. Also write an algorithm for it.

(c) Explain the client-server model with the help of an example application

(d) Explain the following concepts in UNIX with an example for each :

(i) filters

(ii) pipes

(iii) file permissions

(e) Explain various stages of systems investigation

31  .  (a)  Explain the concept of 'Bufferins' with the help of a digram.

(b) How can compaction be a solution for the external fragmentation problem in memory management ?

Illustrate with the help of an example.

33. (a)   Explain with suitable examples r :

(i) inodes

(ii) file structure in UNIX

(b) What do you understand by syntax and sernantic analysis ? Explain in detail.

34. (a) What is 4GL ? What are its limitations ? How can 4GLs help in solving the software problems ?

(b) Define the following I.JNIX commands

(i) echo

(ii) cat

(iii) ls

(iv) cc

35. (a) List and explain the mechanism to support the file protection in multiuser environment.

(b) Lisl and explain any five important qualities of a software product.

36  . (a) The contents of four 8-bit registers AL, BL, CL and DI- in hexadecimal notation are F2, Fn 89 and EA respectively. What will be the values of these registers after executing the following

micro-operation sequence :

Note  :  If you haue taken any ossum ptions, mention them

(b) * Write a program in assembly language (8086) that calculates the sum of and storeS the sum of the above series in a user defined data item.

(c) What is a multiplexer ? Design and explain the functioning of a 4 x 1 multiplexer by giving its truth table, logic diagram and block diagrarn.

(d) Design a 4 bit arithmetic circuit using 4 full adders and 4 multiplexers for carrying, out the frollowing micro-operations

(ii) A,Cd with carry

(iii) Subtract

(iv) Subtract with borrow

(v) Transfer

(vi) Increment

Note :  Mention the ossum ptions made, if any.

37. (a)  Draw the block diagram of INTEL 8086 microprocessor and explaln the two functional units

(Bus Interface Unit and the Execution Unit).

(b) With the help of a block diagram explain the polling implementation of a system bus.

38.  ( a  )  Define Vector processing and Vector computers. Mention at least 4 applications of vector processing. Explain the vector instruction format with the help of an example.

(b) Write a program in 8086 assembly language to sort a given list of 'n' integers.

39 . (a) With the helP of an example,explain  RISC  Pipelining.

(b) with the help of the truth-table and logic diagram, explain the functioning of a D-flip-flop.

39. Explain the following along with their usage :

(i) HYPercube interconnection

(ii) Cache coherence

(iii) SPARC architecture

(iv) Wilkes Control Unit

(v) Decoder

Saturday, 05 December 2015 10:57

### Operating System Concepts and Networking Management

Operating System Concepts and Networking Management

(1) What are the Goals of Computer Security'?

(2) Justifj, the following statement.  There is no confidentiality without integrity"

(3) ldenitify computer assets in your organisation.

(4) Identify threats to assets listed in progress 1 above.

(5) Identify the impact of security attack listed in 2 above.

(6) Distinguish between vulnerability and threat.

(7) List any three recent computer security failures.

(8) Do you currently apply any computer security control measures? If so,what?Against what  attacks are you trying to protect?

(9) Discuss various security systems and facilities.

(10) What is computer-security classification?

(11) What do you understand by symmetric and asymmetric cryptography?

(12)  Give the default order of group policy implementation through Active Directory service hierarchy.

(13) Is it possible to set up encryption on a compressed folder?

(14) When should security groups be used instead of distribution groups?

(15) If the domain mode is switched over from mixed mode to native mode, what are the   implications?

(16) If a remote access client wants to connect to RAS server but connection is not allowed how         will this error be solved?

(17) Write the purpose of VPN and name VPN technologies supported by Windows 2000?

(18) What is the purpose of a directory service in Windows 2000?

(19) In what mode does the console run?

(20) How does a domain differ from a workgroup?

(21) In a multi-user environment while printing, how can the possibility of a user ending up with a       wrong document be avoided?

(22) Can a single document be redirected on a network?

(23) When do DCHP clients try to renew their leases?

(24) Can moving and copying files and folders between disk volumes change their compression   state?

(25) What type of data is replicated by FRS?

(26) What is the default permission when a partition is formulated with NIFS?

(27) Name various methods of authentication available in windows operating system.

(28) Describe kerberos management in windows operating system.

(29) Describe policy inheritance.

(30) What do you understand by VPN? Discuss IPSec security ?

(31)  Discuss in detail EFS (Encrypting File System) ?

(32) What do you understand by a null session? How null session can be disabled?

(33) List the steps for disabling the Last username option.?

(34) What are limitations ofthe domain model?

(35) What do you understand by PDC and BDC?

(36)  What is Active Directory?

(37) How will you secure guest account?

(38) What do you understand by Windows 2000 DNS?

(39) What are the Goals of Computer Security'?

(40) Justifj, the following statement:  There is no confidentiality without integrity?

(41) ldentify computer assets in your organisation.?

(42) Identify threats to assets listed in progress 1 above.?

(43) Identify the impact of security attack listed in 2 above.?

(44) Distinguish between vulnerability and threat.?

(45) List any three recent computer security failures.?

(46) Do you currently apply any computer security control measures? If so, what?Against what   attacks are you trying to protect?

(47) Discuss various security systems and facilities.?

(48) What is computer-security classification?

(49) What do you understand by symmetric and asymmetric cryptography?

(50) Find liow to force a file system consistency check.

(51) What happens if a user logs out after you have started writing to him?

Saturday, 05 December 2015 10:54

### Top Operating System Concepts and Networking Management

(52) What is meant by being in invisible mode in Yahoo Messenger?

(53) How do you being chatting with a friend?

(54) What would you want to buzz a friend?

(55) What are the different status massages that you can show others?

(56) How can you save a transcript of the conversation you have had with a friend?

(57) What happens if you try to cat a non-existent file?

(58) Can you look at tlie listing of a directory if you do not liave search permission on it? Why?

(59) Which of the commands you have learnt so far are filters?

(60) How will you count the number of all files in a directory?

(61) Write a shell script that prints out the contents of some fixed file in upper case.?

(63) What are the roles of protocols in a computer network?

(64) What happens if you type in your login name all in upper case?

(65) Try using your mouse just after logging in at the console when you are in text mode.What          appens? Are you able to perform any operation with the mouse?

(66) What are the characters you need to use to correct typing mistakes while logging in? How do         you correct typing mistakes while entering the password?

(67) How many previous commands can you invoke by using the arrow keys?

(68) How will you enter a '\' in the command that you invoke?

(69) How can you get the,calendar for some other month in some other year?

(70) Find out how to set the system date. Why do you think only the super user is allowed        to do this?

(71) What does Linux have to say about choosing passwords? Find out from the documentation.?

(72) How mucli control does the "S command allow you over the output? Can you read a long          file in sequence easily by this method?

(73) What would happen if your home directory did not exist and you tried to login?

(74) How would you put a space into a filename?

(75) How can you control whether you see different file types in different colours?

(76) Find out how to sort the output on time rather than alphabetically.?

(77) What happens if you try to cd to a non-existent directory?

(78) Can there be a file under a directory with the same name? Why?

(79) What is a system call?

(80) What are the basic design issues in the distributed operating systems.?

(81) What is the basic difference between Network operating systems and Distributed        operating systems.

(82) What are the features of Memory Management subsystem?

(83) What are the different states of a Linux operating system?

(84) What is the purpose of a file system?

(85) What is GUI and what are its features?

(86) What is the difference between Bitmapped and character based displays?

(87) What are the four major components of GUI? Explain the functioning of any one

component.?

(88) How does MS-Windows enhance DOS environment?

(89) How are graphics supported in MS-Windows?

(90) What types of utilities are provided in Toolbox? Explain their features.?

(91) Explain the function~ng of Resources Manager and Menu Manager of Toolbox.?

(92) What is the basic philosophy of X-windows? How is it different from the rest of GUIs?

(93) What are the major components of NeXTSTEP? How do these elements?

(94) How are applications written in NeXTSTEP environment?

Saturday, 05 December 2015 10:49

### WEBSITE MANAGEMENT

WEBSITE MANAGEMENT
1. Write an HTML code to generate the study centre name, study centre
coordinator,
place and
the state where you are studying your BIT programme. use frame based
approach. Make
necessary assumptions and indicate them.

2.What is JSP ? Write at least five advantages of JSP

3. Design a feedback form for any of the Universitys websites. Use HTML. Your form

should have basic formatting features. Make necessary assumptions and indicate
them.
4. Design a
.Assumptions can be made wherever necessary.

5.. Design an Order-form for any
online store (for an E-commerce website). Appropriate
controls are to be placed for various inputs and events. Write necessary code for the
above problem using ASP or CGI program using PERL.

6)Design a web page similar to any of the user-registration for a free email account.
The form should consist of all the details with appropriate controls on them. VI should
be user-friendly.
Implement using ASP
OR
CGI programming using PERL.

7) Design a web page for any
Computer Institute for the students' registration into a
particular course./programme/module. Design the user interface with appropriate
controls.
Implement using ASP
OR
CGI programming using PERL.

8)Write HTML code to generate the home page of any Educational Institute. It should watch all the essential features on the home - page. Assumption can be made wherever necessary.

9) Explain the role of ASP in the web page design. Illustrate with an example.

10) Design a
registration form for an e-mail account. Use ASP/CGI using PERL to make it functional. Draw the sample layout of the form.

11) Design a homepage for a news-website. Use HTML, ASP/CGI using PERL.

12) Explain at least five main menu options of any of the web - browses.

13) Write HTML code to generate the UNIVERSITY NAME, ADDRESS and a logo at the
left corner of the page- Use frame based approach to add the options like About
university, For students, Regional Centres, Divisions, schools and Recruitments to the
left' side of the page and corresponding text should be displayed on the right
frame/main frame.

14) What is the role of the VBScript in HTML pages ? Explain with' the help of an example.

15) Design an online Examination form for the students to apply for the exams of theory as well as practical courses. Try to place appropriate controls on the form. Write necessary code for the above problem using ASP or CGI using PERL.

16) Design a home page for an enterprise which has E-Commerce application launched on it. Use HTML. Use frame-based approach

17) Design an online-poll application. The application should consist of a question(s) and
3 answers (YES, NO and CANT' SAY). Depending upon the selection of the choice, it
should display the results in a Bar chart form.

Write the necessary code for the above problem using ASP or CGI using PERL.

18) write atleast five advantages of use of Javascript in HTML documents'

19) Design a suggestion feedback form for any of the review of the product whose information is placed online. Assumptions can be made wherever necessary .

20) Design an order-form for an online electronics store Appropriate controls should be
placed for various inputs and events' Write necessary code for the above problem Use ASP or PERL

21) Design a webpage that consists of a form whose title and heading is FIND ADDRESS. It should consist of a text box labelled as
ENROLLMENT NUMBER. It should also consist of SUBMIT and RESET buttons. On clicking SUBMIT button, the address of student whose enrollment number is input in text box should be displayed.
Make necessary assumptions. Implement using ASP or CGI programming using PERL.

22) Design a web page similar to any of the on-line polling applications (in the form of
objective questions) and display the statistics as per the result (YES, NO' CAN'T SAY)'
UI should be user-friendly.

Saturday, 05 December 2015 10:47

### Computer NETWORKING

COMPUTER NETWORKING
1) A
software company named "Hindsoft" wants to design its network. The company has three departments at different locations in India, like Administration in Bangalore, sales in Bombay and Development at Delhi. Each Department has 30 computers, 4 printers and 2 FAX machines whileadministration department is working as the central office to maintain all databases and main server. The main server is connected with the servers of other two departments. Give answers of the following, based on the network specification defined above :

(a) Draw and explain the best suited physical and logical topology.
(b) Justify the need of each network device you may use in the network.
( c ) Which cable is best suited for this all the available cables to justify your answer.
(d) Which
operating system is best for this 4 company ? Justify your answer.
(d) Explain the best hardware and software you should use in the network to implement the security.

2) (a) Explain any two functionalities of each of the following :
(i) Data link layer of OSI model
(ii) Internet layer of TCP/IP model
(iii) Session layer of OSI model

(b) What are print servers ? Why do we need them ? Explain the print queue management.

3) Write three difference between each of the following pairs :
(a)
Fiber optics and Coaxial cable
(b) Bridge and
Gateways
(c) Connection Oriented and Connectionless Services
(d) Peer to Peer and
Client-Server Networking
(e) ATM and Frame Relay

4) (a) What are the main difference between proxy server and Firewall ? Explain different types of firewalls that use different strategies for protecting network resources.

(b) What is meant by Trust Relationship ? 7 Explain the Domain Trust Relationship and Alternative Domain Trust Relationship.

5) (a) What is Token Ring ? How does it work ? In what way is it different from Ethernet ? Also, explain the purpose of fields in Token Ring frame header.

(b) Explain the "Resource Password Security Model".

6) (a) Why disk administration is an important part of network Management ? Does it provide security and reliability ? Also, explain the important options provided by
7) Assume you are designing a LAN for library, which has three departments in the
library buildinglike Administration, Purchase unit and Maintenance. purchase unit and Maintenance department have 25 computers, o printers each, while Administration department, which is functioning as the Central department has 38 computers, 4 printers and 2 FAX machines Administration department maintains all databases and the main server. The main server is connected with the servers of other departments. Give answers of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the above network specification.

(ii) Justify the need of each hardware device you may use in the network at different t of all

(iii) Which cable is best suited for this library ? Compare merits and demerits of all the available cables to justify your answer.

(iv) Which operating system is best for this network ? Justify your answer.
(v) Explain the best hard wares and soft wares you should use in the network to implement the securitv.

8) (a) Explain the importance of User Access security model. Also, Recursive Password security model, with their advantages and
(b) Explain different aspects of print queue management.

(c) Explain the importance of disk administration in networking.

9) (a) Explain, how windows NT manages the domains. Also, explain the trust relationship domain with the help of an example.

(b) What is the role of Network Interface Card NIC) ?

( c ) How does Stateful Inspection Technique provide security in networks ?

10 )(a) What is a difference between Viruses' and' Trojan Horses' ? Explain the possible precautions an administrator has to take for controlling Viruses and Trojan Horses.

(b) Explain the different file systems explain the NTFS master file table supported by Windows NT. Also, draw and structure and define its components'

11) Assume you are designing a network for a university, which has 25 Lecture rooms' ,Administration department, 20 Teachers rooms and one management department' Each Lecture room and Teacher room is having a computer, while administration and managernent department has 20 computers, 10 printers and 2 FAX machines each. Administration is working as the central office which maintains all databases and main serverThe main server is connected to all computers and servers of other departments.
Give answers of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the network
specification
(ii) justify. the need of each hardware device you may use in the network at different locations.

(iii) Which cable is best suited for this company ? Compare merits and demerits of all

(iv) Which operating system is best for this company ? Justify your answer.

(v) Explain the best hard wares and soft wares that can be used in the network to
implement the security

12) Explain. any two functionalities of each of the following :
(i) Physical layer '
(iii) Transport layer

(b) What is Token Ring ? How does it work ? In what way is it different from Ethernet ? Explain the fields in a Token Ring frame header..

13) write three differences between each of the following pairs :
(a) IEEE 802.6 and IEEE 802.4
( b) Iterative and Recursive name resolution
(c) Coaxial cable and Fiber optics
(d) Centralized computing and Distributed computing
(e) Internet and Intranet

14) (a) How does Windows NT manage file system ? Explain different systems supported by Windows NT. Write two advantages and two disadvantages of each model.

(b) Explain the 'flow control' and 'error control' mechanism in X.25 protocol.

15)(a) What are print servers? Why do we need them ? What do you understand by -
print queue management ?
b) Explain the "Resource Password Security Model

16) Assume you are designing a network for a hospital, which has four departments in the hospital building like administration, OPD, Lab, and Maintenance. Each department has 20 computers, 4printers and 1 FAX machine, while Administration department is working as the Central department which maintains all databases and the main server. The main server is connected with the servers of other departments.
Give answers of the following, based on the network defined above :

(i)Draw and explain the best suited physical and logical topology for the network specification

(ii) Justify the need of each hardware device you may use in the network at different locations.

(iii)Which cable is best suited for this company ? Compare merits and demerits of all

(iv) Which operating system is best for this company ? justify your answer.

(v) Explain the best hard wares and soft wares you should use in the network to.
implement the security.

17) Assume you are designing a network for a Gargent manufacturing and distribution
company. The company has 3 departments at different locations in India like Administration, Manufacturing and Distribution departments at New Delhi, Gujarat and Mumbai respectively. Further, distribution department has .4 sub distribution departments in Mumbai at different locations.

Each department has 25 computers, 2 printers and one FAX machine, and each sub-department has 10 computers and 2 printers while Administration department is working as the central office which maintains all database, transactions and main server.
The main server is connected with servers of other departments and sub-departments. Give answer of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the network specification.
(ii) justify the need of each hardware device you may use in the network at different locations.
(iii) Which cable is best suited for this company ? Compare merits and demerits of all
(iv) Which operating system is best for this company? Justify your answer.
(v) Explain the best hard wares and soft wares you should use in the network to implement the security

18) Explain any two functionalities of each of the following : (i) Presentation layer
(iii) Internet layer of TCP/IP
(b) Explain, how the microwave communication works. In what ways is it different ' from the satellite communication ? Give at least three differences.
(c) In OSI model, how does the transport layer ensure the complete reliability of the
message and the proper ordering of the message ?

19) Write three differences between each of the following pairs
(a) Token ring and Token bus
(b) Message switching and Packet switching
(c) Connection oriented and Connection-less services
(d) 10 Base 2 and 100 Base T cable
(e) Gateway and Router

14)(a) What is the importance of mirroring ? How do we mirror a disk partition on : I server ? can we establish the mirror of boot partition ? If yes, how f If no, why not ?
(b) How does NTFS file system provide the 'recoverability' and 'compression' of files ? Explain your answer with the help of suitable examples for each.

15) (a) What is disk stripping ? What are the differences between strip set with parity
and. without -parity ? .Explain, how you can create and remove strip set with parity and without parity.

16) (a) What are the different types of activities that could be administrator in the security policy ? Also, explain addressed by the network why these activities are included in the security policy.

(b) How are the configuration of a Explain with suitable diagram. local printer and a network printer different ?

Saturday, 05 December 2015 10:45

### COMPUTER NETWORKS

COMPUTER NETWORKS 1) Draw a hybrid topology having a star backbone with four ring networks.

2) Make a
diagram (topology) of the network existing in your centre showing the various nodes, and what they actually represent (Computer, Printer, Hub, Router, Switches). Also show how this network is connected with another network (LAN,WAN). What is the Internet bandwidth of the network ? What network OS is used ?

3) Draw a hybrid topology having a star backbone with three bus networks.
(a) Carefully examine the network interface
card of your node and write the detailed specification.

4)Draw a fully connected Five node networks. How many links are there ?

5) (a) Write all
the steps for file sharing mechanism on your machine.

(b) Write the specification of hubs used in networking of the Lab.

6) Draw a .hybrid topology having a ring network backbone with 4 bus networks.

7) (a) Write all the steps to share and access the printer in the network environment.
(b) How can you check the MAC address of your machine ?

8) (a) Draw a fully connected 4 node networks. How many links are there ? (b) Draw a hybrid topology having a ring network with 3 bus networks.

9) (a) Write all the steps for assigning IP address to your machine.

(b) Write the specification of the following devices of your study centre being used in networking.
(i) Hub
(ii) UTP cable

10) (a) Draw a fully connected 6 node networks. How many links are there ? (b) Draw a hybrid topology having a star backbone with 3 ring networks.

11)(a) Write the specification of the following devices of your study centre being used in
networking.
(i) Router (ii) Network Printer
(b) Write all the steps for accessing data from another computer in a network.

12 (i) Write all the steps for enabling file sharing mechanism on your machine
(ii) What do you understand by these
specifications.
10 base 2 hubs
10 base T hubs

13) Write complete specification of your network interface
cards.

14) Write all the specifications of routers, hubs and switches of your study centre.

15) (i) What is IP address of your machine ? Which class it belongs to ?
(ii) What is IP address of "
IGNOU.ac.in" ? Which class it belongs to ?

Saturday, 05 December 2015 10:40

### Windows Proagramming

Windows Proagramming
1)Write an event procedure to find and display the string - length of an input string.

2) Create a simple VB application to simulate the billing application of a gas - agency. The bill should contain the bill-no (auto generated), date and time also. Design the
user - interface with appropriate controls. Also, design the splash - screen for this
application.

3)Write an event procedure to sort list of n - numbers in ascending order. Design an user - friendly interface for the application with appropriate controls.

4)Create a simple VB application to simulate the generation of a LIC premium receipt . The premium receipt should contain the Policy No. date, time, details of the policy, name of the policy holder, address and amount. Design the splash screen for this application.

5) Write an event procedure to concatenate two strings given as input and should display the resultant string. Use appropriate controls to design the user-interface.

6) Create a VB application to simulate the menu-design NOTE-PAD. Note : No need of doing any programming for the application menu - design is enough

7) Create a form with a picture-box. Find 3 interesting pictures and use a timer control to cycle these 3 pictures every one second. Place an exit button to close the application.

8) Write an event procedure to display the type of the triangle, given the measurements of its 3 sides by the user.

9) Create a form where the user enters some text into a text-box control and have the result
output into a label in a different font with the colour change in the background of the form.

10) Write an event procedure to collect an ,integer from the user and find out whether the given
integer is an odd integer or an even one. Design a splash screen for this application. Use
appropriate controls on the form.

11) Collect the first name, middle name and the last name from the user on three separate
, text-boxes and display the user's short J name.

12) Write a Visula Basic program to compute the FV (Future Value)of an investment. The formula
to be used is as follows :
FV - Investment * (1 + Interest rate ) years
Also, design a splash screen for this application. Use appropriate controls to design the User
Interface.

13) Design a simple application DVD's, writing pads, pens, wherever necessary. to generate a bill for a stationery shop which sells books, CD's, pencils and other stationery items. Assumptions can be made

14) create a VB program to introduce yourself should provide the complete information appropriate controls on the form. to the lab faculty. when the program is run,it about yourself. Design a good interface with

15) Create a VB application to simulate a simple calculator to perform the arithmetic operations like addition , multiplication , division and finding out percentage, Select and place appropriate controls on the form to provide user - friendly interface .

16) Create VB application to calculate and display the Gross-pay ,Deductions and the Net-pay for the employees of the company , given the Basic Pay, TA , DA, Perks, HRA and deductions(GPF, medical contribution , pension scheme , loans).The pay-slip should consist of all the details of the employee along with the pay details . Consider the following details for calculating the DA,HRA perks, allowances.

TA=RS800/ for the employees
DA=40% of basic pay
Perks =3% of basic pay
HRA = 30% of basic pay

17) Create a VB application to check whether the given string is a palindrome or not.

18) Create a simple application to simulate the billing system for an automobile spare parts shop .Also design the splash screen for this application. The UI should be user-friendly with appropriate controls.

Saturday, 05 December 2015 10:20

### Software engineering

Software engineering
1) Suppose we wish to computerize the activities of study centers, which offer various programmers of the university. The activities are as follows :

(i) Forwarding the counselor's biodata to Regional Centre.
(ii) Schedule the classes (both theory and practical)
(iii) Identify Practical Centers.
(iv) Collect TMA's from students and get it evaluated \l the counselors
(v) Student's enquiry
(vi) Dispatch of Award lists of TMA's to University

For the above mentioned system,

(1) Develop SRS.
(2, Draw DFDs upto second level.
(3) Identify the software modules and their functions.
(4) Propose a testing strategy for any two software modules mentioned in above.

(3)Make assumptions, wherever necessary.

(b) List at least five important qualities of software product and process.

( c ) What is Agility ? List all the principles for those who want to achieve agility.

(d) With the help of an example, explain the significance of the PERT chart.

2) What is a design method ? What are its five components ?

3) What is 4GL ? Explain at least three areas which are impacted by the advent of 4Gts.

4) "independence is measured using two qualitative criteria Cohesion and Coupling." Explain both of them in detail.

5) Explain how version control combines procedures and tools to manage different versions of configuration objects that are created during the s/w engineering process.

6) The requirements engineering process is accomplished through' the execution of functions likeInception, Elicitation, Elaboration' Negotiation, Specification, validation and Management' Explain the role and significance of each of the functions'

7) Explain the purpose of each o{ the system tests given below
(i) Recovery testing
(iii) Security testing
(iii) Stress testing
(iv) Performance testing

8) Write short notes on:
(i) The Incremental Model
(iii) Dynamic Systems Development Method (DSDM)
(iv) Basis Path Testing

9) Income Tax department wants to automate its system. It has the following requirements
(i) Filing of annual IT forms through Internet
(ii) Filing of PAN card form through Internet
(iii) Online discussion form to handle different queries
(iv) Specify the three use-cases.
(v) Identify the classes and prepare the class diagram for it.

10) What is project scheduling ? Explain at least three functions associated with project scheduling.

11) Explain COCOMO model.

12) What is the importance of software documentation standards ? List any three
standards.

13) How is re-engineering different from reverse engineering ? Explain the restructuring technique for re-engineering with the help of an example.

14) List various McCall's Quality Factors. What do plain with example.

15) Justify the following statements :
(i) MTBF = MTTF + MTTR
(ii) Software Availability :
IMTTF/(MTTF + MTTR)I x700o/o

16) List any five principles for data specification used in data design at the component level.

17) Consider an Examination System for a school. It performs the following operations.
(a) Seating-plan generation and room allocation for students and invigilators.
(b) Maintaining records of different courses,student attendance and evaluators.
(c) Distributing and collecting answer scripts to/from different evaluators.
(d) Maintaining l Displaying student marks.
Based on the above specification, answer the following
(a) Prepare SRS document for this system.
(b) Design and draw DFDs upto two levels.
( c ) Design a complete ER diagram with various components.

18) Write short notes on the following : 5
(a) Software Quality Assurance
(b) Data Coupling
(c) Cost Benefit Analysis
(d) Decision Tree
(e) Risk Management

19) ABC Multiplex movie theatre wants to automate its system. It has the following requirements to be fulfilled :

n It has 4 auditoriums (theatres).
n Normally new film releases/change of the films will be on Fridays only.
n Each auditorium will screen 4 movies daily.
n To provide the information about all the movies online on its website.
n To provide the online ticketing facility through credit cards or debit cards.
n Allow to book for families or in groups
n To offer some exclusive offers for its members.
n Should automatically send a newsletter every week about the latest information about the movies etc. and through e-mail to its members.

(20) For the above mentioned system :

(i) Prepare SRS document for this system.
(ii) Mention Hardware and Software requirements.
(iii) Design and draw DFD's upto two levels.
(iv) Design a complete ER diagram with various entities, relationships, cardinality etc.

(b) Define CMM. Explain various maturity levels in CMM.
(c) With the help of a diagram, describe the layered technology approach to software engineering.

21) "The prototype can serve as the first system. It is true that both the customers and developers like the model. Users get a feel for the actual system and developers get to build something immediately". In support with the above statement, explain the prototyping model and also suggest for which kind of projects, this paradigm is suitable. Also mention any two reasons where this paradigm can create problems. Make assumptions wherever needed?

(22) Compare and contrast size-oriented metrics with function-oriented metrics?
23) What do you mean by cyclomatic complexity ? How do we compute it ?

24) List the objectives of the Formal Technical Review (FTR). Also, mention the review reporting and record keeping process of FT& briefly.

25) What is the significance of user interface design for any project. Explain briefly, the user interface design guidelines.

26) Explain the following testing techniques :
(i) Unit Testing
:(ii) Integration testing

27) Write short note on the following :
(a) Temporal Cohesion
(b) Software Reliability
(c) Risk Management
(d) Reverse Engineering
(e) CASE Tools

28) A University's reception wants to automate the Visitor's Registration Process. It has the followingrequirements to be ful filled
(a) To make note of the visitor's details, purpose of visit, time.
(b)Checking process whether she/he has taken the prior appointment of the visiting official
(c) To schedule the appointments
(d) To cancel the appointments
(e) To divert the visitors to other officials depending upon the purpose
(f) Follow-up activities after the visit.
(g) Report generation.

for the above mentioned system.
(i) Prepare the JRS document for this system
(ii) Mention hardware and software requirements.
(iii) Design and draw DFD's upto two levels.
(iv) Design a complete FR diagram with 4 various entities, relationships, cordinality etc.

29) What is the significance of software 8 configuration management ? Discuss the
role of CASE tools in S/W project management

30) List the cost estimation techniques explain any one of them.

31) Define the term "Risk". How will you 7 identify it ?

32) When can we say that the Software Project is amenable for Modular design ? Justify your answer.

33) (a) Explain equivalence partitioning.
(b) With the help of an example, explain the Flow Graph Notation.

34) Explain the following testing techniques :
(i) Stress testing
(ii) Performance testing

(35) Often, Software development companies outsource the job of testing the software developed by them. Why do they outsource ? Why don't they test software developed by themselves ?

(36) Write a short note on the following :
(a)Graph-based testing methods
(b)McCall's Quality Factors
(c) Cohesion

(37) Design a system for Enrolment Process of a Distance Education University.
(i) Draw DFD up to level
(ii) Prepare SRS document for the same.

(37) Which phase of the SDLC is considered to be the most important phase ? Discuss the reason for its importance.

(38) Describe several specific actions that should be taken during software development to achieve the maintainability of the software that is developed

(39) Explain what is meant by critical path scheduling. Describe the process of creating
Gantt charts. Give an example.

(40) Explain use cases and use case diagrams and how they can be used to model system
functionality.

(42) A desirable property of requirements is that 8 it should be testable. Explain why testablerequirements add in the production of high quality software.

(43) Discuss in detail the various software process models.

44) Explain McCabe's cyclomatic complexity with example.

45) Does programming languages have an impact on S/w project planning, analysis,
design, coding, testing and maintenance ? Discuss ?

46)Explain the following :
(a) Debugger
(b) Product Vs Process
(c) CASE Tools
(d)Cocomo Model
(e) Risk Management

Saturday, 05 December 2015 10:00

### DATA AND FILE STRUCTURES

DATA AND FILE STRUCTURES

1 What are the preconditions for applying binary search on any list containing integer values ? Write the algorithm and manually run it on the following list of number

11 22 33 44 55 66 77 88

2 What is worst case complexity of the above algorithm ?

How can a polynomial be represented with the help of a linked list ? Write an algorithm to multiply two polynomials of degree 'm' and degree 'n' ?

4 Write a program to implement a static stack. Also, mention few applications of stack ?

5 Differentiate between the following
(i) Space and Time complexity
(ii) Indexed file organisation and Indexed sequential file organisation

6 Write an algorithm to balance a Red-Black tree after deleting a node ?

7 How are the deletions performed in Binary Search Tree ? Explain each case of deletion with an example

8 Write algorithm to insert elements in a B-Tree. Make B-Tree using your algorithm for the following list of elements ?

2. 4, 9, 8, 7, 6,3, 1, 5, 10

9 Two Binary trees are similar if they are both empty or if they are both non-empty and left and right subtrees are similar. Write an algorithm to determine if two Binary trees are similar?

10 Explain the factors involved in the selection of a particular file organization for user. What is sequential file ? Why are sequential files stored in disk cylinder by cylinder ?

11 What are the limitations of a Binary Search Tree (BST) ? How does AVL tree help in this regard ?

12 Give an AVL tree for which the deletion of a node requires two double rotations. Draw the tree and explain why two rotations are needed ?

13 Write a function in 'C' to insert a node in a linked list at the following position
(a) at the beginning
(b) at the end

14 What are the different types of hash functions How can clustering involved in linear probing be avoided ? Explain any two methods.

15 Write an algorithm to sort an array
25, 15, 30, 9, 99, 20, 26
using insertion sort . Also write the steps involved in it ?

16 Write an algorithm to discuss the implementation of breadth first traversal method of a graph?

17 Write algorithms for the following
(i) To insert a node at a given position in a circular linked list.
(ii) To delete the first node from circular linked list.

18 Write an algorithm to create a Binary Tree. The algorithm should accept elements and display Binary Tree with those elements ?

19 What is a linear queue ? Write an algorithm for adding an element to a linear queue .

20 Write a 'C' program to implement priority queue using arrays, check for overflow and underflow conditions ?

21 Write an algorithm for the implementation of multiple stacks in an array?

22 Write a program in 'C' for the implementation of a Doubly Linked List ?

23 Explain sequential file organisation. What are various operations that can be
performed on it ? Also, list any two disadvantages of it.

24 Write algorithm for Heap sort. Also run your algorithm manually and show how sorting is done by your algorithm for the following sets of data ?

1 6 , 1 4 , 1 0 , 8 , 7 , 9 , 3 , 2 , 4 , 7

25 Compare Arrays with linked list by mentioning the advantages and limitations of both?
26 Why is Red-Black tree considered a better data structure than Binary Search tree and AVL tree ? Write algorithm to insert a node in Red-black tree. Take proper example also.

27 Sort the following numbers using Quick sort algorithm. Show all intermediate steps.
10, 70, 2, 32, 11, 48, 6, 19

28 Differentiate between singly linked list and Doubly linked list. Write algorithm to insert and delete elements in a singly linked list ?

29 What are the differences between sequential and direct file organisation ? Under what conditions, if any, is it advantageous to have the file organised as a direct file rather than sequential file ?

30 Write short notes on the following with an example
(a) Red Black Tree
(b) Multiple stacks
(c) Applications of Tree
(d) Kruskal's Algorithm.
(e) Binary search

31 Define the term "Complexity". For what types of applications is Time Complexity Critical and for what types of applications is Space Complexity Critical?

32 Write an algorithm to implement the following functions of a dequeue. Also, give an example to show the working of these functions ?
(i) Insert Element
(ii) Create DEQUEUE
(iii) Delete Element

33 Write an algorithm for multiplication of two sparse matrices?

34 What is cylinder - surface indexing ? Explain it with an example. Also, write its merits and demerits.

35 Define Abstract Data Type, and give two examples of it ?

36 Explain the following using an example
(ii) AVL Tree

37 Write a program to store the roll numbers and names of students in a binary search
tree. Write a function to accept a number and display the name of the student, whose
roll number matches with this number. Give suitable messages if the roll number does not
exist in the binary search tree ?
38 Write a program to simulate a circular queue using pointers with functions for insertion, deletion. (Use singly linked list)?

39 Write an algorithm for pushing an element into a stack?

40 Write a program to find the frequency of words in a given text. The list of words and
their corresponding frequency should be in the alphabetical order of words ?

41 Explain the properties and operations of AA trees ?

42 What are the essential features of a binary tree ? Explain, how a general tree can be converted into a binary tree ?

43 Write an algorithm to balance a Red-Black tree after deleting a node ?