Accounting and Financial Management (3) Analog and Digital Communication (2) Artificial Intelligence (2) BE(Civil) (2) BE(CSE) (83) BE(ECE) (11) BE(Mech) (10) Business Processes (3) C# and .NET Framework (2) Communication Skills (1) Compiler Design (1) COMPONENT BASED TECHNOLOGY (1) COMPUTER ARCHITECTURE (1) COMPUTER GRAPHICS and MULTIMEDIA SYSTEMS (6) COMPUTER INTEGRATED MANUFACTURING (1) Computer Networks (9) Computer Organization (2) Computer Programming (1) Consumer Behaviour (1) Control Systems (1) Cryptography and Network Security (3) Datastructures and Algorithms (10) Datawarehousing and Mining (1) DBMS (5) DESIGN AND ANALYSIS OF ALGORITHMS (9) DESIGN OF MACHINE ELEMENTS (1) DIGITAL PRINCIPLES AND SYSTEMS DESIGN (3) Discrete Mathematics (1) DISTRIBUTED COMPUTING (2) DSP (8) DYNAMICS OF MACHINERY (2) Economic Foundations (1) ELECTRICAL ENGINEERING (1) ELECTRICAL ENGINEERING AND CONTROL SYSTEMS (1) Electromagnetic Fields (3) ELECTRONIC CIRCUITS (1) ELECTRONIC COMMERCE (4) ELECTRONIC DEVICES AND CIRCUITS (1) EMBEDDED SYSTEMS (1) FUNDAMENTALS OF COMPUTING (2) Graphics and Multimedia (3) HEAT AND MASS TRANSFER (1) HUMAN RESOURCE MANAGEMENT (1) Internet Programming (9) INTRODUCTION TO FINITE ELEMENT ANALYSIS (1) Legal Aspects of Business (1) MANAGEMENT INFORMATION SYSTEMS (1) Marketing Management (1) MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (4) MATHEMATICS - I (1) MBA (9) MCA (83) MCA QUESTION BANK (2) MECHATRONICS (1) MicroProcessor and Controllers (4) MICROPROCESSORS AND APPLICATIONS (5) MIDDLE WARE TECHNOLOGIES (3) MOBILE COMPUTING (5) NETWORK PROGRAMMING (1) NUMERICAL METHODS (1) OBJECT ORIENTED ANALYSIS AND DESIGN (5) Object Oriented Programming (18) Operating System (2) OPERATING SYSTEMS (9) Organizational Behaviour (2) POWER ELECTRONICS (1) Principles of Management (8) PROBABILITY AND QUEUEING THEORY (2) Probability and Statistics (1) PROBLEM SOLVING AND PROGRAMMING (2) PROCESS PLANNING AND COST ESTIMATION (1) PROFESSIONAL ETHICS AND HUMAN VALUES (1) RANDOM PROCESSES (1) RESOURCE MANAGEMENT TECHNIQUES (2) ROBOTICS (1) Security analysis (1) Service Marketing (1) SIGNALS AND SYSTEMS (1) Software Engineering (8) SOFTWARE PROJECT MANAGEMENT (4) SOFTWARE QUALITY MANAGEMENT (2) System Software (2) TCP/IP PROTOCOL SUITE (3) Theory of Computation (4) Total Quality Management (2) UNIX AND NETWORK PROGRAMMING (4) Visual Programming (2) WEB GRAPHICS (2) WEB TECHNOLOGY (2) XML AND WEB SERVICES (4)

Saturday, July 19, 2008

CS 237-OBJECT ORIENTED PROGRAMMING/DEC04

B.E/B.Tech DEGREE EXAMINATION,NOV/DEC 2004
CS 237-OBJECT ORIENTED PROGRAMMING
PART A
1.Differentiate Object Oriented Object Based Programming Langauages.
2.Comment on the following overloaded function
Void inc(int i)
{
i=i+1;
}
Void inc(int i, int diff =1)
{
i=i+diff;
}
3.What is the ouput of the following program?
#include
main()
{
int i=3,j=5;
double x=33.5,y=10.0;
cout<<10+j%1<<”\n”;
cout<<<”\n”;
cout<<(19+i+j)/(2*j+2)<<”\n”);
cout<<<”\n”;
cout<<<”\n;
}
4.What is error in the following class declarations?
Class string{
Char *str;
Unsigned len;
String();
String(string& s);
String(unsigned size char = ‘ ‘);
String(unsigned size);
String & assign (Strong& s);
~String();
Unsigned getlen() const;
Char * getString();
}
5.Differentiate Overloaded and overriden funcions.
6.Consider the following program
Class fun
{
Public:
fun(void)
{
Cout<<”1”;}
fun(fun &x)
{ cout<<”2”;}
fun operator-(fun y)
{ fun test; return(test); }
};
If the function main is coded as fun a,b; what is its output?
7.What is the main purpose of a template in C++? Give an example.
8.Give any two examples of expressions.
9.Differentiate instance members and static members.
10. In java, Can a class be defined inside a method? If so,what rule governs access to the variables of the enclosing method? If not, give reasons.
PART B
11 (i) Define a class Counter to model a counter in its general form, Define classes to model special forms like Cyclic counter,down counter and step 2 down counter. Provide methods for the following opeations-step,display,reset.Write a JAVA program to test the classes

(ii)Differentiate abstract classes and interfaces.
12(a) Explain the following characteristics of object oriented programming with examples.
(i) Data Encapsulation
(ii) Polymorphism
(iii) Genericity
(iv) Inheritance.
13(a) (i) What are the characteristics of constructor functions? Describe various of constructors with examples.
(ii) Create a class that keeps track of its number of instances.
(b) Define a C++ class Matrix to describe a matrix.Equip the class with functions for addition and multiplication.Overload operators suitably for input and output of the matrix.
14 (a) (i) What are friends functions? Give an example to highlight its need? What is its limitations?
(ii)What are virtual functions? Give an example to highlight its need?
(b) Give an applications that fits the following inheritance hierarchy and write the program for the same. Each class should have atleast two data members and two functions members.
15.(a) Give the syntax of functions template.Write template functions for bubble sort.Write a test program to illustrate its use.

(b) (i) Give the hierarchy of console stream classes.
(ii) Explain how exceptions are handled in C++, Give examples to support your answer.

CS 237-OBJECT ORIENTED PROGRAMMING/MAY05

B.E/B.Tech DEGREE EXAMINATION,APRIL/MAY 2005
CS 237-OBJECT ORIENTED PROGRAMMING
PART A
1.Why is OOP methodology considered to be the better approach for real life problems?
2.What are the use of pointers in C++?
3.How do objects interact?
4.What is the differences between a constructor and destructor?
5.Give atleast two examples of compile time polymorphism.
6.Why is the derived class constructor called before the base class
Constructor?
7.Give the syntax of declaring a function template.
8.What are input and ouput streams?
9.What are the three kinds of class members?
10.What is meant by member access modifiers?
PART B
11 (i) Write a program that generates a template class by which one can perform integer type data addition and float type data addition also.
(ii) How are unusaul error conditions avoider using C++?
12(a) What are the elements of object oriented programming? Discuss them in detail.
(b) What are the various data types allowed in C++? Give one example for each type.
13 (a) (i) Using the concept of function overloading,write a program in C++ to find the maximum of three integers and three float numbers
(ii) Which are the C++ operators which cannot be overloaded.
14.(a) (i) Write a program which initialised 10 and 200 to member data and then calculate the sum of these.
(ii) Write a program which reads a complex number copy that into another. Use copy constructor for writing program.
(b) (i) What is the function of this pointers?
(ii) What do you understand by static member and static function? How to declare them?
15.(a) (i) Specify the accesss modifiers of the class members.
(ii) Give the general form of an interface and how is it implemented.
(b) (i) Give two parts of method declaration. How is a static method invoked? When will the method complete execution and return to the caller? How will methods return more than one result?
(ii) Write a program to compute the volume of a box.

CS237-OBJECT ORIENTED PROGRAMMING/MAY04

B.E/B.Tech DEGREE EXAMINATION,APRIL/MAY 2004
CS237-OBJECT ORIENTED PROGRAMMING
PART A
1.What is meant by data hiding.
2.Name atleast two OOPS languages other than C++.
3.How is “This pointer”useful in programming?
4.What is meant access specifier?
5.What is friend function?
6.Name the various types of multiple inheritance.
7.Is template a basic feature of C++.Justify your answer.
8.What are the classes in iostream.h header files?
9.Does Java support multiple inheritance justify your answer.
10.What is abstact class in Java?
PART B
11 (i) What is the main draw-back of structured programming? How OOP address this issue?
(ii) What are the elements of OOPS? How do these make OOPS approach best suited to address real world problems?
(iii)Briefly explain the Java runtime environment.
12(a) Explain copy constructor.
Write a program which reads a complex number and copy that into another. Use copy constructor for writing program.
(b) (i) What is the difference between register variable and automatic
Variable explain with example? What are other stroage classes for variables?
(ii)What is inline funtions? Explain with example.
What is the output of the following segment.
Void f1()
{
Int n=1;
n++;
cout<<”N:”<<<<”m:”<<
#include
Void main()
{
void f1();
void f2();
f1();
f2();f2();
f2();
getch();
}
13 (a) (i) Write a program which reads the bio-data and records of two
Sessional and then print final result. Make seperate class for bio-data,sessional 1, sessional 2 and final result. Sessional 1 and sessional 2 classes are derived form bio-data class. Find result in defined from sessional 1 and sessional 2 classes.
(ii) Explain the concepts identify in the program.
(b) (i) What is meant by overloading? How is operator overloading works?
(ii) Write a program to add 2 complex numbers using operator overloading. What are the operators that cannot be overloaded in C++?
14 (a) (i) Write a program which generate a template class by which one can perform integer type data addition and float type data additio also.
(ii) What is the need for and advantages of templates? What is the difference between function templates and class template?
(b) (i) What is exception handling? Explain
(ii) For handling exception what type of construct are available in C++.
(iii) Explain the concept of streams in C++ and give the hierarchy of different types of stream.
15 (a) Defines interfaces in Java. How interfaces are implemented? How they can be accessed? How to apply interfaces? What is meant by extension of interfaces? Explain with an example.
(b) (i) How is object class created in Java environment? Discuss on objects in Java.
(ii) What is meant by overloading objects? How are rested classes used in Java?


CS237—OBJECT ORIENTED PROGRAMMING/DEC05

B.E/B.Tech DEGREE EXAMINATION,NOV/DEC 2005
CS237—OBJECT ORIENTED PROGRAMMING
PART A
1.Which feature of object oriented programming provides(a) data hiding (b) reusability?
2.List any two drawbacks of procedures oriented languages.
3.What is unique about this pointer?
4.What is a default constructor?When is it used?
5.What effect does inheritance have on the working of constructors and be overloaded only by friend functions?
6.What effect does inheritance have on the working of constructors and destructors?
7.Write a function templates to swap two variables.
8.What is the differences between the statements? Cin>>ch;ch=cin.get();
9.List out any two salient differences between C++ and Java.
10.Differentiate overloading and overriding.
PART B
11. (i) Design template classes such that they support the following statements:
Rupeer1,r2;
Dollard1,d2;
d1=r2;11 converts rupee to dollar(US)
(ii) Explain the exception handling model of C++ with various constructs
Supported by it. Write a program which transfers the control to userSupported by it.Write a program which transfers the control to user defined terminate function when raised exception is uncaught.
12(a) What is object oriented paradigm? Explain the various features of Paradigm.
(b)Define the following terms related to OO paradigm:
(i) Message passing
(ii)Delegation
(iii)Genericity
(iv)Persistance
13(a)(i)Write a program for manipulating coordinates in polar coordinate system.Represent points as objects.The class polar must include data members such as radius and theta and member functions such as add(),sub(),angle()etc.
(ii)What are the rules associated in defining constructors and destructors?
(b)(i) Write a program to read a matrix of size m x n from the keyboardadn display the same on the screen. Made row parameter as default argument.
(ii) Waht are(1) static(*2)constan members? Give examples to support your explanation.
14(a) Create two classes DM an DB to store the value of distances.DM stores distances in meters and centrimeters and DB in feet and inches. Write a program that can read values for the class object and add one object of DM with antother object of DB.Use a friend function to carry out the addition operation.The object that stores the results may be a Dm or DB object depending on the units in which the results are required. Tyhe display should be in ft-inches or mt-cm depending on the object of display.
(b)Write a C++ program to model the following inheritance hierarchy.

15.(a)Define an interface that declares the methods count and print for a collection of items. Define another interface that declares a method to search for an item. Define a class integer collection to represent a collection of integers and provide methods to count the number of items,print the number of items, search for an item and find the sum of all integers int the collection. Define another class string set that implements all the methods defined in both these interfaces on a collections of strings. Write a test program to test these classes.
or
(b) (i) How are abstact classes different from interfaces?
(ii) Create a class to model entries in a telephone directory (name address,phone,number).Define suitable classes and inheritance hierarchy.Write a program to test these classes.

Tuesday, July 15, 2008

CS1304 – MICROPROCESSORS & MICROCONTROLLERS-MAY07

B.E DEGREE EXAMINATION, APRIL/MAY 2007

CS1304 – MICROPROCESSORS AND MICROCONTROLLERS

 PART A – (10 x 2 = 20 marks)

1. How address and data lines are demultiplexed in 8085?
2. What is the function performed by SIM instruction in 8085?
3. What is pipelined architecture?
4. How the interrupts can be masked/unmasked in 8086?
5. What are the signals involved in memory bank selection in 8086
micro processor?
6. How clock signal is generated n 8086? What is the maximum internal clock
frequency of 8086?
7. What is the function of gate signal in 8254 timer?
8. Write the format of KW1 in 8259.
9. List the interrupts of 8051 micro controller.
10. What are register banks in 8051 microcontroller?

PART B – (5 x 16 = 80 marks)

11. (a) (i) Explain the various logical and arithmetic instructions available in 8085
microprocessor. (10)
(ii) Explain the function of various flags of 8085 microprocessor (6)
(Or)
(b) (i) Differentiate between I/O mapped I/O and memory mapped I/O. (6)
(ii) Write an 8085 assembly language program to convert 8 bit binary to
ASCII code. (10)

12. (a) (i) Describe the action taken by 8086 when INTR pin is activated. (6)
(ii) Write an assembly language program in 8086j to search the largest data in
an array. (10)
(Or)

(b) (i) Discuss the various addressing modes of 80896 microprocessor. (10)
(ii) Explain the following assembler directives used in 8086
(1) ASSUME
(2) EQU
(3) DW (

13. (a) (i) Explain in detail about memory access mechanism in 8086 (
(ii) Explain the function of following 8086 signals.
(1) HLDA
(2) RQ/GTO
(3) DEN
(4) ALE. (
(Or)
(b) (i) Draw and explain a block diagram showing 8086 in maximum mode
configuration. (12)
(ii) What are the advantages of the multiprocessor systems? (4)

14. (a) (i) With the help of block diagram explain the operation of USART (8251A)
(10)
(ii) Discuss the salient features of 8259 – programmable interrupt controller.
(6)
(Or)
(b) (i) Describe the various modes of operations in 8253 programmable interval
Timer. (
(ii) Explain the operation of DMA controller (8237).

15. (a) With a suitable block diagram, explain the architecture of 8051 microcontroller.
(16)
(Or)
(b) Discuss in detail about 8051 based stepper motor control along with necessary
hardware and software. (16)

CS432 – WEB TECHNOLOGY MAY08 (IP)

  M2115
B.E DEGREE EXAMINATION, APRIL/MAY 2008
CS432 – WEB TECHNOLOGY
Part –a
1. Distinguish between internet and www.
2. Define protocol. What protocols are used to retrieve data from internet.
3. Distinguish between a HTML hyperlink and anchor.
4. What are the merits and demerits of using CGI.
5. What are multicast sockets.
6. What is remote method invocation.
7. How is the cascaded style sheet linked to the HTML PAGE.
8. Distinguish between DHTML and XML.
9. How can you monitor user events.
10. What are the uses of plugins.

Part –b
11. A)
 i. With an example , explain the client – server model indicating all the interactions that take place between the client and the server.

ii. What is FTP. What are its salient features.
Or
b) Design a web calculator that works like a real physical calculator. The calculator must perform atleast 8 different mathematical functions.

12. A) With a suitable example explain the form tag and all the related form elements.
Or
b) Give suitable examples and explain CGI client side and server side applets.

13. A) What a program that displays whatever is entered on the server system into the client system.

Or
  b) Write a RMI application to access the remote method which computes the sum of squareds of all the non-diagonal elements of a square matrix.
14. a)
i. what is DTD. What are its uses, write the DTD for a given schema.
ii. Explain any one of the objects in JSP.
or
b)
i. How does HTML differ from DHTML . give suitable examples to justify your statements.
 ii. Given the employ code write a java serve let to retrieve the name and designation of an employee from the database.
15). A) With a suitable example, explain the steps involved in establishing a JDBC connectivity.

Or
b). With a suitable example explain the system and software requirements for an online application .

IT1451 – WEB TECHNOLOGY MAY08 (IP)

  V4223
B.E DEGREE EXAMINATION, APRIL/MAY 2008
IT1451 – WEB Technology

Part –a
1. What are the two major protocols for accessing email from servers.
2. Find the error in the following code segment and explain how to correct it for(y=0.1;y!=1.0;y+””)
Document.write(y+””);
3. What is the important feature of dynamic positioning .
4. List the possible opacity attributes of dynamic positioning.
5. Write some commonly used video file formats.
6. Explain the difference between get request and post request type.
7. What is XSL and why it is used.
8. Explain cookies.
9. What are the types of directives in JSP.
10. When it is useful to redirect a request to a different resource.

Part –b
11. A)
 i. Describe the java script global functions in detail.

ii. Use a one dimensional array and write a script to solve the following problem. Read in 20 numbers , each of which is between 10 and 100. As each number is read , print it only if it is not a duplicate of a number that has already been read.
Or
b) Write a script that inputs a telephone number as a string in the form (555)555-555. The script should use strings method split to extract the area code as token and the last four digits of the phone numbers as a token. Display the area code in one test field and the seven digit phone number in another text field.

12. A)
i. Create a web page that applies the invert filter to an image if the user moves the mouse over it.
ii. Explain the properties of the event object.
Or
b) demonstrate a simple use of data binding with the tabular data control to update the contents of a span element with a program.

13. A)
i. Describe the system architecture of a multi-tier application.
ii. Create a script that repeatedly flashes an image on the screen. Do this by changing the visibility of the image. Allow users to control the blink speed.

Or
  b) discuss the various models of e-business in a detailed fashion.
14. a) How document manipulation is done with XML document object module and explain in detail the various methods of DOM.


or
b)
i. Explain session tracking. How it provides personalized services to consumers.
 ii. Describe the features of ASP with examples.
15). A)
i. Describe the servlet architecture and the various interfaces invoked by the servlet container
ii. write a servlet program that handles HTTP get request containing data that is supplied by the user as a part of the request.

Or
b).
i. What does JSP scripting component include. Explain with a program.
ii. Describe JSP standard actions. How does standard actions provide JSP implementers with access to several of the most common tasks performed in JSP.

GE406 – TOTAL QUALITY MANAGEMENT MAY08

  M2173
B.E DEGREE EXAMINATION, APRIL/MAY 2008
GE406 – TOTAL QUALITY MANAGEMENT

Part –a 
1. Define Quality 
2. define total quality management.
3. What is meant by empowerment.
4. Differentiate between internal and external customers.
5. Given any two applications of normal distribution.
6. Name any tow measures of central tendency.
7. list any two reasons to benchmark.
8. List any two advantages of QFD.
9. List any two benefits of ISO 14000.
10. What is meant by quality auditing.

Part –b
11. A)  
i. Select any service organization and discuss how garvin’s eight dimensions of quality can apply.
ii. Explain prevention and appraisal costs by giving examples.
Or
b) 
i. Explain deming’s philosophy
ii. Explain quality council. In general describe its composition and duties.

12. A)  
i. explain juran’s trilogy.

ii. List and explain the six most important factors that influence consumer purchases.

Or
b) 
i. List the five levels in maslow’s hierarchy of needs and describe each.
ii. Explain the conditions for selecting and evaluating the suppliers.

13. A).  
i. Explain Interrelationship diagraphs by giving examples.
ii. The following data gives the number of nonconforming ROM chips in samples of size 200. Construct a p-chart for these data. Assume that any values beyond the control limits have an assignable cause and revise the control limits as appropriate.
Sample number : 1 2 3 4 5 6 7 8 9 10 11 12
NON-conforming : 14 37 18 17 21 16 16 23 14 14 21 24

 
Or
  b) 
i. With the help of examples explain matrix diagram.
ii. A process fills boxes with corn flakes. The manufacturer is interested in the weight of the contents of each box. Develop the x and R charts for the process. Historical data are as follows.
Sample: 1 2 3 4 5 6 7 8  
X :16.2 16.1 16.12 15.93 16.02 16.18 15.87 15.80 
R :.4 .38 .42 .15 .08 .23 .36 .42

14. a)  
I. Explain How The Taguchi Loss Function differs from the traditional loss function assumed form specifications and tolerance.
II. Explain FMEA with an example.
Or
b). 
i. Explain the six major losses of TPM.
ii. explain the house of quality.
15). A) i. Write short notes on ISO 14000
 ii. What is documentation. Explain the documents that are needed to be prepared while implementing ISO 9000 in companies.
Or
b). 
i. Write short notes on QS9000
ii. WHAT are the advantages and limitations fo ISO 9000

MG 1401 – TOTAL QUALITY MANAGEMENT MAY08

  V4244
B.E DEGREE EXAMINATION, APRIL/MAY 2008
MG 1401 – TOTAL QUALITY MANAGEMENT

Part –a 
1. List down any tow of the analysis techniques for quality cost.
2. Define quality as per crosby
3. Explain service quality.
4. Explain kaizen.
5. Mention the various measurements of dispersion.
6. list down the seven tools of quality.
7. List down the types of FMEA.
8. Explain benchmarking process.
9. What do you understand by NCR.
10. Explain the need for ISO 14000 QUALITY SYSTEMS.

Part –b
11. A)  
i. Explain about quality council and quality planning
ii. Explain about deming’s philosophy. 
Or
b) 
i. Explain the conhtribution of juran to the quality movement.
ii. Discuss about the implementation steps of TQM and mention the importance of the management commitment.

12. A) explain the following
i. Juran triology
ii. PDSA cycle
iii. Maslow’s theory of need hierarchy.
Or
b) discuss about the supplier partnership procedures.

13. A). Explain about the new seven tools of quality and its applications in detail.
 
Or
  b) Discuss about the need, types, construction, and applications of control charts.
14. a) Discuss about the objectives , process, outcome and benefits of quality functional deployment(QFD).  
 
Or
b). explain briefly about the following 
i. Taguchi quality loss function.
ii. pillars of TPM.
15). A) explain about the philosophy and the requirements of ISO 9000:2000
 
Or
b). 
i. Discuss about the documentation process in ISO 9000:2000 system.
ii. Explain about the auditing process and role of external agencies.

CS1401 - INTERNET PROGRAMMING MAY08

  V4129
B.E DEGREE EXAMINATION, APRIL/MAY 2008
CS1401 - INTERNET PROGRAMMING

Part –a 
1. List out the devices used to form internet work and specify each one of its purpose.
2. What Is The Use Of MIME
3. What is meant by serialization of objects in Java.
4. Write a java program to load and display an image.
5. State about the different usage of HTML flames.
6. List out the objects involved in java script with its purpose.
7. Define DHTML event bubbling
8. Write down the DHTML syntax for bind an image to the data and sort the data.
9. Write about servlet life cycle.
10. Define servlet cookies.

Part –b
11. A) Explain the steps involved in making the communication using TCP/IP with neat diagram.
 
Or
b) write a program using CGI and explain how CGI WORKS.

12. A) Explain java networking using sockets with your own examples program.
Or
b) write a java program for creating email client and protocol handling .

13. A). write a HTML program for the registration of new customer to the online banking system. ( customer data collected using a form , after submitting account number and type of account and username , password is displayed as output.)
 
Or
  b)  
i. write a java script to print a marklist for 10 student s in a HTML table.
ii. Write a javascript that inputs a telephone number as a string in the form of (555) 555-5555. The script should use string method split to extract the area code as a token. The first 3 digits of the phone number as a token , the last 4 digits of the phone number as a token. Display the area code in one text field and seven digit phone number in another text field.
14. a) apply DHTML chroma and flip filter and reveal trans transition for an image.
or
b) write a DHTML program to handle any three mouse events.
15). A) explain how servlet deals HTTP get and post requests with an example program.
 
Or
b). Write a program for banking application using JDBC (consider 5 customer create a/c no and type, set some minimum balance do credit and debit operation and print consolidated report for month wise transaction.)

IT1352 – CRYPTOGRAPHY AND NETWORK SECURITY MAY08

  T3315
B.E DEGREE EXAMINATION, MAY 2008
IT1352 – CRYPTOGRAPHY AND NETWORK SECURITY

Part –a 
1. What is the advantage and disadvantage of one time pad encryption algorithm.
2. If a bit error occurs in plain text block p1 , how far does the error propagate in CBC mode of DES.
3. When do we say an integer a, less than n is a primitive root of n. state the conditions for having at least one primitive root or n.
4. What for the miller-rabin algorithm is used.
5. Draw a simple public key encryption model that provides authentication alone.
6. Identify any two applications where one way authentication is necessary.
7. Why the leading two octets of message digest are stored in PGP message along with the encrypted message digest.
8. State any tow advantages of Oakley key determination protocol over diffie hellman key exchange protocol.
9. How are the passwords stored in password file in UNIX operating system.
10. What is meant by polymorphic viruses.

Part –b
11. A) i. Discuss any four substitution cipher encryption methods and list their merits and demerits .

ii. how are diffusion and confusion achieved in DES.
Or

b) 
i. in AES, explain how the encryption key is expanded to produce keys for the 10 rounds.
ii. Explain the types of attacks on double DES and triple DES.

12. A)  
i. How are arithmetic operations on integers carried out from their residues modulo a set of pair wise relatively prime moduli. Give the procedure to reconstruct the integers form the residue.
ii. How is discrete logarithm evaluated for a number . what is the role of discrete logarithms in the diffie hellman key exchange in exchanging the secret key among two users.
 
Or
b) i. Identify the possible threats for RSA algorithm and list their counter measures.
ii. state the requirements for the design of an elliptic curve crypto system. Using that , explain how secret keys are exchanged and messages are encrypted.

13. A).  
i. Describe digital signature algorithm and show how signing and verification is done using DSS.
ii. Consider any message M of length 4120 bits ending with ABCDEF in hexadecimal form. Construct the last block of message to be given as input for the MD5.
 
Or
  b) i. Explain the processing of a message block of 512 bits using SHA1.
ii. write about the symmetric encryption approach for digital signatures.

14. a) i.Describe the authentication dialogue used by Kerberos for obtaining services from another realm.
ii. Explain with the help of an example how a user’s certificate is obtained from another certification authority in x509 scheme.
Or
b). i. what are the functions included in MIME in order to enchance security how are they done..
ii. why does PGP maintain key rings with every users. Explain how the messages are generated and received by pgp.
15). A)  
i. Explain any tow approached for intrusion detection.
ii. Suggest any three password selection strategies and identify their advantages and disadvantages if any.
Or
b). i. Identify a few malicious programs that need a host program for their existence.
ii. Describe the familiar types of firewall configurations.

IT1352 – CRYPTOGRAPHY AND NETWORK SECURITY

  R3414
B.E DEGREE EXAMINATION, NOV 2007
IT1352 – CRYPTOGRAPHY AND NETWORK SECURITY

Part –a 
1. What is avalanche effect.
2. What are the types of attacks on encrypted message.
3. Find gcd(56,86) using euclid’s algorithm.
4. Why elliptic curve cryptography is considered to be better than RSA.
5. what is masquerading.
6. Define weak collision property of a hash function.
7. what is x.509 standard.
8. Give IPSEC ESP FORMAT.
9. What are honey pots.
10. List down the four phases of virus.

Part –b
11. A) Discuss in detail encryption and decryption process of AES.

Or

b) 
i. Briefly explain design principles of block cipher.
ii. Discuss in detail block cipher modes of operation.

12. A)  
i. Discuss in detail RSA algorithm , highlighting its computational aspect and security.
ii. Perform decryption and encryption using RSA algorithm with p=3 q=11 e=7 and N=5.

Or
b) Briefly explain Deffie Hellman key exchange with an example.

13. A).  
i. Explain authentication functions in detail.
ii. What is meant by message digest give example.
 
Or
  b) i. Briefly explain digital signature algorithm.
ii. Discuss clearly secure hash algorithm.

14. a) i. What is Kerberos . Explain how it provides authenticated service.
ii. Explain the architecture of IPSEC.
Or
b). i. Explain handshake protocol actions of SSL.
ii. Discuss in detail secure electronic transaction.
15). A)  
i. Explain firewalls and how they prevent intrusions.
ii.Explain the concept of reference monitor.
Or
b). i. Define intrusion detection and the different types of detection mechanisms, in detail.
ii. Comment on password selection strategies and their significance.

CS1010 – C# AND .NET FRAMEWORK MAY08

  V4104
B.E DEGREE EXAMINATION, APRIL/MAY 2008
CS1010 – C# AND .NET FRAMEWORK

Part –a 
1. What are boxing and unboxing
2. Define inter-operability. How does .net Achieve this?
3. Distinguish between ref and out parameters
4. What is inclusion polymorphism.
5. What is disconnected data architecture. What is the advantage of this.
6. What is the use of data adapter.
7. What are post back events. Give example.
8. Define marshaling.
9. Differentiate between data reader and data set.
10. What is DLL hell. How it is rectified in .NET.

Part –b
11. A) EXPLAIN THE FOLLOWING
i. For each 
ii. Structures
iii. Arrays
iv. Array list
Or
b) 
i. Describe the characteristic of .net architecture.
ii. Discuss about indexers in detail.

12. A) explain creating and using delegates with example.

Or
b) Discuss about inheritance and polymorphism in detail.

13. A). Write a program using ADO.NET to connect to the northwind database and read the names of the employees. The employee table has 2 fields namely first name and last name.
 
Or
  b) implement the following in datasets
i. Adding a row
ii. Adding a new data column
iii. Deleting a row
iv. Updating a row 
14. a) i. Describe in detail the lifecycle of webform.
ii. Explain any one data bound control in a program.
Or
b). Explain the creation of calculator web-service. Test this program using a client program.
15). A)  
i. Describe about assembles in detail.
ii. What is reflection. Explain with example.
Or
b). Write a remoting application which returns the maximum and minimum temperature of a given city.

Sunday, July 6, 2008

CONSUMER BEHAVIOR JAN07 - M.B.A

K4520
M.B.A DEGREE EXAMINATION, NOVEMBER/DECEMBER 2007
BA1724 –CONSUMER BEHAVIOUR

Part –a 
1. List the factors influencing consumer behavior.
2. Define buying process
3. What do you mean by consumer perception.
4. Can consumer attitude towards brands be charged
5. What is the meaning of cross – cultural analysis.
6. Define group dynamics.
7. What is meant by cognitive dissonance.
8. What are the stages in decision – making.
9. Explain the need for consumer protection.
10. What are the difficulties in predicting consumer behavior.

Part –b
11. A) outline the scope of consumer behavior. What are the disciplines that contributed to consumer behavior as a subject of study.
Or
b) list and explain the individual determinants of consumer behavior.

12. A) explain with examples manifest and intent motives in consumer behavior.
Or
b) discuss the family life style stages and the changing consumption pattern.

13. A)what factors influence reference groups to make decisions on products and brands.
Or
b) what are the marketing implications of culture. What is the role of marketer in this connection.
14. a) what are the different models of consumer decision process. Explain any one model
or
b)what is meant by consumer attitude. What are its components and functions.

15). A) discuss the influence of social sciences on buyer behavior.

Or
b). explain why consumer protection act was passed. Has it succeeded in achieving its objective.

ARTIFICIAL INTELLIGENCE MAY08 - B.E

T 3184
B.E DEGREE EXAMINATION, APRIL /MAY 2008
SIXTH SEMESTER
CS 1351 –ARTIFICIAL INTELLIGENCE

Part –a 
1. Define artificial intelligence
2. What is the use of heuristic functions
3. How to improve the effectiveness of a search based problem solving technique
4. What is constraint satisfaction problem
5. What is unification algorithm
6. How can you represent the resolution in predicate logic
7. List out the advantages of non monotonic reasoning
8. Differentiate between JTMS and LTMS
9. What are framesets and instances
10. List out the important components of a script

Part –b
11. A) 
i) give an example of a problem for which breadth first search would work better than depth first search.
II) explain the algorithm for steepest hill climbing 
Or
b) explain the following search strategies 
i) best first search
ii) A* search

12. A) explain min-max search procedure
Or
b) describe alpha-beta pruning and give the other modifications to the minmax procedure to improve its performance.

13. A) illustrate the use of predicate logic to represent the knowledge with suitable example.
Or
b) consider the following sentences
• John likes all kinds of food
• Apples are food
• Chicken is food
• Anything anyone eats and isn’t killed by is food
• Bill eats peanuts and is still alive
• Sue eats everything bill eats
i) translate these sentences into formulas in predicate logic
ii) prove that john likes peanuts using backward chaining
iii) convert the formulas of a part into clause form 
iv) prove that john likes peanuts using resolution 
14. a) i) with an example the logics for non monotonic reasoning 
or
b) explain how Bayesian statistics provides reasoning under various kind s of uncertainty.

15). A) i) construct semantic net representations for the following .
• pomepeian (marcus), blacksmith(marcus)
• mary gave the green flowered vase to her favorite cousin.
ii)construct partitioned semantic net representations for the following :
• every batter hit a ball 
• all the batters like the pitcher 
Or
b). illustrate the learning from examples by induction with suitable example.




SOFTWARE ENGINEERING MAY08 - B.E.

T 3608
B.E DEGREE EXAMINATION, APRIL /MAY 2008
SIXTH SEMESTER
CS 1353 – SOFTWARE ENGINEERING

Part –a 
1. Define software engineering
2. Distinguish between verification and validation
3. Define s/w architecture
4. What is QFD
5. What are the problems makes elicitation difficult 
6. What are the types of interface design
7. Mention any two characteristics of s/w testing
8. What is the purpose of unit testing
9. Define s/w measure
10. How will you calculate average reachability

Part –b
11. A) EXPLAIN in detail the following s/w process models with a neat diagram.
i) Incremental process model.
II) Evolutionary process model.
Or
b) How does a system engineering differ from software engineering . Also write brief notes on computer based systems and system engineering hierarchy.

12. A) State and explain the requirements engineering tasks in detail.
Or
b) i) describe the primary difference between structured analysis and object oriented analysis.
ii) Write a detailed note on scenario based modeling.
13. A) Explain the fundamental software design concepts in detail.
Or
b) explain the following 
i) SCM repository
ii) SCM process
14. a) i) describe the testing objectives and its principles.
ii) Explain the basis path testing in detail.
or
b) i) what is need for software maintenance and maintenance report.
ii) What are the attributes of a good test. Explain the test case design.

15). A) i) Explain the CASE repository functions In detail.
ii) Explain the various method encountered in cost estimation.
Or
b). software project scheduling does not differ from scheduling of any other multitask engineering projects. Discuss.

MARKETING MANAGEMENT JAN07 - M.B.A

Z4510
M.B.A DEGREE EXAMINATION, MAY/JUN 2007
SECOND semester
BA1653 –MARKETING MANAGEMENT

Part –a
1. What is product concept
2. What is a global environment
3. Define introduction stage of PLC
4. What are the socio economic factors in segmentation.
5. Who is an industrial buyer
6. What is service marketing
7. What is marketing research
8. Who is a satisfied customer
9. What is online marketing
10. What is marketing challenge

Part –b
11. A) explain marketing concept and compare with selling concept. Give examples
Or
b) discuss marketing environment in today’s competitive world.

12. A) Explain brand management practices in india
Or
b) Discuss the important features of skimming pricing. Give examples

13. A) What are the factors that determine customer satisfaction. Explain.
Or
b) Discuss service marketing with particular reference to commercial banks.
14. a) State the plan to carry out brand preference study with suitable examples .
or
b) Explain the contents in a marketing research report with subdivisions

15). A) Discuss online marketing process and its futures in India.

Or
b).What are the emerging opportunities and challenges to a marketer of consumer durables.

ECONOMIC FOUNDATIONS FOR BUSINESS JAN07 - M.B.A

Z4502
M.B.A DEGREE EXAMINATION, JANUARY 2007
First semester 
BA1602 – ECONOMIC FOUNDATIONS OF BUSINESS ENVIRONMENT

Part –a 
1. Define national income.
2. State the meaning of balance of payment (BOP).
3. What do you mean by business cycle.
4. Define multiplier.
5. Bring out the importance of money supply.
6. List out the factors determining money supply.
7. What does “philips curve”convey.
8. What do you mean by inflation.
9. Write a short note on foreign trade policy.
10. What do you understand by international trade multiplier.

Part –b
11. A) explain in detail the circular money flow with saving and investment.
Or
b)enumerate the objectives of Indian economic planning.

12. A)critically examine the phases of business cycles.
Or
b)illustrate the two fiscal methods of fiscal policy to get the economy out of recession.

13. A)what are the various measures available to estimate the money supply . discuss them in detail.

Or
b) explain how expansionary monetary policy works according to ‘keynesian view’.
14. a) describe the effects of inflation on output and distribution of income.
or
b) elucidate the causes of unemployment in developing countries.

15). A) what are the various gains that encourage free trade. Explain them in detail.

Or
b). discuss the salient features of EXIM POLICY 2002-2007.





ORGANIZATIONAL BEHAVIOR JAN07 - M.B.A

Z4504
M.B.A DEGREE EXAMINATION, JANUARY 2007
First semester 
BA1604 – ORGANIZATIONAL BEHAVIOR

Part –a 
1. What ARE rational an emotional behavior model.
2. What is personality.
3. What is halo effect.
4. What is vicarious learning
5. Define maslow’s need hierarchy theory.
6. What is Delphi technique.
7. What is referent power
8. What is grapevine communication
9. What is culture shock.
10. What is organizational development(OD).

Part –b
11. A) what are the methods to deal with resistance to change.
Or
b) what are the political strategies which can be opted by individuals and subunits who want to exhibit political behavior.

12. A) describe some dimensions of organization culture.
Or
b)describe the characteristics of the OD approach to manage of change.

13. A)describe the internal contingency factors and external contingency factors which have their impact on organisal design.

Or
b) what is transation analysis. Describe its advantages and limitations.
14. a) what are the factors influencing organizational communication
or
b)describe the trait theory of leadership.

15). A)how do groups make decision. What are the advantages and disadvantages of group decision making.

Or
b). what are the factors influencing perceptions . how the perception process is managed.




communication skills jan07- M.B.A

Z4505
M.B.A DEGREE EXAMINATION, JANUARY 2007
First semester
BA1605 –COMMUNICATION SKILLS

Part –a 
1. Define personal communication. Does it affect the attitude of individuals.
2. Identify the elements involved communication process
3. How do you give constructive feedback.
4. Name the activities involved in listening.
5. Write the purpose of business letters.
6. Briefly describe the process of writing business messages.
7. Define business report.
8. explain the term proposal . name the types of proposals.
9. What are the different ways of organizing a report.
10. What is structural coherence helpers.

Part –b
11. A) list the type of internal operational and external operational communication that may occur in a medium sized apparel manufacturing unit.
Or
b)explain the verbal and non verbal barriers to communication.

12. A) meetings involve oral communications . in a meeting a person will be either a leader or a participant. Elucidate the importance leader and participant role in a meeting.
Or
b) international business would not be possible without international communication . comment on the statement.

13. A)in yesterday’s daily newspaper you saw an advertisement about some property that just might be what you have been looking for:
Rocky mountain lodge on 269 scenic acres of forest, breathtaking mountain view, running stream through property. Twenty two rooms, 25 baths, large kitchen, dining room , and lobby. Giant fireplace. There service buildings. Two tennis courts, a steal at $2,450,000 p.o box 7413,Denver , CO 802209.

One of the industrial clients of your real estate business is seeking a building like this. The area and the price are right. But your client has some specific requirements that the advertisement doesn’t cover. So you will write a letter to the advertiser to determine whether the place meets those requirements.

Your client wants a place that is easily accessible through out the year by auto mobile because the building would be used as a corporate retreat and training centre, tow rooms suitable for the meetings of up to 15 people 2 would be needed. Then there should be at least 15 rooms suitable for bed rooms. It would be helpful if the advertiser could send you the picture of the place or a brochure. Also you had like to know the real estate taxes on the property and how old is the structure. You may think o f the facts your client should know before inspecting the property . now write the enquiry letter.
Or
b) write a sales letter to promote the sales of any one of the following.
i. a financial product.
ii. an educational service.
14. a) answer the following
i. what are the common characteristics of business reports.
ii. What are the common types of business reports.
or
b) write the detailed answer on the common content for research proposal . give an example of your own research proposal.

15). A) how do yoy collect dat for your report. Describe the merits and demerits of the various data collection methods.

Or
b). write a short report on the topic business communication.




SECURITY ANALYSIS & PORTFOLIO MGMT MAY08 - M.B.A

Z4525
M.B.A DEGREE EXAMINATION, may/june 2008
BA1727 –SECURITY ANALYSIS AND PORTFOLIO MANAGEMENT

Part –a 
1. WHAT ARE the two major types of information necessary for security analysis
2. What are the features of preference shares.
3. What do you mean by underwriting.
4. What is demutualization of stock exchanges
5. What do you understand by fundamental approach to security analysis 
6. Define multiplier
7. Explain the three types of trends in stock prices
8. What do you infer from the moving average theory of technical analysis
9. What is an index fund.
10. What is the difference between SML AND CML.

Part –b
11. A) as an investment advisor what features would you suggest to be included in the investment bunch of a client explain the features briefly.
Or
b) security analysis requires as first step the sources of information on the basis of which analysis is made. What are different types of information used for security analysis

12. A) who are the key players involved in the new issues market.
Or
b)what are the objectives and functions of SEBI

13. A)industry life cycle exhibits the status of the industry and gives the clue to entry and exit for investors. Elucidate.
Or
b) how does ratio analysis reflect the financial health of a company.


14. a) how would you use ROC to predict the stock price movement . kindly elucidate with example.
or
b)chart patterns are helpful in predicting the stock price movement comment.

15). A) the following three portfolios provide the particulars given below .
Portfolio average annual return standard deviation correlation co-efficient
A 18 27 0.8
B 14 18 0.6
C 15 8 0.9
MARKET 13 12 -
RISK free rate of interest 9%
i. rank these portfolios using sharpe’s and treynor’s methods
ii. compare both the indices
Or
b).what are the basic assumptions of CAPM. What are the advantages of adopting CAPM model in the portfolio management.




LEGAL ASPECTS OF BUSINESS JAN07-M.B.A

                                                                                                  Z4507

M.B.A DEGREE EXAMINATION, january 2007

First semester

BA1607 –LEGAL ASPECTS OF BUSINESS

 

Part –a

1.       What is consent

2.       Define consideration

3.       Define void contract

4.       Whether an agent and the servant same . give example

5.       Define hundi

6.       Define ultravires

7.       What is the prospectus

8.       Define factory

9.       What is the objective of VAT

10.   What is the medium of payment of wages

 

Part –b

11.   A) what are the characteristics of a company

Or

b) discuss the exceptions to the doctrine of indoor management.

 

12.   A) give a detailed description of the parties to negotiable instrument

Or

b)discuss the exceptions of the doctrine of caveat emptor.

 

13.   A) explain the various kind of agreements.

Or

           b)  examine the essentials of contract.

14.   a)  explain the conditions on which strikes and lockouts are prohibited

or

b) discuss the provisions regarding the health of workers

 

15). A)  explain the mode of charging the sales tax

 

Or

b).trace the history of consumer protection act and its relevance today.

 

Friday, July 4, 2008

SYSTEM SOFTWARE 2006 - B.E CSE

PART A – (10 ´ 2 = 20 marks)

1. What are the different registers used in SIC?

2. What is base relative addressing?

3. What is a symbol t able? How is it useful?

4. How are jump instructions assembled?

5. What is a Boostrap loader?

6. Mention the use of FIXUPP records.

7. How are MACROS defined?

8. What are positional parameters? How do they differ from keyword parameters?

9. Write the tasks accomplished by the document editing process.

10. What do you mean by tracing?

PART B – (5 ´ 16 = 80 marks)

11. (a) Explain in detail the architecture of SIC machine. (16)

Or

(b) (i) With instruction formats, explain the instruction set of SIC/XE. (8)

(ii) Highlight the salient features of SIC/XE machine architecture. (8)

12. (a) (i) Explain the concept of program relocation. (11)

(ii) With syntax, explain the usage of different symbol defining statements in

an Assembler. (5)

(b) (i) What are the different types of expressions supported by an Assembler?

Explain with examples. (8)

(ii) Describe the design of One Pass Assembler. (8)

13. (a) Explain the different machine independent loader features in detail. (16)

Or

(b) (i) With a neat flow diagram, explain the working of Linkage editors. (8)

(ii) Write a note on MSDOS

Linker. (8)

14. (a) (i) Discuss in brief about the different data structures used by a macro

processor.

(ii) What is the need for concatenation of macro parameters? Explain how it

is done. (8)

Or

(b) Write notes on the following:

(i) Conditional macro expression (8)

(ii) Recursive macro expression. (8)

15. (a) With a neat diagram, explain the structure of an editor.

Or

(b) Discuss in detail about the various issues related to an interactive debugging

system. (16)
 

THEORY OF COMPUTATION 2006 - B.E CSE

PART A – (10 X 2 = 20 MARKS)

1. What is the difference between DFA and NFA?

2. Give regular set for the following expression: 1(01)*(10)*1

3. For the grammar G defined by S->AB, D->a,A->Aa,A->bB,B->Sb, give derivation tree for the sentential form babab

4. Give pumping lemma to prove that given language L is not context free.

5. Give formal definition of PDA.

6. Give an example of a language accepted by a PDA but not by DPDA.

7. Prove that the function f(n)=n-1 is computable.

8. Design a Turning machine to compute n mod 2.

9. What is undecidability?

10. Differentiate between recursive and recursively enumerable language.

PART B – (5 x 16 = 80 MARKS)

11. Construct a context free grammar for the given language L={anbn|/n>=1}U{amb2m/m>=1} and hence a PDA accepting L by empty stack (16)

12.a) Prove the equivalence of NFA and DFA. (8)

b) Prove that a balanced parenthesis is not a regular language. (8)

(OR)

12.a) Explain in detail with an example the conversion of NDFA to DFA (8)

b) Show that L = {an! : n>=0} is not regular. (8)

13.a) Explain in detail the ambiguity in context free grammar. (8)

b) Convert the grammar S->ABb|a, A->aaA|B, B->bAb into greibach normal form. (8)

(OR)

13.a) Construct a context free grammar for the languages L(G1)={aib2i/I>0} and L(G2)={anban/n>0} (8)

(b) Prove that {op | p is prime} is not context free. (8)

14. Construct a Turing Machine to do the proper subtraction (16)

(OR)

14.a) Construct a Turning machine to perform multiplication (8)

b) Prove the equivalence of two-way infinite tape with standard Turing machine. (8)

15.a) Discuss in detail about universal Turing machine. (8)

b) Prove that halting problem is undecidable. (8)

(OR)

15.a) Prove that the union and intersection of two recursive languages are also recursive. (8)

b) Prove that there exists an recursively enumerable language whose complement is not recursively enumerable. (8)
 

COMPUTER NETWORKS 2006 - B.E CSE

CS339 - COMPUTER NETWORKS

Time: Three Hours Maximum: 100 Marks

Answer All The Questions

PART – A (10 x 2 = 20 Marks)

1. Why network software is organized as a series of layer?

2. What are the two kinds of light sources used in fiber cables?

3. Reliability of CRC is better than that of simple parity and LRC. Justify this statement.

4. What is meant by bit stuffing?

5. Write short notes on virtual circuit organization of the subnet.

6. Differentiate between adaptive and non-adaptive routing algorithms.

7. What is meant by upward and downward multiplexing.

8. Mention some applications where UDP is preferred over TCP?

9. Mention the layer in which email gateway function. Also mention some of its applications

10. Define encryption

PART – B (5 x 16 = 80 Marks)

11.i) Compare OSI and TCP / IP reference models on form of their merits and demerits. (10)

ii) Differentiate between broadcast networks and point to point networks. (6)

12.a)i) Explain the CSMA/CD protocol with binary exponential back off algorithm used internet. (10)

ii) Assume that a network can cover a distance of 5000 meters and the RTT is 100 µ sec of the network operates at a speed of 20Mbps. What should be the minimum frame size to employ CSMA / CD? (6)

(OR)

12.b)i) Explain the sliding window protocol and compare its performance against the simple stop and wait protocol. (10)

ii) Given message is M(X) = X5 + X4+ X + 1 and the generator is G(X) = X4+X3+1 Compute CRC. (6)

13.a)i) Explain the distance vector routing algorithm. (8)

ii) Find the shortest path from node A to node D in the following network using the Bell mark kord routing algorithm. (8)

(OR)

13.b)i) Given three IP addresses are 32.46.7.3, 200.132.110.35 and 140.75.8.92. Find their classes, network addresses, broadcast address and their subnet marks. (6)

ii) Explain the token breket algorithm and compare its performance against the leaky bueket algorithm (10)

14.a)i) Explain the Bres-way handshak protocol used to establish the connection in the transport layer. Also explain the protocol used to release the connection. (8)

ii) Explain the transport service access point and the various schemers used by the transport layer to find the TSAP at a server. (8)

(OR)

14.b)i) Explain the various fields of TCP header. (8)

ii) Write short notes about the pseudo header included in the TCP checkroom. (4)

iii) Draw the UDP header and explain its fields (4)

15.a) Explain the DNS in terms of name space, resource record and name server. (16)

(OR)

15.b) Explain the architecture of WWW as on client / server application (16) 

 

OPERATING SYSTEM 2006 - B.E CSE

PART-A 10x2 = 20 marks

1. Mention any two essential properties of real time systems.

2. Processes call the operating system with system call interrupt instructions. Why can’t processes make ordinary procedure calls to the operating systems?

3. What is meant by the context of a process?

4. Mention the methods for deadlock recovery in a system.

5. Consider the following set of processes, with the length of the CPU-burst time and the arrival time given in milliseconds:

Process Arrival Time Burst Time

______ ___________ __________

P1 0 75

P2 10 40

P3 10 25

P4 80 20

P5 85 45

a. Draw a Gantt chart illustrating the execution of these processes using preemptive SJF scheduling algorithm.

6. What is the relationship between program locality and TLB hit rate?

7. What is Belady’s anomaly?

8. What is thrashing?

9. Mention the advantages and disadvantages of continuous allocation of files.

10. List the main components of a Linux system.

PART-B 5x16 = 80 marks

11. (i) Explain the MS-DOS system structure with a neat diagram. (8)

(ii) Write notes on Hardware protection. (8)

12. (a) (i)Describe the actions taken by a kernel to context switch between kernel-level threads. (4)

(ii) Consider the following snapshot of a system:

Allocation Max Available

__________ ____ ________

A B C D A B C D A B C D

P0 0 0 1 2 0 0 1 2 1 5 2 0

P1 1 0 0 0 1 7 5 0

P2 1 3 5 4 2 3 5 6

P3 0 6 3 2 0 6 5 2

P4 0 0 1 4 0 6 5 6

Answer the following questions using the banker’s algorithm.

a. What is the content of matrix Need? (2)

b. Is the system in a safe state? If yes, give the safe sequence. (2)

c. If a request from process P1 arrives for (0,4,2,0) can the request be granted immediately? (4)

(iii)Distinguish between short term, long term and medium term scheduling.(4)

OR

b) (i) How does a semaphore solve the critical section problem? Discuss whether semaphores satisfy the three requirements for a solution to the critical section problem. (8)

(ii) A barbershop consists of a waiting room with n chairs and the barber room containing the barber chair. If there are no customers to be served, the barber goes to sleep. If a customer enters the barbershop and all chairs are occupied, then the customer leaves the shop. If the barber is busy but chairs are available, then the customer sits in one of the free chairs. If the barber is asleep, the customer wakes up the barber. Write a program to coordinate the barber and the customers. (8)

13. a. (i) Given memory partitions of 100K, 500 K, 200 K, and 600K (in order), how would each of the First-fit, Best-fit, and Worst-fit algorithms place processes of 212K, 417K, 112K, and 426K (in order)? Which algorithm makes the most efficient use of memory? (8)

(ii) Write down the different issues in real time scheduling. (8)

OR

b. (i)Explain segmentation with a neat diagram. (8)

(ii) Consider a variation of round-robin we will call progressive round-robin. In progressive round-robin, each process has its own time quantum. This starts out at 50 ms, and increases by 50 ms each time it goes through the round-robin queue. Give the advantages and disadvantages of this variant over ordinary round-robin. (8)

14. a. What is the cause of thrashing? Explain the methods by which thrashing could be controlled. (16)

OR

b. Describe different schemes for defining the logical structure of a directory. (16)

15. a. Discuss on the following disk scheduling algorithms:

Shortest Seek Time First, First Come First Served, SCAN, C- LOOK.

(16)

OR

b. Explain briefly how process management is done in Linux. (16)
 

DATA STRUCTURES AND ALGORITHMS 2007 - B.E CSE

PART A-(10 X 2=20 marks)

1.When will you say an algorithm efficient? Give the notations for time complexity.

2.What is a ‘top-down’ design? Is ‘C’ language a top down design? Justify your answer.

3.Why is linked list used for polynomial arithmetic?

4.Write the role of stack in function call.

5.What is the minimum number of nodes in an AVL tree of height 5?

6.What is the use of sentinel value in binary heap?

7.Which is the best way of choosing the pivot element in quick sort?

8.Merge sort is better than insertion sort. Why?

9.Define a graph. How it differs from tree?

10.What is minimum spanning tree? Name any two algorithms used to find MST.

PART B-(5 X 16=80 marks)

11.(a).(i).Given two lists L1 and L2, write the routines to compute L1 n L2 using basic operations.

(ii).Write the routines for inserting and deleting elements from a queue. Check for the conditions Q-empty and Q-full.

(Or)

11.(b).(i).How would you implement a stack of queues? Write routines for creation and inserting of elements into it.

(ii).Write routines to insert heterogeneous data into the list.

12.(a).(i).Write the routines to insert and remove a node from Binary Search Tree.

(ii).A full node is a node with two children. Prove that the number of full nodes plus one is equal to the number of leaves in a binary tree.

(Or)

12.(b).(i).Show the resulting of inserting 2,1,4,5,9,3,6,7 into an empty AVL tree.

(ii).Write the procedure to implement single and double rotations while inserting nodes in an AVL tree.

13.(a).Explain with suitable examples the basic heap operations and algorithms for the same.

(Or)

13.(b).How will you resolve the collisions, while inserting elements into the hash table using separate chaining and linear probing? Write the routines for inserting, searching and removing elements from the hash table using the above mentioned techniques.

14.(a).(i).Write the routine for sorting n elements in increasing order using heap sort.

(ii).Sort 3,1,4,1,5,9,2,6 in decreasing order using heap sort.

(Or)

14.(b).(i).Explain with example about the insertion sort.

(ii).What is external sorting? Discuss the algorithms with proper examples.

15.(a).(i).Discuss and write the program to perform topological sorting.

(ii).What is single source shortest path problem? Discuss Dijikstra’s single source shortest path algorithm with an example.

(Or)

15.(b).(i).Write an algorithm to find the minimum cost spanning tree of an undirected, weighted graph.

(ii).Find the MST for the following graph.
 

DATABASE MANAGEMENT SYSTEMS MAY2007 - B.E CSE

PART-A

1. List five reponsibilities of the DB manager.
2. Give the limitations of ER model? How do you overcome this?
3. Define query language.Give the calssification of query language.
4. Why it is necessary to decompose a relation?
5. Give any two advantages of spare index over dense dense index.
6. Name the different types of joins supported in SQL.
7. What are the types of transperencies that a distributed database must support? why?
8. What benefit is provided by strict-two phase locking? What are the disanvantages result?
9. Briefly write the overall process of dataware housing.
10. What is an active database?

PART - B
11 (a) (i) What are the types of knowledge discovered during data mining? Explain with suitable examples.
(ii) HIghlight the features of object oriented database.

OR
(b) (i) What is nested relationls? Give example.
(ii) Explain the structure of XML with suitable example.


12 (a) (i) Compare file system with database system.
(ii) Explain the architecture of DBMS.

OR
(b) (i) What are the steps involved in designing a database application? Explain with an example
(ii) List the possible types of relations that may exist between two entities. How would you realise that into tables for a binary relation?

13. (a) (i) What are the relational algebra operations supported in SQL? Write the SQL statement for each operation.
(ii) Justify the need of normalization with examples
OR
(b) (i) What is normalization? Explain 1NF,2NF,3NF and BCNF with suitable example.
(ii) What is FD? Explain the role of Fd in the process of normalization.

14.(a) (i) Explain the security features provided in commercial query languages.
(ii) What are the steps involved in query processing? How would you estimate the cost of the query?
OR
(b) (i) Explain the different properities of indexes in detail.
(ii) Explain various hashing techniques.

15.(a) (i) Explain the four important properities of transaction that a DBMS must ensure to maintain database .
(ii) What is RAID? List the different levels in RAID technology and explain its features.
OR
(b) (i) What is concurrenct control? How is it implemented in DBMS? Explain.
(ii) Explain various recovery techniques during ttansaction in detail.