Monday, 21 March 2016

GTU EXAM IMP

GTU EXAM IMP


Computer Programming And Utilization

Semester: 1 | Branch: Computer Engineering | Subject Code: 2110003

UNIT: 1 | NAME: INTRODUCTION TO COMPUTER AND PROGRAMMING


  1. Introduction ,Basic block diagram and functions of various components of computer
  2. Concepts of Hardware and software, Types of softwares
  3. Compiler and interpreter, Concepts of Machine level, Assembly level and high level programming
  4. Flow charts and Algorithms.
  5. Write the difference between structure and union.

UNIT: 2 | NAME: FUNDAMENTALS OF C


  1. Features of C language, structure of C Program, comments,
  2. header files, data types
  3. Constants and variables, operators, expressions, evaluation of expressions,
  4. Type conversion, precedence and associativity
  5. I/O functions

UNIT: 3 | NAME: CONTROL STRUCTURE IN C


  1. Simple statements, Decision making statements
  2. Looping statements
  3. Nesting of control structures
  4. Break and continue , goto statement

UNIT: 4 | NAME: ARRAY & STRING


  1. Concepts of array , one dimensional arrays,
  2. Two dimensional arrays
  3. declaration and initialization of arrays
  4. String , string storage , Built-in-string functions

UNIT: 5 | NAME: FUNCTIONS


  1. Concepts of user defined functions
  2. Prototypes, definition of function
  3. parameters, parameter passing
  4. Calling a function
  5. recursive function
  6. Macros , Pre-processing

UNIT: 6 | NAME: POINTERS


  1. Basics of pointers, pointer to pointer
  2. Pointer and array , pointer to array
  3. Array of pointers , functions returning a pointer

UNIT: 7 | NAME: STRUCTURE


  1. Basics of structure , structure members
  2. Accessing structure members ,nested structures
  3. Array of structures, structure and functions
  4. Structures and pointers

UNIT: 8 | NAME: DYNAMIC MEMORY ALLOCATION


  1. Introduction to Dynamic memory allocation
  2. malloac, Calloc

UNIT: 9 | NAME: FILE MANAGEMENT


  1. Introduction to file management
  2. functions of file management.

Computer Programming And Utilization

Semester: 2 | Branch: Computer Engineering | Subject Code: 2110003

UNIT: 1 | NAME: INTRODUCTION TO COMPUTER AND PROGRAMMING


  1. Introduction ,Basic block diagram and functions of various components of computer
  2. Concepts of Hardware and software, Types of softwares
  3. Compiler and interpreter, Concepts of Machine level, Assembly level and high level programming
  4. Flow charts and Algorithms.
  5. Write the difference between structure and union.

UNIT: 2 | NAME: FUNDAMENTALS OF C


  1. Features of C language, structure of C Program, comments,
  2. header files, data types
  3. Constants and variables, operators, expressions, evaluation of expressions,
  4. Type conversion, precedence and associativity
  5. I/O functions

UNIT: 3 | NAME: CONTROL STRUCTURE IN C


  1. Simple statements, Decision making statements
  2. Looping statements
  3. Nesting of control structures
  4. Break and continue , goto statement

UNIT: 4 | NAME: ARRAY & STRING


  1. Concepts of array , one dimensional arrays,
  2. Two dimensional arrays
  3. declaration and initialization of arrays
  4. String , string storage , Built-in-string functions

UNIT: 5 | NAME: FUNCTIONS


  1. Concepts of user defined functions
  2. Prototypes, definition of function
  3. parameters, parameter passing
  4. Calling a function
  5. recursive function
  6. Macros , Pre-processing

UNIT: 6 | NAME: POINTERS


  1. Basics of pointers, pointer to pointer
  2. Pointer and array , pointer to array
  3. Array of pointers , functions returning a pointer

UNIT: 7 | NAME: STRUCTURE


  1. Basics of structure , structure members
  2. Accessing structure members ,nested structures
  3. Array of structures, structure and functions
  4. Structures and pointers

UNIT: 8 | NAME: DYNAMIC MEMORY ALLOCATION


  1. Introduction to Dynamic memory allocation
  2. malloac, Calloc

UNIT: 9 | NAME: FILE MANAGEMENT


  1. Introduction to file management
  2. functions of file management.

Advanced Engineering Mathematics

Semester: 3 | Branch: Computer Engineering | Subject Code: 2130002

  1. Define Gamma Function and obtain its value for 7.
  2. Define square wave function and draw its graph.
  3. Find the complete integral of pq = 4z
  4. Find the convolution of 1*1

Engineering Economics and Management

Semester: 3 | Branch: Computer Engineering | Subject Code: 2130004

UNIT: 1 | NAME: INTRODUCTION TO ECONOMICS


  1. Explain any two methods of measurement of elasticity
  2. Explain causes of poverty in brief.
  3. Explain the factors of production in brief
  4. Explain the levels of management
  5. What is utility? Explain cardinal & ordinal Approaches

Data Structure

Semester: 3 | Branch: Computer Engineering | Subject Code: 2130702

UNIT: 1 | NAME: INTRODUCTION TO DATA STRUCTURE


  1. Define data structure. List the various linear and non-linear data structures and explain them in brief
  2. What is the difference between linear and nonlinear data structure
  3. Does a time sharing computer use a queue or stack? Explain
  4. Differentiate the following terms: Primitive and Non-Primitive Data Structures.
  5. Write a recursive algorithm to find factorial.

UNIT: 2 | NAME: LINEAR DATA STRUCTURE


  1. Write an algorithm for evaluation of postfix expression and evaluation the following expression showing every status of stack in tabular form.
    (i) 5 4 6 + * 4 9 3 / + *
    (ii) 7 5 2 + * 4 1 1 + / -
  2. Explain Difference between Stack and Queue
  3. Trace the conversion of infix to postfix form in tabular form.
    (i) ( A + B * C / D – E + F / G / ( H + I ) )
    (ii) ( A + B ) * C + D / ( B + A * C ) + D
  4. Write difference between singly linked list and doubly linked list.
  5. Write the Applications of Stack , Queue , Linked List.
  6. What is sparse matrix? Explain memory representation of sparse matrix

UNIT: 3 | NAME: NONLINEAR DATA STRUCTURE


  1. What is circular link list? Write a short note on doubly link list . Write an advantage of link list , doubly link list and circular link list
  2. What is Tower of Hanoi? Explain it with n=3.
  3. Explain BFS and DFS with example

UNIT: 4 | NAME: HASHING AND FILE STRUCTURES


  1. What is Hashing? Explain various Hashing Functions.
  2. What are the advantages of Hashing? Discuss problem of collision in Hashing. Also discuss collision resolution techniques
  3. The integers given below are to be inserted in a hash table with 5 locations using chaining to resolve collisions. Construct hash table and use simplest hash function. 1,2,3,4,5,10,21,22,33,34,15,32,31,48,49,50
  4. Explain the terms: File, Field, Record, Database, Key
  5. Explain the following Sorting Algorithms with example: Bubble Sort and Merge Sort

Database Management System

Semester: 3 | Branch: Computer Engineering | Subject Code: 2130703

UNIT: 1 | NAME: INTRODUCTORY CONCEPTS OF DBMS


  1. Define database. Explain the three level architecture of DBMS.
  2. Define DBMS. Explain the various roles of a DBA.
  3. Describe various disadvantages of file system compare to Data base managementsystem.
  4. Differentiate the following: DA and DBA
  5. Discuss disadvantages of file processing systems and advantages of Database Management Systems
  6. Draw E-R diagram for Hospital management system and covert into set of table schema.
  7. Draw three level architecture of DBMS.
  8. Explain aggregation opearation of E-R Diagram
  9. Explain database system 3 tier architecture with clear diagram in detail.
  10. Explain database system architecture with diagram in detail.
  11. Explain DDL , DML and DCL with example
  12. Explain DDL,DML,DCL
  13. Explain different database users.
  14. Explain functions of DBA to handle DBMS
  15. Explain in detail the duties of DBA.
  16. Explain the purpose and application of DBMS.
  17. Explain the purpose of the database system.
  18. Explain three level architecture of database system
  19. Explain three level architecture of database system
  20. List the benefits of database approach.
  21. List the major functions performed by DBA.
  22. What are the responsibilities of a DBA ?
  23. What are the responsibilities of a DBA?
  24. What is constraint in database? Explain types of constraints with suitable example.
  25. What is data independence ? Explain the difference between physical and logical data independence with example.

UNIT: 2 | NAME: RELATIONAL MODEL


  1. Explain following relational algebra operation
    (i)Natural join operation
    (ii) Selection and projection operation
  2. List relational algebra operators and explain any two with example.
  3. What is Relational Algebra? Define Relational Algebra Operation cross product with example.

UNIT: 3 | NAME: ENTITY-RELATIONSHIP MODEL


  1. Construct an E-R Diagram for an insurance company with a set of customers, each of whom owns number of cars, also each can have number of recorded accident associated with it.
  2. Construct E-R diagram for a hospital with a set of patients and medical doctors. Associate with each patient a log of various tests and examinations conducted
  3. Construct E-R diagram of the bank. It provides different kinds of bank accounts. And loans. It operates number of branches.
  4. Draw ER diagram for Library Management System.
  5. Draw E-R Diagram for Library Management System.
  6. Draw E-R diagram for supplier who supplies different parts. The parts are used in different projects. Explain the mapping cardinality used. Assume suitable attributes.
  7. Draw E-R Diagram for the School Management System.
  8. Draw symbols for following in E-R diagram Relationship Set, and Primary key attribute
  9. Draw symbols for following in E-R diagram: Weak Entity set, Derived attribute
  10. Explain aggregation operation of ER diagram
  11. Explain gernarization feature of E-R Diagram.
  12. Explain Mapping Cardinalities.
  13. Explain specialization and generalization concepts in ER diagram with suitable example.
  14. Explain specialization and generalization feature of E-R diagram with example.
  15. Give Symbol used in E-R Diagram and Draw the E-R diagram of Library Management System.
  16. Give Symbol used in E-R Diagram and Draw the E-R diagram of University exam System.
  17. What does E-R model mean? Specify all its notations.
  18. What is constraint in database? Explain types of constraints with suitable example.
  19. What is Entity-Relationship model? Explain the steps to reduce the E-R diagram to E-R database schema

UNIT: 4 | NAME: RELATIONAL DATABASE DESIGN


  1. Consider a relation R with five attribute A,B,C,D,E having following dependencies : A ->B, BC->E and ED->A a)List all Keys for R b) In which normal form table is, justify your answer
  2. Consider table R(A,B,C,D,E) with FDs as A->B, BC->E and ED-> A. The table is in which normal form? Justify your answer.
  3. Define functional dependency. Explain trivial and non-trivial FD with example.
  4. Explain 1NF, 2NF, 3NF and BCNF.
  5. Explain 3NF with example
  6. Explain ACID properties of transaction.
  7. Explain BCNF with example
  8. Explain both the forms of searializability & relation between the two
  9. Explain how to find closure of a set of attributes?
  10. Explain immediate database modification log based recovery method. Also explain role of check point in log base.
  11. Explain irreducible sets of Functional dependency with example.
  12. Explain log based recovery and mention all its types
  13. Explain system recovery procedure with check point record.
  14. Explain Two Phase Locking protocol. What are its advantages and disadvantages?
  15. Given relation R with attributes A,B, C,D,E,F and set of FDs as A-> BC, E-> CF, B->E and CD-> EF. Find out closure {A, B} + of the set of attributes.
  16. What is canonical cover? Consider following set F of functional dependencies on schema R(A,B,C) and compute canonical cover for F. A -> BC B -> C A -> B AB -> C
  17. What is canonical cover? Consider following set F of functional dependencies on schema R(A,B,C) and compute canonical cover for F. A -> BC B -> C A -> B AB -> C
  18. What is non-loss decomposition in database? How it is useful in database?
  19. What is normalization? What is redundancy? Compare 1NF and 2NF with example.
  20. What is normalization? What is the need for normalization?
  21. What is the advantage of using 3NF? Explain with example.
  22. What problems can occur due to wrong database design? How they can be solved?
  23. Why do we need normalization? Explain 4NF & 5NF.
  24. Why should normalization be performed on a table and what are its benefits. Explain 3NF and BCNF.

UNIT: 5 | NAME: QUERY PROCESSING & QUERY OPTIMIZATION


  1. Explain evaluation of expression process in query optimization.
  2. Explain Query Optimization Process.
  3. Explain query optimization process.
  4. Explain the measures of finding out the cost of a query in query processing.
  5. Explain the measures of query cost, selection operation and join.
  6. Explain the purpose of sorting with example with reference to query optimization
  7. Explain various steps involved in Query evaluation.

UNIT: 6 | NAME: TRANSACTION MANAGEMENT


  1. Consider schedule S with transaction T1 and T2. T1 transfer Rs. 150 from account A to C and T2 adds Rs. 50 into account A. Prepare concurrent schedule with two phase locking protocol.
  2. Explain conflict serializability with example.
  3. Explain deadlock detection mechanism.
  4. Explain deadlock detection mechanism.
  5. Explain immediate database modification log based recovery method. Also explain role of check point in log base.
  6. Explain shadow paging.
  7. Explain system recovery procedure with check point record concept.
  8. Explain Two phase commit protocol
  9. Explain Two phase locking.
  10. Explain various deadlock prevention methods.
  11. Explain view serializability with example.
  12. What are transaction control commands? Explain any two commands.
  13. What is concurrency? What are the three problems due to concurrency? How the problems can be avoided, explain for one of the three problems.
  14. What is deadlock? Explain Wait-For-Graph.
  15. Why concurrency control is needed?

UNIT: 7 | NAME: SECURITY


  1. Describe Data Encryption.
  2. Explain Data encryption
  3. Explain deadlock detection.
  4. Explain in detail Discretionary access control and mandatory access control.
  5. Explain Locked based protocol.
  6. Explain system recovery procedure with check point record concept.
  7. Explain system recovery procedure with check point record.
  8. Explain the difference between Discretionary access control and mandatory access control.
  9. What do you mean by security? What the objective while designing secure database?
  10. What is authorization and authentication? Explain the access controls in a database.
  11. What is security of data? Explain data encryption.
  12. What is the difference between security and integrity?
  13. Write short note on data encryption

UNIT: 8 | NAME: SQL CONCEPTS


  1. Consider following schema and represent given statements in relation algebra form.
    Branch(branch_name,branch_city)
    Account(branch_name, acc_no, balance)
    Depositor(Customer_name, acc_no)
    ( i ) Find out list of customer who have account at abc branch.
    ( ii ) Find out all customer who have account in Ahmedabad city and balance is greater than 10,000.
    (iii) find out list of all branch name with their maximum balance.
  2. Consider following schema and write SQL for given statements.
    student( rollno, name, branch)
    exam(rollno, subject_code, obtained_marks , paper_code)
    papers(paper_code, paper_satter_name, university)
    ( i ) Display name of student who got first class in subject 130703.
    (ii) Display name of all student with their total mark.
    (iii) Display list number of student in each university.
    (iv) Display list of student who has not given any exam.
  3. Consider following schema and write SQL for given statements.
    Student(RollNo, Name, Age, Sex, City)
    Student_marks(RollNo, Sub1, Sub2,Sub3,Total,Average) Write query to
    (i) Display name and city of students whose total marks are greater than 225.
    (ii) Display name of students who got more than 60 marks in each subject.
    (iii) Display name of city from where more than 10 students come from.
    (iv) Display a unique pair of male and female students.
  4. Consider the employee data. Give an expression in SQL for the following query :
    Employee(employee-name, street,city)
    Works(employee-name, company-name,salary)
    Company(company-name, city)
    Manages(employee-name, manager-name)
    (1) find the name of all employees who work for State Bank.
    (2) Find the names and cities of residence of all employees who work for State Bank.
    (3) Find all employee in the database who do not work for State Bank.
    (4) Find all employee in the database who earn more than every employee of UCO Bank.
  5. Define: (1) Primary key (2) Foreign key (3) Unique Key (4) Not null (5) Commit (6) Candidate key (7) Rollback.
  6. Explain following Term with suitable example (1) Primary Key (2) Candidate Key (3) Super Key (4) On delete cascade
  7. Explain rollback command.
  8. i) The employees who are getting salary greater than 3000 for those persons belonging to the department 20
    ii) Employees who are not getting any commission
    iii) Find how many job titles are available in employee table.
    iv) Display total salary spent for each job category.
    v) Display number of employees working in each department and their department name.
    vi) List ename whose manager is NULL.
    vii)List all employee names and their salaries, whose salary lies between 1500/- and 3500/- both inclusive
  9. we have following relations:
    Supplier(S#,sname,status,city)
    Parts(P#,pname,color,weight,city)
    SP(S#,P#,quantity)
    Answer the following queries in SQL.
    (i) Delete records in supplier table whose status is 40.
    (ii) Add one field in supplier table.
    (iii) Explain commit command
  10. we have following relations:
    Supplier(S#,sname,status,city)
    Parts(P#,pname,color,weight,city)
    SP(S#,P#,quantity)
    Answer the following queries in SQL.
    (i) Find name of parts whose color is red
    (ii) Find parts name whose weight less than 10 kg.
    (iii) Find all parts whose weight from 10 to 20 kg.
    (iv)Find average weight of all parts.
    (v) Find S# of supplier who supply part p2
    (vi) Find name of supplier who supply maximum parts.
    (vii) Sort the parts table by pname.
    (i) Delete records in parts table whose color is blue.
    (ii) Drop one field in parts table.
  11. we have following relations:
    Supplier(S#,sname,status,city)
    Parts(P#,pname,color,weight,city)
    SP(S#,P#,quantity)
    Answer the following queries in SQL.
    (i) Find name of supplier for city = Delhi.
    (ii) Find suppliers whose name start with AB
    (iii) Find all suppliers whose status is 10, 20 or 30.
    (iv) Find total number of city of all suppliers.
    (v) Find s# of supplier who supplies red part.
    (vi) Count number of supplier who supplies red part.
    (vii) Sort the supplier table by sname.
  12. we have following relations: EMP(empno, ename, jobtitle, managerno, hiredate, sal, comm, deptno) DEPT(deptno, dname, loc) Answer the following queries in SQL.
    (1) Find the Employees working in the department 10, 20, 30 only.
    (2) Find Employees whose names start with letter A or letter a.
    (3)Find Employees along with their department name.
    (4) Find Employees whose manager is KING.
    (5) Display employees who are getting maximum salary in each department
    (6)Find the Employees who get salary more than Allen salary.
    (7)Find the Employees who are working in Smith department
  13. What is NULL? Explain
  14. Write down the query for the following table where primary keys are underlined.
    Person(ss#, name, address) Car(license, year, model) Accident(date, driver, damage-amount) Owns(ss#, license) Log(license, date, driver)
    (1) find the total number of people whose cars were involved in accidents in DEC 2010 2009.
    (2) Find the number of accidents in which the cars belonging to S.Sudarshan
    (3) Add a new customer to the database.
    (4) Add a new accident recorded for the Santro belonging to KORTH

UNIT: 9 | NAME: PL/SQL CONCEPTS


  1. Consider wholesaler of booh schema.
    Book(Book_id, book_title,publisher,book_price)
    ( i ) Implement procedure which print details of books whose price is more than average price.(Use cursor).
    (ii) Write a trigger such that if record is deleted from book table, insert old record in book_backup table.
  2. Explain Curser in PL/SQL.
  3. Explain Cursor in PL/SQL
  4. Explain Database Triggers.
  5. Explain Stored Procedure in PL/SQL
  6. Explain stored procedure in PL/SQL.
  7. Explain stored procedures and stored functions
  8. Explain the advantages of PL/SQL
  9. Explain Trigger and its types. Explain its applications and also the syntax to create it.
  10. Explain Trigger with example.
  11. What is a cursor? Explain the built-in cursor types
  12. Write Note on Cursor and its types

Digital Electronics

Semester: 3 | Branch: Computer Engineering | Subject Code: 2131004

UNIT: 1 | NAME: BINARY SYSTEMS AND LOGIC CIRCUITS


  1. Convert D flip flop into SR flip flop
  2. Design 3-bit even parity generator circuit.
  3. Design 4 X 16 decoder using two 3 X 8 decoder
  4. Design a circuit for 2-bit magnitude comparator.
  5. Draw the truth table of full adder and implement using minimum number of logic gates.
  6. Draw the truth table of full subtractor and implement using minimum number of logic gates.

Operating System

Semester: 4 | Branch: Computer Engineering | Subject Code: 2140702

UNIT: 1 | NAME: INTRODUCTION


  1. Explain concept of virtual memory and paging with example
  2. Explain elevator algorithm for scheduling disk requests
  3. Explain readers and writers problem with solution.
  4. List and explain the attributes and operations you can perform on the file
  5. Write short note on File Allocation Table and I-node

Object Oriented Programming with C

Semester: 4 | Branch: Computer Engineering | Subject Code: 2140705

UNIT: 1 | NAME: PRINCIPLES OF OBJECT ORIENTED PROGRAMMING


  1. Difference between object oriented programming and procedure oriented programming.
  2. Explain basic concepts of Object-Oriented Programming
  3. Explain Object oriented methodology and themes.
  4. List the characteristics of object oriented programming.
  5. Principles of object oriented programming.

UNIT: 2 | NAME: TOKENS, EXPRESSIONS AND CONTROL STRUCTURES


  1. Describe data types in C++ in Details.
  2. Describe data types in C++ in Details.
  3. Explain Scope Resolution Operator with example.
  4. Explain Visibility mode.
  5. What is Reference variable? What is its major use? Give Example.

UNIT: 3 | NAME: TOKENS, EXPRESSIONS AND CONTROL STRUCTURES


UNIT: 4 | NAME: FUNCTION IN C++


  1. How does main() function in C differ from C++? Give General format of Class.
  2. Define Friend Function. Create two classes DM and DB which store the value of distances. DM stores distances in meters and centimeters and DB in feet and inches. Write a program that can read values for the class objects and add one object of DM with another object of DB. Use a friend function to carry out the addition operation. The object stores the results may a DM object or DB object, depending on the units in which the results are required. The display should be in the format of feet and inches or meters and centimeters depending on the object on display. 1 Feet = 0.3048 Meter 1 Meter = 3.28 Feet 1 Inch = 2.54 Centimeter 1 Centimeter = 0.3937 Inch
  3. Describe inline function in C++ with example.
  4. Explain Friend function with example.
  5. Explain function overloading with example.
  6. Explain function prototyping with example.
  7. What is a virtual function? Write rules for virtual function. Explain wit example.
  8. What is Inline Function? In which Situation Inline Function may not work? How does an inline function differ from a preprocessor macro? Write program using Inline Function to find largest of three numbers.

UNIT: 5 | NAME: CLASSES AND OBJECTS


  1. Explain friend function with example and list sum of the special properties of friend function.

UNIT: 6 | NAME: CONSTRUCTORS AND DESTRUCTORS


  1. Explain following with respect to C++ wit examples. 1)new operator 2) destructor
  2. What is Constructor? Explain types of Constructor with example.
  3. What is Constructor? Write the characteristics of constructor function. Define Class named point which represents 2-D Point, i.e P(x, y). Define Default constructor to initialize both data member value 5, Parameterized constructor to initialize member according to value supplied by user and Copy Constructor. Define Necessary Function and Write a program to test class Point.
  4. What is copy constructor? When it is used implicitly for what purpose?

UNIT: 7 | NAME: OPERATOR OVERLOADING AND TYPE CONVERSIONS


  1. Define Operator overloading. Create class Time that has three data members hour, minute and second and two constructor, default constructor and parameterized constructor to initialize data member. Write a program to add two times by overloading operator +.
  2. Define operator overloading? Explain how to overload unary operator and binary operator.
  3. Explain new and delete operator. What are the advantages of new operator Over malloc?
  4. Give a programming example that overloads = = operator with its use.
  5. What do you mean by type conversion? Give an example of basic to object conversion.
  6. What is Type conversion? Explain Basic to class type conversion with example.

UNIT: 8 | NAME: INHERITANCE : EXTENDING CLASSES


  1. Define Inheritance. Write the types of Inheritance. Explain example. Consider Example with respect to print result of Student and Student Details.
  2. Show the use of multiple inheritance with the help of proper programming example
  3. What does inheritance means in c++? What are different forms of inheritance?Give an example of each.

UNIT: 9 | NAME: POINTERS, VIRTUAL FUNCTIONS AND POLYMORPHISM


  1. Define and Discuss Pure Virtual Function.
  2. Explain generic pointer.
  3. How is Polymorphism achieved at Compile Time and Run Time.
  4. What does inheritance means in c++? What are different forms of inheritance? Give an example of each.
  5. What is Exception? Explain Exception Handling Mechanism. Write a programthat demonstrates use of multiple catch. Add at least three catch block in our Program.
  6. Write a C++ program demonstrating use of the pure virtual function with the use of base and derived classes.

Numerical and Statistical Methods for Computer Eng

Semester: 4 | Branch: Computer Engineering | Subject Code: 2140706

UNIT: 1 | NAME: PREREQUISITE


  1. Derive Newton- Raphson method in brief
  2. Develop a C program to fit regression line x on y through set of points using method of least squares
  3. Discuss briefly the various types of errors in performing numerical calculations
  4. Write an algorithm for Lagrange interpolation method to find functional value.

Computer Organization

Semester: 4 | Branch: Computer Engineering | Subject Code: 2140707

UNIT: 1 | NAME: OVERVIEW OF REFGISTER TRANSFER AND MCROOPERATIONS


  1. What is register transfer language? Clear it with example.
  2. Explain the Common Bus System with its diagram.
  3. Explain the design of Accumulator logic.
  4. Show the block diagram of the hardware that implements the following register transfer statement .
    T2: R2 – R1 , R1 – R2
  5. Explain selective set, selective complement and selective clear
  6. Explain 4 bit incrementer with a necessary diagram.
  7. A digital computer has a common bus system for 16 registers of 32 bits each.
    (i) How many selection input are there in each multiplexer?
    (ii) What size of multiplexers are needed?
    (iii) How many multiplexers are there in a bus?
  8. Write an assembly level program for the following pseudocode.
    SUM = 0
    SUM = SUM + A + B
    DIF = DIF – C
    SUM = SUM + DIF
  9. Explain the operation of three state bus buffers and show its use in design of common bus.
  10. List and explain different types of shift microoperation.
  11. Draw the block diagram of 4-bit arithmetic circuit and explain it in detail.
  12. What is logic microoperation? List out various logic operations.
  13. Draw a block diagram of a Computers CPU showing all the basic building blocks such as Program Counter, Accumulator, Address and Data Registers, Instruction Register, Control unit etc. and describe how such an arrangement can work as a computer, if connected properly to Memory, Input / Output etc.
  14. What is high impedance state in three-state buffer? Explain three – state gate in detail.
  15. Explain 4-bit incrementer with a necessary diagram.

UNIT: 2 | NAME: BASIC COMPUTER ORGANIZATION AND DESIGN


  1. Explain the direct and indirect address with example and compare them.
  2. Draw the circuit for control unit of basic computer and explain its working.
  3. What do you mean by completeness of instruction set? Give the reasons to choose the instructions in each category.
  4. Compare the following.
    1. Microprogrammed and hardwired control organization.
    2. Register reference and memory reference instructions.
  5. Explain Instruction cycle
  6. Explain the Common Bus System with its diagram.
  7. Explain the design of Accumulator logic.
  8. Give the basic computer instruction format and explain Memory reference, Register reference and Input-output instructions.

UNIT: 3 | NAME: PROGRAMMING THE BASIC COMPUTER


  1. Explain the following instructions: SPA, SNA, SZA, SZE.
  2. Explain the working of Second Pass Assembler with its flowchart.
  3. Explain the following instructions
    1) CLA
    2) ISZ
    3) INP
  4. Explain the first pass of an assembler with a flowchart
  5. What is Assembly Language? Why do we need it? What is the function of Assembler? What is Address symbol table? Describe in brief.
  6. Explain the procedure for addition and subtraction with signed-magnitude data with the help of flowchart.
  7. Write the program to logically OR the two numbers without using OR instruction.
  8. Write the program to multiply two positive numbers. by a repeated addition method. For ex., to multiply 5 x 4 , the program evaluates the product by adding 5 four times, or 5+5+5+5
  9. Write a note on subroutines.
  10. What do you mean by completeness of instruction set? Give the reasons to choose the instructions in each category.
  11. What is program interrupt? What happens when it comes? What are the tasks to be performed by service routine?
  12. Write an assembly language program to multiply two positive numbers.
  13. Why do we need First Pass and Second Pass in the process of Assembly? Describe in brief what is done under each pass.
  14. Write an assembly language program to subtract two double precision numbers.
  15. Write an assembly language program to take a character as input and outputs it.
  16. Explain the following terms:
    1) Pseudoinstruction
    2) Address Symbol Table
    3) Assembler
  17. Demonstrate the process of Second Pass of Assembler using a suitable diagram.
  18. Discuss following instruction (i) SZA (ii) LDA (iii) ISZ (iv) CIR (v) CIL (vi) SZE (vii) BSA
  19. Write a program which uses the service of an interrupt.

UNIT: 4 | NAME: MICROPROGRAMMED CONTROL


  1. What is the difference between microprocessor and micro program? Is it possible to design a microprocessor without a micro program? Are all micro programmed computers also microprocessors?
  2. Draw the diagram of Micro programmed sequencer for a control memory and explain it.
  3. Compare the following. 1. Microprogrammed and hardwired control organization.
  4. Explain Address Sequencing process in a microprogrammed control unit using suitable diagram.
  5. Draw and explain the organization of microprogrammed control unit.
  6. Define micro operation, micro instruction, micro program and micro code in short.

UNIT: 5 | NAME: CENTRAL PROCESSING UNIT


  1. Explain the different addressing modes with suitable examples.
  2. List all the three address, two address, one address, zero address and RISC instructions with its examples.
  3. Convert the following into reverse polish notation.
    1) A+B*[C*D+E*(F+G)]
    2) A*[B+C*(D+E)] / [F+G*(H+I)]
  4. Explain various types of interrupts
  5. What is stack? Give the organization of register stack with all necessary elements and explain the working of push and pop operations.
  6. List the important characteristics of RISC architecture and explain the use of overlapped register windows.
  7. Explain the following.
    1.Data transfer instructions
  8. Derive the RPN for the following expression :
    A*[B+C*(D+E)] / F*(G+H)
  9. What is the importance of status bits for program control? Which types of status bits are stored in a status register? Explain it with block diagram.
  10. Explain register stack and memory stack with block diagram.
  11. List the important characteristics of RISC architecture and explain use of over lapped register window.

UNIT: 6 | NAME: PIPELINE & VECTOR PROCESSING


  1. Flynn’s classification of computers.
  2. What is pipeline conflict? Explain data dependency and handling of branch instruction in detail.
  3. Considering three segment instruction pipeline, illustrate the concepts of delayed load and delayed branc h with example.
  4. Draw the space time diagram for six segment pipeline showing the time it takes to process 8 tasks.
  5. What is Instruction Pipeline? Explain the Four-Segment Instruction Pipeline with the suitable diagram.
  6. Explain the working of a pipelined processor, which is having four pipeline stages, with proper space time diagrams. Under which conditions this computer’s speed up can be 4? Explain mathematically how it is so.
  7. Explain (i) Vector Processing (ii) Vector Operations. Explain how matrix multiplication is carried out on a computer supporting Vector Computations.
  8. What is an array processor? Explain the different types of array processor.

UNIT: 7 | NAME: COMPUTER ARITHMETICS


  1. Explain the Booth Multiplication Algorithm in detail.
  2. Multiply the (-8) with (12) using Booth’s algorithm. Give each step.
  3. Explain Addition and Subtraction with Signed-Magnitude Data and also show its Hardware Implementation.

Computer Networks

Semester: 4 | Branch: Computer Engineering | Subject Code: 2140709

UNIT: 1 | NAME: INTRODUCTION


  1. Explain Advantages and Usage of Network
  2. Explain design issues for layers.
  3. Explain following with respect to ATM(asynchronous transfer mode) a) Virtual circuits b) Cells
  4. Explain in detail X.25
  5. Explain the terms : LAN, MAN, WAN, Internet
  6. Explain working principle of wireless LAN protocols
  7. List difference between OSI and TCO/IP model
  8. List difference between Transport layer and Network layer
  9. What is OSI model? Draw Diagram and Explain Physical, Data link and Network layer with its functions.
  10. What is topology? Give different type of topology and its use
  11. Write the two differences between Ethernet and wireless LAN 802.11 in the physical and data link layers.

UNIT: 2 | NAME: THE PHYSICAL LAYER


  1. Classify various transmission media for computer networks, and compare UTP and fiber optic media.
  2. Discuss different types of guided and unguided media used to transmit data in the network
  3. Explain following transmission media in terms of Bandwidth Supported, Throughput measured and Distance supported.
    Fiber optics
    Unshielded twisted pair
    Radio waves
  4. Explain the Nyquist and Shannon data rate capacity theory for Noiseless and noisy channel respectively.
  5. List demerits of unguided transmission media
  6. What is the purpose of physical layer? Explain multimode fiber and single mode fiber. Explain the transmission of light through fiber.

UNIT: 3 | NAME: THE DATA LINK LAYER


  1. Explain a protocol Using Go Back N strategy using pipelining and show the scenario in the case of when receiver window size is 1 and when receiver window size is large
  2. Explain Sliding window protocol using GO back to N.

UNIT: 4 | NAME: THE MEDIUM ACCESS CONTROL SUBLAYER


  1. Compare transparent bridge and source routing bridge.
  2. Define a) Nonpersistent CSMA. b) p-persistent CSMA.
  3. Differentiate : Router and Switch
  4. Explain spanning tree bridges. Explain remote bridges.
  5. Explain switched Ethernet.
  6. Explain the Bit-Map protocol with suitable example.
  7. Explain the working principle of bridges.
  8. Explain the working principle of CSMA.
  9. Explain working principle of limited contention protocols.
  10. What is the similarity and difference between Switch and bridge? Also explain cut through switched.
  11. Which two different modes of operation are Supported by Gigabit Ethernet?
  12. Why CSMA/CA is used for wireless network? Explain it.
  13. Write the functions of Media Access Control sub layer. And Compare pure ALOHA and slotted ALOHA.

UNIT: 5 | NAME: THE NETWORK LAYER


  1. Compare : IPv4 and IPv6
  2. Compare datagram subnet and virtual-circuit subnets.
  3. Compare the IPv4 and IPv6 header.
  4. Design issues of Network Layer.
  5. Draw IP headed and explain the each field of the header. Also explain the concept of fragmentation in detail.
  6. Explain and compare distance vector routing and link state routing algorithm.
  7. Explain distance vector routing.
  8. Explain in detail IPV6.
  9. Explain in detail OSPF
  10. Explain link state routing with all the five steps in detail.
  11. Explain Multicasting.
  12. Explain Shortest Path Routing Algorithm.
  13. Explain Sliding window protocol using GO back to N.
  14. Explain the following concepts: Tunneling, Network address translation and DHCP.
  15. Explain the following techniques for achieving good quality of service. (i) Traffic shaping (ii) Leaky bucket algorithm
  16. Explain the following two collision free protocol. (i) A bit map protocol (ii) Binary countdown
  17. Explain the IP addressing scheme in detail.
  18. Explain the leaky bucket algorithm.
  19. Explain the term piggybacking, sending window and receiving window. Explain One-Bit sliding window protocol.
  20. Explain the working principle of stop and wait protocol.
  21. Explain: MAC address and IP address.
  22. How route discovery is done in Ad Hoc networks. Explain format of ROUTE REQUEST and ROUTE REPLY packet.
  23. What is the serious drawback of distance vector routing? Explain it with example.
  24. What is tunneling? Explain

UNIT: 6 | NAME: THE TRANSPORT LAYER


  1. Compare : TCP and UDP
  2. Discuss the working principle of TCP.
  3. Discuss the working principle of UDP
  4. Explain connection establishment and connection release in Transport protocols.
  5. Explain crash recovery of transport protocol
  6. Explain TCP header fields.
  7. Explain the basic five service primitives of the transport layer protocol.
  8. Explain various Quality of service parameters for transport layer.
  9. List the various duties of the transport layer and explain each in brief. Compare UDP and TCP.
  10. Write about elements of transport layer (1) Connection establishment (2) Connection release.

UNIT: 7 | NAME: THE APPLICATION LAYER


  1. Describe the built in HTTP request methods.
  2. E-mail systems contain which two subsystems? Write the five basic functions provided by e-mail system.
  3. Explain : DNS and its advantages
  4. Explain the architectural overview of the world wide web.
  5. Explain the basic functions of the e-mail system.
  6. Explain the e-mail architecture and services. Write short note on POP3 and MIME.
  7. Explain WWW and HTTP.
  8. What is E-mail? How it works? Which protocol it uses?

Analysis and Design of Algorithms

Semester: 5 | Branch: Computer Engineering | Subject Code: 2150703

UNIT: 1 | NAME: BASICS OF ALGORITHMS AND MATHEMATICS


  1. What is an algorithm?
  2. What do you mean by correct algorithm?
  3. What do you mean by instance of a problem?
  4. List out the criteria that all algorithms must satisfy.
  5. On what bases will you consider algorithm A is better than algorithm B?

UNIT: 2 | NAME: ANALYSIS OF ALGORITHM


  1. The efficient algorithm, Average, Best and worst case analysis.
  2. Amortized analysis.
  3. Asymptotic Notations.
  4. Analyzing control statement, Loop invariant and the correctness of the algorithm.
  5. Sorting Algorithms and analysis: Bubble sort, Selection sort, Insertion sort, Shell sort Heap sort.
  6. Sorting in linear time : Bucket sort, Radix sort and Counting sort

UNIT: 3 | NAME: DIVIDE AND CONQUER ALGORITHM


  1. Prove that Greedy Algorithms does not always give optimal solution. What are the general characteristics of Greedy Algorithms? Also compare Greedy Algorithms with Dynamic Programming and Divide and Conquer methods to find out major difference between them.
  2. Justify the general statement that “if a problem can be split using Divide and Conquer strategy in almost equal portions at each stage, then it is a good candidate for recursive implementation, but if it cannot be easily be so divided in equal portions, then it better be implemented iteratively”. Explain with an example.
  3. Write an algorithm for binary search. Calculate the time complexity for each case.
  4. Write an algorithm for selection sort. Calculate the time complexity for each case.
  5. Write an algorithm for merge sort with divide and conquer strategy. Analyze each case.
  6. Write an algorithm for quick sort with divide and conquer strategy. Analyze each case.
  7. Differentiate divide-and-conquer and dynamic programming. Write the recurrence for calculating binomial coefficient.
  8. Write an algorithm for binary search. Calculate the time complexity for each case
  9. Explain how to apply the divide and conquer strategy for sorting the elements using merge sort
  10. Differentiate the following:
    1. Divide and conquer & Dynamic Programming
    2. Greedy Algorithm & Dynamic Programming

UNIT: 4 | NAME: DYNAMIC PROGRAMMING


  1. The Principle of Optimality.
  2. Problem Solving using Dynamic Programming – Calculating the Binomial Coefficient.
  3. Making Change Problem.
  4. Assembly Line-Scheduling.
  5. Knapsack problem.
  6. All Points Shortest path.
  7. Matrix chain multiplication.
  8. Longest Common Subsequence.

UNIT: 5 | NAME: GREEDY ALGORITHM


  1. Give and explain Kruskal’s Algorithm for Minimum Spanning Tree and Compare it with Prim’s algorithm with an example.
  2. Write down the general characteristics of greedy algorithm with respect to making change problem.
  3. Explain Kruskal’s algorithm to find minimum spanning tree with an example. What is it’s time complexity?
  4. What do you mean by minimum spanning tree? Explain single source shortest path with the help of example
  5. Give and explain Prim’s Algorithm for Minimum Spanning Tree and Compare it with Kruskal’s algorithm with an example

UNIT: 6 | NAME: EXPLORING GRAPHS


  1. What is Undirected Graph?
  2. What is Directed Graph?
  3. Traversing Graphs.
  4. Depth First Search.
  5. Breath First Search.

UNIT: 7 | NAME: BACKTRACKING AND BRANCH AND BOUND


  1. The Eight queens problem
  2. Travelling Salesman problem.

UNIT: 8 | NAME: STRING MATCHING


  1. What are the basic ideas behind string matching? Which are the two popular algorithms for string matching? Explain and analyze any one in brief
  2. What is the need of matching the string? Explain Finite automata for string matching
  3. Explain Rabin Karp method of string matching

UNIT: 9 | NAME: INTRODUCTION TO NP-COMPLETENESS


  1. Define the class P and class NP. Is there any NP-Hard problem, which is also NP? If yes, give an example, if no, why?
  2. Define : (1) P (2) NP (3) NP-complete (4) NP-hard

Object Oriented Programming Using Java

Semester: 5 | Branch: Computer Engineering | Subject Code: 2150704

UNIT: 1 | NAME: INTRODUCTION TO JAVA


  1. (i) JVM is platform dependent. Justify.
    (ii) There is no destructor in Java. Justify.
  2. Explain features of JAVA
  3. List various features of Java? Also explain any two feature with example.
  4. Compare Object oriented programming with sequential programming
  5. What is variable? How can we define variable in java? Also list rules for valid variable names

UNIT: 2 | NAME: ARRAY AND STRING


  1. Differentiate the following:
    1. Text I/O v/s Binary I/O.
    2. String class v/s StringBuffer class.
  2. Compare String with StringBuffer class
  3. Differentiate the followings:
    i) String class and String Buffer class
    ii) Constructor and Method
  4. The Transport interface declares a deliver () method. The abstract class Animal is the super class of the Tiger, Camel, Deer and Donkey classes. The Transport interface is implemented by the Camel and Donkey classes. Write a test program that initialize an array of four Animal objects. If the object implements the Transport interface, the deliver () method is invoked
  5. Write a program to check that whether the name given from command line is file or not? If it is a file then print the size of file and if it is directory then it should display the name of all files in it
  6. Write a program that counts the no. of words in a text file. The file name is passed as a command line argument. The program should check whether the file exists or not. The words in the file are separated by white space characters.

UNIT: 3 | NAME: CLASS OBJECTS AND METHODS


  1. Differentiate between constructor and method of class. Define method overloading and its purpose. Write a program to demonstrate the constructor overloading.
  2. Define polymorphism with its need. Define and explain static and dynamic binding using program.
  3. Define and write a program to differentiate between pass by value and pass by reference.
  4. Explain this reference, key word static and garbage collection
  5. Explain the followings:
    (i) Dynamic Method Dispatch with example
    (ii) this, super, final
  6. Design a class named Fan to represent a fan. The class contains: -
    Three constants named SLOW, MEDIUM and FAST with values 1,2 and 3 to denote the fan speed. -
    An int data field named speed that specifies the speed of the fan (default SLOW).
    A boolean data field named f_on that specifies whether the fan is on(default false).
    A double data field named radius that specifies the radius of the fan (default 4).
    A data field named color that specifies the color of the fan (default blue).
    A no-arg constructor that creates a default fan.
    A parameterized constructor initializes the fan objects to given values.
    A method named display() will display description for the fan. If the fan is on, the display() method displays speed, color and radius. If the fan is not on, the method returns fan color and radius along with the message “fan is off”. Write a test program that creates two Fan objects. One with default values and the other with medium speed, radius 6 color brown, and turned on status true. Display the descriptions for two created Fan objects
  7. Define the Rectangle class that contains:
    Two double fields x and y that specify the center of the rectangle, the data field width and height , A no-arg constructor that creates the default rectangle with (0,0) for (x,y) and
    1. for both width and height.
    2. A parameterized constructor creates a rectangle with the specified x,y,height and width.
    A method getArea() that returns the area of the rectangle.
    A method getPerimeter() that returns the perimeter of the rectangle.
    vA method contains(double x, double y) that returns true if the specified point(x,y) is inside this rectangle.
    Write a test program that creates two rectangle objects. One with default values and other with user specified values. Test all the methods of the class for both the objects
  8. The abstract Vegetable class has three subclasses named Potato, Brinjal and Tomato. Write an application that demonstrates how to establish this class hierarchy. Declare one instance variable of type String that indicates the color of a vegetable. Create and display instances of these objects. Override the toString() method of Object to return a string with the name of the vegetable and its color
  9. Explain & illustrate by examples use of final, finally and method finalize
  10. Declare a class called coordinate to represent 3 dimensional Cartesian coordinates( x, y and z). Define following methods:
    - constructor
    - display, to print values of members
    - add_coordinates, to add three such coordinate objects to produce a resultant coordinate object. Generate and handle exception if x, y and z coordinates of the result are zero -main, to show use of above methods
  11. Explain short circuited operators, shift operators and this reference
  12. Declare a class called book having author_name as private data member. Extend book class to have two sub classes called book_publication & paper_publication.
    Each of these classes have private member called title. Write a complete program to show usage of dynamic method dispatch (dynamic polymorphism) to display book or paper publications of given author.
    Use command line arguments for inputting data
  13. It is required to compute SPI (semester performance index) of n students of your college for their registered subjects in a semester.
    Declare a class called student having following data members: id_no , no_of_subjects_registered, subject_code , subject_credits, grade_obtained and spi.
    - Define constructor and calculate_spi methods.
    - Define main to instantiate an array for objects of class student to process data of n students to be given as command line arguments
  14. What is constructor? Explain constructor overloading with example
  15. What is visibility modifier? Explain all with example
  16. Write a program which shows an example of function overloading? Write a program which shows an example of function overriding?
  17. What is constructor? What are the rules for creating constructor in java?
  18. What are final class, final function and final variable in java? Explain with example
  19. Explain following key words: this, super, instance of
  20. Differentiate between constructor and method of class. Define method overloading and its purpose. Write a program to demonstrate the constructor overloading
  21. Define polymorphism with its need. Define and explain static and dynamic binding using program
  22. Differentiate the followings: Constructor and Method
  23. What is the use following java keywords super, transient, finally, final, static, throw, throws
  24. i) What do you mean by Event Delegation model in Java?
    ii) How the concept of inner classes is used for event handling?

UNIT: 4 | NAME: INHERITANCE AND INTERFACE


  1. Differentiate between abstract class and interface specifying matrices of differences. Write a program to define abstract class, with two methods addition() and subtraction(). addition() is abstract method. Implement the abstract method and call that method using a program(s).
  2. Explain final and super by giving examples
  3. Declare a class called employee having employee_id and employee_name as members. Extend class employee to have a subclass called salary having designation and monthly_salary as members. Define following:
    - Required constructors
    - A method to find and display all details of employees drawing salary more than Rs. 20000/-.
    - Method main for creating an array for storing these details given as command line arguments and showing usage of above methods.
  4. Explain method overriding and method overloading with the help of examples
  5. State whether the following statements are true or false:
    (i) An abstract class contains constructors.
    (ii) The catch block is the preferred means for releasing resources to prevent resource leaks.
    (iii) If capacity increment is not specified for Vector, the system will double the size of Vector each time additional capacity is needed.
    (iv)An interface can extend an abstract class.
  6. Describe the Java Collections Framework. List the interfaces, abstract classes and concrete classes of collection hierarchy.
  7. The Transport interface declares a deliver() method. The abstract class Animal is the superclass of the Tiger, Camel, Deer and Donkey classes. The Transport interface is implemented by the Camel and Donkey classes. Write a test program that initialize an array of four Animal objects. If the object implements the Transport interface, the deliver() method is invoked
  8. List OOP characteristics and describe inheritance with examples
  9. Explain super, instanceof and volatile.
  10. Explain interface and its usage.
  11. Explain following with example:
    1. Super keyword.
    2. Final keyword
  12. Explain Dynamic method dispatch with proper example
  13. Features of Map Interface
  14. Explain inheritance with its types and example
  15. How interface are useful in java? Explain with example
  16. Explain the unique features of Map interface.

UNIT: 5 | NAME: PACKAGE


  1. Explain package and interface by giving examples
  2. Explain package and interface with Example
  3. What is package? List various built in package used in java

UNIT: 6 | NAME: EXCEPTION HANDLING


  1. Explain the importance of Exception handling in java. Write a program to handle NoSuchMethodException, ArrayIndexOutofBoundsException using try-catch-finally and throw.
  2. Enlist and explain the difference between error and exception. Write a program to handle InterruptedException, IllegalArgumentException using try-cat-finally and throw.
  3. Write a method for computing xy by doing repetitive multiplication. x and y are of type integer and are to be given as command line arguments. Raise and handle exception(s) for invalid values of x and y. Also define method main. Use finally in above program and explain its usage
  4. Explain packages, their use, adapter classes and their needs & applications. Give examples
  5. What is an Exception? Explain Exception handling in JAVA
  6. What is error? Explain various types of errors. How can we handle run time errors in java?
  7. Explain exception handling in JAVA. Write a program that generates custom exception if any integer value given from its command line arguments is negative
  8. Explain the importance of exception handling in java. Which key words are used to handle exceptions? Write a program to explain the use of these keywords.
  9. How the concept of adapter classes is used in event handling?

UNIT: 7 | NAME: MULTITHREADED PROGRAMMING


  1. Write a program of writing binary file using multithreading. Demonstrate use of join() and yield() interrupt().
  2. Explain: wait, sleep and synchronize
  3. Write a complete multi-threaded program to meet following requirements:
    - Read matrix [A] m x n
    - Create m number of threads
    - Each thread computes summation of elements of one row, i.e. i th row of the matrix is processed by i th thread. Where 0 <= i < m.
    - Print the results.
  4. It is required to have total two threads, both capable of acting as a produce as well as a consumer. If first thread acts as a producer then, the second thread becomes the consumer and vice-versa. They communicate with each other through a buffer, storing one integer number. One of the threads initiates the communication by sending 1 to the other thread The second thread, on receiving 1 sends 2 to the first thread. On receiving 2, the first thread sends three integer numbers, one by one to the second thread. The second thread consumes the numbers by displaying them. Both threads terminate after that. Note that both threads must be capable of initiating the communication. Write complete multi-threaded program to meet above requirements.
  5. Explain interprocess communication mechanism (wait(), notify() and notifyall()) being used by java to avoid polling
  6. Answer the following questions:
    (i) Explain the life cycle of a thread.
    (ii) Explain Java garbage collection mechanism
  7. Write a complete multi-threaded program to meet following requirements:
    Two threads of same type are to be instantiated in the method main.
    Each thread acts as a producer as well as a consumer.
    A shared buffer can store only one integer information along with the source & destination of the information at a time.
    The information produced is to be consumed by appropriate consumer.
    Both producers produce information for both consumers.
    Each thread produces 5 information
  8. It is required to add two MxN sized matrices having integer elements to produce a third resultant matrix of size MxN. Write a complete multi-threaded program to meet following requirements:
    - Accept all required arguments from the command line.
    - Instantiate M threads – with id 0 to M -1 respectively, each thread performing addition of elements on the row specified by its id to produce corresponding row of the resultant matrix
  9. Explain wait, notify, synchronized and native methods.
  10. What is Multithreading ? Explain Life Cycle of Thread with example
  11. Explain thread Synchronization with join() and isAlive() methods
  12. What is Thread? Draw and explain life cycle of thread
  13. What is multithreading? Why it is required? Write a program that creates three threads. Make sure that the main thread executes last.
  14. Why synchronization is required in multithreaded programming. Write a program that uses thread synchronization to guarantee data integrity in a multithreaded application.

UNIT: 8 | NAME: IO PROGRAMMING


  1. Write a program to replace all “word1″ by “word2″ from a file1, and output is written to file2 file and display the no. of replacement.
  2. Write a program to replace all “word1″ by “word2″ to a file without using temporary file and display the no. of replacement
  3. Explain File constructors, any two methods of class File and method seek
  4. Differentiate the followings:
    (i) Checked and Unchecked Exceptions
    (ii) Constructor and method
    (iii) Text I/O and Binary I/O
  5. Write a program that takes input for filename and search word from commandline arguments and checks whether that file exists or not. If exists, the program will display those lines from a file that contains given search word
  6. Write a program that counts the no. of words in a text file. The file name is passed as a command line argument. The program should check whether the file exists or not. The words in the file are separated by white space characters. The words in the file are separated by white space characters
  7. Compare byte streams and character streams.
  8. How can we open and read a text file in java? Explain your answer with example

UNIT: 9 | NAME: COLLECTION CLASSES


  1. Define generics in java. Write a program to demonstrate generic interface and generic method.
  2. Define generics in java. Write a program to demonstrate generic class and generic constructor.
  3. Explain utility class Hashtable and instanceof operator by giving examples
  4. Illustrate by example – generic programming.
  5. Explain Following:
    1. Garbage Collection
    2. Short Circuit Operators
    Answer Following:
    1. Benefits of Generic types.
    2. Explain Java Beans.
  6. Collection in JAVA.
  7. What is collection in Java? Differentiate between Vector and ArrayList
  8. i) What are generics and how are they used?
    ii) Differentiate between Enumeration and Iterator

UNIT: 10 | NAME: INTRODUCTION TO OBJECT ORIENTATION, MODELING AS A DESIGN TECHNIQUE


  1. What is object orientation? Explain Identity, Classification, Polymorphism and Inheritance.
  2. Why Different models are required in analysis and design.
  3. Explain object oriented development process in detail.
  4. What do mean by object oriented methodology? Describe various stages of Object oriented methodology
  5. Briefly explain object oriented themes.
  6. Explain Modularity and Synergy.
  7. Explain three models, their purpose and relationship among them.

UNIT: 11 | NAME: CLASS MODELING


  1. What is class, object, attributes and Operations? Explain in detail.
  2. What do you mean by attributes, attribute visibility and attribute constraints?
  3. Explain association and links in detail.
  4. What is multiplicity? Explain types of multiplicity
  5. What is aggregation and composition? Explain with example. Also give difference between aggregation and composition.
  6. Explain generalization with example.
  7. What so you mean by metadata in class model? Explain types of metadata with example.
  8. Explain 4 types of constraints on generalization set.
  9. Prepare a class diagram for given group of classes using multiplicity, generalization, association concepts. And add at least 5-7 attributes and 3-5 operations for particular class Page, Shape, Point, Line, Arc, Ellipse, Rectangle, Circle
  10. Prepare a class diagram for given group of classes using multiplicity, generalization, association concepts. And add at least 5-7 attributes and 3-5 operations for particular class. City, Airport, Airline, Pilot, Flight, Plane, Seat, Passenger.
  11. Prepare a class diagram for Hospital management system.
  12. Prepare a class diagram for Library management system.
  13. Prepare a class diagram for food ordering system using multiplicity, generalization concept. And add at least 5-7 attributes and 3-5 operations, default value, static operations for class: Customer, Order, NormalOrder, SpecialOrder.

UNIT: 12 | NAME: STATE MODELING


  1. What is state diagram? Why we need state diagram? Explain with example.
  2. What is event? Explain types of events with example.
  3. What do you mean by Transitions and Conditions? Explain parts of Transition
  4. What do you mean by Transitions and Conditions? Explain types of Transition.
  5. Explain Do, Entry and Exit activity with example.
  6. Construct a state diagram for railway reservation system.
  7. Draw a state diagram for chess game.
  8. Draw a state diagram for ATM.
  9. Draw a state diagram for Online Shopping System.

Microprocessor and Interfacing

Semester: 5 | Branch: Computer Engineering | Subject Code: 2150707

UNIT: 1 | NAME: INTRODUCTION TO MICROPROCESSOR


  1. Discuss in detail different working modes of IC 8254-Programmable interval timer
  2. Discuss in detail memory mapped I/O and I/O mapped I/O.
  3. Draw the functional block diagram of internal architecture of IC 8085 and explain its working.
  4. Explain the execution of the instruction STA 2050H with neat timing diagram
  5. Write a detailed note on Interrupts of 8085.

System Programming

Semester: 5 | Branch: Computer Engineering | Subject Code: 2150708

UNIT: 1 | NAME: OVERVIEW OF SYSTEM SOFTWARE


  1. Define following terms :
    1)Assemblers
    2)Macro
    3)Parsing
  2. Define following terms :
    1) System program
    2)Language processor
    3) Parsing
    4)Operator grammar
    5)Handle
    6) Assemblers
    7)Indirect triple
  3. Explain levels of system software.
  4. Difference between System Software and Application Software
  5. Explain macro expansion process with example.

UNIT: 2 | NAME: OVERVIEW OF LANGUAGE PROCESSOR


  1. List various phase of a language processor. Explain roles of first two phases of it. Also explain symbol table.

UNIT: 3 | NAME: ASSEMBLER


  1. Explain assembly scheme with suitable example.
  2. Explain the role of Mnemonic Opcode Table, Symbol Table, Literal Table and POOL Table in assembling process of assembly language program.
  3. Compare single pass assembler and two pass assembler. Explain two pass Assembler in detail with suitable example.
  4. Explain analysis and synthesis phases of an assembler by clearly stating their tasks.
  5. Explain and show usage by giving examples of following assembler Directives: ORIGIN, EQU, LTORG, START.
  6. Explain & compare various intermediate code forms (Representations) for an assembler.
  7. Explain two pass assembler.
  8. Compare Variant I and Variant II of intermediate code generation for assembler?
  9. Explain the complete working of first pass of the double pass assembler along with the data structure used.
  10. Explain use of various data structures (tables) needed in PASS I of the assembler. Also give details of their fields. Explain various suitable data structures for the symbol table.
  11. Define forward references. How it can be solved using back-patching? Explain with example.
  12. Explain in brief design of a Single Pass Assembler
  13. Differentiate one pass and two pass assembler. Explain how forward references are handled in two pass assembler.
  14. Which are the different assembly language statements? Explain each of them with suitable example.
  15. Explain use of various data structures needed in pass-I of the assembler and give details of their fields.

UNIT: 4 | NAME: MACRO AND MACRO PROCESSORS


  1. (i) Write a macro that moves n numbers from the first operand to the second operand, where n is specified as third operand of the macro.
    (ii) Write a macro which takes B, C, and D as parameters and calculates B*C + C*D.
  2. Compare the features of subroutine and macros with respect to following.
    (i) Execution speed
    (ii) Processing requirement by assembler.
    (iii) Flexibility and generality
  3. Explain advanced macro facilities with suitable example.
  4. Explain design specification tasks for macro preprocessor with suitable example.
  5. Define two macros of your choice to illustrate nested calls to these macros. Also show their corresponding expansion.
  6. Explain with examples – expansion time variables, expansion time statements – AIF and AGO for macro programming. Show their usage for expansion time loop by giving example.
  7. Describe tasks and data structures considered for the design of a macro preprocessor.
  8. Explain attributes of formal parameters, default specifications of parameter and semantic expansion for macro by giving examples.
  9. Explain Design of Macro Preprocessor.
  10. What is macro in programming language. Write an algorithm for macro definition.
  11. Explain various data structures of Macro definition processing with example
  12. Define Lexical and Semantic Expansion. Write a macro which takes A,B, C and D as parameters and calculates A*B+C*D in AREG.
  13. Explain macro expansion in details.
  14. What is macro-preprocessor? Explain steps of macro-preprocessor design.
  15. Explain following advanced macro facilities:
    (i) Alteration of flow of control during expansion
    (ii) Expansion time variables
  16. (i) Define a macro taking A and B as parameters to compute A = A * B + B * B + A + B
    (ii) Explain positional parameters, keyword parameters and default value parameters for macros.
  17. (i) Define a macro taking starting_location and N as parameters to find summation of all N numbers stored at locations starting from starting_location. The result is to be stored at starting_location.
    (ii) Illustrate expansion of nested macro calls by giving example
  18. List and explain tasks involved in macro expansion.
  19. Write general purpose macro to move the contents of one area of memory into another area of memory. Assume that destination area is larger in size, remaining part of it should be padded with zeroes at the end of the area.
  20. Explain use and field of following tables of a macro KPDTAB, MDT, EVTAB, SSTAB
  21. Explain lexical and semantic expansion of macro with example.
  22. Explain with example expansion time sequencing symbols and expansion time variable.
  23. Compare and Contrast the following
    (i) macro call and function call
    (ii) macro preprocessor and macro assembler.
  24. Explain following terms with suitable example.
    (i) Expansion time variable
    (ii) Semantic Expansion
    (iii) Positional parameter
    (iv) Macro Preprocessor

UNIT: 5 | NAME: LINKERS AND LOADERS


  1. Explain how relocation and linking is performed.
  2. Write a brief note on MS-DOS linker.
  3. What is overlay? Explain the execution of an overlay structured program.
  4. Explain absolute loader with example.
  5. Explain BSS loader with example.
  6. Explain design of linker by addressing issues of relocation and linking.
  7. Explain the term self relocation program.
  8. Explain the term loader.
  9. What is loader? Enlist basic functions of loader.
  10. Explain program relocation with example.
  11. What is program relocation? How relocation is performed by linker? Explain with example.

UNIT: 6 | NAME: SCANING AND PARSING


  1. Explain lexical analysis and syntax analysis phase in compilation.
  2. Explain left recursion, left factoring and backtracking in top down parsing.
  3. Explain left factoring by giving example.
  4. Define the term Parsing.
  5. Compare top down and bottom-up parser.
  6. Explain recursive descent parser with suitable example. Also state its drawbacks.
  7. Explain types of grammar.
  8. Explain lexical analysis of language processor.
  9. Explain recursive descent parsing algorithm.
  10. List and explain various types of grammar.
  11. Explain left recursion and left factoring with suitable example.

UNIT: 7 | NAME: COMPILERS


  1. Describe various optimizing transformation commonly used in compilers
  2. Discuss parameters for activation record,
  3. Explain triple and quadruple representation with example
  4. List and compare the techniques used for dynamic memory allocation
  5. Define the term triple and indirect triple
  6. Consider the statement a=b+c*10. Where a, b, c are float type. Show the translation of given statement by different phases of compiler to produce assembly language statement
  7. What is code optimization? Explain with eample various optimizing transformation

UNIT: 8 | NAME: INTERPRETERS AND DEBUGGERS

Software Engineering

Semester: 6 | Branch: Computer Engineering | Subject Code: 160701

UNIT: 1 | NAME: INTRODUCTION TO SOFTWARE ENGINEERING


  1. Explain Software Engineering as a Layered Technology.
  2. Explain Software Project Plan.
  3. Explain Software Prototyping.
  4. Using example explain the spiral model.
  5. What do you mean by software model? Explain each model in detail.

Information Security

Semester: 6 | Branch: Computer Engineering | Subject Code: 160702

UNIT: 1 | NAME: CONVENTIONAL ENCRYPTION


  1. Construct 5 X 5 playfair matrix for the OCCURANCE
  2. Construct a Playfair matrix with the key engineering. And encrypt the message test this process.
  3. Construct a playfair matrix with the key occurrence. Generate the cipher text for the plaintext Tall trees
  4. Define Cryptography and Cryptanalysis. Draw and explain conventional cryptosystem.
  5. Define the Caesar cipher
  6. Define the following terms briefly. i) Cryptography ii) Relative Prime Number iii) MAC iv) Digital Signature.
  7. Define the terms threat and attack. List and briefly define categories of security attacks.
  8. Differentiate Symmetric and Asymmetric key cryptography.
  9. Explain monoalphabetic cipher and polyalphabetic cipher by giving an example.
  10. Explain the one time pad scheme.
  11. Explain the various types of cryptanalytic attack, based on the amount of information known to the cryptanalyst.
  12. Is playfair cipher monoalphabetic cipher? Justify. Construct a playfair matrix with the key moonmission and encrypt the message greet.
  13. Let the keyword in playfair cipher is keyword. Encrypt a message come to the window using playfair cipher.
  14. List and briefly define the security services.
  15. What is cryptography? Briefly explain the model of Asymmetric Cryptosystem.
  16. What is the objective of attacking an encryption system? Write the two approaches to attack a conventional encryption scheme.

UNIT: 2 | NAME: CONVENTIONAL ENCRYPTION TECHNIQUES


  1. Define the terms diffusion and confusion. What is the purpose of S-box in DES? Explain the avalanche effect in DES.
  2. Describe the three operations used by International Data Encryption Algorithm.
  3. Draw and explain Feistel structure for encryption and decryption
  4. Explain Blowfish encryption algorithm
  5. Explain how subkeys are generated in blowfish algorithm and also explain the encryption in blowfish algorithm. How does the key-size in blowfish differ from cast-128?
  6. Explain single round function of DES with suitable diagram.
  7. Explain the DES encryption algorithm.
  8. Explain the terms diffusion and confusion.
  9. Explain the triple DES scheme with two keys and write about proposed attacks on 3DES.
  10. List various modes of operations of block cipher. Explain any three of them briefly.
  11. The exact realization of Feistel network depends on the choice of which parameters?
  12. What is the difference between fiestel structure of Blowfish and cast-128? Explain the fiestel structure of Blowfish and cast-128.
  13. What is the purpose of S-boxes in DES? Explain the avalanche effect.
  14. Which parameters affect RC5 encryption algorithm. Explain RC5 encryption and decryption process.
  15. Why mode of operation is defined? Explain the simplest mode for block cipher modes of operation?

UNIT: 3 | NAME: PUBLIC KEY CRYPTOGRAPHY


  1. Explain Encryption and decryption in RSA algorithm. Also discuss various attacks on RSA.
  2. Explain four passes of MD5 message digest algorithm.
  3. Explain the key distribution scenario and write how does decentralized key control work?
  4. How key exchange using elliptic curves can be done?
  5. i) Write extended Euclidean algorithm. ii) Give the steps of RSA algorithm.
  6. In a public key system using RSA, the ciphertext intercepted is C=10 which is sent to the user whose public key is e=5, n=35. What is the plaintext M?
  7. List and explain four general categories of schemes for the distribution of public keys.
  8. Perform encryption and decryption using the RSA algorithm for p=3, q=11, e=7, M=5.
  9. What is a trap-door one-way function? What is its importance in public key cryptography?
  10. What is an elliptic curve? What is the zero point of an elliptic curve?
  11. What is KDC? With the help of diagram explain how KDC do key distribution.
  12. What is public key cryptography? Compare it with conventional cryptography.
  13. Write and explain the Diffie-Hellman key exchange algorithm
  14. Write four possible approaches to attacking the RSA algorithm
  15. Write the key distribution scenario in which each user shares a unique master key with key distribution center

UNIT: 4 | NAME: NUMBER THEORY


  1. 1. Find GCD of 1970 and 1066 using Euclid algorithm 2. Find all primitive roots of a number 7.
  2. Define congruent modulo. Also Find integer x such that 1. 5x≡4 (mod 3) 2. 7x≡6 (mod 5)
  3. Explain Eulers totient function.
  4. Which two criteria are used to validate that a sequence of numbers is random? Explain the linear congruential method to generate pseudorandom numbers.
  5. Write two properties of prime numbers.

UNIT: 5 | NAME: MESSAGE AUTHENTICATION AND HASH FUNCTIONS


  1. Explain different characteristics of hash function and secure hash function.
  2. Explain digital signature algorithm in detail.
  3. Explain MD5 Hash Algorithm.
  4. Explain the following properties of hash function
    (i) One way property
    (ii) Weak and strong collision resistance
    (iii) Compression functions in hash algorithm.
  5. Explain the operation of secure hash algorithm on 512 bit block.
  6. i) Explain the general structure of secure hash functions. ii)Explain briefly basic uses of MAC
  7. Illustrate the overall operation of HMAC. Define the terms.
  8. Illustrate variety of ways in which hash code can be used to provide message authentication.
  9. What is MAC? Why it is required? Explain HMAC algorithm.
  10. What is the need for message authentication? List various techniques used for authentication. Explain any one.
  11. Write the Euclid algorithm and show the steps of Euclid algorithm to find gcd(1970,1066).

UNIT: 6 | NAME: INTRODUCTION TO E-COMMERCE


  1. What is included in authorization request sent by merchant to the payment gateway in case of E-commerce transaction?

UNIT: 7 | NAME: NETWORK SECURITY


  1. Explain Kerberos in detail.
  2. Explain Secure electronic transaction protocol.
  3. Explain the one-way and two way authentication in X.509.
  4. Explain the ticket granting server(TGS) scheme in Kerberos
  5. What is a dual signature in reference to secure electronic transaction?
  6. Write the key features of secure electronic transaction.

UNIT: 8 | NAME: IP SECURITY E-MAIL SECURITY


  1. Discuss about PGP and S/MIME
  2. Explain modes of operations of IPsec and applications of IPsec
  3. Explain the general format of PGP(Pretty Good Privacy) message. Assume that message is going from A to B.
  4. What is the difference between transport mode and tunnel mode?
  5. What parameters characterize the nature of a particular security association in IPSec.

UNIT: 9 | NAME: WEB SECURITY


  1. Explain SSL handshake protocol in detail.
  2. List and define the parameters that define secure socket layer connection state.
  3. Which parameters define session state and which parameters define connection state in SSL(secure socket Layer)?
  4. Write a note on followings (Any 4)
    Digital Signature
    Pretty Good Privacy
    Secure Socket Layer
    Active Directory Service of Windows NT
    Firewall

Computer Graphics

Semester: 6 | Branch: Computer Engineering | Subject Code: 160703

UNIT: 1 | NAME: INTRODUCTION TO COMPUTER GRAPHICS


  1. Explain the working of Cathode Ray tube. OR Explain working of CRT with a diagram
  2. Write the differences between Random Scan display and Raster scan display.
  3. Explain shadow mask technique and explain how does it differ from beam penetration technique?
  4. Explain working principle of scanner
  5. How coordinate values of selected screen position is determined in touch screens?
  6. List advantages and disadvantages plasma panel display.
  7. Briefly explain the following display technologies
    (1) Raster refresh systems
    (2) Vector refresh systems
    (3) LCDs
  8. Consider a raster system with resolution of 1280 by 1024. What size of frame buffer is needed for given system to store 24bits per pixel? How many colors are possible in given system? What is the access time per pixel if refreshing rate is 60 frames per second?
  9. Explain Direct View Storage Tube (DVST). How persistence characteristic of phosphor affect on refresh rate of system?
  10. LCD & LED Display.

UNIT: 2 | NAME: GRAPHICS PRIMITIVE


  1. For what purpose winding number method is used? What is a winding number?
  2. Explain boundary fill and flood fill for polygon filling.
  3. Explain three methods of character generation.
  4. Write basic principle of Bresenham’s line algorithm and write Bresenham’s line algorithm.
  5. Define the term
    (a) Antialiasing,
    (b) anchoring
  6. Which two types of sensors are used in digital cameras?
  7. Briefly explain the advantages of Look table used in Graphics display system.
  8. Derive all necessary formulas for Bresenham line drawing algorithm. Bresenham line drawing algorithm is used to draw a line from (0, 0) to (6, 4). Determine all the pixels which will be on as the line is drawn.
  9. Derive all necessary formulas for Midpoint circle drawing algorithm. Write pseudo code for Midpoint circle drawing algorithm. Write and explain the midpoint circle generation algorithm.
  10. Briefly explain the attributes associated with line and characters. Briefly explain the different methods for the generation of thick lines
  11. What is aliasing? Briefly explain anti-aliasing techniques.
  12. Develop and implement a flood-fill algorithm to fill the interior of any specified area. What are the differences between flood-fill and boundary fill algorithm?
  13. What is a polygon mesh? Discuss various ways to represent a polygon mesh with their merits and demerits.
  14. Explain DDA line drawing algorithm. What are the limitations of DDA line drawing algorithm?
  15. Explain Odd-Even Rule and Non Zero Winding Rules.
  16. Explain the Bresenham’s algorithm to raw line for any kind of slope.
  17. Derive all formulas for Bresenham line drawing algorithm. Write a function Bresenhamline(x1, y1, x2, y2, type) so it draws line with specified type. If type=0, solid line, type=1 dashed line and type=2 dotted line.
  18. Briefly explain different methods to generate thick lines. Discuss merits and demerits of each method.
  19. Briefly explain scan line polygon filling algorithm. Explain the fields of edge table and criteria for adding and removing edge to active edge table.
  20. Define polygon mesh. Briefly explain different methods used to represent polygon mesh with example
  21. Give advantages and disadvantages of DDA algorithm. Draw a line from (20,10) to (30,18) using DDA algorithm.
  22. Clip the line using Liang Barsky algorithm against window with (XWmin, YWmin)= (0,0) and (XWmax, YWmax)=(100,50). Line end points are A(10,10) and B(110, 40)

UNIT: 3 | NAME: 2D TRANSFORMATION & VIEWING


  1. Explain the term region codes. Write the steps of Cohen-Sutherland line clipping algorithm.
  2. Explain scaling in 2D Transformations
  3. Explain and write Liang Bersky line clipping algorithm
  4. Explain NLN clipping algorithm
  5. Find out the composite transformation matrix to rotate a given 2D object by an amount θ about given point P1(x1, y1).
  6. Clip the line PQ having coordinates A(4,1) and B(6,4) against the clip window having vertices A(3,2) , B(7,2) , C(7,6) and D(3,6) using Cohen Sutherland line clipping algorithm. Mention the limitations of algorithm. How it can be overcome?
  7. Derive transformation matrix for 2D rotation.
  8. What is window and view-port? Retrieve equations for the scaling factors to map the window to view-port in 2D viewing system.
  9. What is homogeneous coordinate? Why is it required?
  10. Prove that successive rotation is additive and commutative
  11. Briefly explain cyrus back line clipping algorithm. Compare cyrus back and liang basky line clipping algorithm
  12. Determine the transformation matrix which reflects given object about diagonal y=x
  13. Consider square with left-bottom corner at (2, 2) and right-top corner at (6, 6). Find out the transformation matrix which makes its size half such that its centre remains same.
  14. Consider a triangle with vertices A(1,1), B(5,2) and C(3,4). Find out the transformation matrix which rotates given triangle about point C (3,4) by an angle 30 clockwise. Also find rotated triangle.
  15. Briefly explain different techniques to make visible surface determination algorithm more effective. Briefly explain back face culling algorithm.
  16. Prove that the reflection of a square ABCD [(2,2), (4,2), (4,4), (2,4)] about x axis (y =0) and then rotation of the resulting square about 600 will not be same if the order of transformation (first rotation and then reflection) is changed
  17. Solve the followings: Locate the new position of the triangle [(5,4), (8,3), (8,8)] after its rotation by 90 clockwise about the Centroid
  18. Answer the followings:
    (1) What do you mean by view plane?
    (2) What is type face?
    (3) Define: B-Spline curve
    (4) What is Polygon mesh?
    (5) What is surface patch?
    (6) What is a spline?
    (7) What are the different ways of specifying spline curve?

UNIT: 4 | NAME: 3D CONCEPTS & OBJECT REPRESENTATION


  1. List the properties of Bazier curves OR Explain the Bazier curves and surfaces
  2. Explain the properties of B-spline curve
  3. Explain perspective projection in 3D display methods.
  4. Explain the parallel and perspective projection techniques to project 3D object onto 2D view plane.
  5. Explain reflection with respect to any plane in 3D transformations.
  6. Explain three types of axonometric projection in 3D
  7. Find out composite transformation matrix to reflect a triangle with vertices A (-2, 1), B (-1, 2) and C (-2, 2) about line y=x+2. Also find the coordinates of reflected object.
  8. Compare parallel and perspective projection. Derive perspective transformation matrix with centre of projection (0, 0, -d) and xy as a plane of projection.
  9. Develop and implement Cyrus-beck line clipping algorithm.
  10. Find out the 3D transformation matrix to rotate a given 3D object by an amount 60 about line passing from point(1,1,1) and the direction vector V=2i+2j+2k.
  11. Briefly explain 3D viewing process.
  12. Explain Parallel Projection

UNIT: 5 | NAME: 3D TRANSFORMATION & VIEWING


  1. Answer the followings:
    (1) What is the need of homogeneous coordinates?
    (2) What is Transformation?
    (3) What is cubic spline?
    (4) What is Bezier Basis Function?
    (5) What is bitmap and what is pixmap?
    (6) List out the important properties of Bezier Curve.
    (7) Differentiate between interpolation spline and approximation spline?

UNIT: 6 | NAME: ADVANCED TOPICS


  1. Explain the term hue and saturation.
  2. Explain ambient light and diffuse illumination
  3. Briefly explain Z-buffer visible surface determination algorithm.
  4. Briefly explain about RGB, CMY and YIQ color models.
  5. What is depth buffer method? Write and explain the steps of a depth buffer algorithm.
  6. Explain Specular & Diffuse Reflection.
  7. Explain XYZ color model.

Theory Of Computation

Semester: 6 | Branch: Computer Engineering | Subject Code: 160704

UNIT: 1 | NAME: REVIEW OF MATHEMATICAL TERMS AND THEORY


  1. Design Turing Machine(TM) to accept Palindrome over {a,b}, even as well as odd.
  2. Explain Church Turing Thesis
  3. Explain Halting Problem.
  4. Explain NP-Hard and NP-Complete Language
  5. Explain Universal TM

Web Application Development

Semester: 6 | Branch: Computer Engineering | Subject Code: 160705

UNIT: 1 | NAME: INTRODUCTION TO WWW


  1. Bowser compatibility issue and its possible solution.
  2. What is navigation? Discuss the characteristics of effective navigation.
  3. What components are used by modern email?
  4. What is HTTP? How does it work? Give appropriate example.
  5. Explain following terms: URI, Web browser, HTTP.
  6. Explain different website designing issues.
  7. What do you mean by browser? Explain HTTP and FTP
  8. Explain the points which should be considered for planning a website.
  9. What is the role of Mail User Agent(MUA) and mail transfer agent(MTA)?
  10. What are the problems with FTP(file transfer protocol)?
  11. Enlist and explain the website design principles.
  12. What do you mean by planning a website? Discuss about the objectives and goals, and target audience in detail with proper example.
  13. How do you identify the contents for your website? How do you organize them for easy and quick access? Discuss with some real example.
  14. Explain the architecture of the browser.
  15. Explain how does the session run when a Telnet program try to connect to a Web server and ask for the initial page?
  16. If in the response to GET /index.html HTTP/1.0 returns HTTP/1.1 200 OK. What is the interpretation? What other error codes can be returned?
  17. Explain HTTP request and response with POST, GET, PUT, DELETE, TRACE and OPTION.

UNIT: 2 | NAME: INTRODUCTION TO HTML


  1. What is an HTML form? Discuss the different form attributes and design a simple form to register for new semester.
  2. Explain the following with example
    a. Unordered lists
    b. Ordered lists
    c. Nested lists
    d. Definition lists
  3. What is Metadata? Where it is included in HTML and XHTML? Explain with example how Metadata is included in a document?
  4. Show the use of the HTML table tag to design the tables with different requirement with example.
  5. How copy right and registered symbol can be put on HTML document?
  6. Explain <optgroup> and <span> tag with example.
  7. b. How can you open a link in a new browser window?&u_num=2&u_name=Introduction to HTML”> Give the answer of following question.
    a. Justify it:” HTTP is called as stateless protocol”.
    b. How can you open a link in a new browser window?
  8. What is HTML form? Design a simple HTML form for registration of a student.
  9. Explain ordered and unordered list with example.
  10. Write a form to collect details of a user such as name, address, radio button to choose subject of book he wants to buy, Dropdown to choose favorite author, comments for the last book he read. What is the use of <fieldset>?
  11. How an inline frame be embedded on a page with graphics and text?
  12. What are frames? List out its advantages and disadvantages.

UNIT: 3 | NAME: STYLE SHEETS


  1. What is CSS? Explain different ways to write the CSS and show the importance of “id” and “class” in CSS.
  2. Write the HTML snippet to show each letter of a word with new color, giving a rainbow effect using CSS.
  3. How can you do following with cascading style sheet?
    a. Text Decoration
    b. Text Indentation
  4. What is the difference between class and id? How can a style rule be defined with an id red heading that gives red color to heading h1 with text of heading right aligned?
  5. Explain CSS with all types. Explain BOX MODEL.
  6. Define a class which defines a text alignment style to be left. Show how this same style can be applied to multiple tags?
  7. How can a style sheet be linked to a web page or how a cascaded style sheet be embedded within a document? With the help of cascaded style sheet change background color. What changes are to be done to set an image as a background? Manipulate a background image so it can be repeated over an area.
  8. Define CSS. Enlist and explain methods of using CSS in web page. Specify the CSS to provide; link: after visited blue color and before visited red color, table with odd rows white and even rows blue color.
  9. Write cascading style sheet to get following formatting for the paragraph.
    a. Text color-green
    b. Text-indentation – 2 cm
    c. Font-courier
    d. Font style-italic
    e. Text case-uppercase
  10. Write the following styles in separate CSS file and also show how to link this CSS file in HTML file and show use of styles.
    (i) The headings should have normal font style and font’s size should be 120 %
    (ii) Define a class arial for paragraph which defines font family arial and font style bold.
    (iii) Apply a background color yellow and apply a background image

UNIT: 4 | NAME: JAVASCRIPT


  1. Design an login form using HTML and JavaScript with following validations on password field : minimum length 8 characters, it should have some special character.
  2. Why do you need validation? Show the use of regular expression in JavaScript to validate the email address with example.
  3. What are JavaScript objects? List the important built-in objects. How can you write your own object?
  4. Write a JavaScript that uses function to calculate how many days are left in your birthday?
  5. Write a JavaScript, that uses a loop, that searches a word in sentence held in an array, returning the index of the word.
  6. Explain the Document Object Model. Explain the explain document object with example.
  7. Show the use of events for the following with example.
    (i) Trap the exiting of the user from a page.
    (ii) Show the heading. When the mouse is over the heading the background color should be yellow and when the mouse goes out of the heading, color should change to black.
  8. Write an HTML and JavaScript program which accepts N as input and displays first N Fibonacci numbers as list.
  9. What is JavaScript event? List the major events and show use of at least one event by writing JavaScript code.
  10. Write a JAVAScript to print characters of a string at odd positions.(for example for the string India, I, d and a should get printed).
  11. Write a JAVAScript to take 2 digit number and then separate these 2 digits, then multiply first digit by itself for second digit times.( for example, 23 should be separated as 2 and 3. 2 should multiply with itself 3 times).
  12. How user defined objects are created in JAVAScript? How a constructor can be used to populate data in the object?
  13. What are differences between client side and server side scripting language? Write down java script code to check mobile number ( mobile number should start with 9 or 8) and mail id(check @ and .)
  14. Write down java script code to validate user name and password (password length must in between 6 to 12 characters. User name should not start with _, @, or any number, both are not blank).
  15. Define DHTML. Explain onLoad, onBlur, image preloading, change image size, mouse curser position.
  16. Explain advantages of external JavaScript with example.
  17. Explain different types of pop box in JavaScript.

UNIT: 5 | NAME: XML


  1. Give the document structure for the XML document and give the characteristics which differentiate it from HTML.
  2. What is DTD? Give and explain the sample DTD.
  3. Explain elements of XML
  4. Explain the following XSL(XML stylesheet elements) (i) value-of (ii) for-each (iii) sort
  5. Explain elements of XML
  6. What is XML? Write an XML file to store your semester mark sheet.
  7. Assume that your semester marks of all the subjects are store in XML. Write an XSL file using XSLT to display it in XHTML table form.
  8. Explain the two ways in which XML parser checks whether a document follows the expected order and structure.
  9. Explain elements of SOAP with XML.
  10. What is stored in Content-Type header for a SOAP request and response?
  11. Generate XML file from below code:
    <!DOCTYPE NEWSPAPER>
    <!ELEMENT NEWS(ARTICLE+)>
    <!ELEMENT ARTICLE(HEADLINE, BODY, NOTES)>
    <!ELEMENT HEADLINE(#PCDATA)>
    <!ELEMENT BODY(#PCDATA)>
    <!ELEMENT NOTES(#PCDATA)>
    <!ATTLIST ARTICLE AUTHOR CDATA #REQUIRED>
    <!ATTLIST ARTICLE EDITOR CDATA #IMPLIED>
  12. What is XML ELEMENT and XML Schema? Explain CDATA and PCDATA with example.
  13. Develop an XML document that will hold a book collection with fields for book name, author, ISBN number and quantity. Write suitable document type definition and schema for the XML.
  14. Compare and contrast between HTML and XML. Write any XML document and DTD to describe its structure including elements, attributes and entities.

UNIT: 6 | NAME: WEB SERVICES, FEEDS AND AND BLOGS


  1. What is the need for web services?
  2. What is a blog? What subject areas can be covered in blogs?
  3. Explain RSS(Really Simple Syndication) <channel> elements and <item> elements.
  4. What is role of Web server? List the popular Web servers with their characteristics.
  5. What is Web service? What is role of SOAP in Web service? Give an example.
  6. Explain Web feeds.
  7. Explain Web server. Give difference between IIS and Apache Web Server? Write down only steps of UNIX/LINUX web server.
  8. What’s contribution of SOAP, Web feeds and BLOGS to web services? What is aggregation in web services?
  9. Explain need and working of web services with diagram.
  10. Explain web feed and blogs with their importance and in specific situation where they should be used.
  11. Explain importance of DOCUMENT_ROOT and specify the same for apache web server. Specify the name and path for configuration file, error log file, access log file of apache. How to change the default file type being responded by web server. Define dynamic IP. Consider all in the question w.r.to Unix/Linux.
  12. Write a note on secure connection over Internet.
  13. Describe term Webservice with suitable WSDL File

UNIT: 7 | NAME: PHP


  1. Write PHP programs to
    (i). To print whether current year is leap year or not.
    (ii). To print whether given number is odd or even.
  2. Write PHP program to print first 10 Fibonacci numbers.
  3. What are the different types of arrays in PHP? Explain with example to process the arrays in PHP.
  4. What is Cookie? How can we handle cookies in PHP?
  5. What is session? Explain PHP session management.
  6. Write a PHP program to display table of cube for 1 to 10.
  7. How can you connect to database in PHP? Explain database connectivity in PHP with example.
  8. Write a PHP program to display a table stored in database.
  9. Create calculator using php.
  10. With the use of PHP, write two scripts, one to pick up details of a library customer and the other to store the details (in variables) and display them.
  11. With the use of PHP, switch case and if structure perform the following and print appropriate message.
    (i) Get today’s date
    (ii) if date is 3, it is dentist appointment.
    (iii) If date is 10, go to conference.
    (iv) If date is other than 3 and 10, no events are scheduled.
  12. Write a PHP program to read a text file.
  13. Write a PHP program to display a table stored in database.
  14. Write modules using HTML and PHP to store information of employee (employee id, job title, years of experience) in an array. And output the data to a web page by arranging the employees in ascending order of experience.
  15. What’s myadmin and database bug. What’s function in PHP? Explain types of function with example.
  16. What are basic commands of PHP? Explain with example.
  17. Explain string manipulation in PHP with example.
  18. Using PHP, how can it be identified that server is dealing with which browser?
  19. What PHP can do with header() command?
  20. Explain different ways to pass information from one web page to other(s). Write a PHP program to explain any two ways.
  21. Write a note on server side include. Write a PHP program to demonstrate the same.
  22. Write a PHP program to parse and validate XML file using DTD.
  23. Explain need of URL redirection. Write the same in PHP, HTML and JavaScript.
  24. Explain variable function and magic methods using PHP program.
  25. Give differences between following.
    i. GET versus POST
    ii. Cookie versus Session variable
  26. Explain the use of following arrays in PHP.
    1. $_REQUEST [ ]
    2. $_SERVER[ ]

UNIT: 8 | NAME: INTRODUCTION TO PERL AND CGI PROGRAMMING


  1. Write a short on the following
    (i) CGI
    (ii) PERL
  2. What is CGI? How does it work? How do web server and CGI program communicate?
  3. Explain the Web programming using PERL with proper example.
  4. Write PERL programs for
    1. Printing first N odd numbers
    2. Reverse an integer number
  5. Explain the form processing in PERL with simple example.
  6. What is CGI? How does web server and CGI program interact? List the important CGI environment variables
  7. Write a PERL program to accept the two numbers from the HTML form and display its sum.
  8. Explain CGI. Also write simple CGI program to display “Hello World” into browser
  9. Write a PERL program to process form data on server side.

System Programming

Semester: 6 | Branch: Computer Engineering | Subject Code: 160706

UNIT: 1 | NAME: LANGUAGE PROCESSORS


  1. Differentiate passes and phases of complier. Explain in brief syntax analysis phase
  2. Explain and show usage by giving examples of advanced assembler Directives.
  3. Explain in brief design of a Single Pass Assembler.
  4. Explain in brief the design of a macro preprocessor
  5. Explain macro expansion process with example.

Mobile Computing

Semester: 7 | Branch: Computer Engineering | Subject Code: 170702

UNIT: 1 | NAME: MOBILE COMPUTING INTRODUCTION


  1. Draw the mobile computing layer architecture of a car with GPS receiver, WAP, automatic parking lights control, smart-card based start and speech recognition.
  2. Explain the differences between 1G, 2G, 2.5G and 3G mobile communications.
  3. What are the different tiers in three tier architecture of mobile computing? Describe the functions of these tiers.
  4. Explain the following Multiple Access Techniques used to access the channel by mobile subscriber.
    Frequency Division Multiple access.
    Space Division Multiple access.
  5. Explain the following Multiple Access Techniques used to access the channel by mobile subscriber.
    Time Division Multiple access.
    Code Division Multiple access.
  6. Explain Physical and Logical architecture of wireless Communication.
  7. Explain Abstract Mobility Management Model.
  8. Explain different types of Propagation Mode.
  9. Describe the various aspects of mobility with respect to Mobile Computing and list the variants of Mobile Computing.
  10. What is ICAP? Explain the typical data flow Scenario in ICAP environment.
  11. What are the different tiers in three-tier architecture of mobile computing? Describe the functions of these tiers.
  12. Briefly describe the following networks with example and application
    1. Wired network
    2. Wireless network
    3. Ad hoc network
  13. What are the essential functional differences between 1 And 3rd Generation of networks?
  14. Explain three tier architecture of Mobile Computing.
  15. Draw and explain the mobile computing architecture.
  16. Describe design considerations for Mobile Computing.
  17. Explain following :
    i. Draw: Cellular Structure.
    ii. Justify: Cell shape is Hexagon.
    iii. How to reuse the limited frequency band in cellular architecture
    Explain Diagrammatically. Make following assumption: Frequency Band : 100170 Cluster Size
  18. Why conventional network IP is not suitable for mobile environment? Describe the way in which Mobile IP works
  19. Explain architecture of Mobile Computing and also discuss security Issues in Mobile Computing. .
  20. Explain three tier architecture of conventional mobile computing.
  21. What is a mobile IP? Explain discovery, registration and tunnelling with mobile IP.
  22. What is cellular IP? Establish its relationship with mobile IP.
  23. Define and explain following terms
    (1) Mobile Computing
    (2) Handover
    (3) Wireless Broadband
  24. Draw and explain mobile computing architecture diagram.
  25. How IVR is useful in real life? Explain its architecture.
  26. How does the Mobile IP work? Explain its architecture
  27. Explain call routing for a mobile terminating call.
  28. Explain the three tier architecture of mobile computing with their functions.
  29. Define various mobile computing function

UNIT: 2 | NAME: MOBILE TECHNOLOGIES


  1. Explain functional architecture of GSM system. And also give different tele-services provided by GSM.
  2. Explain about indirect & snooping TCP. Also give any twoadvantages of mobile TCP.
    Or
    Explain the following TCP variants
    1. Indirect TCP
    2. Snooping TCP
  3. Explain concept of Bluetooth Architecture. What is the difference between infrastructure and ad-hoc networks?
  4. What are the possible handover scenarios in GSM? Listout the numbers needed to locate a Mobile Station and toaddress the Mobile station.
  5. Explain RFID and DECT.
  6. Push and Pull in Short Messaging Service.
  7. Explain : Routing in IPv6.
  8. Explain tunneling and encapsulation in mobile IP.
  9. Explain the functioning of cellular network. How the given set of frequencies areused to increase the capacity of a network.
  10. What is piconet? What is scatternet? Explain how they form in Bluetooth radiotechnology? Also give the answer of following questions.
    1. Which ISM frequency band it is use?
    2. How many maximum channel it is support?
    3. How many maximum slave can be communicate with Master at a time?
  11. Explain following protocol used in the Bluetooth technology
    1. Link Manager Protocol.
    2. Logical Link Control and Adaptation Protocol.
    3. Service Discovery protocol.
    4. RFCOMM
  12. Explain the three limitations of IPv4 that are overcome by IPv6.
  13. What are limitations of traditional IP to support the mobile technology? How Does Mobile IP works?
  14. What are HLR and VLR? Describe its functions in call routing and roaming.
  15. Explain the Indirect and Snooping TCP.
  16. What is the difference between SM-MT and SM-MO? Explain.
  17. What are the services provided by supplementary services?
  18. List the merits and demerits of Bluetooth
  19. Explain classical TCP improvements and snooping TCP.
  20. What is the frequency range of uplink and downlink in GSM network?
  21. List out GSM Specification and explain functional architecture of GSM
  22. Explain Different types of GSM Channels
  23. Explain Push and Pull In Short Messaging Services.
  24. Explain the IPv6.
  25. Explain the importance of following identifiers with that GSM is deals with:
    1. IMEI
    2. IMSI
    3. MSISDN
  26. What is Mobile IP? Explain tunnelling in the context of Mobile IP
  27. Explain how mobile transport layer is different from TCP/IP transport layer
  28. Explain snooping TCP and mobile TCP.
  29. How does the Mobile IP work? Explain its architecture
  30. Explain snooping TCP and mobile TCP
  31. Explain Bluetooth Protocol Stack
  32. Explain the handover procedure in GSM system.
  33. Explain GSM architecture and role of its components
  34. Explain Call routing in GSM
  35. Explain : IPv6 and 3G Wireless
  36. Answer the following
    1)Message oriented middleware (MOM)
    2)Internet Content Adaption Protocol (ICAP)
  37. Draw and explain GSM architecture
  38. List and discuss at least seven functions where CDMA is different from GSM
  39. Define IMSI, TMSI, IMEI and MS-ISDN and write their use

UNIT: 3 | NAME: GENERAL PACKET RADIO SERVICE (GPRS)


  1. Explain functional architecture of GPRS system. What isthe frequency range of uplink and downlink in GPRSnetwork?
  2. Applications of GPRS and VoIP
  3. Explain the GPRS system architecture.
  4. Explain the GPRS functional architecture and application
  5. Explain the WAP Layered architecture and protocol stack.
  6. What is the difference between GSM and GPRS? How is data routing done in GPRS
  7. Discuss Billing and Charging in GPRS network
  8. Explain call routing in the context of GPRS networks.
  9. Discuss data services in GPRS. Describe applications suitable for GPRS
  10. How the packets are routed in GPRS. Explain GPRS packet routing for Inter & Intra PLMN
  11. Draw and Explain Transmission Plane Protocol Architecture of GPRS.
  12. Explain GPRS operations with its architecture.
  13. Discuss Billing and Charging in GPRS network.
  14. Draw and explain GPRS architecture.
  15. Explain routing between PLMNs for GPRS system
  16. 1.Write a note on PDP context activation procedure with respect to GPRS.
    2. Define SGSN and GGSN.
  17. Write a short note on limitations of GPRS
  18. Discuss GPRS-Specific Applications

UNIT: 4 | NAME: WIRELESS APPLICATION PROTOCOL (WAP) WAP, MMS, GPRS APPLICATION CDMAAND 3G


  1. Define frequency hopping in spread spectrum? Write Note on TDMA , FDMA , CDMA
  2. Explain MANET (Mobile adhoc network) and issues with moving node in network.
  3. Applications of GPRS and VoIP
  4. Give six functions where CDMA is different from GSM.
  5. What is an ad-hoc network
  6. Explain MANET and issues with moving node in network.
  7. Explain different types of security attack.
  8. Explain Direct sequence spread spectrum with example
  9. Explain Session Initiation protocol
  10. Describe the contrast between 3G and Wi-Fi technologies
  11. Explain Mobile Computing over SMS. Also explain pull and push SMS
  12. Explain architecture of Mobile Computing and also discuss security issues in Mobile Computing
  13. Describe the contrast between 3G and Wi-Fi technologies
  14. Describe Wireless LAN advantages. Also explain mobility in wireless LAN.
  15. Discuss the difference between H.323 and SIP.
  16. List Wireless LAN security issues and What do you understand by hidden & exposed terminal problem in wireless LAN
  17. Write a comparison between H.323 and SIP.
  18. Explain Wireless LAN standards and Wireless LAN architecture..
  19. Compare : CDMA and GSM
  20. List and explain the strengths of SMS
  21. What is spread spectrum technology? Compare it with narrow band.
  22. Attempt ANY FOUR14
    (a)RFI
    (b)BSS
    (c)Handover in GSM
    (d)Application and tunnelling modes in GPRS
    (e)Wi-Fi v/s WiMax.
    (f)Role of Mobile Computing OS.
  23. Attempt ANY FOUR
    (a)IPv6 Security
    (b)WiMax
    (c)Value added service through SMS
    (d)Limitations of GPRS
    (e) Ad hoc v/s Infrastructure mode for wireless architecture.
    (f)MANET
    (g)Wireless Transaction Protocol (WTP).
    (h)Session Initiation Protocol (SIP).

Advance Java Technology

Semester: 7 | Branch: Computer Engineering | Subject Code: 170703

UNIT: 1 | NAME: INTRODUCTION


  1. List and explain various swing layouts and components with examples.
  2. Answer the following questions w.r.to Swing.
    i. What is pluggable look and feel? How do you set the look and feel of the components?
    ii. Give the limitations of AWT and explain how do Swing overcome them.
  3. What do you mean by MVC architecture? Explain its role in modern applications and list its advantages.
  4. Compare the AWT and Swing.
  5. What is pluggable look and feel? What is its importance? Assume that an application contains a textfield and a button. Show that how to apply plaf of your choice to them.
  6. What is toggle button? How they are different from normal button?
  7. Explain the need of MVC architecture.Write swing code to create toggle button and checkbox and handle their click event. Differentiate between toggle button and check box

UNIT: 2 | NAME: JAVA DATABASE PROGRAMMING


  1. Explain various types of JDBC drivers and comment on selection of driver.
  2. Explain the use of CallableStatement and PreparedStatement with example.
  3. What are the differences between Java Bean and basic java class? Explain Java Bean Architecture.
  4. What is JDBC driver? What is its role? List the types of drivers and explain working of type-4 driver. Give the different ways to create the JDBC connection with example.
  5. What is Callable statement? Write a procedure to insert a row into the table student(roll_no,name,%ge) and call it using callable statement in JDBC application.
  6. Explain the use of the PreparedStatement object of the JDBC with an appropriate example.
  7. Explain the JDBC URL with appropriate examples.
  8. What is CallableStatement? Show that how to use it to call a stored procedurerunning at database layer.

UNIT: 3 | NAME: NETWORK PROGRAMMING


  1. Discuss the URL and URLConnection class with their use in network programming.
  2. Write a note on Protocol handlers

UNIT: 4 | NAME: RMI ARCHITECTURE


  1. What is JNDI? How can it be used for accessing various directory services such as LDAP, NIS, DNS?
  2. How do RMI clients contact remote RMI servers? Explain with detailed architecture of RMI.
  3. Explain object serialization in detail with example.
  4. Explain the following classes with their use.
    i. URLConnection class
    ii. DatagramSocket and Datagram Packet class
  5. What is RMI? Give the architecture of RMI and discuss the functions of each layer. What is role of RMI registry?
  6. What is serialization/deserialization of objects? Why do you need it? Give the example with necessary code.
  7. Describe the following.
    1. Remote reference layer in RMI architecture.
    2. Use of the URL class.
  8. Explain internationalization and its use using java.
  9. Compare naming and directory service in java with example
  10. What is server socket? How it works in java? Explain with help of example.
  11. Draw and explain architecture of callable RMI.
  12. Explain Socket, ServerSocket, InetAddress classes. Write a java program to find an IP address of the machine on which the program runs.

UNIT: 5 | NAME: J2EE ARCHITECTURE


  1. Give significance of MVC architecture in building n-tier application. Explain in detail.
  2. Explain architecture of J2EE. List out java technologies supported by J2EE along with their applications.
  3. Give the advantages of n-tier architecture and discuss the objectives of the Enterprise applications.
  4. Explain the container architecture of the Java EE with role of eachcomponent.
  5. List characteristics of enterprise application.

UNIT: 6 | NAME: SERVER SIDE PROGRAMMING SERVLETS


  1. Discuss Servlet life cycle methods. Explain role of web container.
  2. List the servlet session level events and show that how servlet destroy event is handled?
  3. What is filter? What is its use? List the different filter interfaces with their important methods.
  4. Explain the servlet life cycle with life cycle methods.
  5. What are cookies? Write a servlet that reads and prints all the previous cookies and add a cookie with your name.
  6. Describe the servlet life cycle with life cycle methods.Give the characteristics of the HTTP protocol and explain the GET,HEAD and PUT methods of the HTTP protocol.
  7. What are cookies and sessions? How can you use them in Java EE? Comparethem.
  8. What is servlet filters? Give the necessary API for filters and explain their use.
  9. What is servlet configuration? Show it with example web.xml file.
  10. What is doFilter() method? What are its parameters? Give its use with proper example.
  11. Enlist and explain the need of filters with a program.
  12. Explain event handling in Java Servlet with example(s).

UNIT: 7 | NAME: JSP ARCHITECTURE


  1. Explain JSP tag library with examples.
  2. Explain the JSP implicit objects with their use.
  3. Explain the features of core tag library for JSP.
  4. Explain the following with respect to JSP Unified EL.
    i. Value expressions
    ii. Method expressions
  5. What is XML tag library? Explain the XML core tags and show their use.
  6. Explain the action tags used to access the JavaBeans from a JSP pagewith example.
  7. Show the use of JSP inbuilt objects: request and response, with their use in application.
  8. Compare jsp with servlet
  9. Enlist and explain the purpose and use of action tags in JSP.
  10. Explain transaction handling using JSTL.
  11. Give an example showing the use of EL functions.
  12. Draw and explain JSP architecture

UNIT: 8 | NAME: INTRODUCTION TO HIBERNATE


  1. Give the hibernate architecture and discuss each part in brief.
  2. Explain the OR mapping in hibernate.
  3. What is HQL? How does it differ from SQL? Give its advantages.
  4. Write a note on SQL tag library

Web Data Management

Semester: 7 | Branch: Computer Engineering | Subject Code: 170708

UNIT: 1 | NAME: INTRODUCTION


  1. How semi-structure data model resolves issues in existing web data management?
  2. Explain XML in brief. Differentiate well formed and Valid xml document
  3. Write DTD for Employee.xml. Compare DTD and XSD with individual importance.
  4. What is XPath Axis? Describe the following axes.
    1. Child
    2. Ancestor
    3. Descendant
    4. Parent
    5. Attribute
    6. Following
    7. Self
    8. Descendant-or-self
    9. Preceding
    10. Ancestor-or-self
  5. Explain Web Data Management with XML
  6. Explain XLink and XPointer with example
  7. “An XML document is a labeled, unranked, ordered tree.” Explain with example
  8. How data can be exchanged between applications using XML

UNIT: 2 | NAME: BUILDING WEB SCALE APPLICATION


  1. What is XPath? Describe XPath data model with a suitable example.
  2. What is XQuery? Describe doc() and collection() function with suitable example
  3. Write sort note on FLWOR expression with suitable example
  4. Explain Navigational XPath and XQuery Syntax with example
  5. GTUStudents.xml is given, write XPath for following:
    a) Select all the name of all students.
    b) Select the name of the first student node.
    c) Select the text from all the admission year nodes where admission year is 2008.
    d) Select all the name nodes with a CPI higher than 7.
  6. GTUStudents.xml is given, write FLWOR for following:
    a) Select all the name of all students where branch is COMPUTER.
    b) Select all the name nodes with a CPI less than 8
    c) Select all the city nodes

UNIT: 3 | NAME: TYPING


  1. What is XML Typing? Why it is essential in web data management.
  2. Explain automate on ranked trees in details.
  3. Write sort note on XML Schema
  4. Write sort note on XML query evaluation technique: Join
  5. Explain XML evaluation techniques.
  6. Explain XSL in detail.
  7. Differentiate between ranked trees and unranked trees.
  8. Write XML Schema (XSD) for given GTUStudents.xml GTUStudents.xml is given, write FLWOR for following:
    a) Select all the name of all students where branch is COMPUTER.
    b) Select all the name nodes with a CPI less than 8
    c) Select all the city nodes.

UNIT: 4 | NAME: ONTOLOGIES, QUERYING AND DATA INTIGRATION


  1. What is Ontology? Describe RDF, RDFS in Brief.
  2. Explain in detail: Ontology-based mediators.
  3. Explain following : OWL

UNIT: 5 | NAME: BUILDING WEB SCALE APPLICATIONS


  1. Explain web graph mining with suitable example.
  2. Explain web crawling process in details
  3. What is Distributed System? Describe Failure management in distributed system.
  4. Write sort note on required properties of a distributed system.
  5. Explain following: Graph Bisimulation
  6. Explain Graph semistructured data.
  7. Explain Web graph mining and hot topics in web search
  8. Discuss Required properties of a distributed system.

Data warehousing and Data Mining

Semester: 7 | Branch: Computer Engineering | Subject Code: 171601

UNIT: 1 | NAME: INTRODUCTION TO DATA WAREHOUSING


  1. Clearly state the differences between Data Warehouses and Operational Database Systems.
  2. Compare OLTP & OLAP systems.
  3. Differentiate between OLTP and OLAP systems.
  4. Explain following Terms: 1. Concept Hierarchy. 2. Histogram.
  5. Explain meta data repository.
  6. Explain Star, Snowflake, Fact Constellation Schema for Multidimensional Database.
  7. Explain the Star and Snowflake schemas of data warehouse.
  8. Explain three-tier data warehouse architecture.
  9. Short Note: Distributive and Holistic measures.
  10. What is Cuboid? Explain various OLAP Operations on Data Cube with example.
  11. With the help of a neat diagram explain the 3-tier architecture of a data warehouse.

UNIT: 2 | NAME: INTRODUCTION TO DATA MINING


  1. Define the term Data Mining. With the help of a suitable diagram Explain the process of knowledge discovery from databases.
  2. Explain different types of data on which mining can be performed.
  3. Explain the KDD process in details.
  4. List and describe major issues in data mining.
  5. What is Data Mining? Explain Data mining as one step of Knowledge Discovery Process

UNIT: 3 | NAME: DATA PREPROCESSING AND DATA MINING PRIMITIVES


  1. Explain Data Cleaning process for missing values & Noisy data.
  2. Explain data transformation in data mining.
  3. Explain methods for data normalization.
  4. Explain the methodologies for stream data processing and stream data Systems.
  5. Explain the pre-processing required handling missing data and noisy data during the process of data mining.
  6. Explain with example how continuous numerical data values can be discretized.
  7. List and describe the methods for handling the missing values in data cleaning.
  8. What is noise? Describe the possible reasons for noisy data. Explain the different techniques to remove the noise from data.

UNIT: 4 | NAME: CONCEPT DESCRIPTION AND ASSOCIATION RULE MINING


  1. Describe the list of techniques for improving the efficiency of Apriori-based mining.
  2. Explain Information Gain, Gain Ratio & Gini Index.
  3. Explain Mean, Median, Mode, Variance and Standard Deviation in brief.
  4. Explain rule based classification and case based reasoning in details.
  5. Explain the steps of the Apriori Algorithm for mining frequent item sets.
  6. Short note: Information gain, Gain ratio, Gini index.
  7. What is Information Gain? Explain the steps required to generate a Decision Tree from a training data set.
  8. What is Market Basket Analysis? Explain Association Rules with Confidence & Support.
  9. Write & Explain Apriori algorithm for discovering frequent item sets for mining Boolean Association Rules.

UNIT: 5 | NAME: CLASSIFICATION AND CLUSTERING


  1. Discuss applications of Fuzzy Logic.
  2. Explain BUC algorithm for the Computation of Sparse or Iceberg Cube.
  3. Explain how the accuracy of a classifier can be measured.
  4. Explain how the topology of a neural network is designed.
  5. Explain k-means and k-medoids algorithm of clustering.
  6. Explain k-means and k-medoids algorithms of clustering.
  7. Explain Linear & Non-Linear Regression methods of Predictions.
  8. Explain Linear Regression using suitable example.
  9. Explain Rule-based Classification in brief.
  10. Explain the Classification by Decision Tree Induction Algorithm.
  11. Write a short note on hierarchical clustering.
  12. Write the steps of the k-means clustering algorithm. Also state its limitations.
  13. Write the typical requirements of clustering in data mining.

UNIT: 6 | NAME: ADVANCE TOPICS OF DATA MINING AND ITS APPLICATIONS


  1. Explain different types of Web Mining with example.
  2. Explain how a search engine automatically identifies authoritative web pages on a users search topic.
  3. Explain the information retrieval methods used in text mining.
  4. What are the challenges for effective resource and knowledge discovery in mining the world wide web?

Distributed Database Application and System

Semester: 7 | Branch: Computer Engineering | Subject Code: 171602

UNIT: 1 | NAME: INTRODUCTION


  1. What are the various problem areas in DDBS environment? Explain them in details. Give at least 3 differences between replicated and Partitioned database.
  2. Explain Following transparency for distributed database.
    (1) Network Transparency
    (2) Replication Transparency
    (3) Fragmentation Transparency
  3. Explain complicating factors of distributed DBMSs.
  4. Distinguish between tightly coupled and loosely coupled systems.
  5. Explain various levels of data and process distribution in distributed environment.
  6. What are distributed systems ? List two advantages and disadvantages of distributed system over centralized one? Also explain parallelism and transparency
  7. Explain the terms transparency and concurrency with respect to DDBMS. Also Explain layers of transparency
  8. What is replication? Explain different types of replication techniques?

UNIT: 2 | NAME: OVERVIEW OF RELATIONAL DBMS.


  1. What is normalization? Explain all normal form with example.
  2. Describe following operation in context of relation algebra
    (1) Selection
    (2) Intersection
    (3)natural Join
  3. What is normalization? Explain any one normal form. Explain third & BCNF normal form
  4. Consider the following relation employee (person-name, street, city) works(person-name. company-name, salary) company(company-name, city) manages(person-name,, manager-name) Write following query in relational algebra form.
    (1) Find names of all employees who work for First Bank Corporation (FBC).
    (2) Find the names of all employees who live in the same city as the company for which they work.
    (3) Find names, street addresses and cities of residence of all employees who
  5. Explain database interoperability.
  6. Consider following relations employee (person-name, street, city) works(person-name. company-name, salary) company(company-name, city) manages(person-name,, manager-name) Write following query in relational algebra form.
    (1) Find names of all employees who work for HDFC.
    (2) Find the names of all employees who do not live in the same city as the company for which they work.
    (3) Find names and cities of residence of all employees who work for HDFC and earn more than Rs 10 lac per year .
  7. Given a global relation EMP(EMPNUM, NAME,SAL,TAX, MGRNUM,DEPTNUM) Write the mixed fragmentation de_nition and fragmentation tree of relation EMP.

UNIT: 3 | NAME: REVIEW OF COMPUTER NETWORKS.


  1. What are the various types of network? Explain each in detail.
  2. Explain type of networks topology.
  3. Explain the following terms:Protocol Standards,Broadband Networks, Wireless Networks & Internet protocol

UNIT: 4 | NAME: DISTRIBUTED DBMS ARCHITECTURE


  1. Explain Client – Server architecture with figure with its merits & demerits.
  2. Explain peer – peer architecture with figure.
  3. Explain MDBS architecture with and without GCS. Write short note on: MDBS architecture.
  4. Write a note on components of DDBMS

UNIT: 5 | NAME: DISTRIBUTED DATABASE DESIGN


  1. Explain Top Down Design Process for distributed database design with suitable diagrams.
  2. Describe COM_MIN algorithm used in horizontal fragmentation.
  3. Describe BEA algorithm used in vertical fragmentation. Discuss attribute affinity matrix , ca matrix & BEA algorithm in the context of vertical fragmentation with example.
  4. List Distribution design issue and explain any one of them.
  5. Explain partitioning algorithm.
  6. Which process of DDBS design is used when we wanted to design DDBS from scratch? Also draw and explain that process.
  7. Explain reduction for hybrid fragmentation. Explain with example reduction for primary horizontal fragmentation
  8. Discuss fundamental issues in distributed database design. Give at least 3 differences between replicated and Partitioned database.
  9. Explain Mixed fragmentation with the help of an example
  10. What is fragmentation? Why it is needed? What are the correctness rules for fragmentation?
  11. Explain Distributed cost model with suitable example and determine total time as well as response time.
  12. Explain Hybrid fragmentation with example.
  13. Derive simple predict, minterms & from that find out all possible Horizontal Fragments for the following: Consider relation Proj(PNO,PName,Budget,Loc) assume two applications willrun on different sites. First application select names &budgets of projects given their location & it will run on three sites, second application run on two sites & manage project having budget less than Rs. 2,00,000 on one site & higher to these are managed at other sites

UNIT: 6 | NAME: SEMANTIC DATA CONTROL


  1. Explain views in distributed DBMS. Also what is data security in DDBS.
  2. Explain individual assertion for distributed semantic integrity control with example.
  3. Explain view management in centralized as well as distributed DBMS.
  4. What do you mean by distributed semantic integrity control? Explain with example.

UNIT: 7 | NAME: OVERVIEW OF QUERY PROCESSING.


  1. Explain Set oriented assertions and its enforcement with example.
  2. What is allocation? List the information requirements during allocation.
  3. Draw and explain query optimization process.
  4. Explain Layers of Query Processing.
  5. Describe COM_MIN algorithm used in horizontal fragmentation.
  6. Give objective of query processing in view of distributed database.
  7. List steps of query decomposition and explain any one from that.
  8. What is query optimization? List components of query optimizer software and explain any one from that.
  9. What is query processing in a relational database? Explain in detail with an example. How does it differ from distributed query processing?
  10. What do you mean by query optimization? Explain System R (centralized) query optimization algorithm.
  11. Differentiate individual assertion and self-oriented assertion and how to enforce these assertions in DDBMS?
  12. What is Query Optimization? List the components of Query Optimizer software and explain any one. Discuss the problems of Query Optimization in brief
  13. Explain Transaction Management in DDBMS with Example.
  14. Write short note on: Reliability in Distributed DBMS
  15. What do you mean by two phase locking? How it is different from strict two phase locking ? Explain in brief.
  16. Write a note on concurrency control.
  17. Explain the first phase of Query processing that transforms a relational calculus query into a relational algebra query.
  18. List various Transaction Models. Explain any two in detail.
  19. Write short note on: Two Phase Commit Protocol for Distributed Transactions
  20. Explain properties of Transactions
  21. Write a short note on parallel Database System.

Software Project Management

Semester: 7 | Branch: Computer Engineering | Subject Code: 171603

UNIT: 1 | NAME: PROJECTTIME AND COST MANAGEMENT


  1. Define Project and Project Management. What are the attributes of a Project?
  2. Explain briefly with a figure what does it mean by ITPM?
  3. Explain the IT Project selection process with reference to the balanced scorecard approach.
  4. Explain the Project Lifecycle and IT Development
  5. What is a Business case? Explain briefly the process of developing a business case with figure. Explain what a MOV is along with the IT value chain figure.

Dot Net Technology

Semester: 7 | Branch: Computer Engineering | Subject Code: 171604

UNIT: 1 | NAME: INTRODUCTION TO .NET


  1. Explain CLR and CTS.
  2. Differentiate Managed and Unmanaged Code in .Net framework.
  3. Explain Compilation Process of .Net frame work program. Explain various components in this process.
  4. Define Namespace?
  5. Explain important of Intermediate Language? Which tool is used to compile the ILlanguage?
  6. Explain Assembly structure. Write a code for create Shared Assembly and store the assembly in GAC using tool.
  7. Explain .Net framework architecture
  8. Explain following terms:
    i) Jitter
    ii) CLS & CTS
    iii) Managed Code
  9. Explain the following terms:
    1. MSIL
    2. CLR
    3. CTS
    4.CLS
    5. GAC
    6. Jitter
    7. Assembly Manifest
  10. What is namespace? Write a VB.Net code to illustrate the use of user defined namespace.
  11. Explain Common Language Runtime (CLR) with diagram.
  12. Explain important of Intermediate Language? What do you mean by “Unsafe code”? explainitwith example.
  13. Explain .Net framework architecture

UNIT: 2 | NAME: DATA TYPES AND BASE CLASS LIBRARIES


  1. Explain the use of StreamReader and StreamWriter class for FileStream.
  2. How the variables are declared in VB.NET and describe the differenttypes of variables with example.
  3. Write a program which takes directory name and path as input and lists all files and subdirectories.

UNIT: 3 | NAME: VB .NET


  1. What do you mean by Thread? State its advantages. Describe Thread priorities. Also give VB. Net code to implement it.
  2. What is Thread? Discuss about its priorities. Also write a VB.Net code to implement the multithreading concept.
  3. What is structured error handling? Explain it in details and create VB. Net console application to find division of two numbers. Also handle DivideByZeroException.
  4. How Try…Catch…Finally statement is executed? Explain in briefwith example.
  5. What is Structured Error Handling in VB .NET? Explain with proper example

UNIT: 4 | NAME: OBJECT ORIENTED PROGRAMMING WITH VB.NET


  1. Explain Dispose and Finalization. Also explain garbage collection in brief.
  2. What is inheritance? Create VB .Net console application to define shape class and derive circle and rectangle from it to demonstrate inheritance.
  3. What is method overloading? Create VB.Net console application to overload area method to find area of circle, triangle and rectangle.
  4. Explain the syntax of inheritance in VB .NET also give example of method overriding.
  5. Write and explain basic constructors and methods of String class in .NET

UNIT: 5 | NAME: INTRODUCTION TO WINDOWS FORMS


  1. Write a simple VB.NET class having a button on form and inherit the same class in C#. Show the entire procedure including compilation steps.
  2. Explain TextBox control with its important properties, methods and events.

UNIT: 6 | NAME: WINDOWS FORMS AND CONTROLS IN DETAIL


  1. Explain GDI+ application development with example.
  2. Explain ListBox control of Windows Form with example. Major functionality ofListBox class should be used?

UNIT: 7 | NAME: INTRODUCTION TO ADO.NET


  1. What is Disconnected Architecture in ADO .Net? Explain following objects of ADO .Net: SqlConnection, SqlCommand, SqlDataAdapter with example.
  2. Indexer can’t be overloaded. Justify it.
  3. What is Indexer? Write a code snippet showing use of DataReader as indexer.
  4. Write a code showing use of DataSet class. Show the use of CommandBuilderclass.
  5. Enlist various DataSource and Databound controls along with their use.
  6. Explain ADO.Net architecture.
  7. List and explain important classes of ADO .NET
  8. Explain usage of following ADO.Net objects with their methods.
    1) Data adapter
    2) command object
    3) Dataset

UNIT: 8 | NAME: CONSOLE APPLICATIONS


  1. What is Dialog? Explain following Dialogs with its usage.
    i) FontDialog
    ii) SaveFileDialog
    iii) FolderBrowserDialog
  2. Explain in brief:
    (1) OpenFileDialog Control
    (2) PrintDialog Control
  3. What is form dialog? Explain the following with suitable example.
    1. FolderBrowserDialog
    2. FontDialog
    3. ColorDialog
  4. Write a program which reads person name from keyboard and saves into user.txt file. (If file already exists then newly entered names must be appended)
  5. Write a program in VB .NET to print following pattern. Use For loop. User will enter number of lines to be printed from keyboard.
    *****
    ****
    ***
    **
    *

UNIT: 9 | NAME: C#.NET


  1. Define Namespace.
  2. In C#, Constructor can return the value. Justify.
  3. Can we overload the assignment operator in C#? Justify it.
  4. Explain Event and Delegate with Example in C#
  5. What is indexer? Differentiate it with property. Explain it with suitableexample
  6. Explain Reflection API in C# with example.
  7. How pointers are supported in C#? Explain pass by reference concept.
  8. Explain the concept of properties. Also discuss advantages of properties over class member variables.

UNIT: 10 | NAME: ASP.NET


  1. Differentiate Array and Array List in .Net with example in C# .Net. Explain various methods of Array List.
  2. Explain Page Life Cycle of ASP.NET.
  3. Differentiate ASP and ASP.Net. Also explain Label and TextBox controls with example.
  4. Rich Server Controls, Like Calendar , XML, AdRotator Control
  5. Explain Control :- TextBox, Label, Button, File Upload
  6. Give ASP.Net code to rotate advertisements with AdRotator control.
  7. What is validation in web development? Explain various Controls for validation in ASP .NET with Example.
  8. List various validation controls in ASP.Net and explain any three with example.

UNIT: 11 | NAME: MANAGING STATE


  1. What is Hidden Filed , Query Strings , Cookies , Session and Application State ? And explain suitable example.
  2. What is Page-level State?
  3. Different between Session and Cookies
  4. What is state management? Explain Session and Cookie state with suitable example.
  5. Write a web application demonstrating use of session and cookie with proper example.
  6. Write ASP .NET program to illustrate the concept of Cookies
  7. Explain following keywords in ASP .NET
    i. Code behind
    ii. View state
  8. Explain various session management techniques in ASP .NET.

UNIT: 12 | NAME: THEMES AND MASTER PAGES


  1. Demonstrate the Master Page and Theme concept of ASP.NET.
  2. What is Theme? Create skin file to format various controls and give code to apply theme in ASP.Net webpage.
  3. What is Skin? Explain types of skin file with suitable example.
  4. What is nested master page? Explain example.
  5. What is Css? How to work Css file in asp.net
  6. Discuss the concept of Master page in ASP .NET
  7. What is Theme? Create skin file to format various controls and give code to apply theme in ASP.Net webpage

UNIT: 13 | NAME: USING THE DATA BOUND CONTROLS AND RWPEATER CONTROLS


  1. Explain Repeater Control with suitable example.
  2. Explain grid view control with suitable example.
  3. Explain DataList Control with suitable example.
  4. What is data-bound control? Explain Repeater control with suitable example.

UNIT: 14 | NAME: CREATING AND CONSUMING WEB SERVICES


  1. Define :- UDDI , SOAP, WSDL
  2. Explain web service Architecture.
  3. Explain Web Service Consumers.
  4. Write a note on XML Web service

UNIT: 15 | NAME: ADVANCE .NET CONCEPTS


  1. Explain WPF in .NET.
  2. Explain WCF in .NET
  3. Define Ajax and types of Ajax control in .NET.
  4. Explain use of WCF in .Net framework. Define various techniques in WCF. How to use Ajax controls in ASP .Net?
  5. What is WPF? Explain it in details with all its features.
  6. What is AJAX? Give ASP.Net code to use UpdatePanel control.

Enterprise Resource Planning

Semester: 7 | Branch: Computer Engineering | Subject Code: 171605

UNIT: 1 | NAME: INTRODUCTION TO ERP


  1. Define: Lead-time, Cycle-time, Business Function, Business Process, Business Model, ROI, BOM
  2. Describe tangible and intangible benefits of ERP.
  3. Explain Data Mining and Data Warehousing with proper examples.
  4. Explain E-commerce and E-business with proper examples.
  5. Which are the phases of ERP implementation? State and explain

Artificial Intelligence

Semester: 8 | Branch: Computer Engineering | Subject Code: 180703

UNIT: 1 | NAME: PROBLEMS AND STATE SPACE SEARCH


  1. Explain different approaches of knowledge representation
  2. Explain following terms with reference to Prolog programming language: Clauses, Predicates, Domains, Goal, Cut, Fail, Inference engine
  3. Explain the method of Hill climbing. Also explain the problems associated with hill climbing and possible solutions
  4. Explain the steps of unification in predicate logic. Also discuss the steps of converting predicate logic wffs to clause form.
  5. How problem characteristics help in the selection of AI technique? Explain these characteristics with possible examples.

Advance Computer Networks

Semester: 8 | Branch: Computer Engineering | Subject Code: 180704

UNIT: 1 | NAME: OPTICAL NETWORKING


  1. Discuss the benefits of using ATM technology.
  2. Discuss the functions of each SONET layer. What is the relationship between SONET and SDH?
  3. List and explain Network Layer protocol of TCP/IP in brief.
  4. List and explain various QoS and Traffic parameters used in ATM networks.
  5. Write a note on Mapping ATM service classes to QoS classes and AAL protocols

iOS Programming

Semester: 8 | Branch: Computer Engineering | Subject Code: 180707

UNIT: 1 | NAME: INTRODUCTION TO MAC


  1. Explain Protocol in objective C with example.
  2. Explain push notification with example.
  3. Explain the basic architecture and features of the MAC OS.
  4. Explain the MVC architecture.
  5. What is framework? Explain COCOA framework

Android Programming

Semester: 8 | Branch: Computer Engineering | Subject Code: 180708

UNIT: 1 | NAME: INTRODUCTION


  1. Define method. What is difference between an instance method and class method.
  2. How to adding, updating and deleting content in android application.
  3. How to adding, updating and deleting content in android application.
  4. What is Dalvik Virtual Machine? Explain.
  5. What is SQLite database? How to provide the database connection using SQLite database.

Data Compression

Semester: 8 | Branch: Computer Engineering | Subject Code: 181602

UNIT: 1 | NAME: INTRODUCTION TO DATA COMPRESSION


  1. Decode the following string 00000101000100000110001011001000100001010 Using Adaptive Huffman Coding technique.
  2. Determine the minimum variance Huffman code with the given probabilities. P(a2) = 0.4, P(a1) = 0.2, P(a3) = 0.2, P(a4) = 0.1, P(a5) = 0.1
  3. Draw the necessary tree for the sequence aardv using the update procedure of Adaptive Huffman Coding
  4. Explain Shannon-Fano algorithm in detail taking suitable example
  5. What is data compression? Compare lossy and lossless compression 

Design and Analysis of Algorithm

Semester: 8 | Branch: Computer Engineering | Subject Code: 181604

UNIT: 1 | NAME: BASICS OF ALGORITHMS AND MATHEMATICS


  1. Explain Chained Matrix Multiplication with example.
  2. Explain characteristics of Greedy Algorithm
  3. Explain Min Max Principle.
  4. Explain Quick Sort Method with example
  5. What is Divide and Conquer Technique? Give the use of it for Binary Searching Method. 

Service Oriented Computing

Semester: 8 | Branch: Computer Engineering | Subject Code: 181605

UNIT: 1 | NAME: INTRODUCTION


  1. Compare architecture of J2EE and .NET.
  2. Define Web Service. Explain architecture model of Web Service.
  3. Explain SOAP request and SOAP response with example.
  4. What are the benefits of Service Oriented Computing? Discuss Autonomy, Dynamism and Heterogeneity in Open Environments.

  1. Write XML Schema file for maintaining an employment service which contains company name, location (such as city and state), annual salary, type (permanent or internship), degree requirements (BE, ME, or PhD), and years of experience required.

No comments:

Post a Comment