tag:blogger.com,1999:blog-30041223161369917592024-03-13T12:47:58.337-07:00GPCET.ITGPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comBlogger17125tag:blogger.com,1999:blog-3004122316136991759.post-64289598241787710402009-08-30T06:21:00.000-07:002009-08-30T06:21:13.135-07:00GATE EXAM SYLABUS FOR COMPUTER SCIENCE & INFORMATION TECHNOLOGY<span style="color: red;">GATE Syllabus for Computer Science & Information Technology - CS</span><br />
<span style="color: red;"></span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">ENGINEERING MATHEMATICS </span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Mathematical Logic: Propositional Logic; First Order Logic.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Probability: Conditional Probability; Mean, Median, Mode and Standard Deviation; Random Variables; Distributions; uniform, normal, exponential, Poisson, Binomial.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Set Theory & Algebra: Sets; Relations; Functions; Groups; Partial Orders; Lattice; Boolean Algebra.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Combinatorics: Permutations; Combinations; Counting; Summation; generating functions; recurrence relations; asymptotics.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Graph Theory: Connectivity; spanning trees; Cut vertices & edges; covering; matching; independent sets; Colouring; Planarity; Isomorphism.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Linear Algebra: Algebra of matrices, determinants, systems of linear equations, Eigen values and Eigen vectors.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Numerical Methods: LU decomposition for systems of linear equations; numerical solutions of non-linear algebraic equations by Secant, Bisection and Newton-Raphson Methods; Numerical integration by trapezoidal and Simpson's rules.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Calculus: Limit, Continuity & differentiability, Mean value Theorems, Theorems of integral calculus, evaluation of definite & improper integrals, Partial derivatives, Total derivatives, maxima & minima.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">A D V E R T I S E M E N T </span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">COMPUTER SCIENCE AND INFORMATION TECHNOLOGY</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Digital Logic: Logic functions, Minimization, Design and synthesis of combinational and sequential circuits; Number representation and computer arithmetic (fixed and floating point).</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Computer Organization and Architecture: Machine instructions and addressing modes, ALU and data-path, CPU control design, Memory interface, I/O interface (Interrupt and DMA mode), Instruction pipelining, Cache and main memory, Secondary storage.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Programming and Data Structures: Programming in C; Functions, Recursion, Parameter passing, Scope, Binding; Abstract data types, Arrays, Stacks, Queues, Linked Lists, Trees, Binary search trees, Binary heaps.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Algorithms: Analysis, Asymptotic notation, Notions of space and time complexity, Worst and average case analysis; Design: Greedy approach, Dynamic programming, Divide-and-conquer; Tree and graph traversals, Connected components, Spanning trees, Shortest paths; Hashing, Sorting, Searching. Asymptotic analysis (best, worst, average cases) of time and space, upper and lower bounds, Basic concepts of complexity classes - P, NP, NP-hard, NP-complete.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Theory of Computation: Regular languages and finite automata, Context free languages and Push-down automata, Recursively enumerable sets and Turing machines, Undecidability.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Compiler Design: Lexical analysis, Parsing, Syntax directed translation, Runtime environments, Intermediate and target code generation, Basics of code optimization.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Operating System: Processes, Threads, Inter-process communication, Concurrency, Synchronization, Deadlock, CPU scheduling, Memory management and virtual memory, File systems, I/O systems, Protection and security.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Databases: ER-model, Relational model (relational algebra, tuple calculus), Database design (integrity constraints, normal forms), Query languages (SQL), File structures (sequential files, indexing, B and B+ trees), Transactions and concurrency control.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Information Systems and Software Engineering: information gathering, requirement and feasibility analysis, data flow diagrams, process specifications, input/output design, process life cycle, planning and managing the project, design, coding, testing, implementation, maintenance.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Computer Networks: ISO/OSI stack, LAN technologies (Ethernet, Token ring), Flow and error control techniques, Routing algorithms, Congestion control, TCP/UDP and sockets, IP(v4), Application layer protocols (icmp, dns, smtp, pop, ftp, http); Basic concepts of hubs, switches, gateways, and routers. Network security - basic concepts of public key and private key cryptography, digital signature, firewalls.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;">Web technologies: HTML, XML, basic concepts of client-server computing.</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;"><br />
</span><br />
<span style="color: red;"></span>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-71322575824933207282009-08-18T08:27:00.000-07:002009-08-18T08:28:57.722-07:00MINI PROJECTS1. NAT<br />2. honeypots<br /> 3. Creation of a DMZ<br /> 4. Creation of a sniffer and a port scanner<br /> 5. GSM<br /> 6. Library Management System<br />7. Hotel Management System<br /> 8. Timetable generation (user will input subjects, faculty times, class room times) : User will also input subject seriality and topics to be taken for the week.<br /> 9. CD library management<br />10. Admission procedure<br />11. Online passport registeration<br /> 12. Examination result according to the classes<br />13. Ice cream parlour management system<br />14. Pizza hut - account management system<br /> 15. Multi player strategy game: Project ideas on Visual basic,Java,Database<br />16. You can develop a speech reponse application using some hardware interface using the Microsoft SAPI SDK<br />17. You can develop a Microsoft Word like application in VB ( a text editor basically)<br />18. You can develop a LAN administrator tool (socket programming comes easy in VB) which will monitor application on a LAN and provide functions<br />19. Voice Mail Systems<br />20. Computer Telephony IntegrationGPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-59532341626675659392009-08-18T08:22:00.000-07:002009-08-18T08:23:27.011-07:00JNTU B.TECH KNOWLEDGE HUBwww.examshub.comGPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-13968135289166742792009-08-18T08:04:00.000-07:002009-08-18T08:08:15.950-07:00DDA LINE DRAWING ALGORITHM/* DDA Line Drawing Algorithm */<br />#include <graphics.h>#include <stdio.h>#include <math.h>#include <conio.h><br />void ddaLine(int x1,int y1,int x2,int y2){ float x=x1,y=y1,dx,dy; int length,i;<br /> putpixel(x1,y1,WHITE);<br /> if(abs(x2-x1)>=abs(y2-y1)) length=abs(x2-x1); else length=abs(y2-y1); dx=(float)(x2-x1)/length; dy=(float)(y2-y1)/length; for(i=1;i<=length;i++) { x=x+dx; y=y+dy; putpixel((int)x,(int)y,WHITE); }}<br />void main(){ int x1,y1,x2,y2; int gdriver = DETECT, gmode; initgraph(&gdriver, &gmode, "");<br /> printf("Enter the starting co-ordinates: "); scanf("%d %d",&x1,&y1); printf("Enter the ending co-ordinates: "); scanf("%d %d",&x2,&y2);<br /> ddaLine(x1,y1,x2,y2); getch();}GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-23413631629911776202009-08-18T08:02:00.000-07:002009-08-18T08:04:01.012-07:00JAVA CONCEPTS1. What is the definition of java?<br /><br />Java is a high level language which helps us to develop the applications using object oriented methodologies.<br /><br />2. What is the definition of class?<br />A class is a blue print for an object and it passes some Instructions to the JVM at runtime to create an object of that type.<br /> OR<br />A class contains data and the eligible code that acts upon the data and class is a basis for encapsulation.<br /> OR<br />A class is a template that defines how an object will look and behave when the object is created.<br />3. What is the definition of object?<br /><br />An object is a software bundle that holds the data and the code that acts upon the data.<br /><br />4. What are the features of java?<br /><br />Architectural and neutral<br />Robust<br />Object oriented<br />Portable<br />Simple<br /><br />5. What is the definition of an interface?<br /><br /><br />An interface is a contractor between service provider and service utilizer.<br /><br /><br />6. What are the differences between method signature and method prototype?<br /><br />Method signature is the name of the method followed by the parameters where as method prototype is the overall method type including the return type.<br /><br /><br />7. What are the similarities between abstract class and interface?<br /><br />Both can’t be instantiated.<br />Both can have zero or more number of abstract methods.<br />We can create references for both of them.<br />Both can participate in dynamic method dispatch.<br /><br />8. What are the differences between abstract class and interface?<br /><br />Abstract class can’t participate in multiple inheritance where as interfaces can participate in multiple inheritance.<br />Abstract classes can have both concrete methods and abstract methods where as interfaces can have only abstract methods.<br />Abstract classes can have constructors but interfaces can’t have constructors.<br />Abstract classes can have instancevariables , class variables and constants where as interfaces can have only static and final variables.<br />Abstract classes are used for generalization where as interfaces are used for specialization.<br /><br />9. Can there bf an abstract class with no abstract methods in it?<br /><br />Yes, an abstract class can have both abstract methods and concrete methods.<br />The class is javax.servlet.http.httpservlet<br /><br />10. Can an interface be final?<br /><br />No, it avoids inheritance and interfaces cannot be final.<br /><br />11. What is a local , member and a class variable?<br /> Variables declared with in a method are “LOCAL VARIABLES “.<br /> Variables declared with in a class are “MEMBER VARIABLES”.<br />Variables declared with in a class are “STATIC” or “CLASS VARIABLES”.<br /><br />12. what modifiers are allowed for methods in an interfaces?<br /> Only public and abstract modifiers are allowed for methods in an interfaces.<br /><br /><br /><br /><br />13. Can an interface can have an inner class?<br /><br />Yes<br />Public interface abc<br />{<br /> Static int i=0;<br /> Void dd();<br /> Class a1<br /> {<br /> A1()<br /> {<br /> Int j;<br /> System.out.println(“in interia”);<br /> };<br /> Public static void main(String args[])<br /> {<br /> System.out.println(“in interfia”);<br /> }<br /> }<br />}<br />14. Can we define private and protected modifiers for variables in interfaces?<br />No , interfaces have only public , static, final modifiers.<br />15. What is an externalizable?<br />Extrenalizable is an interface that extends serializable interface and sends data into streams in compressed format. It has 2 methods<br />1. writeExternal(object output out)<br />2. readExternal(objectinput in)<br />16. What are the different identifiers states of a thread?<br /> The different identifiers of a thread are<br /> R – running or runnable thread<br /> S - suspended thread<br /> CW –thread waiting on a condition variable.<br /> MW – thread waiting on a monitor lock.<br /> MS – thread suspended waiting on a monitor lock.<br /> <br /><br />17. Can we overload main method in java?<br /> Yes, but the main method with string args[] is called when you call the program.<br /> Public class test1<br /> {<br /> Public static void main(String args[])<br /> {<br /> System.out.println(“in main method”);<br /> }<br /> Public static void main(string atgs[],string arg)<br /> {<br /> System.out.println(“in overload method”);<br /> }<br /> }<br />18. What are the different types of variables in java?<br /> There are 3 types of variables in java. They are<br /> 1.local variables<br /> 2. static variables<br /> 3. member variables.<br /> 19. What is meant by type casting?<br /> Type casting is a mechanism of converting the value from one data type to another data type.<br /> <br />20. What is meant by API?<br />API (Application Program Interface) is a collection of library classes and library packages and library interfaces.<br />21. What is the role of JVM in java?<br />JVM (Java Virtual Machine) is a software which converts .class files of one java program into .exe files. It is written in C-language.<br />22. What is meant by package?<br />Package is a collection of predefined classes.<br />23. What is the difference between .class files and .exe files?<br />.class files are platform independent and system independent where as .exe files are platform dependent and system dependent.<br />.class files consists of byte code information about the particular java program where as .exe files consists of information about the particular machine.<br />24. What is meant by byte code?<br />Byte code is a binary format of a program it is not a machine instructions.<br />25. What is meant by hash code?<br />When we are creating an object JVM will give an identity number for that object . That identity number is nothing but hash code.<br />26. What are the flavours of java?<br />The flavours of java are<br />1. J2SE (java 2 standard edition)<br />2. J2EE (java 2 enterprice edition)<br />3. J2ME (java 2 micro edition)<br />27. What is meant by object oriented?<br />A language is said to be object oriented if every thing is in the form of classes and objects.<br />28. What are the access specifiers?<br />Access specifiers are public, private, protected and default.<br />29. What are the access modifiers?<br />Access modifiers are abstract, final, native and static.<br /><br /><br />30. Why the java language is robust?<br /> It provides extensive compile time checkings which was done by compiler at second time of run time checking.<br /> Garbage collection which is responsible for allocating and deallocating the memory for objects that is java programs never suffer from memory leaks.<br />31. Why java language is simple language?<br /> It does not support pointers and multiple inheritence.<br />Java draws its roots from C++. C++ is widely used and very popular. It is regarded as complex language with features like multiple inheritance and pointers. Java on the other hand is closure to a pure object oriented language because access to pointers and multiple inheritance are removed.<br />32. Why java language is architectural- neutral?<br />Java is both platform independent and system independent .That is it does not depends on the operating system and any systems.<br />33. What is meant by abstract?<br />Abstract is the key word which is applicable for classes and methods. We are not allowed to declare a variable as abstract.<br />34. What is meant by abstract methods?<br />If a method is declared as abstract it means we don’t know about implementation. Child classes are responsible to provide implementation for parent class abstract methods.<br />35. What is meant by abstract classes?<br /> If we declare a class as abstract it means we are not allowed to create instance of that class.<br /> If a class contains at least one abstract method we should declare the corresponding class as abstract.<br /> An abstract class not necessary to contain abstract methods always it may contain zero or more number of abstract methods.<br />Abstract class reference can be created in order to point out its child class objects.<br /><br /><br />36. Can I have constructors in a abstract class? <br />Yes , if we are not writing a constructor in a class compiler will give a constructor for us. In a same way abstract class is also one of the normal class in a compiler view. So compiler gives us a default constructor in abstract class but JVM restricts us to create an object.<br />37. What are the main advantages of interfaces?<br />Enhancement and security are the main advantages of interfaces.GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-65396078956063918192009-02-26T07:04:00.000-08:002009-02-26T07:06:09.777-08:00SOFTWARE ENGINEERING NOTES OF IIT KARAGPUR<strong><em><span style="color:#ff0000;">CLICK ON THIS LINK AND JUST GO TO EACH MODULES</span></em></strong><br /><br /><br /><a href="http://nptel.iitm.ac.in/courses/Webcourse-contents/IIT%20Kharagpur/Soft%20Engg/New_index1.html">http://nptel.iitm.ac.in/courses/Webcourse-contents/IIT%20Kharagpur/Soft%20Engg/New_index1.html</a>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-12394980932563620212009-02-26T07:01:00.001-08:002009-02-26T07:02:26.010-08:00COPMPUTER ARCHITECHTURE NOTES OF IIT KANPUR<strong><em><span style="color:#33ff33;">JUST CLICK ON LINK AND GO TO COURSE CONTENT THEN CLICK ON LECTURES</span></em></strong><br /><br /><br /><a href="http://nptel.iitm.ac.in/courses/Webcourse-contents/IIT-KANPUR/CompArchitecture/page1.htm">http://nptel.iitm.ac.in/courses/Webcourse-contents/IIT-KANPUR/CompArchitecture/page1.htm</a>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-84756435940254280552009-02-26T06:56:00.000-08:002009-02-26T06:58:17.882-08:00DBMS LECTURE VEDIOS OF IIT MADRAS<strong><em><span style="color:#cc33cc;">DATABASE MANAGEMENT SYSTEM VEDIO COURSE OF MADRAS</span></em></strong><br /><br /><a href="http://nptel.iitm.ac.in/video.php?courseId=1071">http://nptel.iitm.ac.in/video.php?courseId=1071</a>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-12853833062380493462009-02-26T06:51:00.000-08:002009-02-26T06:52:40.631-08:00COMPUTER ORGANIZATION NOTES OF IIT GUWAHATHI<span style="color:#ff0000;"><strong><em>THIS LINK IS FOR COMPUTER ORGANISATION AND JUST CLICK ON EACH MODULE U WANT</em></strong></span><br /><br /><a href="http://nptel.iitm.ac.in/courses/Webcourse-contents/IIT-%20Guwahati/comp_org_arc/web/index.htm">http://nptel.iitm.ac.in/courses/Webcourse-contents/IIT-%20Guwahati/comp_org_arc/web/index.htm</a>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-65629901270442263172009-02-26T06:43:00.000-08:002009-02-26T06:46:10.908-08:00NOTES OF OPERATING SYSTEM IIT MADRAS<strong><em><span style="color:#00cccc;">HEY JUST CLICK ON BELOW LINK.U WILL GET OPERATING SYSTEM NOTES OF IIT MADRAS.</span></em></strong><br /><strong><em><span style="color:#00cccc;">JUST GO TO THE LINK AND CLICK ON EACH MODULE U WANT</span></em></strong><br /><br /><br /><a href="http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating%20Systems/New_index1.html">http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating%20Systems/New_index1.html</a>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-74234007854609361482009-02-25T08:24:00.000-08:002009-02-25T08:26:56.538-08:00CASE STUDIES OF THREAD SCHEDULING<strong><em><span style="color:#33ff33;">JUST CLICK ON BELOW LINK</span></em></strong><br /><br /><a href="http://www.akgupta.com/Java/Notes/section7-4.htm">http://www.akgupta.com/Java/Notes/section7-4.htm</a>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-57493691585362691272009-02-25T08:14:00.000-08:002009-02-25T08:16:31.599-08:00QUESTIONS AND ANSWERS OF OPERATING SYSTEM REGARDING EVERY CHAPTER<strong><em><span style="color:#33ccff;">JUST CLICK ON THIS LINK</span></em></strong><br /><br /><a href="http://www.coders2020.com/problems-and-solutions-of-operating-system-concept-by-galvin-and-silberschatz">http://www.coders2020.com/problems-and-solutions-of-operating-system-concept-by-galvin-and-silberschatz</a>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.comtag:blogger.com,1999:blog-3004122316136991759.post-67862341780224741372009-02-25T05:11:00.000-08:002009-02-25T05:45:17.625-08:00COMPUTER ORGANIZATION QUESTION PAPERS<span style="color:#999900;"><strong><em>,Apr/May 2008COMPUTERORGANIZATION<br />Answer any FIVE Questions</em></strong></span><br /><span style="color:#999900;"><strong><em>All Questions carry equal marks<br />1.(a)Explain about IAS memory formats. (b)List various registers in a computer along withtheir purpose [8+8] </em></strong></span><br /><span style="color:#999900;"><strong><em>2. (a) Find the output binary number after performing the following<br />arithmetic operations i. 111.01 + 10.111 ii. 11.01 + 110.11 iii. 110.11 -111.01 (b) Explain about the longhand division of binaryintegers[6+10] </em></strong></span><br /><span style="color:#999900;"><strong><em>3.(a)Describe various Pentium data types (b)Describe various common data transfer instruction set operations.<br />[6+10] </em></strong></span><br /><span style="color:#999900;"><strong><em>4. (a) List various R3000 pipeline stages. Also explain the function of each. (b) List and describe all shift and multiply/divide instructions of<br />MIPS R-Series processors. [8+8]</em></strong></span><br /><span style="color:#999900;"><strong><em>5. (a) Differentiate between single versus two-level caches. (b) Elaborate on Pentium Cache Organization. [8+8] </em></strong></span><br /><span style="color:#999900;"><strong><em>6. Discuss three possible techniques for I/O operations with merits and<br />demerits of each. [16] </em></strong></span><br /><span style="color:#999900;"><strong><em>7. (a) Discuss about I/O channel architecture. (b) Discuss about I/Oaddressing in 8086. (c) Discuss the salient features of laser printer [6+6+4] </em></strong></span><br /><span style="color:#999900;"><strong><em>8. (a) Give a summary of arithmetic and logical operations that are<br />defined for the vector architecture. (b) What is cache coherence problem. Discuss about different cache<br />coherance approches. [8+8] .....<br /></em></strong></span><br /><span style="color:#999900;"><strong><em></em></strong></span><br /><span style="color:#999900;"><strong><em>1. (a) Explain the purpose and merits of interrupts. (b) Draw and explain the instruction cycle with interrupts. (c) What is interrupt handler? Explain its purpose. [6+6+4] </em></strong></span><br /><span style="color:#999900;"><strong><em>2. (a) How subtraction is done on the binary numbers represented in one’s<br />complement notation give an examples. (b) What do you mean byr’s complement. [8+8] </em></strong></span><br /><span style="color:#999900;"><strong><em>3. NOOP instruction has no effect on the CPU state other than<br />incrementing the program counter. Suggest some uses of this instruction with examples. [16]</em></strong></span><br /><span style="color:#999900;"><strong><em>4. Elaborate on different types of registers in a register organization<br />[16] </em></strong></span><br /><span style="color:#999900;"><strong><em>5. Discuss about address translation with segmentation and paging in<br />the Intel Pentium [16] </em></strong></span><br /><span style="color:#999900;"><strong><em>6. (a) How would CPU handles multiple devices. Explain with different<br />techniques available (b) Discuss the characteristics of Intel 8259A interrupt controller. [8+8] </em></strong></span><br /><span style="color:#999900;"><strong><em>7. (a) Discuss about I/O channel architecture. (b) Discuss about I/Oaddressing in 8086. (c) Discuss the salient features of laser printer [6+6+4] </em></strong></span><br /><span style="color:#999900;"><strong><em>8. (a) Classify and explain different multiprocessors (b) Explain the organization of tightly coupled multiprocessor system<br />with a generic block diagram. [8+8] .....<br /></em></strong></span><br /><span style="color:#999900;"><strong><em></em></strong></span><br /><span style="color:#999900;"><strong><em>1. (a) Define PCI. Explain the applications of PCI (b) Describe anyten mandatory PCI signals.[8+8] </em></strong></span><br /><span style="color:#999900;"><strong><em>2. Write an algorithm to substract binary numbers represented in<br />normalized floating point mode with base 2 for exponent [16] </em></strong></span><br /><span style="color:#999900;"><strong><em>3. NOOP instruction has no effect on the CPU state other than<br />incrementing the program counter. Suggest some uses of this instruction with examples. [16]</em></strong></span><br /><span style="color:#999900;"><strong><em>4. Elaborate on different types of registers in a register organization [16] </em></strong></span><br /><span style="color:#999900;"><strong><em>5. Give a block diagram for a 4M×8 memory using 256K×1 memory chips. [16] </em></strong></span><br /><span style="color:#999900;"><strong><em>6. (a) Explain about magnetic disk layout (b) Elaborate on Winchester disktrack format. [8+8]</em></strong></span><br /><span style="color:#999900;"><strong><em>7. (a) Explain about microinstruction format of TI 8800 (b) Explain about ALUcontrol fields of IBM 3033 microinstruction. [8+8] </em></strong></span><br /><span style="color:#999900;"><strong><em>8. (a) Explain the following terms. i. Read miss ii. Read hit iii. Write miss iv. Write hit (b) Discuss different approaches to vector computation [8+8] .....<br /></em></strong></span><br /><span style="color:#999900;"><strong><em></em></strong></span><br /><span style="color:#999900;"><strong><em>1. (a) Discuss the interconnection structure design of a computer. (b) Explain various bus lines. (c) What do you mean by multiple -bus hierarchies. [8+4+4]</em></strong></span><br /><span style="color:#999900;"><strong><em>2. (a) Find the output binary number after performing the arithmatic<br />operation using 1’s complement representation. i. 111.01 + 10.111 ii. 110.11 -111.01 (b) Explain steps involved in the addition of numbers using 2’s<br />complement notation. [10+6] </em></strong></span><br /><span style="color:#999900;"><strong><em>3. Discuss about various Pentium addressing modes with algorithms [16] </em></strong></span><br /><span style="color:#999900;"><strong><em>4. (a) List various R3000 pipeline stages. Also explain the function of each. (b) List and describe all shift and multiply/divide instructions of<br />MIPS R-Series processors. [8+8] </em></strong></span><br /><span style="color:#999900;"><strong><em>5. (a) Discuss about address translation in paging. (b) How does page size effects storage utilization and effective memory<br />data-transfer rate [8+8] </em></strong></span><br /><span style="color:#999900;"><strong><em>6. Discuss about data organization and formatting of magnetic disk in<br />detail [16]</em></strong></span><br /><span style="color:#999900;"><strong><em>7. Discuss about horizontal and vertical instruction formats. Also<br />differentiate between horizontal and vertical instruction formats. [16]</em></strong></span><br /><span style="color:#999900;"><strong><em>8. (a) Explain different types of parallel processors. (b) What do you mean bycompound instruction? Give examples (c) Elaborate on registers of the IBM3090 vector facility. [4+6+6] .....<br /></em></strong></span>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.com0tag:blogger.com,1999:blog-3004122316136991759.post-74989937011174559422009-02-25T05:03:00.000-08:002009-02-25T05:08:46.022-08:00OPERATING SYSTEM QUESTION PAPERS<span style="color:#66ffff;">1. Draw and explain program flow of control without and with<br />interrupts. [16] </span><br /><span style="color:#66ffff;">2. Explain the following transitions: (a) Blocked ! Blocked/Suspended. (b) Blocked/Suspended! Ready/Suspended. (c) Ready/Suspended ! Ready. [5+5+6] </span><br /><span style="color:#66ffff;">3. (a) What is a semaphore? What are the various operations defined on<br />it? (b) What is the difference between weaksemaphore and strong semaphore?<br />Explain. [8+8] </span><br /><span style="color:#66ffff;">4. (a) Explain the uses of the following: i. Event Object ii. Mutex Object iii. Semaphore Object iv. Waitable timer Object. (b) Describe about mechanism used by Windows to implement<br />Synchronization of Critical Section objects. [8+8] </span><br /><span style="color:#66ffff;">5. Explain paging scheme for memory management, discuss the paging<br />hardware and paging model. [16] </span><br /><span style="color:#66ffff;">6. (a) Explain about the key scheduling criteria. (b) Give a detail note on short-term scheduling. [8+8] </span><br /><span style="color:#66ffff;">7. (a) Explain hash file organization. (b) Discuss the address information elements ofa file directory. [8+8] </span><br /><span style="color:#66ffff;">8. Write a note on: (a) Access control list of Windows 2000. (b) Standardaccess types of Windows 2000. (c) Access tokens of Windows 2000.<br />(d) Access maskof Windows 2000. [4+4+4+4] .....<br /></span><br /><span style="color:#66ffff;"></span><br /><span style="color:#66ffff;">1. Explain the basic instruction cycle with appropriate diagram. [16] </span><br /><span style="color:#66ffff;">2. Explain about single threaded and multi threaded process models with<br />suitable diagrams. [16] </span><br /><span style="color:#66ffff;">3. Give short note about the following : (a) Binary Semaphores. (b) Bounded Waiting. [8+8] </span><br /><span style="color:#66ffff;">4. Explain about protection technique of critical section in LINUX. [16] </span><br /><span style="color:#66ffff;">5. Explain any two techniques for structuring the page table. Discuss<br />with suitable examples. [16] </span><br /><span style="color:#66ffff;">6. Suppose the head of a moving-head disk with 200 tracks, numbered 0<br />to 199, is currently servingarequest attrack143 andhasjust finished arequest<br />attrack125. If the queue of requests is kept in FIFO order: 86, 147, 91, 177, 94,<br />150, 102, 175, 130. What is the total head movement to satisfy these requests for the<br />following disk scheduling algorithms. (a) FCFS (b) Random (c) PRI (d) SCAN (e) SSTF (f) C-SCAN [16] </span><br /><span style="color:#66ffff;">7. Explain various techniques implemented for free space management,<br />discuss with suitable examples. [16] </span><br /><span style="color:#66ffff;">8. (a) Explain the flaws in one-way encryption of password strategy. (b) Write a briefnote on intrusion detection. [8+8] ..... </span><br /><span style="color:#66ffff;"></span><br /><br /><span style="color:#66ffff;">1. Explain about the various memories hierarchy. [16] </span><br /><span style="color:#66ffff;">2. What is a process? Explain different process states. [16] </span><br /><span style="color:#66ffff;">3. Explain the solution for the critical section problem for multiple<br />processes. [16] </span><br /><span style="color:#66ffff;">4. Explain the following LINUX Kernel concurrency mechanisms (a) Atomic Integer Operations (b) Atomic BitmapOperations. [16] </span><br /><span style="color:#66ffff;">5. (a) Explain Paging hardware with translation look-aside buffer. (b) How memory protection can be accomplished in a paged environment?<br />Explain. [8+8] </span><br /><span style="color:#66ffff;">6.<br />Whatisthedifferencebetweenpreemptiveandnonpreemptivescheduling?Explain an algorithm for each scheduling type. [16] </span><br /><span style="color:#66ffff;">7. (a) What aretherequirementsforaninteractive,generalpurpose<br />filemanagement system. (b) Discuss the elements of file management. [8+8] </span><br /><span style="color:#66ffff;">8. (a) Give the classification of intruders. Explain each class. (b) Comparison User-Orientedaccess control with data-oriented access<br />control. [8+8] ..... </span><br /><span style="color:#66ffff;"></span><br /><br /><span style="color:#66ffff;">1. What are the various objectives and functions of Operating Systems? [16] </span><br /><span style="color:#66ffff;">2. What is a process? Explain different process states. [16] </span><br /><span style="color:#66ffff;">3. What the design characteristics of Message Systems are of inter<br />process communication and synchronization? [16] </span><br /><span style="color:#66ffff;">4. Explain the following LINUX Kernel concurrency mechanisms (a) Atomic Integer Operations (b) Atomic BitmapOperations. [16] </span><br /><span style="color:#66ffff;">5. Explain segmentation scheme for memory management. Give the<br />segmentation hardware. [16] </span><br /><span style="color:#66ffff;">6. (a) Discuss about N-step-SCAN policy for disk scheduling. (b) Explain how double buffering improves the performance than a single<br />buffer forI/O. (c) Differentiate between logical I/O and device I/O. [6+5+5] </span><br /><span style="color:#66ffff;">7. (a) Discuss the objectives for file management systems. (b) Explain the file system Architecture. [8+8] </span><br /><span style="color:#66ffff;">8. (a) Explain the various password selection strategies. (b) Discuss about UNIX passwordscheme. [8+8] .....<br /><br /></span>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.com0tag:blogger.com,1999:blog-3004122316136991759.post-85142448351109958102009-02-25T04:54:00.000-08:002009-02-25T05:01:17.690-08:00DATABASE MANAGEMENT SYSTEM QUESTION PAPERS<strong><em><span style="color:#3366ff;"> II B.Tech II Semester Supplimentary Examinations, </span></em></strong><br /><strong><em><span style="color:#3366ff;"> Apr/May 2008</span></em></strong><br /><strong><em><span style="color:#3366ff;"> Answer any FIVE Questions</span></em></strong><br /><strong><em><span style="color:#3366ff;"> All Questions carry equal marks<br /></span><span style="color:#cc33cc;">Set No. 1</span></em></strong><br /><strong><em><span style="color:#cc33cc;">1. (a) Explain the drawbacks of traditional file processing systems with examples.(b) Explain the three levels of data abstraction. [7+9]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">2. (a) What is a view? Explain the a views in SQL?(b) Explain nested queries with example in SQL ? [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">3. (a) Which of the three basic file organizations would you choose for a file wherethe most frequent operations are as follows,i.Search for records based on a range of field values.ii. Perform insert and scans where the order of records does not matter.iii. Search for a record based on a particular field value.(b) Define dense index.(c) How does multi level indexing improve the performance of searching an indexfile[6+4+6]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">4. (a) Explain about projection based on sorting.(b) Explain about projection based on hashing. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">5. (a) What is indexing ? Explain with an example.(b) Explain about query processing. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">6. (a) Explain functional dependencies and multivalued dependencies with examples.(b) Consider the relation R(A,B,C,D,E,F) and FD’sA ! BC F ! AC ! AD ! E E ! Dis the decomposition of R into R1 (A,C,D), R2 (B,C,D) and R3 (E,F,D) lossless? Explain the requirement of loss less decomposition. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">7. (a) Define the concept of a schedule for a set of concurrent transactions. Give asuitable example.(b) Explain how does granularity of locking affect the performance of concurrencycontrol algorithm. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">8. Explain WAL Protocol, UNDO algorithm, Check pointing and Media Recovery?[16]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">Set No. 2</span></em></strong><br /><strong><em><span style="color:#cc33cc;">1. Write short notes on:(a) Key constraints(b) General constraints(c) Relational calculus. [6+5+5]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">2. (a) What is a view? Explain the a views in SQL?(b) Explain nested queries with example in SQL ? [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">3. (a) Explain the limitations of static hashing. Explain how this is overcome indynamic hashing.(b) Write a note on indexed sequential files. [10+6]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">4. (a) Consider the following SQL query for a bank databaseSelectT.branch − nameFrombranchT, branchSwhereT.Assets ¿ S.assetsandS.branch − city = ”HY DERABAD′′Write an efficient relational algebra expression that is equivalent to the query.(b) Define query optimization and at what point during query processing doesoptimization occur? [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">5. (a) What is indexing ? Explain with an example.(b) Explain about query processing. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">6. (a) Let R=(A,B,C,D,E) and letMbe the following set of multivalued dependenciesA− >> BCB− >> CDE− >> ADList the nontrivial dependencies in M+(b) Describe the properties of normalized and unnormalized relations. [10+6]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">7. (a) Explain the concept of transaction atomicity.(b) How does the two phase locking protocol ensures serializability? [6+10]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">8. Explain in detail the ARIES recovery method. [16]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">Set No. 3</span></em></strong><br /><strong><em><span style="color:#cc33cc;">1. (a) What is DBMS? Explain the advantages of DBMS. [2+5=7](b) What is a data model? Explain the relational data model. [3+6=9]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">2. (a) Give the various methods of managing data security.(b) Describe the “dynamic SQL”. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">3. Discuss the difference between index sequential and hashed file organizations. Com-pare their storage and access efficiencies. List the applications where each of thefile organization is suitable. [16]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">4. (a) Consider the following SQL query for a bank databaseSelectT.branch − nameFrombranchT, branchSwhereT.Assets ¿ S.assetsandS.branch − city = ”HY DERABAD′′Write an efficient relational algebra expression that is equivalent to the query.(b) Define query optimization and at what point during query processing doesoptimization occur? [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">5. Show that the following equivalences hold and explain how they can be applied toimprove the efficiency of certain updates.(a) (r1 [ r2) [ r3 = r1 [ (r2 [ r3)(b) r1 [ r2 = r2 = r2 [ r3(c) σp(r1 − r2) = σp(r1) − σp(r2) [5+4+7]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">6. (a) List the three design goals for relational database and explain why they aredesirable.(b) Consider the relation scheme Emp Dept( Ename, SSN, Bdate, Address, Dnum-ber, Dname, DMGRSSN) and the following set of FD’sF={ SSN− > Ename,Bdate, Address, DnumberDnumber− > Dname, DMGRSSN}Calculate the closer {SSN}+ and {Dnumber}+ with respect to F. [6+10]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">7. (a) What information does the dirty page table and transaction table contain?(b) Give a short notes on recovery from deadlock. [6+10]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">8.Describe the shadow paging recovery technique. Under what circumstances does itnot require a log. [16]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">Set No. 3</span></em></strong><br /><strong><em><span style="color:#cc33cc;">1. (a) What is a Data model ? List the important data models [8](b) Explaini. DDLii. DMLiii. Data sublanguageiv. Host language [2+2+2+2]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">2. (a) Discuss the various DDL, DML commands with illustrations in SQL.(b) Why are null values not preferred in a relation? [12+4]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">3. Give algorithms for inserting a new key into a B-tree [16]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">4. (a) Discuss about cost based optimization.(b) Give a detailed account of heuristic optimization. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">5. (a) Discuss the reasons for converting SQL queries into relational algebra queriesbefore optimization is done.(b) What is meant by query execution plan? Explain its significance. [10+6]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">6. (a) Explain the functional dependencies and multi valued dependencies with ex-amples.(b) What is normalization? Discuss the 1NF,2NF, and 3NF Normal forms withexamples. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">7. (a) Explain timestamp ordering with an algorithm.(b) Explain different locking Techniques for concurrency control. [8+8]</span></em></strong><br /><strong><em><span style="color:#cc33cc;">8. (a) When a system recovers from a crash ? In what order must transaction beUndone and Redone? Why is this order important?(b) What is a log in the content of DBMS? How does check pointing eliminatesome of the problems associated with log based recovery? [8+8]</span></em></strong>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.com0tag:blogger.com,1999:blog-3004122316136991759.post-45220698534036588412009-02-24T06:49:00.000-08:002009-02-24T06:57:23.967-08:00ENVIRONMENTAL STUDIES QUESTIONS<strong><em><span style="color:#33ff33;">1. (a) Write a note on the importance of education on environmental issues and concerns. '</span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Describe the multidisciplinarynature of environmental studies. [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">2. Explain the resources from following sources on which man depends and explain briefly. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(a) Atmosphere (b) Hydrosphere (c) Lithosphere [6+5+5] </span></em></strong><br /><strong><em><span style="color:#33ff33;">3. (a) What is a grassland ecosystem and what are the activities in grasslands ?</span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Whatactivitiesof manlead tothedestructionofgrasslandsandwhat arethe consequences of this? [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">4. Discuss any two: </span></em></strong><br /><strong><em><span style="color:#33ff33;">(a) Productive value of Nature. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b) Aesthetic value of Nature </span></em></strong><br /><strong><em><span style="color:#33ff33;">(c) Optional value of Nature [16] </span></em></strong><br /><strong><em><span style="color:#33ff33;">5. (a) Oceans are ultimate sink for most of the waste we produce. Explain. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) List off shore sources of Marine Pollution. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (c) Explain the effects of oil pollution on the ocean. [8+4+4] </span></em></strong><br /><strong><em><span style="color:#33ff33;">6. (a) Define watershed management and explain its objectives. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Discuss various water conservation techniques that can be practiced by individuals. [8+8] 7. (a) Thoughpopulationgrowthshowsaglobaldecline,thereisstillcauseforworry. Explain why. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Whatarethereasonsfor differencesintherateofpopulationgrowthinvarious countries. [8+8] 8. (a) Explaintheaspectstobestudied andtheprocedureforcollecting information when you want to document the environmental features and resource assets of a water resoure ecosystem during a field visit. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Describe, in the format given above, the features ofany such ecosystem you have studied during field visit. [8+8] .....<br /></span></em></strong><br /><strong><em><span style="color:#33ff33;"></span></em></strong><br /><strong><em><span style="color:#33ff33;"></span></em></strong><br /><strong><em><span style="color:#33ff33;">1. (a) Define “Environmental Studies”? </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Explain the components and scope of Environmentalstudies. [4+12] </span></em></strong><br /><strong><em><span style="color:#33ff33;">2. (a) Explain the problems created by construction of large dams for irrigation and power generation .</span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) State briefly the components ofcomprehensive water management strategy . [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">3. (a) Define ecosystem and list components of an ecosystem. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Briefly explain the manner in whichecosystems are destroyed by human activites. [10+6] 4. (a) Write a brief note on biodiversity and ecosystem diversity. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Explain the evolution of diverse species in an ecosystem. [16] </span></em></strong><br /><strong><em><span style="color:#33ff33;">5. (a) Listthewastesthat areprohibitedfromprocessingalongwith municipal solid waste. Discuss. (b) Briefly describe the methods of heating and disposalof solid waste. [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">6. (a) What are the major issues associated with resettlement and rehabilitation? </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Bring out the main elements ofwater conservation. [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">7. Explainthepush andpullfactorswhichlead tomigrationfromrural areasto urban centers. [16] </span></em></strong><br /><strong><em><span style="color:#33ff33;">8. What are the problems encountered in the disposal of solid waste from various sources. Describe the outcome of poor management of solid waste, illustrating your answer with any case-study. [16] ..... </span></em></strong><br /><strong><em><span style="color:#33ff33;"> Answer any FIVE Questions</span></em></strong><br /><strong><em><span style="color:#33ff33;">All Questions carry equal marks<br />1. Write a detailed note on the various institutions and organizations in the field of ?preservation of wildlife and knowledge of natural history. [16] </span></em></strong><br /><strong><em><span style="color:#33ff33;">2. (a) Discuss in detail the water cycle. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Write about sustainable water management. [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">3. (a) Define ecosystem and list components of an ecosystem. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Briefly explain the manner in whichecosystems are destroyed by human activites. [10+6] 4. Discuss the aesthetic value of nature with respect to the following statements.</span></em></strong><br /><strong><em><span style="color:#33ff33;"> (a) A true wilderness experience is an incredible learning experience. </span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) The beauty of nature encompasses every aspect of the living and non-living part of our earth. [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">5. (a) Oceans are ultimate sink for most of the waste we produce. Explain. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b) List off shore sources of Marine Pollution. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(c) Explain the effects of oil pollution on the ocean. [8+4+4]</span></em></strong><br /><strong><em><span style="color:#33ff33;"> 6. (a) Define watershed management and explain its objectives. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b) Discuss various water conservation techniques that can be practiced by individuals. [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">7. Write briefly about the steps that need to be taken as part of an overall plan for achieving global population stabilization. [16] </span></em></strong><br /><strong><em><span style="color:#33ff33;">8. Explain the reasons for pollution of different types (water, air ,noise) that you have encountered in any region. Describe the problems created and suggest some remedial measures for the same. [8+8] .....<br /> Answer any FIVE Questions</span></em></strong><br /><strong><em><span style="color:#33ff33;"> All Questions carry equal marks<br />1. (a) Write a note on the importance of education on environmental issues and concerns.</span></em></strong><br /><strong><em><span style="color:#33ff33;"> (b) Describe the multidisciplinarynature of environmental studies. [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">2. (a) What do you understand by biotic and a biotic parts of nature? </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b) Explain the interaction and interdependencyof these. [6+10] </span></em></strong><br /><strong><em><span style="color:#33ff33;">3. (a) Explain the concept of food chain, food web and ecological pyramid. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b)Explainthewatercycleandwhataretheproblemsthat arisewithdisturbances to the water cycle? [10+6]</span></em></strong><br /><strong><em><span style="color:#33ff33;"> 4. Discuss the aesthetic value of nature with respect to the following statements.</span></em></strong><br /><strong><em><span style="color:#33ff33;"> (a) A true wilderness experience is an incredible learning experience. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b) The beauty of nature encompasses every aspect of the living and non-living part of our earth. [8+8] </span></em></strong><br /><strong><em><span style="color:#33ff33;">5. (a) Oceans are ultimate sink for most of the waste we produce. Explain. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b) List off shore sources of Marine Pollution. (c) Explain the effects of oil pollution on the ocean. [8+4+4]</span></em></strong><br /><strong><em><span style="color:#33ff33;"> 6. (a) What are the major causes of nuclear hazards and accidents. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b) Discuss the ways to minimize radiation exposure in case ofa nuclear accident. [8+8]</span></em></strong><br /><strong><em><span style="color:#33ff33;"> 7. (a) Tuberculosis is one the environmentally related contagious diseases. Write briefly about the effects of this disease. </span></em></strong><br /><strong><em><span style="color:#33ff33;">(b) What is the extent ofspread of this disease in various parts of the globe? [6+10] '</span></em></strong><br /><strong><em><span style="color:#33ff33;">8. (a) Explainthestepby stepproceduretorecord anddocumenttheenvironmental features and resource assets of an ecosystem during a field visit. 1 of2<br />(b) Describe, intheformatgivenabove,thefeaturesofany typeof any ecosystem you have studied during field visit. [8+8] .....<br /></span></em></strong>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.com0tag:blogger.com,1999:blog-3004122316136991759.post-50767588786022146482009-02-24T06:25:00.000-08:002009-02-24T06:46:42.385-08:00SOFTWARE ENGINEERING QUESTION PAPERS<span style="color:#ff0000;"><strong><em>Code No: R05220501 Set No. 1<br />II B.Tech II Sem Apr/May2008SOFTWAREENGINEERING</em></strong><br /><strong><em>Answer any FIVE Questions</em></strong><br /></span><span style="color:#ff0000;"><strong><em>All Questions carry equal marks<br /><br />1. Elaborate on evolution of software. [16]<br />2. (a) Differentiate between prototyping and incremental models.</em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Explain the unifiedapproach to software development. Discuss the merits and demerits of this approach.[6+6+4]<br />3. Discuss about principal requirements engineering activities and their relationships. [16]<br />4. (a) Define and explain about coupling and cohesion. Also differentiate between them. (b) Discuss the statement, “Abstraction and refinement are complementaryconcepts”. [5+3+8]<br />5. (a) WhatismeantbyUserInterface? What arethethreeareasthat userinterface design focuses? Explain them. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Discuss the importance ofuser interface design? [10+6]<br />6. (a) The software analysis and design are constructive tasks, and software testing is considered to be destructive from the point of view of developer. Discuss. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Who will test the software, either developer or an independent test group? Discuss the advantage and draw backs of each one. [8+8]<br />7. (a) Computethefunctionpoint valueforaproject with thefollowing information domain characteristics. Number of external inputs: 32 Number of external outputs: 60 Number of external inquires: 24 Number of external interface files: 2 Number of internal logical files: 8 Assume that all complexity adjustment values are average.</em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) What is an indirectmeasure? And how are such measures common in software metrics work? [8+8]<br />8. (a) What is meant by FTR? Discuss about review reporting and record keeping.</em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) State and explain the guidelines for formaltechnical reviews. [8+8] 1 of2<br /><br />II B.Tech II Semester Regular Examinations, </em></strong><br /><strong><em>Apr/May 2008SOFTWAREENGINEERING </em></strong><br /><strong><em>Answer any FIVE Questions</em></strong><br /></span><span style="color:#ff0000;"><strong><em>All Questions carry equal marks<br />1. Give a generic view of Software Engineering. [16]<br />2. Discuss various evolutionary software process models in detail. [16]<br />3. Discuss an example of a type of system where social and political factors might strongly influence the system requirements. Explain why these factors are important in your example. [16]<br />4. (a) Define and explain abstraction and refinement. Also differentiate between them. (b) What is refactoring? Whyis it done? [4+4+3+5]<br />5. (a) What is a state machine model? Discuss with an example. (b) What is Object interface specification? Write a Java description of weather station interface. [8+8]<br />6. (a) Discuss about Security testing and Performance testing. (b) State and explain various debugging tactics. (c) What arethequestionsthat every softwareengineershouldaskbefore making the “Correction” that remove the cause of a bug? [6+4+6]<br />7. (a) Discuss about software tools for project and process metrics. (b) Discuss anyfour useful indicators for software quality. [8+8]<br />8. (a) Is it possible asses the quality of software if the customer keeps changing? What it is supposed to do? (b) Can a program be correct and still not exhibit good quality? Explain. [8+8] .....<br />II B.Tech II Semester Regular Examinations, </em></strong><br /><strong><em>Apr/May 2008SOFTWAREENGINEERING </em></strong><br /><strong><em>Answer any FIVE Questions</em></strong><br /></span><span style="color:#ff0000;"><strong><em>All Questions carry equal marks<br />1. (a) Explain the five software assessment principles. (b) Discuss about various phases ofassessment. [6+10]<br />2. (a) What is water fall model? How is it different from other engineering process models? (b) Explain various types ofevolutionary development. [5+5+6]<br />3. (a) Why requirements review is conducted? Discuss various types of it. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) What is requirements management? Whyis it needed? [8+8]<br />4. (a) Define interface. Discuss various types of interfaces. Give examples for each. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) What is component? Also explain about component diagrams.[3+3+3+3+4]<br />5. (a) State the design principles suggested by Mayer for OOD. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) OODtends to be programming language dependent. Why? [8+8]<br />6. (a) List some of the problems that might be associated with the creation of an independenttestgroup. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Whyis a highly coupled module is difficult to unit test? [8+8]<br />7. (a) Discussthesevenprinciplesof risk management which were identifiedbySEI. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Distinguish between generic risks and product specific risks. [10+6]<br />8. AFormalTechnicalReview(FTR) effectiveonly ifevery one has prepared inadvance. How do you recognize a review participant who has not prepared? What do you do if you are the review leader? [16] .....<br /><br />II B.Tech II Semester Regular Examinations, </em></strong><br /><strong><em>Answer any FIVE Questions</em></strong><br /></span><span style="color:#ff0000;"><strong><em>All Questions carry equal marks<br />1. (a) Explain the five software assessment principles. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Discuss about various phases ofassessment. [6+10]<br />2. (a) What is water fall model? How is it different from other engineering process models?</em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Explain various types ofevolutionary development. [5+5+6]<br />3. UsingyourownknowledgeofhowanATMis used,develop asetof use-casesthat could be used to derive the requirements for an ATM system. [16]<br />4. (a) Discuss the advantages and disadvantages of modularization. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Whyshould not we over modularize? How would you decompose a software solutiontoobtainthebestsetof modules. [8+3+5]<br />5. Draw a sequence diagram showing the interactions of objects in a group diary system when a group of people arrange a meeting. [16]<br />6. (a) What is the overall strategy for software testing? Explain it clearly. </em></strong><br /></span><span style="color:#ff0000;"><strong><em>(b) Discuss a testing strategyfor Object-Oriented architectures. [10+6]<br />7. (a) Explain the size-oriented metrics with an example. </em></strong><br /></span><strong><em><span style="color:#ff0000;">(b) Discuss about Function-orientedmetrics. [8+8]<br />8. What is meant by SQA? Discuss in detail SQA activities. [16] ...</span></em></strong>GPCET.IThttp://www.blogger.com/profile/15756708502274907791noreply@blogger.com0