CSE
CSE
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define schema and instances. CO2 R 1
Consider the following schema
depositor (customer-name varchar(20), account-no varchar(6))
2. CO3 A 1
Use alter command to modify the data type of account-no from varchar
to number data type.
3. Define physical data independence. CO1 R 1
Which clause is used to restrict the number of rows in a basic SQL
4. CO3 U 1
query.
5. List the methods for handling bucket overflows in hashing CO3 R 1
6. Recall the transitive dependency rule. CO3 R 1
7. List the reasons for the need of normalization in database tables. CO3 R 1
8. Compare and contrast variable length records and fixed- length records. CO4 An 1
Identify the kind of participation does the double solid line represent in the
given diagram.
9. CO5 R 1
14. CO4 U 3
15. Discuss the various transaction states with a neat diagram CO5 U 3
16. Describe the need for multi-level indexing. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Describe the architecture of the database system with a neat
17. CO1 R 12
diagram.
21. Explain the 1NF, 2NF and 3 NF with proper examples CO5 U 12
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Predict the output of the following code snippet:
int x=10,y=20,z=30;
1. CO1 U 1
boolean t = (x < y) & (y == z);
System.out.println(t);
Evaluate the output of the following program:
class Test{
public static void main(String[ ] args) {
2. CO1 An 1
int u=10;
System.out.println(u++ + ++u +u++);
}}
Examine the following code and find the output.
1. abstract class Bike{
2. abstract void run();
3. }
4. class Honda extends Bike{
3.5. void run(){ System.out.println("running safely"); } CO3 A 1
6. public static void main(String args[]){
7. Bike obj = new Honda();
8. obj.run();
} }
4. Describe method overloading and overriding? CO3 R 1
Analyze the following code and find the output.
public class MyClass {
public static void main(String args[]) {
try {
int a[] = {1, 2, 3, 4, 5};
5. for (int i = 0; i < 7; i++) CO2 An 1
System.out.print(a[i]);
}
catch(ArrayIndexOutOfBoundsException e) {
System.out.print("Exception happened");
}}}
6. Name the keyword that is used to make the Java method accessible to CO2 R 1
only one thread at a time.
Indicate the Java program to get a string "Artificial Intelligence" from
the user.
7. CO1 U 1
• Fetch the last char using the string function
• convert the string to lowercase
8. State the usage of byte stream and character stream. CO2 R 1
9. Identify the purpose of InetAddress in Java networking. CO5 R 1
Name the listener to recognize the state change of a button in Java event
10. CO4 R 1
handling.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate break and continue with an example for each. CO1 U 3
12. Explain garbage collection in Java with suitable examples. CO2 U 3
Examine the following code and find the output.
enum Fruits {
APPLE, MANGO, KIWI, PAPAYA
}
public class MyClass {
13. CO2 A 3
public static void main(String[] args) {
Fruits f = Fruits.MANGO;
System.out.println(f);
System.out.println(f.ordinal());
}}
14. Describe the purpose of boxing and auto boxing in Java with example. CO3 U 3
15. Discuss the life cycle of the thread with neat sketch. CO2 U 3
Illustrate the Java code snippet of the Border Layout to organize
16. CO5 A 3
Buttons in the borders.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the relational and logical operators in Java with suitable
17. a. CO1 U 7
example program.
b Describe the object-oriented programming concepts with necessary
CO1 R 5
. example.
Create a class named 'Rectangle' taking the values of its length and
breadth as parameters of its constructor and having a method named
19. a. 'calculateArea' which returns the area of the rectangle. Get the CO3 A 6
length and breadth of the rectangle as user input. Illustrate the
above code with necessary object creation.
b Illustrate the working principle of constructor overloading with
CO3 A 6
. suitable example for each.
20. a. A private company wish to recruit employees with the eligibility of CO2 A 10
“5+
years as programmer”. If the registered person is not eligible then
handle the following situation and construct the User Defined
Exceptions.
• If below 5 years of experience, then throw an exception named
“Exp_Shortage_Exception”
• If the eligible skill is not programmer, then throw the exception
called
“Skill_Shortage_Exception”
Illustrate a Java program to get an integer number from the user and
b CO1 A 2
reverse it.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Folding of a signal. CO1 R 1
2. Define a System. CO2 R 1
3. Recall the expression of Convolution Integral. CO2 R 1
4. Define Sampling. CO3 R 1
5. Define Group delay CO3 R 1
Recall the linear constant-coefficient differential equation for a second-
6. CO3 R 1
order system .
7. Define Image frequency. CO4 R 1
8. Define ROC of Laplace Transform. CO5 R 1
9. List any two properties of Laplace Transform. CO5 R 1
10. Recall the Linearity property of Z-transform. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Sketch u(−n+1) CO1 A 3
12. Test if the given system y ( t ) =0.5 x ( t +2 ) is linear. CO2 An 3
Recall the Magnitude-Phase representation of Continuous-Time
13. CO3 R 3
Fourier_Transform.
14. Define Aliasing. CO4 R 3
Sketch
a. x (3 n−1 )
b. y (2−2 n)
c. x (n+2) y (n−2)
COURSE OUTCOMES
CO1 Students will able to understand the fundamental characteristics of signals and systems for
both analog and discrete domain.
CO2 Students will able to understand the concept of impulse response and convolution in both
analog and discrete time domain.
CO3 Students will able to obtain the mathematical skills to solve problems involving
convolution, filtering, modulation and sampling.
CO4 Students will able to understand the concept of sampling and reconstruction of analog
signals.
CO5 Students will able to understand the concept of Laplace transform and Z-transform and
their applications in analysis of linear and time-invariant analog and discrete systems.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Visualize a flowchart to find the volume of a cuboid. CO1 R 1
2. Generalize the structure of C program. CO3 U 1
3. Enumerate any two delimiters used in C language. CO2 R 1
Examine the following expression and show their hierarchy.
4. R= x * x + 2 * x + 1 / 2 * x * x + x + 1; 1
(x = 1, assume R to be an int) CO2 R
5. Differentiate between while loop and do-while loop. CO3 U 1
6. Define the use of goto statement in C. CO3 R 1
Identify the format specifier used to print a string or character array in
7. 1
C printf or scanf function. CO1 U
8. Show how the data is stored in a 2-D array. CO1 R 1
9. Represent a recursion. CO1 U 1
Differentiate between static memory allocation and dynamic memory
10. 1
allocation. CO2 U
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Survey on the input devices used with a neat sketch. CO3 An 3
12. Express an algorithm to find the average of 5 numbers. CO1 U 3
13. Appraise on the unconditional statements in C with examples. CO3 An 3
14. Differentiate between while loop and for loop with a code. CO3 U 3
Develop a function in C that accepts a year as input and returns whether CO2 A
15. 3
the year is a leap year or not.
16. Interpret the use of malloc() with a code. CO3 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss on the generation of computers with the features. CO3 U 6
Compute the following number systems: CO3 A 6
b
(i) 7CF to decimal
.
(ii) 43F to binary
Construct a C program to check whether a number is odd or even CO2 A 4
18. a.
using conditional operator.
b Develop the generation of Fibonacci series with an algorithm. CO1 A 8
.
Develop a C code to print all the odd numbers from 1 to 50 using CO2 A 6
19. a.
for loop.
b CO3 An 6
Appraise on the switch-case statement with an example.
.
COURSE OUTCOMES
CO1 To enhance the problem-solving skills.
CO2 To empower the students with an idea of developing the programming logic.
CO3 To learn about the basics of C programming.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Differentiate DFA and NFA with example. CO1 U 1
2. If ∑ = {m,n} then find ∑2? CO1 U 1
3. List the Properties of Regular Languages. CO2 R 1
4. Construct a DFA for the set of all strings over ∑ = {a,b} with length1. CO2 A 1
Is it possible for a regular grammar to be ambiguous? Justify your
5.
answer. CO3 A 1
Use the given grammar to derive the parse tree for the string “a*b”.
6. S→ I | S+S | S*S | (S)
I→a | b CO3 U 1
Eliminate ε – production for the following grammar.
7. S→aSSS
S → bb | ε CO4 A 1
8. List the types of Normal Forms. CO4 R 1
9. Define Recursive Language. CO5 U 1
What is the name of the machine that accepts Recursively Enumerable
10.
language? CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Depict Chomsky hierarchy with neat diagram. CO1 R 3
12. For ∑ = {a,b}, construct DFA that accepts all strings of even length. CO2 An 3
Consider the grammar defined by the productions CO3 U 3
13. S→SS | aSb | bSa |ε . Prove that the given grammar is ambiguous or not
for the string “aabb”.
14. State the concept of Linear Bounded Automata. CO4 R 3
15. Construct a Turing machine that accepts the language L = L(aaaa*b*). CO5 R 3
20. a. Apply pumping lemma to prove that the given language is not CO4 A 6
regular.
L={anbn | n>=1}.
b Construct CFG for the language L ={anbn | n>=1}. Generate the parse CO4 A 6
. tree for string “aaabbb” and verify whether the generated grammar is
ambiguous or not.
22. a. Design a Turing Machine for the language L={anbncn| ,n>=1} CO3 A 6
b Illustrate various Properties of CFL with example. CO3 U 6
.
COURSE OUTCOMES
CO1 Define and use abstract models of various computational models such as finite automata, push-
down automata and Turing Machines.
CO2 Classify various computational models based on their expressive power.
CO3 Solve various computational problems using the mathematical models.
CO4 Analyse and differentiate the capabilities of various models.
CO5 Design various mathematical models for any computable problems.
CO6 Explain and justify various theorems and select appropriate mathematical models of computers.
Q. Questions CO BL Mark
No s
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Arrange the given Big O notations in ascending order in terms of rate of
growth. CO1 U 1
O (log n), O (n), O (1), O (n!)
2. Represent the function “23n4 + n2 log n + 5n” in Big-Oh notation. CO1 U 1
3. Convert the given infix expression to postfix expression.
CO2 U 1
(2 + 3) * (3 / 2)
4. State any applications of Queue data structure. CO2 R 1
5. Write the time complexity to delete an element at the front of the singly
CO3 U 1
linked list.
6. Let last denote the last node of a circular linked list. If last.next= None,
CO3 U 1
how many node(s) is/are there in the circular linked list?
7. Write the best-case time complexity of bubble sort algorithm. CO4 R 1
8. What would be the order of values after the first iteration of insertion sort
in the following list of values? CO4 U 1
45, 13, 32, 86, 2, 94
9. Sketch a valid Complete binary tree. CO5 R 1
10. Find the height of NODE 10:
CO6 A 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Calculate the address of A[1700] for the given base address of an array CO1 U 3
A[1300…………1900] as 1020 and the size of each element is 2 bytes in
the memory.
12. Evaluate the postfix expression “ABC+*D-“, where A = 2, B = 5, C = 3 CO2 A 3
and D = 10 using stack. Show the contents of the stack in each step of the
evaluation.
13. List any three differences between singly linked list and doubly linked list. CO3 U 3
14. Consider a hash table of size 7. Insert the values 28, 39, 17, 45, and 49 into CO4 A 3
the hash table using the hash function “value mod 7”. Handle collisions, if
any, by applying separate chaining.
15. List the Properties of Binary Tree. CO5 R 3
16. Differentiate null graph and complete graph with suitable diagrams. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. State the constraints of the inputs and write the pseudocode for CO1 R 12
distribution counting sort. Apply the algorithm for sorting the following
list:
3, 2, 5, 8, 2, 2, 3, 8
18. Assume A=4, B=8, C=10. Write the pseudocode and evaluate the following CO2 A 12
postfix expressions.
a. A B + C – B A + C +-
b. A B C + * C B A – + *
19. Describe the following functions in a doubly linked list with suitable CO3 A 12
pseudocode:
Insert at the front
Insert in the middle
Delete from the front
Delete the middle element
20. Explain with the algorithm how the merge sort technique sorts the list CO4 A 12
of inputs. Apply the algorithm to sort the list of numbers 34, 56, 47, 33,
13, 86, 42, and 92.
21. Write the pseudocode to insert a node in a binary search tree. Construct CO5 A 12
a binary search tree by inserting the values 35, 46, 29, 23, 34, 28, 9, 32,
73, 63, 92.
22. Explain hashing technique for storing and accessing data. Illustrate the CO4 A 12
linear probing method for handling collisions by keeping the following
values in a hash table of size 10. Apply the hash function “key % 10”.
63, 39, 69, 22, 45, 19, 52, 33
23. Illustrate the pseudocode to perform binary search on a given set of ‘n’ CO4 U 12
numbers. Using the algorithm search for the element 48 in the set [12,
23, 34, 44, 48, 53, 87, 99]
COMPULSORY QUESTION
24. Describe the Breadth First Search and Depth First Search algorithm of CO6 U 12
the graph with an example.
CO – COURSE OUTCOME BL – BLOOMS’ LEVEL
COURSE OUTCOMES
CO1 Understand the basics of abstract data type and algorithm analysis.
CO2 Illustrate the use of an array to implement stack and queue.
CO3 Apply the linked list to design stack and queue data structures.
CO4 Demonstrate the working of sorting and searching algorithms and application of hashing.
CO5 Understand the different types of tree data structures and demonstrate the methods for traversing
trees.
CO6 Differentiate the graph representations and traversals.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name the tools used by the analyst for extracting information. CO1 R 1
2. Define pattern. CO1 R 1
3. Write the 80-20 rule. CO2 A 1
List out the different classes available in common class pattern
4. CO2 R 1
approach.
5. Give the guidelines for naming a class. CO3 U 1
6. Name the different types of Attributes. CO4 R 1
7. Write the attribute presentation suggested by UML. CO4 A 1
8. Write the abbreviation of CRC. CO5 R 1
9. Define Axiom. CO5 R 1
10. Name the two major tasks of access layer. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Define prototyping and explain the types of prototyping. CO1 R 3
12. List the major difference between design pattern and frameworks. CO2 R 3
13. Differentiate Actor over user with sample example. CO3 U 3
14. Write short notes about coupling. CO4 A 3
15. Write the difference between alpha and beta testing CO5 A 3
16. Show the activity diagram for Bank Client class verify password. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe object-oriented systems development life cycle. CO1 R 8
b
Write the four quality measures in system evaluation with diagram. CO1 A 4
.
Create the use case and state chart diagram for the below given
problem statement.
The manual system of ticket reservation takes more time
and the number of reservations per day is limited. To increase the
efficiency of the process, the online ticket reservation system is
developed. This system is built for user to directly access the
23. CO2 C 12
system online to book tickets. The user can book, print, delete
tickets without the help of a clerk. The administrator has control
over adding available flights for booking and has control over
deleting flights that are not necessary. The administrator and user
both can make entry in the system using their respective login
details.
COMPULSORY QUESTION
Explain the Object-Oriented Design Axioms and Corollaries in
24. CO6 U 12
detail.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe the various object-oriented concepts.
CO2 Recognize the requirements of any real time application.
CO3 Sketch the design of any application using UML diagram.
CO4 Identify various prototypes to represent the application.
CO5 Prepare the documentation of any real time application.
CO6 Explain the application in terms of use case driven approach.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recite the use of the ternary operator in C++. CO1 R 1
2. Compare variables and constants in C++. CO1 U 1
3. Recall enumeration with an example program. CO2 R 1
4. Compare while and do while in C++. CO2 U 1
5. Define parameterized constructor. CO3 R 1
6. Recall new operator with a suitable example. CO3 R 1
7. List any two operators that cannot be overloaded. CO4 R 1
8. Differentiate friend function and virtual function. CO4 U 1
9. Define file pointer. CO5 R 1
10. Define seekp() function. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List any three features of object oriented programming. CO1 R 3
Write a C++ program to calculate the area of a triangle using an inline
12. CO2 A 3
function.
13. Discuss default constructors with an example in C++. CO3 U 3
14. Write a C++ program to swap two numbers using the function template. CO4 A 3
15. Discuss the use of private specifiers and their visibility in the class. CO5 R 3
16. Illustrate string concatenation in C++. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Write a C++ Program to check whether the given number is
17. a. CO1 A 8
palindrome or not.
b
CO1 R 4
. List any four applications of OOP.
COURSE OUTCOMES
CO1 Define the object-oriented programming concepts.
CO2 Select the relevant object oriented concepts to implement a real time application.
CO3 Demonstrate the application of polymorphism in various ways.
CO4 Illustrate the use of advanced features of C++ such as templates, exceptions, and multiple
inheritances.
CO5 Create applications using inheritance in C++.
CO6 Explain file management and string manipulation.
Q. Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. Justify the need of a compiler in program execution. CO1 U 1
2. Define assembler. CO1 R 1
3. Write a regular expression for decimal numbers. CO2 A 1
4. What is input buffering? CO2 R 1
5. Which LR parsing Technique is most powerful? CO3 U 1
6. Enumerate the advantages of bottom up parsing. CO3 R 1
7. When a syntax directed definition is said to be S- attributed CO4 U 1
grammar?
8. Why various storage allocation techniques are adapted? CO5 U 1
9. What is dangling reference problem? CO6 R 1
10 Enumerate the basic goals of code movement. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Draw the schematic representation of the language processing CO1 R 3
system.
12. Write a LEX program to count the number of odd decimal CO2 A 3
numbers
13. Write a YACC program to check whether the string is part of the CO2 A 3
language {anbn: n 1}.
14. Give the syntax-directed definition for declaration statement. CO4 R 3
15. What is activation tree? How are names bounded with the CO5 R 3
environment?
16. Justify the need of data flow analysis in code optimization. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Explain the various phases of a compiler in detail. Tabulate CO1 R 12
the process of compilation of each phase for the program
segment
a : = b + c *60 where c is float data type.
18. a. Convert (01)*(0|1) into NFA using Thompson’s construction. CO5 U 6
b. Minimize the given DFA CO5 U 6
19. Construct the predictive parsing table for the following CO4 A 12
grammar and parse “~(0 || 1)”.
be -> be || bt / bt
bt -> bt && bf / bf
bf ->~bf / (bf) / 0 / 1
20. Write code to generate intermediate code for assignment and CO4 12
control statements.
21. Change the expression “a = (a+b) * - c +(a +b)/ d” into three CO2 A 12
address code, quadruple, triple, indirect triple, syntax tree,
DAG and postfix notation.
22. Construct DFA for the given regular expression (0|1)*10*. CO3 A 12
23. Construct SLR paring table for the given grammar and parse CO4 A 12
“abb”
X ->YY
Y ->aY | b
COMPULSORY QUESTION
24. Illustrate optimization of basic blocks using necessary CO6 U 12
examples.
COURSE OUTCOMES
CO1 List and define various stages of compiler.
CO2 Select and use standard tools and techniques in different stages of compiler design.
CO3 Illustrate various algorithms of different phases of compiler design.
CO4 Compare and contrast various methods for implementing the phases of a compiler.
CO5 Design and construct different phases of the compiler.
CO6 Evaluate and choose various compilers for different practical application development.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define recursion in java. CO1 U 1
2. List out the types of polymorphism in java with sample code. CO1 R 1
3. List out the features of java. CO1 R 1
Find out the error in the following Java code?
4. byte b = 50; CO2 A 1
b = b * 50;
5. Number of primitive data types in Java are? CO2 R 1
6. Identify the size of float and double in java? CO2 U 1
Identify the output of the following program.
7. String str = “Hellow”; CO3 A 1
System.out.println(str.indexOf(‘t));
8. What is Runnable? CO3 R 1
9. Which class provides system independent server side implementation? CO3 U 1
10. Which layout manager arranges components in a grid? CO3 U 1
PART – B (6 X 3 = 18 MARKS)4
(Answer all the questions)
11. Predict the output: CO1 A 3
class parent{
protected int a =20;
public int b = 22;
}
class child extends parent{
int c = 25;
}
public class driver{
public static void main(String[] args)
{
child obj_child = new child();
System.out.println("value of a = "+ (obj_child.a-1));
}
}
12. CO1 U 3
Differentiate single inheritance and inner class with necessary code snippet.
13. Create a java application to find out given number is prime or not. CO2 A 3
14. Predict the output:
public class create {
public static void main(String[] args)
{
for(int i = 0; i <-5;j++){
CO2 A 3
System.out.println("14CS2040");}
}
}
15. CO3 R 3
Define Data hiding in Java.
16. CO3 R 3
List out the models available for event handling?
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Write a java application to perform sum of n numbers using class
CO1 A 12
and object.
18. Create a class with name “Office” using java program. Also create
variables basic_Pay, DA and net_salary. While executing the
CO1 A 12
program, get basic_Pay and DA for two objects. Calculate the
net_salary for object 1 and object 2.
19. Differentiate while loop and do-while loop with sample code. CO1 U 12
21. Write a java application for basic calculator with following four
functions, Addition, Subtraction, Multiplication and division. Create an
outer class called calculator. Also create four inner classes for each basic
function in the calculator application. Each inner class display the result CO2 A 12
of the operation. All the four inner class functions must be access through
another class called driver class. While execution, value_1 and value_2
need to be taken from user. End of the execution display all the results.
23. Write a code snippet to implement sum of given numbers using recursion. CO3 A 12
COMPULSORY QUESTION
24. Write a code snippet to implement client server communication using
socket programming.
CO3 A 12
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Demonstrate the programming concepts of Java.
CO2 Apply the object oriented concepts to create stand-alone applications.
CO3 Design and develop GUI applications using Abstract Window Toolkit (AWT) and Event
Handling.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Sketch the architecture of software engineering layers. CO1 A 1
2. Identify the process model during analysis and design phase. CO1 R 1
Predict the type of relationship that exists between the given following
classes.
3. CO2 U 1
Car Engine
19. Illustrate the taxonomy of architectural styles with neat diagrams. CO3 A 12
Explain the testing process of a web application and map the testing
22. a. CO5 A 8
with the design pyramid.
b Describe the six-sigma quality standards in software engineering
CO5 U 4
. process.
COURSE OUTCOMES
CO1 Discover an effective software engineering process to develop software-intensive systems.
CO2 Translate the requirements specification into an implementable design
CO3 Construct UML diagrams along with design strategies and design patterns.
CO4 Analyze architectural design methods.
CO5 Evaluate the system using various testing strategies
CO6 Develop the software system with quality measures.
Assessment Pattern as per Bloom’s Taxonomy
CO / P R U A An E C Total
CO1 13 - 1 3 - - 17
CO2 8 1 12 - - - 21
CO3 1 3 29 - - - 33
CO4 1 - 8 - - - 9
CO5 - 16 12 - - - 28
CO6 1 3 12 - - - 16
124
Course Code 14CS2045 / 17CS2019 Duration : 3hrs
Course Name SYSTEM SOFTWARE Max. Marks : 100
Q. CO/BL Mark
Questions
No. s
PART – A (10 X 1 = 10 MARKS)
1. Define Indirect addressing. CO1/ R 1
2. List the various addressing modes that are used in SIC/XE architecture. CO1 / R 1
3. Name the assembler directives used in the SIC assembler language. CO2 /R 1
4. Recall the function of linking loader and linkage editor. CO3 /U 1
5. Estimate the object code for the given below instruction when Jump to the CO4 / A 1
subroutine RDREC is made to the address 1036 and opcode for the
mnemonic JSUB is 48.
+JSUB RDREC
6. State the difference between LDA # 3 and LDA THREE? CO4 1
/An
7. Identify the special character to create unique labels in macroprocessor. CO5 / U 1
8. Name the data structure in which macro definition including macro prototype CO5/R 1
and macro body are stored.
9. List the type of editors. CO6 / R 1
10. Review the use of DBMS. CO6 / U 1
PART – B (6 X 3 = 18 MARKS)
11. Distinguish between system software & application software. CO1 / An 3
12. Discuss the functions to translate source program to object program. CO4 / U 3
13. Write the header and text format for generating object program. CO4 / R 3
14. Describe Automatic Library Search. CO3 / U 3
15. Differentiate macro and subroutine. CO5 / An 3
16. Brief on the level of data description. CO6 / U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23. Q.No 24 is Compulsory)
17. Compare and Contrast SIC architecture with SIC/XE architecture. CO1 / An 12
18. Describe the functions of two pass assembler for converting the CO2/ U 12
assembly language code into object code.
19. Write the algorithm for an absolute loader. Mention the advantage CO3/ A 12
and disadvantage of an absolute loader. Illustrate how this program
would be loaded in memory?
H^ALPHA^001000^000019
T^001000^13^010003^132010^050000^6F1000^169001^0F9000^13
E^001000
20. a. Explain how conditional macro differs from ordinary macros with an CO5/ U 6
example.
b. Describe the various tables used in macro processor. CO5/ U 6
23. List the various addressing modes of ULTRA SPARC architecture. CO1 / R 12
COMPULSORY QUESTION
24. a. Sketch the Editor structure and explain the document editing process. CO6 /U 8
b. Brief on the debugging functions and capabilities. CO6 / U 4
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 List different system architectures like SIC, CISC and RISC.
CO2 Explain algorithm and data structures for assembler.
CO3 Choose different features of loader and assembler.
CO4 Examine the object program.
CO5 Comply macros in assembler.
CO6 Select different system software for practical applications.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. The shell command used to list all the files in a terminal is ________. CO1 U 1
2. Mention the language in which the unix file system was written. CO1 R 1
3. __________ is the system call used to get the parent process ID. CO2 R 1
4. Define fork(). CO2 A 1
5. Directories are created using _______ system call. CO3 R 1
Two or more unrelated processes can communicate through ________
6. CO3 U 1
inter-process communication schemes.
7. Infer the role of swapper process in an operating system. CO4 R 1
8. Write the syntax of kill system call. CO4 R 1
9. List the classification of signals. CO5 R 1
10. __________ is the system call to allocate shared memory space. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Define system call. CO1 R 3
12. Write the syntax to convert a pathname into its inode and explain it. CO2 U 3
13. When does the kernel remove the entries for sticky-bit text regions? CO3 An 3
14. Discuss the four system calls related to Time. CO4 U 3
15. Write the advantages of creating pipes. CO5 A 3
16. Write the syntax for allocating shared memory space. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Illustrate the various scenarios for retrieval of a buffer with necessary CO1 R 12
algorithm.
18. Discuss the algorithm to convert the given path name into its inode CO2 U 12
with example.
19. Describe system calls related to changing the file attributes with CO3 R 12
example.
20. Sketch and explain the various states of the process and its transitions CO4 U 12
22. Consider three different processes A, B and C and assume that the CO5 A 12
initial priority for the processes is 60. The highest user-level priority
is 60 and the clock interrupts the system 30 times a second. Compute
the decay of the CPU usage and the process priority between process
A, B and C.
23. Write and explain the algorithm for allocating space from maps. CO6 U 12
COMPULSORY QUESTION
24. Describe how a memory is shared by two processes and demonstrate CO6 U 12
using code and algorithm.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe the architecture and features of UNIX Operating System.
CO2 Identify UNIX commands for file handling and process control.
CO3 Discover the context of a process and system calls that manipulate and control process context.
CO4 Illustrate data structure of file, process and system calls for file subsystem and process control sub
system.
CO5 Develop the internal algorithms of the kernel.
CO6 Appraise the various Inter-process communication methods.
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. Differentiate value and reference data type in C#. CO1 U 1
2. Predict the output for the following code snippet. CO1 U 1
int? a = null;
int c;
c = a ?? 50;
System. Console. WriteLine("The value of c"+c);
3. Examine the keyword used to pass the value type variables to another CO1 R 1
function by the reference.
4. Predict the output and justify the answer. CO1 U 1
String s = "C#";
String s1 = s;
s1 = s1 + " Programming";
Console.WriteLine(s+ " " + s1);
5. Observe the following C# code snippet and predict the output. CO4 U 1
using System.Collections.Generic;
class Program{
static void Main(){
List<int> l = new List<int>();
l.Add("123");
}}
6. Visualize the memory allocation of an integer value in a Stack memory CO4 R 1
area.
7. Illustrate the role of DataAdapter in ADO.NET disconnected architecture. CO5 U 1
8. Name the panel that enables you to explicitly position controls in WPF. CO6 R 1
9. List the mechanisms used for state management on the client side in CO6 R 1
ASP.NET application.
10. Identify the most important object that supports partial page rendering in CO6 R 1
ASP.NET AJAX.
PART – B (6 X 3 = 18 MARKS)
11. Express how jagged array is different from multidimensional array with CO1 U 3
sample C# code.
12. Differentiate method overloading and method overriding with C# code CO1 U 3
snippet.
13. Describe the synchronization issues that can happen with multiple threads CO2 U 3
and indicate some of the mechanisms used to resolve it.
14. Define the role of assembly in .NET environment with neat structure and CO4 R 3
mention its types.
15. Describe the execute methods associated with the <provider> Command CO5 R 3
classes to execute the SqlCommand.
16. Examine the three types of action selector attributes and its usage with CO6 R 3
proper syntax in ASP.NET MVC.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Develop an application in C# for automating the Banking Operations CO3 A 8
using interfaces.
Create an interface called “Transaction” that contains the
functions such as deposit, withdraw, and viewBalance.
Create a class called “Account” with bank account details such as
acc_name, acc_no, and balance.
Add the necessary constructor and implements the “Transaction”
interface in the “Account” class. Define the logics in the
corresponding methods.
Create necessary object in the main and invoke the functionalities.
b. Discuss the flow control statements with suitable C# code snippet. CO1 U 4
18. Consider a Height class with feet and inches as data members that CO2 A 12
denotes the height of the student. Write a C# program to overload the
+, -, and <= operators.
Note: 12 inches = 1 feet. The height representation should be
displayed in the format of 5'10".
19. a. A private company wish to recruit employees with the eligibility of CO2 A 8
“5+ years as programmer”. If the registered person is not eligible then
handle the following situation using the User Defined Exceptions in
C#.
If below 5 years of experience, then throw an exception named
“Exp_Shortage_Exception”
If the eligible skill is not programmer, then throw the exception
called “Skill_Shortage_Exception”
If the length of the user’s name is less than 10, then throw the
exception called “InvalidUsernameException”
b. Write a C# program to capture 6-digit numbers and title case words CO3 U 4
with regular expression.
(For example - Input: 276543 678 It is Good,
Output: 276543 It Good)
20. a. Write a C# program to print multiples of 4 and 6 using two different CO2 A 8
threads with the intervals of two seconds and three seconds
respectively. Use any one synchronization mechanisms to ensure one
thread gets executed after the other.
b. Express the C# syntax to create the following: CO4 U 4
Create custom attribute called FixAttribute with ‘Fixid’ and
‘Description’ as the positional parameters and ‘Developer’ as the
named parameter.
The custom attribute is targeted to Class and allow multiple is true.
21. a. Create a class named Calculator with methods sum(i,j), diff(i,j) and CO5 A 8
prod(i,j). Write a C# code to invoke these functions by applying
multicast delegate.
b. Examine how master page differs from the ASP.NET page. CO6 U 4
22. a. Discuss the three programming models with Entity Framework CO5 U 6
in .NET.
b. Develop a generic Stack that can hold only integer values and perform CO4 A 6
various stack operations.
COURSE OUTCOMES
CO1 Describe the basics programming constructs of C# in .NET Framework.
CO2 Extend and debug variety of .NET applications.
CO3 Demonstrate the aspects of object-oriented functionalities in .NET applications.
CO4 Use the .NET base libraries in developing real time applications.
CO5 Illustrate .NET applications with relational database and variety of data sources for efficient data access.
CO6 Develop well designed ASP.NET applications using .NET framework.
Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
12. Classify the use of abstract class from a regular Class. CO2 R 3
13. Write the rules for Java Abstract class. CO3 R 3
14. Write in detail about strcmp() with suitable example. CO4 U 3
15. Demonstrate a java program to illustrate the concept of file Creation CO5 A 3
16. List out the differences between Paint() And Paintcomponent(). CO6 An 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Discuss the various conditional and looping statements in java with
CO1 R 12
an example program for each.
18. Define constructor. Explain its types with suitable example. CO2 R 12
COURSE OUTCOMES
CO1 Understand the fundamental principles of object-oriented design.
CO2 Identify the fundamental programming constructs to develop real time applications.
CO3 Model applications using Java.
CO4 Demonstrate the development of multitasking applications
CO5 Breakdown the real time applications into small abstract entities
CO6 Develop desktop-based applications.
Assessment Pattern as per Bloom’s Level
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 14 - 15 - - - 29
CO2 15 01 01 - - - 17
CO3 04 - 13 - - - 17
CO4 05 15 09 - - - 29
CO5 01 12 03 - - - 16
CO6 01 12 - 03 - - 16
124
Course Code 17CS2024 Duration 3hrs
Course Name WEB TECHNOLOGY Max. Marks 100
Q.
B
No Questions CO Marks
L
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. State the HTML syntax to include an image of dimensions 200x200. R 1
1
CO
2. Enumerate any one of the ways to create a button with its syntax. R 1
1
Define the HTML code to display the following text. CO
3. The Product MRP is Rs.10000, Offer Price is Rs.10000 Rs.5999
U 1
2
CO
4. State the CSS Selector that selects the HTML element by the # symbol. R 1
2
CO
5. Differentiate between fixed and sticky positioning in CSS. U 1
2
CO
6. Identify the method used to call a JavaScript function every specified millisecond. R 1
3
CO
7. Enumerate the ways to include javascript in an HTML file. U 1
3
CO
8. State the angular JS filter to display the cost of a product in dollar format. U 1
5
Find the output of the code below:
<?PHP CO
9. ECHO CHR(65);
R 1
6
?>
Find the output of the code below:
<?php
CO
10. echo "I'm about to learn PHP!<br>"; R 1
echo "This ", "string ", "was ", "made ", "with multiple parameters."; 6
?>
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Describe the HTML code to display the following content on a web page.
I. First Heading
First Sub heading1
First Sub heading2 CO
11.
II. Second Heading
U 3
1
Second Sub heading1
Second Sub heading2
12. Report the complete HTML program with JavaScript code to display time in the CO U 3
popup message box every 60 seconds.
3
Develop the bootstrap code for the following buttons
CO
13. A 3
2
CO
14. Display the array elements in HTML list format using AngularJS ng-repeat. R 3
5
CO
15. Differentiate between PHP sessions and cookies with suitable example snippet U 3
4
Develop the following output using the AngularJS filter.
CO
16. A 3
6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Develop an online registration form using HTML and CSS as given below
with the necessary attributes to make all fields mandatory.
CO
17. A 12
1
Develop an HTML web page with appropriate JavaScript per the following
design and read the value of A and B, then automatically display the sum of A
and B in the result text box. CO
18. a. A 6
3
b Describe any five JavaScript document object model methods with example CO U 6
. programs. 3
Develop a web page with a DIV element and apply the following styling
effects using internal CSS.
(i) Set the background image for the DIV element
(ii) Set the font colour as yellow for the DIV element CO
20.
(iii) Set the DIV border as solid and orange color A 12
2
(iv) Display the text on the right
(v) Set the space between the border and content as 40px for the DIV element.
(vi) Set the width and height of DIV as 300px.
CO
21. a. A 6
1
CO
22 A 12
3
23. Construct the following HTML form and store the obtained form data in the CO A 12
MySQL database on the next page using PHP database connectivity. Also, 4
display the inserted data on the next page.
COMPULSORY QUESTION
Develop a webpage using HTML, and Angular JS Routing for your job portal
website as per your choice with the following pages
a. Main HTML program with Angular JS routing
b. Hyper-Links
Candidate1 CO
24.
Candidate2
A 12
6
Candidate3
Candidate4
Candidate5
COURSE OUTCOMES
CO1 Select appropriate design standards for designing attractive web pages.
CO2 Identify the latest client and server-side technologies for creating interactive data driven websites.
CO3 Apply properties and methods which facilitate dynamic application development.
CO4 Model dynamic web applications using suitable server-side technologies integrated with the
database.
CO5 Create fully functional web applications that incorporate planning, designing, coding, testing, and
publishing to a web server.
CO6 Attach rich interactive features for web applications using MVC based framework.
Q.
B Mark
No Questions CO
L s
.
PART – A (20X1=20 MARKS)
1. Define Program. CO5 R 1
2. What is NIU? CO3 R 1
3. What do you mean by two state devices? CO2 R 1
4. Which organization has evolved a standard code to represent characters
CO2 R 1
to be stored and processed by computers?
5. Covert the binary number 11111 into decimal number. CO4 E 1
6. Which notation is a more concise numerical representation? CO1 R 1
7. What is TIFF? CO5 R 1
8. Find the decimal value of the binary fraction 0.1011. CO2 A 1
9. Write the base for hexadecimal system? CO2 U 1
10. How many bytes of memory are required for a 1 minute telephone
message has to be stored? (Hint: Consider the no. of samples per CO2 A 1
second is 6700).
11. How many 2 mins songs can be stored in a 32 MB storage device?
CO2 A 1
Consider the memory need for 2 mins of song is 2.52 MB.
12. Write the Nyquist theorem. CO5 A 1
13. Define Analog signal. CO4 R 1
14. Which is used to fabricate DRAM? CO3 U 1
15. ROM uses semiconductor memory cells which can be permanently
CO3 E 1
placed in one of two states 0 or 1. Name the process.
16. Expand MIDI. CO5 R 1
17. What is the program which allows entering text using keyboard? CO3 U 1
18. What assists users to carryout operations of creating, storing, accessing,
CO5 U 1
editing, updating and querying a database?
19. What is DTP? CO5 R 1
20. Name the component which is used to create visually pleasing display
CO4 U 1
of documents on the computer connected to internet.
PART – B (10 X 5 = 50 MARKS)
(Answer any 10 from the following)
21. Sketch the functionality of MP3 music system. CO1 E 5
22. Find the hexadecimal representation of decimal numbers from 0 to 11. CO2 R 5
23. List down the different image file formats along with their applications
CO2 U 5
and advantages.
24. Find the number of bits used to represent the amplitude of telephone
CO1 R 5
conversations.
25. Diagrammatically portray the connection between PCs/LANs and
CO3 U 5
telephone lines.
26. Identify the different functions of operating system. CO5 R 5
27. Schematically portray the interconnection of CPU with memory and
CO3 R 5
I/O units.
28. Illustrate the classification of programming languages based on
CO3 U 5
applications.
29. How does the memory cell work? CO3 R 5
30. Show the different types of graphic processing? List out their
CO5 R 5
objectives and applications.
31. Outline the use of spreadsheets. CO5 R 5
32. Explain the generation of audio output. CO2 An 5
PART – C (2 X 15 = 30 MARKS)
(Answer any 2 from the following)
33. a. Explain the procedure to be followed to capture a moving scene
CO2 U 5
with a video camera.
b. Elaborate the fundamentals of image compression with
CO2 U 10
examples
34. Elucidate the different types of computer networks and their
CO5 U 15
applications.
35. List and explain the various physical devices that are used as
CO3 R 15
memory cells.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 The student will be able to classify different forms of data.
CO2 The student will be able to acquire different forms of data.
CO3 The student will be able to analyze the working of hardware and software.
CO4 The student will be able to organize the data.
CO5 The student will be able to work on technologies related to multimedia and Internet.
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. Identify the number of bytes reserved for a float variable in windows 64- CO1 R 1
bit applications.
2. Locate the invalid variable(s) in the following declarations. CO1 R 1
int number;
float if;
int variable_count;
int $main;
3. Define an Algorithm. CO2 R 1
4. Name different types of operators that are included in C. CO2 R 1
5. Identify the unconditional branching statement that terminates the CO3 U 1
execution of a loop.
6. State the syntax of the switch statement. CO3 R 1
7. List the two ways a string can be declared. CO4 R 1
8. Identify the value of num[6] from the below line of code CO4 U 1
int num[]={9,6,4,2,3,5,1,7,8};
9. Define recursion in C. CO5 R 1
10. Predict the output for the following code. CO6 U 1
char a[20]="Program";
printf("Length of string a = %d \n",strlen(a));
PART – B (6 X 3 = 18 MARKS)
11. Describe the phases of the software development life cycle (SDLC). CO1 U 3
12. Discuss the order of precedence in C and predict the output of the CO2 U 3
program.
#include<stdio.h>
int main()
{
float s=100, u=10, t=4, a;
a = 2*(s-u*t);
printf("Result = %f", a);
return 0;
}
13. Write a simple program to find whether a number is positive or negative. CO3 A 3
14. Explain the Bubble Sort algorithm with an example. CO4 U 3
15. Describe a function prototype along with its syntax. CO5 U 3
16. Develop an application in C programming to store 5 customer names and CO6 A 3
phone numbers using structures.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No 17 to 23, Q. No 24 is Compulsory)
17. a. Explain the structure of a C program along with its features and CO1 U 4
syntax.
b. Draw a flowchart to find the area of the square by getting the value CO1 U 8
from the user. Convert the flow chart into an algorithm and develop
the program for the same.
19. a. Develop a function to count the digits of a number and use it to CO5 A 9
check whether the given number is an Armstrong number or not.
b. Differentiate between a while loop and a for a loop. CO3 U 3
21. a. Describe structures in the C program and explain how the structure CO6 U 6
variables are declared and initialized.
b. Using functions, write a C program to find the even numbers from an CO5 A 6
integer array.
23. a. Develop a C program to swap two numbers using the call-by address CO6 A 8
(pointers or reference) method.
b. Compare and contrast Structures with Arrays. CO6 U 4
COMPULSORY QUESTION
24. a.Develop a C program to find the factorial of a given number using CO5 A 6
the recursion function.
b. Write the C program for linear search to search for the number 9 CO4 A 6
from the given set of numbers 10, 30, 5, 20, 9, 8, and also illustrate
the various steps.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development process.
CO2 Identify the data type to represent the real time data representation and operators for
computation.
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using the divide and
conquer approach.
CO5 Formulate algorithms and programs using arrays, pointers, and structures.
CO6 Create a new application software to solve real-world problems.
Q. B Mark
Questions CO
No. L s
PART – A (20 X 1 = 20 MARKS)
CO
1. Variables defined inside a function are called ___________. R 1
1
Variables common to all functions in a program are known as CO
2. R 1
___________. 1
CO
3. R 1
C language was invented by____________, 1
CO
4. R 1
Define ANSI. 1
CO
5. R 1
___________ qualifier is used to define a constant in C language. 1
CO
6. R 1
Give an example of integer constant. 1
CO
7. R 1
Give an example of character constant. 1
CO
8. R 1
___________ is the format specifier used for float. 1
CO
9. R 1
__________ is the format specifier used for string. 1
CO
10. R 1
List any two examples of arithmetic operator. 1
CO
11. R 1
Give two examples of relational operator. 1
CO
12. An 1
Differentiate = operator and == operator. 1
CO
13. R 1
What is a conditional operator? 1
CO
14. R 1
___________ is the size of the integer variable. 1
CO
15. R 1
Define compiler. 1
CO
16. R 1
Define operating system. 1
CO
17. R 1
List any two rules of a variable. 1
CO
18. R 1
Name any one decision control statement. 1
19. Define an array. CO R 1
1
CO
20. R 1
List any two usage of function. 5
PART – B (10 X 5 = 50 MARKS)
(Answer any 10 from the following)
CO
21. Discuss about the different data types in c programming. U 5
2
CO
22. Explain about the various types of constants. U 5
2
CO
23. Classify the different types of storage classes. U 5
2
CO
24. Differentiate break and continue statement with suitable example. An 5
2
CO
25. Develop a c program to find whether the given number is odd or even. C 5
3
CO
26. Report on switch case statement with suitable examples. U 5
2
CO
27. List any five string functions with suitable examples. R 5
2
CO
28. Develop a c program to find the greatest of n number using array. C 5
4
CO
29. Compare and contrast the structure and union. An 5
2
Develop a c program to create a structure for employee details (eno, name, CO
30. C 5
salary) and access the same. 6
List any five applications of computer in the real world and explain the CO
31. R 5
same. 6
CO
32. Define recursion. Demonstrate factorial using recursion. A 5
6
PART – C (2 X 15 = 30 MARKS)
(Answer any 2 from the following)
CO
33. a. Discuss about the different classification of computer. U 8
2
CO
b. Describe about the various generation of computer. U 7
2
CO
34. a. Explain about the different types of operators. U 8
2
Discuss about the following statements.
i) If CO
b. U 7
ii) If-else 4
iii) Nested if
COURSE OUTCOMES
CO1 Understand the fundamental principles of programming.
CO2 Gain knowledge on the concepts of structured programming.
CO3 Understand logics of solving problems.
CO4 Solve problems using basic programming techniques.
CO5 Apply programming to solve real world problems.
CO6 Illustrate the role of programming in real life scenarios.
Q. CO
Questions BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. Define Cipher. CO1 R 1
2. The term which refers to the operation that each plaintext element or
group of elements is uniquely replaced by a corresponding cipher text CO1 U 1
element or group of elements is__________
3. Define primitive root modulo. CO2 R 1
4. Find the plain text ‘M’ when you intercept the cipher text C as 11 being
sent to a user whose public key is e =3, n=33 in a public key system using CO2 A 1
RSA.
5. Expand HMAC. CO3 A 1
6. Mention the difference between a Hash and MAC function CO3 A 1
7. List any fields in X.509 certificate. CO4 A 1
8. Write the use of authentication server. CO4 R 1
9. _________ protocol is used for the purpose of copying the pending state
CO5 U 1
into the current state.
10. List the types of firewall. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Define active and passive attacks. CO1 R 3
12. List any three symmetric key encryption techniques. CO2 U 3
13. List out the requirements of a Hash Function. CO3 U 3
14. Write short notes on Kerberos Realm. CO4 A 3
15. Draw the format of X.509 certificate. CO5 R 3
16. Sketch the packet format of encapsulating security payload in IP CO6 U 3
security.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23)
17. a. Elaborate the data encryption standard with a neat sketch. CO1 R 12
18. a. Analyze the rules related to the Rivest Shamir Adleman CO2 An 6
(RSA) algorithm with clear depiction of both encryption and
decryption algorithm.
b. Interpret the Elliptic Curve Cryptography based on Diffie CO2 A 6
Hellman public key cryptosystem.
19. a. Explain the ElGamal public key algorithm and give proof of CO2 U 6
its correctness during encryption and decryption.
b. Describe the Diffie Hellman key exchange algorithm with CO2 A 6
examples.
20. a. Explain the process of creating a digital signature with an CO3 U 12
example.
23. a. Describe the operations involved in pretty good privacy and CO5 U 8
explain it.
b. Discuss on PGP key rings. CO5 R 4
COMPULSORY:
24. a. Explain Intrusion Detection System with suitable diagram. CO6 U 7
b. List the types of firewall and explain it. CO6 R 5
COURSE OUTCOMES
CO1 summarize the computer security concepts and their needs.
CO2 apply the various symmetric and asymmetric key algorithms.
CO3 experiment with the various principles of cryptosystems, hashing algorithms and digital signatures
CO4 recognize the importance of network security.
CO5 evaluate network and internet security.
CO6 explain the different types of virus/worms & firewalls
Assessment Pattern as per Bloom’s Taxonomy
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 16 1 13 - - - 30
CO2 1 9 13 6 - - 29
CO3 - 25 2 - - - 27
CO4 7 6 - - - - 13
CO5 7 9 - - - - 16
CO6 6 10 - - - - 10
125
Course Code 18CS2005 Duration 3hrs
Max.
Course Name CRYPTOGRAPHY AND NETWORK SECURITY 100
Marks
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Give example of an encryption algorithm of multiple letters. CO1 U 1
2. State the author of the idea of substitution-permutation (S-P) networks. CO1 R 1
Name the cryptosystem is used in some form in several standards
3. including the digital signature standard (DSS) and the S/MIME e-mail CO2 An 1
standard.
4. Define order of a point G in an elliptic curve. CO2 A 1
5. Recall the solutions provided by the process of message authentication. CO3 R 1
6. Illustrate the DSA approach for digital signing. CO3 A 1
7. Define Subject unique identifier in an X.509 certificate. CO4 R 1
8. Describe the basic requirements of Kerberos. CO4 U 1
9. Examine the applications of IPSec. CO5 A 1
10. Show approaches to intrusion detection. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Define encryption and decryption. CO1 R 3
12. Calculate the value of ‘p’ & ‘q’ in RSA algorithm given n=3397. CO2 A 3
13. Analyze the requirements of hash functions. CO3 An 3
Illustrate simple secret key management architecture proposed by
14. CO4 U 3
Merkle.
15. Explain the content types of S/MIME messages. CO5 R 3
16. List the classes of intruders. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Recall the security attacks, OSI security and the security
17. a. CO1 R 6
mechanisms to counter the attacks.
b Explain a single round of Data Encryption Standard with an
CO2 A 6
. analysis of the number of rounds, its strength and weakness.
Summarize the key management and key distribution issues and
18. CO4 U 12
techniques for both symmetric and asymmetric keys.
Explain the Elliptic Curve based algorithm with the analysis of the
20. CO1 U 12
encryption and decryption process.
COURSE OUTCOMES
CO1 Summarize the computer security concepts and their needs.
CO2 Apply the various symmetric and asymmetric key algorithms.
CO3 Experiment with the various principles of cryptosystems, hashing algorithms and
CO4 Recognize the importance of network security.
CO5 Evaluate network and internet security.
CO6 Explain the different types of virus/worms & firewalls.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the applications of DBMS. CO1 U 1
2. List various users of DBMS and specify the roles. CO1 R 1
3. State the syntax for GROUPBY Clause. CO2 R 1
4. Recall the various DDL commands. CO2 R 1
5. List the extended features of ERD. CO3 R 1
6. Give examples on weak entity. CO3 U 1
7. Differentiate primary index and secondary index. CO4 U 1
8. List the types of file organization. CO4 R 1
9. Identify the transformation tools used in the data warehouse. CO5 U 1
10. Trace the precedence graph for the process A-B-C-A. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Analyze the following Relational Database. Student (roll_no,
name,city,marks,c_no) Course (c_no,cname,fees) Construct Queries
into Relational algebra.
CO1 An 3
a) List Student Details enrolled for ‘MBA’ Course.
b) List the Course having fees < 20000
c) Display all students living in either ‘Chennai’ or ‘Coimbatore’ city.
12. Represent the query for the following table. Doctor (dno,
dname,address,dcity) Hospital (hno,hname,street,hcity) Dochosp
(dno,hno,date)
CO2 U 3
a) Find hospital names to which ‘Dr. Metilda’ has visited.
b) Find out all the doctors who have visited hospitals in the same city.
c) List all the doctors who visited ‘David’ on ‘01-02-2023’.
13. Identify the normal form of the following relation: R (A, B, C, D, E)
The primary key of the relation is AB. The following functional
dependencies hold:
A→C CO3 U 3
B→D
AB → E.
14. Differentiate between static and dynamic hashing. CO4 R 3
15. Compare OLTP and OLAP Systems CO5 An 3
16. Identify whether the following list of events in an interleaved execution
of set T1, T2, T3 and T4 assuming 2PL is having deadlock. If yes,
which transaction are involved in Deadlock?
18. Interpret the queries for the following entities and relationships.
Item (I_no, I_name, I_qty) Po (P_no, P_date) Supplier (S_no,
S_name, S_addr) Item and Po are related with one-to-many
relationships along with descriptive cost and quantity. Supplier and
Po are related with one-to-many relationships.
i. Insert a row in Item table.
ii. List the name of supplier to whom Pois given for
“mouse”.
iii. List the name of supplier and item_name in Po’s CO2 A 12
generated on “30-sep-2009”.
iv. List the names of suppliers who is going to supply
“monitor” with minimum cost.
v. Find out Po number, Po date and supplier name of the
Po which is of maximum amount.
Display all Po which contains the number, date, supplier name of
the Po details of all items included in that i.e. name of item, qty and
rate.
22. Explain how multilevel indexes are constructed using B trees and
CO4 An 12
B+ trees.
COURSE OUTCOMES
CO1 Recognize the role of database administrator and database management systems in software
applications and other advanced concepts.
CO2 Use query language to retrieve data efficiently from the database.
CO3 Design the database for given specification of the requirement design the databases using ER
method and normalization.
CO4 Design and implement significant database objects such as file structures and index schemes.
CO5 Describe techniques for transaction processing and concurrency control.
CO6 Implement security in database.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Identify the type of machine learning approach involved in the
1. following problem statement: CO1 R 1
“Predicting the maximum allowed loan amount for the customer”.
2. Define Version Space. CO1 U 1
State the mathematical representation of sigmoid function in logistic
3. CO2 R 1
regression.
4. Define Over-fitting. CO2 U 1
Determine the probabilistic machine learning algorithm used for the
5. CO3 A 1
classification problem.
Identify the type of Machine learning model used to estimate the
6. CO3 R 1
amount of crop yield based on the temperature, humidity and sun shine.
Assume 2 cluster centroids: C1 = {9,9} and C2 = {2,2} in K-means
7. clustering algorithm. Determine the cluster to which the new data point CO4 A 1
(5,5) belongs to.
8. Differentiate Agglomerative and Divisive clustering. CO4 An 1
9. Distinguish between classification and regression tree. CO5 U 1
10. Outline the benefits of cross validation. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Apply data smoothing by bin means and bin boundaries with the bucket
11. size of 3 to remove the noisy data for the following data CO1 A 3
4, 8, 15, 21, 21, 24, 25, 28, 34, 36, 37, 42
Analyze the given confusion matrix and calculate recall and specificity.
Predicted Class
12. Actual Fresh Not fresh CO2 An 3
Class Fresh 164 33
Not Fresh 37 522
Calculate the nearest neighbor using the Euclidean distance between
13. CO3 A 3
two points A and B: A[3,4], B[7,8].
Consider SOM network with three input and two output nodes. If the
weight vectors are w1 = (0.8, 0.7, −0.9), w2 = (0.9, 0.8, 0.9), calculate
14. CO4 A 3
the distance and find the winning neuron if the input vector X = (0.3, -
0.4, 0.6) is applied.
15. Express the impurity measure used in CART approach. CO5 U 3
16. Differentiate random forest and decision tree with an example. CO6 An 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the various geometric and probabilistic models in detail
CO1 U 6
with suitable examples.
b Summarize the various techniques for feature construction and
CO1 U 6
. transformation with examples.
19. a. Calculate the TPR and FPR for the thresholds 0.8, 0.7, 0.6, 0.55,
0.54 and plot ROC curve for the calculated values.
20. a. Apply perceptron learning algorithm for the given AND gate and CO3 A 6
update the weights for one iteration. Initial weights are W1=0.3,
W2=0, threshold=0.2 and the learning rate is 0.1.
b Analyze the probabilities obtained from linear classifiers using
CO3 An 6
. kernel methods of nonlinearity
22. a. Apply decision tree algorithm on the following dataset and identify
the root node of the tree. (Note: Input attributes: Outlook,
Temperature, Humidity and Windy, Output attribute: Play)
Day Weather Temperature Humidity Wind Play
1 Sunny Hot High Weak No
2 Cloudy Hot High Weak Yes
3 Sunny Mild Normal Strong Yes
CO5 A 6
4 Cloudy Mild High Strong Yes
5 Rainy Mild High Strong No
6 Rainy Cool Normal Strong No
7 Rainy Mild High Weak Yes
8 Sunny Hot High Strong No
9 Cloudy Hot Normal Weak Yes
10 Rainy Mild High Strong No
b Apply regression tree algorithm on the following dataset and CO5 A 6
. identify the root node of the tree. (Note: Input attributes: Outlook,
Temperature and Windy, Output attribute: Players) - Two problems
in Q23
23. a. Explain random forest algorithm and illustrate how random forest is
CO6 U 6
applicable for both continuous and categorical target variable.
b Analyze how deep learning can better assist doctors in predicting
CO6 An 6
. the diseases.
COMPULSORY QUESTION
24. a. Differentiate bagging and boosting and explain the different
CO6 An 6
algorithms applied for bagging and boosting?
b
CO6 U 6
. Discuss Reinforcement learning with its applications.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe the concepts, mathematical background, applicability, limitations of existing machine
learning techniques.
CO2 Identify the performance evaluation criteria of the model developed.
CO3 Analyze and design various machine learning based applications with a modern outlook focusing on
recent advances.
CO4 Build the learning model for a given task.
CO5 Apply some state-of-the-art development frameworks and software libraries for implementation.
CO6 Evaluate the performance of machine learning algorithms using suitable metrics.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Predict the output for the following C++ program.
include<iostream>
using namespace std;
int main()
{
int x = 2;
int y = 3;
CO1 U 1
while(x <= 5)
{
cout<< y++ << " ";
}
cout<< x;
return 0;
}
Mention the technique that provides a way to break complicated
2. CO1 R 1
problems down into simple problems which are easier to solve.
3. Write down the syntax to create object in Java. CO2 U 1
4. Predict the output of the following code
class Simple{
public static void main(String args[]){
int a=2, b=5;
CO2 U 1
int res=(a<b)?a:b;
System.out.println(res);
}
}
5. Identify the use of super() with constructor. CO4 U 1
6. List the various access specifiers for Java classes. CO3 R 1
Is it compulsory for a try block to be followed by a catch block in Java
7. CO4 U 1
for exception handling?
8. List out any two checked exceptions in Java. CO4 R 1
9. List any two classes that supports character stream to do I/O operations. CO5 R 1
10. Read the following code and answer the question that follow: CO5 U 1
String str="Green World, Clean World";
int len=str.length();
int remain=100-len;
jTextField1.setText(str.toUpperCase());
jTextField2.setText(Integer.toString(remain)+" more characters can be
entered");
Predict the output displayed in text fields named jTextField1 and
jTextField2 after running the above code.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate while loop and do while loop with sample code. CO1 U 3
Write a C++ program that displays a decimal number in reverse order.
12. CO1 U 3
(Ex. If the number is 34521, output expected is 12543)
There are two classes named classA and classB. Both classes are in the
13. same package. Can a private member of classA can be accessed by an CO3 U 3
object of class B?
In a class implementing an interface, can we change the value of any
14. CO4 U 3
variable defined in the interface?
15. List the two ways of implementing multi-threading in Java. CO4 R 3
16. Discuss any three points to exhibit the need of design patterns. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the arithmetic, relational and bitwise operators with
17. a. CO1 U 10
necessary example programs in C++.
b Write C++ program on swapping of two variables without using
CO1 A 2
. temporary variable.
19. a. Create a class to represent food items in a Hotel with the following
members, food code, price, quantity, and discount, also define
Member functions to read the data, print and find the total bill CO2 A 6
amount. Develop a java program in order to create an object and
access all those member functions.
b Suppose you have to perform addition of the given numbers but
. there can be any number of arguments, if you write the method
such as a(int,int) for two parameters, and b(int,int,int) for three
parameters then it may be difficult for you as well as other CO2 A 6
programmers to understand the behavior of the method because its
name differs. So, we perform method overloading. Discuss the
same with example program.
20. a. Write a program in java to store the given N numbers in an array CO2 U 6
and perform the following operations.
(i) Find and display the average
(ii) Search the given number in the array and display.
“Available” if it exists and “Not Available” if it does not exist.
b Develop a java program to design a class for “Smartphone” with
. model_name, year, cost as data members. Include constructors and
setter/getter methods. Add another class “Main” which creates two CO2 A 6
objects, initialize the data members and display the details through
getter methods.
22. a. Develop a Java program that enters an 8-digit string for a birthdate.
The first two digits in the string are the months of birth, the next
two are the day and the remaining four are the year. The Java
program should squeeze out these substrings and calculate the CO4 A 6
current age. Raise a ‘negative_age’ exception if the calculated age
is negative.
(Hint: Approximately print the differences in years)
b
Explain the various ways of creating threads in Java. CO4 U 6
.
Discuss any four Layout Managers with neat sketch and suitable
23. CO5 U 12
sample programs.
COMPULSORY QUESTION
24. a. Differentiate method overloading and method overriding. CO4 U 2
b Develop GUI program for Dollar to Rupee Convertor using Java
. Swing API as given below. CO5 A 10
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Define the object-oriented programming concepts.
CO2 Select the relevant object-oriented concepts to implement a real time application with design
patterns.
CO3 Demonstrate the application of polymorphism in various ways.
CO4 Illustrate the use of inheritance, exceptions, generics and collection.
CO5 Develop applications with event-driven graphical user interface and file management.
CO6 Describe software development process.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Write down the features of C++. CO1 U 1
2. List out the disadvantage of using arrays in C++. CO1 U 1
3. List any two features of Java. CO2 R 1
4. Write the expansion of JRE and JDK. CO2 R 1
Identify the access specifier used to make the super class data
5. CO3 R 1
accessible to all classes from different package.
6. Cite the benefits of Inheritance. CO3 U 1
7. List out five keywords that are used to handle the exception. CO4 R 1
Trace out the difference between method overloading and method
8. CO4 R 1
overriding.
Which stream is used to output all the error data that a program might
9. CO5 U 1
throw, on a computer screen or any standard output device?
Identify the method that is used to fill oval with the default color and
10. CO5 R 1
specified width and height.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Write C++ program using arrays concept:
-Create an array with size 5.
11. CO1 U 3
-Read the input N from the user and store it one by one.
-Print the values in screen that are stored in Array.
Develop java program to swap two variables without using third
12. CO2 A 3
variable.
Construct a class with a method that prints "This is parent class" and its
subclass with another method that prints "This is child class". Now,
create an object for each of the class and call
13. CO3 A 3
1 - method of parent class by object of parent class
2 - method of child class by object of child class
3 - method of parent class by object of child class
Discuss how can we restrict inheritance for a class so that no class can
14. CO3 U 3
be inherited from it.
15. In multi-threading how can we ensure that a resource isn’t used by CO4 U 3
multiple threads simultaneously?
16. Differentiate Byte Streams and Character Streams. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the various selection and iteration control statements with
17. CO1 U 12
sample code in C++.
22. a. Discuss the different graphics class methods and draw the various CO5 U 6
shapes using drawString, drawOval and drawArc method.
b Explain the stages in software development process with neat
CO6 U 6
. diagram.
Discuss any four Layout Managers with neat sketch and suitable
23. CO5 U 12
sample programs.
COMPULSORY QUESTION
Design a Java swing GUI application for the Login functionality as
per the sample design given below. Show a message box “Login
Successful” if username and password is “karunya”, otherwise
show a message box “Login Failed”.
24. CO5 A 12
COURSE OUTCOMES
CO1 Define the object-oriented programming concepts.
CO2 Select the relevant object-oriented concepts to implement a real time application with design patterns.
CO3 Demonstrate the application of polymorphism in various ways.
CO4 Illustrate the use of inheritance, exceptions, generics and collection.
CO5 Develop applications with event-driven graphical user interface and file management.
CO6 Describe software development process.
Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List any two evolutionary process models. CO1 R 1
2. Quote the process model that is least adaptable to changing client needs. CO1 U 1
3. Identify the qualitative measure of the degree to which classes are related CO2 R 1
to one another while designing the software.
4. Recognize the object-oriented paradigm to aid with code reuse. CO2 R 1
5. Name the language that describes the syntax and the semantics of an CO4 R 1
architectural design.
6. Create a formula for calculating a software product's fault density. CO5 U 1
7. Determine the testing that must be performed on the product in CO5 U 1
comparison to previous test cases during the maintenance phase.
8. List the three factors that may affect the software quality. CO6 R 1
9. Enumerate the three approaches used to manage the software project in the CO6 R 1
COCOMO estimation model.
10. State the five CMMI maturity levels. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Quote the principles of agile process model. CO1 R 3
12. Differentiate functional and non-functional requirements in a software CO2 U 3
project.
13. Describe CRC modeling with an example. CO3 R 3
14. Distinguish between verification and validation. CO4 U 3
15. Define version control in Software Configuration Management. CO5 R 3
16. List the elements of Software Process Improvement framework. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe a scenario where waterfall model would be applied and not CO1 An 6
the RAD model.
b. List the problems faced in a project while following waterfall CO1 U 6
software process model.
19. a. Explain the commonly used architectural styles for software that are CO3 R 12
built for computer-based systems with neat diagrams.
20. Write the test cases for the following modules according to the software
testing paradigm.
a. Login CO4 A 4
b. Forms with various fields CO4 A 4
c. Application interacts with database CO4 A 4
22. a. Analyze the following scenario and draw the class diagram. “An CO2 An 12
online car and car parts store that has listings of various cars along
with their features. It also consists of car parts and accessories. The
project allows users to buy car and car inventory online. It allows
users to check various car status including car engine, mileage, tank
capacity and other factors. Credit card payment facility is also
available for buying car parts. Car booking system has other methods
for booking and registration and even for a test drive registration”.
The project features:
Visitor Registration/ Login module.
User may check various cars listing with features and
inventory parts.
User may select and add products to shopping cart.
Credit card payment option for car parts shopping.
Test drive booking registration.
Car loan facilities.
23. a. Recall the main objectives of reviews and discuss the players involve CO3 R 12
in a review meeting.
COMPULSORY QUESTION
24. a. Explain the process of risk mitigation, monitoring and management. CO6 R 6
b. Distinguish between FP based and LOC based estimation techniques. CO6 R 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Discover an effective software engineering process to develop software-intensive systems.
CO2 Translate the requirements specification into an implementable design.
CO3 Construct UML diagrams along with design strategies and design patterns.
CO4 Analyze architectural design methods.
CO5 Evaluate the system using various testing strategies.
CO6 Develop the software system with quality measures.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Enumerate the functions of linkage editor. CO1 U 1
2. Compare and contrast single pass and two pass assembler. CO1 U 1
3. Define "interpreter." CO1 R 1
4. Recall the regular definition for floating-point numbers. CO2 R 1
5. Enumerate the disadvantages of the top-down parser. CO3 R 1
6. Define handle. CO3 R 1
7. When is a “syntax directed definition” said to be “circular”? CO4 R 1
8. Show the dependency graph for the declaration statements. CO4 U 1
9. Define activation life time of a procedure. CO5 R 1
10. What is meant by ‘NEXT-USE’ of a variable? CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Schematically represent the language processing system. CO2 U 3
12. Write a LEX program to identify the even binary strings. CO3 A 3
Write a YACC program to solve the given productions.
13. S -> aA | a CO3 A 3
A -> aA | b
14. When does a grammar identified as non L attributed? CO4 A 3
15. Illustrate the different types of attributes with necessary examples. CO5 U 3
16. What is dangling reference? When does it occur? CO6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
What is forward referencing? How is it handled while translating an
17. a. CO1 R 6
assembly language program?
Explain the working principle of a macro processor. List the types of
b. CO1 U 6
macro substitution.
18. Explain the various phases of a compiler in detail. Also, show the CO2 U 12
step-by-step translation of the statement "peri = 2* ( length +
breadth )" through the phases of the compiler to attain target
language.
Construct a predictive parsing table and parse the string ~(0||1) for the
given grammar.
19. be ->be || bt | bt CO3 A 12
bt ->bt && bf | bf
bf ->~bf| (be) | 0 | 1
Summarize with relevant examples
i) S-attributed definition for evaluating an arithmetic
20. a. CO4 U 6
expression.
ii) L-attributed definition for declaration of variables.
Explain in detail the concepts involved in different storage allocation
b. CO4 U 6
techniques.
Transform the expression "a = a + b * c – b * c / d into the following
representations:
i) Syntax Tree
ii) Directed Acyclic Graph
21. CO5 U 12
iii) Quadruple
iv) Triple
v) Indirect triple
vi) Postfix Expression
Construct a CLR parsing table for the following grammar and parse
the string “abb”
22. CO3 A 12
S -> CC
C -> aC | b
Construct a minimum state DFA directly for the regular expression
23. (0|1)*011 by constructing the syntax tree and finding firstpos(), CO2 A 12
lastpos() and followpos().
COMPULSORY QUESTION
24. a. Enumerate the challenges during code generation. CO6 U 4
b. Illustrate code optimization with necessary examples. CO6 U 8
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Explain algorithm and data structures for assembler.
CO2 Develop algorithms for macros and loaders.
CO3 List and define various stages of compiler.
CO4 Select and use standard tools and techniques in different stages of compiler design.
CO5 Compare and contrast various methods for implementing the phases of a compiler.
CO6 Design and construct different phases of the compiler.
Assessment Pattern as per Bloom’s Taxonomy
CO / P R U A An E C Total
CO1 7 8 - - - - 15
CO2 1 15 12 - - - 28
CO3 2 - 30 - - - 32
CO4 1 13 3 - - - 17
CO5 1 15 - - - - 16
CO6 1 12 3 - - - 16
124
SUPPLEMENTARY EXAMINATION – JUNE 2023
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Differentiate loading and linking. CO1 U 1
2. Compare and contrast an interpreter and a compiler. CO1 U 1
3. Define lexeme. CO2 R 1
4. Enumerate viable prefix property. CO2 R 1
5. State the conflicts of shift reduce parser. CO3 R 1
6. Define handle pruning. CO3 R 1
7. Give the quadruple for the expression t2 = b * t1. CO4 U 1
8. Draw the parse tree for the production E -> E1 + T. CO4 R 1
9. Define activation record. CO5 R 1
10. Give an example of algebraic identity. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Illustrate the use of a symbol table. CO1 U 3
Write a LEX program to identify the strings represented by the pattern (0|
12. CO2 A 3
1)*011.
13. Define panic mode error recovery. CO3 R 3
14. Construct an annotated parse tree for the input expression: 3*5+4a CO4 A 3
Give the syntax-directed definition for if-else statement to perform type
15. CO5 U 3
checking.
Construct the DAG for the basic block:
a=b+c
16. b=a-d CO6 A 3
c=b+c
d=a-d
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe the working principle of a simple bootstrap loader. CO2 R 6
Explain the basic assembler functions with a suitable SIC assembler
b. CO1 U 6
language program.
19. a. Construct a predictive parsing table for the grammar. Verify whether CO4 A 12
the input string id + id*id is accepted or not.
E->TE’
E’->+TE/€
T->FT’
T’->*FT’/€
F->(E)/id
Construct the DFA r=ba(a/b)*ab. Draw the parse tree and calculate
23. a. CO4 A 12
the first and last position of each state.
COMPULSORY QUESTION
Explain the issues in the design of a code generator with necessary
24. a. CO6 A 12
examples.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 explain algorithm and data structures for assembler
CO2 develop algorithms for macros and loaders
CO3 list and define various stages of compiler
CO4 select and use standard tools and techniques in different stages of compiler design
CO5 compare and contrast various methods for implementing the phases of a compiler
CO6 design and construct different phases of the compiler
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
M = (Q, ∑,δ, q0,F), where Q= {q0, q1, q2, q3}, ∑ = {a,b} and F = q0,
𝛿
δ is defined as:
a b
1. →*q0 q2 q1
q1 q3 q0
q2 q0 q3
q3 q1 q2
Check the input “aaba” is accepted or not. CO1 U 1
2. If ∑ = {p,q} then find ∑2? CO1 U 1
Write a regular expression for the set of all strings a’s and b’s ending
3.
with “ab” CO2 A 1
4. Construct a DFA for the set of all strings over ∑ = {0,1} with length 2. CO2 A 1
5. Derive the string “aaaaabbbbb” from the productions SaSb | ϵ. CO3 A 1
Use the given grammar to derive the parse tree for the string “a+b”
6. E→ I | E+E | E*E | (E)
I→a | b CO3 U 1
Eliminate ε – production for the following grammar.
7. S→aaS |aS | ε
A → bA | ε CO4 A 1
8. List the types of Normal Forms based on Context Free Grammar. CO4 R 1
9. Identify the language for the problem whose language is recursive. CO5 U 1
State the name of the machine that accepts Recursively Enumerable
10.
language. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Describe Chomsky hierarchy with neat diagram. CO1 R 3
18. a. Convert the following DFA to a regular expression, using the state CO2 A 6
elimination technique.
19. a. Convert the given Right Linear Grammar to Finite Automata CO3 A 6
S→ aS | aA| aB
A→ aA|a
B→ bA|b
b Change the below Automata to Left Linear Grammar. CO3 A 6
.
20. a. Apply pumping lemma to prove that the given language is not CO4 A 6
regular.
L={ai^3 | i>=1}.
b i) Prove If L is regular language, so is LR CO4 A 6
. ii) Given h(0) = abb and h(1)=ba. Apply Homomorphism for
h(1011).
22. a. Design a Turing Machine that computes a function f(n)=2n where n CO5 A 6
is the positive integer.
b Using CYK algorithm, find whether “0011“ is a member of the CO3 U 6
. language represented by the grammar:
S XY
X YY | 0
Y XY | 1
b Convert the grammar G = ({S, A, B, C}, {a, b}, S, P) with P defined CO3 A 6
. given as
S -> aSA
A -> bABC
B -> b
C -> ABC into Chomsky’s and Greibach Normal Forms.
COMPULSORY QUESTION
24. a. Illustrate the following with suitable example. CO6 U 8
Turing Machine with stay option
Turing Machine with semi-infinite tape
Multidimensional Turing Machine
Deterministic Turing Machine
b Describe the encoding process of Universal Turing Machine with CO6 U 4
. relevant examples.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 recall the concept of languages and the hierarchy of languages.
CO2 develop finite automata to accept a set of strings of a language.
CO3 classify the given language based on chomsky’s hierarchy.
CO4 construct context free grammars to generate strings of context free language.
CO5 determine equivalence of languages accepted by Push Down Automata and languages generated
by context free grammars
CO6 compare computability & non-computability and Decidability & Un-decidability.
Q. CO
Questions BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. Define the HTML syntax to display an image of size 100 X 150 in the CO1 R 1
webpage.
2. Define the use of<body> tag in HTML web page. CO1 R 1
3. State the CSS Selector that selects the HTML element by * symbol. CO6 R 1
4. Write the name of the tag which is used to embed CSS in html page. CO6 R 1
5. Define the HTML syntax used to attach the external JavaScript file in CO2 R 1
an HTML document.
6. Find the JavaScript function used to expire a function after a specific CO3 R 1
time.
7. Compare the PHP built-in functions require and include. CO4 U 1
8. Recall cookie. CO3 R 1
9. Mention the web technology used to achieve asynchronous server-side CO4 R 1
interaction.
10. Recall ng-repeat in AngularJS CO5 R 1
PART – B (6 X 3 = 18 MARKS)
11. Write CSS code to change the background and text color of the division
when the user moves the cursor over that division. CO2 A 3
12. Describe the HTML code to display the following content in a web CO1 U 3
page.
a. Breakfast
Dosa
b. Afternoon
Biryani.
13. Demonstrate the popup box functions in JavaScript with suitable CO3 U 3
examples.
14. A student class comprises data members such as Rollno and name. CO3 A 3
Initialize the data members through the constructor. Use a member
function display() to display the details of the student. Write PHP code
to create the object and print the details.
15. List any three types of AngularJS filter with its example. CO5 U 3
16. Explain the role of Bootstrap Grid System in responsive web design CO6 U 3
with an example.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Write a code for the following table layout using the HTML5 table CO1 A 6
tags and populate the rows to display the results of 3 students.
Every student is registered with 3 subjects
Student details
Personal details Subject details
Sl.No
Reg.No Name Code Name Grade
Web
18CS1001 A
Design
1 1234 XXX
18CS1002 Java A
18CS1003 C++ O
b. Explain all HTML5 form elements with example. CO1 An 6
18. a. Explain any 3 CSS Selectors with suitable program illustrations. CO6 A 6
b Explain the CSS box model with suitable HTML and CSS code. CO6 U 6
19. a. Design a HTML page as per the following and read the value of CO2 A 8
text boxes A and B using JavaScript and display the sum of A and
B in Result text box when user clicks the “Addition” button.
20. a. Explain the various document object model methods used to access CO3 U 12
the HTML elements in JavaScript with its example program.
22. a. Design an online registration form using HTML as given below CO1 A 12
with the necessary attributes to make all fields mandatory.
23. a. Explain the working of AJAX in detail with its architecture diagram CO3 An 12
COMPULSORY QUESTION
24 a. Design a dynamic shopping list by letting the user to add and CO5 A 8
remove the items using AngularJS directives. Get a new item value
from the user with text box and add it to the shopping list with cross
mark (x) on add button click. Also remove the item from the list
when the cross mark (x) is clicked.
COURSE OUTCOMES
CO1 identify the relevant properties and methods which facilitate dynamic application development.
CO2 explain the development of fully functional web applications that incorporates planning, designing,
coding, testing, and publishing to a web server.
CO3 apply the latest client and server-side technologies for creating interactive data-driven websites.
CO4 model dynamic web applications using suitable latest server-side technologies integrated with the
database.
CO5 formulate and build extensible web applications using the Model View Controller design pattern.
CO6 select appropriate design standards for designing attractive web pages.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. State the expansion of HTTP. CO1 R 1
2. Recognize an example for a Web Server. CO2 R 1
Indicate the HTML code to include an external CSS file in HTML
3. CO1 U 1
page.
4. Identify the CSS property to remove the underline from Hyperlink. CO6 R 1
Name the event triggered whenever the web page opened in the
5. CO3 R 1
browser.
Identify the javascript method used to call a function for every specified
6. CO3 R 1
milliseconds.
7. Visualize the php code to store your name in a variable. CO4 R 1
8. Give an example php code to illustrate ‘for’ loop statement. CO4 U 1
9. Illustrate php code to represent array of five data items. CO4 U 1
10. State the use of ng-model in angular js ________. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Prepare a XML document to represent a student details such as name,
11. CO1 U 3
regno, cgpa, gender, email and phone.
12. Illustrate ‘hover’ effect in CSS with an example HTML program. CO6 U 3
13. Indicate a javascript code to iterate the elements of an array variable. CO3 U 3
14. Illustrate a php code to check the number is even or odd. CO4 U 3
Describe any three super global variables in PHP with example code
15. CO2 U 3
snippets.
16. Give the proper angular js code to demonstrate ng-repeat directive. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Develop an online registration form using HTML as given below
CO1 A 12
with the necessary attributes to make all fields mandatory.
18. a. Discuss the various CSS Selectors with suitable example programs. CO6 U 6
b
CO6 A 6
. Illustrate the CSS positioning with appropriate code snippets.
19. a. Explain the six document object model methods in Javascript with
CO3 U 6
proper programs.
b Discuss all the CSS box model properties with proper HTML and
CO6 U 6
. CSS code snippets
CO3 A 12
CO3 A 6
23. a. Explain the following with respect to PHP with proper example
programs.
CO4 U 6
Cookies
Session Tracking and Authentication
b Illustrate an AJAX program to make asynchronous server
. interaction to populate the list of suggestions as per the given CO2 U 6
character input.
COMPULSORY QUESTION
24. a. Explain the following Angular JS filters with suitable example code
snippets
lowercase
CO5 U 6
currency
date
orderBy
b Develop a HTML program with Angular JS as per the following CO5 A 6
. design and read the value of text boxes A and B using Angular JS
and display the sum of A and B in the Result textbox when the user
clicks the “Addition” button.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify the relevant properties and methods which facilitate dynamic application development.
CO2 Explain the development of fully functional web applications that incorporates planning,
designing, coding, testing, and publishing to a web server.
CO3 Apply latest client and server side technologies for creating interactive data driven websites.
CO4 Model dynamic web applications using suitable latest server-side technologies integrated with
database.
CO5 Formulate and build extensible web applications using the Model View Controller design pattern.
CO6 Select appropriate design standards for designing attractive web pages.
Q. CO
Questions BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
18. a. Consider a Vector class with x and y as attributes which describes CO2 A 12
the members of the vector class. Write a C# program to overload the
+, * and == operators.
Note: The vector should be displayed in the format of 2x+3y or 2x-
3y.
19. a. Write a C# program for user registration system by applying the CO2 A 8
exception handling concepts to create and handle the following
custom exceptions appropriately.
Throw an exception if the age entered is less than 18 -
InvalidAgeException
Throw an exception if the percentage is less than 50 –
InvalidPercentageException
Throw an exception if the user’s name length is less than 10 –
InvalidUsernameException
b. Write a C# program to capture 10-digit mobile numbers and CO3 A 4
uppercase words with regular expression.
(For example - Input: 9567456776 678, CLR is Common Language
Runtime
Output: 9567456776 CLR)
20. a. Write a C# program to handle multithreading with two threads. First CO2 A 6
thread displays "C#" for every one second and the second thread
displays ".NET" for every two seconds.
b. Create a C# program to perform the following: CO4 A 6
Create custom attribute called AuthorAttribute with 'name' as
the positional parameter and 'version' as the named parameter.
The custom attribute is targeted to Class and allow multiple is
true.
Create a class Book and apply the custom attribute in the
required places.
Using Reflection, obtain type information of the Book class,
retrieve the custom attributes at runtime and display it.
21. a. Create a class named Area with methods circle(r), rectangle(l,b) and CO3 A 8
triangle(l,b,h). Write a C# code to invoke these functions by
applying single delegate.
b. Discuss how master page differs from the ASP.NET page. CO6 U 4
COURSE OUTCOMES
CO1 describe the basics programming constructs of C# in .NET Framework.
CO2 extend and debug variety of .NET applications.
CO3 demonstrate the aspects of object-oriented functionalities in .NET applications.
CO4 use the .NET base libraries in developing real time applications.
CO5 illustrate .NET applications with relational database and variety of data sources for efficient data
access.
CO6 develop well designed ASP.NET applications using .NET framework.
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. Name the event available by default when the activity is being created. CO1 U 1
2. Mention the function that can hide or show the views. CO1 R 1
3. Write Structure of a Content URI. CO2 R 1
Mention the method that contains the code that has to be run in the
4.
background. CO2 R 1
5. Name the method that is used to set padding in Android Studio. CO3 U 1
6. Mention the types of Picker views. CO3 R 1
Identify the manifest permission to send an SMS directly from android
7.
application. CO4 R 1
Recall the two ways provided to the users by Android to share data between
8.
apps. CO4 R 1
9. Name the class that is used to find the IMEI number of a device. CO5 U 1
10. Give the code snippet used to enable the Bluetooth of a device. CO1 U 1
PART – B (6 X 3 = 18 MARKS)
11. Write the code snippet for the Intent that helps to open the camera for CO1 A 3
capturing the image.
12. Name the 3 different types of services. CO2 U 3
13. Write the design code using Linear Layout for a login screen in an android CO3 A 3
application.
14. Describe the code for creating a Broadcast Receiver to notify the change in CO4 U 3
network connectivity.
15. Name and state the use of the 3 functions available in the SMSManager CO5 A 3
class.
16. Construct the java code to display the Address of a particular location using CO6 U 3
Geocoder.
public void onLocationChanged(Location location)
{
// code
}
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Explain Android Architecture with neat diagram. CO1 R 6
b. Develop a java code to create IntentFilter for discovering Bluetooth CO1 A 6
devices with proper BroadcastReceiver and display the their name and
address.
18. a. Describe and explain ListView by listing the hobbies of students in CO2 U 6
your class.
b. Develop an Android Music player Application to play sound in the CO2 A 6
background.
20. a. Develop an android application to insert, delete and view the data for CO4 U 12
the following table using SQLite.
Stu_ID Name Department Gender Hobby
1000 Sara CSE F Dance
1001 David EEE M Music
1002 Lydia CSE F Paint
1003 Rexline ECE F Music
1005 Daniel CIVIL M Paint
21. a. Develop an Android application that sends an E-Mail to your friend. CO5 A 6
b. Relate the following concepts with respect to Content Provider CO5 R 6
i. ContentResolver ii) Cursor
22. a. Develop an android program to send student details such as name, CO3 A 6
register number, marks from one activity to another activity using
intent.
b. Illustrate how data can be shared with the help of shared preferences. U 6
O3
23. a.
Display the date 01 NOV 2022 and the time 06 Hour 20 Minutes 45 CO5 U 12
Seconds using appropriate Picker Views.
COMPULSORY QUESTION
24. a. Build an Android application to enable ACCESS_FINE_LOCATION CO6 A 6
permission and track the location updates
b. Build an Android application using fragments to get the Personal and CO6 A 6
Academic information from the user and display it using Tab Layout
with Swipeable Views.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify a significant programming component, involving the sensors and hardware features of mobile device.
CO2 Use the power of background tasks
CO3 Model mobile applications with appropriate, layouts and user interfaces.
CO4 Demonstrate applications with network connectivity, messaging and persistent storage.
CO5 Design and develop android applications for real time problems.
CO6 Build, sign and publish mobile application.
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. List out the various built-in data types of Python. CO1 R 1
2. Predict the output of the following code: CO1 U 1
b = 5.0
print("\nType of b: ", type(b))
3. For the given string a=”good morning”, give the output for the following: CO2 U 1
a.capitalize()
4. Predict the output of the following code: CO2 U 1
print(hai\nhello)
5. Predict the output of the following code: CO3 U 1
print(1 + 2)
print("Geeks"+"For")
print("Geeks"*4)
6. Justify the statement. Is it possible to access the inner namespace’s CO3 An 1
objects from an outer namespace?
7. State the default color of turtle. CO4 R 1
8. List out the methods used to fill in the colours in turtle graphics. CO4 R 1
9. State the use of the method Tk(). CO5 R 1
10. Give the method used for scheduling a thread with a CPU. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. State the various types of formal function arguments in Python. CO1 R 3
12. Predict the output of the following code: CO2 U 3
var1 = 'Hello World!'
var2 = "Python Programming"
print "var1[0]: ", var1[0]
print "var2[1:5]: ", var2[1:5]
13. Define abstract class. CO3 R 3
14. Discuss the use of the method convert (‘L’). CO4 U 3
15. List the components of a model view controller pattern. CO5 R 3
16. Define thread-based multitasking. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Write a Python program to check whether the given number is CO1 A 12
positive, negative, or zero and display an appropriate message.
18. a. Give the output for the following list operations: CO2 U 6
i) len([1, 2, 3])
ii) [1, 2, 3] + [4, 5, 6]
iii) ['Hi!'] * 4
b. Illustrate the various dictionary methods in Python with suitable CO2 A 6
examples.
19. a. Explain in detail how exceptions are raised when some internal CO3 U 6
events occur that change the normal flow of the program.
b. Write a Python program to print the Fibonacci series up to n terms. CO3 A 6
20. Summarize the various turtle operations. Use appropriate examples to CO4 U 12
demonstrate.
21. a. Write a Python program for the Pop-Up Message Box. CO5 A 6
b. Write a Python program to create 16 labels using a for loop with grid CO5 A 6
layout.
22. Describe the various states in the thread life cycle. Write a Python CO6 A 12
program to suspend a thread for a period of seconds.
23. Write a Python program that implements the following image CO4 A 12
processing operations:
i) Rotating an image
ii) Converting to black and white
iii) Converting to gray scale
iv) Transposing an image
COMPULSORY QUESTION
24. Write a Python program for producer and consumer problems CO6 A 12
implementing inter-thread communication.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand and apply the basic programming constructs of Python suitably.
CO2 Infer the concepts of string processing, file I/O, lists and dictionary.
CO3 Apply modules for reusability and the object-oriented principles for modelling and developing
software system.
CO4 Make use of graphics for processing images.
CO5 Construct applications with graphical user interface.
CO6 Develop software solutions using multi-threading, networking and client-server concepts.
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
List down the properties of Adjacency Matrices. Construct an
Adjacency matrix for the given directed graph.
17. a.
CO1 R
22. a. Enumerate the members affiliated with one another in a group. CO4 R 5
b. Describe closeness centrality with an undirected graph. CO4 R 7
COURSE OUTCOMES
CO1 Describe the core concepts of social network analysis and the underlying mathematics.
CO2 Summarize the research design methods and different options for collection and management of
network data.
CO3 Distinguish between the whole network and egocentric research designs.
CO4 Apply suitable multivariate and statistical techniques for testing hypotheses with network data.
CO5 Analyze the node’s position and structural similarities of network using suitable measures.
CO6 Interpret various social networks using suitable tools.
Q. CO
Questions BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. Write about the weak ties in Social Networks. CO1 A 1
2. Define Nodes and edges. CO1 R 1
3. List the ways that can be used to represent a graph. CO2 R 1
4. Discuss on longitudinal research. CO2 U 1
5. Define Census. CO3 R 1
6. List the benefits of self-administered surveys. CO4 R 1
7. Define average linkage in a cluster CO4 R 1
8. Lists any two approaches to find coreness. CO5 R 1
9. Discuss about overlap relation in a networks. CO5 U 1
10. Write the formulae to measure transitivity. CO6 A 1
PART – B (6 X 3 = 18 MARKS)
11. Discuss about Dyadic motifs. CO1 U 3
12. Write the strategies for finding group boundaries. CO2 A 3
13. Discuss the features of survey in data collection. CO3 U 3
14. Discuss about the combinatorial optimizations CO4 R 3
15. Describe the reasons to symmetrize data. CO5 R 3
16. Identify the value for indegree of vertex 0,1,2,3 from the given CO4 R 3
architecture diagram
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Explain different components of a graph. CO1 U 6
b. Discuss on Graph as math object in Social Networks. CO1 U 6
Explain the process behind data management and the tool used
20. a. CO3 U 6
in Social Networks.
List down the Hierarchical clustering with single link, complete
b. CO4 R 6
link and average link distance.
COURSE OUTCOMES
CO1 describe the core concepts of social network analysis and the underlying mathematics
CO2 summarize the research design methods and different options for collection and management of network
data
CO3 distinguish between the whole network and egocentric research designs
CO4 apply suitable multivariate and statistical techniques for testing hypotheses with network data
CO5 analyze the node’s position and structural similarities of network using suitable measures
CO6 interpret various social networks using suitable tools
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
7. CO4 An 1
Formulate the syntax used to generate new sphere and new cone using
8. world tool kit. CO5 R 1
9. List the technological growth in commercial VR technologies. CO6 U 1
10. List the two types of parametric spline representation of curves. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Brief the tracker performance parameters used for the evaluation of 3D CO1 An 3
tracker device.
12. Describe the features of projector based large volume display. CO2 U 3
13. Differentiate between client-server and peer-peer distributed VR system. CO3 An 3
14. Classify the different types of tool kits available to process the VR objects. CO4 U 3
15. Compare and contrast the performance of WTK and Java 3D. CO5 An 3
16. List the technological impact of VR in the field of education. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Explain the mechanism of magnetic trackers as input devices in virtual CO1 U 12
reality. Classify the AC and DC magnetic trackers and compare their
working mechanism in detail
18. Describe the working of 3D audio display system using convolvotron CO2 R 12
mechanism and formulate the mathematical representation of cross-
talk effect produced during sound display.
19. a. Define rendering. Summarize the functionalities of the various stages CO3 U 6
of the graphics rendering pipeline with neat diagram.
b. Formulate the mathematical representation of 3D transformation CO3 U 6
involved in kinematic modeling of robots.
20. a. Summarize the functionalities of World Tool Kit for object creation CO4 U 6
and processing using scene graph.
b. Describe how WTK (World Tool Kit) library allows clients to interact CO4 R 6
with the server using networking method of WTK.
21. Describe the test bed configuration for analyzing user performance CO5 R 12
studies in terms of system responsiveness, influence of system
responsiveness and influence of feedback modality.
22. Describe the overall process involved in physical modeling of VR CO3 R 12
object.
23. a. Explain the working principle of ultrasonic tracker that makes use of CO1 U 8
ultrasonic sound waves to detect the position and orientation of 3D
object.
b. List the uses of ultrasonic tracker. CO1 U 4
COMPULSORY QUESTION
24. Describe the overview of VR applications in the field of education, CO6 R 12
medicine and entertainment.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Recognize the virtual technology and usage of input devices.
CO2 Identify the essential output devices, sound displays, graphics and feedback.
CO3 Demonstrate workstation-based architecture for modelling.
CO4 Analyze the programming tool kits in engineering the virtual reality methods.
CO5 Relate the user performance and multimodality feedbacks.
CO6 Understand the effect of virtual reality simulation on users.
Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. List the data types in Java. CO1 R 1
2. Name the primitive data type that is used to store a single character. CO1 R 1
Interpret the output of the sample code given below:
public class Main
{
public static void main(String args[])
{
CO2 A 1
int x=20;
System.out.println(++x);
System.out.println(x--);
}
3. }
Identify the output of the following code:
public class Main
{
public static void main(String args[])
{ CO2 U 1
int g = 3;
System.out.print(++g * 8);
}
4. }
5. List the types of packages in java. CO3 R 1
9. Determine the output of the given program
10. public class JavaException{
11. public static void main(String args[]){
12. try{
13. int data=50/0; CO3 A 1
14. }catch(ArithmeticException e){System.out.println(e);}
15. System.out.println("Rest of the code...");
16. }
6. }
7. Mention the reason for using Synchronization. CO4 R 1
8. Interpret the output for the sample code given below: CO4 A 1
public class Main
{
public static void main(String args[])
{
String str1="swing";
System.out.println(str1.concat("check"));
}
}
9. List out the wrapper’s classes in boxing. CO5 R 1
10. Name some of the AWT layout managers in Java CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Illustrate a java program to check eligibility for voting if the person age
CO1 A 3
is given as 18.
12. Classify the use of abstract class from a regular Class. CO2 R 3
13. Identify the output for the following code:
public class Main
{
public static void main(String args[])
{
double a, b,c;
a = 3.0/0;
CO3 R 3
b = 0/4.0;
c=0/0.0;
System.out.println(a);
System.out.println(b);
System.out.println(c);
}
}
14. Explain the following String Operations with an example:
CO4 U 3
a. split() b. length()
15. Demonstrate a java program to illustrate the concept of file Creation CO5 A 3
16. List any three AWT components. CO6 An 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Discuss in detail about the object-oriented principles in java with an
CO1 R 12
example.
18. Define Inheritance. Explain its types with suitable example. CO2 R 12
22. Write in detail about the different operators available in java with an
CO6 A 12
example program.
23. Discuss in detail about the following:
CO4 U 12
c) Features of Java b) Arrays
COMPULSORY QUESTION
24. Explain in detail about a GUI Application using swing with a suitable
CO6 U 12
example.
COURSE OUTCOMES
CO1 understand the fundamental principles of object-oriented design.
CO2 identify the fundamental programming constructs to develop real time applications.
CO3 model applications using Java.
CO4 demonstrate the development of multitasking applications
CO5 breakdown the real time applications into small abstract entities
CO6 develop desktop-based applications.
Q.
No Questions CO BL Marks
.
8. Write a python program to create a list containing mixed data and print
CO4 A 1
the data using ‘for’ loop statement.
9. Recognize and write the output for the following code. CO5 U 1
l = ["Year",2023,"Month"]
print(set[1])
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Develop a python program to print your institution name 10 times. Each
CO1 A 3
output should begin on a new line.
12. Write a python program to replace the last value of tuples in a sample
list given below.
CO2 A 3
Sample list: [(71,72,74), (84,85,86), (97,98,99)]
Expected Output: [(71,72,10), (84,85,10), (97,98,10)]
13. Discuss the open() and close () function used for file operations. CO3 U 3
14. Write a Python program to access the third number in the given list.
CO4 A 3
List1=[7, 101, 200, 11,1,202]
15. Develop a python program to print all the numbers from 10 to 15, and
CO5 A 3
print a message, when the loop has ended.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
COMPULSORY QUESTION
COURSE OUTCOMES
CO1 Describe the datatypes, expressions and type conversions in Python.
CO2 Use functions, control statements, strings, lists and dictionaries in python programming.
CO3 Demonstrate the concept of object, class inheritance and polymorphism in Python.
CO4 Write user defined functions, classes in python.
CO5 Develop GUI based Python program and to read and write files using python programming.
CO6 Create python program for real world applications.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Determine the shortest path from ‘s’ to the remaining vertices using CO A 8
Dijkstra’s algorithm. 1
2. a. Construct the maximum matching set for the graph given below and CO A 8
find whether this graph has a perfect matching. 2
5. a. Discuss about the Fourier transform algorithm and its role in computing CO U 8
convolutions and products of various types. 5
b Solve the following linear program using SIMPLEX method. CO A 8
. Maximize P=2 x 1+ x 2 5
Subject to 5 x 1+ x 2≤ 9
x 1+ x 2≤ 5
x1, x2≥0
6. a. Differentiate NP-complete and NP-hard and give examples for each one CO U 8
of them. 6
b Describe how to randomize the deterministic algorithms considering the CO U 8
. following problems. 6
o Quick sort algorithm
o Linear search algorithm
7. a. Determine the maximum possible flow from ‘A’ to ‘B’ using Ford- CO A 8
Fulkerson Algorithm. 3
A B
COURSE OUTCOMES
CO1 State the correctness of the basic algorithms for the classic problems.
CO2 Understand the mathematical foundation in analysis of algorithms.
CO3 Analyze the efficiency of algorithms using time and space complexity.
CO4 Understand different algorithmic design strategies.
CO5 Choose the appropriate data structure for solving a particular set of problems.
CO6 Developing efficient algorithms of various problems in different domains.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Discuss how the transmission and receiving process takes place both in CO U 12
sliding window and stop – wait protocols. 1
b Elaborate the functionalities of Clock-Based framing (SONET) with its CO R 4
. frame format. 1
5. a. Write a program in java that uses TCP and UDP for client/server socket CO C 12
interaction. 4
b List the limitations of IPv4 and how are they overcome by IPv6. CO E 4
. 5
COURSE OUTCOMES
CO1 Identify and discuss the concepts underlying protocols, and their main characteristics and
functionality.
CO2 Identify the various TCP/IP protocols that used for particular networking application.
CO3 Recognize the requirement of Interior and exterior routing protocols that are used for different
networks.
CO4 Understand the behavior of internetworking different networks in MPLS networks.
CO5 Apply knowledge of the TCP/IP layering model to intelligently debug networking problems.
CO6 Evaluate theoretical and practical concepts behind the design of multi-constrained applications
and services.
Q.
B
No Questions CO Marks
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a. Illustrate the block cipher design principles. CO1 U 14
b Distinguish between Substitution Cipher Technique and CO1 U 6
. Transposition Cipher Technique.
(OR)
2. a. Explain in detail about RSA algorithm with an example. CO2 U 14
b List the advantages and disadvantages of Diffie Hellman Key CO2 R 6
. Exchange algorithm.
COURSE OUTCOMES
CO1 Recognize the importance of cryptography.
CO2 Distinguish different kinds of attacks and design new security features.
CO3 Apply key management using various symmetric and asymmetric key algorithms.
CO4 Categorize cryptographic data integrity algorithms.
CO5 Explain the different types of firewalls.
CO6 Evaluate wireless network and cloud security.
Q. CO
Mark
No Questions BL
s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Define system catalog. Describe the information stored per relation, CO R 8
per index and per view in the system catalog. 1
b Discuss the reason for the difference in cost between alternative CO An 8
. plans for a query can be very large. Give examples using the 1
following schema with the query evaluation plan (relational
algebra tree) to illustrate the impact of pushing selections,
choice of join methods, and availability of appropriate indexes.
Consider the following schema:
Student (sid, name, age,d_id)
Department(d_id, d_name, d_head, d_budget)
Query:
SELECT S.name from Student S, Department D WHERE
S.d_id= D. d_id AND D.name=”CSE” AND S.age > 24
Assume that each tuple of Student is 100 bytes long and each
page can hold 50 tuples and have 1000 pages of such tuples.
Each tuple of Department is 50 bytes long and each page can
hold 100 tuples and have 2000 pages of such tuples.
Draw any two alternative plans for the above QEP? Explain
how the alternative plans are better than the original plan in
detail with appropriate cost calculation.
b Why recovery in a distributed DBMS is more complicated than CO U 8
. in a centralized system? Describe and compare two-phase and 4
three-phase commit protocols.
i.
What is done during analysis phase?
ii.
What is done during redo phase?
iii.
What is done during undo phase?
iv.
Describe the actions that has be done in case of repeated
crash and specify the missing LSN and LOG information
of the above diagram.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Describe the scenario in which mandatory access controls CO R 10
prevent a breach of security that cannot be prevented through 6
discretionary access controls.
b What is an authorization graph? Explain SQL’s GRANT and CO U 10
. REVOKE commands in terms of their effect on this graph. In 6
particular, discuss what happens when user pass on privileges
that they receive from someone else with an example.
CO – COURSE OUTCOME BL – BLOOMS’ LEVEL
COURSE OUTCOMES
CO1 Identify alternative designs for implementation of database systems, including data models, file
structures, index schemes, and query evaluation.
CO2 Recognizes appropriate techniques for transaction processing, concurrency control, backup and
recovery that maintain data integrity in database systems.
CO3 Applies locks and isolation levels to the concurrent transactions.
CO4 Analyzes the operation of parallel and distributed database.
CO5 Design and implement significant database objects such as file structures and index schemes.
CO6 Explains the concepts of information retrieval and spatial data management.
Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a State why the ensemble methods may improve the accuracy of the CO
1. U 10
. classifier? Explain the working principle of Bagging and Boosting. 1
b Summarize the types of machine learning and discuss the components CO
U 10
. in the design of a learning system. 1
(OR)
a CO
2. U 10
. Explain Multiple layer perceptron model with a neat diagram. 2
b CO
R 10
. Describe CART (Classification and Regression Tree) with examples. 1
Q.
B Mark
No Questions CO
L s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Categorize various type of hypervisors and explain each of its design
1. CO1 U 10
. principles.
b
Illustrate the architecture of KVM and Citrix Xen Server. CO1 U 10
.
(OR)
Elaborate various cloud deployment models and cloud service model
2. CO2 U 20
with the case study of NOVA open stack.
Analyze how Frequent are your Service Outages and how long do they
3. CO3 A 20
last on average in Amazon Elastic Compute2 (EC2) service providers.
(OR)
a Discover the design principles of the Hadoop File System with map-
4. CO4 An 10
. reduce function.
b Explain the basic concept of Infrastructure as a code with Open
CO4 U 10
. Stack (IaC).
List the use cases of Amazon CloudFront and elaborate on how to set
a
7. up a CDN for a web page containing the Java programming language CO2 R 10
.
tutorial.
b Analyze each step run by map-reduce function for a simple word count
CO3 A 10
. program.
(OR)
Examine network, host and application level aspects of data security in
8. CO5 An 20
cloud.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. Label the components of Ansible and write the code and step to deploy CO6 A 20
a web server and database server using Ansible playbook.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Infer the concept of virtualization in the cloud computing.
CO2 Use the concepts of cloud storage, cloud networks and its management.
CO3 Identify the architecture, infrastructure and delivery models of cloud computing.
CO4 Categorize the services using Cloud computing.
CO5 Apply the security models in the cloud environment.
CO6 Develop an automation solution for the cloud.
Q.
No Questions CO BL Marks
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
CO
1. a. U 10
IoT is a trillion dollar industry. Justify your answer. 1
Explain the power and capabilities of IoT technologies or ideologies
b CO
for the Telematics and Intelligent Transport Systems of vertical IoT A 10
. 1
application.
(OR)
Illustrate SCADA systems that acts as the Internet of Controllers with CO
2. An 20
a neat architecture diagram. 2
COURSE OUTCOMES
CO1 Examine IoT Architecture and various protocols.
CO2 Classify the IoT value chain structure (device, data cloud), application areas and technologies
involved.
CO3 Design, develop and implement smart systems.
CO4 Infer the advantages of Cloud Services.
CO5 Learn about optimization of cloud storage.
CO6 Apply various kinds of security mechanisms.
Q.
B
No Questions CO Marks
L
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
Identify the applications, requirement, and challenges involved in IoT CO
1. a. development as a trillion dollar industry. 1 R 8
b Examine the power and capabilities of IoT technologies for Smart Grid CO
. and Electric Vehicles 1 R 8
Summarise the DNA of intelligent nuclear power plant IoT system with CO
2. a. neat architecture diagram. 2 U 16
COURSE OUTCOMES
CO1 examine IoT Architecture and various protocols.
CO2 classify the IoT value chain structure (device, data cloud), application areas and technologies involved.
CO3 design, develop and implement smart systems.
CO4 infer the advantages of Cloud Services.
CO5 learn about optimization of cloud storage.
CO6 apply various kinds of security mechanisms.
Q.
B
No Questions CO Marks
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Discuss the Epipolar geometry in terms of stereo vision and how it CO
1. a. U 10
differs from Homography estimation. 1
b Describe how RANSAC is fit for estimating homography and CO
R 10
. rotational mosaics. 1
(OR)
Identify the purpose of edge detection and discuss the main steps in CO
2. a. U 12
edge detection with the aid of CANNY. 2
b CO
An 8
. Compare the reflection map with surface and body reflection. 2
CO
3. a. U 12
Explain the 8 shape features with Fourier and wavelet descriptors. 3
b Discover the importance of Mean‐Shift Clustering/Segmentation in CO
A 8
. terms of image segmentation. 3
(OR)
Articulate how KLT tracking examine the potential matches between CO
4. a. A 12
the images with its algorithm. 4
b Differentiate Motion vs Stereo with the support of Motion Detection CO
U 8
. Regularization theory. 4
CO
7. a. A 10
Explain the geometric camera calibration to correct the lens distortion. 1
b CO
A 10
. Illustrate the Pinhole Perspective in Image Formation Models. 1
(OR)
CO
8. a. A 10
Illustrate Texture Boundary Pattern Analysis with suitable example. 2
b Compare feature tracking, detection, and distortion with suitable CO
An 10
. illustration. 2
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Illustrate video surveillance systems for traffic monitoring as an CO
9. a. A 15
application of computer vision. 6
b CO
U 5
. Explain object tracking strategies in computer vision. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Define image formation models and light effects in computer vision.
CO2 Identify the feature extraction methodology suitable for computer vision applications
CO3 Apply the segmentation approaches in image analysis.
CO4 Analyze the motion detection and estimation techniques.
CO5 Construct image analysis models for object recognition.
CO6 Explain the computer vision techniques used for real time applications.
Q.
Mark
No Questions CO BL
s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Describe the operation of cyber terrorists with a case study. CO4 Remember 8
b
Record the Modus Operandi of a cyber-terrorist. CO4 Remember 8
.
Recognize the various kind of financial cybercrime with
2. relevant examples of each type. Provide legal laws wherever CO1 Analyze 16
applicable.
Describe the various functions related to computer and internet
3. CO1 Understand 16
security with some suggestions for improving security.
Define the terms used in hacking with categorization of the
4. a. types of hackers. Analyze anyone type of hacker with a real CO2 Remember 8
time case study.
b
List and explain the common crimes related to mobile phones CO2 Remember 8
.
State the importance of Internet security with some example
5. a. CO5 Understand 8
incidents?
Construct the process in handling the issues related to ISP and
b
hosting provider and hearsay evidence while performing CO5 Apply 8
.
computer forensic analysis?
6. a. Explain the myths surrounding outsourcing of security. CO6 Remember 8
Explain the threats and attacks possible in mobile and wireless
b
technologies with case studies of digital evidence taken from CO3 Remember 8
.
mobile devices to comprehend an attacker.
Analyze anyone Forensic tool suite with clear justification of
7. a. CO3 Analyze 8
its selection based on a case study of your choice.
b Explain the various sources of the digital evidence, collection
CO2 Remember 8
. and its preservation techniques.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
Explain the formal written structure of the nondisclosure
8. a. agreement between the parties involved in the security CO6 Understand 10
agreement.
Discuss Service Level Agreements along with the issues and
b
the phases in which a company decides on the Service Level CO6 Remember 10
.
Agreements.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify the effect of cybercrime in forensic computing.
CO2 Infer digital forensic evidences and investigate the contents.
CO3 Choose and apply current computer forensics tools.
CO4 Analyze the nature of cyber terrorism and its effects.
CO5 Devise basic computer and network forensic analysis.
CO6 Summarize the technical and legal aspects related to cyber crime.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
CO
1. a. Illustrate the information overloads in data visualization with examples. A 8
5
Design a visualization to represent the relationship between these
variables.
Country Population GDP Life Expectancy
USA 328200000 21427700 78.93
China 1393000000 14342916 76.92
Japan 126500000 5081789 84.63
b CO
Germany 83020000 3996759 81.41 C 8
. 5
UK 67886011 2827600 80.96
India 1380004385 2875143 69.66
France 66990000 2827642 82.67
Italy 60240000 1948911 83.22
Brazil 213200000 2055056 75.88
Canada 38005238 1730901 81.95
CO
3. a. An 8
Analyze the systems based on data type in visualization systems. 3
Show up on how the visualization techniques and tools for 2D and 3D
data differ, and sketch the advantages and disadvantages of each
b CO
approach in terms of understanding and interpreting the data. A 8
. 3
Additionally, how can the choice of visualization method impact the
accuracy and efficiency of data analysis?
CO
5. A 16
Illustrate the visualization of point data and line data. 4
CO
6. a. U 8
Describe the recent trends in visual perception techniques. 6
b CO
U 8
. Explain the region-based techniques in data visualization. 6
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
A health insurance institution is collecting vast amounts of data related
to physician consultations of patients, prescriptions, medications,
medical tests, examinations, and lab results, including additional
parameters (e.g., hospital, physician, cost, date and time, or duration).
The insurance institution wants to query, explore, and analyze these
data visually according to different tasks and groups of insured persons.
The duty is to support this institution using visualization techniques for
time-oriented data.
(a) Interpret and specify the following:
Users:
Who are the users of the visualization?
What are the specifics of the target group?
(not merely ”employee”, but a more specific description, such CO
8. A 20
as 5
analyst or manager in a specific department, including details of
the characteristics of the respective user group)
Data:
What kind of data is to be visualized?
Which variables/parameters?
What data types?
Which structure?
Tasks:
What do the users want to do with the data and which insights
do they want to gain?
(b) Sketch a proposed solution in terms of visual representation,
interaction and data analysis methods.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Familiar with the design process to develop visualization methods and visualization systems, and
methods for their evaluation.
CO2 Preparation and processing of data.
CO3 Have an understanding of large-scale abstract data.
CO4 Understand visual mapping and the visualization.
CO5 Create actual visualization, interaction and distorting techniques.
CO6 Keep track of recent visual perception techniques.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
Discuss the various architectural and fundamental models of CO
1. a. U 16
communication used in distributed systems. 1
Explain why making some replica managers read-only may improve the CO
6. a. U 16
performance of a gossip system. 5
Q.
Mark
No Questions CO BL
s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Reproduce examples of Distributed system. CO R 8
1
b Argue the common characteristics of distributed system in detail. CO E 8
. 1
4. Adapt the central server algorithm for mutual exclusion to handle the CO A 16
crash failure of any client (in any state), assuming that the server is 4
correct and given a reliable failure detector. Comment on whether the
resultant system is fault-tolerant. What would happen if a client that
possesses the token is wrongly suspected to have failed?
COURSE OUTCOMES
CO1 Describe the distributed system models.
CO2 Distinguish inter-process communication mechanisms and their application scenarios.
CO3 Ilustrate a transaction and concurrency control scheme for a real time application.
CO4 Compare the various file system architectures used in distributed systems
CO5 Construct a real time distributed system with suitable IPC, event coordination, file management,
name service, transaction and concurrency control mechanisms.
CO6 Evaluate an efficient distributed system and its qualities.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
Examine the differences between the white hat, black hat, and gray hat CO
1. a. hackers. 1 A 8
b CO
. Order the phases of ethical hacking with the flow diagram. 1 A 8
CO
3. a. Focus on the goals and the steps of vulnerability analysis. 3 An 8
b Construct ethical guidelines and principles when conducting the passive CO
. analysis. 3 A 8
CO
4. a. Discuss the intelligent fuzzing with sulley. 4 U 10
b CO
. Summarize the client-side browser exploits with examples. 4 U 6
Show the hypothetical case studies based on previous incidents and the CO
6. a. general vulnerabilities that may exist in cloud platforms. 3 U 8
b Identify and mitigate web application vulnerabilities through ethical CO
. hacking. 6 U 8
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Examine the electronic communication privacy act with its various CO1 R 10
features and extensions.
b Discuss about Partial Disclosure of Vulnerability Disclosure. CO1 U 6
.
5. a. Recommend the steps to be taken in IDA Pro for Advanced Reverse CO4 E 10
Engineering.
b Discuss the challenges involved in Static Code Analysis. CO4 U 6
.
COURSE OUTCOMES
CO1 Learn how to apply knowledge of engineering to society evaluations and design.
CO2 Understand the impact of security practices in a global and societal context.
CO3 Defend a computer against different types of security attacks.
CO4 Practice and use safe techniques on the World Wide Web.
CO5 Appreciate the Cyber Laws and impact of hacking.
CO6 Exploit the vulnerabilities related to conquer system and networks using state of the art tools and
technologies.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. Illustrate the ethical penetration testing process and show how it differs CO A 16
from the unethical hacker activities. 1
4. a. Discuss the windows access control model for local elevation privilege CO U 8
with five real-world examples. 4
b Produce the step-by-step process of going from a vulnerability to an CO A 8
. exploit in the context of computer security. 4
5. a. Explain the impact of the Cyber Security Enhancement Act and the CO A 10
SPY ACT on ethical hacking. 5
b Report the impact of the Federal Managers Financial Integrity Act on CO A 6
. ethical hacking. 5
6. a. Show the hypothetical case studies based on previous incidents and the CO U 8
general vulnerabilities that may exist in mobile platforms. 6
b Identify the data breaches and remediation techniques in ethical CO U 8
. hacking. 6
7. a. Analyze the goals that the attackers try to achieve and the needed skill CO An 8
set for an ethical hacker. 1
b Determine the steps to get started using the backTrack linux distribution CO A 8
. 6
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Construct certain rules to ensure that all ethical and moral obligations CO A 10
are met. 1
b Examine the differences between passive and static analysis in ethical CO A 10
. hacking. 3
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Learn how to apply knowledge of engineering to society evaluations and design.
CO2 Understand the impact of security practices in a global and societal context.
CO3 Defend a computer against different types of security attacks.
CO4 Practice and use safe techniques on the World Wide Web.
CO5 Appreciate the Cyber Laws and the impact of hacking.
CO6 Exploit the vulnerabilities related to conquer system and networks using state of the art tools and
technologies.
Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Identify the required design principles for connected devices and CO
1. U 20
discuss the applications with proper block diagram. 1
(OR)
a CO
2. U 10
. Compare and contrast any two application layer protocols. 1
b CO
R 10
. List out the required protocols in application layer. 1
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
CO
1. a. Give examples of XaaS and explain it in detail. 1 U 8
b CO
. Quote and explain a real-time implementation of M2M and IoT. 1 U 8
CO
2. a. Explain the main design principles and capabilities need in IoT. 1 An 8
b CO
. Describe in detail about the security requirements in IoT. 2 R 8
CO
3. a. Sketch the security architecture in Internet of Things and explain it. 2 A 8
b Discuss the ways to prevail authentication and authorization in IoT CO
. devices. 2 U 8
CO
4. a. Explain the types of attacks with examples. 3 U 8
b Quote the real time examples of authentication and authorization and CO
. explain it. 3 R 8
CO
5. a. Sketch the attack and fault trees using logic AND and OR gates. 3 A 8
b CO
. Explain the cryptographic primitives and its role in IoT. 4 U 8
Sketch the identity life cycle and explain the ideal tool to manage your CO
7. a. IoT device identities. 5 A 8
b Explain how authorization is implemented with Publish / Subscribe CO
. schemes. 5 U 8
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
CO
8. a. Summarize the offerings related to IoT from cloud service providers. 5 U 10
b Develop an IoT application with the security controls available in cloud CO
. IoT. 5 C 10
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Demonstrate knowledge and understanding of the security and ethical issues of the internet of
things.
CO2 Conceptually identify vulnerabilities, including recent attacks, involving the internet of things.
CO3 Describe countermeasures for internet of things devices and security threats.
CO4 Analyze the societal impact of IOT security events.
CO5 Develop critical thinking skills.
Q.
Questions CO BL Marks
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Sketch the context aware framework for smart city applications. CO1 A 10
b. Recall all the city specific challenges encountered in large and mega CO1 R 6
cities.
2. Explain about the Mobile Business Intelligence(BI) and its numerous CO2 U 16
benefits.
3. Discuss on the smart homes middleware platforms and the dominant CO3 U 16
architectural styles for home integration.
6. a. Discuss the five network architecture available for smart city domain. CO6 U 10
b. Enumerate on the prominant technologies for IoT realization CO6 R 6
7. Illustrate and explain the system overview of the Geelytics for edge CO4 A 16
Analytics platform.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Identify the Popular IOT/M2M applications. CO6 R 12
b. Discuss some advancements that are being expected from the CO6 U 8
revolutionary and raging IoT concept for smart city.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify the necessity for smart cities.
CO2 Describe the factors influencing the smart cities.
CO3 Apply the IoT technologies in healthcare and security areas.
CO4 Analyze data in smart buildings, including data stemming from sensors and IoT devices.
CO5 Evaluate the devices and technologies deeded for smart cities.
CO6 Design and plan the architecture for smart cities.
Q. CO
Questions BL Marks
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Recall the need for Intelligent cities in today’s world. CO1 R 8
b. Enumerate on the smart city transformation strategies. CO1 R 8
4. a. Illustrate and explain the IOT Reference architecture along with the CO4 U 16
prominent IoT technologies.
6. a. Discuss on the smart homes and smart building elements along with the CO6 U 16
role of cloud environment.
COURSE OUTCOMES
CO1 identify the necessity for smart cities
CO2 describe the factors influencing the smart cities
CO3 apply the IoT technologies in healthcare and security areas
CO4 analyze data in smart buildings, including data stemming from sensors and IoT devices
CO5 evaluate the devices and technologies deeded for smart cities
CO6 design and plan the architecture for smart cities
Q.
B Mark
No Questions CO
L s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Enumerate the types of machine learning and discuss the components in CO
1. a. R 10
the design of a learning system. 1
b CO
An 10
. Analyze the useful perspectives in machine learning. 3
(OR)
CO
2. a. U 10
Describe the version spaces and the candidate elimination algorithm. 2
Explain the candidate elimination algorithm. Apply the algorithm to
obtain the final version space for the training example
Sl.N Sky Air Humidity Wind Water Forecast Enjoy
o temp sport
1 Sunny War Normal Stron Warm Same Yes
b m g CO
A 10
. 2 Sunny War High Stron Warm same Yes 4
m g
3 Rainy Cold High Stron Warm change No
g
4 Sunny War High Stron Cold change Yes
m g
Elucidate the Radial basis Functions and explain the two stages process CO
5. a. U 10
of the RDF networks. 1
b Describe the working behaviour of support vector machine with CO
U 10
. diagrams. 2
(OR)
Explain the concept of ensemble learning and discuss two popular CO
6. a. R 10
ensemble learning methods. 3
b Identify the concept of feature importance in Random Forest? How is it CO
U 10
. calculated, and why is it useful? 1
Summarize K-means algorithm and group the points (1, 0, 1), (1, 1, 0), CO
7. a. A 10
(0, 0, 1) and (1, 1, 1) using K-means algorithm. 5
b Explain the working principle of a Self-Organizing Feature Map CO
U 10
. (SOFM) and discuss its applications. 2
(OR)
List the challenges associated with clustering high-dimensional data. CO
8. a. U 10
Discuss strategies and techniques to address these challenges. 5
b Compare and contrast hierarchical clustering and density-based CO
U 10
. clustering methods. 3
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Recite the goal of dimensionality reduction in machine learning and CO
9. a. U 10
data analysis. Discuss its importance in real-world applications. 1
b Determine the elements of reinforcement learning with a suitable CO
A 10
. example. 2
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe some concepts and methods central to machine learning such as classification, regression,
clustering, bias/variance.
CO2 Explain mathematically various machine learning approaches and paradigms.
CO3 Compare the strengths and limitations of selected machine learning algorithms and where they can
be applied in different applications.
CO4 Design and implement suitable machine learning algorithm to a given task
CO5 Apply some state-of-the-art development frameworks and software libraries in machine learning task
realization.
CO6 Evaluate the performance of machine learning algorithms using suitable metrics
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
CO
1. a. Discuss in detail the various IoT enabling technologies. U 8
1
b CO
Evaluate and compare the IoT levels and their deployment templates. E 8
. 1
CO
2. a. Design an IoT application for a forest fire detection system. C 6
1
b CO
Sketch the architecture of REST-based communication APIs. A 6
. 2
CO
c. Discuss the role of controller service in an IoT system. U 4
2
CO
3. a. Differentiate machines in M2M and ‘things’ in IoT. An 4
2
b CO
Describe how NFV can be used for virtualizing IoT devices. U 6
. 2
CO
c. State the limitations that make SNMP unsuitable for IoT systems. R 6
3
CO
4. a. Evaluate the pros and cons of using Raspberry Pi as an IoT device. E 6
3
b CO
Critique on the need for optimization in IoT. E 6
. 4
CO
c. Identify the role of the NETCONF server. U 4
3
CO
5. a. Weigh the benefits of using SCADA in IoT applications. E 8
5
b CO
Illustrate Message Queuing Telemetry Transport (MQTT) protocol. An 8
. 3
CO
6. a. Explain Hadoop MapReduce for batch data analysis. An 8
4
b CO
Critique the use of Apache Spark in IoT applications. E 8
. 4
CO
7. a. Evaluate the use of formal risk analysis structures OCTAVE and FAIR. E 8
5
b CO
Sketch and explain the Map-reduce Job execution workflow. A 8
. 5
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
CO
8. a. Construct the architecture of a Django application. C 5
6
CO
c. Discuss various key concepts of puppet and chef frameworks. U 10
4
d CO
Write notes on Amazon web services for IoT with practical use cases. A 5
. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify the important aspects of IoT and its benefits.
CO2 Illustrate the working principles of IoT sensors and devices.
CO3 Demonstrate the working of various tools available for IoT.
CO4 Compare and contrast different technologies of IoT.
CO5 Evaluate the performance of IoT technologies.
CO6 Develop new IoT-based projects.
Q.
B
No Questions CO Marks
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Write the various IoT levels and explain in detail about the IoT levels
1. a. CO1 C 15
and deployment templates.
b
CO2 R 5
. List the difference between SDN and NFV of IoT.
(OR)
Categorize the different types of data analysis and write down the
2. a. CO3 An 15
challenges in IoT Data Analytics.
b
CO2 A 5
. Define M2M and compare M2M with IoT.
Express the various communication models that can be used for the
5. a. weather monitoring system. Justify the more appropriate model for CO1 C 15
this system.
b
CO1 R 5
. List the characteristics and limitations of IoT.
(OR)
Summarize the different IoT security challenges in various layers of
6. CO5 E 20
IoT application.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Describe the puppet framework with a suitable example and discuss
9. CO6 U 20
the various key concepts of the chef framework.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify the important aspects of IoT and its benefits.
CO2 Illustrate the working principles of a IoT sensors and devices.
CO3 Demonstrate the working of various tools available for IoT.
CO4 Compare and contrast different technologies of IoT.
CO5 Evaluate the performance of IoT technologies.
CO6 Develop new IoT based projects.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Solve the problem of retrieving documents for the user who is aware of CO A 8
multiple variants of spelling a term and seeks documents containing any 2
variants. (E.g., Color vs Colour).
b Discuss the steps involved in determining the vocabulary of terms for a CO U 8
. user query. 1
4. Describe the process and the various types of selecting a subset of terms CO U 16
in the training set for text classification. 4
6. a. Discuss the goal of attaining high intra-cluster similarity and low inter CO U 8
cluster similarity using the evaluation criteria with suitable example. 4
b Explain Expectation Maximation algorithm with suitable algorithm and CO R 8
. examples. 4
COURSE OUTCOMES
CO1 Interpret the basics of information models.
CO2 Illustrate the different techniques like tokenizing and indexing used in information retrieval
systems.
CO3 Evaluate the concept of query operations and languages.
CO4 Simulate the various text classification and clustering techniques.
CO5 Experiment the various concepts of web search.
CO6 Appraise the different tools of search engines.
Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a CO
1. R 10
. Enumerate the six principles of Good security thinking. 1
b CO
U 10
. Classify the types of attackers in the networking environment. 1
(OR)
CO
2. U 20
Discuss how attacks can be counted against security systems. 1
a CO
5. U 5
. Justify the need for access control in wireless environment. 3
b CO
R 15
. Discuss any one protocol used for access control mechanism. 3
(OR)
Suppose you set up a Web company selling flags. You get a Web
domain name such as www.myflagsarebest.com. You want this CO
6. A 20
address to be certified to you so that people can make a secure 4
purchase. Relate a suitable certification protocol.
a CO
7. R 10
. Discuss various security issues in public hotspots. 6
b CO
U 10
. Identify suitable techniques to protect yourself when using a hotspot. 6
(OR)
Summarize the voice over IP network security vulnerabilities with CO
8. R 20
real time analysis. 5
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Elaborate various security threats in a Bluetooth environment and CO
9. R 20
suggest suitable security measures to overcome those threats. 5
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Recognize the security challenges in wireless networks.
CO2 Discuss and distinguish the technologies that make up secured wireless network.
CO3 Relate the importance of providing security at user and server level.
CO4 Differentiate the key hierarchies of wireless security.
CO5 Combine Bluetooth and VOIP security.
CO6 Estimate the security of public wireless hotspots.
Q.
No Questions CO BL Marks
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Explain every potential web-user side attack that could occur and offer CO
1. a. U 12
effective mitigation methods for those attacks. 1
An organization has decided to implement security on their email
b CO
system. Examine all possible email attacks that may happen in A 8
. 1
network communication.
(OR)
CO
2. a. An 12
Explain about the different types of DDoS attacks and tools used in it. 2
b CO
A 8
. Discuss the functions related to the security enforcement of OS. 2
COURSE OUTCOMES
CO1 Explain the various attacks in the Cyberspace.
CO2 Classify the various risks which threatens Cyber Security.
CO3 Apply different controls for ensuring security of information.
CO4 Discover ways and means of identifying security breaches.
CO5 Recommend suitable controls and procedures for ensuring security.
CO6 Analyze the risk and design mitigation plans.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Explain the working principle of Support Vector Machine (SVM).
Demonstrate SVM’s approach in handling non-linear data for CO
U 8
classification task with suitable illustration. 1
b Apply Perceptron learning law and learn the patterns of ‘XOR’ gate and
. show the updated weight values after one iteration/epoch.
CO
Use Net = 1 if Net >= 0.2 A 8
1
= 0 if Net < 0.2
The initial weight vector = [0.1, 0.2], learning rate = 0.3
COURSE OUTCOMES
CO1 Understand the basics of deep learning.
CO2 Implement various deep learning models.
CO3 Realign high dimensional data using reduction techniques.
CO4 Analyze optimization and generalization in deep learning.
CO5 Explore the deep learning applications.
CO6 Apply the algorithms to real time problems.
Q.
B
No Questions CO Marks
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Illustrate the various activation functions used in modeling of artificial CO
1. a. U 10
neuron. Also explain their suitability with respect to applications. 1
Describe the working principle of Support Vector Machine and
b CO
demonstrate SVM’s approach in handling non-linear data for U 10
. 1
classification task with suitable illustration.
(OR)
Analyze the probabilistic theory of deep learning and explain the CO
2. An 20
structure of deep forward networks with neat architecture. 2
COURSE OUTCOMES
CO1 Understand the basics of deep learning.
CO2 Implement various deep learning models.
CO3 Realign high dimensional data using reduction techniques.
CO4 Analyze optimization and generalization in deep learning.
CO5 Explore the deep learning applications.
CO6 Apply the algorithms to real time problems.
Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Illustrate the different methodologies of scalar quantization techniques CO
1. R 12
. with necessary diagrams and mathematical equations. 1
b CO
R 8
. Summarize the Discrete Wavelet Transform. 2
(OR)
a Compare and Contrast Discrete Fourier Transform and Discrete CO
2. U 10
. Cosine Transform. 1
b Interpret the role of image transformation in medical image CO
A 10
. processing applications. 6
a CO
5. R 10
. Discuss in detail the general compression model components. 3
b Identify how an image is compressed using JPEG Image compression CO
U 10
. with an image matrix? 3
(OR)
Estimate the codes for the sequence A= [a, b, c, d, e, f, g] with the
a CO
6. probability values [0.25, 0.15, 0.05, 0.1, 0.2, 0.2, 0.05] respectively A 10
. 4
using Huffman coding technique.
Analyze the various necessities for compressing the image. Also,
b CO
point out the various checkpoints to be noted during the compression An 10
. 3
approaches.
COURSE OUTCOMES
CO1 Understand the basics of image and video processing.
CO2 Implement various image-processing techniques.
CO3 Demonstrate image compression techniques.
CO4 Analyze various coding techniques for 2D estimation.
CO5 Explore the video processing techniques.
CO6 Apply the algorithm to real time problems.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Describe how to concatenate two strings in Python. CO1 R 1
State how the output function in Python can be used to display data on
2. CO1 U 1
the screen?
3. Explain the purpose of the pass statement in Python. CO2 A 1
4. Explain how a while loop works in Python, and provide an example. CO2 An 1
Illustrate how to calculate the volume of a cylinder using the Python
5. CO3 An 1
module.
Write a program in Python to calculate the total surface area of a
6. CO3 A 1
cylinder using the user defined function
7. Write a Python program to write data to a file. CO4 A 1
Discuss the importance of closing a file after reading or writing to it in
8. CO4 U 1
Python.
9. Explain how to check if a number is even or odd using Python. CO5 An 1
10. Explain how to create a set in Python. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Explain how to swap two variables in Python. CO1 A 3
Identify the statement to prevent an infinite loop in a while loop in
12. CO2 An 3
Python?
Write a function to calculate the sum of two numbers and demonstrate
13. CO3 A 3
its usage.
14. Explain how to read a file line by line using Python? CO4 An 3
Illustrate a program to print the first and last characters of a given
15. CO5 R 3
string.
Define a Python program that creates a set of strings and uses the
16. difference() method to find the elements in the first set that are not in CO6 U 3
the second set.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the difference between the == and ! = operators in Python, CO1 U 6
and provide an example of how they can be used to compare two
values.
b Describe how to write a Python program that calculates the strain of
CO1 R 6
. mild steel based on the change in length and the original length.
18. a. Explain how to write a Python program that calculates the shear
stress and bending stress of a simply supported beam with a point CO2 An 6
load using a conditional statement.
b Explain how a Python program can be used to forecast the
. population by analyzing the change in population over time using a CO2 A 6
for loop statement.
21. a. i) Illustrate how to use the items () method in Python to return a list
of items, where each items contains a key-value pair from a
dictionary. CO5 A 6
ii) Illustrate how to use the keys () method in Python to return a list
of all the keys in a dictionary.
b i) Evaluate the output of the following Python code
. for x in range(2, 10, 4):
print(x)
ii) Evaluate the output of the following Python code
CO5 An 6
for i in range(5):
if i == 3:
break
print(i)
23. a. Discuss the use of the logical operators in Python (and, or, not), and
provide an example of how they can be used to evaluate complex CO1 R 6
conditions.
b Write a Python program to generate the given pyramid patterns for CO2 A 6
. wall painting.
*
**
***
****
*****
COMPULSORY QUESTION
24. a. Explain how to use for loop to iterate over a dictionary in Python. CO2 An 6
Write a Python program to demonstrate the use of the arithmetic
b
operators to perform addition, subtraction, multiplication, division, CO1 A 6
.
and modulo operations.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Outline the structure and components of a Python program.
CO2 Explain loops and decision statements in Python.
CO3 Illustrate class inheritance in Python for reusability.
CO4 Experiment read and writes files in Python.
CO5 Design, code, and test small Python programs that meet requirements expressed in English.
CO6 Choose lists, tuples, and dictionaries in Python programs.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the function used to convert a string to a float in Python? CO1 A 1
Devise a Python code snippet to demonstrate the use of comments in
2. CO1 An 1
Python.
3. Describe the syntax for if statement in Python. CO2 R 1
4. Discuss the concept of infinite loops in Python and how to avoid them. CO2 U 1
Write the Python module to calculate the curved surface area of a
5. CO3 A 1
cylinder.
6. Discuss how to use the 'return' statement in Python functions. CO3 U 1
7. Explain how to open and read a file using Python. CO4 An 1
8. Illustrate how to write a string to a file in Python. CO4 An 1
9. Illustrate a program to print the last three characters of a given string. CO5 A 1
10. Define a python code that accesses the first element of a tuple. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
State a python program that prompts the user to enter their name using the
11. CO1 U 3
input() function.
Explain the use of continue statement within a while loop to skip to the
12. CO2 An 3
next iteration?
Explain the Python module to calculate the curved surface area of a
13. CO3 A 3
cylinder.
Compare the difference between 'r', 'w' and 'a' modes for opening a file in
14. CO4 An 3
Python.
15. Explain what a dictionary is in Python and how it is used. CO5 A 3
Define a Python program that creates two sets and uses the intersection ()
16. CO6 R 3
method to find the common elements between them.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain how to write a Python program to calculate the Modulus of
17. a. CO1 An 6
Elasticity of mild steel using the stress and strain formula.
Discuss the use of the modulo operator in Python, and provide an
b
example of how it can be used to calculate the remainder of a division CO1 U 6
.
operation.
19. a. Write a Python function to calculate the factorial of a given number. CO3 A 6
b Write a Python function to find the sum of all elements in a given list
CO3 A 6
. and demonstrate its usage with an example.
Illustrate the process of analyzing the data from a file to calculate the
20. a. CO4 An 6
cost estimation of a building.
b
CO4 A 6
. Explain how to append data to a text file in Python.
i) Illustrate how to use the clear () method in Python to remove all the
items from a dictionary.
21. a. CO5 A 6
ii) Illustrate how to use the copy () method in Python to create a new
dictionary that is a copy of one of the original dictionaries.
i) Evaluate the output of the following Python code
for x in range(6):
if x == 3:
continue
b print(x)
CO5 An 6
. ii) Evaluate the output of the following Python code
for x in range(2):
print("x=",x)
else:
print ("Finally finished!")
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
1. Enumerate the fundamental python libraries used in data science. CO1 R 1
2. An example of unstructured data is _______. CO1 U 1
3. Find the mode of the data set A= {7,3,2,3,5,8,3}. CO2 A 1
4. Write about the data distribution, when mean = 50 and median = 48. CO2 A 1
5. Define the tern ‘Kernel trick’. CO3 R 1
6. Linear regression only works with numerical variables, not categorical CO3 U 1
ones. (Say True/False)
7. Identify the good fit model from the below three visualizations. CO4 A 1
17. Differentiate structured and unstructured data with examples. Write CO1 U 12
the five main characteristics of big data and highlight the most
important ‘V’ amongst the 5 V's of big data.
18. a. Discuss about the things to be considered in data cleaning? List the CO2 U 8
methods for filling in missing values.
b Find the mean, median mode and range for the given temperature CO2 A 4
. data in degrees Celsius?
{15, 15, 14, 15, 19, 17, 23}
20. a. Generate a decision tree that executes Boolean operations, namely CO4 A 6
AND, OR, and XOR.
b With some real-time applications, describe in detail about supervised CO4 U 6
. and unsupervised machine learning.
21. Write the main steps involved in k-means clustering with a neat flow CO5 R 12
diagram. Also discuss the strength, weaknesses and the applications
of this clustering algorithm.
22. a. With a neat flow diagram, explain k-Nearest Neighbor classifier CO3 U 8
algorithm. Also discuss the advantages and disadvantages of the
algorithm.
b Why SVM is an example of large margin classifier? Also specify the CO3 U 4
. reason to use kernel functions in SVM.
COMPULSORY QUESTION
24. a. Explain in detail about the recommender systems and its CO6 R 6
classification.
b The below table is a utility matrix, representing the ratings, on a 1–5- CO6 A 6
. star scale, of seven items, a through g, by four users A, B, C and
D. Calculate the cosine similarity between the users.
a b c d e f g
A 4 5 1
B 5 5 4
C 2 4 5
D 3 3
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Remember the key concepts of data science, data characteristics, its applications and the toolkit
used by data scientists
CO2 Recall the mathematical concepts for descriptive and statistical analysis of the given dataset
CO3 Discuss on the principle of operation of various data preparation and machine learning techniques.
CO4 Select appropriate mathematical and machine learning techniques for designing simple
applications.
CO5 Apply the relevant techniques for implementing simple applications
CO6 Interpret the results of data preparation and machine learning techniques
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name the field that investigates the mechanics of human intelligence. CO1 R 1
Recall the test, if the interrogator cannot distinguish the machine from
2. CO1 R 1
the human, then the machine may be assumed to be intelligent.
3. “Alive means not dead”. Convert this sentence into predicate logic. CO2 A 1
4. Write the equation for Bayes Rule. CO2 U 1
Cross the fittest two individuals using one–point crossover at the
middle point and produce the answer.
5. CO3 An 1
x2 = 8 7 1 2 | 6 6 0 1
x1 = 6 5 4 1 | 3 5 3 2
6. Express the formula used to perform sigmoid function in CNN. CO3 U 1
Select an AI algorithm used to analyze chest radiographs and detect
7. CO6 An 1
abnormal cell growth, such as potential cancers
Represent how does IBM Chef Watson use AI in food industry such as
8. CO5 U 1
Kellogs?
Choose the novel algorithm is used to optimize the prediction of liquid
9. CO4 E 1
equilibria which is employed in the simulation of biofuel process.
10. Select two technologies primarily used for intelligent data fusion. CO6 An 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Appraise the steps involved in Generate and Test algorithm in AI. CO2 E 3
12. Enumerate the features of Genetic Algorithm. CO3 R 3
13. Differentiate Procedural Vs Declarative knowledge. CO2 An 3
14. In 8 puzzle problem, if the following state is the given state, explore the CO1 A 3
goal state from the current state.
3 1 2 1 2
4 5 3 4 5
6 7 8 6 7 8
Initial state Final state
CO2 A 4
CO3 A 6
20. a. Calculate the size of a feature map when the input image is of 7 * 7
CO3 A 8
and filter is of 2 * 2.
b. Differentiate Artificial Neural Network and convolution Neural
CO3 An 4
Network
22. a. Of the students in the college, 60% of the students reside in the
hostel and 40% of the students are day scholars. Previous year
results report that 30% of all students who stay in the hostel scored
A Grade and 20% of day scholars scored A grade. At the end of the CO6 E 8
year, one student is chosen at random and found that he/she has an
A grade. Estimate the probability that the student is a hosteller.
Apply Naïve Bayes to solve the problem.
b. Predict Support Vector Machine based algorithms in biofuel
CO4 An 4
forecasting techniques.
COURSE OUTCOMES
CO1 Define AI based problems and select appropriate search method for different search spaces
CO2 Express knowledge representation techniques and problem-solving strategies to common AI
applications
CO3 Develop prediction models and extend for healthcare applications
CO4 Analyze energy and environmental issues and discover AI based solutions
CO5 Inspect the challenges on agriculture and suggest solutions for plant disease identification and
discrimination
CO6 Propose AI based solutions for industrial applications
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
COURSE OUTCOMES
CO1 Present a survey on building blocks of IOT.
CO2 Analyze the deployment models of IOT.
CO3 Compare the connectivity technologies and protocols in IOT.
CO4 Select IOT platform for an application.
CO5 Infer security issues in IOT.
CO6 Develop architectural approach for IOT applications
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Identify the study of intelligence that uses the ideas and methods of
1. CO1 U 1
computation.
2. Define tesler’s theorem. CO1 R 1
3. List the four main approaches to artificial intelligence. CO2 R 1
Name the vertex-based technique for finding the shortest path in the
4. CO2 R 1
graph.
5. Infer the method that is used in the breadth-first search. CO3 U 1
6. State the space complexity of the depth-first search. CO3 R 1
7. List the issues that arise in knowledge representation techniques. CO4 R 1
8. Define MIQ (Machine Intelligence Quotient) in artificial intelligence. CO4 R 1
9. List out the factors of sensory evaluation. CO5 R 1
Name some of the methods where artificial intelligence can be applied in
10. CO6 R 1
the applied industry.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Define turing test. CO1 R 3
Recall the two ways in consistency check where a value is added to one
12. CO2 R 3
attribute.
13. Explain the concept of the electronic nose. CO3 U 3
14. Define clean-in-place. CO4 R 3
Discuss the factors that are carried out by human operators or by
15. CO5 U 3
automated instruments in sensory evaluation.
16. Summarize food product development in food processing using AI. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Apply BFS on the given problem to reach the Goal node ‘U’ from the CO1 A 6
initial node ‘A’. Show intermediate steps.
Discuss the problem characteristics of artificial intelligence with its
b. CO1 U 6
examples.
Illustrate food weight estimation and the methods used in it for food
21. CO5 U 12
image analysis.
Analyze the features and the combinations for food image analysis for
22. a classification approach based on k-nearest neighbors and CO5 An 12
vocabulary trees.
23. Explain the methods of AI that has a significant potential to transform CO6 U 12
the food industry management by improving efficiency, reduce cost
and to enhance the overall customer experience.
COMPULSORY QUESTION
24. Discuss the methods of AI in food supply chain management. CO6 U 12
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Define AI based problems and select appropriate search method for different search spaces.
CO2 Express knowledge representation techniques and problem solving strategies to common AI
applications.
CO3 Develop prediction models and extend for food processing applications.
CO4 Analyze the food industry operations and develop AI based solutions.
CO5 Inspect the challenges in quality management of food products through AI based image
processing techniques.
CO6 Propose AI based solutions for food industry management.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List down the stages available in the software development life cycle. CO1 R 1
2. Name the symbol that specifies the C-preprocessors directive. CO1 R 1
3. scanf() is a predefined function. Which header file in C contains the
CO2 R 1
definitions of scanf()?
4. Solve the following code in C and find its output.
#include<stdio.h>
int main()
{
int i = 10; CO2 An 1
int k = i %-4;
printf("%d\n", k);
return 0;
}
5. Find the output of the following code in C.
#include <stdio.h>
int main()
{
int val=100; int ans; CO2 An 1
ans= val+ ++val;
printf("%d",ans);
return 0;
}
6. Consider the following code and find the output.
#include <stdio.h>
int main ()
{
CO2 An 1
char greeting[6] = {'H', 'e', 'l', 'l', 'o', '\0'};
printf("Greeting message: %s\n", greeting );
return 0;
}
7. Write a sample code in C to declare a pointer variable to an integer. CO5 U 1
8. Identify the keyword that is used to declare a C file pointer. CO5 R 1
9. List the mode which is used to open an existing file for both reading
CO6 R 1
and writing.
10. Find the operator that is used to connect the structure name to its CO6 R 1
member name.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Distinguish the puts() and gets() functions in C programming. CO2 U 3
12. Make use of the following code and rewrite it using a while loop in C
programming.
#include<stdio.h>
int main()
{
int a = 10;
do CO3 An 3
{
printf("%d", a);
a++;
}while(a <= 8);
return 0;
}
13. Construct a C program to implement the following mathematical
CO3 A 3
equation using for loop. 12 +22 +…..+52
14. Formulate a program to find the sum of all elements stored in a 1D
CO4 A 3
array.
15. Demonstrate a program to find the product of two numbers using a
CO3 A 3
function.
16. Write a C program to take p,n,r values from the user and compute the
CO6 A 3
simple interest. Also, store all the details in a file.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Define Tokens in C and describe the different types of tokens
CO1 R 6
available in C language.
b
CO1 U 6
. Write the algorithm to print the size of all primitive data types.
20. Construct a C program to find out the number “5” from the
CO4 C 12
following array using linear search. Ex: 8, 6, 5, 7, 3, 2.
22. a. Describe the concept of “function with arguments and with return
type” and “function with arguments and no return type” with CO4 U 6
examples.
b Define recursion. List the advantages and disadvantages of
CO4 U 6
. recursion.
23. a. Explain how the pointer variable is declared and initialized. CO5 U 6
b Write a C program to swap two numbers using the call by reference
CO5 A 6
. (use pointers).
COMPULSORY QUESTION
24 a. Define structure and write the general syntax for declaring and
CO6 R 6
accessing members in C programming.
b Create a C program to store and print the name, reg_no, address,
CO6 C 6
. and phone_no details of a student using structure.
CO – COURSE OUTCOME BL – BLOOMS’ LEVEL
COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development process.
CO2 Identify the memory management to represent the real time data for computation.
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using divide and conquer
approach.
CO5 Formulate algorithms and programs using arrays, pointers and structures.
CO6 Create a new application software to solve real world problems.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Write the output for the following program.
CO1 A 1
print(5*2**4//2)
2. Predict output for the given code.
st="karunya university" CO1 U 1
print("%18.7s"%st)
3. Interpret output for the following code.
x = "Hello"
CO2 U 1
for i in x:
print(i.upper(),end="")
4. Identify the output for the following program.
animals = ["Lion","Tiger","Cheetah"]
for x in animals:
CO2 U 1
if x == "Tiger":
break
print(x)
5. Write the output for the following code.
class test:
def __init__(self, a):
self.a = a
CO3 A 1
def display(self):
print(self.a)
obj = test(25)
obj.display()
6. Name the method used to load the objects in a file using pickle. CO3 R 1
7. Predict the shape for the following turtle program.
import turtle
my_pen = turtle.Turtle()
for i in range(5): CO4 U 1
my_pen.forward(50)
my_pen.right(144)
turtle.done()
8. Recall the correct method used to convert the image from color to
CO4 R 1
grayscale.
9. List the layouts used in Graphical User Interface. CO5 R 1
10. Name the widget used to create a multiline text box. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Write a program to check eligibility to vote in India by getting age as
CO1 A 3
user input.
12. Develop a python program to encrypt the following text with key value
as 5. CO2 A 3
Input Text: cse
13. List the differences between method and constructor. CO3 R 3
14. Write a program to load an image and display its width and height. CO4 A 3
15. Illustrate the differences between terminal-based interface and graphical
CO5 U 3
user interface.
16. List any three methods in threads. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Write a program to perform arithmetic operations. CO1 A 6
b
List out the different data types in python with an example. CO1 R 6
.
18. a. Write a Python program to get a string from the user where all
occurrences of its first char have been changed to ‘*’ except the CO2 A 6
first char itself.
b Develop a Python function that accepts a file and performs the
. following operation:
a. Calculate the number of upper-case letters and lower-case CO2 A 6
letters from the entire content of the file.
b. Copy the contents from one file to another file.
19. a. Create a class ‘complex ‘and create two instance variables ‘real’
and ‘Imaginary’. Overload the operators ‘+’ and ‘-‘to perform CO3 C 6
complex number operation using operator overloading methods.
b Write a python program to generate 10 random numbers from 1 to
CO3 A 6
. 50 and insert it into a list.
20. Identify the suitable code that read an image and carry out the
following tasks on it and save each modified image in a separate
file.
Rotate the image by 30 degrees in clockwise direction
Change the image to black and white. CO4 U 12
Reduce the image to half of its size.
Resize the image to (800,400).
Flip the image to Top to Bottom
Convert the image to grayscale
21. a. Write a python GUI program to implement the Triangle Area CO5 A 6
calculator as given below:
b Create the following GUI based application to calculate the age of a
. person in years, months, days and display the same.
CO5 C 6
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the use of header file. CO1 R 1
2. Infer the role of preprocessor directive in C programming. CO1 U 1
3. Enumerate any two delimiters used in C language. CO2 R 1
Write the C statement to find whether the person is eligible for vote or
4. CO2 A 1
not using conditional operator.
5. List the types of flow control statements. CO3 R 1
6. Recall the syntax of “do...while” loop. CO3 R 1
7. Enumerate the various sorting algorithms in C programming. CO4 R 1
8. Identify the method used to find the length of a string. CO4 R 1
9. Define recursion. CO5 R 1
10. Recognize the abbreviation for DNA. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Sketch the structure of C program. CO1 A 3
Examine the final value of x in the following C code.
#include <stdio.h>
void main()
12. { CO2 R 3
int x = 6*2/( 2+1 * 2/3 +6) +8 * (8/4);
printf("%d",x);
}
13. Predict the output of the given C program. Justify your answer. CO3 U 3
1. #include <stdio.h>
2. int main()
3. {
4. for( ; ; )
5. {
6. printf( " C programming " );
7. }
8. return 0;
}
Illustrate how the initialization of a 1D-array takes place during its
14. CO4 U 3
runtime by a C program.
15. List the advantages and disadvantages of recursion. CO5 R 3
16. Define RNA Purification. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Identify the method to be adopted to achieve the goal for the given
problem and explain it in detail. A Team lead in an IT company
17. a. CO1 R 8
needs to produce superior software that meets and exceeds all
customer expectations and demands.
b Construct a C program that demonstrates the various format
CO1 A 4
. specifiers used in C language.
Write a program that uses an "else-if" ladder to find out the grades
of a student. The marks obtained by a student in five different
subjects are given as input through the keyboard.
19. a. CO3 A 6
COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development process.
CO2 Identify the data type to represent the real time data representation and operators for computation.
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using divide and conquer
approach.
CO5 Formulate algorithms and programs using arrays, pointers and structures.
CO6 Create a new application software to solve real world problems.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Guess the output for the following Python code,
K=8.67
CO1 A 1
L= “Karunya”
Print(K+L)
6. Write a python code to read the content from a file a.text which has the
CO2 A 1
path C:\Users\AE\Desktop\a.text.
7. A class definition is a_______________ for each of the __________ in
CO3 A 1
that class.
8. ___________ is a free library for the Python programming language
which supports opening, handling, and saving many different Image file CO4 R 1
formats.
9. _______________is a technique by which the widgets are organized,
CO5 R 1
positioned and aligned properly in tkinter window.
10. ____________attribute is used to align the widget inside the grid cell of
grid layout manager. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Predict the output for the following Python code, CO1 A 3
k = ("hello", "python", 5,6.7)
print (k[2:]);
print (k[0:2]);
print (k);
print (k + k);
print (k * 4);
print (type(k))
k[2] = "hi";
12. CO2 U 3
List and explain the File Modes available in Python.
13. Write an example code for Mutator method and Accessor method in
CO3 R 3
Python.
14. CO4 A 3
Develop a python code to print a letter “T.”
15. CO5 A 3
Make short notes on Model View Controller pattern.
16. List the applications of python thermopy libraries to aerospace
CO6 A 3
engineering.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Enumerate different types of operators in Python and write 4 types
CO1 R 12
of operators with an example of code.
20. List the Inheritance types available in Python and Explain two
CO3 U 12
inheritances with an example of code with a proper explanation.
21. a. Explain the polymorphism and write code in order to overload the
CO3 A 8
operator "+" and the operator "<".
b Write a python program to draw a color filled your mobile shape
CO4 A 4
. using turtle.
22. a. Develop a python code to draw a following star and hide the turtle
CO4 C 6
arrow mark.
b Create a python code that shows the properties of an image and
CO4 C 6
. explains each line.
COURSE OUTCOMES
CO1 Choose The Basic Programming Constructs of Python Suitably.
CO2 Infer The Concepts of String Processing, File I/O, Lists and Dictionary.
CO3 Apply Modules for Reusability and The Object-Oriented Principles for Modeling and Developing
Software System.
CO4 Utilize The Power of Graphics for Processing Images.
CO5 Construct Applications with Graphical User Interface.
CO6 Develop Software Solutions Using Standard Libraries for Mechanical Applications.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Write the need for frequent inspection in an agile project. CO1 A 1
2. Sketch the PDCA Cycle. CO1 A 1
3. Discuss on high cohesion and low coupling. CO2 U 1
4. Define a System Metaphor. CO2 R 1
5. Recall the importance of user story. CO3 R 1
6. List the use of scrum in different applications. CO3 R 1
7. Define epic user stories. CO4 R 1
8. Define an artifact. CO4 R 1
9. List few steps to increase velocity. CO5 R 1
10. Write the importance of portfolio. CO6 C 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Classify a system metaphor in agile project based on its applications. CO1 An 3
12. Express the objective of Liskov Substitution Principle. CO2 C 3
13. Discuss sprint planning. CO3 U 3
14. Identify the methods to create product roadmap. CO4 R 3
15. Present few ideas on Traditional versus Agile Procurement CO5 A 3
Management.
16. Discuss on automated testing. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
As a software developer or engineer, you may want to use the
design principles in the object-oriented design process to create a
17. a. system of interacting objects and resolve software problems. State CO1 R 8
the overall execution of Single Responsibility Principle for this
purpose.
b Explain traditional and Agile project Management with few real CO1 A 4
. time examples.
COURSE OUTCOMES
CO1 Describe the principles and practices of Agile methods in software development.
CO2 Explain the processes and strategies of the various Agile technologies in terms of work products,
roles and practices.
CO3 Choose appropriate managing techniques to solve issues in real time applications.
CO4 Describe the techniques and tools used to improve team collaboration and software quality
CO5 Identify and address the most common problems encountered in the use of Agile methods.
CO6 Apply Agile practices when multiple teams are working on a single project.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Write about Unfettered transparency in an agile project. CO1 C 1
2. List down any 5 benefits of Agile development. CO1 R 1
3. Discuss on Dependency injection. CO2 U 1
4. Define opacity. CO2 R 1
5. Identify some common factors of a Kanban board. CO3 R 1
6. Define product backlog. CO3 R 1
List the set of requirements that belong together and will constitute a
7. CO4 R 1
solid set of functionality in a release to the customer.
8. Write the prerequisites for any requirement process. CO4 A 1
9. Infer few ideas on Agile procurement. CO5 C 1
10. Define proactive quality. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Examine a Traditional Tester compared with Agile Tester. CO1 R 3
12. Examine rigidity and fragility of agile design. CO2 A 3
13. Write the characteristics of Scrum Master. CO3 A 3
14. Write the steps to initialize user stories. CO4 A 3
15. Identify few factors of project length in managing time and cost. CO5 U 3
16. Recall the ideas of creating product vision. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Infer on the following Principles on how the projects are handled CO1 An 12
based on the given models:
a) Liskov Substitution Principle b)Single responsibility
principle.
18. a. Explain the 12 Agile design principles with a real time scenario. CO1 A 6
b Examine few agile approaches over traditional approach in software
CO1 R 6
. development process.
COURSE OUTCOMES
CO1 describe the principles and practices of Agile methods in software development.
CO2 explain the processes and strategies of the various Agile technologies in terms of work products, roles and
practices.
CO3 choose appropriate managing techniques to solve issues in real time applications.
CO4 describe the techniques and tools used to improve team collaboration and software quality
CO5 identify and address the most common problems encountered in the use of Agile methods.
CO6 apply Agile practices when multiple teams are working on a single project.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List the benefits of augmented reality. CO1 R 1
2. Recall the CAVE concept in virtual reality. CO1 R 1
3. State five key technical requirements for ‘presence’. CO3 A 1
4. Distinguish between position and motion trackers. CO2 E 1
5. State the effects of vergence-accommodation conflict. CO3 R 1
Write the steps to create a simple game that uses ball tracking in
6. CO6 C 1
basketball using Unity 3D tool.
Describe how virtual reality treatment can help people with
7. CO5 R 1
arachnophobia.
8. Visualize tangible user interfaces in augmented reality. CO4 C 1
9. Give examples of using augmented reality for workplace productivity. CO5 U 1
10. Describe Microsoft’s Holoportation technology. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Compare tactile and force feedback in virtual environments. CO2 An 3
12. Analyze the issues of virtual reality on human health and safety. CO3 An 3
13. Summarize motion capture technology for virtual reality systems. CO1 U 3
14. Explain how object interaction works in a 3D world. CO4 U 3
Discuss the concept of foveated rendering for perception-based
15. CO5 U 3
graphics.
16. Assess the significance of augmented identity. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the five classic components of a virtual reality system. CO1 U 6
b Evaluate the impact of augmented and virtual reality technologies
CO1 An 6
. on the future of human experience.
Explain the different types of input devices in virtual reality and
18. a. CO2 An 8
judge the usage of data gloves and gesture interfaces.
b
Classify the types of virtual reality graphics content. CO2 U 4
.
Write short notes on the following: image plane and voodoo doll
22. a. CO3 C 8
interaction, go-go and occlusion method, and HOMER technique.
b
Illustrate Milgram’s mixed reality continuum. CO4 A 4
.
COURSE OUTCOMES
CO1 Describe the augmented reality and virtual reality technologies.
CO2 Demonstrate motion trackers, navigators in augmented and virtual reality environments.
CO3 Estimate the effect of virtual reality and augmented reality simulation on users.
CO4 Analyze camera tracking and 3D rendering in augmented reality.
CO5 Identify the various modeling techniques in virtual reality.
CO6 Design real-time applications using virtual and augmented reality.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recall the term voiced speech. CO1 R 1
2. Define an auditory phonetics. CO1 R 1
3. Express the formula to calculate short time energy. CO2 U 1
4. State musical sound waves. CO2 R 1
5. Enumerate the parameters of gaussian mixture models. CO3 R 1
6. Give examples for conventional acoustic models. CO3 U 1
Name the algorithm which is used for parameter estimation of the
7. CO4 R 1
gaussian mixture models.
8. Identify the types of layers in deep neural network. CO4 R 1
9. Define high level features. CO5 R 1
10. Express the term multitask learning. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Indicate the types of phonetics. CO1 U 3
12. Identify the three basic steps of pattern recognition model. CO2 U 3
13. Summarize the shortcomings of gaussian mixture models. CO3 U 3
14. Infer the role of activation function in deep neural network. CO4 U 3
Explain how the deep neural network automatically learn the feature
15. CO5 U 3
representations.
16. Name the three main applications of multitask and transfer learning. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the basic architecture of automatic speech recognition
17. a. CO1 U 6
system.
b Classify speech sounds with examples. CO1 U 6
.
22. a. Identify the key property of a good feature in deep neural network. CO5 U 6
b Explain the important adaptation techniques developed for deep
CO5 U 6
. neural networks.
COURSE OUTCOMES
CO1 understand the fundamentals of speech processing techniques.
CO2 choose the appropriate speech analysis techniques.
CO3 design a suitable acoustic model for a given input speech.
CO4 illustrate the models for recognizing given input speech.
CO5 describe the learning using Deep Neural Networks for a given speech.
CO6 develop an advanced deep model for Automatic Speech Recognition.
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
CO
1. Compare the voiced and unvoiced speech. 1 U 1
CO
2. Define acoustic phonetics. 1 R 1
CO
3. State Log Spectral distance. 2 R 1
CO
4. List the spectral analysis model. 2 R 1
CO
5. Express the markov assumption. 3 U 1
CO
6. Enumerate the applications of Markov Models. 3 R 1
CO
7. Identify the DNN model parameter. 4 U 1
CO
8. Name the non linear activation function. 4 R 1
CO
9. Explain the necessity of softmax layer in Deep Neural Network. 5 U 1
Predict features extracted through unsupervised learning can perform CO
10. classification tasks equally well as supervised training. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Explain the Analysis and Synthesis filter bank. CO An 3
1
12. List the advantages of Mel frequency cepstral coefficients (MFCC). CO U 3
2
13. Illustrate the Gaussian Mixture Model. CO An 3
3
14. Give examples of activation function. CO U 3
4
15. Distinguish low level and high level features. CO An 3
5
16. Describe the robustness of the noisy digit recognition task by using CO
U 3
multitask learning. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Differentiate Musical and Non- musical sound waves. CO An 8
1
b. Describe the acoustic theory of speech production. CO U 4
1
18. a. Compare the various Spectrum Distortion Measures in Speech CO An 8
Recognition applications. 2
b. Explain the basic steps in pattern recognition model. CO U 4
2
19. a. Identify the characteristics of Hidden Markov Model. CO U 8
3
b. Discuss the Expectation Maximization (EM) algorithm. CO U 4
3
20. a. Analyze the practical issues of Deep Neural Network constructions. CO An 8
4
b. Discuss the architecture of DNN-HMM Hybrid Systems. CO U 4
4
21. a. Construct the feature hierarchy of Deep Neural Network. CO A 8
5
b. Explain the steps involved in feature processing framework. CO U 4
5
22. a. Describe the practical issues in Deep Neural Network. CO U 8
4
b. Explain the working principle of back propagation algorithm. CO U 4
4
23. a. Illustrate the various components of a typical speech to speech CO An 8
translation system. 3
b. Describe the application of ASR in human–machine communication. CO U 4
3
COMPULSORY QUESTION
24. a. Explain the architecture of the shared-hidden-layer multilingual Deep CO U 8
Neural Networks. 6
b. Discuss on Multiobjective Training of Deep Neural Networks for CO U 4
Speech Recognition. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the fundamentals of speech processing techniques.
CO2 Choose the appropriate speech analysis techniques.
CO3 Design a suitable acoustic model for a given input speech.
CO4 Illustrate the models for recognizing given input speech.
CO5 Describe the learning using Deep Neural Networks for a given speech.
CO6 Develop an advanced deep model for Automatic Speech Recognition.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. List the various types of analytics in Bigdata platform. CO1 R 1
Identify the mode from the given sample. {154cm, 139cm, 154cm,
2. CO1 R 1
192cm, 180cm, 140cm, 154cm, 155cm, 192cm}
3. Differentiate interactive and batch mode in R programming. CO2 U 1
4. Infer the different types of integration methods used in R Hadoop. CO2 U 1
5. Write the command for local mode grunt shell. CO3 C 1
Recite the different steps used for reading a data from the Hadoop in Pig
6. CO3 R 1
Latin.
7. Deifine RDD in Spark. CO4 R 1
8. Write the spark shell command for to count the items available in RDD. CO4 C 1
9. Identify the four file formats supported by HIVE. CO5 R 1
10. Compare Cassandra and RDBMS. CO5 U 1
PART – B (6 X 3 = 18 MARKS)
11. Write short notes on any two modern bigdata tools. CO1 C 3
Illustrate the integration of R and HADOOP and elaborate RHADOOP in
12. CO2 U 3
detail.
13. Explain the scalar data model of Pig with suitable examples. CO3 U 3
Visualize the Directed Acyclic Graph (DAG) in Spark architecture with
14. CO4 R 3
neat diagram.
15. Discuss about various features of HIVE. CO5 U 3
16. Tabulate the various Cassandra collections that are used to handle tasks. CO5 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No 17 to 23, Q.No 24 is Compulsory)
17. a. From the shuffled pack of cards, a card is drawn. This trial is CO1 A 8
repeated for 400 times, and the suits are given below:
Suit Spade Clubs Hearts Diamonds
No. of times drawn 90 100 120 90
COURSE OUTCOMES
CO1 understand the importance and challenges of Big data
CO2 design applications using HADOOP and RHADOOP
CO3 identify the appropriate function of PIG data model to be used in development
CO4 model Big data applications schema and use HIVE QL
CO5 develop applications with Cassandra
CO6 build applications with HDFS and MapReduce
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List out the 3V’s in Big Data. CO1 R 1
2. Define semi-structured bigdata. CO1 R 1
3. List any two modern big data analytics tools. CO2 R 1
4. List the various HADOOP Eco Systems CO2 R 1
Which language is used to process the data which is stored in the HDFS
5. CO3 U 1
where the programmers will write the scripts?
6. Write the syntax for load and store operator of Pig. CO3 A 1
Which platform is used to develop SQL type scripts to do MapReduce
7. CO4 U 1
operations?
8. Explain the three types of complex data model of Pig CO4 U 1
9. List the various data types used in HIVE. CO5 R 1
10. Write the syntax for Cassandra’s write operation. CO5 A 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Define Prediction error in Bigdata analytics. CO1 R 3
12. Differentiate RDBMS versus HADOOP CO2 An 3
13. Differentiate Pig and SQL CO3 An 3
14. Discuss about various features of HIVE. CO4 U 3
15. Describe the components of Cassandra in detail. CO5 R 3
16. Compare Cassandra and RDBMS. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the various types of bigdata in detail. CO1 U 6
b
CO1 U 6
. Explain the modern bigdata analytics tools in detail.
18. a. Explain the architecture of HADOOP with its core components. CO2 An 12
20. a. Determine the following Pig Relational operators with suitable CO3 A 6
examples.
a. Distinct b. Filter c. Split d. Union
b Illustrate the two execution modes of PIG
CO3 An 6
.
23. a. Explain the HDFS architecture and MapReduce algorithm in detail. CO6 An 6
b Examine the YARN client mode with a neat diagram.
CO6 R 6
.
COMPULSORY QUESTION
24. a. Enumerate the architecture and components of Spark Standalone. CO6 U 6
b Explain any four SPARK RDD transformation methods in detail.
CO6 An 6
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the importance and challenges of Big data
CO2 Design applications using HADOOP and RHADOOP
CO3 Identify the appropriate function of PIG data model to be used in development
CO4 Model Big data applications schema and use HIVE QL
CO5 Develop applications with Cassandra
CO6 Build applications with HDFS and MapReduce
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define the two areas of cognitive science. CO1 R 1
2. State cognitive computing. CO1 R 1
3. Differentiate between two Systems of Judgment and Choice. CO2 U 1
List out the tools that are required to capture meaning from non-textual-
4. CO4 U 1
based sources such as videos and sensor data.
5. Mention the two areas from which cognitive computing has evolved. CO2 U 1
List the set of tools and processes that are used to design and implement
6. CO4 R 1
data warehouses and data marts.
7. Define Decision tree. CO4 U 1
Infer the ability of a mind to reshape reality, and this type of reshaping
8. CO3 An 1
of a mind is highly possible in a big data environment.
9. Write a note on Text analytics. CO3 R 1
10. Write a short note on Morphology. CO3 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Find two domains that are suitable for cognitive computing CO1 A 3
12. Infer the process of phonology with an example. CO3 An 3
13. List the applications of visual analytics. CO3 U 3
Illustrate the three characteristics (called 3Vs) of the environmental
14. CO3 U 3
events by which the big data is defined.
15. Describe the use of ASR in speech recognition. CO6 U 3
16. Express your views on Semantic-Web. CO3 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe the architecture of the cognitive system with a diagram. CO1 R 6
b Enumerate the applications of Cognitive Systems and explain how
CO1 R 6
. they are used in various domains.
Artificial Intelligence is the foundation of cognitive computing.
18. a. CO1 U 7
Justify the above statement.
b
CO1 R 5
. Sketch the Components of a Cognitive System.
List the differentiating characteristics for designing a cognitive
19. a. CO1 A 5
system.
b
CO4 A 7
. Explain the types of Machine Learning with examples.
20. a. Enumerate the steps for STE-M Model with a diagram. CO4 R 6
b
CO4 R 6
. Label the Analytics Evolution and describe it in detail.
Construct a “ Bayes net” for the given scenario:
Modeling an ecosystem and deriving sound probabilities on
21. a. whether certain species are at risk by certain industrial CO4 U 6
developments. Assume the necessary factors influencing the given
scenario.
b Interpret the process of Text analytics Working and the Business
CO2 U 6
. Value of Text Analytics.
22. a. Infer the Role of NLP in a Cognitive System. CO3 U 7
A medical equipment manufacturer embeds sensors in its
equipment to monitor performance. The recorded data is constantly
b
streamed and analyzed to predict potential failures with enough lead CO4 E 5
.
time to make adjustments and avoid harm to patients. Justify which
analytics can be applied to predict the failures in machinery.
Infer how the Natural Language Technologies are applied
23. a. CO3 An 10
to Business Problems.
b
CO3 R 2
. Describe Taxonomies.
COMPULSORY QUESTION3
Enumerate the process of computer vision and discuss its
24. a. CO6 R 7
applications in various domains.
b
Recite how IBM Watson is used for Commercial Applications. CO5 R 5
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Outline the importance of cognitive computing
CO2 Analyze the business implications of cognitive computing
CO3 Apply natural language technologies to business problems
CO4 Apply machine learning for a specific real-world application
CO5 Develop Chabot applications for business problems
CO6 Develop Cognitive applications in health care using machine learning
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. State cognitive science. CO1 R 1
2. List the types of cognition processes. CO1 R 1
Enumerate three domains that have led to the development of cognitive
3. CO2 1
computing. R
4. Write a few examples of Intelligent Systems. CO4 A 1
5. Name two disadvantages of cognitive computing. CO2 R 1
6. Interpret the uses of Natural Language Processing. CO4 U 1
7. Define machine learning. CO4 R 1
8. Infer your views on the corpus. CO3 An 1
9. Write two key elements of the machine learning process. CO3 A 1
10. Recite the meaning of Speech Analytics. CO3 R 1
PART – B (6 X 3 = 18 MARKS)
COURSE OUTCOMES
CO1 Outline the importance of cognitive computing
CO2 Analyze the business implications of cognitive computing
CO3 Apply natural language technologies to business problems
CO4 Apply machine learning for a specific real-world application
CO5 Develop Chabot applications for business problems
CO6 Develop Cognitive applications in health care using machine learning
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Classify the basic topologies in terms of line configuration. CO1 U 1
2. List the services provided by the application layer in the OSI model. CO1 R 1
A receiver receives the bit pattern 01101011. The system uses the even
3. CO2 An 1
parity, is the pattern in error.
4. Sketch out the frame format of HDLC Protocol. CO2 A 1
5. Cite the data rate of fast Ethernet. CO3 U 1
6. Define Frame Tagging. CO3 R 1
7. Identify the benefits of Wireless Mesh Networks. CO4 U 1
8. Report on the purpose of Global System for Mobile Communication. CO4 R 1
Demonstrate the netid and hostid for the IP address 127.23.4.0 and state
9. CO5 An 1
the class too.
10. Interpret the various types of Open Shortest Path First connections. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Differentiate between star topology and bus topology with a neat
11. CO1 An 3
sketch.
Construct the CRC for a given 10-bit sequence 1010011110 with a
12. CO2 An 3
divisor of 1011.
State the Handoff Mechanism and differentiate hard handoff and soft
13. CO3 An 3
handoff.
14. Examine how registration takes place in Mobile IP. CO4 U 3
15. Draw the frame format of IPv4 and explain each field. CO5 U 3
16. Explain the congestion control associated with the transport protocols. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
a Discuss on how the communication between two devices are
17. CO1 U 4
. carried out in terms of direction of data flow.
b
Examine the concerns of the layers in OSI model. CO1 An 8
.
Examine the role of the MAC sub layer in wireless networks and
a
19. break down the workings of the distributed coordinated function CO3 An 6
.
with its benefits and potential drawbacks.
b
Explain in detail on MAC/IP address conversion protocols. CO3 U 6
.
COURSE OUTCOMES
CO1 Understand the components and layered architecture of communication networks.
CO2 Identify the protocols and services of data link layer.
CO3 Analyze the different LAN technologies for building networks.
CO4 Describe the wireless WAN technologies for wireless transmission.
CO5 Design network model and determine the routing protocols for different applications.
CO6 Construct communication networks for supporting different applications.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
What is the relationship between protocols and layers? Name some
1. CO1 U 1
protocols of transport layer.
2. Draw and write a note on Bus Topology. CO1 R 1
Give the importance of Encapsulation and decapsulation in protocol
3. CO2 An 1
layering in Internet.
Can a server retrieve a file from client site with File Transfer Protocol?
4. CO2 A 1
If yes, justify your answer otherwise give reason for the same.
5. Define the term “Piggybacking”. CO4 R 1
a. Rewrite the following address using Decimal Notation
01011110 10110000 01110101 00010101
b. Rewrite the following address using Binary Notation
170.40.120.212
6. CO4 C 1
c. Identify the class for the following classful addressing.
11011111 10110000 00011111 01011110
d. Identify the class for the following classful addressing.
200.36.2.3
7. What is Inter-domain Routing and Intra-Domain Routing? CO3 U 1
8. Draw the packet format of Ethernet. CO5 R 1
Write the use of Traffic Shapping in networks. Name two algorithms
9. CO4 U 1
for traffic shaping.
10. What is IoT? Give example. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. What are the criteria necessary for an effective and efficient network? CO1 R 3
Answer the following:
(i) DNS stands for…………
12. CO2 U 3
(ii) Define DNS.
(iii) How does DNS work?
Draw and explain the fields of user datagram packet format. List out the
13. CO3 R 3
UDP services.
Identify and explain the technology that allows a site to use a set of
14. private addresses for internal communication and a set of global CO4 A 3
Internet addresses for communication with the rest of the world.
Write a short note on Carrier Sense Multiple Access protocol (CSMA).
15. CO5 R 3
Mention the CSMA access modes.
16. Explain SDN Architecture. CO6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Consider the network diagram which uses a switching technique to
optimize the use of the channel capacity available in digital
telecommunication networks, such as computer networks, and
minimize the transmission latency.
(i) Identify and describe the switching technique employed for the
communication in the diagram.
17. a. CO2 E 10
b Justify with proper reason, why the packets received are not in
CO2 E 2
. order in 17(a).
In a network, there are 100 systems where every system uses TCP
protocol. Due to heavy traffic, the performance of the network gets
19. slow down. CO4 U 12
How do TCP overcome this situation to increase the performance of
the network? Elaborate in detail.
Compare and contrast the fields in the main headers of IPv4 and
20. a. CO3 An 6
IPv6.
A router receives a packet with the destination address
b
192.54.87.12. Show how the router finds the network address of the CO3 A 6
.
destination.
21. a. Consider the given figure. Three stations want to transmit their CO5 E 6
information using common transmission medium without any
collision. But during data transmission, collision happens as shown
in the given figure. Identify the type of the protocol used in this
figure. Also, state the reason for the collision.
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
1. Predict the functionality of Memory Address Register. CO1 U 1
2. List out the components of an I/O module. CO3 U 1
3. Identify the basic steps in an instruction execution. CO5 R 1
4. State the requirement of the program counter in the processor. CO4 U 1
5. Classify the types of External Devices. CO3 R 1
6. State the advantage of Direct Memory access (DMA). CO4 R 1
7. Determine the type of addressing mode. CO4 A 1
18. a. Describe the cache mapping techniques with suitable diagrams and CO2 U 8
also list out the merits and demerits of each mapping technique.
b. With a neat Sketch, explain the Instruction Cycle State Diagram CO4 U 4
with Interrupts.
19. Sketch the instruction execution state diagram and relate CO3 A 12
the instruction execution process with the state diagram.
20. a. Illustrate the use of interrupt driven I/O for reading a block of data CO3 An 8
and discuss how it eliminates needless waiting
b. Sketch the five-state process model and explain the three types of CO5 A 4
process scheduling.
22. a. Describe the Booth Algorithm for Signed operand Multiplication. CO4 A 8
Multiply 3* (-5 ) by Booth Algorithm
b. Describe the role of the operating system in process scheduling. CO3 R 4
23. a. Analyze the diagrams shown in Fig A and Fig B, name and explain CO5 An 6
the category of Addressing modes shown in the representation.
Fig A
b.Compare and contrast between RAW (Read after Write) hazard and CO5 E 6
WAR (Write after Read) hazard.
COMPULSORY QUESTION
24. a. Discuss the sequence of micro-operations required for the execution CO6 U 6
of fetch, indirect and interrupt sub cycle.
b. Compare and contrast Hardwired and Micro programmed CO6 An 6
implementation.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Explain function of the central processing unit.
CO2 Develop algorithms for error correction for memory modules (main and cache memory).
CO3 Design and understand various input and output modules for central processing unit.
CO4 Select and use standard addressing modes for logical and physical memory addressing.
CO5 List and define various stages of instruction pipelining in processor.
CO6 Explore various ways to implementing the micro instruction sequencing and execution.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Distinguish between ADC and DAC. CO1 U 1
2. Mention a suitable sensor and actuator for the measurement of Force. CO1 A 1
3. State the significance of feedback system in the amplifier. CO2 R 1
4. Recall the term Propagation delay. CO2 R 1
5. State the significance of transducer calibration program. CO3 R 1
6. Enumerate the key elements of LabVIEW. CO3 R 1
7. Calculate 2’s complement of 1010. CO4 A 1
8. Define the term relative accuracy. CO4 R 1
9. Define Sampling. CO5 R 1
Express mathematically the cross-correlation function between two
10. CO6 U 1
signals x(t) and y(t).
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Identify the various noises present in the communication system. CO1 U 3
12. Compare latches and flip-flops. CO2 U 3
Identify the main considerations in creating a DAQ application in a
13. CO3 U 3
tablet.
Interpret the conversion of binary to gray code and vice versa using a
14. CO4 A 3
circuit diagram.
15. Review the various data acquisition packages. CO5 U 3
Calculate the quantization noise and the corresponding signal-to-noise
16. ratio for a full range sinusoidal signal for a 12-bit D/A converter with a CO6 A 3
5.000 V reference.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Trace the basic block diagram for digital signal processing. CO1 U 3
b Illustrate the working of a 3-bit Successive approximation ADC
CO1 A 9
. with circuit diagram.
18. a. Summarize the Ethernet communication with special reference to CO2 U 8
the ethernet frame structure.
b
Sketch the various types of clock skews with necessary diagrams. CO2 A 4
.
Compute the static accuracy requirement for a high-speed
19. a. CO3 A 8
computer-based DAS with MSE ≤ 0.2%.
b
Summarize the two extreme design cases for portable DAQ system. CO3 U 4
.
20. a. Explain the working of a Zener diode. CO4 U 5
b Compute the hexadecimal equivalent of 2684 using the suitable
CO4 A 7
. number system conversion table.
21. a. Differentiate between USB and Firewire. CO2 U 7
b Identify the various timing parameters for combinational logic
CO2 U 5
. circuits.
Determine an expression for RMS quantization error for a sawtooth
22. a. CO5 A 9
error waveform ɛ = - kt.
b Summarize the responses of Butterworth, Chebyshev and Bessel
CO5 U 3
. filters.
Discuss the transfer of each byte in GPIB using three-line
23. a. CO6 U 7
handshake control.
b Summarize the general-purpose interface bus classification of
CO6 U 5
. devices.
COMPULSORY QUESTION
Sketch the Fourier transform and Power spectral density of the
24. a. CO6 A 6
following functions: (a) cosine (b) sine (c) square pulse
b
CO6 U 6
. Explain different types of busses to link boards.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Outline the fundamentals of data acquisition, configuration, characteristic and specifications of
various components used in DAS.
CO2 Elucidate the elements of data acquisition techniques.
CO3 Recognize various interfacing issues of ADC’s and DAC’s to a microprocessor/PC.
CO4 Explain the components of data acquisition system.
CO5 Infer bus driver programs and data analysis using data acquisition packages.
CO6 Summarize different data transfer techniques.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Acquisition time of a DAQ system. CO1 R 1
2. Differentiate between active and passive sensors with suitable examples. CO1 U 1
3. List the features of USB connector. CO2 R 1
4. Define Clock jitter. CO2 R 1
5. Classify the various types of noises in a DAQ system. CO3 U 1
6. List any two the advantages of LabVIEW. CO3 R 1
7. Enumerate the applications of a zener diode. CO4 R 1
8. Determine the binary equivalent of 13. CO4 A 1
9. Define Quantization. CO5 R 1
10. Recall the Fourier transform for a non-periodic signal. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Identify the important parameters data acquisition system. CO1 U 3
12. Distinguish between a microprocessor and a microcontroller. CO2 U 3
13. Identify the main tasks performed by an application software. CO3 U 3
Illustrate the comparison between offset binary, 2’s complement and Sign
14. CO4 A 3
magnitude graphically.
15. Summarize the various driver programs for DAQ system. CO5 U 3
16. Identify the various data and control signals included in a DAQ system. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Trace the basic block diagram of Plug-in DAQ system. CO1 U 3
b
CO1 A 9
. Illustrate the working of a 3-bit Flash type ADC with circuit diagram.
COURSE OUTCOMES
CO1 Outline the fundamentals of data acquisition, configuration, characteristic and specifications of
various components used in DAS.
CO2 Elucidate the elements of data acquisition techniques.
CO3 Recognize various interfacing issues of ADC’s and DAC’s to a microprocessor/PC.
CO4 Explain the components of data acquisition system.
CO5 Infer bus driver programs and data analysis using data acquisition packages.
CO6 Summarize different data transfer techniques.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. What is the difference between data and information security? CO1 U 1
2. Define Vulnerability. CO1 R 1
3. What is Information Rights Management (IRM)? CO2 R 1
4. What are the various approaches used to secure unstructured data? CO2 U 1
5. What is the need for Security policy? CO3 U 1
6. List out the Multifactor authentication methods to check the identity. CO3 R 1
What are the elements involved for an effective reference monitor
7. CO4 U 1
concept?
Draw the picture of an application lifecycle portion of an SDL for an
8. CO4 A 1
organization that uses an Agile development lifecycle.
9. What is network hardening? CO5 R 1
10. What is information security law? CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
What are different methods of authentication? Explain each in
11. CO1 U 3
brief.
12. How the data is prevented in modern storage infrastructures? CO2 A 3
13. What are the various aspects of threat? CO3 R 3
14. Differentiate Web server from Proxy Server. CO4 U 3
15. Briefly explain the Wireless Network Security mechanism in detail. CO5 U 3
Write a short note on rights of employees and employers in data and
16. CO6 R 3
information security.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Write a short note on threat and access control. CO1 U 8
b
Discuss about the Malicious Code in detail. CO1 U 4
.
18. a. Explain the concept of encryption in detail. CO2 U 4
b
Explain the best practices followed in database Security system. CO2 U 8
.
COURSE OUTCOMES
CO1 Define the fundamental concepts of data and information security.
CO2 Apply the procedures to secure a system against failure, theft and invasion.
CO3 Discuss the security terms, principles and risk factors.
CO4 Recognize the importance of network security.
CO5 Choose various security operations to secure a network
CO6 Select suitable policies for administering a company’s network.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Discuss about procedural abstraction. CO1 U 1
2. List any two primitive data type. CO1 R 1
3. Name the principle used in queue. CO2 R 1
4. Recall the condition checked during pop operation in stack. CO2 R 1
5. In queue using linked list, locate the position for deletion. CO3 R 1
6. List any two real-time application for doubly linked list. CO3 R 1
7. Identify the worst and best case for time complexity in binary search. CO4 R 1
8. Define sorting and list any three sorting algorithms. CO4 R 1
9. Articulate the terms parent, children, degree with respect to trees. CO5 R 1
10. Identify the walk of a graph with the same origin and terminus. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Calculate the time and space complexity for the following.
for(i=0;i<n;i++)
{
for(j=0;j<n;j++)
{
CO1 A 3
c[i,j]=0;
for(k=0;k<n;k++)
{
c[i,j] =c[i,j]+ A[i,j]*B[i,j];
}}}
12. Write the pseudocode to perform push operation in stack. CO2 A 3
13. Discuss about doubly linked list with suitable example. CO3 U 3
14. Explain binary search with a case-scenario. CO4 U 3
15. Predict the keys in the following binary tree in in-order, pre-order, post-
order, and level order traversals.
CO5 A 3
18. Develop the pseudocode for Postfix evaluation and evaluate the
CO2 A 12
expression ab+ab-/.
20. Develop a pseudocode to delete a node in the last and in the middle
a. CO3 A 6
in doubly linked list.
b Explain the methods to insert a node in singly linked list and write
CO3 A 6
. the algorithm.
21. Apply bubble sort algorithm to sort the data and write the code
snippets to solve the problem. CO4 A 12
data = 24, 36, 17, 95, 28
Produce AVL tree for the following sequence of numbers 30, 50,
23. a. CO5 A 6
20, 10, 7, 16, 32, 46, 12, 48.
Write the pseudo code to insert a node in a binary search tree.
b
Construct a binary search tree by inserting the values 30, 70, 50, 40, CO5 A 6
.
90, 20, 60, 100.
COMPULSORY QUESTION
Explain depth first search algorithm of the graph with an example
24. CO6 U 12
and pseudocode.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the basics of abstract data type and algorithm analysis.
CO2 Illustrate the use of array to implement stack and queue.
CO3 Apply linked list to design stack and queue data structures.
CO4 Demonstrate the working of sorting and searching algorithms and application of hashing.
CO5 Understand the different types of tree data structures and demonstrate the methods for traversing
trees.
CO6 Differentiate the graph representations and traversals.
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
1. Define Retina. CO6 R 1
2. Express about the blind spot. CO6 U 1
3. Enumerate the use of spatial based visualization. CO4 R 1
4. Name the space where the visualization is created. CO4 R 1
5. List the visualization systems based on data type. CO2 R 1
6. Express range distortion. CO5 U 1
7. Extend any 2 aesthatic rules for non-space filling methods. CO1 U 1
8. Enumerate the other issues in visualizing trees and graphs. CO3 R 1
9. State benchmarking procedure. CO2 R 1
10. Define glyph. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
11. State Gestalt Principles. CO R 3
2
12. Six people can build a garage in 3 days. Assuming that all people work at CO C 3
the same rate, create a visual representation showing how many people it 6
take to build a garage in one day.
13. Explain the data structure space in interaction techniques. CO U 3
5
14. Summarize node-link graphs. CO U 3
1
15. Compare geography and cartography. CO U 3
4
16. Express line graphs. CO U 3
3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Illustrate the information overload with real-time example and show CO A 12
how to avoid it. 2
18. Describe visual mapping with examples. CO U 12
4
19. Construct the vector space model in document visualization. CO A 12
3
20. Show the procedures to display hierarchical structures. CO A 12
5
21. Illustrate the visualization techniques for 2-D data with examples. CO A 12
5
22. Design a Collaborative visualization with a Cricket tournament dataset CO C 12
considering 3 persons namely A, B, and C working collaboratively to 1
visualize.
COURSE OUTCOMES
CO1 Design visualization dashboards by utilizing various visualization methods and tools.
CO2 Describe the design process to develop visualization methods and visualization systems, and
methods for their evaluation.
CO3 Summarize large-scale abstract data.
CO4 Understand visual mapping and the visualization.
CO5 Apply actual visualization, interaction and distorting techniques.
CO6 Infer recent visual perception techniques.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define metadata. CO1 R 1
2. Label the goal of the record in visualization. CO1 R 1
3. State glyph. CO2 R 1
4. Enumerate cartography. CO2 R 1
5. List the layouts for network representation. CO3 R 1
6. State the contribution of rods in color vision. CO3 R 1
Name any two parameters for each interaction technique to be applied
7. CO4 R 1
to a specified space/operand.
8. Define tokens. CO4 R 1
9. Recall connecting interaction technique. CO5 R 1
10. Quote the modern integrated visualization system. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Summarize the domain situation. CO1 U 3
12. Differentiate key and value attributes. CO2 U 3
13. Compare hue, saturation and luminance. CO3 U 3
14. Paraphrase interaction operand. CO4 U 3
15. Express visualization structure space. CO5 U 3
16. Extend the variable quality issue of a data. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Illustrate the validation approaches in data visualization. CO1 U 12
2008 2009 2010 2011 2012 2013
Admissions
NSW 154 136 165 159 134 120
Victoria 143 116 91 135 123 94
QL 100 121 110 112 115 86
SA 36 43 32 37 35 37
18. CO2 A 12
WA 65 69 62 63 69 59
Tasmania 16 11 13 17 10 14
NT 7 6 8 5 4 9
ACT 8 8 10 14 8 8
Sketch up a visualization to show ideas of admissions to an
Institution across its branch Institutions.
COURSE OUTCOMES
CO1 Choose knowledge of perception and cognition to evaluate visualization
design alternatives.
CO2 Understand the role of visualization in the processing and analysis of data
coming from a broad range of sources.
CO3 Apply suitable data visualization tools for various applications.
CO4 Identify appropriate data visualization techniques given particular
requirements imposed by the data.
CO5 Describe the cutting-edge research ideas in the field of visualization.
CO6 Apply appropriate design principles in the creation of presentation and
visualization.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. What is Data Abstraction? CO1 U 1
………….. is the logical design of database.
2. ………… is a snapshot of the data in the database at a given instant in CO1 R 1
time.
Are NULL values in a database the same as that of blank space or zero?
3. CO1 An 1
Give reason.
4. Define “Triggers”. Specify the two requirements for trigger mechanism. CO2 R 1
Identify the command used to select only one copy of each set of duplicate
5. CO2 A 1
rows in SQL. Give Syntax for the same.
Define Armstrong’s Axioms in Functional Dependency in DBMS. Name
6. CO3 R 1
the primary and secondary rules.
7. What is an Index? Give a valid syntax for Index in SQL. CO4 R 1
8. Give reason for allowing concurrency. CO4 E 1
9. Identify the situation in which the roll back to a transaction is applied. CO5 A 1
Specify the uses of data warehouse and list the components of data
10. CO6 U 1
warehouse.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Pen-down the role of Data Models and list out the various data models. CO1 R 3
12. Name and define the several SQL language parts. CO2 R 3
What is meant by an entity-relationship (E-R) model? Illustrate the terms
13. CO3 U 3
Entity, Entity Type, and Entity Set in DBMS with an example.
14. Is “all-or-none” property is referred to as atomicity? Justify your answer. CO4 An 3
15. Define “Two-Phase Locking”. Give example. CO5 R 3
16. Present an overview of Database Security. CO6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Differentiate between two-tier and three-tier architectures. CO1 An 4
b Among these two architectures, which is better suited for Web
CO1 An 8
. applications? Give reason.
18. a. Write a note on “Having Clause”. Give the syntax for the same. CO2 A 4
Write a query using “having clause” to retrieve the average salary of
engineers in various departments where the average salary is more
than $50,000 (use the following table - Engineer).
Average
Department Name Salary
ID name (dept_name) (avg_sal)
R Transaction
ATM
CO3 C 12
Write Relational Algebra expressions for the following:
i. List the total transaction amount of “XYZ” ATM branch [3
Marks]
ii. List the transaction details of the transaction id 101 occurred
between 16 hrs to 20 hrs [3 Marks]
iii. List the transaction id and the ATM id for the minimum
transaction amount that occurred at “GGG” [3 Marks]
iv. Draw only the final optimized tree for the above query number
(iii) [3 Marks]
20. Exhibit the structure and properties of B+ Tree and present the
a. CO4 E 8
algorithm for search in B+ Tree with example.
b
CO4 R 4
. Discuss the advantages and disadvantages of B+ Tree.
21. Consider a “Book Management System” that contains book details CO5 E 12
such as the title of the book, author of the book, ISBN, year of
publication, price of the book and available quantity in stock. Further,
if any book buyers are interested to buy the books, then their
information like buyerid, name and address are stored. To check the
available quantity of books in stock and to deliver the books (as
requested by the buyer), the order details such as order number, ISBN,
buyerid, card number, quantity, date of order and shipping date will be
maintained in the database.
Whether the above table has passed all normal forms? If no, elaborate
it in detail with necessary conditions for normal forms and
corresponding tables (for each normal form). If yes, justify your
answer.
22. Consider the following and check if it is serializable. If so, justify your
answer. If not, convert the schedule into non-serial schedule which
satisfies serializability.
CO5 A 12
COURSE OUTCOMES
CO1 Recognize the role of database administrator and database management systems in software
applications and other advanced concepts.
CO2 Use query language to retrieve data efficiently from the database.
CO3 Design the database for the given specification of the requirement using ER method and
normalization.
CO4 Design and implement significant database objects such as file structures and index schemes.
CO5 Describe techniques for transaction processing and concurrency control.
CO6 Implement security in database.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
2. Name the type of weight regularization which tends to move all the CO2 U 1
weight values to smaller values.
3. Recognize the optimization algorithm that use both the learning rate CO4 R 1
parameter and momentum in weight updation equation.
4. If the input image is of size 7x7 and the size of the filter is 3x3, what will CO2 A 1
be the size of the resultant feature map if stride=1 and padding = 0?
5. Identify the number of parameters in VGG-16 architecture. CO2 A 1
6. CO5 An 1
List the applications corresponding to the following Recurrent Neural
Network (RNN) architecture.
11. List at least three activation functions along with its mathematical CO1 An 3
notations.
12. Apply the concept of Biological Neural Network (BNN) to design a CO1 A 3
simple artificial neuron and calculate the output for the following
scenario.
Consider a 3-input neuron has weights (0.1, 0.2, 0.3) and the
corresponding inputs are (1, 1, 1) respectively. If the following
thresholding activation function is used, what will be the output of a
single-layer perceptron?
Output: 1 if Net Input > 0.2
: 0 Otherwise
13. Discuss the two key interesting properties of CNN. CO2 U 3
14. Explain the types of stochastic gradient descent optimization techniques. CO4 U 3
15. State the advantages of Generative Adversarial Networks (GAN). CO3 U 3
16. Compare undercomplete and sparse autoencoders. CO4 An 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Calculate the coefficients of simple linear regression model of the CO1 A 8
form y=a0+a1x for the following dataset and estimate the output for
x=11.
X 2 5 7 10 12
Y 3 7 9 12 14
b. Explain the concept of converting non-linear data to linear data for CO1 An 4
classification purpose using Support Vector Machine (SVM) with
suitable illustration.
18. a. Define learning. Outline the training algorithm used in Perceptron CO1 A 9
network. Apply the algorithm to classify the OR Boolean function
(2-dimensional inputs) into two groups. Show the updated weight
values after one iteration.
Use Net = 1 if Net >= 0.5
= 0 if Net < 0.5
The initial weight vector = [0.1, 0.2], learning rate parameter = 0.2
b. Apply multiple layer perceptron and calculate the output at node u 3 CO1 A 3
using unipolar sigmoidal function (Note: learning rate =1).
19. a. Consider an input image of size 32x32x1 and explain the concepts of CO2 A 7
every layer of AlexNet architecture. Show the size of the output
image at every layer.
b. Consider the following input image and filter. CO2 A 3
Apply the given filter on the input matrix with a stride of 1 and
padding of 0. Obtain ONLY the first and last elements of the
convoluted matrix.
c. An input image has been converted into a matrix of size 25 X 25 and CO2 A 2
applied with a filter of size 5 X 5 with a stride of 2 and padding of 0.
What will be the size of the convoluted matrix?
20. a. Use mathematical notations and explain the concepts of different CO4 An 6
types of adaptive optimization algorithms.
b. State the purpose of regularization techniques. How dropout and CO4 An 6
early stopping techniques will ensure good generalization capability
of the network?
21. a. Draw the architecture and explain the operation of Long Short Term CO2 U 8
Memory (LSTM) in detail using mathematical representations.
b. Compare the gates of LSTM and “Gated Recurrent Units” CO2 An 4
22. a. State the benefit of ResNet architecture compared to other transfer CO2 An 4
learning models. List the variants of ResNet models.
b. Discuss the important blocks of ResNet architecture with neat CO2 An 8
sketch.
23. Justify the following statement with suitable architecture and CO4 An 12
explanations: “Variational autoencoder” is better than the original
autoencoder approach.
COMPULSORY QUESTION
COURSE OUTCOMES
CO1 Understand the basics of deep learning
CO2 Implement various deep learning models
CO3 Realign high dimensional data using reduction techniques
CO4 Analyze optimization and generalization in deep learning
CO5 Explore the deep learning applications
CO6 Apply the algorithms to real time problems
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Calculate the space complexity of the following algorithm:
Algorithm sum (p,q,r)
{
1. p=1; CO1 An 1
q=2;
r=p + q;
}
Write the recurrence relation representing the time complexity
computation of the below-given function:
int Recursive(A, n):
2. if n > 0: CO1 U 1
return Recursive(A, n) + Recursive(A, n-1)
else:
return 1
Express the code word for the character 't' from the Huffman tree given.
3. CO2 U 1
14. CO4 A 3
15. CO5 A 3
Probabilit 17 32 18 45 25
y
20. CO3 A 4
Weight 4 6 3 4 2
23. CO5 A 6
CO5 A 6
COMPULSORY QUESTION
a. Compute the max flow from source to sink in the following graph.
24. CO5 A 6
b
State the CIRCUIT-SAT problem and prove that it is in NP. CO6 R 6
.
COURSE OUTCOMES
CO1 analyze the given algorithm and express its complexity in asymptotic notation.
CO2 design algorithms using brute force and greedy techniques.
CO3 develop dynamic programming solutions for optimization problems.
CO4 propose solutions using Backtracking and the branch-and-bound technique.
CO5 solve problems using fundamental graph algorithms.
CO6 apply the suitable algorithmic technique to solve a problem and identify the problems belonging
to the class of P, NP-Complete or NP-Hard.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Inter-process Communication. CO1 R 1
2. List the characteristics of Distributed System. CO2 R 1
3. Differentiate Synchronous and Asynchronous Communication. CO3 U 1
4. Differentiate shared memory and distributed memory. CO4 R 1
5. What is concurrency in Distributed Systems? CO5 U 1
6. List the types of system model. CO1 A 1
7. Define Multicast operation. CO1 U 1
8. What is peer to peer system? CO2 R 1
9. Name the two basic file system used in distributed computing. CO1 U 1
10. List out the design issues in threads. CO3 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Write a short note on quality of service in distributed systems. CO1 R 3
12. Write the key design issues for distributed file systems. CO2 U 3
13. What is the need of Name service? CO3 U 3
State the use of election algorithm. Mention the different election
14. CO4 U 3
algorithms.
15. Mention the use of Locking. CO5 U 3
What type of infrastructure is provided by multicast message for
16. CO6 R 3
distributed system?
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Distinguish between Centralized vs Distributed scheduling
17. a. CO1 U 6
algorithm.
b What are the different types of models for developing distributed
CO2 R 6
. systems? Explain each model in brief.
Write short notes on Napster and its legacy and Peer to Peer
22. a. CO2 C 6
Middleware.
b
Explain directory services. CO1 R 6
.
23. a. Briefly discuss the architecture and server operation of NFS. CO1 R 6
b What are the different ways of synchronizing physical clocks?
CO2 U 6
. Explain.
COMPULSORY QUESTION
24. a. Explain the basic model for the management of replicated data. CO1 U 6
b
Explain passive replication model for fault tolerance. CO2 R 6
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe the distributed system models.
CO2 Classify inter-process communication mechanisms and their application scenarios.
CO3 Illustrate a transaction and concurrency control scheme for a real time application.
CO4 Compare the various file system architectures used in distributed systems.
CO5 Construct a real time distributed system with suitable IPC, event coordination, file management,
name service, transaction and concurrency control mechanisms.
CO6 Evaluate an efficient distributed system and its qualities.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define ambient intelligent. CO1 R 1
2. Describe the dependence graph. CO1 U 1
3. Show the syntax of data flow modelling in VHDL. CO2 U 1
4. Explain the term “package diagram” CO2 U 1
5. Define the assignment part in scheduling decisions. CO3 R 1
6. Explain the term “loop bound”. CO3 U 1
7. State the significance of GPUs. CO4 R 1
8. Define charge coupled devices sensor. CO4 R 1
9. Recall the data that is collected by profiler for each task node. CO5 R 1
10. Visualize the structure of FPGA based emulation. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Develop the sample requirement form for vending machine. CO1 A 3
12. Trace the block diagram of “calling an answering machine”. CO2 U 3
13. List out the factors that determine the worst case of execution time. CO3 R 3
14. CO4 A 3
18. a. Explain the work flow of Petri Nets with an example. CO2 U 6
b
Describe the dependability requirements of Embedded System. CO2 U 6
.
COURSE OUTCOMES
CO1 Understand specific requirements and problems arising in embedded system applications.
CO2 Design embedded systems using formal models and methods as well as computer-based synthesis
methods
CO3 Apply the formal models and methods in embedded system design in practical applications using
the programming language C, the operating system Free RTOS, a commercial embedded system
platform and the associated design environment.
CO4 Describe embedded architectures and components, hardware-software interfaces, memory
architecture, communication between components.
CO5 Explain embedded operating systems, real-time scheduling theory, shared resources, and
hardware architecture synthesis.
CO6 Identify validation and testing methodologies for embedded system
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
18. Classify the leadership styles and discuss on any 3 leadership styles CO2 An 12
with examples.
19. Discuss on the steps undertaken to file a patent with a supporting CO2 U 6
flow diagram.
Interpret on the various sections and offences of Information Act CO3 U 6
2000.
COURSE OUTCOMES
CO1 Understand professional ethics and organizational culture conduct in information technology.
CO2 Identify the various leadership styles and the suitability for the specific organization.
CO3 Identify the possible Computer crimes and the rules and regulations for protection.
CO4 Familiarize with the various types of IPR and the procedures for obtaining IPR.
CO5 Understand about the various types of Social Networking and issues.
CO6 Relate to the different national and international organizational model with intellectual ability.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Recall the generation of blockchain that has applications beyond
1. CO1 R 1
currency and finance.
Name the term that arbitrarily encompasses any behaviour that is
2. CO1 R 1
unexpected or malicious.
3. Show the shift function for the row values 1, 2, 3, 4. CO2 U 1
4. Give example for a hardware wallet. CO2 U 1
5. List the types of entity authentication. CO3 R 1
6. Infer the term "Bitcoin" with a lowercase b. CO3 U 1
Recite the feature of a smart contract that will always produce the same
7. CO4 R 1
output for a specific input.
Quote the term for the study of protocols governing the decentralized
8. CO4 R 1
digital economy.
State the term that will execute exactly what is written and not what
9. CO5 R 1
the programmer intended.
10. List the key elements of Artificial Intelligence that are decentralized. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
List out the principal challenges associated with blockchain, especially
11. CO1 R 3
in sectors other than banking.
12. Restate the purpose of Near Field Communication technology. CO2 U 3
13. Interpret transaction malleability. CO3 U 3
14. List the properties of Ricardian Contracts. CO4 R 3
15. Define code reuse. CO5 R 3
16. State the limitations of the existing payment system. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Summarize the principle behind blockchain technology and how
17. a. CO1 U 6
many types of it are available.
b Apply Brewer's theorem and describe why a distributed system CO1 A 6
. can't have consistency, availability, and partition tolerance
simultaneously.
Apply the below table values and design the Advanced Encryption
Standard cipher with a suitable diagram.
No. of rounds Cipher Key
18. a. Size CO2 A 6
10 128
12 192
14 256
b Describe how Merkle trees allow secure and efficient verification of
CO2 R 6
. large data sets.
21. a. Compare and contrast between proof of work and proof of stake. CO3 U 6
b Explain how proof of elapsed time promises higher performance
CO3 U 6
. with its time-based election mechanism to achieve consensus.
Enumerate on:
i) Non-deterministic wallets
22. ii) Deterministic wallets CO2 R 12
iii) Hierarchical deterministic wallets
iv) Brain wallets
COURSE OUTCOMES
CO1 Understand the necessity of blockchain and realize where blockchain fits in.
CO2 Compare and contrast cryptocurrencies, blockchain, and concept of wallets.
CO3 Relate classical consensus algorithms with modern algorithms like Proof-of-Work.
CO4 Illustrate the uses of programmable blockchains, smart contracts and oracles.
CO5 Comprehend the various use cases and synergistic layered approach with AI/ML/IOT etc.
CO6 Design and develop blockchain based applications using the principles of cryptoeconomics .
Assessment Pattern as per Bloom’s Taxonomy
CO / P R U A An E C Total
CO1 5 6 6 - - - 17
CO2 18 5 6 - - - 29
CO3 2 21 6 - - - 29
CO4 5 12 12 - - - 29
CO5 4 - - - - - 4
CO6 4 12 - - - - 16
124
Course Code 20CS2027 Duration 3hrs
Course Name GEOMETRIC MODELLING Max. Marks 100
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. Define solid geometry. CO1 R 1
2. Describe refresh rate in computer graphics. CO1 R 1
3. Distinguish between object space and world space. CO2 A 1
4. Visualize window-to-viewport mapping. CO2 R 1
5. Differentiate global and local illumination. CO4 U 1
6. Compare texture magnification and minification. CO5 An 1
7. Compare the three types of Bezier curves. CO3 E 1
8. Construct an example for a 3x5 Bezier patch. CO3 C 1
9. List the elements of 3D graphics. CO6 R 1
10. Write notes on rendering and compositing. CO4 A 1
PART – B (6 X 3 = 18 MARKS)
11. Infer on the usage of geometric primitives. CO1 C 3
Distinguish between right-handed and left-handed 3D Cartesian coordinate
12. CO2 E 3
systems.
13. Summarize bump mapping for volume textures with example. CO4 E 3
14. Illustrate color model transformations. CO3 An 3
15. Examine NURBS in 3D modeling. CO5 A 3
16. Write notes on polygon approximation, reduction and expansion. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss in detail the image processing techniques for computer
CO3 U 6
graphics with illustrative examples.
b. Formulate Digital Differential Analyzer (DDA) algorithm. CO3 C 6
Tabulate the metrics for distance, area and volume used by standard
20. a. CO3 R 6
3D modeling tools.
Explain the concepts of perceived color, colorimetry and color model
b. CO4 U 6
transformation.
21. Review 3D texture mapping types with practical use cases. CO4 U 12
COURSE OUTCOMES
CO1 Understand the basics of geometric modelling techniques in computer-aided design.
CO2 Describe the different coordinate systems and views.
CO3 Explain the tools and mathematical models involved in geometric modelling.
CO4 Identify the appropriate Illumination and rendering techniques for modelling the virtual objects.
CO5 Implement various algorithms to map and render the basic geometrical primitives into complex
models.
CO6 Apply the geometric modelling concepts in the development of CAD applications.
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. List down three types of data. CO3 R 1
2. Recite the science from which Information Retrieval is evolved. CO1 R 1
3. Name the best-known relevance feedback method. CO4 R 1
4. State the final procedure in process of Logical View of the Documents. CO1 R 1
Internet is dumped with Unstructured data, Structured Data, and Semi-
Structured data which increases the complexity, how this issue can be
5. solved? Justify your answer with an example CO1 E 1
6. Infer the formula for recall and precision. CO4 U 1
7. Interpret the ways by which the thesaurus is created. CO4 A 1
8. Define Meta Search Engine. CO5 R 1
Identify which two main classes perform well in the Meta-Search
9. Combination Algorithms. CO5 U 1
10. Distinguish between the in-links and out-links of a directed graph. CO4 U 1
PART – B (6 X 3 = 18 MARKS)
11. Differentiate between browsing and retrieval. CO1 U 3
12. Sketch the taxonomy of information retrieval models. CO1 A 3
13. Describe an inverted file with an example. CO2 U 3
14. List the ways to improve recall in search. CO4 R 3
15. Interpret the two main tasks of Meta-Search. CO4 U 3
16. Infer the directed graph with an example. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Illustrate the vector space model with the algebraic expression and list CO2 A 6
its advantages and disadvantages.
b Explain the logical view of the document with a diagram. CO1 An 6
.
18. Infer the Probabilistic Model and write its advantages and CO1 U 12
disadvantages.
19. a. Explain the process of retrieving information with a diagram. CO1 An 6
b Describe the Boolean model with set theory and list the advantage and CO2 R 6
. disadvantages of the Boolean model.
20. a. State the global analysis method to produce the thesaurus. CO4 R 4
b Define Query Expansion and explain the ways by which the thesaurus CO3 R 8
. is created with example.
21. a. State the steps of how min heap is used for selecting top k out of N. CO4 R 8
b Sketch how the keywords and documents are arranged in the tired CO4 A 4
. index and describe it with an example.
22. Enumerate the steps for Borda ranking and Condorcet Ranking. CO4 R 12
23. a. Illustrate the working of the Page Rank algorithm and explain the CO5 A 6
problems in the Page Rank calculation.
b Express your views on Social Network Analysis. CO5 U 6
.
COMPULSORY QUESTION
24. a. Explain the boosting techniques associated with web spam in detail. CO4 An 6
b Infer your views on Byes net and list down the applications of Byes net. CO6 U 6
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Design an effective text indexing system.
CO2 Familiar with the Boolean and vector-space retrieval models.
CO3 Identify the evaluation and interface issues in text processing.
CO4 Understand IR techniques for the web, including crawling, link-based algorithms, and metadata
usage.
CO5 Develop Document clustering and classification applications.
CO6 Compare traditional and machine learning-based ranking approaches.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List the applications of Internet of Things. CO1 R 1
2. Define Actuator. CO1 R 1
3. Name the components of Smart Home. CO2 R 1
4. Illustrate the security systems of Smart Home. CO5 U 1
5. Select any two inertial sensors for monitoring elderly patients. CO3 U 1
6. State the functionality of Textile Clothing. CO3 R 1
7. Write the sensors used for diagnosis of Neurological diseases. CO4 A 1
8. Review the privacy issues with IoT. CO5 U 1
9. Recall the number of Digital pins in Arduino Uno. CO6 R 1
10. Define COMBAT drones. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Describe the importance of disposal and recycling of electronic waste
11. CO1 R 3
generated by IoT devices.
12. Discuss the ESP8266 controller specifications. CO2 U 3
Appraise the system design of sample collection in wearable chemical
13. CO3 An 3
and biochemical sensor.
14. Illustrate the sensor used for detecting cardiovascular diseases. CO3 A 3
Sketch the block diagram of interfacing sensors with NodeMCU for
15. CO4 A 3
agricultural field automation.
16. Differentiate the types of drones based on their body structure. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Sketch the architecture of IoT and explain the working of the
17. CO1 A 12
connected devices in detail.
18. Relate a real-time scenario of a smart home automation and discuss CO2 A 12
the sensor and communications needed for the following
applications
a. Smart heater and cooling
b. Smart Lighting
c. Smart Furniture
COURSE OUTCOMES
CO1 understand Internet of Things and its hardware and software components
CO2 interface I/O devices, sensors & communication modules
CO3 examine remote data and control devices
CO4 compare the connectivity technologies and protocols in IoT
CO5 infer security issues in IoT
CO6 develop real life IoT based projects
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Differentiate the role of data scientist and data analyst. CO1 U 1
Identify the python command that includes list of all columns with their
2. CO1 R 1
data types and the number of non-null values in each column.
3. Infer the characteristics of scatterplots. CO2 U 1
Write a python code to insert the new row of data {‘Institute’: KITS,
4. CO1 A 1
‘Degree’:B.Tech} at the bottom of the DataFrame.
Discover the broader range dataset among given A and B.
5. A = [6, 19, 21, 3, 7, 28] CO2 A 1
B = [8, 25, 45, 10, 7]
6. Differentiate point estimate and confidence interval estimates. CO2 U 1
A regression model with the following function y = 60 + 5.2x was built
to understand the impact of humidity (x) on rainfall (y). The humidity
7. CO3 A 1
this week is 30 more than the previous week. What is the predicted
difference in rainfall?
Compute the classification Precision from the given confusion matrix.
8. CO6 A 1
19. a. Sales 90 85 68 75 82 80 95 70
No. Of
7 6 2 3 4 5 8 1
Ads CO2 U 6
Calculate the Spearman rank correlation coefficient of the
following sample dataset which describes the sales and number of
advertisements. Infer the correlation.
b A researcher reports that the average salary of assistant professors CO2 A 6
. is more than $42,000. A sample of 30 assistant professors has a
mean salary of $43, 260. At alpha = 0.05, test the claim that
assistant professors earn more than $42,000 a year. The standard
deviation of the population is $5230.Justify the hypothesis.
20. Discuss the working principle of the decision tree for classification
with the ID3 algorithm.Compute the root node and decision for the
following Dataset
CO4 A 12
X1 1 2 2 3 4 5
X2 1 1 3 2 3 5
22. Given the dataset {a,b,c,d,e} and the following distance matrix,
cluster the given dataset using single-linkage hierarchical
agglomerative clustering. Also construct the dendrogram tree.
a b c d e
a 0 9 3 6 11 CO3 A 12
b 9 0 7 5 10
c 3 7 0 9 2
d 6 5 9 0 8
e 11 10 2 8 0
Amount 40 38 43 45 37 43
Demanded
b The given dataset is of Food varieties. In this dataset, we have 3
. attributes which have Sweetness level, Crunch level and food types.
Food Types have a target attribute. In target attribute, we have three
food types they are Fruits, Vegetables and Proteins and our target
finds the nearest food type which belong from three food types CO5 A 6
using the k-Nearest Neighbours.
COURSE OUTCOMES
CO1 Remember the key concepts of data science, data characteristics, its applications, and the toolkit
used by data scientists.
CO2 Recall the mathematical concepts for descriptive and statistical analysis of the given dataset.
CO3 Discuss on the principle operation of various supervised and unsupervised machine learning.
CO4 Select appropriate mathematical machine learning techniques for solving real-world problems.
CO5 Apply the relevant techniques for implementing solutions to solve real-world problems.
CO6 Access the performance of prediction, classification, and recommendation of machine learning.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Identify the type of machine learning approach involved in the following
problem statement:
1. CO1 U 1
“To study a bank credit dataset and make a decision about whether to
approve the loan of an applicant based on his profile”.
2. Define reinforcement learning. CO1 R 1
Assume the mean and standard deviation as 13.25 and 4.6 respectively.
3. Estimate the normalization value of 20 using Z-Score normalization CO2 U 1
technique.
List at least 2 benefits of performing feature selection of the given dataset
4. CO2 R 1
before using it in machine learning algorithm.
5. Consider 3 input neurons with weight link values of (0.3, 0.2, 0.3) and
input vector of (2, 1, 1). If the following thresholding activation function
is used, calculate the output of a single-layer perceptron. CO3 A 1
Output: 1 if Net Input > 0.5
: 0 Otherwise
6. Summarize the techniques to handle imbalanced dataset. CO3 U 1
7. Differentiate soft and hard clustering. CO4 U 1
Assume two cluster centroids C1:(9, 2) and C2:(3,4) in K-Means
8. clustering algorithm. Determine the cluster number to which the new data CO4 A 1
point (4, 3) belongs to.
9. Distinguish between classification and regression tree algorithm. CO5 U 1
10. List the performance evaluation metrics of regression task. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Apply the find-S algorithm to the following dataset and derive the most
specific hypothesis that fits all the positive instances.
Color Toughness Fungus Appearance Poisonous
r CO4 An 3
15. Consider the given dataset and calculate the weighted average for the
‘Outlook’ attributes using the decision tree algorithm.
Outlook Temperature Windy Play Golf
Sunny Hot FALSE No
CO5 An 3
Overcast Hot FALSE Yes
Sunny Mild TRUE No
Sunny Cool TRUE Yes
Overcast Hot TRUE Yes
Discuss the importance of grid search optimization technique in tuning
16. CO6 U 3
the hyperparameters of machine learning models.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Analyze the given dataset and derive specific and general hypotheses
using Candidate Elimination Algorithm.
S.No Citation Size Library Price Edition Buy
1 Some small No Affordable One No CO1 An 6
2 Many Big No Expensive Many Yes
3 Many Medium No Expensive Few Yes
4 Many small No Affordable Many Yes
b Discuss the concept of geometric and logical models of machine
CO1 R 6
. learning techniques with proper examples.
19. Apply the Naive Bayes classifier on the given dataset and determine CO3 A 12
the class output of the given test instance :
<sunny, cool, high, strong>
Outlook Temperature Humidity Wind Play Tennis
Sunny Hot High Weak No
Sunny Hot High Strong No
Overcast Hot High Weak Yes
Rain Mild High Weak Yes
Rain Cool Normal Weak Yes
Rain Cool Normal Strong No
Overcast Cool Normal Strong Yes
Sunny Mild High Weak No
Sunny Cool Normal Weak Yes
Rain Mild Normal Weak Yes
Sunny Mild Normal Strong Yes
Overcast Mild High Strong Yes
Overcast Hot Normal Weak Yes
Rain Mild High Strong No
20. a. Apply perceptron learning algorithm for the given OR gate and
update the weights for one iteration. Assume the initial weights as
W1=0.4, W2=0.1, threshold >= 0.3 and learning rate= 0.2.
X1 X2 Y
0 0 0 CO3 A 6
0 1 1
1 0 1
1 1 1
b Calculate the TPR and FPR for the thresholds greater than 0.9, 0.8,
. 0.7, 0.6, 0.34 and plot ROC curve for the calculated values.
Tuple Class Probability
1 P 0.94
2 P 0.82
3 N 0.75 CO3 A 6
4 P 0.65
5 P 0.62
6 N 0.58
7 N 0.66
8 N 0.44
21. a. Analyze the given distance matrix and construct a dendrogram using a CO4 An 6
single linkage agglomerative clustering algorithm.
A B C D E F
A 0
B 0.23 0
C 0.22 0.14 0
D 0.37 0.19 0.13 0
E 0.34 0.14 0.28 0.23 0
F 0.24 0.24 0.1 0.22 0.39 0
b
CO4 U 6
. Explain the working principle of Self Organizing Map algorithm.
22. a. Cluster the following eight points ((x, y) representing locations) using
K-Means algorithm to find the three cluster centers after the first
iteration.
CO4 A 6
A1(2, 10), A2(2, 5), A3(8, 4), A4(5, 8), A5(7, 5), A6(6, 4), A7(1, 2),
A8(4, 9)
Initial cluster centers are: A1(2, 10), A4(5, 8) and A7(1, 2).
b State why the ensemble methods may improve the accuracy of the
CO3 U 6
. classifier? Explain the working principle of Bagging and Boosting.
23. Apply the decision tree algorithm on the following dataset and
identify the root node of the tree. (Note: Input attributes: Age, Sex,
BP, and Cholesterol, Output attribute: Drug)
Age Sex BP Cholesterol Drug
Young F High Normal Drug A
Young F High High Drug A
Middle-age F High Normal Drug B
Senior F Normal Normal Drug B
Senior M Low Normal Drug B
CO5 A 12
Senior M Low High Drug A
Middle-age M Low High Drug B
Young F Normal Normal Drug A
Young M Low Normal Drug B
Senior M Normal Normal Drug B
Young M Normal High Drug B
Middle-age F Normal High Drug B
Middle-age N High Normal Drug B
Senior F Normal High Drug B
COMPULSORY QUESTION
24. a. Explain the performance metrics to evaluate the multiclass classifier
in detail. Calculate precision per class, recall per class, accuracy, and
F1-score for the given confusion matrix.
Predicted --------------->
A B C D CO6 A 6
A 9 1 0 0
Act
B 1 15 3 1
ual
C 5 0 24 1
D 0 4 1 15
b Illustrate the various cross validation strategies with suitable
CO6 U 6
. examples.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Recall the concepts, mathematical background, applicability, limitations of existing machine
learning techniques.
CO2 Explain the simple feature engineering steps.
CO3 Apply suitable linear / nonlinear / probabilistic machine learning algorithms for a given task.
CO4 Demonstrate the working principle of distance based algorithms to handle unlabeled data.
CO5 Distinguish tree and rule based machine learning algorithms and appropriately apply to the
suitable application.
CO6 Evaluate the performance of machine learning models using suitable metrics.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recognize the lemmatized word, if the original words “trouble”,
CO1 R 1
“troubling” and “troubled” pass through the model.
2. Identify the type of ambiguity in the given sentence: ‘The chicken is
CO1 R 1
ready to eat”.
3. Recall the process whereby meaning representations are composed and
CO2 R 1
assigned to linguistic inputs.
4. Indicate the number of morphemes in the word ‘desirable’. CO2 U 1
5. Choose a proper POS tag for the given statement:
CO3 A 1
‘The sun rises in the east’
6. Represent the morphologically parsed output of ‘caught’ in lexical and
CO3 U 1
surface level.
7. Relate the role of for the given parameter in lexicalized PCFG. CO4 U 1
8. Identify the relation between the head word (booked) and dependent
CO4 U 1
word (flight) in the sentence: ‘We booked her the first flight to Canada’
9. Predict the lexical relationship between the word ‘newspaper’ in the
following sentences:
CO5 A 1
The newspaper was delivered early today
The newspaper recruited a new journalist
10. Select the named entities in the sentence: "Yesterday, Elon Musk
announced that SpaceX will launch a manned mission to Mars in CO6 An 1
2024".
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Review the possible types of errors created by keyboard mistyping and CO1 U 3
11.
phonetics.
Describe the orthographic rules used in finite state morphological CO2 U 3
12.
processing, with examples.
Analyze the challenges in CKY parsing and propose appropriate CO3 An 3
13.
remedies for the issues identified.
14. Evaluate the parsing metrics recall, precision and F1 Score for the given CO4 E 3
Gold standard and parsed output of the statement ‘Saw the man with a
telescope’
Categorize the possible design choices for matrix type, weighting, CO5 An 3
15. dimensionality reduction and vector comparison in order to build a
distributional semantic model.
Examine the anatomy of an entity linking system in NLP and illustrate CO6 A 3
16.
the different stages of operation.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the minimum edit distance algorithm for spelling error CO1 A 6
correction and apply Levinstein approach to calculate the edit
distance to transform the word ‘numpy’ to ‘numexpr’, by
constructing a two-dimensional array. (Assume cost for each edit
operation to be 1)
b Calculate the bigram probability of the sentence: CO1 An 6
. <s> The cat chased the dog </s> using a corpus of five sentences:
20. a. CO4 A 6
Apply CKY algorithm to construct possible parse trees for the
statement “a pilot likes flying planes” with the CNF form given
here. Illustrate the stages of tree construction in detail.
21. Explain the methodology of word embedding using the Word2Vec CO5 U 12
model, and illustrate the two commonly employed architectures for
embedding text data.
22. Describe the steps taken in the Noisy channel model for spelling CO1 U 6
a.
correction in detail.
Discover the significance of string similarity and alignment in spell CO1 U 6
b
correction and explain the initialization, recurrence relation and
.
termination stages of edit distance algorithm.
23. a. Examine the importance of lexical semantics and classify the CO5 An 6
different components of lexical semantics while illustrating each
category with examples.
b Show the schematic representation of a typical information retrieval CO5 U 6
. system and describe the query expansion mechanism employing
distributional semantics.
COMPULSORY QUESTION
24. a. Apply Naive Bayes Classifier for the given dataset to classify the CO6 A 6
content into positive (+) and negative (-) classes, and predict the
class for the test sentence.
b Examine the process of extracting semantic relationships from text
. and analyse the methods employed for performing relation CO6 An 6
extraction.
COURSE OUTCOMES
CO1 Identify the different linguistic components of natural language.
CO2 Design a morphological analyzer for a given natural language
CO3 Prefer appropriate parts of speech technique.
CO4 Choose on the appropriate parsing techniques necessary for a given language and applications
CO5 Decide on the appropriate semantic techniques necessary for a given language and applications
CO6 Design application involving natural language.
Q.
No.
Questions CO BL Marks
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recognize the stemmed word, if the original words “trouble”, “troubling” CO1 R 1
and “troubled” pass through the model.
2. Identify the type of ambiguity in the given sentence: ‘The car hit the pole CO1 U 1
while it was moving’.
3. Give two examples for Middle clipped words. CO2 U 1
4. Indicate the number of morphemes in the word ‘unstoppable’ CO2 U 1
5. Choose a proper POS tag for the given statement: CO3 A 1
‘I like to read books’
6. Express the headword in the rule set ‘VP VP PP’ in Probabilistic CO3 U 1
Context-Free Grammer.
7. Relate the role of for the given parameter in lexicalized PCFG. CO4 U 1
8. Identify the relation between the head word (booked) and dependent word CO4 U 1
(her) in the sentence: We booked her the flight to Canada
9. Predict the context words for the sentence ‘I saw a cute grey cat playing CO5 A 1
the garden’ with C=2, and the centre word ‘cat’.
10. Select the named entities in the sentence: "The CEO of Apple, Tim Cook, CO6 An 1
announced yesterday that the company will be releasing a new iPhone
next month".
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Review the different factors that contribute to ambiguity in natural CO1 U 3
language processing.
12. Categorize the reduplication techniques in morphological process and CO2 U 3
explain them with examples.
13. Analyze the characteristics examined by syntactic analysis in the sentence CO3 An 3
that are not addressed by lexical analysis.
14. Differentiate inflection and derivation from each other in terms of word CO4 An 3
formation processes, and illustrate with examples.
15. Evaluate the parsing metrics recall, precision and F1 Score for the given CO5 E 3
gold standard and parsed output of the statement ‘time flies like an arrow’.
Gold standard:
Parsed output:
16. Summarize the relation extraction process in NLP along with an example. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Examine the two important keywords in spell correction process and CO1 A 6
apply Levinstein approach to calculate the edit distance between
‘ELEPHANT’ to ‘RELEVANT’, by constructing a two-dimensional
array. (Assume cost for each edit operation to be 1)
b. Calculate the bigram probability of the sentence ‘<s> The brown dog CO1 An 6
slept</s> ' using a corpus of three sentences:
<s> The quick brown fox jumped over the lazy dog</s>.
<s> The lazy dog slept all day</s>.
<s> The brown fox is quick and agile</s>
18. a. Estimate the appropriate POS tag for the given newspaper headline CO2 E 6
‘Deal talks fail’ using Viterbi algorithm.
19. Compare and contrast the goal- oriented and data-directed parsing CO3 An 12
methods and build parsing trees using the given rule for the sentence:
“The quick brown fox jumps over the lazy dog”.
S -> NP VP
NP -> Det Adj Noun
VP -> Verb NP Prep NP
Det -> "The"
Adj -> "quick" | "brown" | "lazy"
Noun -> "fox" | "dog"
Verb -> "jumps"
Prep -> "over"
20. Apply probabilistic CKY parser algorithm to parse the sentence "Book CO4 A 12
the Flight Through Houston" using the following set of rules.
Illustrate the stages of tree construction in detail.
21. a Analyze the significance of lexical semantics and categorize the CO5 An 6
various elements of lexical semantics while providing examples for
each.
b Show the conceptual diagram of a typical information retrieval system CO5 U 6
and illustrate the query expansion process using distributional
semantics.
23. a. Describe the steps taken in the Noisy channel model for spelling CO1 U 6
correction in detail.
b. Examine the challenges involved in basic probabilistic context free CO4 An 6
grammar and provide effective solutions to address these issues.
COMPULSORY QUESTION
24. a. Analyse the primary stages of text summarization and illustrate the CO6 An 6
principle behind abstractive and extractive summarization models with
examples.
b. Evaluate the effectiveness of different phases in entity linking, such as CO6 E 6
mention detection, link generation and disambiguation.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
Predict the output of the following program:
class Test{
public static void main(String[] args) {
1. int a=4; CO1 U 1
System.out.println(a++ + ++a +a++);
}
}
Identify the output of the following program:
class HelloWorld {
public static void main(String[] args) {
int a=1;
switch(a){
case 1:
System.out.println("One");
case 2:
2. System.out.println("two"); CO1 U 1
break;
case 3:
System.out.println("Three");
deafult:
System.out.println("default");
}
}
}
3. Define the term garbage collection. CO2 R 1
4. State the use of finally block in exception handling. CO2 R 1
5. Demonstrate the ordinal() of enumerations in Java CO3 R 1
6. Name the thread method that creates delay in execution of thread. CO3 R 1
7. List any two subclasses of InputStream class. CO4 R 1
8. Tell the purpose of flush() method in File handling. CO6 R 1
Name the String method used to divide a string into ‘n’ sub string based
9. CO5 R 1
on delimiter.
10. Construct an ArrayList to store three numbers CO5 U 1
PART – B (6 X 3 = 18 MARKS)
Demonstrate a java program to check whether a given number is
11. palindrome or not. CO1 U 3
19. a. Demonstrate the two ways of creating threads with an example. CO3 R 6
Describe the following concepts with sample snippets,
b static data
CO3 R 6
. this keyword
finalize method
Create a file named ‘D:/Sample.txt’ and write your own profile into
b
the that file and then Copy this file into another location named U 6
. CO6
‘E:/Sample.txt’
24. CO5 A 12
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define System call. CO1 R 1
Name the three general methods for passing parameters in system call
2. CO1 R 1
to the operating system.
3. Differentiate process and program. CO3 U 1
4. List the three different types of process schedulers. CO2 R 1
5. Recall the definition of signal() in semaphore. CO2 R 1
6. Monitor is defined as an abstract data type. Justify your answer. CO2 C 1
7. Write the various necessary conditions of deadlock. CO4 A 1
8. Distinguish between internal and external fragmentation. CO4 U 1
9. Summarize the directory implementation techniques. CO4 U 1
10. Define seek time and random-access time. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Write short notes on storage hierarchy in operating system. CO1 A 3
12. State the concept of PCB. CO2 R 3
13. Describe the structure of process Pi in Peterson’s solution. CO3 R 3
Calculate the size of memory if its address consists of 22 bits and the
14. CO4 A 3
memory is 2-byte addressable.
15. Discuss various free space management techniques with neat diagram. CO5 U 3
16. Differentiate solid state disk and magnetic tape. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain any two of the operating system structure with neat
17. a. CO1 U 6
diagram.
b
Describe any three major categories of system calls with example. CO1 R 6
.
19. a. Explain about the various multithreading models with neat diagram. CO2 U 6
Enumerate the following file allocation techniques with neat
b diagram.
CO5 R 6
. a) Linked allocation
b) Indexed allocation
COURSE OUTCOMES
CO1 Understand how operating systems makes it possible for many applications to share resources
and to make programming easier for user space applications.
CO2 Distinguish between user and kernel level operating.
CO3 Analyze the thread context management, synchronization methods and various scheduling
algorithms.
CO4 Apply various memory management schemes especially paging and segmentation in real time
applications.
CO5 Illustrate file systems in operating systems like UNIX/Linux and Windows.
CO6 discover input output management, use of device driver and secondary storage (disk) mechanism.
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
Identify the types of programming where all the variables are constrained
to be integers.
9. CO5 U 1
13. CO3 An 3
Summarize the cases considered for sensitivity analysis.
14. Explain how a value is derived in the Golden Section method. CO4 U 3
15. CO5 An 3
Give real time examples on integer programming.
18. Solve the LPP using revised simplex method to Maximize Z=2x1+x2 CO2 A 12
subject to
3x1+4x2 ≤ 6
6x1+x2 ≤ 3
X1,x2 ≥ 0
20. Solve the following NLPP using Kuhn Tucker method. CO4 A 12
Maximize Z=2x + 2xy+y
Subject to:
3x+2y=12
x1, x2 >=0
21. Determine how much should be the shipment from the milk plant to CO5 A 12
the distribution centre so that the total cost of shipment is minimum.
COURSE OUTCOMES
CO1 Formulation of optimization problems.
CO2 Define and use optimization terminology and concepts.
CO3 Describe the appropriate the linear programming techniques.
CO4
Choose the appropriate optimization for real world problems.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Identify the model that assists in the decline in the cost of compute,
1. storage, and networks, which allows companies to gather and analyze CO4 U 1
much larger amounts of data.
2. Compare humans and robots based on their working capability. CO1 U 1
3. List the five functional domains of Industrial Internet Systems (IIS). CO2 R 1
4. Give the components of Network Functionality Virtualization (NFV). CO3 A 1
5. Name the fundamental core of any M2M or IIoT architecture. CO5 R 1
6. Define Network Address Translation. CO1 R 1
7. Recall Delay Torrent Networks (DTN) CO2 R 1
8. Define Weightless standard. CO3 R 1
Discuss the need for security in manufacturing industry with an
9. CO6 U 1
example.
10. List the design principles of industry 4.0. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Name a few key industrial internet of things (IIOT) Technologies. CO1 R 3
Illustrate the three-tier topology of the Industrial Internet Systems (IIS)
12. CO2 An 3
and its application in industrial internet of things (IIOT).
Construct the IPV6 address format with emphasis on the size of the
13. CO3 A 3
address.
14. Compare SOAP and REST protocols of the web services. CO4 U 3
Explain the operational technology (OT) manufacturing network with a
15. CO5 U 3
clear diagram.
16. Define industry 4.0. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Examine the catalysts and precursors of the industrial internet of
17. a. CO1 A 6
things (IIOT).
b Describe the following: a) Intelligent Devices b) The Digital and
CO1 U 6
. Human Workforce.
Connect wireless technology to cyber physical systems with related
18. CO2 An 12
examples.
COURSE OUTCOMES
CO1 Describe the drivers and enablers of Industry 4.0.
CO2 Define the smartness in Smart Factories, Smart cities, smart products and smart services.
CO3 Understand the various systems used in a manufacturing plant and their role in an Industry 4.0
world.
CO4 Summarize the power of Cloud Computing in a networked economy.
CO5 Express the opportunities, challenges brought about by Industry 4.0 and how organizations and
individuals should prepare to reap the benefits.
CO6 Identify the security challenges involved in industry 4.0.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Give examples for real time operating system. CO1 U 1
2. Define hard real time operating system. CO1 R 1
3. Define distributed systems. CO2 R 1
4. Recall the elements of task control block. CO2 R 1
5. Express the role of scheduler in real time operating system. CO3 U 1
6. Enumerate the types of scheduling algorithms. CO3 R 1
7. State sytem on chip. CO4 R 1
8. List the types of multicore processors in embedded systems. CO4 R 1
9. Name the storage devices that are used in embedded systems. CO5 R 1
10. Identify the various mechanisms for transferring data between tasks. CO5 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List the applications of real time operating system. CO1 R 3
12. Summarize the usage of tick in real time systems. CO2 U 3
13. Differentiate the preemptive and non-preemptive scheduling algorithm. CO3 An 3
14. Explain the priority inversion problem. CO4 U 3
Indicate the different forms of communication to support task
15. CO5 U 3
interactions.
16. Identify the most suited application areas for mixed mode systems. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Discuss about the architecture of real time operating system. CO1 U 8
b
Give examples for firm real time operating system. CO1 U 4
.
Consider the four tasks such as Task 1, 2, 3 and 4 and its type,
response time, computation time and period is listed in the table
below.
COURSE OUTCOMES
CO1 understand the concepts of real-time systems and modeling
CO2 outline the potential benefits of distributed systems
CO3 analyze the time complexity in job handling
CO4 design real time embedded systems using the concepts of RTOS
CO5 identify and evaluate the storage management policies with respect to different storage
management
CO6 design applications in Embedded systems by using RTOS
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define kernel. CO1 R 1
2. Express the usage of soft real time operating system. CO1 U 1
3. Identify the purposes of mutex. CO2 R 1
4. Classify the types of multiprocessor structures in embedded systems. CO2 U 1
5. List the types of scheduling policies in real time systems. CO3 R 1
6. Give examples for non-preemptive scheduling algorithms. CO3 U 1
7. Identify the need of dynamic memory allocation. CO4 R 1
8. Recall the memory leakage problem in random access memory. CO4 R 1
9. Name the two major categories of solid-state drives. CO5 R 1
10. Infer the usage of memory protection unit. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Differentiate the general purpose operating systems with real time operating
11. CO1 An 3
systems.
12. Indicate the demerits of semaphore. CO2 U 3
13. Infer the merits of preemptive scheduling algorithms. CO3 U 3
14. Identify the necessary conditions before deadlock can occur. CO4 U 3
15. Give examples for volatile storage devices in embedded system. CO5 U 3
Express the three key decisions when designing and implementing the
16. CO6 U 3
application software.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Summarize the characteristics of real time operating system. CO1 U 8
b
CO1 U 4
. Discuss about the hard real time operating system.
19. a. Consider the three tasks like Task 1, Task 2 and Task 3. Task 1 has the CO3 A 8
lowest priority and Task 3 has the highest priority. Their arrival times
and execute times are listed in the table below. Apply the preemptive
and non preemptive scheduling algorithm to calculate the execution time
for all tasks to complete its operation.
Execution
Task Name Arrival Time(s)
Time(s)
Task 1 15 50
Task 2 35 50
Task 3 55 40
b
CO3 U 4
. Describe the working principle of round robin scheduling algorithm.
Assume that a shared resource is a single car parking space for a drop-
off, pick-up zone in a restaurant as shown in the figure.
20. a. CO4 A 8
Users before trying to park a car they must first check that the space is
free. An access control interface which consists of a:
‘Request’ pushbutton - A user presses this to signal the car park
attendant that entry is required to the car park.
‘Finish’ pushbutton - A user presses this on exit to inform the
attendant that the car park is once again free.
Loudspeaker - The car park attendant uses this to answer the
customer’s request.
Construct an embedded system application using a simple monitor
mechanism to make sure that only one car can enter the parking area.
Explain how to use binary semaphores for notifying occurrences of an
b
event from a task or thread and for notifying another task waiting for CO3 U 4
.
that event.
COURSE OUTCOMES
CO1 understand the concepts of real-time systems and modeling
CO2 outline the potential benefits of distributed systems
CO3 analyze the time complexity in job handling
CO4 design real time embedded systems using the concepts of RTOS
CO5 identify and evaluate the storage management policies with respect to different storage
management
CO6 design applications in Embedded systems by using RTOS
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recall the role of reinforcement learning in a chess game. CO1 R 1
Recall the two feedbacks used in multi-armed bandits with the non-
2. CO1 R 1
associative setting.
Represent the functional components of reinforcement learning with a
3. CO1 U 1
neat diagram.
4. Define state transition and probability transition in Markov decision. CO2 R 1
Recall the different types of simulators used in the Markov decision
5. CO2 R 1
process.
6. List down a few classical algorithms used in dynamic programming. CO3 R 1
7. Recall the two standard approaches used in dynamic programming. CO3 R 1
8. List down any two real-time Monte Carlo applications. CO4 R 1
Define the operations used for Monte Carlo control without exploring
9. CO5 R 1
starts.
Identify a few reinforcement learning applications using recommender
10. CO6 U 1
systems
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Name the two threads that have been used in machine learning to date. CO1 R 3
12. State the bellman’s equation and its elements used in MDP problems. CO2 R 3
Describe the policy evaluation used for state-value function in
13. CO3 U 3
reinforcement learning.
Describe how the Monte Carlo method is used to estimate the policy
14. CO4 U 3
value.
Examine the reproduction of state aggregation cases within the linear
15. CO5 A 3
framework.
Examine the ethical issues that take place in artificial reinforcement
16. CO6 A 3
learning for solving real-world problems
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Discuss the working concept of the n-armed bandit problem for slot
17. a. machines and identify the possible outcome of a jackpot with a CO1 U 6
minimum of four rollers with 12 combinations of labels.
Visualize an apartment with 5 rooms; each door has a bidirectional
way of entering and exiting the rooms. Only one room carries the
reward point of 500 dollars. Apply the Q-learning technique and
represent the scenario in a graph of states, edges, and steps.
b
CO1 A 6
.
Discuss the working concept of the Monte Carlo method used in the
20. a. blackjack game and show the total number of possibilities of the CO4 U 9
strike, hit and draw in a neat diagram.
b Discuss the role of Monte Carlo Control and identify the steps
CO4 U 3
. involved in the Monte Carlo ES algorithm.
COURSE OUTCOMES
CO1 Understand the basics of Reinforcement learning.
CO2 Formalize problems as Markov Decision Processes.
CO3 Analyze the utility of dynamic programming for industrial applications and problems.
CO4 Apply Monte Carlo reinforcement learning algorithms.
CO5 Implement policy gradient methods and linear methods for function approximation.
CO6 Recognize current advanced techniques and applications in RL.
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
20. Identify suitable card and standard for the following applications CO3 A 12
i. Ear Tags pierced for animals
ii. Money transfer through debit/credit cards
iii. RFID based billing system
iv. Mass stock entry in warehouse
23. A car company manufacturing unit shifts its product from warehouse CO6 C 12
to shipping yard. Design a suitable RFID based supply chain
management for the above case study.
COMPULSORY QUESTION
24. Devise a smart RFID system for oil and gas industry. CO6 An 12
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the architecture of RFID, types of readers and tags and their protocols.
CO2 Interface RFID based systems with smart antennas and various levels of frequencies.
CO3 Apply the appropriate RFID configuration for effective communication.
CO4 Analyze the security and privacy issues, standards of RFID technologies.
CO5 Compare the influence of RFID technologies in different case studies.
CO6 Design and deploy RFID based real time Industrial Applications.
Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. List the types of BPO strategies. CO1 R 1
2. Identify the main difference between mainframe era and PC revolution. CO1 U 1
Quote the various factors to determine Total Quality Management
3. (TQM). CO2 R 1
4. Cite some factors that tracks ROI for RPA. CO2 U 1
5. Select any one data source for an In-House type of data. CO3 R 1
6. Classify the different types of log message available in UiPath. CO3 U 1
7. Quote any one best practice involved during the bot development. CO4 R 1
8. State how the security issues are handled using CyberArk. CO4 R 1
Select an important difference between UiPath Orchestrator and UiPath
9. Studio. CO5 R 1
10. List the salient features of PEGA. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Enumerate on few downsides of RPA. CO1 R 3
12. Identify the different belt levels of six sigma. CO2 U 3
13. List the different types of variables allowed in UiPath. CO3 R 3
14. Define White box testing. CO4 U 3
15. Identify the type of data that is extremely important for building AI CO5 U 3
models.
16. Compare and contrast between UiPath Orchestrator and UiPath Studio. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Discuss on the following technology : CO1 U 12
a. Cloud computing.
b. Database.
18. a. Discuss on the Six Sigma Roles and Levels for a sample project. CO2 U 6
b. Determine the factors to be considered for using a consulting firm CO2 A 6
when planning a RPA along with a case study.
19. Discuss on the types of loops available in UiPath along with CO3 U 12
suitable illustrations and examples.
20. Illustrate and discuss on the frameworks for change management. CO4 A 12
21. Discuss on the various types of AI algorithm along with an example CO5 U 12
22. Describe the various steps involved during the process of data CO5 U 12
mining.
23. Discuss on the following leading RPA vendors: CO6 U 12
a. UiPath
b. IQ Bot
COMPULSORY QUESTION
24. a. Explain how process mining differs from the traditional method and CO6 U 6
its advantage.
b. Discuss on the privacy and ethical factors that need to be considered CO6 U 6
across countries and company.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Articulate the history of RPA technology, benefits, drawbacks, and comparisons to other
automation technologies.
CO2 Examine the implementation of RPA and ensure its processes are in good shape
CO3 Choose the right RPA software by considering its costs, training, functionality, and security.
CO4 Create a bot to develop the UiPath and establish the workflow structures.
CO5 Evaluate the bots and ensure its functionality through scaling and optimization.
CO6 Review the large and small RPA software developers and vendors.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name few applications of an industrial robot. CO1 R 1
2. Write about safety issues in robot. CO1 R 1
3. State the sensors which are used to detect the motion. CO3 R 1
Identify the robot which is used to clean the main circulating pump in
4. CO3 U 1
nuclear power plant.
5. Name the issues of vision-guided robotics. CO4 R 1
6. Select the actuator to use in the cleaning robot. CO4 U 1
7. Classify the types of locomotion. CO4 An 1
8. Recall the various controlling methods. CO5 R 1
9. Identify grippers are used to transfer ferrous material. CO5 U 1
10. Select the Situatable locomotion for Aquatic robot. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. State the “Laws of Robotics”. CO2 R 3
12. Distinguish between forward and reserve kinematics. CO1 U 3
13. List the applications of machine vision system. CO3 R 3
14. Summarize the physical characteristics in sensor selection. CO4 U 3
15. State the transfer function. CO6 R 3
16. List any three advantages of a pneumatic actuator. CO5 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
List the basic components of a robotic system. Explain the
17. CO1 U 12
functions of each of the components with a neat sketch.
20. a. Explain the different types of actuators and its limitations. CO3 U 6
b
Explain the pneumatic actuators system with diagram. CO4 U 6
.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define software engineering. CO1 R 1
2. Why Crystal is called a family of agile methods? CO1 A 1
3. What is requirement engineering? CO2 R 1
4. List the negotiating requirements in software engineering. CO2 U 1
5. List the stages involved for designing a software. CO3 U 1
6. Define Control coupling. CO3 U 1
7. Distinguish between verification and validation. CO4 A 1
8. State the primary objective of Technical Reviews (TR). CO4 R 1
9. Differentiate Six sigma and ISO 9000. CO5 U 1
10. Define software project management? CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List the task regions in spiral model. CO1 R 3
12. Mention the three types of requirements identified by QFD? CO2 R 3
13. What are the different types of Cohesion? CO3 R 3
14. Why is cyclomatic complexity important? CO4 U 3
15. Compare size-oriented metrics with function oriented metrics CO5 U 3
16. List out the task set for project planning process. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain a scenario where RAD model is preferable compare to all
17. a. CO1 An 6
the other models.
b Write a short note on Adaptive Software Development (ASD) and
CO1 U 6
. SCRUM.
COURSE OUTCOMES
CO1 Discover an effective software engineering process to develop software-intensive systems.
CO2 Translate the requirements specification into an implementable design.
CO3 Construct UML diagrams along with design strategies and design patterns.
CO4 Analyze architectural design methods.
CO5 Evaluate the system using various testing strategies.
CO6 Develop the software system with quality measures.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name the appropriate mapping annotation to accept http post request. CO1 R 1
2. Discover the use of @ResponseBody in spring application controller. CO1 U 1
Name the HTTP method used to update the existing data using
3. CO5 R 1
RestController.
4. State the format of data returned by HTTP Rest API request. CO3 R 1
Discover the reactive data type for the stream that can emit 0 to N
5. CO4 U 1
number of data items.
6. Identify the use of take() method in reactive programming. CO4 R 1
7. State the name of the spring netflix cloud server CO2 R 1
8. Define the use of HashiCorp vault secret store CO6 R 1
9. Identify the JdbcTemplate method used to execute SQL Queries. CO3 R 1
10. Describe the use of RowMapper interface in Spring JDBC. CO4 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Illustrate how to create model and display model data in view template
11. CO3 U 3
with sample spring controller.
12. Describe the RestTemplate methods. CO5 R 3
13. Visualize the reactive stream workflow with a neat sketch. CO1 R 3
14. Describe the two ways of keeping configuration properties secret. CO6 R 3
Illustrate the sample code for sending notifications to interested JMX
15. CO2 U 3
clients.
16. Give an example program to create MBean in spring application. CO4 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the Spring security implementation for authentication and
17. a. CO4 U 6
authorization using In-memory user store.
b Develop spring application programs to demonstrate the following CO1 A 6
. database access operation using JpaRepository with MVC
components.
Save the given user details(via HTML form) such as name
and emailid in database table called “Users”
Illustrate Rest API programs to display all the student details such as
22. a. regno, name, and cgpa from database with hyperlinks for update and CO5 U 6
delete using HATEOAS.
Discuss the following related to administering the spring with
examples.
b
Creating admin server CO4 U 6
.
Registering Clients
Exploring the Admin Server
COURSE OUTCOMES
CO1 Identify the variety of ancillary members of the spring ecosystem.
CO2 Describe the usage of dependency Injection, microservices in Spring framework.
CO3 Translate the user requirements into enterprise quality web application using Spring MVC.
CO4 Extend the requirements such as security, AOP, transaction to the Spring applications.
CO5 Practice to build RESTful services to the application.
CO6 Prepare and manage configurations for cloud based application.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Name the dependency used to create view binding template in spring
1. CO2 R 1
application.
Identify the required spring annotation to process the HTTP delete
2. CO1 R 1
request.
3. Discover the use of the RepresentationModel class in HATEOAS. CO5 U 1
4. Label the annotation used for creating controller class with REST API. CO3 R 1
Express the reactive data type for the stream that can emit 0 or 1 data
5. CO4 U 1
item.
6. List the four building blocks of reactive programming CO4 R 1
State the library name that controls the interaction between
7. CO2 R 1
microservices to provide latency and fault tolerance
Identify the name of the secret management tool for keeping
8. CO6 R 1
configuration properties secure.
9. Define the use of ‘/health’ in spring application devleopment. CO6 U 1
10. State the expansion of DAO in spring framework. CO4 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Indicate the appropriate controller class code to read the value from
HTML form given below and display the same.
<form action= “/save” method=”post”>
11. CO3 U 3
<input type=“text” name=“data”>
<input type=“submit” value=“save”>
</form>
12. Describe any three additional components of spring integration. CO4 R 3
Illustrate filter() and map() methods of Flux reactive data type with
13. CO5 U 3
suitable program.
14. Describe about encrypting properties in Git CO6 R 3
List any five Actuator end points to monitor the running spring
15. CO1 R 3
application.
Discuss any three methods of JdbcTemplate for interacting with
16. CO2 U 3
database.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Illustrate simple spring MVC application to demonstrate the
following components
17. a. Model CO1 U 6
Controller
View
b Discuss the spring security mechanism for authentication and
CO4 U 6
. authorization using In-memory user store.
Develop spring integration flow program for polling all the files
22. a. from the directory “D:/movies” to another directory called CO4 A 6
“E:/files”.
b Illustrate the creating microservices and consuming microservices
CO2 U 6
. with suitable example programs.
COURSE OUTCOMES
CO1 identify the variety of ancillary members of the spring ecosystem
CO2 describe the usage of dependency Injection, microservices in Spring framework
CO3 translate the user requirements into enterprise quality web application using Spring MVC
CO4 extend the requirements such as security, AOP, transaction to the Spring applications
CO5 practice to build RESTful services to the application
CO6 prepare and manage configurations for cloud based application.
Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
1. Cite a Linux command to archive a file. CO1 U 1
2. List any 2 examples of Yast control center module. CO1 R 1
3. State the full form of VNC. CO2 R 1
4. Cite a Linux command to Manually Retrieve SSH Host Keys. CO2 U 1
Identify the configuration file which encodes information about a service,
5. a socket, a device. CO3 R 1
Cite the Linux command to remove the write permission from the group
6. using chmod.. CO3 U 1
Recall the RPM utility that handles installation and uninstallation of RPM
7. packages. CO4 R 1
Cite the linux command that is used to extract the contents from a zip file
8. when compiling softwares. CO4 U 1
Name the term that describes extended partition from main partition in
9. storage management. CO5 R 1
Name the network time protocol that is used instead of legacy ntpd
10. daemon in SLE15. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. List the 7 different types of files in linux. CO1 R 3
12. State the 3 ways of Connection via SSH. CO2 R 3
13. Define the term sticky bit. CO3 R 3
14. List the disadvantages Of Unpackaged Software. CO4 R 3
15. Differentiate fdisk vs parted. CO5 An 3
16. List the options available to configure logrotate in system logging.. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss the following properties in Suse Linux CO1 U 6
i) Shell environment
ii) Shell aliases
iii) Shell history
b. List the six ways in which you can find the informations about CO1 R 6
commands used in Suse linux.
18. a. Most authentications in Windows environments are done with a CO2 E 6
username-password pair, which works well for systems that share a
common domain. When working across domains, such as between
on-premises and cloud-hosted systems, it becomes vulnerable to
brute force intrusions. By comparison, Linux environments
commonly use public-key/private-key pairs to drive authentication
that doesn't require the use of guessable passwords.
Justify the above statement by enumerating the linux commands to
configure the Key Based Authentication using OpenSSH in Linux.
b. Define Systemd and describe the unit file structure of system’s boot CO2 R 6
process.
19. a. Assume you are working as a system administrator in a company and CO3 U 7
the work assigned to you is to manage the process running in
background and foreground. There you are asked to create three
processes of your choice and manage the process by these following
operations
i) View
ii) Hungup
iii) Terminate
iv) Kill
And set the third process with the highest priority. Help your
company with the above mentioned configurations.
b. Enumerate the Linux commands to manage the users and groups in CO3 R 5
command line by creating a local user account and a group account.
20. a. Apply the required Linux commands to perform the following CO4 A 7
storage management operations to install RPM packages
i) check dependencies of RPM Package before installing
ii) List all installed RPM packages
iii) List Recently Installed RPM Packages
iv) Upgrade a RPM Package
v) Remove a RPM Package
vi) Remove an RPM Package Without Dependencies
vii) Query a file that belongs which RPM Package
b. Discuss the following ways in which you can manage patterns and CO4 U 5
patches of zypper and provide the relevant syntax for it.
21. a. Describe about different types of network interfaces and briefly CO5 R 6
explain how network management is done using the tool wicked.
b. Apply the Linux command to configure the software RAID. CO5 U 6
COURSE OUTCOMES
CO1 Identify the application of Linux commands and Linux flavours.
CO2 Use remote administration and secure system bootup process.
CO3 Managing Process, Identity and Security.
CO4 Managing Software packages.
CO5 Create and Manage storage devices.
CO6 Create policies to monitor and perform installation.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Compare single-pass and two-pass assemblers. CO1 U 1
2. Enumerate the assembler directives. CO1 R 1
3. Name the two pointers in the input buffer pair scheme. CO2 R 1
4. Define Lexeme. CO2 R 1
Identify whether the following grammar is ambiguous or not.
5. CO3 U 1
B -> B+B | BB | (B) | B* | a
Omit the left factoring from the following grammar, if any:
6. CO3 R 1
S ->SS+ | SS- | SS* | SS/ | a | b
7. What does a sound type system eliminate? CO4 R 1
8. Interpret the binding of names schematically. CO5 U 1
9. Infer the way the basic block leader is determined. CO6 U 1
10. Differentiate local optimization from global optimization. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate between system software and application software. CO1 U 3
12. Write a LEX program to identify even binary numbers. CO2 A 3
13. Write the rules for finding the FIRST and FOLLOW of non terminals. CO3 A 3
14. Give examples for the S-attributed and L-attributed definitions. CO4 U 3
Represent the way structural equivalence is maintained in type
15. CO5 U 3
expressions.
16. State the global variable analysis. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe the working principle of an absolute loader with the
CO1 U 6
necessary algorithms.
19. Construct a predictive parser for the following grammar and check
whether the input not (true or false) is parsed without errors.
bexpr ->bexpr or bterm | bterm CO3 A 12
bterm ->bterm and bfactor | bfactor
bfactor ->not bfactor| (bexpr) | true | false
21. Translate the arithmetic expression (a*b) + (c-d) * (a*b) + b into the
following representations:
i) Syntax Tree
ii) Directed Acyclic Graph
CO5 U 12
iii) Quadruple
iv) Triple
v) Indirect triple
vi) Postfix Expression
22. Construct the SLR parsing table for the following grammar:
E -> E + T | T
CO3 A 12
T -> TF | F
F -> F* | a | b
23. Construct a minimum state DFA directly for the regular expression
m*n(m|nm*) by constructing the syntax tree and finding firstpos(), CO3 A 12
lastpos() and followpos().
COMPULSORY QUESTION
24. a. Enumerate any four issues in the design of a code generator. CO6 U 4
b. Determine the steps for partitioning the three-address instructions into
basic blocks. Also, construct basic blocks and data flow graph for the
following:
i=1
L: t1 = x * 5
t2 = &a
CO6 A 8
t3 = sizeof(int)
t 4 = t3 * i
t 5 = t2 + t4
*t5 = t1
i=i+1
if i <= 10 goto L
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Explain algorithm and data structures for assembler.
CO2 Develop algorithms for macros and loaders.
CO3 List and define various stages of compiler.
CO4 Select and use standard tools and techniques in different stages of compiler design.
CO5 Compare and contrast various methods for implementing the phases of a compiler.
CO6 Design and construct different phases of the compiler.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. M = (Q, ∑,δ, q0,F), where Q= {q0, q1, q2, q3}, ∑ = {0,1} and F = q0, δ
𝛿
is defined as:
0 1
→*q0 q2 q1 CO1 U 1
q1 q3 q0
q2 q0 q3
3 q1 q2
Determine the input whether “110” is accepted or not.
2. Find ∑2, provided ∑ = {p,q}. CO1 U 1
3. Write a regular expression for the set of all strings 0’s and 1’s ending
CO2 U 1
with “00”.
4. Construct a DFA for the set of all strings over ∑ = {a,b} with length1. CO2 U 1
5. Construct the grammar for the set of all strings starting with “a” and
CO3 U 1
ending with “b” for the alphabet set {a,b}.
6. Use the given grammar to derive the parse tree for the string “a+b”
E→ I | E+E | E*E | (E) CO3 U 1
I→a | b
7. Eliminate ε – production for the following grammar.
S→aaS |aS | ε CO3 A 1
A → bA | ε
8. List the types of Normal Forms. CO3 R 1
9. Differentiate Recursively Enumerable language (RE) and Recursive
CO4 U 1
language.
10. State the name of the machine that accepts Recursively Enumerable
CO6 R 1
language.
PART – B (6 X 3 = 18 MARKS)
11. Describe Chomsky hierarchy with neat diagram. CO1 R 3
12. Compare and contrast NFA and DFA. CO2 An 3
13. Consider the grammar defined by the productions S→aS | aSbS | ε .
CO3 U 3
Prove that the given grammar is ambiguous or not for the string “aab”.
14. State the concept of Linear Bounded Automata. CO4 R 3
15. Define Turing Machine. CO5 R 3
16. State Rice Theorem. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Convert the following regular expression to NFA with ε transitions.
CO2 A 6
(0+1)100(00+11)*
𝛿
b. Convert the following NFA to DFA.
0 1
→p {p,r} {q}
CO2 A 6
q {r,s} {p}
∅
*r {p,s} {r}
*s {q,r}
18. a. Convert the following DFA to a regular expression, using the state
𝛿
elimination technique.
0 1
→* s p
CO2 A 6
p
q p s
r r q
s q r
b. Apply minimization concept to reduce the number of states from the
𝛿
given DFA.
0 1
→q q1 q5
0
q1 q6 q2
CO2 A 6
*q2 q0 q2
q3 q2 q6
q4 q7 q5
q5 q2 q0
q6 q6 q4
q7 q6 q2
CO2 A 6
20. a. Apply pumping lemma to prove that the given language is not
regular. CO1 A 6
L={ai^3 | i>=1}.
b. i) Prove that if L is regular language, so is LR
ii) Given h(0) = abb and h(1)=ba. Apply Homomorphism for CO2 U 6
h(1011).
21. a. Construct a Push Down Automata for the language L={a 2ncbn
CO3 U 6
| n>=1}
b. Construct the equivalent Context Free Grammar for the given Push
Down Automata M = ({q0, q1}, {a,b}, {a,z0}, δ, q0, z0, { q1}),
where δ is defined as:
δ(q0, a, Z0 ) = { (q0,AZ0 ) }
δ(q0, a, A ) = { (q0,AA ) } CO3 A 6
δ(q0, b, A ) = { (q1,AZ0) }
δ(q1, a, A ) = { (q1, ε) }
δ(q1, ε , Z0 ) = { (q1, ε) }
COURSE OUTCOMES
CO1 Understand the concept of languages, basics of grammars and the hierarchy of languages.
CO2 Construct and compare deterministic and non-deterministic finite automata
CO3 Develop push down automata from a given context free language or context free grammar
CO4 Recognize context sensitive grammars
CO5 Design Turing machine for recursively enumerable language
CO6 Compare computability & non-computability and Decidability & Un-decidability.
Assessment Pattern as per Bloom’s Level
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 3 2 6 - - - 11
CO2 - 8 36 3 - - 47
CO3 1 17 19 - - - 37
CO4 3 1 - - - - 4
CO5 3 - 6 - - - 9
CO6 4 12 - - - - 16
124
Course Code 20CS2056 Duration 3hrs
Course Name WEB TECHNOLOGY Max. Marks 100
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define the use of DOCTYPE in HTML web pages. CO1 R 1
2. State the HTML element to display a photo in 200 X 200 dimensions. CO1 R 1
Define the HTML code to display the following text.
3. CO2 R 1
The Product MRP is Rs.10000, Offer Price is Rs.10000 Rs.5999
4. State the CSS Selector that selects the HTML element by the # symbol. CO2 R 1
5. State the jQuery effect action to switch between fade-in and fade-out. CO1 R 1
Identify the method used to call a JavaScript function every specified
6. CO1 R 1
millisecond.
Identify the angular JS validation state to display the error message for
7. CO4 U 1
the <input type=email>
State the angular JS filter to display the cost of a product in dollar
8. CO4 U 1
format.
9. Name the module used to read HTML file content in Node JS program. CO3 R 1
Label the MongoDB command used to create a new collection in
10. CO3 R 1
MongoDB database.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Describe the HTML code to display the following content on a web
page.
III. Morning
Discussion
IV. Afternoon CO1 U 3
Drawing
V. Evening
Demo
CO6 A 6
b Explain the CSS box model with a neat sketch and a suitable
CO6 R 6
. example program
CO3 A 6
19. a. Prepare a JSON object to store the following details and convert as a
JavaScript object and display all the data in HTML table format.
CO5 U 6
EM CODE SUBJECT GRADE CREDIT
5 20CS2037 Optimization Methodologies A+ 3
5 20CS2045 RFID Technologies A+ 3
5 20CS2054 Theory of Computation A+ 3
5 20CS2016 Database Management Systems A+ 4.5
5 20CS2031 Introduction to Data Science A+ 4.5
5 20CS2056 Web Technology A+ 4.5
b Explain the various traversing methods in jQuery with suitable
CO2 R 6
. example programs
20. a. Explain the following list in HTML with suitable example programs
Ordered List
Unordered List CO1 R 6
Definition List
CO1 U 6
22. a. Illustrate the form validation with proper error messages for the
following validators using Angular JS.
CO3 A 4
type=email
required
b Create a web application to develop the following Budget Calculator
. using Angular JS. Here, get the room rent, accessories, emergency
and saving in percentage (%), then divide the given amount based on CO1 A 8
the percentage and display each value in the place provided when the
“Evaluate My Money” button.
23. a. Prepare JSON data to represent the following Bank Account details.
CO2 U 4
CO3 A 8
COMPULSORY QUESTION
24. a. Illustrate the following MongoDB operations to organize bank
account details such as customer name, accno, email, phone, and
balance using MongoDB shell commands.
i) create database ‘ABC_Bank’
ii) create a collection ‘SavingAccount’ CO3 U 6
iii) insert five account information
iv) display the balance of a particular account
v) change the balance of a particular customer
vi) delete a particular customer’s detail
b Develop a Node JS program to display all the student details such as CO4 A 6
. name, regno, email, cgpa, and academic credits in a MongoDB
database “College” with the collection “Students” using an HTML
table layout.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify the relevant properties and methods to facilitate dynamic web application development.
CO2 Explain the development of fully functional web applications that incorporates front-end and
back-end design technologies.
CO3 Apply client and server-side technologies for creating interactive data-driven websites
CO4 model dynamic web applications using suitable server-side technologies integrated with the
database.
CO5 Develop extensible web applications using the Model View Controller (MVC) framework.
CO6 Apply web development framework for designing attractive web pages along with dynamic and
flexible schema.
Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
Identify the software program that is used by the web clients to view the
1. CO1 R 1
web pages.
Predict the technique required for designing and developing a website to
2. CO1 R 1
be ranked high in search results.
3. Write the syntax of the background property in CSS. CO2 U 1
4. Write the code for including opacity in a web page using CSS. CO2 U 1
5. Quote the syntax to change the foreground color of a text in CSS. CO2 U 1
Name the symbol that is used to select an element with a specific ID in
6. CO2 A 1
CSS.
Write a JavaScript code to display the “Welcome” message on the
7. CO3 A 1
webpage.
Predict the output of the following JavaScript code.
8. CO3 An 1
<script> alert(typeof "john"); </script>
Predict the output of the following PHP code.
9. CO6 An 1
<?php echo 5+4; ?>
10. List the different types of PHP variables. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
Create the following ordered list using HTML.
1. Food
11. CO1 C 3
2. Tea
3. Milk
12. Label the CSS property used for changing the font face. CO2 A 3
13. Discuss the CSS predefined color properties. CO2 R 3
14. Define the CSS box model and state its elements. CO2 R 3
Develop a JavaScript page to demonstrate an If condition by which the
15. time on your browser is less than 10; you will get a “good Morning” CO3 A 3
greeting.
Create a switch statement that will output "Hello" if $color is "red", and
16. CO4 An 3
"welcome" if $color is "green".
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss the working principle of Hyper Text Transport Protocol. CO1 U 6
Explain the technique to suggest which parts of your site where
b. CO1 U 6
search engines should and shouldn't crawl.
18. a. Write the HTML program to create an image gallery. CO1 C 6
Design the following table and format it as it is shown using HTML.
Product Product
Quantity (kg) Price
ID Name
b. CO1 C 6
1 Rice 1 80
2 Sugar 1 50
Total 130
Write the HTML program to make a picture of a background image
19. a. CO1 U 2
of a web page.
Discuss the most commonly used lists that are used while designing
b. CO1 U 6
a page. Give an example.
List the media types and formats supported by HTML. Give an
c. CO1 U 4
example.
20. a. State the usage of an iframe tag in HTML. Give an example. CO1 U 6
Write the difference between cell spacing and cell padding in
b. CO1 U 6
HTML.
Give an example of the following types of CSS.
a) Inline
21. CO2 A 12
b) Internal
c) External
22. a. List the different types of CSS selectors. CO2 U 6
Design a landing web page using HTML and apply all types of CSS
b. CO2 A 6
selectors to style the web page.
Create a JavaScript page and read the student’s details using form
elements as follows.
a. Read five subject marks (s1=50, s2=60, s3=70, s4=80, s5=900.
23. CO5 C 12
b. Consider the minimum marks to pass the subject as 50.
c. Display the results on the next page. (Total, percentage, pass/fail
on each subject).
COMPULSORY QUESTION
Design an online telephone directory system with the following
services using PHP with a database.
24. CO5 C 12
i. Add customer details such as name, phone number, and email.
ii. Display customer details.
CO – COURSE OUTCOME BL – BLOOMS’ LEVEL
COURSE OUTCOMES
CO1 Summarize the concepts used for web development.
CO2 Select appropriate design standards for designing attractive web pages.
CO3 Identify latest client and server-side technologies for creating interactive data driven websites.
CO4 Apply properties and methods which facilitate dynamic application development.
CO5 Create fully functional web applications that incorporate planning, designing, coding, testing,
and publishing to a web server.
CO6 Formulate and build extensible responsive featured web applications.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. Identify the test introduced by Alan in 1950, to check whether a machine CO1 U 1
can think like a human or not.
2. Define Artificial Intelligence. CO1 R 1
3. Define PEAS while specifying the Intelligent Agent task environment. CO2 R 1
4. Define Informed Search. CO2 U 1
5. Analyze the given sentence into wff’s in predicate logic: CO3 A 1
Every child loves Santa
6. Describe any two problems of Indexing. CO3 R 1
7. Define monotonicity. CO4 U 1
8. Solve the given fact into predicate logic. CO4 R 1
All Pompeians died when the volcano erupted in 79 A.D.
9. Enumerate default logic in non-monotonic reasoning. CO5 U 1
10. Apply conceptual dependency to represent the given statement. CO6 U 1
John pushed the cart.
PART – B (6 X 3 = 18 MARKS)
11. Explain the PEAS Representation for a Self-Driving Car. CO1 U 3
12. State the concept of Generate and Test algorithm. CO2 U 3
13. Illustrate the possible issues in knowledge representation techniques. CO3 An 3
14. Produce the PROLOG representation for the knowledge base given below. CO4 An 3
a. x: pet(x) small(x) apartmentpet(x)
b. x : poodle(x) dog(x) small(x)
poodle(fluffy)
15. Construct semantic net representation for the following: CO5 An 3
Mary gave the green flowered vase to her favorite cousin.
16. Construct the frame for the subject “Artificial Intelligence”. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Elucidate the key characteristics required to analyze the problem in CO1 U 6
AI.
b. Describe the steps performed by problem-solving agent with CO1 U 6
examples.
18. a. Apply DFS on the given problem to reach the Goal node ‘U’ from CO2 A 8
the initial node ‘A’.
b Differentiate between BFS and DFS in detail and suggest when to CO2 An 6
use BFS and DFS.
21. a. Write the script for the following scenario: CO5 A 6
“Tommy went to a theatre to watch a play. He bought the ticket from
the counter and sat in his seat. He watched the play and returned
home”.
a) Highlight the standard components that are to be included
when formulating the script
b) Create five scenes for the scenario such as ‘Going to theater’,
‘Buying ticket’, ‘Entering the theater hall and sitting on a
seat’, ‘Watching a play’ and ‘Exiting’.
b. Explain the different techniques of Knowledge representation CO5 U 6
22. a. Represent the following knowledge in a semantic network: CO5 A 6
Dogs are Mammals Birds have Wings
Mammals are Animals Bats have Wings
Birds are Animals Bats are Mammals
Fish are Animals Dogs chase Cats
Worms are Animals Cats eat Fish
Cats are Mammals Birds eat Worms
Cats have Fur Fish eat Worms
Dogs have Fur
Suppose you learn that Tom is a cat. What additional knowledge
about Tom can be derived from your representation? Explain how.
23. a. Of the students in the college, 60% of the students reside in the CO3 An 6
hostel and 40% of the students are day scholars. Previous year
results report that 30% of all students who stay in the hostel scored
A Grade and 20% of day scholars scored A grade. At the end of the
year, one student is chosen at random and found that he/she has an A
grade. Estimate the probability that the student is a hosteler.
b. Analyze the partitioned semantic net representations for the CO5 An 6
following:
i) The dog bite the mail carrier
ii) Every dog has bitten a mail carrier
iii) Every dog in the town has bitten every mail carrier
COMPULSORY QUESTION
24. Illustrate the following learning techniques with appropriate CO6 A 12
examples.
Learning by taking advice
Learning from examples
Explanation based learning
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe the basics of Artificial Intelligence.
CO2 Identify the appropriate search algorithms for any AI problem.
CO3 Prepare appropriate knowledge-based rules to identify causal relationships and conditional
independence of a real-world situation.
CO4 Select the appropriate search method for identifying different search spaces.
CO5 Evaluate the working knowledge of reasoning in the presence of incomplete and/or uncertain
information.
CO6 Produce the learning theory for expert systems.
Q. CO
No Questions BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. Give an example for Irrecoverable Problem. CO1 U 1
Identify the component through which the agent can perceive through the
2. environment. CO1 R 1
3. Analyze the structure of AI agent. CO2 R 1
4. Discover the Sensors and Actuators of a Human Agent. CO2 U 1
5. Name the different types of knowledge CO3 A 1
Identify the given knowledge representation system.
6. CO3 R 1
7. Describe the abductive reasoning process in one statement CO4 U 1
8. Cite any one of the programming language paradigms to represent a logic. CO4 R 1
Indicate the CD representation of the following statement:
9. Jerry threw the ball CO5 U 1
10. Infer the role of CYC in artificial intelligence. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. List the four steps to be carried out to build a system to solve an AI problem. CO1 U 3
12. Differentiate between informed and uninformed search with example. CO2 U 3
13. Differentiate Procedural and Declarative Knowledge CO3 An 3
14. Enumerate the four factors that helps in deciding whether to reason forward or CO4 An 3
backward.
15. List the components of planning. CO5 An 3
16. Compare the terms ‘Search’ and ‘Planning’ in terms of states ,action, goal and CO6 U 3
plan
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Describe the following types of Intelligent Agents CO1 U 6
Simple Reflex Agents
Model-Based Reflex Agents
Goal-Based Agents
Learning Agent
b. Describe the steps performed by Problem-solving agent with examples CO1 U 6
18. a. Distinguish between local and global heuristic search technique and apply CO2 A 8
the same for the given hill climbing problem.
21. a. Consider the following block world problem and apply goal stack planning CO5 A 6
to reach the goal state from initial state.
b. Translate each of the following sentences into conceptual dependencies CO5 U 6
“Jane gave Tom an ice cream cone”
“Tom ate the ice cream with the spoon”
“My grandfather told me a story”
“Basketball players are tall”
“Paul cut down the tree with an axe”
“Place all the ingredients in a bowl and mix thoroughly”
“A nice boy is John”
“Sita ate the apple yesterday”
22. a. Construct semantic network that represents the data given below: CO5 A 6
Mammals have fur.
All mammals are animals.
A bird is an animal.
A cat is a mammal.
Tom is a cat.
Tom is owned by John.
Tom is ginger in color
Tom caught a bird.
Cats like cream.
The cat sat on the mat
b. Consider the following block world problem: CO5 A 6
COURSE OUTCOMES
CO1 describe the basics of Artificial Intelligence.
CO2 identify the appropriate search algorithms for any AI problem
CO3 prepare appropriate knowledge-based rules to identify causal relationships and conditional independence
of a real-world situation.
CO4 select the appropriate search method for identifying different search spaces.
CO5 evaluate the working knowledge of reasoning in the presence of incomplete and/or uncertain
information.
CO6 produce the learning theory for expert systems
Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
CO4 A 1
8. Define the terms ‘State’ and ‘Reward’ in reinforcement learning CO4 R 1
9. List the types of games identified in game theory. CO 5 R 1
10. Identify the key AI requirements for real-time strategy games. CO 6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Write short notes on SIMD. CO1 U 3
12. Describe the jumping process in movements. CO2 U 3
13. Draw the velocity diagram for the allowed animations. CO3 U 3
14. Discuss the rule-based system. CO4 U 3
15. Describe the concept of a transposition table in board games. CO 5 U 3
16. Draw the finite state machine for a simple sheep-like creature in CO 6 U 3
flocking and herding games.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss the structure of the AI Engine in detail. CO1 U 8
b. State the benefit of AI in Games. How AI is used in Games? CO1 R 4
18. Define kinematic movements. Explain the kinematic movement CO2 U 12
algorithms with appropriate pseudocode for the following
movements in games:
a) Seek b)Flee c) Arrive d) Wander
19. a. Apply Dijkstra’s algorithm to the following directed weighted CO3 A 6
graph and find the shortest path between A and F. Provide all the
intermediate steps to arrive at the solution.
COURSE OUTCOMES
CO1 Recognize the importance of artificial intelligence in games.
CO2 Identify the different steering behaviors in movement of characters.
CO3 Choose the path finding techniques for designing games.
CO4 Illustrate decision making method for games.
CO5 Design the strategies for the games using game theory.
CO6 Select the appropriate design for artificial intelligence games genre.
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recall any two real-world applications of computer vision. CO1 R 1
2. Name any two properties of linear filters. CO1 R 1
3. Recall any two pairs of fourier transforms. CO2 R 1
4. Define one importance of corner detection. CO2 U 1
5. Indicate any two unique datasets where the machine learning works. CO3 U 1
6. Define tracking. CO3 R 1
7. Name the two geometries of multiple views. CO4 R 1
8. List the two camera parameters from known 3D points. CO4 R 1
9. Recall one importance of convolutional neural networks (CNN). CO5 R 1
10. Define image rendering. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Express the 4 R’s of computer vision. CO1 U 3
12.
CO2 U 3
Identify the interest point features that you may notice in the above
images (Any 3).
13. Summarize the uses of SIFT operator. CO3 U 3
14. Visualize the human vision-stereopsis of 2D position. CO4 R 3
15. Explain colorization in medical image processing with examples. CO5 U 3
16. Discuss the 3D point processing with two examples. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the real-world applications of computer vision. CO1 U 8
b
CO1 A 4
. Sketch the pinhole image model with their perspective effects.
20. a. Show the epipolar geometry with their perspective effects. CO4 A 5
b Describe the structure from the motion system by using
CO4 U 7
. triangulation.
21. a. Sketch the basic CNN architecture with their perspective layouts. CO5 A 7
b Illustrate the implementation of Forgy’s algorithm for cluster
CO5 U 5
. analysis.
23. a. Describe the analysis and synthesis process of Laplacian pyramids. CO2 U 6
b Show the working process of the AdaBoost training algorithm in
CO3 A 6
. four steps.
COMPULSORY QUESTION
24. a. The number of matches correctly and incorrectly estimated by a CO2 A 6
feature matching showing the number of true positives (TP), false
positives (FP), false negatives, (FN), and true negatives (TN).
True Matches True Non-
Matches
Predicted Matches TP - 100 FP - 40 '
P =?
Predicted Non- FN - 60 TN - 300 '
N =?
Matches
P =? N =? Total =?
i. Find the actual number of positives (P), the actual number
of negatives (N), P' (predicted number of positives), and N '
(predicted number of negatives) in the above confusion
matrix.
ii. Calculate the true positive rate (TPR), false positive rate
(FPR), positive predictive value (PPV), and accuracy (ACC)
from the above confusion matrix.
Illustrate the implementation of the K-Means clustering algorithm
b
in 5 CO3 U 6
.
Steps.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Define image formation models and light effects in computer vision.
CO2 Describe various methods used for registration, alignment, and matching in images.
CO3 Apply advanced concepts leading to object categorization and segmentation in images.
CO4 Analyze the motion detection and estimation techniques.
CO5 Construct image analysis models for object recognition.
CO6 Execute computer vision techniques for real-time applications.
Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Explain the importance of data preprocessing and the common data
a CO
1. preprocessing techniques used in industries, such as scaling, U 10
. 1
normalization, and handling missing values.
Describe the concept of feature extraction and its role in
b dimensionality reduction for machine learning. List the advantages and CO
R 10
. limitations of feature extraction algorithms, such as Principal 1
Component Analysis (PCA) and Linear Discriminant Analysis (LDA).
(OR)
a Explain the concept of Structural Risk Minimization (SRM) and its CO
2. U 10
. role in non-uniform learnability. 2
b List the principles of Minimum Description Length and Occam's CO
R 10
. Razor in non-uniform learnability. 2
Describe the A* algorithm and its role in heuristic search and give an R 10
a CO
5. overview of the admissibility property of heuristics in A* search and
. 5
its implications for finding optimal solutions.
b Explain the hill-climbing algorithm and its role in heuristic search. CO
U 10
. 5
(OR)
a Discuss the architecture and working principles of CNNs, including CO
6. U 10
. convolutional layers, pooling layers, and fully connected layers. 6
b Describe the concept of transfer learning and its importance in deep CO
R 10
. learning. 6
a Describe the process of text generation in NLP with example and the CO
7. R 10
. challenges and limitations of text generation in NLP. 2
b Explain the concept of recurrent neural networks (RNN) and their role CO
U 10
. in sequence modeling and natural language processing. 2
(OR)
a Illustrate Stratified K-fold, Leave-one-out cross-validation and 0.632 CO
8. An 10
. bootstrap methods with suitable examples. 5
b Describe the ERM (Empirical Risk Minimization) approach in CO
U 10
. minimax learning. 5
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Explain the applications of artificial intelligence (AI) and machine
a learning (ML) in healthcare, such as disease diagnosis, personalized CO
9. U 10
. medicine, and predictive analytics and the ethical considerations and 6
challenges associated with the use of AI and ML in healthcare.
b Describe the recent trends in agricultural technology and their impact CO
R 10
. on improving crop yield, precision farming, and sustainability. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the existing machine learning techniques: it’s concepts, mathematical
background, applicability, limitations and toolkit used in industries.
CO2 Create AI/ML solutions for various societal problems.
CO3 Apply some state-of-the-art development frameworks and software libraries in machine
learning task realization.
CO4 Evaluate the performance of machine learning algorithms using suitable metrics.
CO5 Compare the strengths and limitations of selected machine learning algorithms and where
they can be applied in different applications.
CO6 Build and deploy production grade AI/ML applications.