0% found this document useful (0 votes)
42 views359 pages

CSE

The document outlines a comprehensive examination structure for courses in Database Systems, Programming in Java, and Signals and Systems, detailing the questions, marks distribution, and course outcomes. Each section is divided into parts with varying question types, including definitions, coding tasks, and theoretical explanations. The assessment pattern is aligned with Bloom's Taxonomy, categorizing questions based on cognitive levels.

Uploaded by

Ppragya Sharrma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views359 pages

CSE

The document outlines a comprehensive examination structure for courses in Database Systems, Programming in Java, and Signals and Systems, detailing the questions, marks distribution, and course outcomes. Each section is divided into parts with varying question types, including definitions, coding tasks, and theoretical explanations. The assessment pattern is aligned with Bloom's Taxonomy, categorizing questions based on cognitive levels.

Uploaded by

Ppragya Sharrma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 359

Course Code 09CS201/ 12CS201/ CS226/ CS257/ CS267 Duration 3hrs

Course Name DATABASE SYSTEMS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define schema and instances. CO2 R 1
Consider the following schema
depositor (customer-name varchar(20), account-no varchar(6))
2. CO3 A 1
Use alter command to modify the data type of account-no from varchar
to number data type.
3. Define physical data independence. CO1 R 1
Which clause is used to restrict the number of rows in a basic SQL
4. CO3 U 1
query.
5. List the methods for handling bucket overflows in hashing CO3 R 1
6. Recall the transitive dependency rule. CO3 R 1
7. List the reasons for the need of normalization in database tables. CO3 R 1
8. Compare and contrast variable length records and fixed- length records. CO4 An 1

Identify the kind of participation does the double solid line represent in the
given diagram.
9. CO5 R 1

Predict the maximum size of joining the relation R with relation S, if R


10. CO6 A 1
has m tuples and S has n tuples
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List the various roles and responsibility of DBA CO1 R 3
Consider the following schema and write the relational algebra
expressions for the given questions
loan (loan-number, branch-name, amount)
depositor (customer-name, account-number)
12. borrower (customer-name, loan-number) CO2 A 3
i. Find the loan numbers of the amount which is greater than
Rs.12000.
ii. Find the names of all customers who have a loan and an
account at bank.
In the given employee table write a SQL query to update the salary
of ‘BEENA to 50000’using employee id.
13. EMPID EMPNAME DEPT SALARY CO3 A 3
1 ABINAYA CSE 20000
2 BEENA IT 30000
Use the given figure and infer whether the relation is lossless or lossy
decomposition.

14. CO4 U 3

15. Discuss the various transaction states with a neat diagram CO5 U 3
16. Describe the need for multi-level indexing. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Describe the architecture of the database system with a neat
17. CO1 R 12
diagram.

Develop queries for the given examples Employees{Emp_id,


Emp_name, Department, Salary, Date_of _Joining}
i. Display the names of the employees who joined after ‘10-
JAN-18’.
ii. Display the top three earners among all the employees.
18. CO2 A 12
iii. Display the department which gives maximum salary.(sub
query)
iv. Display the names of the employees whose name starts with
the letter ‘a’.
v. Display the names of the employees who joined recently.

Consider a university database for the scheduling of classrooms for


-final exams. This database could be modeled as the single entity
set exam, with attributes course-name, sectionnumber,
room-number, and time. Alternatively, one or more additional
entity sets could be defined, along with relationship sets to replace
some of the attributes of the exam entity set, as
19. CO3 A 12
 course with attributes name, department, and c-number
 section with attributes s-number and enrollment, and
dependent as a weak entity set on course
 room with attributes r-number, capacity, and building
Articulate an E-R diagram illustrating the use of all three additional
entity sets listed.
Consider set F of functional dependencies:
F={
A → BC
CD →E
20. B →D CO4 A 12
E →A
}
Find out the canonical cover (Fc ) for the given set of functional
dependency F.

21. Explain the 1NF, 2NF and 3 NF with proper examples CO5 U 12

22. Describe the different types of file organization. CO6 U 12


Write a trigger to be activated and generate an error message the “
Update not allowed” whenever an attempt for attendance update is
23. a. made and the date is greater than 3 days from the attendance CO2 A 6
marked
day.
b Write a function to get temperature in celcius and convert it to
CO2 A 6
. Fahrenheit and return the value.
COMPULSORY QUESTION
Describe B+ tree indexing in detail. Illustrate the step-by-step
construction of B+ tree indexing using the following set of data
(2, 5, 6, 10, 13, 19, 22, 25, 31, 34)
24. CO4 U 12
After constructing the B+-tree, show the reconstruction of the tree
(i) after deletion of delete 19
(ii) After the insertion of 28
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Recognize the role of database administrator and database management systems in software
applications and other advanced concepts.
CO2 Use query language to retrieve data efficiently from the database.
CO3 Design the database for given specification of the requirement design the databases using ER
method and normalization.
CO4 Design and implement significant database objects such as file structures and index schemes.
CO5 Describe techniques for transaction processing and concurrency control.
CO6 Implement security in database.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 16 16
CO2 1 27 28
CO3 3 1 16 20
CO4 15 2 17
CO5 1 15 16
CO6 3 12 1 16
124
Course Code 09CS204/ 12CS204 Duration 3hrs
Course Name PROGRAMMING IN JAVA Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Predict the output of the following code snippet:
int x=10,y=20,z=30;
1. CO1 U 1
boolean t = (x < y) & (y == z);
System.out.println(t);
Evaluate the output of the following program:
class Test{
public static void main(String[ ] args) {
2. CO1 An 1
int u=10;
System.out.println(u++ + ++u +u++);
}}
Examine the following code and find the output.
1. abstract class Bike{
2. abstract void run();
3. }
4. class Honda extends Bike{
3.5. void run(){ System.out.println("running safely"); } CO3 A 1
6. public static void main(String args[]){
7. Bike obj = new Honda();
8. obj.run();
} }
4. Describe method overloading and overriding? CO3 R 1
Analyze the following code and find the output.
public class MyClass {
public static void main(String args[]) {
try {
int a[] = {1, 2, 3, 4, 5};
5. for (int i = 0; i < 7; i++) CO2 An 1
System.out.print(a[i]);
}
catch(ArrayIndexOutOfBoundsException e) {
System.out.print("Exception happened");
}}}
6. Name the keyword that is used to make the Java method accessible to CO2 R 1
only one thread at a time.
Indicate the Java program to get a string "Artificial Intelligence" from
the user.
7. CO1 U 1
• Fetch the last char using the string function
• convert the string to lowercase
8. State the usage of byte stream and character stream. CO2 R 1
9. Identify the purpose of InetAddress in Java networking. CO5 R 1
Name the listener to recognize the state change of a button in Java event
10. CO4 R 1
handling.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate break and continue with an example for each. CO1 U 3
12. Explain garbage collection in Java with suitable examples. CO2 U 3
Examine the following code and find the output.
enum Fruits {
APPLE, MANGO, KIWI, PAPAYA
}
public class MyClass {
13. CO2 A 3
public static void main(String[] args) {
Fruits f = Fruits.MANGO;
System.out.println(f);
System.out.println(f.ordinal());
}}
14. Describe the purpose of boxing and auto boxing in Java with example. CO3 U 3
15. Discuss the life cycle of the thread with neat sketch. CO2 U 3
Illustrate the Java code snippet of the Border Layout to organize
16. CO5 A 3
Buttons in the borders.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the relational and logical operators in Java with suitable
17. a. CO1 U 7
example program.
b Describe the object-oriented programming concepts with necessary
CO1 R 5
. example.

Illustrate the following string functions with the suitable program.


18. a. CO2 A 5
i)substring() ii) join(), iii) charAt(), iv) valueOf()
Create a class to print any multiplication table. Construct two
b
threads to share the multiplication table class to print eighth and CO2 A 7
.
tenth multiplication table without colliding each table.

Create a class named 'Rectangle' taking the values of its length and
breadth as parameters of its constructor and having a method named
19. a. 'calculateArea' which returns the area of the rectangle. Get the CO3 A 6
length and breadth of the rectangle as user input. Illustrate the
above code with necessary object creation.
b Illustrate the working principle of constructor overloading with
CO3 A 6
. suitable example for each.

20. a. A private company wish to recruit employees with the eligibility of CO2 A 10
“5+
years as programmer”. If the registered person is not eligible then
handle the following situation and construct the User Defined
Exceptions.
• If below 5 years of experience, then throw an exception named
“Exp_Shortage_Exception”
• If the eligible skill is not programmer, then throw the exception
called
“Skill_Shortage_Exception”
Illustrate a Java program to get an integer number from the user and
b CO1 A 2
reverse it.

Create an interface called ‘Salary’ which contains the function to


find the gross_pay and net_pay. Create BankManager and CEO
21. a. classes which implement the interface Salary. Prepare a Test class CO3 A 8
which calculates the gross pay and net pay of various employees
using dynamic method dispatch.
b Discuss multilevel inheritance in Java with appropriate example
CO3 A 4
. and demonstrate the use of super keyword.

Create Java application to apply the following File I/O operations


for the given file.
22. a. • Read and display the given file contents [sample.txt] CO5 A 8
• Display the total number of words
• Display the total number of vowels
b Describe the levels of access protection available for packages with
CO5 R 4
. program illustrations.

Explain data transfer between client and server using Connection-


23. a. CO5 A 6
Oriented TCP/IP Socket Programming in Java.
b
CO1 U 6
. Discuss any three control statements with sample code.
COMPULSORY QUESTION
Illustrate a GUI program using Java API to create a frame
containing two text boxes with labels to get the length and breadth
24. of rectangle. When button ‘Area’ is pressed, the area of the CO4 A 12
rectangle gets displayed in the dialog box. On pressing OK button
frame dialog gets closed.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL


COURSE OUTCOMES
CO1 Understand the format and use of objects.
CO2 Understand basic input/output methods and their use.
CO3 Understand object inheritance and its use.
CO4 Understand development of JAVA applets vs. JAVA applications.
CO5 Understand the use of various system libraries.
Assessment Pattern as per Bloom’s Taxonomy
CO / P R U A An E C Total
CO1 5 18 2 1 - - 26
CO2 2 6 25 1 - - 34
CO3 1 3 25 - - - 29
CO4 1 - 12 - - - 13
CO5 5 - 17 - - - 22
124

Course Code 09IT207/12IT201/IT240 Duration 3hrs


Course Name SIGNALS AND SYSTEMS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Folding of a signal. CO1 R 1
2. Define a System. CO2 R 1
3. Recall the expression of Convolution Integral. CO2 R 1
4. Define Sampling. CO3 R 1
5. Define Group delay CO3 R 1
Recall the linear constant-coefficient differential equation for a second-
6. CO3 R 1
order system .
7. Define Image frequency. CO4 R 1
8. Define ROC of Laplace Transform. CO5 R 1
9. List any two properties of Laplace Transform. CO5 R 1
10. Recall the Linearity property of Z-transform. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Sketch u(−n+1) CO1 A 3
12. Test if the given system y ( t ) =0.5 x ( t +2 ) is linear. CO2 An 3
Recall the Magnitude-Phase representation of Continuous-Time
13. CO3 R 3
Fourier_Transform.
14. Define Aliasing. CO4 R 3

15. Define Band limited Interpolation. CO4 R 3


16. List the properties of the ROC of Z-Transform CO5 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Calculate the Even and odd parts of the signal CO1 A 6
2 3
x (t )=1+tcost +t sint +t sintcost
b Sketch the signal and compute the energy
. x (t )=1 1 ≤t ≤2
= t 0< t ≤1 CO1 A 6
= 3-t 2 < t ≤ 3

Sketch
a. x (3 n−1 )
b. y (2−2 n)
c. x (n+2) y (n−2)

18. Given the signals x ( n )∧ y ( n ) CO1 A 12


x ( n )=1 ; n=±1
¿ 2 ; n=± 2
¿ 3 ; n=±3
and y ( n )=1 ; n=1 ,2 , 3 , 4
¿−1; n=−1 ,−2 ,−3 ,−4

Test the properties of the system y (t )=x (t 2 )


6
19. a. a) Static or Dynamic CO2 An
b) Time invariant or variant
c) Causal or Non- causal
b Determine the response of the DTLTI system whose input is
CO2 E
. x ( n )= {1 , 2 ,0 , 1 } and the impulse response is h ( n )={ 4 ,5 , 6 }. 6

Develop the expression for Frequency response, Impulse response


20. a. CO3 A 6
Step response of a First-order Continuous-Time system
b Explain the time-domain properties of ideal Frequency Selective
CO3 U 6
. filters

Explain the reconstruction of signals from its samples with


21. necessary CO4 U 12
diagrams

Calculate the Laplace Transform and the ROC of A 6


22. a. −4 t 3t CO5
x (t )=e u ( t )+ e u(−t )
Compute the Inverse Laplace Transform of
b 1
X ( s) = for (1)ROC: ℜ{s }>−1 CO5
. (s +1)(s +2) A 6
(2) ROC: ℜ{s }←2

Calculate the Nyquist rate and Nyquist interval for


23. a. 1 CO4 A 6
m (t)= cos ( 4000 πt ) cos ⁡(1000 πt)

b Compute the Transfer function of a Causal system that is CO5 A 6
. represented by the following difference equation.
3 1
y ( n )− y ( n−1 )+ y ( n−2 ) =2 x (n)
4 8
COMPULSORY QUESTION
n
24. a. Compute the Z transform of x ( n )=a u (n). Find out the ROC. CO5 A 6
Compute the Inverse Z-transform of
b z 1
X ( z )= CO5 A 6
. for ROC <| z|<1
( 3 z −4 z +1 )
2
3

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Students will able to understand the fundamental characteristics of signals and systems for
both analog and discrete domain.
CO2 Students will able to understand the concept of impulse response and convolution in both
analog and discrete time domain.
CO3 Students will able to obtain the mathematical skills to solve problems involving
convolution, filtering, modulation and sampling.
CO4 Students will able to understand the concept of sampling and reconstruction of analog
signals.
CO5 Students will able to understand the concept of Laplace transform and Z-transform and
their applications in analysis of linear and time-invariant analog and discrete systems.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 - 27 - - - 28
CO2 2 - - 9 6 - 17
CO3 6 6 6 - - - 18
CO4 7 12 6 - - - 25
CO5 6 - 30 - - - 36
124
Course Code 11CS101/12CS101 Duration 3hrs
Course Name PROGRAMMING IN C Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Visualize a flowchart to find the volume of a cuboid. CO1 R 1
2. Generalize the structure of C program. CO3 U 1
3. Enumerate any two delimiters used in C language. CO2 R 1
Examine the following expression and show their hierarchy.
4. R= x * x + 2 * x + 1 / 2 * x * x + x + 1; 1
(x = 1, assume R to be an int) CO2 R
5. Differentiate between while loop and do-while loop. CO3 U 1
6. Define the use of goto statement in C. CO3 R 1
Identify the format specifier used to print a string or character array in
7. 1
C printf or scanf function. CO1 U
8. Show how the data is stored in a 2-D array. CO1 R 1
9. Represent a recursion. CO1 U 1
Differentiate between static memory allocation and dynamic memory
10. 1
allocation. CO2 U
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Survey on the input devices used with a neat sketch. CO3 An 3
12. Express an algorithm to find the average of 5 numbers. CO1 U 3
13. Appraise on the unconditional statements in C with examples. CO3 An 3
14. Differentiate between while loop and for loop with a code. CO3 U 3
Develop a function in C that accepts a year as input and returns whether CO2 A
15. 3
the year is a leap year or not.
16. Interpret the use of malloc() with a code. CO3 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss on the generation of computers with the features. CO3 U 6
Compute the following number systems: CO3 A 6
b
(i) 7CF to decimal
.
(ii) 43F to binary
Construct a C program to check whether a number is odd or even CO2 A 4
18. a.
using conditional operator.
b Develop the generation of Fibonacci series with an algorithm. CO1 A 8
.

Develop a C code to print all the odd numbers from 1 to 50 using CO2 A 6
19. a.
for loop.
b CO3 An 6
Appraise on the switch-case statement with an example.
.

Write a C program using function which accepts a string and CO2 A 12


20. a.
returns the number of vowels in the string “Karunya”.

21. a. Write a C program to implement the usage of bitwise operators. CO3 A 12

22. a. Develop a C program to add 2 3*3 matrices. CO1 A 8


b Construct a C program to calculate area and circumference of a CO2 A 4
. circle.

Develop a C program to create a menu-driven approach to perform CO1 A 12


the following string functions.
 Length of a string
23.
 Copying a string
 Comparing strings
 String concatenation
COMPULSORY QUESTION
Write a C program to read name and marks of ‘n’ number of CO2 A 6
24. a.
students from user and store them in a file
b CO2 A 6
. Interpret the call-by-reference mechanism with an example.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 To enhance the problem-solving skills.
CO2 To empower the students with an idea of developing the programming logic.
CO3 To learn about the basics of C programming.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 5 32 38
CO2 2 1 37 40
CO3 2 14 18 12 46
124
Course Code 12CS230 / 14CS2047 / 17CS2021 / 18CS2021 Duration 3hrs
Course Name THEORY OF COMPUTATION Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Differentiate DFA and NFA with example. CO1 U 1
2. If ∑ = {m,n} then find ∑2? CO1 U 1
3. List the Properties of Regular Languages. CO2 R 1
4. Construct a DFA for the set of all strings over ∑ = {a,b} with length1. CO2 A 1
Is it possible for a regular grammar to be ambiguous? Justify your
5.
answer. CO3 A 1
Use the given grammar to derive the parse tree for the string “a*b”.
6. S→ I | S+S | S*S | (S)
I→a | b CO3 U 1
Eliminate ε – production for the following grammar.
7. S→aSSS
S → bb | ε CO4 A 1
8. List the types of Normal Forms. CO4 R 1
9. Define Recursive Language. CO5 U 1
What is the name of the machine that accepts Recursively Enumerable
10.
language? CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Depict Chomsky hierarchy with neat diagram. CO1 R 3

12. For ∑ = {a,b}, construct DFA that accepts all strings of even length. CO2 An 3
Consider the grammar defined by the productions CO3 U 3
13. S→SS | aSb | bSa |ε . Prove that the given grammar is ambiguous or not
for the string “aabb”.
14. State the concept of Linear Bounded Automata. CO4 R 3

15. Construct a Turing machine that accepts the language L = L(aaaa*b*). CO5 R 3

16. Prove that “The union of two RE languages is RE”. CO6 R 3


PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Convert the following regular expression to NFA with ε transitions. CO1 A 6
(a/b)aba(a/b)*
b Convert the following NFA to DFA. CO1 A 6
.

18. a. Let L1=L(ab*aa), L2=L(a*bba*). Find a regular expression for CO2 A 6


(L1 U L2)*L2?
b Minimize the following DFA: CO2 A 6
.

19. a. Convert the given RLG to Finite Automata CO3 A 6


S→ aA| B
A→ aaB
B → bB | a
b Change the below Automata to Left Linear Grammar. CO3 A 6
.

20. a. Apply pumping lemma to prove that the given language is not CO4 A 6
regular.
L={anbn | n>=1}.
b Construct CFG for the language L ={anbn | n>=1}. Generate the parse CO4 A 6
. tree for string “aaabbb” and verify whether the generated grammar is
ambiguous or not.

21. a. Construct a Push Down Automata for the language CO3 A 6


L={0n1m2n | m,n>=1}
b Construct the equivalent Context Free Grammar for the given Push CO3 A 6
. Down Automata M = ({q0, q1}, {a,b}, {a,z0}, δ, q0, z0, { q1}),
where δ is defined as:
δ(q0, a, Z0 ) = { (q0,AZ0 ) }
δ(q0, b, A ) = { (q0,AA ) }
δ(q0, a, A ) = { (q1,AA) }
δ(q1, a, A ) = { (q1, ε) }
δ(q1, ε , Z0 ) = { (q1, ε) }

22. a. Design a Turing Machine for the language L={anbncn| ,n>=1} CO3 A 6
b Illustrate various Properties of CFL with example. CO3 U 6
.

23. a. Begin with the grammar CO5 A 6


S  ABC | Ba
A  aA | BaC | aa | ε
B  bBb | a | D | ε
C  CA | AC
Dε
i) Eliminate ε – production
ii) Eliminate unit production
iii) Eliminate useless symbols
b Find a GNF equivalent to the following CFG. CO5 A 6
. A1  A2A2 | a
A2  A1A1 | b
COMPULSORY QUESTION
24. a. Show that for A = {10,00,11,01} and B = (0,001,1,101}, there exists CO6 U 6
a PC (Post Correspondence) solution
b Prove that If L and L are RE, then L is recursive. CO6 U 6
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Define and use abstract models of various computational models such as finite automata, push-
down automata and Turing Machines.
CO2 Classify various computational models based on their expressive power.
CO3 Solve various computational problems using the mathematical models.
CO4 Analyse and differentiate the capabilities of various models.
CO5 Design various mathematical models for any computable problems.
CO6 Explain and justify various theorems and select appropriate mathematical models of computers.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 3 2 12 - - - 17
CO2 1 - 13 3 - - 17
CO3 - 10 31 - - - 41
CO4 4 - 13 - - - 17
CO5 3 1 12 - - - 16
CO6 4 12 - - - - 16
124
Course Code 14CS2009 / 19CS2005 Duration 3hrs
Course Name DATA STRUCTURES AND ALGORITHMS Max. Marks 100

Q. Questions CO BL Mark
No s
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Arrange the given Big O notations in ascending order in terms of rate of
growth. CO1 U 1
O (log n), O (n), O (1), O (n!)
2. Represent the function “23n4 + n2 log n + 5n” in Big-Oh notation. CO1 U 1
3. Convert the given infix expression to postfix expression.
CO2 U 1
(2 + 3) * (3 / 2)
4. State any applications of Queue data structure. CO2 R 1
5. Write the time complexity to delete an element at the front of the singly
CO3 U 1
linked list.
6. Let last denote the last node of a circular linked list. If last.next= None,
CO3 U 1
how many node(s) is/are there in the circular linked list?
7. Write the best-case time complexity of bubble sort algorithm. CO4 R 1
8. What would be the order of values after the first iteration of insertion sort
in the following list of values? CO4 U 1
45, 13, 32, 86, 2, 94
9. Sketch a valid Complete binary tree. CO5 R 1
10. Find the height of NODE 10:

CO6 A 1

PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Calculate the address of A[1700] for the given base address of an array CO1 U 3
A[1300…………1900] as 1020 and the size of each element is 2 bytes in
the memory.
12. Evaluate the postfix expression “ABC+*D-“, where A = 2, B = 5, C = 3 CO2 A 3
and D = 10 using stack. Show the contents of the stack in each step of the
evaluation.
13. List any three differences between singly linked list and doubly linked list. CO3 U 3
14. Consider a hash table of size 7. Insert the values 28, 39, 17, 45, and 49 into CO4 A 3
the hash table using the hash function “value mod 7”. Handle collisions, if
any, by applying separate chaining.
15. List the Properties of Binary Tree. CO5 R 3
16. Differentiate null graph and complete graph with suitable diagrams. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. State the constraints of the inputs and write the pseudocode for CO1 R 12
distribution counting sort. Apply the algorithm for sorting the following
list:
3, 2, 5, 8, 2, 2, 3, 8

18. Assume A=4, B=8, C=10. Write the pseudocode and evaluate the following CO2 A 12
postfix expressions.
a. A B + C – B A + C +-
b. A B C + * C B A – + *

19. Describe the following functions in a doubly linked list with suitable CO3 A 12
pseudocode:
 Insert at the front
 Insert in the middle
 Delete from the front
 Delete the middle element

20. Explain with the algorithm how the merge sort technique sorts the list CO4 A 12
of inputs. Apply the algorithm to sort the list of numbers 34, 56, 47, 33,
13, 86, 42, and 92.

21. Write the pseudocode to insert a node in a binary search tree. Construct CO5 A 12
a binary search tree by inserting the values 35, 46, 29, 23, 34, 28, 9, 32,
73, 63, 92.

22. Explain hashing technique for storing and accessing data. Illustrate the CO4 A 12
linear probing method for handling collisions by keeping the following
values in a hash table of size 10. Apply the hash function “key % 10”.
63, 39, 69, 22, 45, 19, 52, 33

23. Illustrate the pseudocode to perform binary search on a given set of ‘n’ CO4 U 12
numbers. Using the algorithm search for the element 48 in the set [12,
23, 34, 44, 48, 53, 87, 99]
COMPULSORY QUESTION
24. Describe the Breadth First Search and Depth First Search algorithm of CO6 U 12
the graph with an example.
CO – COURSE OUTCOME BL – BLOOMS’ LEVEL
COURSE OUTCOMES
CO1 Understand the basics of abstract data type and algorithm analysis.
CO2 Illustrate the use of an array to implement stack and queue.
CO3 Apply the linked list to design stack and queue data structures.
CO4 Demonstrate the working of sorting and searching algorithms and application of hashing.
CO5 Understand the different types of tree data structures and demonstrate the methods for traversing
trees.
CO6 Differentiate the graph representations and traversals.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 12 5 - - - - 17
CO2 1 1 15 - - - 17
CO3 - 5 12 - - - 17
CO4 1 13 27 - - - 41
CO5 4 - 12 - - - 16
CO6 - 15 1 - - - 16
124
Course Code 14CS2034/17CS2010 Duration 3hrs
Course Name OBJECT ORIENTED ANALYSIS AND DESIGN Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name the tools used by the analyst for extracting information. CO1 R 1
2. Define pattern. CO1 R 1
3. Write the 80-20 rule. CO2 A 1
List out the different classes available in common class pattern
4. CO2 R 1
approach.
5. Give the guidelines for naming a class. CO3 U 1
6. Name the different types of Attributes. CO4 R 1
7. Write the attribute presentation suggested by UML. CO4 A 1
8. Write the abbreviation of CRC. CO5 R 1
9. Define Axiom. CO5 R 1
10. Name the two major tasks of access layer. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Define prototyping and explain the types of prototyping. CO1 R 3
12. List the major difference between design pattern and frameworks. CO2 R 3
13. Differentiate Actor over user with sample example. CO3 U 3
14. Write short notes about coupling. CO4 A 3
15. Write the difference between alpha and beta testing CO5 A 3
16. Show the activity diagram for Bank Client class verify password. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe object-oriented systems development life cycle. CO1 R 8
b
Write the four quality measures in system evaluation with diagram. CO1 A 4
.

Write notes on:


18. CO1 A 12
a. Encapsulation b. Class Hierarchy. c. Polymorphism
19. a. Explain with an example of UML Class Diagram. CO3 U 6
b Create a sequence diagram for applying medical leave in
CO3 C 6
. mykarunya.

Discuss Noun phrase approach of identifying classes with sample


20. CO4 U 12
examples from ATM system.

Give a detail description about class visibility and refining


21. a. CO5 U 8
attributes while designing classes.
b
Describe the processes and concepts of the unified approach. CO5 R 4
.

22. a. Enumerate the super – subclass relationships with an example. CO4 R 6


b
Design a five different CRC card for Library management system. CO2 C 6
.

Create the use case and state chart diagram for the below given
problem statement.
The manual system of ticket reservation takes more time
and the number of reservations per day is limited. To increase the
efficiency of the process, the online ticket reservation system is
developed. This system is built for user to directly access the
23. CO2 C 12
system online to book tickets. The user can book, print, delete
tickets without the help of a clerk. The administrator has control
over adding available flights for booking and has control over
deleting flights that are not necessary. The administrator and user
both can make entry in the system using their respective login
details.
COMPULSORY QUESTION
Explain the Object-Oriented Design Axioms and Corollaries in
24. CO6 U 12
detail.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the various object-oriented concepts.
CO2 Recognize the requirements of any real time application.
CO3 Sketch the design of any application using UML diagram.
CO4 Identify various prototypes to represent the application.
CO5 Prepare the documentation of any real time application.
CO6 Explain the application in terms of use case driven approach.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 13 - 16 - - - 29
CO2 4 - 1 - - 18 23
CO3 - 10 - - - 6 16
CO4 7 12 4 - - - 23
CO5 6 8 3 - - - 17
CO6 1 15 - - - - 16
124

Course Code 14CS2035 / 17CS2012 Duration 3hrs


Max.
Course Name OBJECT ORIENTED PROGRAMMING IN C++ 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recite the use of the ternary operator in C++. CO1 R 1
2. Compare variables and constants in C++. CO1 U 1
3. Recall enumeration with an example program. CO2 R 1
4. Compare while and do while in C++. CO2 U 1
5. Define parameterized constructor. CO3 R 1
6. Recall new operator with a suitable example. CO3 R 1
7. List any two operators that cannot be overloaded. CO4 R 1
8. Differentiate friend function and virtual function. CO4 U 1
9. Define file pointer. CO5 R 1
10. Define seekp() function. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List any three features of object oriented programming. CO1 R 3
Write a C++ program to calculate the area of a triangle using an inline
12. CO2 A 3
function.
13. Discuss default constructors with an example in C++. CO3 U 3
14. Write a C++ program to swap two numbers using the function template. CO4 A 3
15. Discuss the use of private specifiers and their visibility in the class. CO5 R 3
16. Illustrate string concatenation in C++. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Write a C++ Program to check whether the given number is
17. a. CO1 A 8
palindrome or not.
b
CO1 R 4
. List any four applications of OOP.

Write a C++ program to generate all the prime numbers between 1


18. a. CO2 A 8
and n, where n is a value supplied by the user.
b Differentiate break and continue statements.
CO2 U 4
.

Write a C++ program to overload the unary operator as a member


19. a. CO3 A 6
function.
b Write a C++ program to overload the binary operator as a non-
CO3 A 6
. member function.

Write a C++ program to multiply two numbers using the class


20. a. CO4 A 6
template.
b Write a C++ program to find the maximum and minimum number
CO4 A 6
. using the function template.

21. a. Illustrate the virtual function with an example. CO3 U 6


b Write a C++ program to find the factorial of a number.
CO1 A 6
.

22. a. Explain in detail the friend function with an example. CO5 U 6


b Explain multilevel inheritance in C++ with an example.
CO5 U 6
.

23. a. Illustrate the exception handling mechanism. CO4 U 6


b Write a C++ program to read the contents from the
CO6 A 6
. file“karunya.txt” and write it into the file “university.txt”.
COMPULSORY QUESTION
Explain the role of strcmp(),strcpy(), strchr(),strlen() function in the
24. a. CO6 U 12
string manipulation.

COURSE OUTCOMES
CO1 Define the object-oriented programming concepts.
CO2 Select the relevant object oriented concepts to implement a real time application.
CO3 Demonstrate the application of polymorphism in various ways.
CO4 Illustrate the use of advanced features of C++ such as templates, exceptions, and multiple
inheritances.
CO5 Create applications using inheritance in C++.
CO6 Explain file management and string manipulation.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 1 14 - - - 23
CO2 1 5 11 - - - 17
CO3 2 9 12 - - - 23
CO4 1 7 15 - - - 23
CO5 4 12 - - - - 16
CO6 1 15 6 - - - 22
124

Course Code 14CS2038/17CS2016 Duration 3hrs


Course Name PRINCIPLES OF COMPILER DESIGN Max. Marks 100

Q. Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. Justify the need of a compiler in program execution. CO1 U 1
2. Define assembler. CO1 R 1
3. Write a regular expression for decimal numbers. CO2 A 1
4. What is input buffering? CO2 R 1
5. Which LR parsing Technique is most powerful? CO3 U 1
6. Enumerate the advantages of bottom up parsing. CO3 R 1
7. When a syntax directed definition is said to be S- attributed CO4 U 1
grammar?
8. Why various storage allocation techniques are adapted? CO5 U 1
9. What is dangling reference problem? CO6 R 1
10 Enumerate the basic goals of code movement. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Draw the schematic representation of the language processing CO1 R 3
system.
12. Write a LEX program to count the number of odd decimal CO2 A 3
numbers
13. Write a YACC program to check whether the string is part of the CO2 A 3
language {anbn: n 1}.
14. Give the syntax-directed definition for declaration statement. CO4 R 3
15. What is activation tree? How are names bounded with the CO5 R 3
environment?
16. Justify the need of data flow analysis in code optimization. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Explain the various phases of a compiler in detail. Tabulate CO1 R 12
the process of compilation of each phase for the program
segment
a : = b + c *60 where c is float data type.
18. a. Convert (01)*(0|1) into NFA using Thompson’s construction. CO5 U 6
b. Minimize the given DFA CO5 U 6

19. Construct the predictive parsing table for the following CO4 A 12
grammar and parse “~(0 || 1)”.

be -> be || bt / bt
bt -> bt && bf / bf
bf ->~bf / (bf) / 0 / 1
20. Write code to generate intermediate code for assignment and CO4 12
control statements.
21. Change the expression “a = (a+b) * - c +(a +b)/ d” into three CO2 A 12
address code, quadruple, triple, indirect triple, syntax tree,
DAG and postfix notation.
22. Construct DFA for the given regular expression (0|1)*10*. CO3 A 12
23. Construct SLR paring table for the given grammar and parse CO4 A 12
“abb”
X ->YY
Y ->aY | b
COMPULSORY QUESTION
24. Illustrate optimization of basic blocks using necessary CO6 U 12
examples.

COURSE OUTCOMES
CO1 List and define various stages of compiler.
CO2 Select and use standard tools and techniques in different stages of compiler design.
CO3 Illustrate various algorithms of different phases of compiler design.
CO4 Compare and contrast various methods for implementing the phases of a compiler.
CO5 Design and construct different phases of the compiler.
CO6 Evaluate and choose various compilers for different practical application development.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 16 1 - - - - 17
CO2 1 12 19 - - - 32
CO3 1 1 12 - - - 14
CO4 4 - 24 - 28
CO5 3 13 - - - - 16
CO6 2 3 12 - - - 17
124
Course Code 14CS2040 / 17CS2017 Duration 3hrs
Max.
Course Name PROGRAMMING IN JAVA 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define recursion in java. CO1 U 1
2. List out the types of polymorphism in java with sample code. CO1 R 1
3. List out the features of java. CO1 R 1
Find out the error in the following Java code?
4. byte b = 50; CO2 A 1
b = b * 50;
5. Number of primitive data types in Java are? CO2 R 1
6. Identify the size of float and double in java? CO2 U 1
Identify the output of the following program.
7. String str = “Hellow”; CO3 A 1
System.out.println(str.indexOf(‘t));
8. What is Runnable? CO3 R 1
9. Which class provides system independent server side implementation? CO3 U 1
10. Which layout manager arranges components in a grid? CO3 U 1
PART – B (6 X 3 = 18 MARKS)4
(Answer all the questions)
11. Predict the output: CO1 A 3
class parent{
protected int a =20;
public int b = 22;

}
class child extends parent{
int c = 25;

}
public class driver{
public static void main(String[] args)
{
child obj_child = new child();
System.out.println("value of a = "+ (obj_child.a-1));
}
}
12. CO1 U 3
Differentiate single inheritance and inner class with necessary code snippet.
13. Create a java application to find out given number is prime or not. CO2 A 3
14. Predict the output:
public class create {
public static void main(String[] args)
{
for(int i = 0; i <-5;j++){
CO2 A 3
System.out.println("14CS2040");}
}
}
15. CO3 R 3
Define Data hiding in Java.
16. CO3 R 3
List out the models available for event handling?
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Write a java application to perform sum of n numbers using class
CO1 A 12
and object.

18. Create a class with name “Office” using java program. Also create
variables basic_Pay, DA and net_salary. While executing the
CO1 A 12
program, get basic_Pay and DA for two objects. Calculate the
net_salary for object 1 and object 2.

19. Differentiate while loop and do-while loop with sample code. CO1 U 12

20. Write a code snippet to implement dynamic polymorphism in multilevel


inheritance.
CO2 A 12

21. Write a java application for basic calculator with following four
functions, Addition, Subtraction, Multiplication and division. Create an
outer class called calculator. Also create four inner classes for each basic
function in the calculator application. Each inner class display the result CO2 A 12
of the operation. All the four inner class functions must be access through
another class called driver class. While execution, value_1 and value_2
need to be taken from user. End of the execution display all the results.

22. Consider the following:


Use an array to get 4 different integer values from the user. Value 1 form
that array need to be divided by Value 4. CO2 A 12
Analyze the above conditions and write code snippet to fulfill the same.
Also predict the possible exceptions for above conditions and add
respective exception handling into the code snippet.

23. Write a code snippet to implement sum of given numbers using recursion. CO3 A 12
COMPULSORY QUESTION
24. Write a code snippet to implement client server communication using
socket programming.
CO3 A 12
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Demonstrate the programming concepts of Java.
CO2 Apply the object oriented concepts to create stand-alone applications.
CO3 Design and develop GUI applications using Abstract Window Toolkit (AWT) and Event
Handling.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 14 30 45
CO2 1 1 43 45
CO3 2 7 25 34
124
Course Code 14CS2042/18CS2018/17CS2018 Duration 3hrs
Course Name SOFTWARE ENGINEERING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Sketch the architecture of software engineering layers. CO1 A 1
2. Identify the process model during analysis and design phase. CO1 R 1
Predict the type of relationship that exists between the given following
classes.
3. CO2 U 1
Car Engine

4. List any two characteristics of software as a product. CO2 R 1


5. Define “abstraction” and give an example. CO3 R 1
6. Write any two reasons for reducing the module size in a project. CO3 A 1
7. Write the formula to calculate software availability. CO4 A 1
Identify any one object oriented paradigm that could help for code
8. CO4 R 1
reusability.
9. Define white box testing. CO5 A 1
List the key participants in software configuration
10. CO6 R 1
management.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate Linear Process Flow and Parallel Process flow. CO1 An 3
12. Lists any 5 Agile Principles for achieving Agility. CO2 R 3
Discuss the tasks in Inception and Elicitation phase of requirements
13. CO3 U 3
engineering.
14. Sketch the sequence diagram to withdraw money using a visa card. CO4 A 3
15. Explain the elements of software quality assurance. CO5 A 3
Discuss about Pareto principle in a product development
16. CO6 U 3
process.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Describe any three prescriptive process models that have provided a
17. CO1 R 12
reasonably effective roadmap for software teams.
18. Explain about the software design concepts with examples. CO2 A 12

19. Illustrate the taxonomy of architectural styles with neat diagrams. CO3 A 12

Apply a logical complexity measure of a procedural design and the


a. test cases to execute every statement in the program using basis CO3 A 8
20. path testing.
b Describe about formal technical review and informal review. CO2 R 4

Sketch the class diagram for the following problem statement.


“A library lends books and magazines to members, who are
registered
in the system. Also it handles the purchase of new books for the
library. Popular books are bought in multiple copies. The old books
21. a. and magazine are removed when they are out of date or poor CO3 A 8
condition.A member can reserve a book or magazine that is not
currently available in the library, so that when it’s returned or
purchased by the library, that person is notified. The librarian can
easily create, update, and delete information about the books,
members, loans, and reservations in the system”.
b Explain the interface design activities and the steps to be performed
CO4 A 4
. to accomplish interface design.

Explain the testing process of a web application and map the testing
22. a. CO5 A 8
with the design pyramid.
b Describe the six-sigma quality standards in software engineering
CO5 U 4
. process.

Discuss on the following software metrics.


23. a. i. Size-oriented CO5 U 6
ii. Function-oriented
b
CO5 U 6
. Describe the SCM repository and its features with a neat diagram.
COMPULSORY QUESTION
Explain the concept of software process improvement with its
24. CO6 A 12
frame work activities.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Discover an effective software engineering process to develop software-intensive systems.
CO2 Translate the requirements specification into an implementable design
CO3 Construct UML diagrams along with design strategies and design patterns.
CO4 Analyze architectural design methods.
CO5 Evaluate the system using various testing strategies
CO6 Develop the software system with quality measures.
Assessment Pattern as per Bloom’s Taxonomy
CO / P R U A An E C Total
CO1 13 - 1 3 - - 17
CO2 8 1 12 - - - 21
CO3 1 3 29 - - - 33
CO4 1 - 8 - - - 9
CO5 - 16 12 - - - 28
CO6 1 3 12 - - - 16
124
Course Code 14CS2045 / 17CS2019 Duration : 3hrs
Course Name SYSTEM SOFTWARE Max. Marks : 100

Q. CO/BL Mark
Questions
No. s
PART – A (10 X 1 = 10 MARKS)
1. Define Indirect addressing. CO1/ R 1
2. List the various addressing modes that are used in SIC/XE architecture. CO1 / R 1
3. Name the assembler directives used in the SIC assembler language. CO2 /R 1
4. Recall the function of linking loader and linkage editor. CO3 /U 1
5. Estimate the object code for the given below instruction when Jump to the CO4 / A 1
subroutine RDREC is made to the address 1036 and opcode for the
mnemonic JSUB is 48.
+JSUB RDREC
6. State the difference between LDA # 3 and LDA THREE? CO4 1
/An
7. Identify the special character to create unique labels in macroprocessor. CO5 / U 1
8. Name the data structure in which macro definition including macro prototype CO5/R 1
and macro body are stored.
9. List the type of editors. CO6 / R 1
10. Review the use of DBMS. CO6 / U 1

PART – B (6 X 3 = 18 MARKS)
11. Distinguish between system software & application software. CO1 / An 3
12. Discuss the functions to translate source program to object program. CO4 / U 3
13. Write the header and text format for generating object program. CO4 / R 3
14. Describe Automatic Library Search. CO3 / U 3
15. Differentiate macro and subroutine. CO5 / An 3
16. Brief on the level of data description. CO6 / U 3

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23. Q.No 24 is Compulsory)
17. Compare and Contrast SIC architecture with SIC/XE architecture. CO1 / An 12

18. Describe the functions of two pass assembler for converting the CO2/ U 12
assembly language code into object code.

19. Write the algorithm for an absolute loader. Mention the advantage CO3/ A 12
and disadvantage of an absolute loader. Illustrate how this program
would be loaded in memory?
H^ALPHA^001000^000019
T^001000^13^010003^132010^050000^6F1000^169001^0F9000^13
E^001000
20. a. Explain how conditional macro differs from ordinary macros with an CO5/ U 6
example.
b. Describe the various tables used in macro processor. CO5/ U 6

21. Elaborate the following machine independent features of assembler CO2 / U 12


with examples.
a. Symbol defining statement
b. Program blocks
c. Control sections

22. Discuss the working of Bootstrap loader. CO3 / U 12

23. List the various addressing modes of ULTRA SPARC architecture. CO1 / R 12
COMPULSORY QUESTION
24. a. Sketch the Editor structure and explain the document editing process. CO6 /U 8
b. Brief on the debugging functions and capabilities. CO6 / U 4
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 List different system architectures like SIC, CISC and RISC.
CO2 Explain algorithm and data structures for assembler.
CO3 Choose different features of loader and assembler.
CO4 Examine the object program.
CO5 Comply macros in assembler.
CO6 Select different system software for practical applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 14 - - 15 - - 29
CO2 1 24 - - - - 25
CO3 - 16 12 - - - 28
CO4 3 3 1 1 - 8
CO5 1 13 - 3 - - 17
CO6 1 16 - - - - 17
124
Course Code 14CS2050/17CS2022 Duration 3hrs
Course Name UNIX ARCHITECTURE Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. The shell command used to list all the files in a terminal is ________. CO1 U 1
2. Mention the language in which the unix file system was written. CO1 R 1
3. __________ is the system call used to get the parent process ID. CO2 R 1
4. Define fork(). CO2 A 1
5. Directories are created using _______ system call. CO3 R 1
Two or more unrelated processes can communicate through ________
6. CO3 U 1
inter-process communication schemes.
7. Infer the role of swapper process in an operating system. CO4 R 1
8. Write the syntax of kill system call. CO4 R 1
9. List the classification of signals. CO5 R 1
10. __________ is the system call to allocate shared memory space. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Define system call. CO1 R 3
12. Write the syntax to convert a pathname into its inode and explain it. CO2 U 3
13. When does the kernel remove the entries for sticky-bit text regions? CO3 An 3
14. Discuss the four system calls related to Time. CO4 U 3
15. Write the advantages of creating pipes. CO5 A 3
16. Write the syntax for allocating shared memory space. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Illustrate the various scenarios for retrieval of a buffer with necessary CO1 R 12
algorithm.

18. Discuss the algorithm to convert the given path name into its inode CO2 U 12
with example.
19. Describe system calls related to changing the file attributes with CO3 R 12
example.

20. Sketch and explain the various states of the process and its transitions CO4 U 12

21. Demonstrate the working of process creation. CO5 R 12

22. Consider three different processes A, B and C and assume that the CO5 A 12
initial priority for the processes is 60. The highest user-level priority
is 60 and the clock interrupts the system 30 times a second. Compute
the decay of the CPU usage and the process priority between process
A, B and C.

23. Write and explain the algorithm for allocating space from maps. CO6 U 12

COMPULSORY QUESTION
24. Describe how a memory is shared by two processes and demonstrate CO6 U 12
using code and algorithm.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the architecture and features of UNIX Operating System.
CO2 Identify UNIX commands for file handling and process control.
CO3 Discover the context of a process and system calls that manipulate and control process context.
CO4 Illustrate data structure of file, process and system calls for file subsystem and process control sub
system.
CO5 Develop the internal algorithms of the kernel.
CO6 Appraise the various Inter-process communication methods.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 16 1 - - - - 17
CO2 1 15 1 - - - 17
CO3 13 1 - 3 - - 17
CO4 2 15 - - - - 17
CO5 13 - 15 - - - 28
CO6 1 27 - - - - 28
124
Course Code 14CS2054 / 18CS2027 Duration 3hrs
Course Name C# AND .NET PROGRAMMING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. Differentiate value and reference data type in C#. CO1 U 1
2. Predict the output for the following code snippet. CO1 U 1
int? a = null;
int c;
c = a ?? 50;
System. Console. WriteLine("The value of c"+c);
3. Examine the keyword used to pass the value type variables to another CO1 R 1
function by the reference.
4. Predict the output and justify the answer. CO1 U 1
String s = "C#";
String s1 = s;
s1 = s1 + " Programming";
Console.WriteLine(s+ " " + s1);
5. Observe the following C# code snippet and predict the output. CO4 U 1
using System.Collections.Generic;
class Program{
static void Main(){
List<int> l = new List<int>();
l.Add("123");
}}
6. Visualize the memory allocation of an integer value in a Stack memory CO4 R 1
area.
7. Illustrate the role of DataAdapter in ADO.NET disconnected architecture. CO5 U 1
8. Name the panel that enables you to explicitly position controls in WPF. CO6 R 1
9. List the mechanisms used for state management on the client side in CO6 R 1
ASP.NET application.
10. Identify the most important object that supports partial page rendering in CO6 R 1
ASP.NET AJAX.
PART – B (6 X 3 = 18 MARKS)
11. Express how jagged array is different from multidimensional array with CO1 U 3
sample C# code.
12. Differentiate method overloading and method overriding with C# code CO1 U 3
snippet.
13. Describe the synchronization issues that can happen with multiple threads CO2 U 3
and indicate some of the mechanisms used to resolve it.
14. Define the role of assembly in .NET environment with neat structure and CO4 R 3
mention its types.
15. Describe the execute methods associated with the <provider> Command CO5 R 3
classes to execute the SqlCommand.
16. Examine the three types of action selector attributes and its usage with CO6 R 3
proper syntax in ASP.NET MVC.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Develop an application in C# for automating the Banking Operations CO3 A 8
using interfaces.
 Create an interface called “Transaction” that contains the
functions such as deposit, withdraw, and viewBalance.
 Create a class called “Account” with bank account details such as
acc_name, acc_no, and balance.
 Add the necessary constructor and implements the “Transaction”
interface in the “Account” class. Define the logics in the
corresponding methods.
Create necessary object in the main and invoke the functionalities.
b. Discuss the flow control statements with suitable C# code snippet. CO1 U 4

18. Consider a Height class with feet and inches as data members that CO2 A 12
denotes the height of the student. Write a C# program to overload the
+, -, and <= operators.
Note: 12 inches = 1 feet. The height representation should be
displayed in the format of 5'10".

19. a. A private company wish to recruit employees with the eligibility of CO2 A 8
“5+ years as programmer”. If the registered person is not eligible then
handle the following situation using the User Defined Exceptions in
C#.
 If below 5 years of experience, then throw an exception named
“Exp_Shortage_Exception”
 If the eligible skill is not programmer, then throw the exception
called “Skill_Shortage_Exception”
 If the length of the user’s name is less than 10, then throw the
exception called “InvalidUsernameException”
b. Write a C# program to capture 6-digit numbers and title case words CO3 U 4
with regular expression.
(For example - Input: 276543 678 It is Good,
Output: 276543 It Good)

20. a. Write a C# program to print multiples of 4 and 6 using two different CO2 A 8
threads with the intervals of two seconds and three seconds
respectively. Use any one synchronization mechanisms to ensure one
thread gets executed after the other.
b. Express the C# syntax to create the following: CO4 U 4
 Create custom attribute called FixAttribute with ‘Fixid’ and
‘Description’ as the positional parameters and ‘Developer’ as the
named parameter.
 The custom attribute is targeted to Class and allow multiple is true.

21. a. Create a class named Calculator with methods sum(i,j), diff(i,j) and CO5 A 8
prod(i,j). Write a C# code to invoke these functions by applying
multicast delegate.
b. Examine how master page differs from the ASP.NET page. CO6 U 4

22. a. Discuss the three programming models with Entity Framework CO5 U 6
in .NET.
b. Develop a generic Stack that can hold only integer values and perform CO4 A 6
various stack operations.

23. a. Elucidate the importance of server validation controls such as CO6 U 6


RequiredFieldValidator, RangeValidator and CompareValidator in
ASP.NET with sample C# code snippet.
b. Discuss the mechanisms to automate the freeing of unmanaged CO4 U 6
resources in .NET environment.
COMPULSORY QUESTION
24. Develop an ASP.NET application using C# to perform the following CO6 A 12
operations with ADO.NET.
 Design a web page with relevant fields
 Connect with the database named ‘KITS’
 Insert a record in the table called ‘IVCSE’ with fields such as
regno (varchar), and name (varchar)
 Delete an entity from the table
 Display the details dynamically in the GridView control
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the basics programming constructs of C# in .NET Framework.
CO2 Extend and debug variety of .NET applications.
CO3 Demonstrate the aspects of object-oriented functionalities in .NET applications.
CO4 Use the .NET base libraries in developing real time applications.
CO5 Illustrate .NET applications with relational database and variety of data sources for efficient data access.
CO6 Develop well designed ASP.NET applications using .NET framework.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 1 13 14
CO2 3 28 31
CO3 4 8 12
CO4 4 11 6 21
CO5 3 7 8 18
CO6 6 10 12 28
124
Course Code 16CS2002/18CS2086/17CS2038 Duration 3hrs
Course Name FUNDAMENTALS OF JAVA PROGRAMMING Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)

1. Mention the range of byte data type in Java. CO1 R 1


2. Name the primitive data type that is used to store decimal values. CO1 R 1
Interpret the output of the sample code given below:
1. public class OperatorExample{
2. public static void main(String args[]){
3. int x=10; CO2 A 1
4. System.out.println(++x );
5. System.out.println(x--);
3. }}
4. Justify the reason, that the main() method can overload in java. CO2 U 1
5. List out the three ways to access the package from outside. CO3 R 1
1. Determine the output of the given program
2. public class JavaExceptionExample{
3. public static void main(String args[]){
4. try{
5. int data=10/0; CO3 A 1
6. }catch(ArithmeticException e){System.out.println(e);}
7. System.out.println("rest of the code...");
8. }
6. }
7. Mention any two reasons for using Synchronization. CO4 R 1
Interpret the output for the sample code given below:
public class StringExample{
public static void main(String args[]){
String str1="swing"; CO4 A 1
System.out.println(str1.concat(“check”));
}
8. }
9. List out the wrapper’s classes in boxing. CO5 R 1
10. Name some of the list layout managers in Java. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Illustrate a java program to check eligibility for voting if the person age is
given as 19. CO1 A 3

12. Classify the use of abstract class from a regular Class. CO2 R 3
13. Write the rules for Java Abstract class. CO3 R 3
14. Write in detail about strcmp() with suitable example. CO4 U 3
15. Demonstrate a java program to illustrate the concept of file Creation CO5 A 3
16. List out the differences between Paint() And Paintcomponent(). CO6 An 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Discuss the various conditional and looping statements in java with
CO1 R 12
an example program for each.

18. Define constructor. Explain its types with suitable example. CO2 R 12

19. a. Write a Java program to use the concept of method overloading to


CO3 A 6
implement the sum of numbers stored in an array.
b. Write a Java program to illustrate the concept of Inheritance. CO3 A 6

20. a. Demonstrate the concept of packages with an example program CO4 A 8


b. Explain in detail Multithreading with an example program CO4 R 4

21. Explain in detail the following with an example program:


CO5 U 12
a) FileInputStream b) FileWriter

22. Write in detail the different operators available in java with an


CO1 A 12
example program.

23. Discuss in detail the following:


a) Inter-thread Communication CO4 U 12
b) Deadlock
COMPULSORY QUESTION
24. Explain in detail AWT event hierarchy. CO6 U 12
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the fundamental principles of object-oriented design.
CO2 Identify the fundamental programming constructs to develop real time applications.
CO3 Model applications using Java.
CO4 Demonstrate the development of multitasking applications
CO5 Breakdown the real time applications into small abstract entities
CO6 Develop desktop-based applications.
Assessment Pattern as per Bloom’s Level
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 14 - 15 - - - 29
CO2 15 01 01 - - - 17
CO3 04 - 13 - - - 17
CO4 05 15 09 - - - 29
CO5 01 12 03 - - - 16
CO6 01 12 - 03 - - 16
124
Course Code 17CS2024 Duration 3hrs
Course Name WEB TECHNOLOGY Max. Marks 100

Q.
B
No Questions CO Marks
L
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. State the HTML syntax to include an image of dimensions 200x200. R 1
1
CO
2. Enumerate any one of the ways to create a button with its syntax. R 1
1
Define the HTML code to display the following text. CO
3. The Product MRP is Rs.10000, Offer Price is Rs.10000 Rs.5999
U 1
2
CO
4. State the CSS Selector that selects the HTML element by the # symbol. R 1
2
CO
5. Differentiate between fixed and sticky positioning in CSS. U 1
2
CO
6. Identify the method used to call a JavaScript function every specified millisecond. R 1
3
CO
7. Enumerate the ways to include javascript in an HTML file. U 1
3
CO
8. State the angular JS filter to display the cost of a product in dollar format. U 1
5
Find the output of the code below:
<?PHP CO
9. ECHO CHR(65);
R 1
6
?>
Find the output of the code below:
<?php
CO
10. echo "I'm about to learn PHP!<br>"; R 1
echo "This ", "string ", "was ", "made ", "with multiple parameters."; 6
?>
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Describe the HTML code to display the following content on a web page.
I. First Heading
 First Sub heading1
 First Sub heading2 CO
11.
II. Second Heading
U 3
1
 Second Sub heading1
 Second Sub heading2

12. Report the complete HTML program with JavaScript code to display time in the CO U 3
popup message box every 60 seconds.
3
Develop the bootstrap code for the following buttons
CO
13. A 3
2

CO
14. Display the array elements in HTML list format using AngularJS ng-repeat. R 3
5
CO
15. Differentiate between PHP sessions and cookies with suitable example snippet U 3
4
Develop the following output using the AngularJS filter.
CO
16. A 3
6

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Develop an online registration form using HTML and CSS as given below
with the necessary attributes to make all fields mandatory.

CO
17. A 12
1

Develop an HTML web page with appropriate JavaScript per the following
design and read the value of A and B, then automatically display the sum of A
and B in the result text box. CO
18. a. A 6
3

b Describe any five JavaScript document object model methods with example CO U 6
. programs. 3

Discuss the following CSS positioning with suitable programs each. CO


19. a.
a)relative b) absolute c) fixed d) sticky
U 12
2

Develop a web page with a DIV element and apply the following styling
effects using internal CSS.
(i) Set the background image for the DIV element
(ii) Set the font colour as yellow for the DIV element CO
20.
(iii) Set the DIV border as solid and orange color A 12
2
(iv) Display the text on the right
(v) Set the space between the border and content as 40px for the DIV element.
(vi) Set the width and height of DIV as 300px.

Sketch the following content using HTML

CO
21. a. A 6
1

Explain the following list in HTML with suitable example programs


b  Ordered List CO
.  Unordered List
U 6
1
 Definition List

Develop an HTML program with javascript actions to calculate and display


the BMI value and Status for the given weight and height.
BMI = weight(kg)/[height(m)]2
Check the status using the following conditions.
• Underweight: BMI < 18, Normal: BMI between 18 – 25, Overweight: BMI
between 25 – 30, Obese: BM > 30

CO
22 A 12
3

23. Construct the following HTML form and store the obtained form data in the CO A 12
MySQL database on the next page using PHP database connectivity. Also, 4
display the inserted data on the next page.
COMPULSORY QUESTION
Develop a webpage using HTML, and Angular JS Routing for your job portal
website as per your choice with the following pages
a. Main HTML program with Angular JS routing
b. Hyper-Links
 Candidate1 CO
24.
 Candidate2
A 12
6
 Candidate3
 Candidate4
 Candidate5

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Select appropriate design standards for designing attractive web pages.
CO2 Identify the latest client and server-side technologies for creating interactive data driven websites.
CO3 Apply properties and methods which facilitate dynamic application development.
CO4 Model dynamic web applications using suitable server-side technologies integrated with the
database.
CO5 Create fully functional web applications that incorporate planning, designing, coding, testing, and
publishing to a web server.
CO6 Attach rich interactive features for web applications using MVC based framework.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 9 18 - - - 29
CO2 1 14 27 - - - 42
CO3 1 10 6 - - - 17
CO4 3 - 12 - - - 15
CO5 4 - - -- - - 4
CO6 2 - 15 - - - 17
124
Course Code 18CS1001 Duration 3hrs
Course Name INFORMATION AND COMMUNICATION TECHNOLOGY Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (20X1=20 MARKS)
1. Define Program. CO5 R 1
2. What is NIU? CO3 R 1
3. What do you mean by two state devices? CO2 R 1
4. Which organization has evolved a standard code to represent characters
CO2 R 1
to be stored and processed by computers?
5. Covert the binary number 11111 into decimal number. CO4 E 1
6. Which notation is a more concise numerical representation? CO1 R 1
7. What is TIFF? CO5 R 1
8. Find the decimal value of the binary fraction 0.1011. CO2 A 1
9. Write the base for hexadecimal system? CO2 U 1
10. How many bytes of memory are required for a 1 minute telephone
message has to be stored? (Hint: Consider the no. of samples per CO2 A 1
second is 6700).
11. How many 2 mins songs can be stored in a 32 MB storage device?
CO2 A 1
Consider the memory need for 2 mins of song is 2.52 MB.
12. Write the Nyquist theorem. CO5 A 1
13. Define Analog signal. CO4 R 1
14. Which is used to fabricate DRAM? CO3 U 1
15. ROM uses semiconductor memory cells which can be permanently
CO3 E 1
placed in one of two states 0 or 1. Name the process.
16. Expand MIDI. CO5 R 1
17. What is the program which allows entering text using keyboard? CO3 U 1
18. What assists users to carryout operations of creating, storing, accessing,
CO5 U 1
editing, updating and querying a database?
19. What is DTP? CO5 R 1
20. Name the component which is used to create visually pleasing display
CO4 U 1
of documents on the computer connected to internet.
PART – B (10 X 5 = 50 MARKS)
(Answer any 10 from the following)
21. Sketch the functionality of MP3 music system. CO1 E 5
22. Find the hexadecimal representation of decimal numbers from 0 to 11. CO2 R 5
23. List down the different image file formats along with their applications
CO2 U 5
and advantages.
24. Find the number of bits used to represent the amplitude of telephone
CO1 R 5
conversations.
25. Diagrammatically portray the connection between PCs/LANs and
CO3 U 5
telephone lines.
26. Identify the different functions of operating system. CO5 R 5
27. Schematically portray the interconnection of CPU with memory and
CO3 R 5
I/O units.
28. Illustrate the classification of programming languages based on
CO3 U 5
applications.
29. How does the memory cell work? CO3 R 5
30. Show the different types of graphic processing? List out their
CO5 R 5
objectives and applications.
31. Outline the use of spreadsheets. CO5 R 5
32. Explain the generation of audio output. CO2 An 5
PART – C (2 X 15 = 30 MARKS)
(Answer any 2 from the following)
33. a. Explain the procedure to be followed to capture a moving scene
CO2 U 5
with a video camera.
b. Elaborate the fundamentals of image compression with
CO2 U 10
examples
34. Elucidate the different types of computer networks and their
CO5 U 15
applications.
35. List and explain the various physical devices that are used as
CO3 R 15
memory cells.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 The student will be able to classify different forms of data.
CO2 The student will be able to acquire different forms of data.
CO3 The student will be able to analyze the working of hardware and software.
CO4 The student will be able to organize the data.
CO5 The student will be able to work on technologies related to multimedia and Internet.

Assessment Pattern as per Bloom’s Taxonomy


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 6 5 11
CO2 7 21 3 5 36
CO3 26 12 1 39
CO4 1 2 3
CO5 19 16 1 36
125
Course Code 18CS1004 Duration 3hrs
Course Name PROGRAMMING FOR PROBLEM SOLVING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. Identify the number of bytes reserved for a float variable in windows 64- CO1 R 1
bit applications.
2. Locate the invalid variable(s) in the following declarations. CO1 R 1
 int number;
 float if;
 int variable_count;
 int $main;
3. Define an Algorithm. CO2 R 1
4. Name different types of operators that are included in C. CO2 R 1
5. Identify the unconditional branching statement that terminates the CO3 U 1
execution of a loop.
6. State the syntax of the switch statement. CO3 R 1
7. List the two ways a string can be declared. CO4 R 1
8. Identify the value of num[6] from the below line of code CO4 U 1
int num[]={9,6,4,2,3,5,1,7,8};
9. Define recursion in C. CO5 R 1
10. Predict the output for the following code. CO6 U 1
char a[20]="Program";
printf("Length of string a = %d \n",strlen(a));
PART – B (6 X 3 = 18 MARKS)
11. Describe the phases of the software development life cycle (SDLC). CO1 U 3
12. Discuss the order of precedence in C and predict the output of the CO2 U 3
program.
#include<stdio.h>
int main()
{
float s=100, u=10, t=4, a;
a = 2*(s-u*t);
printf("Result = %f", a);
return 0;
}
13. Write a simple program to find whether a number is positive or negative. CO3 A 3
14. Explain the Bubble Sort algorithm with an example. CO4 U 3
15. Describe a function prototype along with its syntax. CO5 U 3
16. Develop an application in C programming to store 5 customer names and CO6 A 3
phone numbers using structures.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No 17 to 23, Q. No 24 is Compulsory)
17. a. Explain the structure of a C program along with its features and CO1 U 4
syntax.
b. Draw a flowchart to find the area of the square by getting the value CO1 U 8
from the user. Convert the flow chart into an algorithm and develop
the program for the same.

18. a. Explain the logical operators with sample code. CO2 U 5


b. Write a C program to find the simple interest at the interest rate of CO2 A 7
14% p.a. and 11% p.a. and find their difference.

19. a. Develop a function to count the digits of a number and use it to CO5 A 9
check whether the given number is an Armstrong number or not.
b. Differentiate between a while loop and a for a loop. CO3 U 3

20. a. Define an array and explain the declaration of multidimensional CO4 U 6


arrays with an example.
b. Write a C program to generate the Fibonacci series. CO4 A 6

21. a. Describe structures in the C program and explain how the structure CO6 U 6
variables are declared and initialized.
b. Using functions, write a C program to find the even numbers from an CO5 A 6
integer array.

22. a. Write a program in C to subtract two matrices of MXN order. CO4 A 8


b. Write a program to find the length of two strings, and compare and CO4 U 4
concatenate them using string functions.

23. a. Develop a C program to swap two numbers using the call-by address CO6 A 8
(pointers or reference) method.
b. Compare and contrast Structures with Arrays. CO6 U 4

COMPULSORY QUESTION
24. a.Develop a C program to find the factorial of a given number using CO5 A 6
the recursion function.
b. Write the C program for linear search to search for the number 9 CO4 A 6
from the given set of numbers 10, 30, 5, 20, 9, 8, and also illustrate
the various steps.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development process.
CO2 Identify the data type to represent the real time data representation and operators for
computation.
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using the divide and
conquer approach.
CO5 Formulate algorithms and programs using arrays, pointers, and structures.
CO6 Create a new application software to solve real-world problems.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 15 - - - - 17
CO2 2 8 7 - - - 17
CO3 1 4 3 - - - 8
CO4 1 14 20 - - - 35
CO5 1 3 21 - - - 25
CO6 - 11 11 - - - 22
124
Course Code 18CS2001/16CS2003/CS245/CS101 Duration 3hrs
Course Name BASICS OF COMPUTER PROGRAMMING Max. Marks 100

Q. B Mark
Questions CO
No. L s
PART – A (20 X 1 = 20 MARKS)
CO
1. Variables defined inside a function are called ___________. R 1
1
Variables common to all functions in a program are known as CO
2. R 1
___________. 1
CO
3. R 1
C language was invented by____________, 1
CO
4. R 1
Define ANSI. 1
CO
5. R 1
___________ qualifier is used to define a constant in C language. 1
CO
6. R 1
Give an example of integer constant. 1
CO
7. R 1
Give an example of character constant. 1
CO
8. R 1
___________ is the format specifier used for float. 1
CO
9. R 1
__________ is the format specifier used for string. 1
CO
10. R 1
List any two examples of arithmetic operator. 1
CO
11. R 1
Give two examples of relational operator. 1
CO
12. An 1
Differentiate = operator and == operator. 1
CO
13. R 1
What is a conditional operator? 1
CO
14. R 1
___________ is the size of the integer variable. 1
CO
15. R 1
Define compiler. 1
CO
16. R 1
Define operating system. 1
CO
17. R 1
List any two rules of a variable. 1
CO
18. R 1
Name any one decision control statement. 1
19. Define an array. CO R 1
1
CO
20. R 1
List any two usage of function. 5
PART – B (10 X 5 = 50 MARKS)
(Answer any 10 from the following)
CO
21. Discuss about the different data types in c programming. U 5
2
CO
22. Explain about the various types of constants. U 5
2
CO
23. Classify the different types of storage classes. U 5
2
CO
24. Differentiate break and continue statement with suitable example. An 5
2
CO
25. Develop a c program to find whether the given number is odd or even. C 5
3
CO
26. Report on switch case statement with suitable examples. U 5
2
CO
27. List any five string functions with suitable examples. R 5
2
CO
28. Develop a c program to find the greatest of n number using array. C 5
4
CO
29. Compare and contrast the structure and union. An 5
2
Develop a c program to create a structure for employee details (eno, name, CO
30. C 5
salary) and access the same. 6
List any five applications of computer in the real world and explain the CO
31. R 5
same. 6
CO
32. Define recursion. Demonstrate factorial using recursion. A 5
6
PART – C (2 X 15 = 30 MARKS)
(Answer any 2 from the following)
CO
33. a. Discuss about the different classification of computer. U 8
2
CO
b. Describe about the various generation of computer. U 7
2

CO
34. a. Explain about the different types of operators. U 8
2
Discuss about the following statements.
i) If CO
b. U 7
ii) If-else 4
iii) Nested if

Differentiate the call by value and call by reference with suitable CO


35. a. An 10
example program. 5
CO
b. Develop a C program for adding two numbers using pointers. C 5
4
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the fundamental principles of programming.
CO2 Gain knowledge on the concepts of structured programming.
CO3 Understand logics of solving problems.
CO4 Solve problems using basic programming techniques.
CO5 Apply programming to solve real world problems.
CO6 Illustrate the role of programming in real life scenarios.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 18 1 19
CO2 5 43 10 58
CO3 5 5
CO4 7 10 17
CO5 1 10 11
CO6 5 5 5 15
125

SUPPLEMENTARY EXAMINATION - JUNE 2023

Course Code 18CS2005 Duration : 3hrs


Course Name CRYPTOGRAPHY AND NETWORK SECURITY Max. Marks : 100

Q. CO
Questions BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. Define Cipher. CO1 R 1
2. The term which refers to the operation that each plaintext element or
group of elements is uniquely replaced by a corresponding cipher text CO1 U 1
element or group of elements is__________
3. Define primitive root modulo. CO2 R 1
4. Find the plain text ‘M’ when you intercept the cipher text C as 11 being
sent to a user whose public key is e =3, n=33 in a public key system using CO2 A 1
RSA.
5. Expand HMAC. CO3 A 1
6. Mention the difference between a Hash and MAC function CO3 A 1
7. List any fields in X.509 certificate. CO4 A 1
8. Write the use of authentication server. CO4 R 1
9. _________ protocol is used for the purpose of copying the pending state
CO5 U 1
into the current state.
10. List the types of firewall. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Define active and passive attacks. CO1 R 3
12. List any three symmetric key encryption techniques. CO2 U 3
13. List out the requirements of a Hash Function. CO3 U 3
14. Write short notes on Kerberos Realm. CO4 A 3
15. Draw the format of X.509 certificate. CO5 R 3
16. Sketch the packet format of encapsulating security payload in IP CO6 U 3
security.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23)
17. a. Elaborate the data encryption standard with a neat sketch. CO1 R 12

18. a. Analyze the rules related to the Rivest Shamir Adleman CO2 An 6
(RSA) algorithm with clear depiction of both encryption and
decryption algorithm.
b. Interpret the Elliptic Curve Cryptography based on Diffie CO2 A 6
Hellman public key cryptosystem.
19. a. Explain the ElGamal public key algorithm and give proof of CO2 U 6
its correctness during encryption and decryption.
b. Describe the Diffie Hellman key exchange algorithm with CO2 A 6
examples.
20. a. Explain the process of creating a digital signature with an CO3 U 12
example.

21. a. Elucidate the purpose of certificate authority in X.509. CO3 R 2


b. Elucidate about the x.509 certificate in detail. CO3 U 10

22. a. Differentiate symmetric and asymmetric encryption? CO4 R 6


b. Explain kerberos authentication mechanism with suitable CO4 U 6
diagram?

23. a. Describe the operations involved in pretty good privacy and CO5 U 8
explain it.
b. Discuss on PGP key rings. CO5 R 4
COMPULSORY:
24. a. Explain Intrusion Detection System with suitable diagram. CO6 U 7
b. List the types of firewall and explain it. CO6 R 5

COURSE OUTCOMES
CO1 summarize the computer security concepts and their needs.
CO2 apply the various symmetric and asymmetric key algorithms.
CO3 experiment with the various principles of cryptosystems, hashing algorithms and digital signatures
CO4 recognize the importance of network security.
CO5 evaluate network and internet security.
CO6 explain the different types of virus/worms & firewalls
Assessment Pattern as per Bloom’s Taxonomy
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 16 1 13 - - - 30
CO2 1 9 13 6 - - 29
CO3 - 25 2 - - - 27
CO4 7 6 - - - - 13
CO5 7 9 - - - - 16
CO6 6 10 - - - - 10
125
Course Code 18CS2005 Duration 3hrs
Max.
Course Name CRYPTOGRAPHY AND NETWORK SECURITY 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Give example of an encryption algorithm of multiple letters. CO1 U 1
2. State the author of the idea of substitution-permutation (S-P) networks. CO1 R 1
Name the cryptosystem is used in some form in several standards
3. including the digital signature standard (DSS) and the S/MIME e-mail CO2 An 1
standard.
4. Define order of a point G in an elliptic curve. CO2 A 1
5. Recall the solutions provided by the process of message authentication. CO3 R 1
6. Illustrate the DSA approach for digital signing. CO3 A 1
7. Define Subject unique identifier in an X.509 certificate. CO4 R 1
8. Describe the basic requirements of Kerberos. CO4 U 1
9. Examine the applications of IPSec. CO5 A 1
10. Show approaches to intrusion detection. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Define encryption and decryption. CO1 R 3
12. Calculate the value of ‘p’ & ‘q’ in RSA algorithm given n=3397. CO2 A 3
13. Analyze the requirements of hash functions. CO3 An 3
Illustrate simple secret key management architecture proposed by
14. CO4 U 3
Merkle.
15. Explain the content types of S/MIME messages. CO5 R 3
16. List the classes of intruders. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Recall the security attacks, OSI security and the security
17. a. CO1 R 6
mechanisms to counter the attacks.
b Explain a single round of Data Encryption Standard with an
CO2 A 6
. analysis of the number of rounds, its strength and weakness.
Summarize the key management and key distribution issues and
18. CO4 U 12
techniques for both symmetric and asymmetric keys.

Analyze a SHA-512 algorithm with clear understanding of a single


19. along with the process of deriving eighty 64-bit words from the CO3 An 12
1024-bits for every block.

Explain the Elliptic Curve based algorithm with the analysis of the
20. CO1 U 12
encryption and decryption process.

Summarize the pretty good privacy mechanism with a diagram for


transmission and reception of PGP messages and a clear description
21. CO5 U 12
of authentication, confidentiality, compression, e-mail compatibility
and segmentation.

Illustrate the architecture of Secure Socket Layer with explanation


22. CO5 An 12
of its handshake protocol.

Appraise the Advanced Encryption Standard with analysis of the


23. CO2 An 12
key size, key expansion, s-box and decryption process.
COMPULSORY QUESTION
Discuss the following:
1. Need for firewalls.
24. 2. Types of firewalls. CO6 U 12
3. Limitations of firewalls.
4. Firewall configurations.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Summarize the computer security concepts and their needs.
CO2 Apply the various symmetric and asymmetric key algorithms.
CO3 Experiment with the various principles of cryptosystems, hashing algorithms and
CO4 Recognize the importance of network security.
CO5 Evaluate network and internet security.
CO6 Explain the different types of virus/worms & firewalls.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 10 13 23
CO2 10 13 23
CO3 1 1 15 17
CO4 1 16 17
CO5 3 12 1 12 28
CO6 3 13 16
124
Course Code 18CS2008 Duration 3hrs
Course Name DATABASE MANAGEMENT SYSTEMS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the applications of DBMS. CO1 U 1
2. List various users of DBMS and specify the roles. CO1 R 1
3. State the syntax for GROUPBY Clause. CO2 R 1
4. Recall the various DDL commands. CO2 R 1
5. List the extended features of ERD. CO3 R 1
6. Give examples on weak entity. CO3 U 1
7. Differentiate primary index and secondary index. CO4 U 1
8. List the types of file organization. CO4 R 1
9. Identify the transformation tools used in the data warehouse. CO5 U 1
10. Trace the precedence graph for the process A-B-C-A. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Analyze the following Relational Database. Student (roll_no,
name,city,marks,c_no) Course (c_no,cname,fees) Construct Queries
into Relational algebra.
CO1 An 3
a) List Student Details enrolled for ‘MBA’ Course.
b) List the Course having fees < 20000
c) Display all students living in either ‘Chennai’ or ‘Coimbatore’ city.
12. Represent the query for the following table. Doctor (dno,
dname,address,dcity) Hospital (hno,hname,street,hcity) Dochosp
(dno,hno,date)
CO2 U 3
a) Find hospital names to which ‘Dr. Metilda’ has visited.
b) Find out all the doctors who have visited hospitals in the same city.
c) List all the doctors who visited ‘David’ on ‘01-02-2023’.
13. Identify the normal form of the following relation: R (A, B, C, D, E)
The primary key of the relation is AB. The following functional
dependencies hold:
A→C CO3 U 3
B→D
AB → E.
14. Differentiate between static and dynamic hashing. CO4 R 3
15. Compare OLTP and OLAP Systems CO5 An 3
16. Identify whether the following list of events in an interleaved execution
of set T1, T2, T3 and T4 assuming 2PL is having deadlock. If yes,
which transaction are involved in Deadlock?

Time Transaction Code


T1 T1 LOCK (A, X)
T2 T2 LOCK (B, X) CO6 U 3
T3 T3 LOCK (A, S)
T4 T4 LOCK (B, S)
T5 T1 LOCK (B, S)
T6 T2 LOCK (D, X)
T7 T3 LOCK (D, S)
T8 T4 LOCK (C, X)
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Express a RBD in 3NF for the following Relational Database.
Doctor (dno, dname, dcity) Patient (opdno, pat_name,addr,disease)
The relation between patient and Doctor is many to many. and
solve the following.
i. Insert a row in Doctor Table.
ii. Find names of patient who are treated by ‘Dr. CO1 U 12
Deshpande.
iii. Display names of doctors who live in ‘Pune’ city.
iv. Count number of patients suffering from ‘Cancer’.
v. Add ‘Discharge Date’ Column to patient table.
Display total no. of patients treated by each doctor.

18. Interpret the queries for the following entities and relationships.
Item (I_no, I_name, I_qty) Po (P_no, P_date) Supplier (S_no,
S_name, S_addr) Item and Po are related with one-to-many
relationships along with descriptive cost and quantity. Supplier and
Po are related with one-to-many relationships.
i. Insert a row in Item table.
ii. List the name of supplier to whom Pois given for
“mouse”.
iii. List the name of supplier and item_name in Po’s CO2 A 12
generated on “30-sep-2009”.
iv. List the names of suppliers who is going to supply
“monitor” with minimum cost.
v. Find out Po number, Po date and supplier name of the
Po which is of maximum amount.
Display all Po which contains the number, date, supplier name of
the Po details of all items included in that i.e. name of item, qty and
rate.

19. Produce the three for the below scenario: CO3 A 12


A Company has several departments. Each department has a
supervisor and at least one employee. Employee must be assigned
to at least one, but possibly more department
i. Identify all entities
ii. Identify all relations.
Draw E-R Diagram.

20. Determine whether the given relation R( A, B, C, D) and Functional


Dependency set FD = { AB → CD, B → C } is in 2NF, If not CO4 A 12
convert it into 2 NF.

21. a. Explain indexing with examples. CO5 An 6


b Discuss the types of OLAP server in detail.
CO5 U 6
.

22. Explain how multilevel indexes are constructed using B trees and
CO4 An 12
B+ trees.

23. Summarize the implementation procedures of the data warehouse. CO5 U 12


COMPULSORY QUESTION
24. Discover the recovery procedure if deferred update technique with
checkpoint is used for the System Crash. Following are the log
entries at the time of system crash.
[start_transaction, T1]
[Write _item, T1, A, 30]
[Commit T1]
[Checkpoint]
[start_transaction, T3] CO6 A 12
[Write _item, T3, C, 50]
[Commit T3]
[start_transaction, T2]
[Write _item, T2, C, 40]
[start_transaction, T4]
[Write _item, T4, B, 30]
[Write _item, T2, D, 60]
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Recognize the role of database administrator and database management systems in software
applications and other advanced concepts.
CO2 Use query language to retrieve data efficiently from the database.
CO3 Design the database for given specification of the requirement design the databases using ER
method and normalization.
CO4 Design and implement significant database objects such as file structures and index schemes.
CO5 Describe techniques for transaction processing and concurrency control.
CO6 Implement security in database.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 13 3 17
CO2 2 3 12 17
CO3 1 4 12 17
CO4 4 1 12 12 29
CO5 1 18 9 28
CO6 4 12 16
124

Course Code 18CS2013 Duration 3hrs


Course Name MACHINE LEARNING TECHNIQUES Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Identify the type of machine learning approach involved in the
1. following problem statement: CO1 R 1
“Predicting the maximum allowed loan amount for the customer”.
2. Define Version Space. CO1 U 1
State the mathematical representation of sigmoid function in logistic
3. CO2 R 1
regression.
4. Define Over-fitting. CO2 U 1
Determine the probabilistic machine learning algorithm used for the
5. CO3 A 1
classification problem.
Identify the type of Machine learning model used to estimate the
6. CO3 R 1
amount of crop yield based on the temperature, humidity and sun shine.
Assume 2 cluster centroids: C1 = {9,9} and C2 = {2,2} in K-means
7. clustering algorithm. Determine the cluster to which the new data point CO4 A 1
(5,5) belongs to.
8. Differentiate Agglomerative and Divisive clustering. CO4 An 1
9. Distinguish between classification and regression tree. CO5 U 1
10. Outline the benefits of cross validation. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Apply data smoothing by bin means and bin boundaries with the bucket
11. size of 3 to remove the noisy data for the following data CO1 A 3
4, 8, 15, 21, 21, 24, 25, 28, 34, 36, 37, 42
Analyze the given confusion matrix and calculate recall and specificity.

Predicted Class
12. Actual Fresh Not fresh CO2 An 3
Class Fresh 164 33
Not Fresh 37 522
Calculate the nearest neighbor using the Euclidean distance between
13. CO3 A 3
two points A and B: A[3,4], B[7,8].
Consider SOM network with three input and two output nodes. If the
weight vectors are w1 = (0.8, 0.7, −0.9), w2 = (0.9, 0.8, 0.9), calculate
14. CO4 A 3
the distance and find the winning neuron if the input vector X = (0.3, -
0.4, 0.6) is applied.
15. Express the impurity measure used in CART approach. CO5 U 3
16. Differentiate random forest and decision tree with an example. CO6 An 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the various geometric and probabilistic models in detail
CO1 U 6
with suitable examples.
b Summarize the various techniques for feature construction and
CO1 U 6
. transformation with examples.

18. a. Calculate regression coefficient, Ypred and Error value by


analyzing the data given below.
Price(Rs) 10 12 13 12 16 15 CO2 A 6
Amount 40 38 43 45 37 43
Demanded
b Explain the types of multiclass classification and describe the
CO2 U 6
. methods that are used to handle class imbalance problem.

19. a. Calculate the TPR and FPR for the thresholds 0.8, 0.7, 0.6, 0.55,
0.54 and plot ROC curve for the calculated values.

Tuple Class Probability


1 P 0.90
2 P 0.80
3 N 0.70 CO3 A 6
4 P 0.60
5 P 0.55
6 N 0.54
7 N 0.53
8 N 0.51

b Articulate single layer perceptron for AND gate using the


. perceptron training rule by assuming the weights 1.3, 0.7, threshold CO3 A 6
= 1 and learning rate n = 0.5 for one iteration.

20. a. Apply perceptron learning algorithm for the given AND gate and CO3 A 6
update the weights for one iteration. Initial weights are W1=0.3,
W2=0, threshold=0.2 and the learning rate is 0.1.
b Analyze the probabilities obtained from linear classifiers using
CO3 An 6
. kernel methods of nonlinearity

21. a. Apply K-medoid clustering technique to the given dataset for k = 2


and random representatives are given as (3,4) and (6,2). Calculate
absolute error criterion and identify whether it is a good choice of
replacing (6,2) by (6,4).
i X Y
X1 2 6 CO4 A 6
X2 3 4
X3 3 8
X4 4 7
X5 6 2
X6 6 4
b
CO4 U 6
. Discuss the various hierarchical clustering in detail

22. a. Apply decision tree algorithm on the following dataset and identify
the root node of the tree. (Note: Input attributes: Outlook,
Temperature, Humidity and Windy, Output attribute: Play)
Day Weather Temperature Humidity Wind Play
1 Sunny Hot High Weak No
2 Cloudy Hot High Weak Yes
3 Sunny Mild Normal Strong Yes
CO5 A 6
4 Cloudy Mild High Strong Yes
5 Rainy Mild High Strong No
6 Rainy Cool Normal Strong No
7 Rainy Mild High Weak Yes
8 Sunny Hot High Strong No
9 Cloudy Hot Normal Weak Yes
10 Rainy Mild High Strong No
b Apply regression tree algorithm on the following dataset and CO5 A 6
. identify the root node of the tree. (Note: Input attributes: Outlook,
Temperature and Windy, Output attribute: Players) - Two problems
in Q23
23. a. Explain random forest algorithm and illustrate how random forest is
CO6 U 6
applicable for both continuous and categorical target variable.
b Analyze how deep learning can better assist doctors in predicting
CO6 An 6
. the diseases.
COMPULSORY QUESTION
24. a. Differentiate bagging and boosting and explain the different
CO6 An 6
algorithms applied for bagging and boosting?
b
CO6 U 6
. Discuss Reinforcement learning with its applications.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the concepts, mathematical background, applicability, limitations of existing machine
learning techniques.
CO2 Identify the performance evaluation criteria of the model developed.
CO3 Analyze and design various machine learning based applications with a modern outlook focusing on
recent advances.
CO4 Build the learning model for a given task.
CO5 Apply some state-of-the-art development frameworks and software libraries for implementation.
CO6 Evaluate the performance of machine learning algorithms using suitable metrics.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 13 3 17
CO2 1 7 3 3 17
CO3 1 22 6 29
CO4 6 12 1 17
CO5 4 16
CO6 13 15 28
124
Course Code 18CS2014 Duration 3hrs
Max.
Course Name OBJECT ORIENTED PROGRAMMING 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Predict the output for the following C++ program.
include<iostream>
using namespace std;
int main()
{
int x = 2;
int y = 3;
CO1 U 1
while(x <= 5)
{
cout<< y++ << " ";
}
cout<< x;
return 0;
}
Mention the technique that provides a way to break complicated
2. CO1 R 1
problems down into simple problems which are easier to solve.
3. Write down the syntax to create object in Java. CO2 U 1
4. Predict the output of the following code
class Simple{
public static void main(String args[]){
int a=2, b=5;
CO2 U 1
int res=(a<b)?a:b;
System.out.println(res);
}
}
5. Identify the use of super() with constructor. CO4 U 1
6. List the various access specifiers for Java classes. CO3 R 1
Is it compulsory for a try block to be followed by a catch block in Java
7. CO4 U 1
for exception handling?
8. List out any two checked exceptions in Java. CO4 R 1
9. List any two classes that supports character stream to do I/O operations. CO5 R 1
10. Read the following code and answer the question that follow: CO5 U 1
String str="Green World, Clean World";
int len=str.length();
int remain=100-len;
jTextField1.setText(str.toUpperCase());
jTextField2.setText(Integer.toString(remain)+" more characters can be
entered");
Predict the output displayed in text fields named jTextField1 and
jTextField2 after running the above code.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate while loop and do while loop with sample code. CO1 U 3
Write a C++ program that displays a decimal number in reverse order.
12. CO1 U 3
(Ex. If the number is 34521, output expected is 12543)
There are two classes named classA and classB. Both classes are in the
13. same package. Can a private member of classA can be accessed by an CO3 U 3
object of class B?
In a class implementing an interface, can we change the value of any
14. CO4 U 3
variable defined in the interface?
15. List the two ways of implementing multi-threading in Java. CO4 R 3
16. Discuss any three points to exhibit the need of design patterns. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the arithmetic, relational and bitwise operators with
17. a. CO1 U 10
necessary example programs in C++.
b Write C++ program on swapping of two variables without using
CO1 A 2
. temporary variable.

18. a. Elaborate any four features of Java. CO2 U 8


b
Write a program to find factorial of a given number using java. CO2 U 4
.

19. a. Create a class to represent food items in a Hotel with the following
members, food code, price, quantity, and discount, also define
Member functions to read the data, print and find the total bill CO2 A 6
amount. Develop a java program in order to create an object and
access all those member functions.
b Suppose you have to perform addition of the given numbers but
. there can be any number of arguments, if you write the method
such as a(int,int) for two parameters, and b(int,int,int) for three
parameters then it may be difficult for you as well as other CO2 A 6
programmers to understand the behavior of the method because its
name differs. So, we perform method overloading. Discuss the
same with example program.

20. a. Write a program in java to store the given N numbers in an array CO2 U 6
and perform the following operations.
(i) Find and display the average
(ii) Search the given number in the array and display.
“Available” if it exists and “Not Available” if it does not exist.
b Develop a java program to design a class for “Smartphone” with
. model_name, year, cost as data members. Include constructors and
setter/getter methods. Add another class “Main” which creates two CO2 A 6
objects, initialize the data members and display the details through
getter methods.

21. a. Create a package named “mathematics” which contains class such


as BasicOperations to perform the basic arithmetic operations (add,
sub, mul, div, mod). Import this package in a Test class (Available CO3 A 6
in Package1) and do a menu driven program to perform all these
operations.
b Create a class named 'Member' having the following members:
. Data members
1 - Name
2 - Age
3 - Phone number
4 - Address
5 - Salary
CO4 A 6
It also has a method named 'printSalary' which prints the salary of
the members. Two classes 'Employee' and 'Manager' inherits the
'Member' class. The 'Employee' and 'Manager' classes have data
members 'specialization' and 'department' respectively. Now, assign
name, age, phone number, address and salary to an employee and a
manager by making an object of both of these classes and print the
same.

22. a. Develop a Java program that enters an 8-digit string for a birthdate.
The first two digits in the string are the months of birth, the next
two are the day and the remaining four are the year. The Java
program should squeeze out these substrings and calculate the CO4 A 6
current age. Raise a ‘negative_age’ exception if the calculated age
is negative.
(Hint: Approximately print the differences in years)
b
Explain the various ways of creating threads in Java. CO4 U 6
.

Discuss any four Layout Managers with neat sketch and suitable
23. CO5 U 12
sample programs.
COMPULSORY QUESTION
24. a. Differentiate method overloading and method overriding. CO4 U 2
b Develop GUI program for Dollar to Rupee Convertor using Java
. Swing API as given below. CO5 A 10
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Define the object-oriented programming concepts.
CO2 Select the relevant object-oriented concepts to implement a real time application with design
patterns.
CO3 Demonstrate the application of polymorphism in various ways.
CO4 Illustrate the use of inheritance, exceptions, generics and collection.
CO5 Develop applications with event-driven graphical user interface and file management.
CO6 Describe software development process.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 17 2 20
CO2 20 18 38
CO3 1 3 6 10
CO4 4 13 12 29
CO5 1 13 10 24
CO6 3 3
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS2014 Duration 3hrs


Max.
Course Name OBJECT ORIENTED PROGRAMMING 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Write down the features of C++. CO1 U 1
2. List out the disadvantage of using arrays in C++. CO1 U 1
3. List any two features of Java. CO2 R 1
4. Write the expansion of JRE and JDK. CO2 R 1
Identify the access specifier used to make the super class data
5. CO3 R 1
accessible to all classes from different package.
6. Cite the benefits of Inheritance. CO3 U 1
7. List out five keywords that are used to handle the exception. CO4 R 1
Trace out the difference between method overloading and method
8. CO4 R 1
overriding.
Which stream is used to output all the error data that a program might
9. CO5 U 1
throw, on a computer screen or any standard output device?
Identify the method that is used to fill oval with the default color and
10. CO5 R 1
specified width and height.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Write C++ program using arrays concept:
-Create an array with size 5.
11. CO1 U 3
-Read the input N from the user and store it one by one.
-Print the values in screen that are stored in Array.
Develop java program to swap two variables without using third
12. CO2 A 3
variable.
Construct a class with a method that prints "This is parent class" and its
subclass with another method that prints "This is child class". Now,
create an object for each of the class and call
13. CO3 A 3
1 - method of parent class by object of parent class
2 - method of child class by object of child class
3 - method of parent class by object of child class
Discuss how can we restrict inheritance for a class so that no class can
14. CO3 U 3
be inherited from it.
15. In multi-threading how can we ensure that a resource isn’t used by CO4 U 3
multiple threads simultaneously?
16. Differentiate Byte Streams and Character Streams. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the various selection and iteration control statements with
17. CO1 U 12
sample code in C++.

Construct a java program to print the area of two rectangles having


sides (4,5) and (5,8) respectively by creating a class named
18. a. CO2 A 6
‘Rectangle’ with a method named ‘Area’ which returns the area,
length and breadth.
Develop a Java program to print inverted half pyramid using
numbers.
111111
b 11111
CO2 A 6
. 1111
111
11
1

Create a java program to check given number is POSITIVE,


19. a. CO2 A 6
NEGATIVE or ZERO until user does not want to exit.
b Develop a program to find and display the number of even digits in
CO2 A 6
. a given number.

Develop an interface called “Vehicle” with set of functions start(),


changeGear(), speedUp(), applyBrakes(). Create a class “Car” with
20. a. CO3 A 6
properties gear, speed that implement the interface, add a “Main”
class which demonstrate the accessing of interface functionalites.
b
Explain on any three types of inheritance with example programs. CO3 U 6
.

A private company wish to recruit employees with the eligibility of


“5+
years as programmer”. If the registered person is not eligible then
handle
the following situation using the User Defined Exceptions.
21. a. CO4 A 6
• If below 5 years of experience, then throw an exception named
“Exp_Shortage_Exception”
• If the eligible skill is not programmer, then throw the exception
called
“Skill_Shortage_Exception”
b
Describe the lifecycle and states of thread with an example. CO4 U 6
.

22. a. Discuss the different graphics class methods and draw the various CO5 U 6
shapes using drawString, drawOval and drawArc method.
b Explain the stages in software development process with neat
CO6 U 6
. diagram.

Discuss any four Layout Managers with neat sketch and suitable
23. CO5 U 12
sample programs.
COMPULSORY QUESTION
Design a Java swing GUI application for the Login functionality as
per the sample design given below. Show a message box “Login
Successful” if username and password is “karunya”, otherwise
show a message box “Login Failed”.

24. CO5 A 12

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Define the object-oriented programming concepts.
CO2 Select the relevant object-oriented concepts to implement a real time application with design patterns.
CO3 Demonstrate the application of polymorphism in various ways.
CO4 Illustrate the use of inheritance, exceptions, generics and collection.
CO5 Develop applications with event-driven graphical user interface and file management.
CO6 Describe software development process.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 17 17
CO2 2 27 29
CO3 1 10 9 20
CO4 2 9 6 17
CO5 1 22 12 35
CO6 6 6
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS2018 Duration 3hrs


Course Name SOFTWARE ENGINEERING Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List any two evolutionary process models. CO1 R 1
2. Quote the process model that is least adaptable to changing client needs. CO1 U 1
3. Identify the qualitative measure of the degree to which classes are related CO2 R 1
to one another while designing the software.
4. Recognize the object-oriented paradigm to aid with code reuse. CO2 R 1
5. Name the language that describes the syntax and the semantics of an CO4 R 1
architectural design.
6. Create a formula for calculating a software product's fault density. CO5 U 1
7. Determine the testing that must be performed on the product in CO5 U 1
comparison to previous test cases during the maintenance phase.
8. List the three factors that may affect the software quality. CO6 R 1
9. Enumerate the three approaches used to manage the software project in the CO6 R 1
COCOMO estimation model.
10. State the five CMMI maturity levels. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Quote the principles of agile process model. CO1 R 3
12. Differentiate functional and non-functional requirements in a software CO2 U 3
project.
13. Describe CRC modeling with an example. CO3 R 3
14. Distinguish between verification and validation. CO4 U 3
15. Define version control in Software Configuration Management. CO5 R 3
16. List the elements of Software Process Improvement framework. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe a scenario where waterfall model would be applied and not CO1 An 6
the RAD model.
b. List the problems faced in a project while following waterfall CO1 U 6
software process model.

18. a. Discuss the steps required to initiate requirements engineering. CO2 R 12

19. a. Explain the commonly used architectural styles for software that are CO3 R 12
built for computer-based systems with neat diagrams.
20. Write the test cases for the following modules according to the software
testing paradigm.
a. Login CO4 A 4
b. Forms with various fields CO4 A 4
c. Application interacts with database CO4 A 4

21. a. Discriminate SCM repository and SCM auditing. CO5 U 6


b. Enumerate ISO 90001:2000 quality standard. CO5 R 6

22. a. Analyze the following scenario and draw the class diagram. “An CO2 An 12
online car and car parts store that has listings of various cars along
with their features. It also consists of car parts and accessories. The
project allows users to buy car and car inventory online. It allows
users to check various car status including car engine, mileage, tank
capacity and other factors. Credit card payment facility is also
available for buying car parts. Car booking system has other methods
for booking and registration and even for a test drive registration”.
The project features:
 Visitor Registration/ Login module.
 User may check various cars listing with features and
inventory parts.
 User may select and add products to shopping cart.
 Credit card payment option for car parts shopping.
 Test drive booking registration.
 Car loan facilities.
23. a. Recall the main objectives of reviews and discuss the players involve CO3 R 12
in a review meeting.

COMPULSORY QUESTION
24. a. Explain the process of risk mitigation, monitoring and management. CO6 R 6
b. Distinguish between FP based and LOC based estimation techniques. CO6 R 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Discover an effective software engineering process to develop software-intensive systems.
CO2 Translate the requirements specification into an implementable design.
CO3 Construct UML diagrams along with design strategies and design patterns.
CO4 Analyze architectural design methods.
CO5 Evaluate the system using various testing strategies.
CO6 Develop the software system with quality measures.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 4 7 - 6 - - 17
CO2 14 3 - 12 - - 29
CO3 27 - - - - - 27
CO4 1 3 12 - - - 16
CO5 9 8 - - - - 17
CO6 18 - - - - - 18
124
Course Code 18CS2019 Duration 3hrs
Course Name SYSTEM SOFTWARE AND COMPILER DESIGN Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Enumerate the functions of linkage editor. CO1 U 1
2. Compare and contrast single pass and two pass assembler. CO1 U 1
3. Define "interpreter." CO1 R 1
4. Recall the regular definition for floating-point numbers. CO2 R 1
5. Enumerate the disadvantages of the top-down parser. CO3 R 1
6. Define handle. CO3 R 1
7. When is a “syntax directed definition” said to be “circular”? CO4 R 1
8. Show the dependency graph for the declaration statements. CO4 U 1
9. Define activation life time of a procedure. CO5 R 1
10. What is meant by ‘NEXT-USE’ of a variable? CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Schematically represent the language processing system. CO2 U 3
12. Write a LEX program to identify the even binary strings. CO3 A 3
Write a YACC program to solve the given productions.
13. S -> aA | a CO3 A 3
A -> aA | b
14. When does a grammar identified as non L attributed? CO4 A 3
15. Illustrate the different types of attributes with necessary examples. CO5 U 3
16. What is dangling reference? When does it occur? CO6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
What is forward referencing? How is it handled while translating an
17. a. CO1 R 6
assembly language program?
Explain the working principle of a macro processor. List the types of
b. CO1 U 6
macro substitution.
18. Explain the various phases of a compiler in detail. Also, show the CO2 U 12
step-by-step translation of the statement "peri = 2* ( length +
breadth )" through the phases of the compiler to attain target
language.
Construct a predictive parsing table and parse the string ~(0||1) for the
given grammar.
19. be ->be || bt | bt CO3 A 12
bt ->bt && bf | bf
bf ->~bf| (be) | 0 | 1
Summarize with relevant examples
i) S-attributed definition for evaluating an arithmetic
20. a. CO4 U 6
expression.
ii) L-attributed definition for declaration of variables.
Explain in detail the concepts involved in different storage allocation
b. CO4 U 6
techniques.
Transform the expression "a = a + b * c – b * c / d into the following
representations:
i) Syntax Tree
ii) Directed Acyclic Graph
21. CO5 U 12
iii) Quadruple
iv) Triple
v) Indirect triple
vi) Postfix Expression
Construct a CLR parsing table for the following grammar and parse
the string “abb”
22. CO3 A 12
S -> CC
C -> aC | b
Construct a minimum state DFA directly for the regular expression
23. (0|1)*011 by constructing the syntax tree and finding firstpos(), CO2 A 12
lastpos() and followpos().
COMPULSORY QUESTION
24. a. Enumerate the challenges during code generation. CO6 U 4
b. Illustrate code optimization with necessary examples. CO6 U 8
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Explain algorithm and data structures for assembler.
CO2 Develop algorithms for macros and loaders.
CO3 List and define various stages of compiler.
CO4 Select and use standard tools and techniques in different stages of compiler design.
CO5 Compare and contrast various methods for implementing the phases of a compiler.
CO6 Design and construct different phases of the compiler.
Assessment Pattern as per Bloom’s Taxonomy
CO / P R U A An E C Total
CO1 7 8 - - - - 15
CO2 1 15 12 - - - 28
CO3 2 - 30 - - - 32
CO4 1 13 3 - - - 17
CO5 1 15 - - - - 16
CO6 1 12 3 - - - 16
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS2019 Duration 3hrs


Course Name SYSTEM SOFTWARE AND COMPILER DESIGN Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Differentiate loading and linking. CO1 U 1
2. Compare and contrast an interpreter and a compiler. CO1 U 1
3. Define lexeme. CO2 R 1
4. Enumerate viable prefix property. CO2 R 1
5. State the conflicts of shift reduce parser. CO3 R 1
6. Define handle pruning. CO3 R 1
7. Give the quadruple for the expression t2 = b * t1. CO4 U 1
8. Draw the parse tree for the production E -> E1 + T. CO4 R 1
9. Define activation record. CO5 R 1
10. Give an example of algebraic identity. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Illustrate the use of a symbol table. CO1 U 3
Write a LEX program to identify the strings represented by the pattern (0|
12. CO2 A 3
1)*011.
13. Define panic mode error recovery. CO3 R 3
14. Construct an annotated parse tree for the input expression: 3*5+4a CO4 A 3
Give the syntax-directed definition for if-else statement to perform type
15. CO5 U 3
checking.
Construct the DAG for the basic block:
a=b+c
16. b=a-d CO6 A 3
c=b+c
d=a-d
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe the working principle of a simple bootstrap loader. CO2 R 6
Explain the basic assembler functions with a suitable SIC assembler
b. CO1 U 6
language program.

Explain the various phases of a compiler in detail. Also, show the


18. a. step-by-step translation of the statement “e=a + f * 5” through the CO3 A 12
phases of a compiler to the target language.

19. a. Construct a predictive parsing table for the grammar. Verify whether CO4 A 12
the input string id + id*id is accepted or not.
E->TE’
E’->+TE/€
T->FT’
T’->*FT’/€
F->(E)/id

Explain in detail about the concepts involved in the syntax-directed


20. a. CO5 U 12
definition.

Translate the expression “a + a * (b–c) + (b–c) *d” into the following


representations:
● Syntax Tree
● Directed Acyclic Graph
21. a. CO5 U 12
● Quadruple
● Triple
● Indirect triple
● Postfix Expression

Construct SLR Parsing table for the following grammar:


S -> L=R
S -> R
22. a. CO4 A 12
L -> *R
L -> id
R ->L

Construct the DFA r=ba(a/b)*ab. Draw the parse tree and calculate
23. a. CO4 A 12
the first and last position of each state.
COMPULSORY QUESTION
Explain the issues in the design of a code generator with necessary
24. a. CO6 A 12
examples.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 explain algorithm and data structures for assembler
CO2 develop algorithms for macros and loaders
CO3 list and define various stages of compiler
CO4 select and use standard tools and techniques in different stages of compiler design
CO5 compare and contrast various methods for implementing the phases of a compiler
CO6 design and construct different phases of the compiler

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - 11 - - - - 11
CO2 8 - 3 - - - 11
CO3 5 - 12 - - - 17
CO4 1 1 39 - - - 41
CO5 4 24 - - - - 28
CO6 - 1 15 - - - 16
124
SUPPLEMENTARY EXAMINATION - JUNE 2023

Course Code 18CS2021 Duration 3hrs


Max.
Course Name THEORY OF COMPUTATION 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
M = (Q, ∑,δ, q0,F), where Q= {q0, q1, q2, q3}, ∑ = {a,b} and F = q0,

𝛿
δ is defined as:
a b
1. →*q0 q2 q1
q1 q3 q0
q2 q0 q3
q3 q1 q2
Check the input “aaba” is accepted or not. CO1 U 1
2. If ∑ = {p,q} then find ∑2? CO1 U 1
Write a regular expression for the set of all strings a’s and b’s ending
3.
with “ab” CO2 A 1
4. Construct a DFA for the set of all strings over ∑ = {0,1} with length 2. CO2 A 1
5. Derive the string “aaaaabbbbb” from the productions SaSb | ϵ. CO3 A 1
Use the given grammar to derive the parse tree for the string “a+b”
6. E→ I | E+E | E*E | (E)
I→a | b CO3 U 1
Eliminate ε – production for the following grammar.
7. S→aaS |aS | ε
A → bA | ε CO4 A 1
8. List the types of Normal Forms based on Context Free Grammar. CO4 R 1
9. Identify the language for the problem whose language is recursive. CO5 U 1
State the name of the machine that accepts Recursively Enumerable
10.
language. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Describe Chomsky hierarchy with neat diagram. CO1 R 3

12. Differentiate NFA and DFA. CO2 An 3

13. Consider ∑ = { 0,1} and Γ ={5, 6, 7} CO3 U 3


Define h by h(0) = 75677, h(1) = {567}
If L is the regular language denoted by r = (0+1*)(00)* find the
Homomorphic image of L.
14. State the concept of Linear Bounded Automata. CO4 R 3

15. Define Turing Machine. CO5 R 3

16. State Turing Thesis. CO6 R 3


PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Construct a NFA equivalent to the regular expression (00 + 1)* 1 (0 CO1 A 6
+1) using Thompson’s Construction Algorithm.
b Convert the following NFA to its equivalent DFA using subset CO1 A 6
. construction method.

18. a. Convert the following DFA to a regular expression, using the state CO2 A 6
elimination technique.

b Apply minimization concept to reduce the number of states from CO2 A 6


. the given DFA.

19. a. Convert the given Right Linear Grammar to Finite Automata CO3 A 6
S→ aS | aA| aB
A→ aA|a
B→ bA|b
b Change the below Automata to Left Linear Grammar. CO3 A 6
.

20. a. Apply pumping lemma to prove that the given language is not CO4 A 6
regular.
L={ai^3 | i>=1}.
b i) Prove If L is regular language, so is LR CO4 A 6
. ii) Given h(0) = abb and h(1)=ba. Apply Homomorphism for
h(1011).

21. a. Construct an NPDA which accepts the following language CO5 A 6


L = {an bm cn+m : n ≥ 0 , m ≥ 0}
b Construct NPDA for the following grammar. CO5 A 6
. S  aA
A  aABC | bB | a
Bb
Cc

22. a. Design a Turing Machine that computes a function f(n)=2n where n CO5 A 6
is the positive integer.
b Using CYK algorithm, find whether “0011“ is a member of the CO3 U 6
. language represented by the grammar:
S  XY
X  YY | 0
Y  XY | 1

23. a. Begin with the grammar CO3 A 6


S  ABC | BaB
A  aA | BaC | aaa
B  bBb | a | D
C  CA | AC
Dε
iv) Eliminate ε – production
v) Eliminate unit production
vi) Eliminate useless symbols

b Convert the grammar G = ({S, A, B, C}, {a, b}, S, P) with P defined CO3 A 6
. given as
S -> aSA
A -> bABC
B -> b
C -> ABC into Chomsky’s and Greibach Normal Forms.
COMPULSORY QUESTION
24. a. Illustrate the following with suitable example. CO6 U 8
 Turing Machine with stay option
 Turing Machine with semi-infinite tape
 Multidimensional Turing Machine
 Deterministic Turing Machine
b Describe the encoding process of Universal Turing Machine with CO6 U 4
. relevant examples.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 recall the concept of languages and the hierarchy of languages.
CO2 develop finite automata to accept a set of strings of a language.
CO3 classify the given language based on chomsky’s hierarchy.
CO4 construct context free grammars to generate strings of context free language.
CO5 determine equivalence of languages accepted by Push Down Automata and languages generated
by context free grammars
CO6 compare computability & non-computability and Decidability & Un-decidability.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 3 2 12 17
CO2 14 3 17
CO3 10 25 35
CO4 4 13 17
CO5 3 1 18 22
CO6 4 12 16
124
SUPPLEMENTARY EXAMINATION - JUNE 2023

Course Code 18CS2022 Duration 3hrs


Course Name WEB TECHNOLOGY Max. Marks 100

Q. CO
Questions BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. Define the HTML syntax to display an image of size 100 X 150 in the CO1 R 1
webpage.
2. Define the use of<body> tag in HTML web page. CO1 R 1
3. State the CSS Selector that selects the HTML element by * symbol. CO6 R 1
4. Write the name of the tag which is used to embed CSS in html page. CO6 R 1
5. Define the HTML syntax used to attach the external JavaScript file in CO2 R 1
an HTML document.
6. Find the JavaScript function used to expire a function after a specific CO3 R 1
time.
7. Compare the PHP built-in functions require and include. CO4 U 1
8. Recall cookie. CO3 R 1
9. Mention the web technology used to achieve asynchronous server-side CO4 R 1
interaction.
10. Recall ng-repeat in AngularJS CO5 R 1
PART – B (6 X 3 = 18 MARKS)
11. Write CSS code to change the background and text color of the division
when the user moves the cursor over that division. CO2 A 3

12. Describe the HTML code to display the following content in a web CO1 U 3
page.
a. Breakfast
 Dosa
b. Afternoon
 Biryani.
13. Demonstrate the popup box functions in JavaScript with suitable CO3 U 3
examples.
14. A student class comprises data members such as Rollno and name. CO3 A 3
Initialize the data members through the constructor. Use a member
function display() to display the details of the student. Write PHP code
to create the object and print the details.
15. List any three types of AngularJS filter with its example. CO5 U 3
16. Explain the role of Bootstrap Grid System in responsive web design CO6 U 3
with an example.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Write a code for the following table layout using the HTML5 table CO1 A 6
tags and populate the rows to display the results of 3 students.
Every student is registered with 3 subjects

Student details
Personal details Subject details
Sl.No
Reg.No Name Code Name Grade
Web
18CS1001 A
Design
1 1234 XXX
18CS1002 Java A
18CS1003 C++ O
b. Explain all HTML5 form elements with example. CO1 An 6

18. a. Explain any 3 CSS Selectors with suitable program illustrations. CO6 A 6
b Explain the CSS box model with suitable HTML and CSS code. CO6 U 6

19. a. Design a HTML page as per the following and read the value of CO2 A 8
text boxes A and B using JavaScript and display the sum of A and
B in Result text box when user clicks the “Addition” button.

b Explain the selection and looping statements in JavaScript with CO3 U 4


suitable examples.

20. a. Explain the various document object model methods used to access CO3 U 12
the HTML elements in JavaScript with its example program.

21. a. Consider the following table ‘CSE’ in a database called CO4 A 12


“KARUNYA”.
Regno Name Batch
123456 YYYY 1
Apply HTML and PHP technologies to perform the following
operations.
a) Add new student in to the table CSE.
b) View the content of the table CSE
c) Update a batch detail of a student
d) Delete a student from the table

22. a. Design an online registration form using HTML as given below CO1 A 12
with the necessary attributes to make all fields mandatory.
23. a. Explain the working of AJAX in detail with its architecture diagram CO3 An 12
COMPULSORY QUESTION
24 a. Design a dynamic shopping list by letting the user to add and CO5 A 8
remove the items using AngularJS directives. Get a new item value
from the user with text box and add it to the shopping list with cross
mark (x) on add button click. Also remove the item from the list
when the cross mark (x) is clicked.

b Elucidate the following directives in AngularJS with suitable CO5 U 4


examples.
i) ng-app ii) ng-model iii) ng-init iv) ng-controller

COURSE OUTCOMES
CO1 identify the relevant properties and methods which facilitate dynamic application development.
CO2 explain the development of fully functional web applications that incorporates planning, designing,
coding, testing, and publishing to a web server.
CO3 apply the latest client and server-side technologies for creating interactive data-driven websites.
CO4 model dynamic web applications using suitable latest server-side technologies integrated with the
database.
CO5 formulate and build extensible web applications using the Model View Controller design pattern.
CO6 select appropriate design standards for designing attractive web pages.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 3 18 6 - - 29
CO2 1 - 11 - - - 12
CO3 2 19 3 12 - - 36
CO4 2 - 12 - - - 14
CO5 1 7 8 - - - 16
CO6 2 9 6 - - - 17
124
Course Code 18CS2022 Duration 3hrs
Max.
Course Name WEB TECHNOLOGY 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. State the expansion of HTTP. CO1 R 1
2. Recognize an example for a Web Server. CO2 R 1
Indicate the HTML code to include an external CSS file in HTML
3. CO1 U 1
page.
4. Identify the CSS property to remove the underline from Hyperlink. CO6 R 1
Name the event triggered whenever the web page opened in the
5. CO3 R 1
browser.
Identify the javascript method used to call a function for every specified
6. CO3 R 1
milliseconds.
7. Visualize the php code to store your name in a variable. CO4 R 1
8. Give an example php code to illustrate ‘for’ loop statement. CO4 U 1
9. Illustrate php code to represent array of five data items. CO4 U 1
10. State the use of ng-model in angular js ________. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Prepare a XML document to represent a student details such as name,
11. CO1 U 3
regno, cgpa, gender, email and phone.
12. Illustrate ‘hover’ effect in CSS with an example HTML program. CO6 U 3
13. Indicate a javascript code to iterate the elements of an array variable. CO3 U 3
14. Illustrate a php code to check the number is even or odd. CO4 U 3
Describe any three super global variables in PHP with example code
15. CO2 U 3
snippets.
16. Give the proper angular js code to demonstrate ng-repeat directive. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Develop an online registration form using HTML as given below
CO1 A 12
with the necessary attributes to make all fields mandatory.
18. a. Discuss the various CSS Selectors with suitable example programs. CO6 U 6
b
CO6 A 6
. Illustrate the CSS positioning with appropriate code snippets.

19. a. Explain the six document object model methods in Javascript with
CO3 U 6
proper programs.
b Discuss all the CSS box model properties with proper HTML and
CO6 U 6
. CSS code snippets

20. Develop a HTML program with Javascript to calculate and display


the BMI value and Status for the given weight and heights.
BMI = weight(kg)/[height(m)]2
Check the status using the following conditions.
• Underweight: BMI < 18
• Normal: BMI between 18 – 25
• Overweight: BMI between 25 – 30
• Obese: BM > 30

CO3 A 12

21. a. Sketch the following content using HTML CO2 A 6


b Illustrate a HTML program with Javascript to perform Simple
. Interest Calculation when the ‘Calculate’ button is clicked as given
below. [Formula: A = P *( 1+r*t), A – Amount, P – Principle
Amount, r- interest rate, t – tenure ]

CO3 A 6

22. Develop a PHP program to demonstrate the following database


operations with proper HTML form for collecting inputs.
 Store the given employee details such as name, empid,
email, phone, and salary to the database table “employees”
CO4 A 12
when the HTML form is submitted.
 Provide a hyperlink “View All Employees” to fetch all
employees from the table “employees” and display in a
HTML table format.

23. a. Explain the following with respect to PHP with proper example
programs.
CO4 U 6
 Cookies
 Session Tracking and Authentication
b Illustrate an AJAX program to make asynchronous server
. interaction to populate the list of suggestions as per the given CO2 U 6
character input.
COMPULSORY QUESTION
24. a. Explain the following Angular JS filters with suitable example code
snippets
 lowercase
CO5 U 6
 currency
 date
 orderBy
b Develop a HTML program with Angular JS as per the following CO5 A 6
. design and read the value of text boxes A and B using Angular JS
and display the sum of A and B in the Result textbox when the user
clicks the “Addition” button.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the relevant properties and methods which facilitate dynamic application development.
CO2 Explain the development of fully functional web applications that incorporates planning,
designing, coding, testing, and publishing to a web server.
CO3 Apply latest client and server side technologies for creating interactive data driven websites.
CO4 Model dynamic web applications using suitable latest server-side technologies integrated with
database.
CO5 Formulate and build extensible web applications using the Model View Controller design pattern.
CO6 Select appropriate design standards for designing attractive web pages.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 4 12 - - - 17
CO2 1 9 6 - - - 16
CO3 2 9 18 - - - 29
CO4 1 11 12 - - - 24
CO5 1 9 6 - - - 16
CO6 1 15 6 - - - 22
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS2027 Duration 3hrs


Course Name C# AND .NET PROGRAMMING Max. Marks 100

Q. CO
Questions BL Marks
No.
PART – A (10 X 1 = 10 MARKS)

1. Differentiate out and ref keyword in C#. CO1 U 1


2. List the uses of sealed keyword in C# program. CO1 R 1
3. Describe method overloading in C# with an example. CO3 U 1
4. Identify the block that gets executed even an exception is thrown or not. CO2 R 1
5. Examine the difference between String and StringBuilder classes. CO1 R 1
Predict the output of the following C# code.
using System;
class Printer {
public void Print<T>(T data) {
Console.WriteLine(data);
}}
class Program {
static void Main() {
Printer p = new Printer();
p.Print<int>(100);
p.Print<String>("hi");
6. }} CO2 U 1
State the two types of synchronization issues that can happen with
7. multiple threads. CO4 R 1
8. Examine the location where the shared assemblies are installed. CO4 R 1
List the mechanisms used for state management on the client side in
9. ASP.NET application. CO6 R 1
Illustrate the working of disconnected architecture in ADO.NET with a
10. neat sketch. CO5 U 1
PART – B (6 X 3 = 18 MARKS)
11. Describe the use of abstract class with an example. CO3 R 3
12. Examine any 3 string operations with C# code snippet. CO1 R 3
13. Create a list collection with 5 marks such as 55, 67, 42, 89, 97. Add a new CO4 A 3
mark as 78 and display the list collection.
14. Predict the output of the following C# code. CO2 U 3
Type intData = typeof(int);
Console.WriteLine(intData.IsClass);
Console.WriteLine(intData.IsPrimitive);
Console.WriteLine(intData.IsValueType);
15. Describe the execute methods associated with the <provider> Command CO5 R 3
classes to execute the SqlCommand.
16. Discuss the three programming models in .NET entity framework. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss the types of inheritance performed in C# with an example. CO3 U 8
b. Explain the looping control statements with suitable C# code CO1 U 4
snippet.

18. a. Consider a Vector class with x and y as attributes which describes CO2 A 12
the members of the vector class. Write a C# program to overload the
+, * and == operators.
Note: The vector should be displayed in the format of 2x+3y or 2x-
3y.

19. a. Write a C# program for user registration system by applying the CO2 A 8
exception handling concepts to create and handle the following
custom exceptions appropriately.
 Throw an exception if the age entered is less than 18 -
InvalidAgeException
 Throw an exception if the percentage is less than 50 –
InvalidPercentageException
 Throw an exception if the user’s name length is less than 10 –
InvalidUsernameException
b. Write a C# program to capture 10-digit mobile numbers and CO3 A 4
uppercase words with regular expression.
(For example - Input: 9567456776 678, CLR is Common Language
Runtime
Output: 9567456776 CLR)

20. a. Write a C# program to handle multithreading with two threads. First CO2 A 6
thread displays "C#" for every one second and the second thread
displays ".NET" for every two seconds.
b. Create a C# program to perform the following: CO4 A 6
 Create custom attribute called AuthorAttribute with 'name' as
the positional parameter and 'version' as the named parameter.
 The custom attribute is targeted to Class and allow multiple is
true.
 Create a class Book and apply the custom attribute in the
required places.
 Using Reflection, obtain type information of the Book class,
retrieve the custom attributes at runtime and display it.

21. a. Create a class named Area with methods circle(r), rectangle(l,b) and CO3 A 8
triangle(l,b,h). Write a C# code to invoke these functions by
applying single delegate.
b. Discuss how master page differs from the ASP.NET page. CO6 U 4

22. a. Discuss the role of SQLDataReader and SQLDataAdapter while CO5 U 6


retrieving the data from database.
b. Develop a generic Queue that can hold only integer values and CO4 A 6
perform various queue operations.

23. a. Examine the importance of server validation controls such as CO6 U 6


RequiredFieldValidator, RangeValidator and CompareValidator in
ASP.NET with sample C# code snippet.
b. Explain the mechanisms to automate the freeing of unmanaged CO4 U 6
resources.
COMPULSORY QUESTION
24. a. Develop an ASP.NET application to perform the following CO6 A 12
operations with ADO.NET.
 Design a web page with relevant fields
 Connect with the database named ‘Store’
 Insert a record in the table called ‘Product’ with fields such as
pid (int), and pname (varchar)
 Delete an entity from the table
 Display the details dynamically in the GridView

COURSE OUTCOMES
CO1 describe the basics programming constructs of C# in .NET Framework.
CO2 extend and debug variety of .NET applications.
CO3 demonstrate the aspects of object-oriented functionalities in .NET applications.
CO4 use the .NET base libraries in developing real time applications.
CO5 illustrate .NET applications with relational database and variety of data sources for efficient data
access.
CO6 develop well designed ASP.NET applications using .NET framework.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 5 5 10
CO2 1 4 26 31
CO3 3 9 12 24
CO4 2 6 15 23
CO5 3 10 13
CO6 1 10 12 23
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS2057 Duration 3hrs


MOBILE APPLICATION DEVELOPMENT USING
Course Name Max. Marks 100
ANDROID

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. Name the event available by default when the activity is being created. CO1 U 1
2. Mention the function that can hide or show the views. CO1 R 1
3. Write Structure of a Content URI. CO2 R 1
Mention the method that contains the code that has to be run in the
4.
background. CO2 R 1
5. Name the method that is used to set padding in Android Studio. CO3 U 1
6. Mention the types of Picker views. CO3 R 1
Identify the manifest permission to send an SMS directly from android
7.
application. CO4 R 1
Recall the two ways provided to the users by Android to share data between
8.
apps. CO4 R 1
9. Name the class that is used to find the IMEI number of a device. CO5 U 1
10. Give the code snippet used to enable the Bluetooth of a device. CO1 U 1
PART – B (6 X 3 = 18 MARKS)
11. Write the code snippet for the Intent that helps to open the camera for CO1 A 3
capturing the image.
12. Name the 3 different types of services. CO2 U 3
13. Write the design code using Linear Layout for a login screen in an android CO3 A 3
application.
14. Describe the code for creating a Broadcast Receiver to notify the change in CO4 U 3
network connectivity.
15. Name and state the use of the 3 functions available in the SMSManager CO5 A 3
class.
16. Construct the java code to display the Address of a particular location using CO6 U 3
Geocoder.
public void onLocationChanged(Location location)
{
// code
}
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Explain Android Architecture with neat diagram. CO1 R 6
b. Develop a java code to create IntentFilter for discovering Bluetooth CO1 A 6
devices with proper BroadcastReceiver and display the their name and
address.

18. a. Describe and explain ListView by listing the hobbies of students in CO2 U 6
your class.
b. Develop an Android Music player Application to play sound in the CO2 A 6
background.

19. a. Discuss on android UI layouts with suitable android code. CO3 U 6


b. Develop an option menu to select any one course (Python, C#, C++, CO3 A 6
Java) for an online educational mobile app.

20. a. Develop an android application to insert, delete and view the data for CO4 U 12
the following table using SQLite.
Stu_ID Name Department Gender Hobby
1000 Sara CSE F Dance
1001 David EEE M Music
1002 Lydia CSE F Paint
1003 Rexline ECE F Music
1005 Daniel CIVIL M Paint

21. a. Develop an Android application that sends an E-Mail to your friend. CO5 A 6
b. Relate the following concepts with respect to Content Provider CO5 R 6
i. ContentResolver ii) Cursor

22. a. Develop an android program to send student details such as name, CO3 A 6
register number, marks from one activity to another activity using
intent.
b. Illustrate how data can be shared with the help of shared preferences. U 6
O3

23. a.
Display the date 01 NOV 2022 and the time 06 Hour 20 Minutes 45 CO5 U 12
Seconds using appropriate Picker Views.
COMPULSORY QUESTION
24. a. Build an Android application to enable ACCESS_FINE_LOCATION CO6 A 6
permission and track the location updates
b. Build an Android application using fragments to get the Personal and CO6 A 6
Academic information from the user and display it using Tab Layout
with Swipeable Views.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify a significant programming component, involving the sensors and hardware features of mobile device.
CO2 Use the power of background tasks
CO3 Model mobile applications with appropriate, layouts and user interfaces.
CO4 Demonstrate applications with network connectivity, messaging and persistent storage.
CO5 Design and develop android applications for real time problems.
CO6 Build, sign and publish mobile application.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 7 2 9 - - - 18
CO2 2 9 6 - - - 17
CO3 1 13 15 - - - 29
CO4 2 15 - - - - 17
CO5 6 13 9 - - - 28
CO6 - 3 12 - - - 15
124

Course Code 18CS2068 Duration 3hrs


Course Name PYTHON PROGRAMMING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. List out the various built-in data types of Python. CO1 R 1
2. Predict the output of the following code: CO1 U 1
b = 5.0
print("\nType of b: ", type(b))
3. For the given string a=”good morning”, give the output for the following: CO2 U 1
a.capitalize()
4. Predict the output of the following code: CO2 U 1
print(hai\nhello)
5. Predict the output of the following code: CO3 U 1
print(1 + 2)
print("Geeks"+"For")
print("Geeks"*4)
6. Justify the statement. Is it possible to access the inner namespace’s CO3 An 1
objects from an outer namespace?
7. State the default color of turtle. CO4 R 1
8. List out the methods used to fill in the colours in turtle graphics. CO4 R 1
9. State the use of the method Tk(). CO5 R 1
10. Give the method used for scheduling a thread with a CPU. CO6 U 1
PART – B (6 X 3 = 18 MARKS)

11. State the various types of formal function arguments in Python. CO1 R 3
12. Predict the output of the following code: CO2 U 3
var1 = 'Hello World!'
var2 = "Python Programming"
print "var1[0]: ", var1[0]
print "var2[1:5]: ", var2[1:5]
13. Define abstract class. CO3 R 3
14. Discuss the use of the method convert (‘L’). CO4 U 3
15. List the components of a model view controller pattern. CO5 R 3
16. Define thread-based multitasking. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Write a Python program to check whether the given number is CO1 A 12
positive, negative, or zero and display an appropriate message.
18. a. Give the output for the following list operations: CO2 U 6
i) len([1, 2, 3])
ii) [1, 2, 3] + [4, 5, 6]
iii) ['Hi!'] * 4
b. Illustrate the various dictionary methods in Python with suitable CO2 A 6
examples.
19. a. Explain in detail how exceptions are raised when some internal CO3 U 6
events occur that change the normal flow of the program.
b. Write a Python program to print the Fibonacci series up to n terms. CO3 A 6
20. Summarize the various turtle operations. Use appropriate examples to CO4 U 12
demonstrate.
21. a. Write a Python program for the Pop-Up Message Box. CO5 A 6
b. Write a Python program to create 16 labels using a for loop with grid CO5 A 6
layout.
22. Describe the various states in the thread life cycle. Write a Python CO6 A 12
program to suspend a thread for a period of seconds.
23. Write a Python program that implements the following image CO4 A 12
processing operations:
i) Rotating an image
ii) Converting to black and white
iii) Converting to gray scale
iv) Transposing an image
COMPULSORY QUESTION
24. Write a Python program for producer and consumer problems CO6 A 12
implementing inter-thread communication.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand and apply the basic programming constructs of Python suitably.
CO2 Infer the concepts of string processing, file I/O, lists and dictionary.
CO3 Apply modules for reusability and the object-oriented principles for modelling and developing
software system.
CO4 Make use of graphics for processing images.
CO5 Construct applications with graphical user interface.
CO6 Develop software solutions using multi-threading, networking and client-server concepts.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 4 1 12 17
CO2 11 6 17
CO3 3 7 6 1 17
CO4 2 15 12 29
CO5 4 12 16
CO6 3 1 24 28
124
Course Code 18CS2072 Duration 3hrs
Course Name SOCIAL NETWORK ANALYSIS Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)

1. List the ways that can be used to represent a graph. CO1 R 1


2. Examine the notation of O(n^2) . CO1 R 1
3. Discuss on longitudinal research. CO2 U 1
Memorize which one of the following in the area of Social Networks
4. describes the term “Affiliation networks”. CO2 R 1
Define average linkage in a cluster distance which measures the entire
5. network. CO3 R 1
6. Discuss about SIENA. CO3 U 1
7. Examine about the peer influence in a social network. CO4 R 1
8. Construct a formula to find closeness centrality. CO4 A 1
9. Define cohesion in a network. CO5 R 1
10. Identify the formulae to measure transitivity. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Differentiate homogeneous and heterogeneous Networks. CO1 An 3
12. Classify Sampling and Bounding related to Social Networks. CO2 U 3
13. Discuss about Negative Tie Networks. CO3 U 3
14. Interpret the information found in Dyadic hypothesis. CO4 U 3
15. Analyze the concept of combinatorial optimization. CO5 An 3
16. Identify the value for out degree of vertex 0,1,2,3 from the given CO6 R 3
architecture diagram

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
List down the properties of Adjacency Matrices. Construct an
Adjacency matrix for the given directed graph.

17. a.
CO1 R

b. Discuss on Multi-relational Graph. CO1 U 5

Classify Linear Regression and Logistic Regression and CO2 U 8


18. a. Demonstrate which model can solve a multi-class classification
problem.
b. Describe Whole Network Analysis with a real time example. CO3 R 4

19. a. State how you would generalize “ego networks”. CO3 R 4


Describe different methods in data collection with its sources of CO2 R 8
b.
extraction of data.

20. a. Describe correspondence analysis referred in Social Networks. CO3 R 4


List down the Hierarchical clustering with single link, complete CO3 R 8
b.
link and average link distance.

Describe about permutation tests which produce a good accurate CO3 R 10


21. a.
outcome in testing hypothesis.
b. Discuss about Stochastic Actor Oriented models. CO4 U 2

22. a. Enumerate the members affiliated with one another in a group. CO4 R 5
b. Describe closeness centrality with an undirected graph. CO4 R 7

23. a. Discuss about cliques in Social Networks. CO5 U 4


Examine Triad Census with Transitive and intransitive in CO5 R 8
b.
undirected graphs of Social Networks.
COMPULSORY QUESTION
Discuss about Combinatorial optimizations in a subgroup structure.
24. a.
CO6 U 4
b. Calculate the cumulative modularity score of community {A, C, E,
F, I} and {B, D, G, H} as given in graph node below. CO6 A 8
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the core concepts of social network analysis and the underlying mathematics.
CO2 Summarize the research design methods and different options for collection and management of
network data.
CO3 Distinguish between the whole network and egocentric research designs.
CO4 Apply suitable multivariate and statistical techniques for testing hypotheses with network data.
CO5 Analyze the node’s position and structural similarities of network using suitable measures.
CO6 Interpret various social networks using suitable tools.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 9 5 - 3 - - 17
CO2 9 12 - - - - 21
CO3 31 4 - - - - 35
CO4 13 5 1 - - - 19
CO5 9 4 - 3 - - 16
CO6 4 4 8 - - - 16
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS2072 Duration 3hrs


Course Name SOCIAL NETWORK ANALYSIS Max. Marks 100

Q. CO
Questions BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. Write about the weak ties in Social Networks. CO1 A 1
2. Define Nodes and edges. CO1 R 1
3. List the ways that can be used to represent a graph. CO2 R 1
4. Discuss on longitudinal research. CO2 U 1
5. Define Census. CO3 R 1
6. List the benefits of self-administered surveys. CO4 R 1
7. Define average linkage in a cluster CO4 R 1
8. Lists any two approaches to find coreness. CO5 R 1
9. Discuss about overlap relation in a networks. CO5 U 1
10. Write the formulae to measure transitivity. CO6 A 1
PART – B (6 X 3 = 18 MARKS)
11. Discuss about Dyadic motifs. CO1 U 3
12. Write the strategies for finding group boundaries. CO2 A 3
13. Discuss the features of survey in data collection. CO3 U 3
14. Discuss about the combinatorial optimizations CO4 R 3
15. Describe the reasons to symmetrize data. CO5 R 3
16. Identify the value for indegree of vertex 0,1,2,3 from the given CO4 R 3
architecture diagram

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Explain different components of a graph. CO1 U 6
b. Discuss on Graph as math object in Social Networks. CO1 U 6

18. a. Explain Adjacency matrix for an undirected graph CO1 U 6


b. Describe about the different ways and modes in a network. CO2 R 6

19. a. Describe the types of question formats in a network. CO2 R 6


Explain sampling with its different types. Formulate a real time
b CO2 U 6
example.

Explain the process behind data management and the tool used
20. a. CO3 U 6
in Social Networks.
List down the Hierarchical clustering with single link, complete
b. CO4 R 6
link and average link distance.

21. a. Explain about multidimentional scaling with an example. CO4 U 12

22. a. Discuss different aspects of exponential random graph models. CO4 U 6


Describe the permutation tests which produce a good accurate
b. CO5 R 6
outcome.

Explain triad census with transitive and intransitive in


23. a. CO5 U 12
undirected graphs of social networks.
COMPULSORY QUESTION
Discuss about structural equivalence in a multirelational
24. a. CO6 U 6
network.
b. Explain the bimodel method in a cliques. CO6 U 6

COURSE OUTCOMES
CO1 describe the core concepts of social network analysis and the underlying mathematics
CO2 summarize the research design methods and different options for collection and management of network
data
CO3 distinguish between the whole network and egocentric research designs
CO4 apply suitable multivariate and statistical techniques for testing hypotheses with network data
CO5 analyze the node’s position and structural similarities of network using suitable measures
CO6 interpret various social networks using suitable tools

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 1 21 1 - - 23
CO2 13 7 3 - - 23
CO3 1 9 - - 10
CO4 14 18 - - 32
CO5 10 13 - - 23
CO6 12 1 - - 13
124
Course Code 18CS2080 Duration 3hrs
Course Name VIRTUAL REALITY TECHNOLOGY Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)

1. Define personal display device. CO1 R 1


2. List the features of monitor-based display devices. CO1 R 1
3. Name the various types of personal display output devices. CO2 R 1
4. List the two types of parametric spline representation of curves. CO2 R 1
Identify the type of modeling that is used to model the physical
5. characteristics of 3D object. CO3 R 1
6. Interpret and write the importance of genlock technique. CO3 U 1
Point out the type of representation of data object from the below given
picture.

7. CO4 An 1
Formulate the syntax used to generate new sphere and new cone using
8. world tool kit. CO5 R 1
9. List the technological growth in commercial VR technologies. CO6 U 1
10. List the two types of parametric spline representation of curves. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Brief the tracker performance parameters used for the evaluation of 3D CO1 An 3
tracker device.
12. Describe the features of projector based large volume display. CO2 U 3
13. Differentiate between client-server and peer-peer distributed VR system. CO3 An 3
14. Classify the different types of tool kits available to process the VR objects. CO4 U 3
15. Compare and contrast the performance of WTK and Java 3D. CO5 An 3
16. List the technological impact of VR in the field of education. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Explain the mechanism of magnetic trackers as input devices in virtual CO1 U 12
reality. Classify the AC and DC magnetic trackers and compare their
working mechanism in detail
18. Describe the working of 3D audio display system using convolvotron CO2 R 12
mechanism and formulate the mathematical representation of cross-
talk effect produced during sound display.
19. a. Define rendering. Summarize the functionalities of the various stages CO3 U 6
of the graphics rendering pipeline with neat diagram.
b. Formulate the mathematical representation of 3D transformation CO3 U 6
involved in kinematic modeling of robots.
20. a. Summarize the functionalities of World Tool Kit for object creation CO4 U 6
and processing using scene graph.
b. Describe how WTK (World Tool Kit) library allows clients to interact CO4 R 6
with the server using networking method of WTK.
21. Describe the test bed configuration for analyzing user performance CO5 R 12
studies in terms of system responsiveness, influence of system
responsiveness and influence of feedback modality.
22. Describe the overall process involved in physical modeling of VR CO3 R 12
object.
23. a. Explain the working principle of ultrasonic tracker that makes use of CO1 U 8
ultrasonic sound waves to detect the position and orientation of 3D
object.
b. List the uses of ultrasonic tracker. CO1 U 4
COMPULSORY QUESTION
24. Describe the overview of VR applications in the field of education, CO6 R 12
medicine and entertainment.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Recognize the virtual technology and usage of input devices.
CO2 Identify the essential output devices, sound displays, graphics and feedback.
CO3 Demonstrate workstation-based architecture for modelling.
CO4 Analyze the programming tool kits in engineering the virtual reality methods.
CO5 Relate the user performance and multimodality feedbacks.
CO6 Understand the effect of virtual reality simulation on users.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 24 - 3 - - 29
CO2 14 3 - - - - 17
CO3 13 13 - 3 - - 29
CO4 6 9 - 1 - - 16
CO5 13 - - 3 - - 16
CO6 12 5 - - - - 17
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS2086 Duration 3hrs


Course Name FUNDAMENTALS OF JAVA PROGRAMMING Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. List the data types in Java. CO1 R 1
2. Name the primitive data type that is used to store a single character. CO1 R 1
Interpret the output of the sample code given below:
public class Main
{
public static void main(String args[])
{
CO2 A 1
int x=20;
System.out.println(++x);
System.out.println(x--);
}
3. }
Identify the output of the following code:
public class Main
{
public static void main(String args[])
{ CO2 U 1
int g = 3;
System.out.print(++g * 8);
}
4. }
5. List the types of packages in java. CO3 R 1
9. Determine the output of the given program
10. public class JavaException{
11. public static void main(String args[]){
12. try{
13. int data=50/0; CO3 A 1
14. }catch(ArithmeticException e){System.out.println(e);}
15. System.out.println("Rest of the code...");
16. }
6. }
7. Mention the reason for using Synchronization. CO4 R 1
8. Interpret the output for the sample code given below: CO4 A 1
public class Main
{
public static void main(String args[])
{
String str1="swing";
System.out.println(str1.concat("check"));

}
}
9. List out the wrapper’s classes in boxing. CO5 R 1
10. Name some of the AWT layout managers in Java CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Illustrate a java program to check eligibility for voting if the person age
CO1 A 3
is given as 18.
12. Classify the use of abstract class from a regular Class. CO2 R 3
13. Identify the output for the following code:
public class Main
{
public static void main(String args[])
{
double a, b,c;
a = 3.0/0;
CO3 R 3
b = 0/4.0;
c=0/0.0;
System.out.println(a);
System.out.println(b);
System.out.println(c);
}
}
14. Explain the following String Operations with an example:
CO4 U 3
a. split() b. length()
15. Demonstrate a java program to illustrate the concept of file Creation CO5 A 3
16. List any three AWT components. CO6 An 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Discuss in detail about the object-oriented principles in java with an
CO1 R 12
example.

18. Define Inheritance. Explain its types with suitable example. CO2 R 12

19. Demonstrate the concept of Interface with an example program CO3 A 12

20. Write in detail about Inter Process Communication with an example


CO4 A 12
program.

21. Explain in detail about the following with an example program:


CO5 U 12
b) Enumeration and Autoboxing b) String Operations

22. Write in detail about the different operators available in java with an
CO6 A 12
example program.
23. Discuss in detail about the following:
CO4 U 12
c) Features of Java b) Arrays
COMPULSORY QUESTION
24. Explain in detail about a GUI Application using swing with a suitable
CO6 U 12
example.

COURSE OUTCOMES
CO1 understand the fundamental principles of object-oriented design.
CO2 identify the fundamental programming constructs to develop real time applications.
CO3 model applications using Java.
CO4 demonstrate the development of multitasking applications
CO5 breakdown the real time applications into small abstract entities
CO6 develop desktop-based applications.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 14 - 03 - - - 17
CO2 15 01 01 - - - 17
CO3 04 - 13 - - - 17
CO4 05 15 01 - - - 29
CO5 01 12 03 - - - 16
CO6 01 24 - 03 - - 28
124
Course Code 18CS2087 Duration 3hrs
Course Name FUNDAMENTALS OF PYTHON PROGRAMMING Max. Marks 100

Q.
No Questions CO BL Marks
.

PART – A (10 X 1 = 10 MARKS)


(Answer all the questions)

1. Predict the output for the following program.


CO1 U 1
print("KITS" * 4)

2. State the role of *args and **kwargs arguments in function. CO1 R 1

3. Interpret the output of the following code.


dir = "/home/var/python/" CO2 U 1
print(dir.split('/'))

4. Identify the output of below Python code.


tup1=(11,22,33)
CO2 U 1
tup3=tuple1*2
print(tup3)

5. Outline the difference between global and local variables. CO3 U 1

6. Write a python command to insert 8 in a list ‘‘L’’ at 2nd position. CO3 A 1

7. Identify the type of inheritance from the following code:


class Animal():
pass CO4 U 1
class Horse(Animal):
pass

8. Write a python program to create a list containing mixed data and print
CO4 A 1
the data using ‘for’ loop statement.

9. Recognize and write the output for the following code. CO5 U 1
l = ["Year",2023,"Month"]
print(set[1])

10. Explain the significance of close() function in file operations. CO6 U 1

PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)

11. Develop a python program to print your institution name 10 times. Each
CO1 A 3
output should begin on a new line.

12. Write a python program to replace the last value of tuples in a sample
list given below.
CO2 A 3
Sample list: [(71,72,74), (84,85,86), (97,98,99)]
Expected Output: [(71,72,10), (84,85,10), (97,98,10)]

13. Discuss the open() and close () function used for file operations. CO3 U 3

14. Write a Python program to access the third number in the given list.
CO4 A 3
List1=[7, 101, 200, 11,1,202]

15. Develop a python program to print all the numbers from 10 to 15, and
CO5 A 3
print a message, when the loop has ended.

16. Compare terminal-based app and GUI based app. CO6 U 3

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)

17. a. Discuss the conditional and looping statement with suitable


CO1 U 8
programs.

b Design a python program to check whether the given input is prime


CO1 A 4
. or not.

18. a. Develop a python program to prepare a list:


Car_make=[“Mahindra”,”Honda”,”Maruti”,”BMW].

 Print only the last two items in the list. CO2 A 8


 Print all the items in capital letters.
 Find the length of the list.
 Update the second item of the list as “Scoda”.
 Remove the last item in the list and print the list.

b Interpret the types of functions with neat examples.


CO2 U 4
.
19. a. Explain in detail about python files, functions and operation that can
CO3 U 8
be performed on files with examples.

b Explain the Hybrid inheritance with sample python code.


CO3 U 4
.

20. a. Explain how delete operation work on dictionaries with suitable


CO4 U 8
example.

b Compare the methods of tuple and the list.


CO4 U 4
.

21. a. Explain the operation of file with suitable suitable program.


CO5 U 8

b Develop a python program with the given input string S =


. “KARUNYA..” to perform the following operations.
 Compute the number of occurrence of ‘a’ in a String S. CO5 A 4
 Replace ‘a’ with ‘@’.
 Calculate the length of the input string.
 Access the last character of the string.

22. a. Formulate a python code by analyzing the given dictionary:


dict = {“Name”: “KITS”, “Dept”: “CSE”, “Reg_No”:
URK18RA9913} and perform the following operations.
CO4 A 8
 Copy the key-value pairs into another new dictionary.
 Remove all the key-value pairs.
 Update the value of Dept from CSE to ECE available in the
dictionary.

b Design a python program to print natural numbers from 21 to 70


CO2 A 4
. using while loop.

23. a. Compare and contrast the different parameter in function with an


CO2 U 8
example.

b Explain how you can randomize the items of a list in python.


CO1 U 4
.

COMPULSORY QUESTION

24. Create a window with size (600*400) as dimension with a CO6 A 12


TEXTBOX and BUTTON. After entering your name in the textbox
and on clicking the button, a message box with a message “Hello,
you have a nice name” to be displayed.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the datatypes, expressions and type conversions in Python.
CO2 Use functions, control statements, strings, lists and dictionaries in python programming.
CO3 Demonstrate the concept of object, class inheritance and polymorphism in Python.
CO4 Write user defined functions, classes in python.
CO5 Develop GUI based Python program and to read and write files using python programming.
CO6 Create python program for real world applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 01 13 07 - - - 21
CO2 - 14 15 - - - 29
CO3 - 16 01 - - - 17
CO4 - 13 12 - - - 25
CO5 - 09 07 - - - 16
CO6 - 04 12 - - - 16
124

Course Code 18CS3001 Duration 3hrs


Course Name ADVANCED ALGORITHMS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Determine the shortest path from ‘s’ to the remaining vertices using CO A 8
Dijkstra’s algorithm. 1

b Identify why amortized analysis is needed and the different ways by CO U 8


. which amortized costs are calculated with examples. 1

2. a. Construct the maximum matching set for the graph given below and CO A 8
find whether this graph has a perfect matching. 2

b Explain in detail the concept of augmentation and how to compute an CO U 8


. augmenting path with an example. 2

3. a. Discuss in detail how the problem of inverting matrices in a particular CO U 8


class can be reduced to the problem of matrix multiplication. 3
b Determine the maximum possible flow from ‘0’ to ‘5’ using the CO A 8
. Edmonds Karp algorithm. 3

4. a. Compute the shortest path between all the pairs of vertices in a CO A 8


weighted graph using the Floyd-Warshall algorithm. 4

b Explain the Chinese Reminder theorem with examples to solve the CO U 8


. simultaneous congruences. 4

5. a. Discuss about the Fourier transform algorithm and its role in computing CO U 8
convolutions and products of various types. 5
b Solve the following linear program using SIMPLEX method. CO A 8
. Maximize P=2 x 1+ x 2 5
Subject to 5 x 1+ x 2≤ 9
x 1+ x 2≤ 5
x1, x2≥0

6. a. Differentiate NP-complete and NP-hard and give examples for each one CO U 8
of them. 6
b Describe how to randomize the deterministic algorithms considering the CO U 8
. following problems. 6
o Quick sort algorithm
o Linear search algorithm

7. a. Determine the maximum possible flow from ‘A’ to ‘B’ using Ford- CO A 8
Fulkerson Algorithm. 3

A B

bExplain how the Schönhage-Strassen algorithm makes use of the Fast CO U 8


.Fourier Transform (FFT) algorithm for multiplying large integers. 5
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Identify and discuss two problems where the greedy algorithm gives a CO U 12
suboptimal solution whereas the dynamic programming approach gives 4
an optimal solution.
b Discuss different NP-complete problems with examples. CO U 8
. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 State the correctness of the basic algorithms for the classic problems.
CO2 Understand the mathematical foundation in analysis of algorithms.
CO3 Analyze the efficiency of algorithms using time and space complexity.
CO4 Understand different algorithmic design strategies.
CO5 Choose the appropriate data structure for solving a particular set of problems.
CO6 Developing efficient algorithms of various problems in different domains.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 8 16
CO2 8 8 16
CO3 8 16 24
CO4 20 8 28
CO5 16 8 24
CO6 24 24
132
Course Code 18CS3002 Duration 3hrs
Course Name ADVANCED COMPUTER NETWORKS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Discuss how the transmission and receiving process takes place both in CO U 12
sliding window and stop – wait protocols. 1
b Elaborate the functionalities of Clock-Based framing (SONET) with its CO R 4
. frame format. 1

2. a. Elaborate the concepts of ethernet and its multiple access protocol CO U 4


(IEEE 802.3) with worst-case scenario. 1
b Explain about the working principles of WIFI technology and elaborate CO A 12
. its functions for hidden node problem and exposed node problem. 2

3. a. Discuss the working principles of spanning tree algorithm with proper CO E 12


examples. 3
b Write down three different approaches to handle headers for source CO An 4
. routing in virtual circuits. 3

4. a. Suppose a network with IP Address 192.16.0.0. is divided into 2 CO C 8


subnets, find number of hosts per subnet. 5

Also for the first subnet, find-


a. Subnet address
b. First Host ID
c. Last Host ID
d. Broadcast address

b Discuss how Address translation protocol (ARP) map the IP address CO An 8


. into ethernet address. 4

5. a. Write a program in java that uses TCP and UDP for client/server socket CO C 12
interaction. 4
b List the limitations of IPv4 and how are they overcome by IPv6. CO E 4
. 5

6. a. Illustrate the main features of Software Defined Network (SDN) with CO U 12


its supporting technologies. 6
b Differentiate inter-domain routing protocol and border gateway CO An 4
. protocol in global internet network. 6

7. a. Identify the relationship between SMTP, MIME and IMAP. CO U 8


2
b List out several limitations in the end-to-end protocols during the CO R 8
. transmission process. 2
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. Discuss various socket address structure and its byte ordering functions CO An 16
with byte manipulation function. 5
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify and discuss the concepts underlying protocols, and their main characteristics and
functionality.
CO2 Identify the various TCP/IP protocols that used for particular networking application.
CO3 Recognize the requirement of Interior and exterior routing protocols that are used for different
networks.
CO4 Understand the behavior of internetworking different networks in MPLS networks.
CO5 Apply knowledge of the TCP/IP layering model to intelligently debug networking problems.
CO6 Evaluate theoretical and practical concepts behind the design of multi-constrained applications
and services.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 4 16 - - - - 20
CO2 8 8 12 - - - 28
CO3 - - - 4 12 - 16
CO4 - - - 8 - 12 20
CO5 - - - 16 4 8 28
CO6 - 12 - 4 - - 16
128
Course Code 18CS3004 Duration 3hrs
ADVANCED CRYPTOGRAPHY AND NETWORK
Course Name Max. Marks 100
SECURITY

Q.
B
No Questions CO Marks
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a. Illustrate the block cipher design principles. CO1 U 14
b Distinguish between Substitution Cipher Technique and CO1 U 6
. Transposition Cipher Technique.
(OR)
2. a. Explain in detail about RSA algorithm with an example. CO2 U 14
b List the advantages and disadvantages of Diffie Hellman Key CO2 R 6
. Exchange algorithm.

3. a. Explain in detail about Secure Hash Algorithm with an example. CO3 U 10


b Give the structure of HMAC. Explain the applications of HMAC. CO3 R 10
.
(OR)
Briefly explain Remote User Authentication using Symmetric CO4 R 10
4. a.
encryption.
b Explain in detail about the x.509 certificate. CO4 U 10
.

5. a. Illustrate the Cloud Security Risks and Counter Measures. CO4 U 10


b List the categories of cloud Security as a Service and explain them CO5 R 10
. with an example.
(OR)
Illustrate the Data Encryption Standard algorithm and explain CO1 U 12
6. a.
encryption and decryption process.
b Explain in detail about Security Attacks and Security Services. CO1 U 8
.

7. a. Illustrate the characteristics and limitations of firewall. CO6 U 12


b List the types of firewalls and explain them. CO6 R 8
.
(OR)
8. a. Describe the operations involved in pretty good privacy and explain CO5 R 10
it.
b Explain Kerberos authentication mechanism with a suitable CO4 U 10
. diagram.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. a. Explain Intrusion Detection System with a suitable diagram. CO6 U 10
b Illustrate the concept of IP security policy. CO6 U 10
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Recognize the importance of cryptography.
CO2 Distinguish different kinds of attacks and design new security features.
CO3 Apply key management using various symmetric and asymmetric key algorithms.
CO4 Categorize cryptographic data integrity algorithms.
CO5 Explain the different types of firewalls.
CO6 Evaluate wireless network and cloud security.

Assessment Pattern as per Bloom’s Taxonomy


CO/P R U A An E C Total
CO1 - 40 - - - - 40
CO2 6 14 - - - - 20
CO3 10 10 - - - - 20
CO4 10 30 - - - - 40
CO5 20 - - - - - 20
CO6 8 32 - - - - 40
180
Course Code 18CS3007 Duration 3hrs
Course Name ADVANCED DATABASE MANAGEMENT SYSTEMS Max. Marks 100

Q. CO
Mark
No Questions BL
s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Define system catalog. Describe the information stored per relation, CO R 8
per index and per view in the system catalog. 1
b Discuss the reason for the difference in cost between alternative CO An 8
. plans for a query can be very large. Give examples using the 1
following schema with the query evaluation plan (relational
algebra tree) to illustrate the impact of pushing selections,
choice of join methods, and availability of appropriate indexes.
Consider the following schema:
Student (sid, name, age,d_id)
Department(d_id, d_name, d_head, d_budget)
Query:
SELECT S.name from Student S, Department D WHERE
S.d_id= D. d_id AND D.name=”CSE” AND S.age > 24
Assume that each tuple of Student is 100 bytes long and each
page can hold 50 tuples and have 1000 pages of such tuples.
Each tuple of Department is 50 bytes long and each page can
hold 100 tuples and have 2000 pages of such tuples.

2. a. Consider the following two transactions: CO A 8


T7: 2
R(X);
R(Y);
if X = 0 then Y := Y + 1;
W(Y).
T8:
R(Y);
R(X);
if Y = 0 then X := X + 1;
W(X).
Let the consistency requirement be X = 0 or Y = 0, with X = Y =
0 the initial values.
i. Show that every serial execution involving these two
transactions preserves the consistency of the database.
ii. Show a concurrent execution of T7 and T8 that produces a
non-serializable schedule.
iii. Is there a concurrent execution of T7 and T8 that produces a
serializable schedule?
b Describe and compare deadlock detection and deadlock CO An 8
. prevention schemes. Why is detection schemes more commonly 2
used?

3. a. Explain the choices in tuning conceptual schemas in detail with CO U 8


suitable examples. 3
b Describe the six guidelines for index selection in detail. CO R 8
. 3

4. a. A relation can be distributed by fragmenting it or replicating it CO R 8


across several sites. Explain these concepts and how they differ? 4
Also, distinguish between horizontal and vertical fragmentation.
b Discuss the three data partitioning techniques available to CO U 8
. implement parallel databases. What are the merits and demerits 4
of each technique?
Consider Department (did:integer, dname:string, budget:real)
relation stored in India. The relation contains 100 tuples. Explain
how this relation will be partitioned across five computers in
India using partitioning techniques.

5. a. List the characteristics of spatial data. State spatial extent. CO R 8


Differentiate spatial range queries, nearest neighbor queries and 5
spatial join queries.
b What is a space filling curve and how can it be used to design a CO U 8
. spatial index? Describe spatial index structures based on space- 5
filling curves.

6. a. Consider the following Query Evaluation Plan (QEP): CO An 8


1

Draw any two alternative plans for the above QEP? Explain
how the alternative plans are better than the original plan in
detail with appropriate cost calculation.
b Why recovery in a distributed DBMS is more complicated than CO U 8
. in a centralized system? Describe and compare two-phase and 4
three-phase commit protocols.

7. a. Consider the execution shown in the following figure and CO A 16


answer the questions given below 2

i.
What is done during analysis phase?
ii.
What is done during redo phase?
iii.
What is done during undo phase?
iv.
Describe the actions that has be done in case of repeated
crash and specify the missing LSN and LOG information
of the above diagram.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Describe the scenario in which mandatory access controls CO R 10
prevent a breach of security that cannot be prevented through 6
discretionary access controls.
b What is an authorization graph? Explain SQL’s GRANT and CO U 10
. REVOKE commands in terms of their effect on this graph. In 6
particular, discuss what happens when user pass on privileges
that they receive from someone else with an example.
CO – COURSE OUTCOME BL – BLOOMS’ LEVEL

COURSE OUTCOMES
CO1 Identify alternative designs for implementation of database systems, including data models, file
structures, index schemes, and query evaluation.
CO2 Recognizes appropriate techniques for transaction processing, concurrency control, backup and
recovery that maintain data integrity in database systems.
CO3 Applies locks and isolation levels to the concurrent transactions.
CO4 Analyzes the operation of parallel and distributed database.
CO5 Design and implement significant database objects such as file structures and index schemes.
CO6 Explains the concepts of information retrieval and spatial data management.

Assessment Pattern as per Bloom’s Taxonomy


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 8 - - 16 - - 24
CO2 - - 24 8 - - 32
CO3 8 8 - - - - 16
CO4 8 16 - - - - 24
CO5 8 8 - - - - 16
CO6 10 10 - - - - 20
132
`

Course Code 18CS3009 Duration 3hrs


Course Name ADVANCED MACHINE LEARNING Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a State why the ensemble methods may improve the accuracy of the CO
1. U 10
. classifier? Explain the working principle of Bagging and Boosting. 1
b Summarize the types of machine learning and discuss the components CO
U 10
. in the design of a learning system. 1
(OR)
a CO
2. U 10
. Explain Multiple layer perceptron model with a neat diagram. 2
b CO
R 10
. Describe CART (Classification and Regression Tree) with examples. 1

Apply decision tree algorithm on the following dataset and identify


the root node of the tree. (Note: Input attributes: Outlook,
Temperature, Humidity and Windy, Output attribute: Play)
Temperatur
Day Weather e Humidity Wind Play
1 Sunny Hot High Weak No
2 Cloudy Hot High Weak Yes
a 3 Sunny Mild Normal Strong Yes CO
3. A 10
. 2
4 Cloudy Mild High Strong Yes
5 Rainy Mild High Strong No
6 Rainy Cool Normal Strong No
7 Rainy Mild High Weak Yes
8 Sunny Hot High Strong No
9 Cloudy Hot Normal Weak Yes
10 Rainy Mild High Strong No
Apply K-means clustering algorithm and group the following dataset
into 2 clusters by assuming (2,3) and (5,6) as the initial cluster center.
Sample Feature Featur
b s 1 (x) e 2 (y) CO
1 2 3 A 10
. 2
2 5 6
3 8 7
4 1 4
5 2 4
6 6 7
7 3 4
8 8 6
(OR)
Construct a dendrogram for the given distance matrix using single
linkage clustering approach.
A B C D E F
A 0
a CO
4. B 0.71 0 An 10
. 1
C 5.66 4.95 0
D 3.61 2.92 2.24 0
E 4.24 3.54 1.41 1 0
F 3.2 2.5 2.5 0.5 1.12 0
b Explain how affinity propagation-based clustering creates clusters by CO
U 10
. sending messages between data points until convergence. 2

a Describe the working behavior of support vector machine with CO


5. R 10
. diagrams. 2
i) Explain how Gaussian processes can be used for regression and
b classification tasks. CO
U 10
. ii) Discuss the advantages and limitations of Gaussian processes in 3
handling non-linear data.
(OR)
a Explain the concept of the EM algorithm and its role in probabilistic CO
6. U 10
. modeling. 3
b Describe the techniques used for dimensionality reduction in high- CO
R 10
. dimensional spaces and their impact on clustering performance. 3

Write short notes on:


a CO
7. i) Learning DAC with graph neural network A 10
. 4
ii) Learning Undirected Gaussian Graphical Models
i) Explain the process of learning DAG structures with latent
b variables. CO
U 10
. ii) Discuss the challenges and techniques for handling latent variables 4
in structure learning algorithms.
(OR)
a Explain DBSCAN algorithm for density-based clustering. List out its CO
8. U 10
. advantages compared to K-means. 5
b CO
U 10
. Explain the working principle of fuzzy c-means algorithm in detail. 5
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
a Describe the architecture, components and the working of a Deep CO
9. R 10
. Belief Network (DBN) with neat diagram. 4
b Explain the role of restricted Boltzmann machines (RBMs) in pre- CO
U 10
. training Deep Belief Networks. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Summarize the theoretical and practical aspects of advanced machine learning techniques.
CO2 Compare the strengths and limitations of selected machine learning techniques and where they can
be applied for different applications.
CO3 Identify the relevant tool for different machine learning techniques.
CO4 Analyze the problem thoroughly and identify the advanced machine learning approaches and
paradigms.
CO5 Design and implement suitable machine learning technique to a given task.
CO6 Evaluate and compare the performance of the selected approaches for a given problem.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 20 10 30
CO2 20 20 20 60
CO3 10 20 30
CO4 20 10 30
CO5 20 20
CO6 10 10
180
Course Code 18CS3015 Duration 3hrs
Course Name CLOUD COMPUTING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Categorize various type of hypervisors and explain each of its design
1. CO1 U 10
. principles.
b
Illustrate the architecture of KVM and Citrix Xen Server. CO1 U 10
.
(OR)
Elaborate various cloud deployment models and cloud service model
2. CO2 U 20
with the case study of NOVA open stack.

Analyze how Frequent are your Service Outages and how long do they
3. CO3 A 20
last on average in Amazon Elastic Compute2 (EC2) service providers.
(OR)
a Discover the design principles of the Hadoop File System with map-
4. CO4 An 10
. reduce function.
b Explain the basic concept of Infrastructure as a code with Open
CO4 U 10
. Stack (IaC).

Justify, how IAM security best practices implemented in IaaS, PaaS,


5. CO5 E 20
SaaS cloud services.
(OR)
Examine the case study for Microsoft conversion tools and Open
6. CO1 An 20
Source p2v conversion tools.

List the use cases of Amazon CloudFront and elaborate on how to set
a
7. up a CDN for a web page containing the Java programming language CO2 R 10
.
tutorial.
b Analyze each step run by map-reduce function for a simple word count
CO3 A 10
. program.
(OR)
Examine network, host and application level aspects of data security in
8. CO5 An 20
cloud.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. Label the components of Ansible and write the code and step to deploy CO6 A 20
a web server and database server using Ansible playbook.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Infer the concept of virtualization in the cloud computing.
CO2 Use the concepts of cloud storage, cloud networks and its management.
CO3 Identify the architecture, infrastructure and delivery models of cloud computing.
CO4 Categorize the services using Cloud computing.
CO5 Apply the security models in the cloud environment.
CO6 Develop an automation solution for the cloud.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - 20 - 20 - - 40
CO2 10 20 - - - - 30
CO3 - - 30 - - - 30
CO4 - 10 - 10 - - 20
CO5 - - - 20 20 - 40
CO6 - - 20 - - - 20
180
Course Code 18CS3016 Duration 3hrs
Course Name CLOUD COMPUTING AND IOT Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
CO
1. a. U 10
IoT is a trillion dollar industry. Justify your answer. 1
Explain the power and capabilities of IoT technologies or ideologies
b CO
for the Telematics and Intelligent Transport Systems of vertical IoT A 10
. 1
application.
(OR)
Illustrate SCADA systems that acts as the Internet of Controllers with CO
2. An 20
a neat architecture diagram. 2

Determine the process of integration and interoperability of


CO
3. applications and services running on heterogeneous computing and A 20
2
communications devices for IoT.
(OR)
Summarize the various IoT devices and networking stages of wired CO
4. U 20
and wireless communication used in DNA of IOT. 3

Illustrate the working process of WoT portals for business intelligence


CO
5. and list out the various security challenges that are enforced on IoT A 20
4
information security.
(OR)
Discuss on the unified IoT middleware framework with necessary CO
6. U 20
diagrams. 3

Illustrate the salient features, characteristics, standardization and


CO
7. services of cloud computing also explain the importance of A 20
4
middleware in cloud computing.
(OR)
Explain the framework for Cloud of Things architecture with a neat CO
8. U 20
diagram. 5
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Discuss on the various security threats at different layers of IoT and CO
9. U 20
appraise on the security analysis of the IoT protocol standards. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Examine IoT Architecture and various protocols.
CO2 Classify the IoT value chain structure (device, data cloud), application areas and technologies
involved.
CO3 Design, develop and implement smart systems.
CO4 Infer the advantages of Cloud Services.
CO5 Learn about optimization of cloud storage.
CO6 Apply various kinds of security mechanisms.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - 10 10 - - - 20
CO2 - - 20 20 - - 40
CO3 - 40 - - - - 40
CO4 - - 40 - - - 40
CO5 - 20 - - - - 20
CO6 - 20 - - - - 20
180
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS3016 Duration 3hrs


Course Name CLOUD COMPUTING AND IOT Max. Marks 100

Q.
B
No Questions CO Marks
L
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
Identify the applications, requirement, and challenges involved in IoT CO
1. a. development as a trillion dollar industry. 1 R 8
b Examine the power and capabilities of IoT technologies for Smart Grid CO
. and Electric Vehicles 1 R 8

Summarise the DNA of intelligent nuclear power plant IoT system with CO
2. a. neat architecture diagram. 2 U 16

Compare and contrast Web of Things (WoT) Vs Internet of Things CO


3. a. (IoT) standardization. 3 U 8
b CO
. Unified Data Standards is a challenging task. Justify 3 A 8

Illustrate the salient features, characteristics, standardization and


services of cloud computing also emphasis the importance of CO
4. a. deployment models of cloud computing in IoT. 4 A 16

Discuss how Quality of Service (QoS) impacts a business method to


offer the users exclusive capabilities supporting message delivery CO
5. a. processes. 5 U 8
b Describe the cloud resource provisioning techniques, challenges and its CO
. types with relevant example. 5 R 8

Justify how the middleware enables the process of integration and


interoperability of applications and services running on heterogeneous CO
6. a. computing and communications devices for IoT. 3 An 16

Explain the framework for Cloud of Things Architecture with a neat CO


7. a. diagram. 5 U 16
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
Discuss on security threats and the mitigation techniques involved at CO
8. a. different layers of IoT. 6 U 10
b Explain the design objectives of trust management system and security CO
. issues in trust of things. 6 U 10
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 examine IoT Architecture and various protocols.
CO2 classify the IoT value chain structure (device, data cloud), application areas and technologies involved.
CO3 design, develop and implement smart systems.
CO4 infer the advantages of Cloud Services.
CO5 learn about optimization of cloud storage.
CO6 apply various kinds of security mechanisms.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 16 - - - - - 16
CO2 - 16 - - - - 16
CO3 - 8 8 16 - - 32
CO4 - - 16 - - - 16
CO5 8 24 - - - - 32
CO6 - 20 - - - - 20
132
Course Code 18CS3023 Duration 3hrs
Course Name COMPUTER VISION Max. Marks 100

Q.
B
No Questions CO Marks
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Discuss the Epipolar geometry in terms of stereo vision and how it CO
1. a. U 10
differs from Homography estimation. 1
b Describe how RANSAC is fit for estimating homography and CO
R 10
. rotational mosaics. 1
(OR)
Identify the purpose of edge detection and discuss the main steps in CO
2. a. U 12
edge detection with the aid of CANNY. 2
b CO
An 8
. Compare the reflection map with surface and body reflection. 2

CO
3. a. U 12
Explain the 8 shape features with Fourier and wavelet descriptors. 3
b Discover the importance of Mean‐Shift Clustering/Segmentation in CO
A 8
. terms of image segmentation. 3
(OR)
Articulate how KLT tracking examine the potential matches between CO
4. a. A 12
the images with its algorithm. 4
b Differentiate Motion vs Stereo with the support of Motion Detection CO
U 8
. Regularization theory. 4

Examine shape matching and object recognition using shape contexts CO


5. R 20
with example. 5
(OR)
Illustrate object recognition using Hough transforms with positive CO
6. A 20
training data and negative training data. 5

CO
7. a. A 10
Explain the geometric camera calibration to correct the lens distortion. 1
b CO
A 10
. Illustrate the Pinhole Perspective in Image Formation Models. 1
(OR)
CO
8. a. A 10
Illustrate Texture Boundary Pattern Analysis with suitable example. 2
b Compare feature tracking, detection, and distortion with suitable CO
An 10
. illustration. 2

PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Illustrate video surveillance systems for traffic monitoring as an CO
9. a. A 15
application of computer vision. 6
b CO
U 5
. Explain object tracking strategies in computer vision. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Define image formation models and light effects in computer vision.
CO2 Identify the feature extraction methodology suitable for computer vision applications
CO3 Apply the segmentation approaches in image analysis.
CO4 Analyze the motion detection and estimation techniques.
CO5 Construct image analysis models for object recognition.
CO6 Explain the computer vision techniques used for real time applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 10 10 20 - - - 40
CO2 - 12 10 18 - - 40
CO3 - 12 8 - - - 20
CO4 - 8 12 - - - 20
CO5 20 - 20 - - - 40
CO6 - 5 15 - - - 20
180
Course Code 18CS3026 Duration 3hrs
Course Name CYBER FORENSICS Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Describe the operation of cyber terrorists with a case study. CO4 Remember 8
b
Record the Modus Operandi of a cyber-terrorist. CO4 Remember 8
.
Recognize the various kind of financial cybercrime with
2. relevant examples of each type. Provide legal laws wherever CO1 Analyze 16
applicable.
Describe the various functions related to computer and internet
3. CO1 Understand 16
security with some suggestions for improving security.
Define the terms used in hacking with categorization of the
4. a. types of hackers. Analyze anyone type of hacker with a real CO2 Remember 8
time case study.
b
List and explain the common crimes related to mobile phones CO2 Remember 8
.
State the importance of Internet security with some example
5. a. CO5 Understand 8
incidents?
Construct the process in handling the issues related to ISP and
b
hosting provider and hearsay evidence while performing CO5 Apply 8
.
computer forensic analysis?
6. a. Explain the myths surrounding outsourcing of security. CO6 Remember 8
Explain the threats and attacks possible in mobile and wireless
b
technologies with case studies of digital evidence taken from CO3 Remember 8
.
mobile devices to comprehend an attacker.
Analyze anyone Forensic tool suite with clear justification of
7. a. CO3 Analyze 8
its selection based on a case study of your choice.
b Explain the various sources of the digital evidence, collection
CO2 Remember 8
. and its preservation techniques.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
Explain the formal written structure of the nondisclosure
8. a. agreement between the parties involved in the security CO6 Understand 10
agreement.
Discuss Service Level Agreements along with the issues and
b
the phases in which a company decides on the Service Level CO6 Remember 10
.
Agreements.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the effect of cybercrime in forensic computing.
CO2 Infer digital forensic evidences and investigate the contents.
CO3 Choose and apply current computer forensics tools.
CO4 Analyze the nature of cyber terrorism and its effects.
CO5 Devise basic computer and network forensic analysis.
CO6 Summarize the technical and legal aspects related to cyber crime.

Assessment Pattern as per Bloom’s Taxonomy


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 16 16 32
CO2 24 24
CO3 8 8 16
CO4 16 16
CO5 8 8 16
CO6 18 10 28
132
Course Code 18CS3033 Duration 3hrs
Course Name DATA VISUALIZATION Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
CO
1. a. Illustrate the information overloads in data visualization with examples. A 8
5
Design a visualization to represent the relationship between these
variables.
Country Population GDP Life Expectancy
USA 328200000 21427700 78.93
China 1393000000 14342916 76.92
Japan 126500000 5081789 84.63
b CO
Germany 83020000 3996759 81.41 C 8
. 5
UK 67886011 2827600 80.96
India 1380004385 2875143 69.66
France 66990000 2827642 82.67
Italy 60240000 1948911 83.22
Brazil 213200000 2055056 75.88
Canada 38005238 1730901 81.95

Explain the visualization reference model given by Bergeron-Grinstein CO


2. a. U 8
and Roth. 1
b CO
U 8
. Describe visual analytics in data visualization. 1

CO
3. a. An 8
Analyze the systems based on data type in visualization systems. 3
Show up on how the visualization techniques and tools for 2D and 3D
data differ, and sketch the advantages and disadvantages of each
b CO
approach in terms of understanding and interpreting the data. A 8
. 3
Additionally, how can the choice of visualization method impact the
accuracy and efficiency of data analysis?

4. a. Construct a Treemap from the given lines of code: CO A 8


{ 2
"name": "Animals",
"children": [
{
"name": "Mammals",
"children": [
{"name": "Dogs", "value": 5},
{"name": "Cats", "value": 4},
{"name": "Horses", "value": 2}
]
},
{
"name": "Birds",
"children": [
{"name": "Parrots", "value": 3},
{"name": "Penguins", "value": 2},
{"name": "Canaries", "value": 1}
]
},
{
"name": "Reptiles",
"children": [
{"name": "Snakes", "value": 3},
{"name": "Lizards", "value": 2},
{"name": "Turtles", "value": 1}
]
}
]
}
b CO
U 8
. Discuss the various steps to display graphs/networks. 2

CO
5. A 16
Illustrate the visualization of point data and line data. 4

CO
6. a. U 8
Describe the recent trends in visual perception techniques. 6
b CO
U 8
. Explain the region-based techniques in data visualization. 6

7. a. The dataset contains information about the number of COVID-19 cases CO C 8


in different states of a country and the number of people who have been 4
vaccinated against the disease.
State Total Cases Vaccinated
A 1000 500
B 750 450
C 600 400
D 900 300
E 1200 550
F 400 200
G 300 150
H 800 400
I 1500 700
J 200 100
Using this dataset, design a sample collaborative visualization that
should allow multiple users to view and interact with the data
simultaneously.
b CO
A 8
. Sketch the structures for evaluating visualizations. 4

PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
A health insurance institution is collecting vast amounts of data related
to physician consultations of patients, prescriptions, medications,
medical tests, examinations, and lab results, including additional
parameters (e.g., hospital, physician, cost, date and time, or duration).
The insurance institution wants to query, explore, and analyze these
data visually according to different tasks and groups of insured persons.
The duty is to support this institution using visualization techniques for
time-oriented data.
(a) Interpret and specify the following:
Users:
Who are the users of the visualization?
What are the specifics of the target group?
(not merely ”employee”, but a more specific description, such CO
8. A 20
as 5
analyst or manager in a specific department, including details of
the characteristics of the respective user group)
Data:
What kind of data is to be visualized?
Which variables/parameters?
What data types?
Which structure?
Tasks:
What do the users want to do with the data and which insights
do they want to gain?
(b) Sketch a proposed solution in terms of visual representation,
interaction and data analysis methods.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Familiar with the design process to develop visualization methods and visualization systems, and
methods for their evaluation.
CO2 Preparation and processing of data.
CO3 Have an understanding of large-scale abstract data.
CO4 Understand visual mapping and the visualization.
CO5 Create actual visualization, interaction and distorting techniques.
CO6 Keep track of recent visual perception techniques.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - 16 - - - - 16
CO2 - 8 8 - - - 16
CO3 - 8 - 8 - - 16
CO4 - 24 - - - 8 32
CO5 - 8 20 - - 8 36
CO6 - 16 - - - - 16
132

SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS3040 Duration 3hrs


Course Name DISTRIBUTED SYSTEMS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
Discuss the various architectural and fundamental models of CO
1. a. U 16
communication used in distributed systems. 1

Explain the working procedure of Remote Procedure Call (RPC) with a CO


2. a. U 10
neat diagram. 2
b Explain the various combination of process against threads with a neat CO
U 6
. diagram. 2

Discuss the working concept of Domain Name Services (DNS) for a CO


3. a. U 8
typical organization. 3
b CO
Recall the working process of napster music files downloading systems. R 8
. 3

Explain how the two-phase commit protocol for nested transactions


CO
4. a. ensures that if the top-level transaction commits, all the right U 16
4
descendants are committed or aborted.

Explain the various fault tolerance services available to a series of CO


5. a. U 16
distributed shared memory distributed systems. 5

Explain why making some replica managers read-only may improve the CO
6. a. U 16
performance of a gossip system. 5

Explain why iterative navigation is necessary in a name service in


CO
7. a. which different name spaces are partially integrated, such as the file- U 16
2
naming scheme provided by NFS.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
Discuss the relative merits of the rarest-first download policy in
CO
8. a. BitTorrent in comparison to the more traditional sequential download U 20
6
approach.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL


COURSE OUTCOMES
CO1 describe the distributed system models.
distinguish between different inter-process communication mechanisms and their application
CO2
scenarios.
CO3 illustrate a transaction and concurrency control scheme for a real time application.
CO4 compare the various file system architectures used in distributed systems.
construct a real time distributed system with suitable IPC, event coordination, file management,
CO5
name service, transaction and concurrency control mechanisms.
CO6 evaluate an efficient distributed system and its qualities.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 16 16
CO2 32 32
CO3 8 8 16
CO4 16 16
CO5 32 32
CO6 20 20
132
Course Code 18CS3040 Duration 3hrs
Course Name DISTRIBUTED SYSTEMS Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Reproduce examples of Distributed system. CO R 8
1
b Argue the common characteristics of distributed system in detail. CO E 8
. 1

2. Summarize architecture of AFS with examples. CO U 16


2

3. Compare and contrast routing overlays with example in detail. CO U 16


3

4. Adapt the central server algorithm for mutual exclusion to handle the CO A 16
crash failure of any client (in any state), assuming that the server is 4
correct and given a reliable failure detector. Comment on whether the
resultant system is fault-tolerant. What would happen if a client that
possesses the token is wrongly suspected to have failed?

5. A router separating process p from two others, q and r, fails CO C 16


immediately after p initiates the multicasting of message m. If the 5
group communication system is view synchronous, explain what
happens to p next.

6. Outline methods by which a client module could emulate the UNIX CO E 16


file system interface using our model file service. 4

7. Three computers together provide a replicated service. The CO E 16


manufacturers claim that each computer has a mean time between 5
failures of five days; a failure typically takes four hours to fix. What
is the availability of the replicated service?
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. How does the Tiger system cope with a large number of clients all CO An 20
requesting the same movie at random times? The Tiger schedule is 6
potentially a large data structure that changes frequently, but each cub
needs an up-to-date representation of the portions it is currently
handling. Suggest a mechanism for the distribution of the schedule to
the cubs.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the distributed system models.
CO2 Distinguish inter-process communication mechanisms and their application scenarios.
CO3 Ilustrate a transaction and concurrency control scheme for a real time application.
CO4 Compare the various file system architectures used in distributed systems
CO5 Construct a real time distributed system with suitable IPC, event coordination, file management,
name service, transaction and concurrency control mechanisms.
CO6 Evaluate an efficient distributed system and its qualities.

Assessment Pattern as per Bloom’s Taxonomy


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 8 8 16
CO2 16 16
CO3 16 16
CO4 16 16 32
CO5 16 16 32
CO6 20 20
132
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS3042 Duration 3hrs


Course Name ETHICAL HACKING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
Examine the differences between the white hat, black hat, and gray hat CO
1. a. hackers. 1 A 8
b CO
. Order the phases of ethical hacking with the flow diagram. 1 A 8

Explain the social engineering-based phishing, smishing, and vishing CO


2. a. attacks. 2 A 8
b Represent the different forms of physical penetration attacks, and the CO
. solution for reducing the risk of physical penetration attacks. 2 U 8

CO
3. a. Focus on the goals and the steps of vulnerability analysis. 3 An 8
b Construct ethical guidelines and principles when conducting the passive CO
. analysis. 3 A 8

CO
4. a. Discuss the intelligent fuzzing with sulley. 4 U 10
b CO
. Summarize the client-side browser exploits with examples. 4 U 6

Illustrate the malware and initial analysis with eight real-world CO


5. a. examples. 6 A 16

Show the hypothetical case studies based on previous incidents and the CO
6. a. general vulnerabilities that may exist in cloud platforms. 3 U 8
b Identify and mitigate web application vulnerabilities through ethical CO
. hacking. 6 U 8

Explain the impact of the Federal Information Security Management CO


7. a. Act (FISMA) in the field of ethical hacking. 5 A 10
b CO
. Analyze the human vulnerabilities in ethical hacking. 6 An 6
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
CO
8. a. Report the ten best practices to fight against insider threats. 2 A 10
b CO
. Identify the available static analysis features in IDAPro. 3 U 10
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 learn how to apply knowledge of engineering to society evaluations and design.
CO2 understand the impact of security practices in a global and societal context.
CO3 defend a computer against different types of security attacks.
CO4 practice and use safe techniques on the World Wide Web.
CO5 appreciate the Cyber Laws and the impact of hacking.
CO6 exploit the vulnerabilities related to conquer system and networks using state of the art tools and
technologies.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - - 16 - - - 16
CO2 - 8 18 - - - 26
CO3 - 18 8 8 - - 34
CO4 - 16 - - - - 16
CO5 - - 10 - - - 10
CO6 - 8 16 6 - - 30
132
Course Code 18CS3042 Duration 3hrs
Course Name ETHICAL HACKING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Examine the electronic communication privacy act with its various CO1 R 10
features and extensions.
b Discuss about Partial Disclosure of Vulnerability Disclosure. CO1 U 6
.

2. a. Explain the strategies involved Social Engineering Techniques. CO2 U 10


b Discuss about the different types of penetration testing. CO2 U 6
.

3. a. A disgruntled employee in an organization is working in a critical CO3 An 10


operation, and the data about the operation has been leaked on the
internet. Analyze the type of threat actor and categorize the all the types
of threat actors.
b Identify the delivery method to infect a system with the payload CO3 U 6
. “exploit/unix/ftp/vsftpd_234_backdoor” and shutdown the server.

4. Create a payload to exploit a Windows XP system and perform CO4 C 16


privilege escalation to obtain root access.

5. a. Recommend the steps to be taken in IDA Pro for Advanced Reverse CO4 E 10
Engineering.
b Discuss the challenges involved in Static Code Analysis. CO4 U 6
.

6. a. A hacker group used Advanced Persistent Threats to target the CO5 A 10


Administrative Officers in an Institution, due to that the hacktivists
gained access to the Institution to spread ransomware. During analysis
it has been observed that one of the officials cooperated with the
hacktivists group and also it has been discovered that the institution has
not implemented any logging system. Apply the suitable Indian Acts
for this given case.
b Explain the hacking terminologies used in Ethical Hacking. CO5 R 6
.

7. a. Explain about the different techniques used in Access Control in IT CO3 U 10


Infrastructure.
b Explain about Physical Penetration Testing and discuss about the CO3 U 6
. deterrence techniques.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Discuss the methods to capture malware for analysis and brief about the CO6 U 10
network scenario used to capture malware.
b Explain the different tools used in malware analysis and brief the CO6 U 10
. limitation in analysis.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Learn how to apply knowledge of engineering to society evaluations and design.
CO2 Understand the impact of security practices in a global and societal context.
CO3 Defend a computer against different types of security attacks.
CO4 Practice and use safe techniques on the World Wide Web.
CO5 Appreciate the Cyber Laws and impact of hacking.
CO6 Exploit the vulnerabilities related to conquer system and networks using state of the art tools and
technologies.

Assessment Pattern as per Bloom’s Taxonomy


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 10 6 - - - - 16
CO2 - 16 - - - - 16
CO3 - 22 - 10 - - 32
CO4 - 6 - - 10 16 32
CO5 6 - 10 - - - 16
CO6 - 20 - - - - 20
132
Course Code 18CS3042 Duration 3hrs
Course Name ETHICAL HACKING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. Illustrate the ethical penetration testing process and show how it differs CO A 16
from the unethical hacker activities. 1

2. a. Sketch and explain the insider threat kill chain process. CO A 8


2
b Express the open-source penetration testing framework through CO U 8
. Metasploit. 2

3. a. List the potential ethical concerns and considerations associated with CO R 10


advanced reverse engineering techniques in ethical hacking, and 3
explain how ethical decision-making can impact the effectiveness of the
reverse engineering process.
b Visualize the flow of the penetration test process and explain all the CO R 6
. phases briefly. 3

4. a. Discuss the windows access control model for local elevation privilege CO U 8
with five real-world examples. 4
b Produce the step-by-step process of going from a vulnerability to an CO A 8
. exploit in the context of computer security. 4

5. a. Explain the impact of the Cyber Security Enhancement Act and the CO A 10
SPY ACT on ethical hacking. 5
b Report the impact of the Federal Managers Financial Integrity Act on CO A 6
. ethical hacking. 5

6. a. Show the hypothetical case studies based on previous incidents and the CO U 8
general vulnerabilities that may exist in mobile platforms. 6
b Identify the data breaches and remediation techniques in ethical CO U 8
. hacking. 6

7. a. Analyze the goals that the attackers try to achieve and the needed skill CO An 8
set for an ethical hacker. 1
b Determine the steps to get started using the backTrack linux distribution CO A 8
. 6
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Construct certain rules to ensure that all ethical and moral obligations CO A 10
are met. 1
b Examine the differences between passive and static analysis in ethical CO A 10
. hacking. 3
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Learn how to apply knowledge of engineering to society evaluations and design.
CO2 Understand the impact of security practices in a global and societal context.
CO3 Defend a computer against different types of security attacks.
CO4 Practice and use safe techniques on the World Wide Web.
CO5 Appreciate the Cyber Laws and the impact of hacking.
CO6 Exploit the vulnerabilities related to conquer system and networks using state of the art tools and
technologies.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - - 26 8 - - 34
CO2 - 8 8 - - - 16
CO3 16 - 10 - - - 26
CO4 - 8 8 - - - 16
CO5 - - 16 - - - 16
CO6 - 16 8 - - - 24
132
Course Code 18CS3052 Duration 3hrs
Course Name INTERNET OF THINGS Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Identify the required design principles for connected devices and CO
1. U 20
discuss the applications with proper block diagram. 1
(OR)
a CO
2. U 10
. Compare and contrast any two application layer protocols. 1
b CO
R 10
. List out the required protocols in application layer. 1

List out the recommendations for sketching process in a IoT CO


3. R 20
application design with the proper example. 2
(OR)
A system designer is designing a smart IoT application for a
health care monitoring system, the designer need not give CO
4. A 20
attention to prototyping. Analysis the above statement and defend 2
your recommendation.

Analysis the need for Arduino in a smart agriculture application CO


5. An 20
with the required functional block diagram. 3
(OR)
Assess any two designs for IoT device iteration with your CO
6. An 20
recommendations. 3

Reflect the requirement of Rasberry Pi in a IoT application design CO


7. R 20
with the proper block diagram. 4
(OR)
List out the various API’s required for an real-time IoT application. CO
8. U 20
Also compare any two API’s with required examples. 5
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Discuss major advancements that are being expected from the
CO
9. revolutionary and raging IoT concept for smart city. Also list out your A 20
6
recommendations on these advancements.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe the working principles of internet of things.
CO2 Convert the principles into to a working prototype.
CO3 Interpret the prototype into real life working models.
CO4 Illustrate IOT business models.
CO5 Design IOT based smart applications.
CO6 Relate IOT applications to solve problems of humanity.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 10 30 40
CO2 20 20 40
CO3 40 40
CO4 20 20
CO5 20 20
CO6 20 20
180
Course Code 18CS3053 Duration 3hrs
Course Name INTERNET OF THINGS SECURITY Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
CO
1. a. Give examples of XaaS and explain it in detail. 1 U 8
b CO
. Quote and explain a real-time implementation of M2M and IoT. 1 U 8

CO
2. a. Explain the main design principles and capabilities need in IoT. 1 An 8
b CO
. Describe in detail about the security requirements in IoT. 2 R 8

CO
3. a. Sketch the security architecture in Internet of Things and explain it. 2 A 8
b Discuss the ways to prevail authentication and authorization in IoT CO
. devices. 2 U 8

CO
4. a. Explain the types of attacks with examples. 3 U 8
b Quote the real time examples of authentication and authorization and CO
. explain it. 3 R 8

CO
5. a. Sketch the attack and fault trees using logic AND and OR gates. 3 A 8
b CO
. Explain the cryptographic primitives and its role in IoT. 4 U 8

Express the ways in which encryption keys are comprised of random CO


6. a. number and its classification in terms of applications. 4 U 8
b CO
. Illustrate the IoT node authentication. 4 A 8

Sketch the identity life cycle and explain the ideal tool to manage your CO
7. a. IoT device identities. 5 A 8
b Explain how authorization is implemented with Publish / Subscribe CO
. schemes. 5 U 8
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
CO
8. a. Summarize the offerings related to IoT from cloud service providers. 5 U 10
b Develop an IoT application with the security controls available in cloud CO
. IoT. 5 C 10
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Demonstrate knowledge and understanding of the security and ethical issues of the internet of
things.
CO2 Conceptually identify vulnerabilities, including recent attacks, involving the internet of things.
CO3 Describe countermeasures for internet of things devices and security threats.
CO4 Analyze the societal impact of IOT security events.
CO5 Develop critical thinking skills.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 16 8 24
CO2 8 8 8 24
CO3 8 8 8 24
CO4 16 8 24
CO5 18 8 10 36
132
Course Code 18CS3055 Duration 3hrs
Course Name IOT AND SMART CITIES Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Sketch the context aware framework for smart city applications. CO1 A 10
b. Recall all the city specific challenges encountered in large and mega CO1 R 6
cities.

2. Explain about the Mobile Business Intelligence(BI) and its numerous CO2 U 16
benefits.

3. Discuss on the smart homes middleware platforms and the dominant CO3 U 16
architectural styles for home integration.

4. Discuss on the IP-based convergence of smart building systems. CO4 U 16

5. a. Report all the possible security threats to different IT-based CO5 U 8


infrastructure components of an intelligent city.
b. Enumarate few security measures for IoT platforms/Devices CO5 R 8

6. a. Discuss the five network architecture available for smart city domain. CO6 U 10
b. Enumerate on the prominant technologies for IoT realization CO6 R 6

7. Illustrate and explain the system overview of the Geelytics for edge CO4 A 16
Analytics platform.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Identify the Popular IOT/M2M applications. CO6 R 12
b. Discuss some advancements that are being expected from the CO6 U 8
revolutionary and raging IoT concept for smart city.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the necessity for smart cities.
CO2 Describe the factors influencing the smart cities.
CO3 Apply the IoT technologies in healthcare and security areas.
CO4 Analyze data in smart buildings, including data stemming from sensors and IoT devices.
CO5 Evaluate the devices and technologies deeded for smart cities.
CO6 Design and plan the architecture for smart cities.

Assessment Pattern as per Bloom’s Taxonomy


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 6 - 10 - - - 16
CO2 - 16 - - - - 16
CO3 - 16 - - - - 16
CO4 - 16 16 - - - 32
CO5 8 8 - - - - 16
CO6 18 18 - - - - 36
132
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 18CS3055 Duration 3hrs


Course Name IOT AND SMART CITIES Max. Marks 100

Q. CO
Questions BL Marks
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Recall the need for Intelligent cities in today’s world. CO1 R 8
b. Enumerate on the smart city transformation strategies. CO1 R 8

2. a. Explain about the Mobile Business Intelligence (BI). CO2 U 16

3. a. Discuss on the mobile Application development platforms and the CO3 U 16


solutions offered by Mobile Network Devices.

4. a. Illustrate and explain the IOT Reference architecture along with the CO4 U 16
prominent IoT technologies.

5. a. Report all the possible security threats to different IT-based CO5 U 8


Infrastructure components of an intelligent city.
b. Enumarate few security measures for IoT platforms/Devices. CO5 R 8

6. a. Discuss on the smart homes and smart building elements along with the CO6 U 16
role of cloud environment.

7. a. Ennumerate on the emerging challenges towards Edge based solutions CO4 R 16


and discuss on the IoT Analytics.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a. Identify the best practices to be adopted for a secure Intelligent city. CO6 R 12
b. Discuss on the healthcare and Security Cloud Services in the Healthcare CO6 U 8
Sector.

COURSE OUTCOMES
CO1 identify the necessity for smart cities
CO2 describe the factors influencing the smart cities
CO3 apply the IoT technologies in healthcare and security areas
CO4 analyze data in smart buildings, including data stemming from sensors and IoT devices
CO5 evaluate the devices and technologies deeded for smart cities
CO6 design and plan the architecture for smart cities

Assessment Pattern as per Bloom’s Taxonomy


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 16 - - - - - 16
CO2 - 16 - - - - 16
CO3 - 16 - - - - 16
CO4 16 16 - - - - 32
CO5 8 8 - - - - 16
CO6 12 24 - - - - 36
132
Course Code 18CS3059 Duration 3hrs
Course Name MACHINE LEARNING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Enumerate the types of machine learning and discuss the components in CO
1. a. R 10
the design of a learning system. 1
b CO
An 10
. Analyze the useful perspectives in machine learning. 3
(OR)
CO
2. a. U 10
Describe the version spaces and the candidate elimination algorithm. 2
Explain the candidate elimination algorithm. Apply the algorithm to
obtain the final version space for the training example
Sl.N Sky Air Humidity Wind Water Forecast Enjoy
o temp sport
1 Sunny War Normal Stron Warm Same Yes
b m g CO
A 10
. 2 Sunny War High Stron Warm same Yes 4
m g
3 Rainy Cold High Stron Warm change No
g
4 Sunny War High Stron Cold change Yes
m g

Consider a dataset with the following features: age (continuous),


income (continuous), education level (categorical), and employment
status (categorical). The target variable is whether a person will
purchase a specific product or not (binary classification). Build a
decision tree model based on the provided dataset.
Employment
Age Income Education Level Status Purchase CO
3. a. A 10
25 40,000 High School Employed No 6
45 70,000 College Unemployed No
30 60,000 College Employed Yes
35 80,000 High School Employed Yes
40 50,000 Graduate Employed Yes
55 120,000 High School Employed No
60 90,000 Graduate Unemployed Yes
50 75,000 College Employed Yes
b Discuss the impact of the choice of the value of k on the performance of CO
U 10
. the k-nearest neighbors algorithm. 3
(OR)
CO
4. a. An 10
Analyze the multi-layer perceptron model with a neat diagram. 3
b Explain the concept of generalized linear models (GLMs) and their CO
R 10
. advantages over traditional linear regression models. 2

Elucidate the Radial basis Functions and explain the two stages process CO
5. a. U 10
of the RDF networks. 1
b Describe the working behaviour of support vector machine with CO
U 10
. diagrams. 2
(OR)
Explain the concept of ensemble learning and discuss two popular CO
6. a. R 10
ensemble learning methods. 3
b Identify the concept of feature importance in Random Forest? How is it CO
U 10
. calculated, and why is it useful? 1

Summarize K-means algorithm and group the points (1, 0, 1), (1, 1, 0), CO
7. a. A 10
(0, 0, 1) and (1, 1, 1) using K-means algorithm. 5
b Explain the working principle of a Self-Organizing Feature Map CO
U 10
. (SOFM) and discuss its applications. 2
(OR)
List the challenges associated with clustering high-dimensional data. CO
8. a. U 10
Discuss strategies and techniques to address these challenges. 5
b Compare and contrast hierarchical clustering and density-based CO
U 10
. clustering methods. 3
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Recite the goal of dimensionality reduction in machine learning and CO
9. a. U 10
data analysis. Discuss its importance in real-world applications. 1
b Determine the elements of reinforcement learning with a suitable CO
A 10
. example. 2
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe some concepts and methods central to machine learning such as classification, regression,
clustering, bias/variance.
CO2 Explain mathematically various machine learning approaches and paradigms.
CO3 Compare the strengths and limitations of selected machine learning algorithms and where they can
be applied in different applications.
CO4 Design and implement suitable machine learning algorithm to a given task
CO5 Apply some state-of-the-art development frameworks and software libraries in machine learning task
realization.
CO6 Evaluate the performance of machine learning algorithms using suitable metrics

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 10 30 - - - - 40
CO2 10 30 10 - - - 50
CO3 10 20 20 - - 50
CO4 - - 10 - - - 10
CO5 - 10 10 - - - 20
CO6 - - 10 - - - 10
180

Course Code 18CS3082 Duration 3hrs


Course Name SENSOR NETWORKS AND INTERNET OF THINGS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
CO
1. a. Discuss in detail the various IoT enabling technologies. U 8
1
b CO
Evaluate and compare the IoT levels and their deployment templates. E 8
. 1

CO
2. a. Design an IoT application for a forest fire detection system. C 6
1
b CO
Sketch the architecture of REST-based communication APIs. A 6
. 2
CO
c. Discuss the role of controller service in an IoT system. U 4
2

CO
3. a. Differentiate machines in M2M and ‘things’ in IoT. An 4
2
b CO
Describe how NFV can be used for virtualizing IoT devices. U 6
. 2
CO
c. State the limitations that make SNMP unsuitable for IoT systems. R 6
3

CO
4. a. Evaluate the pros and cons of using Raspberry Pi as an IoT device. E 6
3
b CO
Critique on the need for optimization in IoT. E 6
. 4
CO
c. Identify the role of the NETCONF server. U 4
3

CO
5. a. Weigh the benefits of using SCADA in IoT applications. E 8
5
b CO
Illustrate Message Queuing Telemetry Transport (MQTT) protocol. An 8
. 3
CO
6. a. Explain Hadoop MapReduce for batch data analysis. An 8
4
b CO
Critique the use of Apache Spark in IoT applications. E 8
. 4

CO
7. a. Evaluate the use of formal risk analysis structures OCTAVE and FAIR. E 8
5
b CO
Sketch and explain the Map-reduce Job execution workflow. A 8
. 5
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
CO
8. a. Construct the architecture of a Django application. C 5
6
CO
c. Discuss various key concepts of puppet and chef frameworks. U 10
4
d CO
Write notes on Amazon web services for IoT with practical use cases. A 5
. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the important aspects of IoT and its benefits.
CO2 Illustrate the working principles of IoT sensors and devices.
CO3 Demonstrate the working of various tools available for IoT.
CO4 Compare and contrast different technologies of IoT.
CO5 Evaluate the performance of IoT technologies.
CO6 Develop new IoT-based projects.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - 8 - - 8 6 22
CO2 - 10 6 4 - - 20
CO3 6 4 - 8 6 - 24
CO4 - 10 - 8 14 - 32
CO5 - - 8 - 16 - 24
CO6 - - 5 - 5 - 10
132
Course Code 18CS3082 (PHD) Duration 3hrs
Course Name SENSOR NETWORKS AND INTERNET OF THINGS Max. Marks 100

Q.
B
No Questions CO Marks
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Write the various IoT levels and explain in detail about the IoT levels
1. a. CO1 C 15
and deployment templates.
b
CO2 R 5
. List the difference between SDN and NFV of IoT.
(OR)
Categorize the different types of data analysis and write down the
2. a. CO3 An 15
challenges in IoT Data Analytics.
b
CO2 A 5
. Define M2M and compare M2M with IoT.

3. Discuss in detail on Domain Specific IoT. CO1 U 20


(OR)
4. a. Explain Hadoop Scheduler and FIFO Scheduler. CO4 U 10
b
CO2 U 10
. Describe the architecture of Raspberry Pi with neat sketch.

Express the various communication models that can be used for the
5. a. weather monitoring system. Justify the more appropriate model for CO1 C 15
this system.
b
CO1 R 5
. List the characteristics and limitations of IoT.
(OR)
Summarize the different IoT security challenges in various layers of
6. CO5 E 20
IoT application.

7. a. Compare and contrast CoAP and MQTT protocols. CO4 An 8


b
CO5 U 12
. Discuss the various modes of attacks in IoT environment.
(OR)
Justify the need of analysis in IoT environment with a smart
8. a. CO5 C 15
agriculture case study.
b Define big data and explain the “three Vs” used by industry to CO4 R 5
. categorize big data.

PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Describe the puppet framework with a suitable example and discuss
9. CO6 U 20
the various key concepts of the chef framework.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the important aspects of IoT and its benefits.
CO2 Illustrate the working principles of a IoT sensors and devices.
CO3 Demonstrate the working of various tools available for IoT.
CO4 Compare and contrast different technologies of IoT.
CO5 Evaluate the performance of IoT technologies.
CO6 Develop new IoT based projects.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 5 20 - - - 30 55
CO2 5 10 5 - - - 20
CO3 - - - 15 - - 15
CO4 5 10 - 8 - - 23
CO5 - 12 - - 20 15 47
CO6 - - - - - 20 20
180
Course Code 18CS3093 Duration 3hrs
Course Name WEB SEARCH AND INFORMATION RETRIEVAL Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Solve the problem of retrieving documents for the user who is aware of CO A 8
multiple variants of spelling a term and seeks documents containing any 2
variants. (E.g., Color vs Colour).
b Discuss the steps involved in determining the vocabulary of terms for a CO U 8
. user query. 1

2. a. Illustrate the qualitative evaluation of the IR system in terms of system CO A 8


quality and user utility. 3
b Explain evaluation of ranked retrieved results with suitable examples. CO U 8
. 3

3. Given the query and document representations, a system has an CO A 16


uncertain guess of whether a document has content relevant to the 2
information need. Apply probability theory for such reasoning under
uncertainty and to estimate how likely it is that a document is relevant
to an information need.

4. Describe the process and the various types of selecting a subset of terms CO U 16
in the training set for text classification. 4

5. Describe the solution to matrix problem using singular-value CO U 16


decompositions and latent semantic indexing. 3

6. a. Discuss the goal of attaining high intra-cluster similarity and low inter CO U 8
cluster similarity using the evaluation criteria with suitable example. 4
b Explain Expectation Maximation algorithm with suitable algorithm and CO R 8
. examples. 4

7. a. Explain the essential characteristics of web search and the Bowtie CO U 8


structure with neat diagram. 5
b Discuss the methods used by search engines to avoid indexing multiple CO U 8
. copies of the same content to manage storage and processing 5
overheads.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. Online communities are virtual groups of users that share common CO A 20
interests and interact socially in an online environment. Illustrate the 6
various ways how users search within such environments with suitable
algorithm and example.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Interpret the basics of information models.
CO2 Illustrate the different techniques like tokenizing and indexing used in information retrieval
systems.
CO3 Evaluate the concept of query operations and languages.
CO4 Simulate the various text classification and clustering techniques.
CO5 Experiment the various concepts of web search.
CO6 Appraise the different tools of search engines.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 8
CO2 24 24
CO3 24 8 32
CO4 8 24 32
CO5 16 16
CO6 20 20
132
Course Code 18CS3099 Duration 3hrs
Course Name WIRELESS NETWORK SECURITY Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a CO
1. R 10
. Enumerate the six principles of Good security thinking. 1
b CO
U 10
. Classify the types of attackers in the networking environment. 1
(OR)
CO
2. U 20
Discuss how attacks can be counted against security systems. 1

a A user needs to download file from remote server through Internet CO


3. A 10
. browser. Illustrate the sequence of events in accessing the file. 2
b Discuss the management frames used in infrastructure mode for the CO
U 10
. remote access application. 2
(OR)
a CO
4. R 10
. Identify few weakness in WEP protocol. 3
b Recall the three security layers for enforcing security in Wireless CO
R 10
. environment. 3

a CO
5. U 5
. Justify the need for access control in wireless environment. 3
b CO
R 15
. Discuss any one protocol used for access control mechanism. 3
(OR)
Suppose you set up a Web company selling flags. You get a Web
domain name such as www.myflagsarebest.com. You want this CO
6. A 20
address to be certified to you so that people can make a secure 4
purchase. Relate a suitable certification protocol.

a CO
7. R 10
. Discuss various security issues in public hotspots. 6
b CO
U 10
. Identify suitable techniques to protect yourself when using a hotspot. 6
(OR)
Summarize the voice over IP network security vulnerabilities with CO
8. R 20
real time analysis. 5

PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Elaborate various security threats in a Bluetooth environment and CO
9. R 20
suggest suitable security measures to overcome those threats. 5
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Recognize the security challenges in wireless networks.
CO2 Discuss and distinguish the technologies that make up secured wireless network.
CO3 Relate the importance of providing security at user and server level.
CO4 Differentiate the key hierarchies of wireless security.
CO5 Combine Bluetooth and VOIP security.
CO6 Estimate the security of public wireless hotspots.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 10 30 40
CO2 10 10 20
CO3 35 5 40
CO4 20 20
CO5 40 40
CO6 10 10 20
180
Course Code 18CS3102 Duration 3hrs
Course Name PRINCIPLES OF CYBER SECURITY Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Explain every potential web-user side attack that could occur and offer CO
1. a. U 12
effective mitigation methods for those attacks. 1
An organization has decided to implement security on their email
b CO
system. Examine all possible email attacks that may happen in A 8
. 1
network communication.
(OR)
CO
2. a. An 12
Explain about the different types of DDoS attacks and tools used in it. 2
b CO
A 8
. Discuss the functions related to the security enforcement of OS. 2

A company wants to install a low-cost firewall to filter out packets and


CO
3. a. block specific malicious IPs. Suggest suitable firewall system and U 12
3
discuss various types of firewall available in the market.
b CO
An 8
. Differentiate digital and hash signature with suitable example. 4
(OR)
Discuss the principles and functions of intrusion detection and CO
4. A 20
prevention systems. 3

Explain in detail about public key cryptography in terms of network CO


5. A 20
security with example. 4
(OR)
CO
6. a. U 10
Discuss the privacy principles and policies in cyberspace. 5
b CO
U 10
. Describe the privacy impacts of emerging technologies. 5

In industries, it is advised to use authentication to protect the data's


CO
7. a. privacy and confidentiality. Explain the importance of authentication A 12
5
and the different modes of authentication.
b CO
An 8
. Differentiate between threats and vulnerability in network security. 1
(OR)
Examine the security requirements for the database server to be CO
8. a. A 12
maintained in an organization. 3
b CO
An 8
. Illustrate the working principle of RSA algorithm. 4
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Discuss the methods used in Business continuity planning for IT CO
9. a. U 10
infrastructure. 6
Discuss the situation when the cyberattack on critical infrastructure
b CO
deemed a war crime. Analyze few recent attacks that might be An 10
. 6
considered as cyber warfare.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Explain the various attacks in the Cyberspace.
CO2 Classify the various risks which threatens Cyber Security.
CO3 Apply different controls for ensuring security of information.
CO4 Discover ways and means of identifying security breaches.
CO5 Recommend suitable controls and procedures for ensuring security.
CO6 Analyze the risk and design mitigation plans.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 12 8 8 28
CO2 8 12 20
CO3 12 12 20 44
CO4 20 16 36
CO5 20 12 32
CO6 10 10 20
180
Course Code 18CS3106 Duration 3hrs
Course Name DEEP LEARNING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Explain the working principle of Support Vector Machine (SVM).
Demonstrate SVM’s approach in handling non-linear data for CO
U 8
classification task with suitable illustration. 1
b Apply Perceptron learning law and learn the patterns of ‘XOR’ gate and
. show the updated weight values after one iteration/epoch.
CO
Use Net = 1 if Net >= 0.2 A 8
1
= 0 if Net < 0.2
The initial weight vector = [0.1, 0.2], learning rate = 0.3

2. a. Illustrate the approach of updating the weight values in multiple layer CO


A 8
perceptron with suitable example 1
b Define the terms ‘Translation Invariant’ and ‘Spatial hierarchies of CO
. patterns’ in Convnets. U 4
1
c. CO
State the difference between shallow and deep neural network. U 4
1

3. a. Analyze each layer of LENET 5 architecture by providing an image of


CO
size 32x32x1 at the input layer. State the operation performed at each An 10
2
layer of the architecture along with the output generated.
b Differentiate the following layers of CNN architecture:
.  Convolution layer CO
U 6
 Max pooling layers 2
 Flattened layer

4. a. Define generalization. How does a model developer ensure good


CO
generalization capability of the network using regularization U 2
4
techniques?
b Compare atleast five regularization techniques in detail with suitable CO
An 14
. examples. 4

5. a. State the limitations of Recurrent Neural Network with suitable CO


U 4
example. 2
b Analyze the operations of Long Short Term Memory and Gated CO An 12
. Recurrent Units using mathematical representations. 2

6. Review the following concepts in detail:


a) Hyperparameters of autoencoders
b) Latent space representation CO
U 16
c) Variational autoencoders 3
d) Generative Adversarial Networks

7. a. Distinguish the architecture, merits and demerits of any four most CO


An 12
popular transfer learning models with suitable architectural diagrams. 2
b Explain the solution provided by ResNet architecture to solve the CO
U 4
. vanishing gradient problem. 2
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. Discuss the following applications:
e) Computer Vision
f) Face Recognition CO
U 20
g) Natural Language Processing 5
h) Word2Vec to handle large corpus of text
i) Sentimental analysis to identify the emotions
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the basics of deep learning.
CO2 Implement various deep learning models.
CO3 Realign high dimensional data using reduction techniques.
CO4 Analyze optimization and generalization in deep learning.
CO5 Explore the deep learning applications.
CO6 Apply the algorithms to real time problems.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - 16 16 - - - 32
CO2 - 14 - 34 - - 48
CO3 - 16 - - - - 16
CO4 - 2 - 14 - - 16
CO5 - 20 - - - - 20
CO6 - - - - - - -
132
Course Code 18CS3106 Duration 3hrs
Course Name DEEP LEARNING Max. Marks 100

Q.
B
No Questions CO Marks
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Illustrate the various activation functions used in modeling of artificial CO
1. a. U 10
neuron. Also explain their suitability with respect to applications. 1
Describe the working principle of Support Vector Machine and
b CO
demonstrate SVM’s approach in handling non-linear data for U 10
. 1
classification task with suitable illustration.
(OR)
Analyze the probabilistic theory of deep learning and explain the CO
2. An 20
structure of deep forward networks with neat architecture. 2

Differentiate the architectures of AlexNet, VGG, Inception, ResNet


CO
3. models and state the operations performed by each models along with An 20
3
the output generated.
(OR)
Estimate the Non-convex optimization and Stochastic Optimization for CO
4. a. An 10
deep networks. 4
b Compare atleast five regularization techniques in detail with suitable CO
E 10
. examples. 4

Justify the advantage of auto encoder over principal component CO


5. a. E 10
analysis for dimensionality reduction. 5
b Analyze the operations of Long Short Term Memory and Gated CO
An 10
. Recurrent Units with neat architectures. 5
(OR)
Examine the training principle of Convnet and describe the weights
CO
6. initialization, batch normalization and hyperparameter optimization in A 20
3
detail.

Compare and contrast the working principle of single layered CO


7. a. An 10
perceptron with multi layered perceptron model. 1
b CO
U 10
. Explain Neural networks as universal function approximates. 1
(OR)

8. a. State the difference between shallow and deep neural network. CO U 10


2
Differentiate the following layers of CNN architecture:
b  Convolution layer CO
U 10
.  Max pooling layers 2
 Flattened layer
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Discuss the following applications of deep learning:
j) Scene Understanding
k) Face Recognition CO
9. U 20
l) Natural Language Processing 6
m) Word2Vec
n) Sentimental analysis
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the basics of deep learning.
CO2 Implement various deep learning models.
CO3 Realign high dimensional data using reduction techniques.
CO4 Analyze optimization and generalization in deep learning.
CO5 Explore the deep learning applications.
CO6 Apply the algorithms to real time problems.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 - 30 - 10 - - 40
CO2 - 20 - 20 -- - 40
CO3 - - 20 20 - - 40
CO4 - - - 10 10 - 20
CO5 - - - 10 10 - 20
CO6 - 20 - - - - 20
180
Course Code 18CS3107 Duration 3hrs
Course Name IMAGE AND VIDEO PROCESSING Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Illustrate the different methodologies of scalar quantization techniques CO
1. R 12
. with necessary diagrams and mathematical equations. 1
b CO
R 8
. Summarize the Discrete Wavelet Transform. 2
(OR)
a Compare and Contrast Discrete Fourier Transform and Discrete CO
2. U 10
. Cosine Transform. 1
b Interpret the role of image transformation in medical image CO
A 10
. processing applications. 6

a Define the histogram of a digital image. Explain how the histogram is CO


3. U 12
. useful in image enhancement. 4
b CO
R 8
. Explain the role of image smoothing in digital image processing. 2
(OR)
a Outline the image segmentation technique which is carried out based CO
4. R 10
. on similarities in the given image. 2
b Describe the spatial filtering process and mention the advantages of CO
U 10
. various spatial smoothening filters. 2

a CO
5. R 10
. Discuss in detail the general compression model components. 3
b Identify how an image is compressed using JPEG Image compression CO
U 10
. with an image matrix? 3
(OR)
Estimate the codes for the sequence A= [a, b, c, d, e, f, g] with the
a CO
6. probability values [0.25, 0.15, 0.05, 0.1, 0.2, 0.2, 0.05] respectively A 10
. 4
using Huffman coding technique.
Analyze the various necessities for compressing the image. Also,
b CO
point out the various checkpoints to be noted during the compression An 10
. 3
approaches.

7. a Enumerate the different motion estimation techniques. Explain any CO R 10


. one technique in detail. 4
b CO
U 10
. Describe sampling structures for Analog and Digital video. 1
(OR)
Analyze the suitable video enhancement and restoration techniques CO
8. An 20
for Forensics Applications. 5
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Outline the role of motion tracking methodology for smart city
a CO
9. applications. Support your answer with neat diagrams and U 10
. 6
mathematical equations.
b Explain the concept of Waveform–based coding and Block–based CO
U 10
. coding with suitable example. 5
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the basics of image and video processing.
CO2 Implement various image-processing techniques.
CO3 Demonstrate image compression techniques.
CO4 Analyze various coding techniques for 2D estimation.
CO5 Explore the video processing techniques.
CO6 Apply the algorithm to real time problems.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 12 20 32
CO2 26 10 36
CO3 10 10 10 30
CO4 10 12 10 32
CO5 10 20 30
CO6 10 10 20
180
Course Code 19CS1001 Duration 3hrs
Course Name PROGRAMMING IN PYTHON Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Describe how to concatenate two strings in Python. CO1 R 1
State how the output function in Python can be used to display data on
2. CO1 U 1
the screen?
3. Explain the purpose of the pass statement in Python. CO2 A 1
4. Explain how a while loop works in Python, and provide an example. CO2 An 1
Illustrate how to calculate the volume of a cylinder using the Python
5. CO3 An 1
module.
Write a program in Python to calculate the total surface area of a
6. CO3 A 1
cylinder using the user defined function
7. Write a Python program to write data to a file. CO4 A 1
Discuss the importance of closing a file after reading or writing to it in
8. CO4 U 1
Python.
9. Explain how to check if a number is even or odd using Python. CO5 An 1
10. Explain how to create a set in Python. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Explain how to swap two variables in Python. CO1 A 3
Identify the statement to prevent an infinite loop in a while loop in
12. CO2 An 3
Python?
Write a function to calculate the sum of two numbers and demonstrate
13. CO3 A 3
its usage.
14. Explain how to read a file line by line using Python? CO4 An 3
Illustrate a program to print the first and last characters of a given
15. CO5 R 3
string.
Define a Python program that creates a set of strings and uses the
16. difference() method to find the elements in the first set that are not in CO6 U 3
the second set.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the difference between the == and ! = operators in Python, CO1 U 6
and provide an example of how they can be used to compare two
values.
b Describe how to write a Python program that calculates the strain of
CO1 R 6
. mild steel based on the change in length and the original length.

18. a. Explain how to write a Python program that calculates the shear
stress and bending stress of a simply supported beam with a point CO2 An 6
load using a conditional statement.
b Explain how a Python program can be used to forecast the
. population by analyzing the change in population over time using a CO2 A 6
for loop statement.

19. a. Write a function to find the factorial of a number and demonstrate


CO3 A 6
its usage.
b Explain the concept of parameters in Python functions and provide
CO3 An 6
. an example.

20. a. Write a program in Python to read data from a file containing


information about a building project and calculate the cost CO4 A 6
estimation based on the given data.
b Discuss the different modes in which a file can be opened in
CO4 U 6
. Python.

21. a. i) Illustrate how to use the items () method in Python to return a list
of items, where each items contains a key-value pair from a
dictionary. CO5 A 6
ii) Illustrate how to use the keys () method in Python to return a list
of all the keys in a dictionary.
b i) Evaluate the output of the following Python code
. for x in range(2, 10, 4):
print(x)
ii) Evaluate the output of the following Python code
CO5 An 6
for i in range(5):
if i == 3:
break
print(i)

22. a. Explain the program to count the number of occurrences of a


CO6 An 6
specific element in a list?
b i) Explain how to sort a list of numbers in ascending order using
. Python. CO6 A 6
ii) Explain how to slice a tuple in Python.

23. a. Discuss the use of the logical operators in Python (and, or, not), and
provide an example of how they can be used to evaluate complex CO1 R 6
conditions.
b Write a Python program to generate the given pyramid patterns for CO2 A 6
. wall painting.
*
**
***
****
*****

COMPULSORY QUESTION
24. a. Explain how to use for loop to iterate over a dictionary in Python. CO2 An 6
Write a Python program to demonstrate the use of the arithmetic
b
operators to perform addition, subtraction, multiplication, division, CO1 A 6
.
and modulo operations.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Outline the structure and components of a Python program.
CO2 Explain loops and decision statements in Python.
CO3 Illustrate class inheritance in Python for reusability.
CO4 Experiment read and writes files in Python.
CO5 Design, code, and test small Python programs that meet requirements expressed in English.
CO6 Choose lists, tuples, and dictionaries in Python programs.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 13 7 9 29
CO2 13 16 29
CO3 10 7 17
CO4 7 7 3 17
CO5 3 6 7 16
CO6 1 3 6 6 16
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 19CS1001 Duration 3hrs


Course Name PROGRAMMING IN PYTHON Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the function used to convert a string to a float in Python? CO1 A 1
Devise a Python code snippet to demonstrate the use of comments in
2. CO1 An 1
Python.
3. Describe the syntax for if statement in Python. CO2 R 1
4. Discuss the concept of infinite loops in Python and how to avoid them. CO2 U 1
Write the Python module to calculate the curved surface area of a
5. CO3 A 1
cylinder.
6. Discuss how to use the 'return' statement in Python functions. CO3 U 1
7. Explain how to open and read a file using Python. CO4 An 1
8. Illustrate how to write a string to a file in Python. CO4 An 1
9. Illustrate a program to print the last three characters of a given string. CO5 A 1
10. Define a python code that accesses the first element of a tuple. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
State a python program that prompts the user to enter their name using the
11. CO1 U 3
input() function.
Explain the use of continue statement within a while loop to skip to the
12. CO2 An 3
next iteration?
Explain the Python module to calculate the curved surface area of a
13. CO3 A 3
cylinder.
Compare the difference between 'r', 'w' and 'a' modes for opening a file in
14. CO4 An 3
Python.
15. Explain what a dictionary is in Python and how it is used. CO5 A 3
Define a Python program that creates two sets and uses the intersection ()
16. CO6 R 3
method to find the common elements between them.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain how to write a Python program to calculate the Modulus of
17. a. CO1 An 6
Elasticity of mild steel using the stress and strain formula.
Discuss the use of the modulo operator in Python, and provide an
b
example of how it can be used to calculate the remainder of a division CO1 U 6
.
operation.

18. a. i) Devise an if statement in Python to classify a number as even or CO2 A 6


odd.
ii) Evaluate the output of the following Python code
x = 10
if x > 5:
print("x is greater than 5")
Explain how to write a Python program that calculates the Shear force
b
and Bending moment of a simply supported beam with a point load, CO2 An 6
.
using conditional statements.

19. a. Write a Python function to calculate the factorial of a given number. CO3 A 6
b Write a Python function to find the sum of all elements in a given list
CO3 A 6
. and demonstrate its usage with an example.

Illustrate the process of analyzing the data from a file to calculate the
20. a. CO4 An 6
cost estimation of a building.
b
CO4 A 6
. Explain how to append data to a text file in Python.

i) Illustrate how to use the clear () method in Python to remove all the
items from a dictionary.
21. a. CO5 A 6
ii) Illustrate how to use the copy () method in Python to create a new
dictionary that is a copy of one of the original dictionaries.
i) Evaluate the output of the following Python code
for x in range(6):
if x == 3:
continue
b print(x)
CO5 An 6
. ii) Evaluate the output of the following Python code
for x in range(2):
print("x=",x)
else:
print ("Finally finished!")

Explain the python program to


22. a. i) Calculate and add an element at a specified index in a list? CO6 An 6
ii) Devise a program to add elements from one list to another list
b Illustrate how to write a Python program that uses dictionaries to
CO6 A 6
. classify the types of soil based on the size of soil particles.

i) Explain how to use the range () function in a for loop in Python.


23. a. ii) Write a Python program using a while loop to print the numbers 1 CO2 An 6
to 10.
i) Explain how to use a for loop to iterate over a list in Python.
b
ii) Discuss how to use the continue statement in a loop to skip to the CO6 A 6
.
next iteration in Python.
COMPULSORY QUESTION
Discuss the use of the comparison operators in Python (<, >, <=, >=),
24. a. and provide an example of how they can be used to compare two CO1 U 6
values.
b Illustrate how to write a Python program that calculates the required
CO6 An 6
. material quantity for constructing a masonry wall using a list
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Outline the structure and components of a Python program
CO2 Explain loops and decision statements in Python.
CO3 Illustrate class inheritance in Python for reusability
CO4 Experiment read and writes files in Python.
CO5 Design, code, and test small Python programs that meet requirements expressed in English
CO6 Choose lists, tuples, and dictionaries in Python programs.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 15 1 7 23
CO2 1 1 6 15 23
CO3 1 16 17
CO4 6 11 17
CO5 10 6 16
CO6 4 12 12 28
124
Course Code 19CS2002 Duration 3hrs
Course Name INTRODUCTION TO DATA SCIENCE Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
1. Enumerate the fundamental python libraries used in data science. CO1 R 1
2. An example of unstructured data is _______. CO1 U 1
3. Find the mode of the data set A= {7,3,2,3,5,8,3}. CO2 A 1
4. Write about the data distribution, when mean = 50 and median = 48. CO2 A 1
5. Define the tern ‘Kernel trick’. CO3 R 1
6. Linear regression only works with numerical variables, not categorical CO3 U 1
ones. (Say True/False)
7. Identify the good fit model from the below three visualizations. CO4 A 1

8. Select the appropriate algorithm for image classification. CO4 A 1


9. Infer the type of machine learning algorithm used in random forest. CO5 U 1
10. Identify a method used to find the similarity score in recommender CO6 A 1
system.
PART – B (6 X 3 = 18 MARKS)
11. Identify the step which takes the longest time to complete in the data CO1 A 3
science process? Justify your answer.
12. Compare population and sample. CO2 U 3
13. Demonstrate the concept of support vector machine. CO3 U 3
14. Can random forest algorithm be used for both classification and CO4 A 3
regression? Write the assumptions for a better random forest classifier.
15. Enumerate the benefits and limitations of content-based CO5 R 3
recommendation.
16. Construct a box plot for the given data. CO6 A 3
18, 27, 34, 52, 54, 59, 61, 68, 78, 82, 85, 87, 91, 93, 100
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)

17. Differentiate structured and unstructured data with examples. Write CO1 U 12
the five main characteristics of big data and highlight the most
important ‘V’ amongst the 5 V's of big data.

18. a. Discuss about the things to be considered in data cleaning? List the CO2 U 8
methods for filling in missing values.
b Find the mean, median mode and range for the given temperature CO2 A 4
. data in degrees Celsius?
{15, 15, 14, 15, 19, 17, 23}

19. a. Discuss in detail about linear and logistic regression. CO3 U 8


b Interpret the information found in the following visualizations. CO3 An 4
.

20. a. Generate a decision tree that executes Boolean operations, namely CO4 A 6
AND, OR, and XOR.
b With some real-time applications, describe in detail about supervised CO4 U 6
. and unsupervised machine learning.

21. Write the main steps involved in k-means clustering with a neat flow CO5 R 12
diagram. Also discuss the strength, weaknesses and the applications
of this clustering algorithm.

22. a. With a neat flow diagram, explain k-Nearest Neighbor classifier CO3 U 8
algorithm. Also discuss the advantages and disadvantages of the
algorithm.
b Why SVM is an example of large margin classifier? Also specify the CO3 U 4
. reason to use kernel functions in SVM.

23. Summarize the significant advantages of using data analytics CO1 R 12


technology and describe the data science process.

COMPULSORY QUESTION
24. a. Explain in detail about the recommender systems and its CO6 R 6
classification.
b The below table is a utility matrix, representing the ratings, on a 1–5- CO6 A 6
. star scale, of seven items, a through g, by four users A, B, C and
D. Calculate the cosine similarity between the users.

a b c d e f g
A 4 5 1
B 5 5 4
C 2 4 5
D 3 3
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Remember the key concepts of data science, data characteristics, its applications and the toolkit
used by data scientists
CO2 Recall the mathematical concepts for descriptive and statistical analysis of the given dataset
CO3 Discuss on the principle of operation of various data preparation and machine learning techniques.
CO4 Select appropriate mathematical and machine learning techniques for designing simple
applications.
CO5 Apply the relevant techniques for implementing simple applications
CO6 Interpret the results of data preparation and machine learning techniques

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 13 13 3 - - - 29
CO2 - 11 6 - - - 17
CO3 1 24 - 4 - - 29
CO4 - 6 11 - - - 17
CO5 15 1 - - - - 16
CO6 6 - 10 - - - 16
124
Course Code 19CS2012 Duration 3hrs
Max.
Course Name ARTIFICIAL INTELLIGENCE FOR BIOTECHNOLOGY 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name the field that investigates the mechanics of human intelligence. CO1 R 1
Recall the test, if the interrogator cannot distinguish the machine from
2. CO1 R 1
the human, then the machine may be assumed to be intelligent.
3. “Alive means not dead”. Convert this sentence into predicate logic. CO2 A 1
4. Write the equation for Bayes Rule. CO2 U 1
Cross the fittest two individuals using one–point crossover at the
middle point and produce the answer.
5. CO3 An 1
x2 = 8 7 1 2 | 6 6 0 1
x1 = 6 5 4 1 | 3 5 3 2
6. Express the formula used to perform sigmoid function in CNN. CO3 U 1
Select an AI algorithm used to analyze chest radiographs and detect
7. CO6 An 1
abnormal cell growth, such as potential cancers
Represent how does IBM Chef Watson use AI in food industry such as
8. CO5 U 1
Kellogs?
Choose the novel algorithm is used to optimize the prediction of liquid
9. CO4 E 1
equilibria which is employed in the simulation of biofuel process.
10. Select two technologies primarily used for intelligent data fusion. CO6 An 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Appraise the steps involved in Generate and Test algorithm in AI. CO2 E 3
12. Enumerate the features of Genetic Algorithm. CO3 R 3
13. Differentiate Procedural Vs Declarative knowledge. CO2 An 3
14. In 8 puzzle problem, if the following state is the given state, explore the CO1 A 3
goal state from the current state.

3 1 2 1 2
4 5 3 4 5
6 7 8 6 7 8
Initial state Final state

Implement Imperialist competitive algorithm (ICA) for the prediction


15. CO4 E 3
of water quality.
Write the application of machine learning algorithms to solve plant
16. CO6 A 3
disease.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Consider the water jug problem: You are given two jugs, a 4-gallon
one and 3-gallon one. Neither has any measuring marker on it.
There is a pump that can be used to fill the jugs with water. How
can you get exactly 2 gallons of water from the 4-gallon jug?
CO1 An 8
Explicit Assumptions: A jug can be filled from the pump, water can
be poured out of a jug on to the ground, water can be poured from
one jug to another and that there are no other measuring devices
available. Apply suitable production rules to solve this problem.
b. Compare informed and uninformed search techniques with suitable
CO1 An 4
examples.

18. a. Apply local and global heuristic techniques to implement hill


climbing algorithm in the given problem.

CO2 A 4

b. Represent the below sentences as well-formed formulas (wff) in


predicate logic and solve the question “Was Marcus loyal to
Caesar”?
a) Marcus was a man b) Marcus was a Pompeian c) All Pompeians
CO2 An 8
were Romans d) Caesar was a ruler e) All Romans were either
loyal to Caesar or hated him f) Everyone is loyal to someone g)
People only try to assassinate rulers they are not loyal to h)
Marcus tried to assassinate Caesar.

19. a. Using Resolution Prove that “John likes peanut”


Problem Statements:
i) John likes all kinds of food ii) Apples are food
CO2 A 6
iii) Chicken is food iv) Anything anyone eats and not killed
is food v) Bill eats peanuts and still alive
vi) Sue eats everything that Bill eats.
b. Use Best first search algorithm to solve the given problem.

CO3 A 6
20. a. Calculate the size of a feature map when the input image is of 7 * 7
CO3 A 8
and filter is of 2 * 2.
b. Differentiate Artificial Neural Network and convolution Neural
CO3 An 4
Network

21. a. Elaborate the steps required to implement Artificial Neural


CO4 An 6
Network (ANN) with example.
b. Predict the application of SVM compared with BPNN model to
CO4 A 6
analyze the concentrations of toxic metals in environment.

22. a. Of the students in the college, 60% of the students reside in the
hostel and 40% of the students are day scholars. Previous year
results report that 30% of all students who stay in the hostel scored
A Grade and 20% of day scholars scored A grade. At the end of the CO6 E 8
year, one student is chosen at random and found that he/she has an
A grade. Estimate the probability that the student is a hosteller.
Apply Naïve Bayes to solve the problem.
b. Predict Support Vector Machine based algorithms in biofuel
CO4 An 4
forecasting techniques.

23. Interpret the application of Artificial Intelligence in pharmaceutical


CO6 A 12
industry for the development of genomic medicine.
COMPULSORY QUESTION
24. a. Illustrate the steps involved for the application of artificial
CO5 A 6
intelligence in food industries.
b. Explain the prediction techniques of Artificial intelligence in
CO5 An 6
precision farming.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Define AI based problems and select appropriate search method for different search spaces
CO2 Express knowledge representation techniques and problem-solving strategies to common AI
applications
CO3 Develop prediction models and extend for healthcare applications
CO4 Analyze energy and environmental issues and discover AI based solutions
CO5 Inspect the challenges on agriculture and suggest solutions for plant disease identification and
discrimination
CO6 Propose AI based solutions for industrial applications

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 - 3 12 - - 17
CO2 - 1 11 11 3 - 26
CO3 3 1 14 5 - - 23
CO4 - - 6 10 4 - 20
CO5 - 1 6 6 - - 13
CO6 - - 15 2 8 - 25
124
Course Code 19CS2013 Duration 3hrs
Course Name INTERNET OF THINGS FOR FOOD TECHNOLOGY Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)

1. What is IoT? CO1 R 1


2. How IoT is used in food industry? CO1 A 1
3. What are the 3 challenges IoT is currently facing? CO2 U 1
4. Mention any two IoT sensors used in Food Industries. CO2 U 1
5. What is GPIO output level? CO3 R 1
6. What is QoS and DoS? CO3 R 1
7. What is RESTful API in big data analtics? CO4 U 1
8. What are the different type of protocol which supports AWS?. CO4 R 1
9. Give any two applications of Cloud Computing. CO5 R 1
10. Define Perishable Food Products. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. List out the characteristics of IoT. CO1 R 3
12. Differentiate between IOT and M2M. CO1 An 3
13. Mention few sensors used in Food Industries. CO2 R 3
14. Explain the steps involved in interfacing Arduino with computer. CO3 U 3
15. Differentiate Arduino and Raspberry Pi based on CPU speed, RAM, CO4 A 3
Storage and OS.
16. Explain the terms Data Aggregation and its significance. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. How to set up various level of IoT in industries? Explain it with CO1 An 8
the help of flow chart.
b Draw the architecture of Wireless Sensor Network (WSN). CO1 R 4
.
18. a. Draw the four layers of IoT protocols and describe about it. CO2 U 8
bDraw the Functional block diagram of the IoT and brief about its CO2 R 4
.functions.
19. Give the Overview on Internet of Things Governance, Privacy and CO4 R 12
security.
20. a. How to analyze the data collected by sensors in IoT? Also CO3 A 8
mention the types of analysis used in IoT and tools used in the Big
data Analytics.
b Brief about various Communication Protocols used in IoT. CO3 R 4
.
21. Criticize the four different objectives of SMARTIE approach. CO4 A 12
22. What is AWS? And describe about any 4 services provided by CO5 A 12
AWS
23. a. Brief about different types of technology available to secure a CO5 A 8
computer from threat.
b Brief about cloud server used in IoT. CO5 R 4
.
COMPULSORY QUESTION
24. a. Brief about food quality and safety regulations in food industries. CO6 U 6
b Illustrate about the energy efficient raw food processing methods CO6 A 6
. in food industries.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Present a survey on building blocks of IOT.
CO2 Analyze the deployment models of IOT.
CO3 Compare the connectivity technologies and protocols in IOT.
CO4 Select IOT platform for an application.
CO5 Infer security issues in IOT.
CO6 Develop architectural approach for IOT applications

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 8 1 11 20
CO2 7 10 17
CO3 6 3 8 17
CO4 13 1 15 29
CO5 5 3 20 28
CO6 7 6 13
124
Course Code 19CS2015 Duration 3hrs
ARTIFICIAL INTELLIGENCE FOR FOOD
Course Name Max. Marks 100
ENGINEERING

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Identify the study of intelligence that uses the ideas and methods of
1. CO1 U 1
computation.
2. Define tesler’s theorem. CO1 R 1
3. List the four main approaches to artificial intelligence. CO2 R 1
Name the vertex-based technique for finding the shortest path in the
4. CO2 R 1
graph.
5. Infer the method that is used in the breadth-first search. CO3 U 1
6. State the space complexity of the depth-first search. CO3 R 1
7. List the issues that arise in knowledge representation techniques. CO4 R 1
8. Define MIQ (Machine Intelligence Quotient) in artificial intelligence. CO4 R 1
9. List out the factors of sensory evaluation. CO5 R 1
Name some of the methods where artificial intelligence can be applied in
10. CO6 R 1
the applied industry.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Define turing test. CO1 R 3
Recall the two ways in consistency check where a value is added to one
12. CO2 R 3
attribute.
13. Explain the concept of the electronic nose. CO3 U 3
14. Define clean-in-place. CO4 R 3
Discuss the factors that are carried out by human operators or by
15. CO5 U 3
automated instruments in sensory evaluation.
16. Summarize food product development in food processing using AI. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)

17. a. Apply BFS on the given problem to reach the Goal node ‘U’ from the CO1 A 6
initial node ‘A’. Show intermediate steps.
Discuss the problem characteristics of artificial intelligence with its
b. CO1 U 6
examples.

18. a. Summarize the knowledge representation issues. CO2 U 6

b. Discuss the different approaches to knowledge representation. CO2 U 6

19. a. Illustrate a case study on fish classification based on artificial CO3 A 6


intelligence.
Discuss the contribution of ANN in image recognition and
b. CO3 U 6
classification of crops and weeds.

Summarize how the production in food processing can be enhanced


20. a. CO4 U 6
using AI.
Explain the effectiveness of the following facts in the food industry
i) reduced costs
ii) safety
b. CO4 U 6
iii) quality
plays a major role.

Illustrate food weight estimation and the methods used in it for food
21. CO5 U 12
image analysis.

Analyze the features and the combinations for food image analysis for
22. a classification approach based on k-nearest neighbors and CO5 An 12
vocabulary trees.

23. Explain the methods of AI that has a significant potential to transform CO6 U 12
the food industry management by improving efficiency, reduce cost
and to enhance the overall customer experience.

COMPULSORY QUESTION
24. Discuss the methods of AI in food supply chain management. CO6 U 12
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Define AI based problems and select appropriate search method for different search spaces.
CO2 Express knowledge representation techniques and problem solving strategies to common AI
applications.
CO3 Develop prediction models and extend for food processing applications.
CO4 Analyze the food industry operations and develop AI based solutions.
CO5 Inspect the challenges in quality management of food products through AI based image
processing techniques.
CO6 Propose AI based solutions for food industry management.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 4 7 6 - - - 17
CO2 5 12 - - - - 17
CO3 1 10 6 - - - 17
CO4 5 12 - - - - 17
CO5 1 15 - 12 - - 28
CO6 1 27 - - - - 28
124
Course Code 20CS1001 Duration 3hrs
Course Name PROGRAMMING FOR PROBLEM SOLVING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List down the stages available in the software development life cycle. CO1 R 1
2. Name the symbol that specifies the C-preprocessors directive. CO1 R 1
3. scanf() is a predefined function. Which header file in C contains the
CO2 R 1
definitions of scanf()?
4. Solve the following code in C and find its output.
#include<stdio.h>
int main()
{
int i = 10; CO2 An 1
int k = i %-4;
printf("%d\n", k);
return 0;
}
5. Find the output of the following code in C.
#include <stdio.h>
int main()
{
int val=100; int ans; CO2 An 1
ans= val+ ++val;
printf("%d",ans);
return 0;
}
6. Consider the following code and find the output.
#include <stdio.h>
int main ()
{
CO2 An 1
char greeting[6] = {'H', 'e', 'l', 'l', 'o', '\0'};
printf("Greeting message: %s\n", greeting );
return 0;
}
7. Write a sample code in C to declare a pointer variable to an integer. CO5 U 1
8. Identify the keyword that is used to declare a C file pointer. CO5 R 1
9. List the mode which is used to open an existing file for both reading
CO6 R 1
and writing.
10. Find the operator that is used to connect the structure name to its CO6 R 1
member name.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Distinguish the puts() and gets() functions in C programming. CO2 U 3
12. Make use of the following code and rewrite it using a while loop in C
programming.
#include<stdio.h>
int main()
{
int a = 10;
do CO3 An 3
{
printf("%d", a);
a++;
}while(a <= 8);
return 0;
}
13. Construct a C program to implement the following mathematical
CO3 A 3
equation using for loop. 12 +22 +…..+52
14. Formulate a program to find the sum of all elements stored in a 1D
CO4 A 3
array.
15. Demonstrate a program to find the product of two numbers using a
CO3 A 3
function.
16. Write a C program to take p,n,r values from the user and compute the
CO6 A 3
simple interest. Also, store all the details in a file.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Define Tokens in C and describe the different types of tokens
CO1 R 6
available in C language.
b
CO1 U 6
. Write the algorithm to print the size of all primitive data types.

18. a. Discuss the following operators available in C programming


language using sample code.
CO2 A 6
i) Relational operators ii) Logical operators iii) Assignment
operators
b Show the difference between the post-increment and pre-increment
CO2 U 6
. operators with an example.

19. a. Explain the following concepts in C and its syntax.


a) while loop CO3 R 6
b) do…while loop
b Write a C program to find the sum of natural numbers from 1 to N
CO3 A 6
. using for loop.

20. Construct a C program to find out the number “5” from the
CO4 C 12
following array using linear search. Ex: 8, 6, 5, 7, 3, 2.

21. a. Explain the declaration and initialization of one-dimensional and CO5 U 6


two-dimensional array.
b Build a C program to read N integers into an array A and to find the
. (i)sum of odd numbers,(ii) sum of even numbers,(iii) the average of
CO5 C 6
all numbers. Output the results computed with appropriate
headings.

22. a. Describe the concept of “function with arguments and with return
type” and “function with arguments and no return type” with CO4 U 6
examples.
b Define recursion. List the advantages and disadvantages of
CO4 U 6
. recursion.

23. a. Explain how the pointer variable is declared and initialized. CO5 U 6
b Write a C program to swap two numbers using the call by reference
CO5 A 6
. (use pointers).
COMPULSORY QUESTION
24 a. Define structure and write the general syntax for declaring and
CO6 R 6
accessing members in C programming.
b Create a C program to store and print the name, reg_no, address,
CO6 C 6
. and phone_no details of a student using structure.
CO – COURSE OUTCOME BL – BLOOMS’ LEVEL

COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development process.
CO2 Identify the memory management to represent the real time data for computation.
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using divide and conquer
approach.
CO5 Formulate algorithms and programs using arrays, pointers and structures.
CO6 Create a new application software to solve real world problems.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 6 - - - - 14
CO2 1 9 6 3 - - 19
CO3 6 - 12 3 - 21
CO4 - 12 3 - - 12 27
CO5 1 13 6 - - 6 26
CO6 8 - 3 - - 6 17
124
Course Code 20CS1002 Duration 3hrs
Course Name PYTHON PROGRAMMING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Write the output for the following program.
CO1 A 1
print(5*2**4//2)
2. Predict output for the given code.
st="karunya university" CO1 U 1
print("%18.7s"%st)
3. Interpret output for the following code.
x = "Hello"
CO2 U 1
for i in x:
print(i.upper(),end="")
4. Identify the output for the following program.
animals = ["Lion","Tiger","Cheetah"]
for x in animals:
CO2 U 1
if x == "Tiger":
break
print(x)
5. Write the output for the following code.
class test:
def __init__(self, a):
self.a = a
CO3 A 1
def display(self):
print(self.a)
obj = test(25)
obj.display()
6. Name the method used to load the objects in a file using pickle. CO3 R 1
7. Predict the shape for the following turtle program.
import turtle
my_pen = turtle.Turtle()
for i in range(5): CO4 U 1
my_pen.forward(50)
my_pen.right(144)
turtle.done()
8. Recall the correct method used to convert the image from color to
CO4 R 1
grayscale.
9. List the layouts used in Graphical User Interface. CO5 R 1
10. Name the widget used to create a multiline text box. CO5 R 1

PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Write a program to check eligibility to vote in India by getting age as
CO1 A 3
user input.
12. Develop a python program to encrypt the following text with key value
as 5. CO2 A 3
Input Text: cse
13. List the differences between method and constructor. CO3 R 3
14. Write a program to load an image and display its width and height. CO4 A 3
15. Illustrate the differences between terminal-based interface and graphical
CO5 U 3
user interface.
16. List any three methods in threads. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Write a program to perform arithmetic operations. CO1 A 6
b
List out the different data types in python with an example. CO1 R 6
.

18. a. Write a Python program to get a string from the user where all
occurrences of its first char have been changed to ‘*’ except the CO2 A 6
first char itself.
b Develop a Python function that accepts a file and performs the
. following operation:
a. Calculate the number of upper-case letters and lower-case CO2 A 6
letters from the entire content of the file.
b. Copy the contents from one file to another file.

19. a. Create a class ‘complex ‘and create two instance variables ‘real’
and ‘Imaginary’. Overload the operators ‘+’ and ‘-‘to perform CO3 C 6
complex number operation using operator overloading methods.
b Write a python program to generate 10 random numbers from 1 to
CO3 A 6
. 50 and insert it into a list.

20. Identify the suitable code that read an image and carry out the
following tasks on it and save each modified image in a separate
file.
 Rotate the image by 30 degrees in clockwise direction
 Change the image to black and white. CO4 U 12
 Reduce the image to half of its size.
 Resize the image to (800,400).
 Flip the image to Top to Bottom
 Convert the image to grayscale

21. a. Write a python GUI program to implement the Triangle Area CO5 A 6
calculator as given below:
b Create the following GUI based application to calculate the age of a
. person in years, months, days and display the same.

CO5 C 6

22. Discuss the single, hierarchical inheritance and multilevel


CO4 U 12
inheritance with suitable example program.

23. Develop a python program to generate reports of students with the


following specifications:
a. Create a class called Student with attributes regno, name,
CO3 A 12
cgpa and include necessary constructor, and accessors
/mutators methods.
b. Create two Student objects and display their reports.
COMPULSORY QUESTION
24. a. Write a program to illustrate the producer consumer problem. CO6 A 6
b Develop a program to create a TCP/IP client-server chat
CO6 A 6
. application.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Choose the basic programming constructs of Python suitably.
CO2 Infer the concepts of string processing, file I/O, lists and dictionary.
CO3 Apply modules for reusability and the object-oriented principles for modeling and developing
software system.
CO4 Utilize the power of graphics for processing images.
CO5 Construct applications with graphical user interface.
CO6 Develop software solutions using multi-threading, networking and client-server concepts.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 6 1 10 - - - 17
CO2 - 2 15 - - - 17
CO3 4 - 19 - - 6 29
CO4 1 25 3 - - - 29
CO5 2 3 6 - - 6 17
CO6 3 - 12 - - - 15
124
Course Code 20CS1003 Duration 3hrs
FUNDAMENTALS OF PROGRAMMING FOR PROBLEM Max.
Course Name 100
SOLVING Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the use of header file. CO1 R 1
2. Infer the role of preprocessor directive in C programming. CO1 U 1
3. Enumerate any two delimiters used in C language. CO2 R 1
Write the C statement to find whether the person is eligible for vote or
4. CO2 A 1
not using conditional operator.
5. List the types of flow control statements. CO3 R 1
6. Recall the syntax of “do...while” loop. CO3 R 1
7. Enumerate the various sorting algorithms in C programming. CO4 R 1
8. Identify the method used to find the length of a string. CO4 R 1
9. Define recursion. CO5 R 1
10. Recognize the abbreviation for DNA. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Sketch the structure of C program. CO1 A 3
Examine the final value of x in the following C code.
#include <stdio.h>
void main()
12. { CO2 R 3
int x = 6*2/( 2+1 * 2/3 +6) +8 * (8/4);
printf("%d",x);
}
13. Predict the output of the given C program. Justify your answer. CO3 U 3
1. #include <stdio.h>
2. int main()
3. {
4. for( ; ; )
5. {
6. printf( " C programming " );
7. }
8. return 0;
}
Illustrate how the initialization of a 1D-array takes place during its
14. CO4 U 3
runtime by a C program.
15. List the advantages and disadvantages of recursion. CO5 R 3
16. Define RNA Purification. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Identify the method to be adopted to achieve the goal for the given
problem and explain it in detail. A Team lead in an IT company
17. a. CO1 R 8
needs to produce superior software that meets and exceeds all
customer expectations and demands.
b Construct a C program that demonstrates the various format
CO1 A 4
. specifiers used in C language.

Discuss about the following operators in C language with example.


18. a) Logical operators. CO2 U 12
b) Relational operators.

Write a program that uses an "else-if" ladder to find out the grades
of a student. The marks obtained by a student in five different
subjects are given as input through the keyboard.

19. a. CO3 A 6

b Construct a “nested for” loop statement in C to print a


CO3 A 6
. multiplication table for a given number.

Write a C program that adds two matrices using multidimensional


20. CO4 A 12
arrays.

Develop a C program that calculates the factorial of a given number


21. a. CO5 A 6
using a recursive function.
b Write a C program that generates the Fibonacci series for a given
CO5 A 6
. number using a recursive function.

22. a. Describe in detail about computer hardware and software. CO1 R 7


b
Illustrate a C program to find the size of int, float, double and char. CO2 U 5
.

23. a. Describe in detail about switch-case statement with a suitable CO3 R 6


example.
b Prepare a C program for searching an element in an array and
CO4 A 6
. displaying its position.
COMPULSORY QUESTION
Write a C program to find the pH value of a given solution for any
24. a. CO6 A 6
given hydrogen ion concentration [pH=-log[H+]
b Construct a C program to find maximum of three numbers and
CO6 A 6
. draw its flowchart.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development process.
CO2 Identify the data type to represent the real time data representation and operators for computation.
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using divide and conquer
approach.
CO5 Formulate algorithms and programs using arrays, pointers and structures.
CO6 Create a new application software to solve real world problems.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 16 1 7 - - - 24
CO2 4 17 1 - - - 22
CO3 8 3 12 - - - 23
CO4 2 3 18 - - - 23
CO5 4 - 12 - - - 16
CO6 4 - 12 - - - 16
124
Course Code 20CS1004 Duration 3hrs
Max.
Course Name APPLICATIONS OF PYTHON PROGRAMMING 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Guess the output for the following Python code,

K=8.67
CO1 A 1
L= “Karunya”
Print(K+L)

2. Functions are the subset of ______________. CO1 R 1


3. Predict the output for the following Python code,
CO1 A 1
print('{0} and {2}'.format('Aerospace', 'Institute', 'EEE'))
4. The __________ method is used to update the list.
CO2 R 1
5. Find out the output for the following Python code,
T=(1000,2000,3000,40000,500)
if len(T)>4 and T.count(1000) == 2:
print('HI') CO2 A 1
else:
print('WELCOME')

6. Write a python code to read the content from a file a.text which has the
CO2 A 1
path C:\Users\AE\Desktop\a.text.
7. A class definition is a_______________ for each of the __________ in
CO3 A 1
that class.
8. ___________ is a free library for the Python programming language
which supports opening, handling, and saving many different Image file CO4 R 1
formats.
9. _______________is a technique by which the widgets are organized,
CO5 R 1
positioned and aligned properly in tkinter window.
10. ____________attribute is used to align the widget inside the grid cell of
grid layout manager. CO5 R 1

PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Predict the output for the following Python code, CO1 A 3
k = ("hello", "python", 5,6.7)
print (k[2:]);
print (k[0:2]);
print (k);
print (k + k);
print (k * 4);
print (type(k))
k[2] = "hi";

12. CO2 U 3
List and explain the File Modes available in Python.
13. Write an example code for Mutator method and Accessor method in
CO3 R 3
Python.
14. CO4 A 3
Develop a python code to print a letter “T.”
15. CO5 A 3
Make short notes on Model View Controller pattern.
16. List the applications of python thermopy libraries to aerospace
CO6 A 3
engineering.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Enumerate different types of operators in Python and write 4 types
CO1 R 12
of operators with an example of code.

18. a. Describe the following statements using the appropriate example


code.
i) for loop CO1 R 6
ii) while loop
iii) if - else
b
CO2 R 6
. Elucidate the string and its methods with example.

19. a. Write a python code to remove duplicate student information from


CO2 A 7
the dictionary.
b
Write a python code to simulate a grade book for a teacher. CO2 A 5
.

20. List the Inheritance types available in Python and Explain two
CO3 U 12
inheritances with an example of code with a proper explanation.

21. a. Explain the polymorphism and write code in order to overload the
CO3 A 8
operator "+" and the operator "<".
b Write a python program to draw a color filled your mobile shape
CO4 A 4
. using turtle.

22. a. Develop a python code to draw a following star and hide the turtle
CO4 C 6
arrow mark.
b Create a python code that shows the properties of an image and
CO4 C 6
. explains each line.

23. Describe how to create an application program based on a


Graphical User Interface by importing an appropriate module,
I. Creating a Window
CO5 U 12
II. Different types of widgets
III. Label color and font options
IV. Displaying images
COMPULSORY QUESTION
24. Illustrate how are the python libraries SciPy, PyMesh and SfePy
CO6 An 12
supporting any Aerospace application
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Choose The Basic Programming Constructs of Python Suitably.
CO2 Infer The Concepts of String Processing, File I/O, Lists and Dictionary.
CO3 Apply Modules for Reusability and The Object-Oriented Principles for Modeling and Developing
Software System.
CO4 Utilize The Power of Graphics for Processing Images.
CO5 Construct Applications with Graphical User Interface.
CO6 Develop Software Solutions Using Standard Libraries for Mechanical Applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 19 5 24
CO2 7 3 14 24
CO3 3 12 9 24
CO4 1 7 12 20
CO5 2 12 3 17
CO6 3 12 15
124
Course Code 20CS2001 Duration 3hrs
Max.
Course Name AGILE SOFTWARE DEVELOPMENT 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Write the need for frequent inspection in an agile project. CO1 A 1
2. Sketch the PDCA Cycle. CO1 A 1
3. Discuss on high cohesion and low coupling. CO2 U 1
4. Define a System Metaphor. CO2 R 1
5. Recall the importance of user story. CO3 R 1
6. List the use of scrum in different applications. CO3 R 1
7. Define epic user stories. CO4 R 1
8. Define an artifact. CO4 R 1
9. List few steps to increase velocity. CO5 R 1
10. Write the importance of portfolio. CO6 C 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Classify a system metaphor in agile project based on its applications. CO1 An 3
12. Express the objective of Liskov Substitution Principle. CO2 C 3
13. Discuss sprint planning. CO3 U 3
14. Identify the methods to create product roadmap. CO4 R 3
15. Present few ideas on Traditional versus Agile Procurement CO5 A 3
Management.
16. Discuss on automated testing. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
As a software developer or engineer, you may want to use the
design principles in the object-oriented design process to create a
17. a. system of interacting objects and resolve software problems. State CO1 R 8
the overall execution of Single Responsibility Principle for this
purpose.
b Explain traditional and Agile project Management with few real CO1 A 4
. time examples.

Discriminate on the following design principles of Agile


18. a) Interface segregation principle CO2 An 12
b) Dependency Inversion Principle

Explain the 12 key practices of Extreme Programming. Give some


19. examples of letting the team members finding their own answers CO3 A 12
instead of you giving them ready solutions in a project.

Discuss the stages of agile planning and execution with the


20. roadmap to value the face-to-face conversation with team members CO3 U 12
and customers.

Explain different phases in agile cost management in managing


21. a. CO4 U 8
budget with additional resources.
b Illustrate the Quality development techniques in handling agile
CO4 A 4
. projects.

Discuss on the different agile project communication channels and


22. a. CO5 U 8
their roles.
b Describe the terminologies to be known during scaling across agile
CO5 R 4
. teams.

Explain how Successful communication happens among non-


23. a. CO5 U 6
collocated scrum team members
b Write the specific considerations for selecting a services vendor in
CO5 C 6
. understanding cost approaches and contracts for services.
COMPULSORY QUESTION
Identify ADKAR’s different steps to change individuals and
24. CO6 R 12
organizations’ need to achieve for successful change.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the principles and practices of Agile methods in software development.
CO2 Explain the processes and strategies of the various Agile technologies in terms of work products,
roles and practices.
CO3 Choose appropriate managing techniques to solve issues in real time applications.
CO4 Describe the techniques and tools used to improve team collaboration and software quality
CO5 Identify and address the most common problems encountered in the use of Agile methods.
CO6 Apply Agile practices when multiple teams are working on a single project.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 - 6 3 - - 17
CO2 1 1 - 12 - 3 17
CO3 3 15 12 - - - 30
CO4 4 8 4 - - - 16
CO5 5 14 3 - - 6 28
CO6 12 3 - - - 1 16
124

SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 20CS2001 Duration 3hrs


Course Name AGILE SOFTWARE DEVELOPMENT Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Write about Unfettered transparency in an agile project. CO1 C 1
2. List down any 5 benefits of Agile development. CO1 R 1
3. Discuss on Dependency injection. CO2 U 1
4. Define opacity. CO2 R 1
5. Identify some common factors of a Kanban board. CO3 R 1
6. Define product backlog. CO3 R 1
List the set of requirements that belong together and will constitute a
7. CO4 R 1
solid set of functionality in a release to the customer.
8. Write the prerequisites for any requirement process. CO4 A 1
9. Infer few ideas on Agile procurement. CO5 C 1
10. Define proactive quality. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Examine a Traditional Tester compared with Agile Tester. CO1 R 3
12. Examine rigidity and fragility of agile design. CO2 A 3
13. Write the characteristics of Scrum Master. CO3 A 3
14. Write the steps to initialize user stories. CO4 A 3
15. Identify few factors of project length in managing time and cost. CO5 U 3
16. Recall the ideas of creating product vision. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Infer on the following Principles on how the projects are handled CO1 An 12
based on the given models:
a) Liskov Substitution Principle b)Single responsibility
principle.
18. a. Explain the 12 Agile design principles with a real time scenario. CO1 A 6
b Examine few agile approaches over traditional approach in software
CO1 R 6
. development process.

Describe the concept of Scrum with its different process development


19. a. that brings out good project outcome. Do you think scrum can be CO3 R 12
implemented in all software development processes?

Explain the scenario of Release planning and Sprint planning with


20. a. possible solutions. Mention how it works and give the output of CO4 A 12
these planning process.

Write the different stages in understanding scope throughout the


21. a. CO5 A 6
project.
b Explain agile methods in lowering cost by:
CO5 U 6
. i)Reducing time ii)Increasing velosity

Express few important factors on Multiteam Coordination with


22. a. CO5 U 6
LeSS.
b
CO5 U 6
. Discuss about Sprint review Bazaar.

Describe different types of Scrum of Scrums that facilitates


23. a. effective integration, coordination, and collaboration among scrum CO6 R 12
teams.
COMPULSORY QUESTION
Explain different steps implemented in Platinum Edge’s Change
24. a. CO6 U 12
Roadmap.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 describe the principles and practices of Agile methods in software development.
CO2 explain the processes and strategies of the various Agile technologies in terms of work products, roles and
practices.
CO3 choose appropriate managing techniques to solve issues in real time applications.
CO4 describe the techniques and tools used to improve team collaboration and software quality
CO5 identify and address the most common problems encountered in the use of Agile methods.
CO6 apply Agile practices when multiple teams are working on a single project.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 10 6 12 1 29
CO2 1 1 3 5
CO3 14 3 17
CO4 1 16 17
CO5 21 6 1 28
CO6 16 12 28
124
Course Code 20CS2003 Duration 3hrs
Course Name AUGMENTED REALITY AND VIRTUAL REALITY Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List the benefits of augmented reality. CO1 R 1
2. Recall the CAVE concept in virtual reality. CO1 R 1
3. State five key technical requirements for ‘presence’. CO3 A 1
4. Distinguish between position and motion trackers. CO2 E 1
5. State the effects of vergence-accommodation conflict. CO3 R 1
Write the steps to create a simple game that uses ball tracking in
6. CO6 C 1
basketball using Unity 3D tool.
Describe how virtual reality treatment can help people with
7. CO5 R 1
arachnophobia.
8. Visualize tangible user interfaces in augmented reality. CO4 C 1
9. Give examples of using augmented reality for workplace productivity. CO5 U 1
10. Describe Microsoft’s Holoportation technology. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Compare tactile and force feedback in virtual environments. CO2 An 3
12. Analyze the issues of virtual reality on human health and safety. CO3 An 3
13. Summarize motion capture technology for virtual reality systems. CO1 U 3
14. Explain how object interaction works in a 3D world. CO4 U 3
Discuss the concept of foveated rendering for perception-based
15. CO5 U 3
graphics.
16. Assess the significance of augmented identity. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the five classic components of a virtual reality system. CO1 U 6
b Evaluate the impact of augmented and virtual reality technologies
CO1 An 6
. on the future of human experience.
Explain the different types of input devices in virtual reality and
18. a. CO2 An 8
judge the usage of data gloves and gesture interfaces.
b
Classify the types of virtual reality graphics content. CO2 U 4
.

Illustrate human perception models in virtual reality systems with


19. a. CO3 U 8
suitable examples.
b Evaluate the use of depth sensing in camera tracking and 3D
CO4 E 4
. rendering for immersive environments.

Describe the following concepts in virtual reality: physical


20. modeling, collision detection, haptic texturing, and surface CO5 U 12
deformation.

Explain in detail the steps in the typical interaction design process


21. CO3 A 12
for virtual reality with suitable use cases and examples.

Write short notes on the following: image plane and voodoo doll
22. a. CO3 C 8
interaction, go-go and occlusion method, and HOMER technique.
b
Illustrate Milgram’s mixed reality continuum. CO4 A 4
.

Critique the effectiveness of productivity enhancement platforms in


23. a. CO3 E 6
virtual reality for different types of users.
b Discuss visual perception in virtual reality and its application in the
CO6 U 6
. sports and entertainment industry.
COMPULSORY QUESTION
Propose an intuitive block diagram architecture model for virtual
24. a. CO6 C 6
reality-based therapy for post-stroke rehabilitation.
b Explain the different types of applications of virtual reality in
CO6 A 6
. robotics used in industry.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the augmented reality and virtual reality technologies.
CO2 Demonstrate motion trackers, navigators in augmented and virtual reality environments.
CO3 Estimate the effect of virtual reality and augmented reality simulation on users.
CO4 Analyze camera tracking and 3D rendering in augmented reality.
CO5 Identify the various modeling techniques in virtual reality.
CO6 Design real-time applications using virtual and augmented reality.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 9 - 6 - 17
CO2 - 4 - 11 1 - 16
CO3 1 8 13 3 6 8 39
CO4 - 3 4 - 4 1 12
CO5 1 16 - - - 17
CO6 - 10 6 - - 7 23
124

SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 20CS2004 Duration 3hrs


Max.
Course Name AUTOMATIC SPEECH RECOGNITION 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recall the term voiced speech. CO1 R 1
2. Define an auditory phonetics. CO1 R 1
3. Express the formula to calculate short time energy. CO2 U 1
4. State musical sound waves. CO2 R 1
5. Enumerate the parameters of gaussian mixture models. CO3 R 1
6. Give examples for conventional acoustic models. CO3 U 1
Name the algorithm which is used for parameter estimation of the
7. CO4 R 1
gaussian mixture models.
8. Identify the types of layers in deep neural network. CO4 R 1
9. Define high level features. CO5 R 1
10. Express the term multitask learning. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Indicate the types of phonetics. CO1 U 3
12. Identify the three basic steps of pattern recognition model. CO2 U 3
13. Summarize the shortcomings of gaussian mixture models. CO3 U 3
14. Infer the role of activation function in deep neural network. CO4 U 3
Explain how the deep neural network automatically learn the feature
15. CO5 U 3
representations.
16. Name the three main applications of multitask and transfer learning. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the basic architecture of automatic speech recognition
17. a. CO1 U 6
system.
b Classify speech sounds with examples. CO1 U 6
.

Explain why linear prediction analysis is important in speech


18. a. CO2 U 6
analysis.
b Illustrate the mel frequency cepstral coefficients (MFCC) in speech
CO2 U 6
. analysis techniques.

19. a. Describe about the applications of markov model. CO3 U 6


b
CO3 A 6
. Construct the hidden markov model for predicting the weather data.

20. a. Describe the architecture of deep neural network. CO4 U 6


b Discuss about the types of activation function in deep neural
CO4 U 6
. network.

Discuss the importance of feature representation learning in deep


21. a. CO5 U 6
neural networks.
b Describe the general framework for feature processing in
CO5 U 6
. hierarchical deep model.

22. a. Identify the key property of a good feature in deep neural network. CO5 U 6
b Explain the important adaptation techniques developed for deep
CO5 U 6
. neural networks.

23. a. Compare voiced and unvoiced speech. CO1 An 6


b Describe how the speech technologies improve the human to
CO1 U 6
. machine communication with suitable examples.
COMPULSORY QUESTION
Explain the architecture of shared hidden layer multilingual deep
24. a. CO6 U 6
neural network.
b Develop the digit recognition model which is robustness to noisy
CO6 A 6
. data by using the multitask learning model.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 understand the fundamentals of speech processing techniques.
CO2 choose the appropriate speech analysis techniques.
CO3 design a suitable acoustic model for a given input speech.
CO4 illustrate the models for recognizing given input speech.
CO5 describe the learning using Deep Neural Networks for a given speech.
CO6 develop an advanced deep model for Automatic Speech Recognition.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 21 - 6 - - 29
CO2 1 16 - - - - 17
CO3 1 10 6 - - - 17
CO4 2 15 - - - - 17
CO5 1 27 - - - - 28
CO6 3 7 6 - - - 16
124

Course Code 20CS2004 Duration 3hrs


Course Name AUTOMATIC SPEECH RECOGNITION Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
CO
1. Compare the voiced and unvoiced speech. 1 U 1
CO
2. Define acoustic phonetics. 1 R 1
CO
3. State Log Spectral distance. 2 R 1
CO
4. List the spectral analysis model. 2 R 1
CO
5. Express the markov assumption. 3 U 1
CO
6. Enumerate the applications of Markov Models. 3 R 1
CO
7. Identify the DNN model parameter. 4 U 1
CO
8. Name the non linear activation function. 4 R 1
CO
9. Explain the necessity of softmax layer in Deep Neural Network. 5 U 1
Predict features extracted through unsupervised learning can perform CO
10. classification tasks equally well as supervised training. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Explain the Analysis and Synthesis filter bank. CO An 3
1
12. List the advantages of Mel frequency cepstral coefficients (MFCC). CO U 3
2
13. Illustrate the Gaussian Mixture Model. CO An 3
3
14. Give examples of activation function. CO U 3
4
15. Distinguish low level and high level features. CO An 3
5
16. Describe the robustness of the noisy digit recognition task by using CO
U 3
multitask learning. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Differentiate Musical and Non- musical sound waves. CO An 8
1
b. Describe the acoustic theory of speech production. CO U 4
1
18. a. Compare the various Spectrum Distortion Measures in Speech CO An 8
Recognition applications. 2
b. Explain the basic steps in pattern recognition model. CO U 4
2
19. a. Identify the characteristics of Hidden Markov Model. CO U 8
3
b. Discuss the Expectation Maximization (EM) algorithm. CO U 4
3
20. a. Analyze the practical issues of Deep Neural Network constructions. CO An 8
4
b. Discuss the architecture of DNN-HMM Hybrid Systems. CO U 4
4
21. a. Construct the feature hierarchy of Deep Neural Network. CO A 8
5
b. Explain the steps involved in feature processing framework. CO U 4
5
22. a. Describe the practical issues in Deep Neural Network. CO U 8
4
b. Explain the working principle of back propagation algorithm. CO U 4
4
23. a. Illustrate the various components of a typical speech to speech CO An 8
translation system. 3
b. Describe the application of ASR in human–machine communication. CO U 4
3
COMPULSORY QUESTION
24. a. Explain the architecture of the shared-hidden-layer multilingual Deep CO U 8
Neural Networks. 6
b. Discuss on Multiobjective Training of Deep Neural Networks for CO U 4
Speech Recognition. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the fundamentals of speech processing techniques.
CO2 Choose the appropriate speech analysis techniques.
CO3 Design a suitable acoustic model for a given input speech.
CO4 Illustrate the models for recognizing given input speech.
CO5 Describe the learning using Deep Neural Networks for a given speech.
CO6 Develop an advanced deep model for Automatic Speech Recognition.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 1 5 11 17
CO2 2 7 8 17
CO3 1 17 11 29
CO4 1 20 8 29
CO5 5 8 3 16
CO6 16 16
124
Course Code 20CS2005 Duration 3hrs
Course Name BIGDATA QUERY LANGUAGE Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. List the various types of analytics in Bigdata platform. CO1 R 1
Identify the mode from the given sample. {154cm, 139cm, 154cm,
2. CO1 R 1
192cm, 180cm, 140cm, 154cm, 155cm, 192cm}
3. Differentiate interactive and batch mode in R programming. CO2 U 1
4. Infer the different types of integration methods used in R Hadoop. CO2 U 1
5. Write the command for local mode grunt shell. CO3 C 1
Recite the different steps used for reading a data from the Hadoop in Pig
6. CO3 R 1
Latin.
7. Deifine RDD in Spark. CO4 R 1
8. Write the spark shell command for to count the items available in RDD. CO4 C 1
9. Identify the four file formats supported by HIVE. CO5 R 1
10. Compare Cassandra and RDBMS. CO5 U 1
PART – B (6 X 3 = 18 MARKS)
11. Write short notes on any two modern bigdata tools. CO1 C 3
Illustrate the integration of R and HADOOP and elaborate RHADOOP in
12. CO2 U 3
detail.
13. Explain the scalar data model of Pig with suitable examples. CO3 U 3
Visualize the Directed Acyclic Graph (DAG) in Spark architecture with
14. CO4 R 3
neat diagram.
15. Discuss about various features of HIVE. CO5 U 3
16. Tabulate the various Cassandra collections that are used to handle tasks. CO5 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No 17 to 23, Q.No 24 is Compulsory)
17. a. From the shuffled pack of cards, a card is drawn. This trial is CO1 A 8
repeated for 400 times, and the suits are given below:
Suit Spade Clubs Hearts Diamonds
No. of times drawn 90 100 120 90

While a card is tried at random, then calculate the probability of


getting the following:
a. Diamond cards
b. Black cards
c. Except for spade
b. Write short notes on unbiased sampling. CO1 C 4
18. Explain the architecture of HADOOP with its core components. CO6 U 12
Describe the four components of RHIPE architecture with a neat
19. a. CO2 R 8
diagram.
b. Discuss the environment variables used during RHIPE installation. CO2 U 4
Explain the following component of Hive architecture in detail:
20. a. a) Hive Client CO4 U 8
b) Hive Services
b. Write short notes on Embedding Pig Latin in Python. CO3 C 4
Enumerate the following Pig Relational operators with suitable
examples.
a. Load
21. CO3 R 12
b. Cross
c. Foreach
d. Limit.
22. a. Enumerate the architecture and components of Spark Standalone. CO6 R 8
b. Describe any four SPARK RDD transformation methods in detail. CO6 R 4
23. a. Examine the YARN client mode with a neat diagram. CO6 R 6
b.Describe how Cassandra handles tasks with various collections CO5 U 6
COMPULSORY QUESTION
Explain the following CQL with example:
24. a. a. Create a database in Cassandra. CO5 U 6
b. CQL create data.
Discuss about Pig, HIVE use case. Differentiate Pig and Hive in
b. CO4 U 6
detail.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 understand the importance and challenges of Big data
CO2 design applications using HADOOP and RHADOOP
CO3 identify the appropriate function of PIG data model to be used in development
CO4 model Big data applications schema and use HIVE QL
CO5 develop applications with Cassandra
CO6 build applications with HDFS and MapReduce

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 - 8 - - 7 17
CO2 8 9 - - - - 17
CO3 13 3 - - - 5 21
CO4 4 14 - - - 1 19
CO5 4 16 - - - - 20
CO6 18 12 - - - - 30
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 20CS2005 Duration 3hrs


Course Name BIG DATA QUERY LANGUAGE Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List out the 3V’s in Big Data. CO1 R 1
2. Define semi-structured bigdata. CO1 R 1
3. List any two modern big data analytics tools. CO2 R 1
4. List the various HADOOP Eco Systems CO2 R 1
Which language is used to process the data which is stored in the HDFS
5. CO3 U 1
where the programmers will write the scripts?
6. Write the syntax for load and store operator of Pig. CO3 A 1
Which platform is used to develop SQL type scripts to do MapReduce
7. CO4 U 1
operations?
8. Explain the three types of complex data model of Pig CO4 U 1
9. List the various data types used in HIVE. CO5 R 1
10. Write the syntax for Cassandra’s write operation. CO5 A 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Define Prediction error in Bigdata analytics. CO1 R 3
12. Differentiate RDBMS versus HADOOP CO2 An 3
13. Differentiate Pig and SQL CO3 An 3
14. Discuss about various features of HIVE. CO4 U 3
15. Describe the components of Cassandra in detail. CO5 R 3
16. Compare Cassandra and RDBMS. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the various types of bigdata in detail. CO1 U 6
b
CO1 U 6
. Explain the modern bigdata analytics tools in detail.

18. a. Explain the architecture of HADOOP with its core components. CO2 An 12

Describe the four components of RHIPE architecture with a neat


19. a. CO2 U 6
diagram.
b Describe how R and HADOOP can be integrated, and elaborate on
CO2 U 6
. RHADOOP.

20. a. Determine the following Pig Relational operators with suitable CO3 A 6
examples.
a. Distinct b. Filter c. Split d. Union
b Illustrate the two execution modes of PIG
CO3 An 6
.

Illustrate the following component of Hive architecture in detail:


21. a. CO4 An 8
a) Hive Client b) Hive Services
Illustrate the following hive DDL commands with the syntax and CO4 An 4
b
example:
.
a) Create a database b) Drop database

Explain the following CQL with example:


22. a. CO5 U 6
a. Create a database in Cassandra. b. CQL create data.
b Describe how Cassandra handles tasks with various collections
CO5 U 6
.

23. a. Explain the HDFS architecture and MapReduce algorithm in detail. CO6 An 6
b Examine the YARN client mode with a neat diagram.
CO6 R 6
.
COMPULSORY QUESTION
24. a. Enumerate the architecture and components of Spark Standalone. CO6 U 6
b Explain any four SPARK RDD transformation methods in detail.
CO6 An 6
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the importance and challenges of Big data
CO2 Design applications using HADOOP and RHADOOP
CO3 Identify the appropriate function of PIG data model to be used in development
CO4 Model Big data applications schema and use HIVE QL
CO5 Develop applications with Cassandra
CO6 Build applications with HDFS and MapReduce

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 5 12 17
CO2 2 12 15 29
CO3 1 7 9 17
CO4 5 12 17
CO5 4 12 1 17
CO6 6 9 12 27
124
Course Code 20CS2006 Duration 3hrs
Course Name COGNITIVE COMPUTING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define the two areas of cognitive science. CO1 R 1
2. State cognitive computing. CO1 R 1
3. Differentiate between two Systems of Judgment and Choice. CO2 U 1
List out the tools that are required to capture meaning from non-textual-
4. CO4 U 1
based sources such as videos and sensor data.
5. Mention the two areas from which cognitive computing has evolved. CO2 U 1
List the set of tools and processes that are used to design and implement
6. CO4 R 1
data warehouses and data marts.
7. Define Decision tree. CO4 U 1
Infer the ability of a mind to reshape reality, and this type of reshaping
8. CO3 An 1
of a mind is highly possible in a big data environment.
9. Write a note on Text analytics. CO3 R 1
10. Write a short note on Morphology. CO3 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Find two domains that are suitable for cognitive computing CO1 A 3
12. Infer the process of phonology with an example. CO3 An 3
13. List the applications of visual analytics. CO3 U 3
Illustrate the three characteristics (called 3Vs) of the environmental
14. CO3 U 3
events by which the big data is defined.
15. Describe the use of ASR in speech recognition. CO6 U 3
16. Express your views on Semantic-Web. CO3 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe the architecture of the cognitive system with a diagram. CO1 R 6
b Enumerate the applications of Cognitive Systems and explain how
CO1 R 6
. they are used in various domains.
Artificial Intelligence is the foundation of cognitive computing.
18. a. CO1 U 7
Justify the above statement.
b
CO1 R 5
. Sketch the Components of a Cognitive System.
List the differentiating characteristics for designing a cognitive
19. a. CO1 A 5
system.
b
CO4 A 7
. Explain the types of Machine Learning with examples.
20. a. Enumerate the steps for STE-M Model with a diagram. CO4 R 6
b
CO4 R 6
. Label the Analytics Evolution and describe it in detail.
Construct a “ Bayes net” for the given scenario:
Modeling an ecosystem and deriving sound probabilities on
21. a. whether certain species are at risk by certain industrial CO4 U 6
developments. Assume the necessary factors influencing the given
scenario.
b Interpret the process of Text analytics Working and the Business
CO2 U 6
. Value of Text Analytics.
22. a. Infer the Role of NLP in a Cognitive System. CO3 U 7
A medical equipment manufacturer embeds sensors in its
equipment to monitor performance. The recorded data is constantly
b
streamed and analyzed to predict potential failures with enough lead CO4 E 5
.
time to make adjustments and avoid harm to patients. Justify which
analytics can be applied to predict the failures in machinery.
Infer how the Natural Language Technologies are applied
23. a. CO3 An 10
to Business Problems.
b
CO3 R 2
. Describe Taxonomies.
COMPULSORY QUESTION3
Enumerate the process of computer vision and discuss its
24. a. CO6 R 7
applications in various domains.
b
Recite how IBM Watson is used for Commercial Applications. CO5 R 5
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Outline the importance of cognitive computing
CO2 Analyze the business implications of cognitive computing
CO3 Apply natural language technologies to business problems
CO4 Apply machine learning for a specific real-world application
CO5 Develop Chabot applications for business problems
CO6 Develop Cognitive applications in health care using machine learning

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 19 - 8 - 7 - 34
CO2 - 8 - - - - 8
CO3 6 4 3 21 - - 34
CO4 13 7 8 - 5 - 33
CO5 5 - - - - - 5
CO6 7 3 - - - - 10
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 20CS2006 Duration 3hrs


Course Name COGNITIVE COMPUTING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. State cognitive science. CO1 R 1
2. List the types of cognition processes. CO1 R 1
Enumerate three domains that have led to the development of cognitive
3. CO2 1
computing. R
4. Write a few examples of Intelligent Systems. CO4 A 1
5. Name two disadvantages of cognitive computing. CO2 R 1
6. Interpret the uses of Natural Language Processing. CO4 U 1
7. Define machine learning. CO4 R 1
8. Infer your views on the corpus. CO3 An 1
9. Write two key elements of the machine learning process. CO3 A 1
10. Recite the meaning of Speech Analytics. CO3 R 1
PART – B (6 X 3 = 18 MARKS)

11. List two tasks of the feature extraction layer. CO1 R 3


12. Name a few applications of Text analytics. CO3 R 3
13. Describe the Three fundamental principles of the cognitive system. CO3 U 3
14. Define cune condition. CO3 R 3
15. Explain the Voice of the Customer. CO6 A 3
16. Infer Ontologies with example. CO3 An 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. List the usage of Cognitive Computing in various fields. CO1 R 6
b Enumerate three eras of computing. R
CO1 6
.
Summarize how different computer scientists have proposed their E
18. a. CO1 7
views on the development of cognitive computing
19. a. Describe the three types of machine learning with examples. CO1 U 5
b Define hypotheses generation and scoring R
CO4 7
.
Recite the three steps involved STE-M Model in detail with a R
20. a. CO4 6
diagram.
b Sketch the Cognitive Analytics diagram. A
CO4 6
.
Enumerate how the text analytics is done and its importance in the R
21. a. CO4 6
marking field.
b Write the functions of Linguistic analysis. A
CO2 6
.
Construct a Bayes net for the given scenario: A
22. a. Diagnose of patients in Asia for a getting chance of lung cancer. Assume CO3 7
the necessary factors influencing the above decision.
b Infer the functionality of Automated Speech Recognition. An
CO4 5
.
23. a. Illustrate how lexical analysis is done with examples. CO3 U 10
b Write how leveraging the connected world of the Internet of Things A
CO3 2
. is done with a real-time example.
COMPULSORY QUESTION
24. a. List the commercial applications of IBM Watson. CO5 R 7
b Discuss computer vision and discuss its usage in different fields.
CO6 U 5
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Outline the importance of cognitive computing
CO2 Analyze the business implications of cognitive computing
CO3 Apply natural language technologies to business problems
CO4 Apply machine learning for a specific real-world application
CO5 Develop Chabot applications for business problems
CO6 Develop Cognitive applications in health care using machine learning

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 17 8 - - 12 - 37
CO2 2 - 3 - - - 5
CO3 7 10 14 4 - - 35
CO4 21 1 6 4 - - 32
CO5 5 - - - - - 5
CO6 - 7 3 - - - 10
124
Course Code 20CS2007 Duration 3hrs
Course Name COMPUTER COMMUNICATION NETWORKS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Classify the basic topologies in terms of line configuration. CO1 U 1
2. List the services provided by the application layer in the OSI model. CO1 R 1
A receiver receives the bit pattern 01101011. The system uses the even
3. CO2 An 1
parity, is the pattern in error.
4. Sketch out the frame format of HDLC Protocol. CO2 A 1
5. Cite the data rate of fast Ethernet. CO3 U 1
6. Define Frame Tagging. CO3 R 1
7. Identify the benefits of Wireless Mesh Networks. CO4 U 1
8. Report on the purpose of Global System for Mobile Communication. CO4 R 1
Demonstrate the netid and hostid for the IP address 127.23.4.0 and state
9. CO5 An 1
the class too.
10. Interpret the various types of Open Shortest Path First connections. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Differentiate between star topology and bus topology with a neat
11. CO1 An 3
sketch.
Construct the CRC for a given 10-bit sequence 1010011110 with a
12. CO2 An 3
divisor of 1011.
State the Handoff Mechanism and differentiate hard handoff and soft
13. CO3 An 3
handoff.
14. Examine how registration takes place in Mobile IP. CO4 U 3
15. Draw the frame format of IPv4 and explain each field. CO5 U 3
16. Explain the congestion control associated with the transport protocols. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
a Discuss on how the communication between two devices are
17. CO1 U 4
. carried out in terms of direction of data flow.
b
Examine the concerns of the layers in OSI model. CO1 An 8
.

a Compare the various transmission media associated with guided


18. CO2 An 4
. media with relevant sketches.
b Describe the different types of noisy channels used in flow controls
CO2 A 8
. along with its respective diagram.

Examine the role of the MAC sub layer in wireless networks and
a
19. break down the workings of the distributed coordinated function CO3 An 6
.
with its benefits and potential drawbacks.
b
Explain in detail on MAC/IP address conversion protocols. CO3 U 6
.

a Demonstrate the working of Cellular Networks with a neat


20. CO4 U 6
. architecture.
b Identify the method used to overcome the issue of hidden station
CO3 A 6
. problem.

a Implement the Distance Vector routing protocol within the intra-


21. CO5 A 6
. domain of an autonomous system.
b
Compare between IPv4 options and IPv6 extension headers. CO5 An 6
.

a Summarize the strategies that are implemented for a transition from


22. CO5 U 6
. IPv4 to IPv6.
b
Implement in steps how mobile routing is carried out by IPv6. CO4 A 6
.

Execute and explain the Longitudinal Redundancy Check for the


a
23. following data: CO2 A 6
.
10011001 01101111
b
Relate on the twisted pair cable with relevant sketches. CO1 An 6
.
COMPULSORY QUESTION
a
24. CO6 U 6
. Summarize on the closed congestion control mechanisms.
b
Analyze on the state transition diagram implemented in the TCP. CO6 An 6
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the components and layered architecture of communication networks.
CO2 Identify the protocols and services of data link layer.
CO3 Analyze the different LAN technologies for building networks.
CO4 Describe the wireless WAN technologies for wireless transmission.
CO5 Design network model and determine the routing protocols for different applications.
CO6 Construct communication networks for supporting different applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 5 - 17 - - 23
CO2 - - 15 8 - - 23
CO3 7 1 9 6 - - 23
CO4 1 10 6 - - - 17
CO5 - 9 6 7 - - 22
CO6 - 10 - 6 - - 16
124
Course Code 20CS2008 Duration 3hrs
Course Name COMPUTER NETWORKS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
What is the relationship between protocols and layers? Name some
1. CO1 U 1
protocols of transport layer.
2. Draw and write a note on Bus Topology. CO1 R 1
Give the importance of Encapsulation and decapsulation in protocol
3. CO2 An 1
layering in Internet.
Can a server retrieve a file from client site with File Transfer Protocol?
4. CO2 A 1
If yes, justify your answer otherwise give reason for the same.
5. Define the term “Piggybacking”. CO4 R 1
a. Rewrite the following address using Decimal Notation
01011110 10110000 01110101 00010101
b. Rewrite the following address using Binary Notation
170.40.120.212
6. CO4 C 1
c. Identify the class for the following classful addressing.
11011111 10110000 00011111 01011110
d. Identify the class for the following classful addressing.
200.36.2.3
7. What is Inter-domain Routing and Intra-Domain Routing? CO3 U 1
8. Draw the packet format of Ethernet. CO5 R 1
Write the use of Traffic Shapping in networks. Name two algorithms
9. CO4 U 1
for traffic shaping.
10. What is IoT? Give example. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. What are the criteria necessary for an effective and efficient network? CO1 R 3
Answer the following:
(i) DNS stands for…………
12. CO2 U 3
(ii) Define DNS.
(iii) How does DNS work?
Draw and explain the fields of user datagram packet format. List out the
13. CO3 R 3
UDP services.
Identify and explain the technology that allows a site to use a set of
14. private addresses for internal communication and a set of global CO4 A 3
Internet addresses for communication with the rest of the world.
Write a short note on Carrier Sense Multiple Access protocol (CSMA).
15. CO5 R 3
Mention the CSMA access modes.
16. Explain SDN Architecture. CO6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Consider the network diagram which uses a switching technique to
optimize the use of the channel capacity available in digital
telecommunication networks, such as computer networks, and
minimize the transmission latency.
(i) Identify and describe the switching technique employed for the
communication in the diagram.

17. a. CO2 E 10

b Justify with proper reason, why the packets received are not in
CO2 E 2
. order in 17(a).

Assume that you are working as a Network Administrator in PQR


Communications India Pvt. Ltd. The company wants to extend their
networking laboratory to provide support for more customers. For
18. a. this purpose, a detailed performance analysis report of all the CO1 A 2
devices connected in the network is requested by your manager.
Name the protocol which will help you to generate the specified
report.
b
CO1 A 10
. Discuss the above identified protocol in detail with a neat diagram.

In a network, there are 100 systems where every system uses TCP
protocol. Due to heavy traffic, the performance of the network gets
19. slow down. CO4 U 12
How do TCP overcome this situation to increase the performance of
the network? Elaborate in detail.

Compare and contrast the fields in the main headers of IPv4 and
20. a. CO3 An 6
IPv6.
A router receives a packet with the destination address
b
192.54.87.12. Show how the router finds the network address of the CO3 A 6
.
destination.

21. a. Consider the given figure. Three stations want to transmit their CO5 E 6
information using common transmission medium without any
collision. But during data transmission, collision happens as shown
in the given figure. Identify the type of the protocol used in this
figure. Also, state the reason for the collision.

b Suggest an alternative protocol which can reduce the rate of


CO5 A 6
. collision. Elucidate the same in detail with a diagram.

Hamming code error correction technique uses 4 redundant bits for


22. a. detecting the errors in 7 message bits. Discuss why you will not be CO4 C 4
able to detect the errors in the above scenario with 3 redundant bits.
b
CO3 An 8
. Using Data Word: 1011001 insert and fill the redundancy bits.

Elaborate on Software Defined Network (SDN). Justify, Why SDN


23. is important? Write a note on working of SDN. Give the benefits of CO6 R 12
SDN.
COMPULSORY QUESTION
Assume that you are working as a Network Administrator in XYZ
Pvt Ltd. Your Manager has asked you to setup a laboratory with
24. a. CO1 C 6
capacity of 60 machines. Elaborate all types of LAN topologies and
suggest a suitable LAN topology with justification.
A networking device is designed in such a way that, it forwards the
b packet out of every valid outgoing link. Identify the networking
CO1 C 6
. device and highlight the drawbacks while the network is connected
with more number of systems.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Identify the factors influencing computer network infrastructure and development.
CO2 Apply the network protocols in building the computer networks.
CO3 Analyze the routing algorithms and their behaviors.
CO4 Design computer networks with optimized address assignment.
CO5 Evaluate the performance and characteristics of network protocols.
CO6 Develop real life network-based projects.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1+3 1 2+10 6+6 29
CO2 3 1 1 10+2 17
CO3 3 1 6 6+8 24
CO4 1 13 3 1+4 22
CO5 1+3 6 6 16
CO6 1+12 3 16
124
Course Code 20CS2009 Duration 3hrs
COMPUTER ORGANIZATION AND
Course Name Max. Marks 100
ARCHITECTURE

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
1. Predict the functionality of Memory Address Register. CO1 U 1
2. List out the components of an I/O module. CO3 U 1
3. Identify the basic steps in an instruction execution. CO5 R 1
4. State the requirement of the program counter in the processor. CO4 U 1
5. Classify the types of External Devices. CO3 R 1
6. State the advantage of Direct Memory access (DMA). CO4 R 1
7. Determine the type of addressing mode. CO4 A 1

8. List the drawback of sign-magnitude representation. CO4 U 1


9. Infer the role of control word to generate the control signals in micro CO6 U 1
programmed control.
10. Hardwired control is faster than micro-programmed control. Analyze and CO6 An 1
defend your answer.
PART – B (6 X 3 = 18 MARKS)
11. Discuss the various types of transfers supported by the bus CO1 An 3
interconnection.
12. Illustrate the use of Interrupt Handler and ISR in handling an interrupt CO2 U 3
with suitable diagrams.
13. Consider that the data 1110 sent by the transmitter is received as 1101 by CO3 A 3
the receiver. Use Venn Diagram to identify and rectify this error.
14. Consider the following 8-bit data. 01101101 CO4 U 3
Write the result of arithmetic shift operation on this data bit.
15. Write down the steps required for a pipelined processor to process the CO5 R 3
instruction?
16. Draw and discuss the model of the control unit in hardwired CO6 An 3
implementation.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Design an IAS Computer structure, a new stored-program CO1 A 6
computer and discuss about their components.
b. Examine the internal structure of a traditional single-processor CO1 U 6
computer from a hierarchical perspective.

18. a. Describe the cache mapping techniques with suitable diagrams and CO2 U 8
also list out the merits and demerits of each mapping technique.
b. With a neat Sketch, explain the Instruction Cycle State Diagram CO4 U 4
with Interrupts.

19. Sketch the instruction execution state diagram and relate CO3 A 12
the instruction execution process with the state diagram.

20. a. Illustrate the use of interrupt driven I/O for reading a block of data CO3 An 8
and discuss how it eliminates needless waiting
b. Sketch the five-state process model and explain the three types of CO5 A 4
process scheduling.

21. Consider an 8-bit data word stored in memory as 00111001. CO2 A 12


Determine what check bits would be stored in memory with the data
word. Also if the word read from memory after a while is 0011001,
apply a hamming algorithm to detect the error and correct it.

22. a. Describe the Booth Algorithm for Signed operand Multiplication. CO4 A 8
Multiply 3* (-5 ) by Booth Algorithm
b. Describe the role of the operating system in process scheduling. CO3 R 4

23. a. Analyze the diagrams shown in Fig A and Fig B, name and explain CO5 An 6
the category of Addressing modes shown in the representation.
Fig A

b.Compare and contrast between RAW (Read after Write) hazard and CO5 E 6
WAR (Write after Read) hazard.
COMPULSORY QUESTION
24. a. Discuss the sequence of micro-operations required for the execution CO6 U 6
of fetch, indirect and interrupt sub cycle.
b. Compare and contrast Hardwired and Micro programmed CO6 An 6
implementation.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Explain function of the central processing unit.
CO2 Develop algorithms for error correction for memory modules (main and cache memory).
CO3 Design and understand various input and output modules for central processing unit.
CO4 Select and use standard addressing modes for logical and physical memory addressing.
CO5 List and define various stages of instruction pipelining in processor.
CO6 Explore various ways to implementing the micro instruction sequencing and execution.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 - 7 6 3 - - 16
CO2 - 11 12 - - - 23
CO3 5 1 15 8 - - 29
CO4 2 8 9 - - - 19
CO5 4 - 4 6 6 - 20
CO6 - 7 - 10 - - 17
124
Course Code 20CS2011 Duration 3hrs
Course Name DATA ACQUISITION AND PROCESSING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Distinguish between ADC and DAC. CO1 U 1
2. Mention a suitable sensor and actuator for the measurement of Force. CO1 A 1
3. State the significance of feedback system in the amplifier. CO2 R 1
4. Recall the term Propagation delay. CO2 R 1
5. State the significance of transducer calibration program. CO3 R 1
6. Enumerate the key elements of LabVIEW. CO3 R 1
7. Calculate 2’s complement of 1010. CO4 A 1
8. Define the term relative accuracy. CO4 R 1
9. Define Sampling. CO5 R 1
Express mathematically the cross-correlation function between two
10. CO6 U 1
signals x(t) and y(t).
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Identify the various noises present in the communication system. CO1 U 3
12. Compare latches and flip-flops. CO2 U 3
Identify the main considerations in creating a DAQ application in a
13. CO3 U 3
tablet.
Interpret the conversion of binary to gray code and vice versa using a
14. CO4 A 3
circuit diagram.
15. Review the various data acquisition packages. CO5 U 3
Calculate the quantization noise and the corresponding signal-to-noise
16. ratio for a full range sinusoidal signal for a 12-bit D/A converter with a CO6 A 3
5.000 V reference.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Trace the basic block diagram for digital signal processing. CO1 U 3
b Illustrate the working of a 3-bit Successive approximation ADC
CO1 A 9
. with circuit diagram.
18. a. Summarize the Ethernet communication with special reference to CO2 U 8
the ethernet frame structure.
b
Sketch the various types of clock skews with necessary diagrams. CO2 A 4
.
Compute the static accuracy requirement for a high-speed
19. a. CO3 A 8
computer-based DAS with MSE ≤ 0.2%.
b
Summarize the two extreme design cases for portable DAQ system. CO3 U 4
.
20. a. Explain the working of a Zener diode. CO4 U 5
b Compute the hexadecimal equivalent of 2684 using the suitable
CO4 A 7
. number system conversion table.
21. a. Differentiate between USB and Firewire. CO2 U 7
b Identify the various timing parameters for combinational logic
CO2 U 5
. circuits.
Determine an expression for RMS quantization error for a sawtooth
22. a. CO5 A 9
error waveform ɛ = - kt.
b Summarize the responses of Butterworth, Chebyshev and Bessel
CO5 U 3
. filters.
Discuss the transfer of each byte in GPIB using three-line
23. a. CO6 U 7
handshake control.
b Summarize the general-purpose interface bus classification of
CO6 U 5
. devices.
COMPULSORY QUESTION
Sketch the Fourier transform and Power spectral density of the
24. a. CO6 A 6
following functions: (a) cosine (b) sine (c) square pulse
b
CO6 U 6
. Explain different types of busses to link boards.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Outline the fundamentals of data acquisition, configuration, characteristic and specifications of
various components used in DAS.
CO2 Elucidate the elements of data acquisition techniques.
CO3 Recognize various interfacing issues of ADC’s and DAC’s to a microprocessor/PC.
CO4 Explain the components of data acquisition system.
CO5 Infer bus driver programs and data analysis using data acquisition packages.
CO6 Summarize different data transfer techniques.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 0 7 10 - - - 17
CO2 2 23 4 - - - 29
CO3 2 7 8 - - - 17
CO4 1 5 11 - - - 17
CO5 1 6 9 - - - 16
CO6 0 19 9 - - - 28
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 20CS2011 Duration 3hrs


Course Name DATA ACQUISITION AND PROCESSING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Acquisition time of a DAQ system. CO1 R 1
2. Differentiate between active and passive sensors with suitable examples. CO1 U 1
3. List the features of USB connector. CO2 R 1
4. Define Clock jitter. CO2 R 1
5. Classify the various types of noises in a DAQ system. CO3 U 1
6. List any two the advantages of LabVIEW. CO3 R 1
7. Enumerate the applications of a zener diode. CO4 R 1
8. Determine the binary equivalent of 13. CO4 A 1
9. Define Quantization. CO5 R 1
10. Recall the Fourier transform for a non-periodic signal. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Identify the important parameters data acquisition system. CO1 U 3
12. Distinguish between a microprocessor and a microcontroller. CO2 U 3
13. Identify the main tasks performed by an application software. CO3 U 3
Illustrate the comparison between offset binary, 2’s complement and Sign
14. CO4 A 3
magnitude graphically.
15. Summarize the various driver programs for DAQ system. CO5 U 3
16. Identify the various data and control signals included in a DAQ system. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Trace the basic block diagram of Plug-in DAQ system. CO1 U 3
b
CO1 A 9
. Illustrate the working of a 3-bit Flash type ADC with circuit diagram.

18. a. Summarize the architecture of Bluetooth technology. CO2 U 5


b Illustrate the exchange of binary data using RS-232 system with
CO2 A 7
. interface diagram.
Develop a sample functional design for a data acquisition system with
19. a. CO3 A 10
all necessary requirements.
b Trace the functional block diagram of a portable DAQ system using
CO3 U 2
. discrete design.

Compute the binary equivalent of 27.85 using the suitable number


20. a. CO4 A 8
system conversion table.
b
CO4 U 4
. Identify the various sources of errors that occurs in a D/A converter.

Determine an expression for Signal to Noise Ratio for a sawtooth error


21. a. CO5 A 8
waveform ɛ = - kt.
b Interpret graphically the various anti-aliasing filter responses.
CO5 A 4
.

Interpret aliasing error in Data acquisition systems with necessary


22. a. CO5 A 8
mathematical expressions.
b Determine the sampling frequency made for a triangular wave, square
CO5 A 4
. wave and a full wave rectified sinusoidal wave with an amplitude ± A.

Discuss the following analytical techniques in detail (i) curve fitting


23. a. CO6 U 4
(ii) correlation (iii) Frequency response of a system.
b Illustrate the transfer of each byte in GPIB using three-line handshake
CO6 A 8
. control.
COMPULSORY QUESTION
Sketch the Fourier transform and Power spectral density of the
24. a. following functions: (a) delta function (b) half-cosine pulse (c) CO6 A 6
Gaussian pulse
b
CO6 U 6
. Explain the various types of bus management lines.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Outline the fundamentals of data acquisition, configuration, characteristic and specifications of
various components used in DAS.
CO2 Elucidate the elements of data acquisition techniques.
CO3 Recognize various interfacing issues of ADC’s and DAC’s to a microprocessor/PC.
CO4 Explain the components of data acquisition system.
CO5 Infer bus driver programs and data analysis using data acquisition packages.
CO6 Summarize different data transfer techniques.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 7 9 - - - 17
CO2 2 8 7 - - - 17
CO3 1 6 10 - - - 17
CO4 1 4 12 - - - 17
CO5 1 3 24 - - - 28
CO6 1 13 14 - - - 28
124
Course Code 20CS2012 Duration 3hrs
Course Name DATA AND INFORMATION SECURITY Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. What is the difference between data and information security? CO1 U 1
2. Define Vulnerability. CO1 R 1
3. What is Information Rights Management (IRM)? CO2 R 1
4. What are the various approaches used to secure unstructured data? CO2 U 1
5. What is the need for Security policy? CO3 U 1
6. List out the Multifactor authentication methods to check the identity. CO3 R 1
What are the elements involved for an effective reference monitor
7. CO4 U 1
concept?
Draw the picture of an application lifecycle portion of an SDL for an
8. CO4 A 1
organization that uses an Agile development lifecycle.
9. What is network hardening? CO5 R 1
10. What is information security law? CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
What are different methods of authentication? Explain each in
11. CO1 U 3
brief.
12. How the data is prevented in modern storage infrastructures? CO2 A 3
13. What are the various aspects of threat? CO3 R 3
14. Differentiate Web server from Proxy Server. CO4 U 3
15. Briefly explain the Wireless Network Security mechanism in detail. CO5 U 3
Write a short note on rights of employees and employers in data and
16. CO6 R 3
information security.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Write a short note on threat and access control. CO1 U 8
b
Discuss about the Malicious Code in detail. CO1 U 4
.
18. a. Explain the concept of encryption in detail. CO2 U 4
b
Explain the best practices followed in database Security system. CO2 U 8
.

19. a. Discuss the Security Design Principles in detail. CO3 U 8


b
CO3 U 4
. Explain security organization in detail.

20. a. Write a short note on Classic security models. CO4 R 6


b
CO4 U 6
. Explain the in detail the security in mobile devices.

Illustrate the need for Intrusion detection systems (IDS) systems


21. a. CO5 An 8
with suitable examples.
b
Write a short note on Network Device Security. CO5 R 4
.

Summarize the various types of Computer Crimes and the laws to


22. a. CO6 U 6
handle those crimes.
b
CO6 U 6
. Explain about the various ethical issues in computer security.

Explain the various components used to build a Security Program in


23. a. CO2 U 8
detail.
b Describe the need for incident analysis with ethics in information
CO6 U 4
. security.
COMPULSORY QUESTION
24. a. Explain the various types of authorization system in detail. CO2 U 6
b Write the need for Security Information and Event Management
CO5 U 6
. (SIEM) system in detail.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Define the fundamental concepts of data and information security.
CO2 Apply the procedures to secure a system against failure, theft and invasion.
CO3 Discuss the security terms, principles and risk factors.
CO4 Recognize the importance of network security.
CO5 Choose various security operations to secure a network
CO6 Select suitable policies for administering a company’s network.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 16 - - 17
CO2 1 27 3 31
CO3 3 14 - - 17
CO4 6 10 1 - 17
CO5 5 9 8 - - 22
CO6 4 16 - - - - 20
124

Course Code 20CS2013 Duration 3hrs


Course Name DATA STRUCTURES AND ALGORITHMS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Discuss about procedural abstraction. CO1 U 1
2. List any two primitive data type. CO1 R 1
3. Name the principle used in queue. CO2 R 1
4. Recall the condition checked during pop operation in stack. CO2 R 1
5. In queue using linked list, locate the position for deletion. CO3 R 1
6. List any two real-time application for doubly linked list. CO3 R 1
7. Identify the worst and best case for time complexity in binary search. CO4 R 1
8. Define sorting and list any three sorting algorithms. CO4 R 1
9. Articulate the terms parent, children, degree with respect to trees. CO5 R 1
10. Identify the walk of a graph with the same origin and terminus. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Calculate the time and space complexity for the following.
for(i=0;i<n;i++)
{
for(j=0;j<n;j++)
{
CO1 A 3
c[i,j]=0;
for(k=0;k<n;k++)
{
c[i,j] =c[i,j]+ A[i,j]*B[i,j];
}}}
12. Write the pseudocode to perform push operation in stack. CO2 A 3
13. Discuss about doubly linked list with suitable example. CO3 U 3
14. Explain binary search with a case-scenario. CO4 U 3
15. Predict the keys in the following binary tree in in-order, pre-order, post-
order, and level order traversals.

CO5 A 3

16. Give an example of the adjacency matrix representation of the directed


CO6 U 3
graph.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. For the given array arr[1:6, -2:4, -5:4] with a base value of 300 and
a. the size of each element is 2 bytes in memory calculate the address CO1 A 6
of element arr[2][2][3]?
b Explain the different types of time and space trade off in data
CO1 U 6
. structure and algorithms.

18. Develop the pseudocode for Postfix evaluation and evaluate the
CO2 A 12
expression ab+ab-/.

19. Construct a pseudocode to perform enqueue, dequeue, and display


a. CO2 A 10
operation in circular queues using arrays.
b
CO2 U 2
. Distinguish linear and circular queue.

20. Develop a pseudocode to delete a node in the last and in the middle
a. CO3 A 6
in doubly linked list.
b Explain the methods to insert a node in singly linked list and write
CO3 A 6
. the algorithm.

21. Apply bubble sort algorithm to sort the data and write the code
snippets to solve the problem. CO4 A 12
data = 24, 36, 17, 95, 28

22. Apply merge sort algorithm to sort the following numbers in


a. descending order: 87, 23, 54, 34, 65, 43, 31, 20. CO4 A 6
Explain the step-by-step procedure to sort using merge sort.
b Explain hashing technique for storing and accessing data. Illustrate CO4 A 6
. the linear probing method for handling collisions by keeping the
following values in a hash table of size 10. Apply the hash function
“key % 7”.
56, 79, 49, 32, 65, 29, 72, 63.

Produce AVL tree for the following sequence of numbers 30, 50,
23. a. CO5 A 6
20, 10, 7, 16, 32, 46, 12, 48.
Write the pseudo code to insert a node in a binary search tree.
b
Construct a binary search tree by inserting the values 30, 70, 50, 40, CO5 A 6
.
90, 20, 60, 100.
COMPULSORY QUESTION
Explain depth first search algorithm of the graph with an example
24. CO6 U 12
and pseudocode.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the basics of abstract data type and algorithm analysis.
CO2 Illustrate the use of array to implement stack and queue.
CO3 Apply linked list to design stack and queue data structures.
CO4 Demonstrate the working of sorting and searching algorithms and application of hashing.
CO5 Understand the different types of tree data structures and demonstrate the methods for traversing
trees.
CO6 Differentiate the graph representations and traversals.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 7 9 - - - 17
CO2 2 2 25 - - - 29
CO3 2 3 12 - - - 17
CO4 2 3 24 - - - 29
CO5 1 - 15 - - - 16
CO6 1 15 - - - - 16
124
Course Code 20CS2014 Duration 3hrs
Course Name DATA VISUALIZATION Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
1. Define Retina. CO6 R 1
2. Express about the blind spot. CO6 U 1
3. Enumerate the use of spatial based visualization. CO4 R 1
4. Name the space where the visualization is created. CO4 R 1
5. List the visualization systems based on data type. CO2 R 1
6. Express range distortion. CO5 U 1
7. Extend any 2 aesthatic rules for non-space filling methods. CO1 U 1
8. Enumerate the other issues in visualizing trees and graphs. CO3 R 1
9. State benchmarking procedure. CO2 R 1
10. Define glyph. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
11. State Gestalt Principles. CO R 3
2
12. Six people can build a garage in 3 days. Assuming that all people work at CO C 3
the same rate, create a visual representation showing how many people it 6
take to build a garage in one day.
13. Explain the data structure space in interaction techniques. CO U 3
5
14. Summarize node-link graphs. CO U 3
1
15. Compare geography and cartography. CO U 3
4
16. Express line graphs. CO U 3
3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Illustrate the information overload with real-time example and show CO A 12
how to avoid it. 2
18. Describe visual mapping with examples. CO U 12
4
19. Construct the vector space model in document visualization. CO A 12
3
20. Show the procedures to display hierarchical structures. CO A 12
5
21. Illustrate the visualization techniques for 2-D data with examples. CO A 12
5
22. Design a Collaborative visualization with a Cricket tournament dataset CO C 12
considering 3 persons namely A, B, and C working collaboratively to 1
visualize.

Team 1 Team 2 City Toss Toss Match MoM


Win Name Win
IND NZ B’lore IND Field NZ McCullum
PAK AUS Chand. AUS Bat AUS M Hussey
BAN ZIM Delhi BAN Bat BAN Maharoof
SA SL Mum. SL Bat SA Boucher
ENG IND Kolk. ENG Bat IND Dhoni
AUS SA Che. SA Field AUS M Hayden
IND ZIM Hyd. IND Field IND Y Pathan
SL PAK Chand. SL Bat SL Sangakara

23. Discuss the recent trends in various perception techniques. CO A 12


6
COMPULSORY QUESTION
24. A health insurance institution is collecting vast amounts of data related CO A 12
to physician consultations of patients, prescriptions, medications, 5
medical tests, examinations, and lab results, including additional
parameters (e.g., hospital, physician, cost, date and time, or duration).
The insurance institution wants to query, explore, and analyze these
data visually according to different tasks and groups of insured persons.
The duty is to support this institution using visualization techniques for
time-oriented data.
(c) Interpret and specify the following:
Users:
Who are the users of the visualization?
What are the specifics of the target group?
(not merely ”employee”, but a more specific description, such as
analyst or manager in a specific department, including details of
the characteristics of the respective user group)
Data:
What kind of data is to be visualized?
Which variables/parameters?
What data types?
Which structure?
Tasks:
What do the users want to do with the data and which insights
do they want to gain?
Sketch a proposed solution in terms of visual representation, interaction
and data analysis methods.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Design visualization dashboards by utilizing various visualization methods and tools.
CO2 Describe the design process to develop visualization methods and visualization systems, and
methods for their evaluation.
CO3 Summarize large-scale abstract data.
CO4 Understand visual mapping and the visualization.
CO5 Apply actual visualization, interaction and distorting techniques.
CO6 Infer recent visual perception techniques.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 4 12 16
CO2 5 12 17
CO3 1 3 12 16
CO4 2 15 17
CO5 1 4 36 41
CO6 1 1 12 3 17
124
Course Code 20CS2015 Duration 3hrs
Max.
Course Name DATA VISUALIZATION AND PRESENTATION 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define metadata. CO1 R 1
2. Label the goal of the record in visualization. CO1 R 1
3. State glyph. CO2 R 1
4. Enumerate cartography. CO2 R 1
5. List the layouts for network representation. CO3 R 1
6. State the contribution of rods in color vision. CO3 R 1
Name any two parameters for each interaction technique to be applied
7. CO4 R 1
to a specified space/operand.
8. Define tokens. CO4 R 1
9. Recall connecting interaction technique. CO5 R 1
10. Quote the modern integrated visualization system. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Summarize the domain situation. CO1 U 3
12. Differentiate key and value attributes. CO2 U 3
13. Compare hue, saturation and luminance. CO3 U 3
14. Paraphrase interaction operand. CO4 U 3
15. Express visualization structure space. CO5 U 3
16. Extend the variable quality issue of a data. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Illustrate the validation approaches in data visualization. CO1 U 12
2008 2009 2010 2011 2012 2013
Admissions
NSW 154 136 165 159 134 120
Victoria 143 116 91 135 123 94
QL 100 121 110 112 115 86
SA 36 43 32 37 35 37
18. CO2 A 12
WA 65 69 62 63 69 59
Tasmania 16 11 13 17 10 14
NT 7 6 8 5 4 9
ACT 8 8 10 14 8 8
Sketch up a visualization to show ideas of admissions to an
Institution across its branch Institutions.

19. Describe Hierarchy Marks in data visualization with examples. CO3 U 12

Write a program that generates a word cloud showing


20. the size of the text corresponds to the frequency of CO4 C 12
the word in the document.

Construct the Animation Pseudocode and explain the concept of


21. CO5 A 12
animating transformations in interaction techniques.

22. Explain the various problems in designing effective visualizations. CO6 U 12

Discuss in detail the vector space model in the text based


23. CO4 U 12
visualization.
COMPULSORY QUESTION
Consider a real-time traffic monitoring system that uses
visualization techniques to help drivers to quickly identify and
avoid congested areas, accidents, and other hazards on the road.
1. Sketch the types of data that should be collected.
24. 2. How can it be presented in a way that is intuitive and easy CO6 A 12
to understand while also providing the necessary level of
detail?
3. How can the system adapt to changing traffic patterns and
user feedback over time to improve its effectiveness?
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Choose knowledge of perception and cognition to evaluate visualization
design alternatives.
CO2 Understand the role of visualization in the processing and analysis of data
coming from a broad range of sources.
CO3 Apply suitable data visualization tools for various applications.
CO4 Identify appropriate data visualization techniques given particular
requirements imposed by the data.
CO5 Describe the cutting-edge research ideas in the field of visualization.
CO6 Apply appropriate design principles in the creation of presentation and
visualization.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 15 - - - 17
CO2 2 3 12 - - - 17
CO3 2 15 - - - - 17
CO4 2 15 - - - 12 29
CO5 1 3 12 - - - 16
CO6 1 15 12 - - - 28
124
Course Code 20CS2016 Duration 3hrs
Course Name DATABASE MANAGEMENT SYSTEMS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. What is Data Abstraction? CO1 U 1
………….. is the logical design of database.
2. ………… is a snapshot of the data in the database at a given instant in CO1 R 1
time.
Are NULL values in a database the same as that of blank space or zero?
3. CO1 An 1
Give reason.
4. Define “Triggers”. Specify the two requirements for trigger mechanism. CO2 R 1
Identify the command used to select only one copy of each set of duplicate
5. CO2 A 1
rows in SQL. Give Syntax for the same.
Define Armstrong’s Axioms in Functional Dependency in DBMS. Name
6. CO3 R 1
the primary and secondary rules.
7. What is an Index? Give a valid syntax for Index in SQL. CO4 R 1
8. Give reason for allowing concurrency. CO4 E 1
9. Identify the situation in which the roll back to a transaction is applied. CO5 A 1
Specify the uses of data warehouse and list the components of data
10. CO6 U 1
warehouse.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Pen-down the role of Data Models and list out the various data models. CO1 R 3
12. Name and define the several SQL language parts. CO2 R 3
What is meant by an entity-relationship (E-R) model? Illustrate the terms
13. CO3 U 3
Entity, Entity Type, and Entity Set in DBMS with an example.
14. Is “all-or-none” property is referred to as atomicity? Justify your answer. CO4 An 3
15. Define “Two-Phase Locking”. Give example. CO5 R 3
16. Present an overview of Database Security. CO6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Differentiate between two-tier and three-tier architectures. CO1 An 4
b Among these two architectures, which is better suited for Web
CO1 An 8
. applications? Give reason.

18. a. Write a note on “Having Clause”. Give the syntax for the same. CO2 A 4
Write a query using “having clause” to retrieve the average salary of
engineers in various departments where the average salary is more
than $50,000 (use the following table - Engineer).
Average
Department Name Salary
ID name (dept_name) (avg_sal)

83 Brandt Software Engineer 92000


76 Crick Electronics Engineer 72000
b 98 Kim Electrical Engineer 80000
CO2 A 8
. 121 Singh Testing Engineer 80000
45 Katz Software Engineer 75000

22 Einstein Manufacturing 95000


12 Wu Testing Engineer 90000

32 El Said Civil Engineer 60000


101 Srinivasan Software Engineer 65000
15 Mozart Packing 40000
33 Gold Manufacturing 87000

19. Consider the following ER diagram describing the transactions that


occurred on the various ATMs on a particular day.

aid city tid


time
amount
branch

R Transaction
ATM

CO3 C 12
Write Relational Algebra expressions for the following:
i. List the total transaction amount of “XYZ” ATM branch [3
Marks]
ii. List the transaction details of the transaction id 101 occurred
between 16 hrs to 20 hrs [3 Marks]
iii. List the transaction id and the ATM id for the minimum
transaction amount that occurred at “GGG” [3 Marks]
iv. Draw only the final optimized tree for the above query number
(iii) [3 Marks]

20. Exhibit the structure and properties of B+ Tree and present the
a. CO4 E 8
algorithm for search in B+ Tree with example.
b
CO4 R 4
. Discuss the advantages and disadvantages of B+ Tree.

21. Consider a “Book Management System” that contains book details CO5 E 12
such as the title of the book, author of the book, ISBN, year of
publication, price of the book and available quantity in stock. Further,
if any book buyers are interested to buy the books, then their
information like buyerid, name and address are stored. To check the
available quantity of books in stock and to deliver the books (as
requested by the buyer), the order details such as order number, ISBN,
buyerid, card number, quantity, date of order and shipping date will be
maintained in the database.

Tit Auth Q I Na Orde Card Order Shippi


Isbn Year Price Address
le or ty D me r No. No. date ng date
AA VV 1234 2016 1250 5 1 aaa Chennai 100 543 1/5/23 2/5/23
BB WW 5678 2017 7500 3 2 bbb Mumbai 200 123 2/5/23 3/5/23

CC XX 4321 2018 2100 9 3 ccc Kolkata 300 012 7/4/22 8/4/22

D YY 6876 2019 1570 1 4 ddd Bengalur 400 987 3/6/21 4/6/21


D u
EE ZZ 3456 2020 9250 5 5 eee Delhi 500 765 2/2/22 3/2/22

Whether the above table has passed all normal forms? If no, elaborate
it in detail with necessary conditions for normal forms and
corresponding tables (for each normal form). If yes, justify your
answer.

22. Consider the following and check if it is serializable. If so, justify your
answer. If not, convert the schedule into non-serial schedule which
satisfies serializability.

CO5 A 12

23. Provide the comparison between strict two-phase locking protocol,


rigorous two-phase locking protocol and conservative two-phase CO6 R 12
locking protocol.
COMPULSORY QUESTION
24. Assume that a third-party company is planning to maintain an CO3 A 12
employee management system with employee details such as
employee name, name of the company, salary, manager name,
company address and residential address. The schema for the above
details can be represented as:
Worksin (employeename, companyname, salary)
Locatedin (companyname, companyaddress)
Managedby (employeename, managername)
Livesin (employeename, residentialaddress)
By keeping the above schemas as a reference, express in terms of SQL
and relational algebra for the below queries
i. Find all the employees who work in a specific company who are
from Mumbai. [3 marks]
ii. List the name of the employees with their company details, who
earn more Rs. 1,00,000 as salary [3 Marks]
iii. List the name of the companies which pays more than the average
salary paid for all the employees [3 Marks]
iv. Find the name of the employee, with his residential address, who
earns the maximum salary [3 Marks]
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Recognize the role of database administrator and database management systems in software
applications and other advanced concepts.
CO2 Use query language to retrieve data efficiently from the database.
CO3 Design the database for the given specification of the requirement using ER method and
normalization.
CO4 Design and implement significant database objects such as file structures and index schemes.
CO5 Describe techniques for transaction processing and concurrency control.
CO6 Implement security in database.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 3+1 1 12+1 18
CO2 4 12+1 17
CO3 1 12 12 28
CO4 5 3 8+1 17
CO5 3 12+1 12 28
CO6 12 1 3 16
124
Course Code 20CS2017 Duration 3hrs
Course Name DEEP LEARNING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)

1. Consider the following figure. Is it a linearly separable data? CO1 A 1

2. Name the type of weight regularization which tends to move all the CO2 U 1
weight values to smaller values.
3. Recognize the optimization algorithm that use both the learning rate CO4 R 1
parameter and momentum in weight updation equation.
4. If the input image is of size 7x7 and the size of the filter is 3x3, what will CO2 A 1
be the size of the resultant feature map if stride=1 and padding = 0?
5. Identify the number of parameters in VGG-16 architecture. CO2 A 1
6. CO5 An 1
List the applications corresponding to the following Recurrent Neural
Network (RNN) architecture.

7. Mention the purpose of using L1 regularization in autoencoder. CO3 U 1


8. List the deep learning based generative modeling algorithms CO3 R 1
9. Define policy in reinforcement learning. CO1 U 1
10. Identify the word2vec functionality represented in the following figure. CO5 An 1
PART – B (6 X 3 = 18 MARKS)

11. List at least three activation functions along with its mathematical CO1 An 3
notations.
12. Apply the concept of Biological Neural Network (BNN) to design a CO1 A 3
simple artificial neuron and calculate the output for the following
scenario.
Consider a 3-input neuron has weights (0.1, 0.2, 0.3) and the
corresponding inputs are (1, 1, 1) respectively. If the following
thresholding activation function is used, what will be the output of a
single-layer perceptron?
Output: 1 if Net Input > 0.2
: 0 Otherwise
13. Discuss the two key interesting properties of CNN. CO2 U 3
14. Explain the types of stochastic gradient descent optimization techniques. CO4 U 3
15. State the advantages of Generative Adversarial Networks (GAN). CO3 U 3
16. Compare undercomplete and sparse autoencoders. CO4 An 3

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Calculate the coefficients of simple linear regression model of the CO1 A 8
form y=a0+a1x for the following dataset and estimate the output for
x=11.
X 2 5 7 10 12
Y 3 7 9 12 14

b. Explain the concept of converting non-linear data to linear data for CO1 An 4
classification purpose using Support Vector Machine (SVM) with
suitable illustration.
18. a. Define learning. Outline the training algorithm used in Perceptron CO1 A 9
network. Apply the algorithm to classify the OR Boolean function
(2-dimensional inputs) into two groups. Show the updated weight
values after one iteration.
Use Net = 1 if Net >= 0.5
= 0 if Net < 0.5
The initial weight vector = [0.1, 0.2], learning rate parameter = 0.2
b. Apply multiple layer perceptron and calculate the output at node u 3 CO1 A 3
using unipolar sigmoidal function (Note: learning rate =1).

19. a. Consider an input image of size 32x32x1 and explain the concepts of CO2 A 7
every layer of AlexNet architecture. Show the size of the output
image at every layer.
b. Consider the following input image and filter. CO2 A 3

Apply the given filter on the input matrix with a stride of 1 and
padding of 0. Obtain ONLY the first and last elements of the
convoluted matrix.
c. An input image has been converted into a matrix of size 25 X 25 and CO2 A 2
applied with a filter of size 5 X 5 with a stride of 2 and padding of 0.
What will be the size of the convoluted matrix?

20. a. Use mathematical notations and explain the concepts of different CO4 An 6
types of adaptive optimization algorithms.
b. State the purpose of regularization techniques. How dropout and CO4 An 6
early stopping techniques will ensure good generalization capability
of the network?

21. a. Draw the architecture and explain the operation of Long Short Term CO2 U 8
Memory (LSTM) in detail using mathematical representations.
b. Compare the gates of LSTM and “Gated Recurrent Units” CO2 An 4
22. a. State the benefit of ResNet architecture compared to other transfer CO2 An 4
learning models. List the variants of ResNet models.
b. Discuss the important blocks of ResNet architecture with neat CO2 An 8
sketch.

23. Justify the following statement with suitable architecture and CO4 An 12
explanations: “Variational autoencoder” is better than the original
autoencoder approach.
COMPULSORY QUESTION

24. Discuss in detail the following techniques: CO5 U 12


i. Word2Vec to handle large corpus of text
ii. Object recognition and computer vision
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the basics of deep learning
CO2 Implement various deep learning models
CO3 Realign high dimensional data using reduction techniques
CO4 Analyze optimization and generalization in deep learning
CO5 Explore the deep learning applications
CO6 Apply the algorithms to real time problems

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 1 24 7 32
CO2 12 14 16 42
CO3 1 4 5
CO4 1 3 27 31
CO5 12 2 14
CO6
124
Course Code 20CS2018 Duration 3hrs
Course Name DESIGN AND ANALYSIS OF ALGORITHMS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Calculate the space complexity of the following algorithm:
Algorithm sum (p,q,r)
{
1. p=1; CO1 An 1
q=2;
r=p + q;
}
Write the recurrence relation representing the time complexity
computation of the below-given function:
int Recursive(A, n):
2. if n > 0: CO1 U 1
return Recursive(A, n) + Recursive(A, n-1)
else:
return 1
Express the code word for the character 't' from the Huffman tree given.

3. CO2 U 1

Write the time complexity of scheduling tasks with deadlines using a


4. CO2 U 1
Greedy method.
Identify the optimal parenthesizing for multiplying a matrix chain for
the given M and S table.
M Table S Table
1 2 3 4 1 2 3 4
5. CO3 U 1
1 0 24 28 58 1 1 1 3
2 0 16 36 2 2 3
3 0 40 3 3
4 0 4
6. State the time complexity of the dynamic programming approach to CO6 R 1
solve the all-pairs shortest path problem.
Estimate the time complexity of the solution to matrix chain
7. CO3 An 1
multiplication.
8. Discuss the solution for the two queens' problem. CO4 U 1
9. Define the Topological Sorting of a graph. CO5 R 1
10. Differentiate class P and class NP problems. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
State the definitions of Big Oh (O), Big Omega (Ω), and Big Theta (Ɵ)
11. CO1 R 3
Notations.
For searching a Pattern, P[0..m-1], in a Text, T[0..n-1], the Brute Force
approach is applied. Estimate the number of comparisons needed to
12. find the indices in which the pattern is found. CO2 An 3
Text: A A B A A C A A D A A B A A B A
Pattern: A C B A
Apply the dynamic programming approach to compute the longest
13. CO3 A 3
common subsequence between "SPHERE" and "METRE".
Compute the upper bound and cost of the root node and the two child
nodes of the root in the state space tree of the Branch and Bound
solution to the following instance of the 0/1 knapsack problem:
Knapsack weight W = 7

14. CO4 A 3

Construct a minimum spanning tree by applying Prim's algorithm for


the below graph.

15. CO5 A 3

16. Describe NP-hard and NP-complete problems. CO6 R 3


PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
a. Explain the steps in mathematical analysis of recursive algorithms
17. CO1 U 6
with an example.
b Apply Master's theorem to represent the solution of the following
. recurrence relations using the asymptotic representations:
i. F(n) = 6 F(n / 3) + n2 log n CO1 A 6
ii. F(n) = 7 F(n / 3) + n2
iii. F(n) = 3 F(n / 3) + √n
a. Assume that you are given five jobs. The execution of each job
requires 1 unit of time. Each Job Ji has profit Pi and deadline di.
Profit Pi is earned if Job Ji is completed before dith unit of time.
Calculate the maximum profit earned and the sequence of jobs that
achieves the maximum profit.
18. CO6 A 6

b Find the optimal solution for the fractional knapsack problem by


. applying a greedy approach.
No of items (n): 5
Knapsack capacity: 70 kg. CO2 A 6
The weights and profits of each item are given as follows:
(w1, w2, w3, w4, w5) = (6, 12, 18, 25, 28)
(p1, p2, p3, p4, p5) = (31, 20, 35, 40, 90)

Compare with an illustration of how the binary search tree differs


from the optimal binary search tree and construct the optimal binary
search tree for the following keys and their associated probabilities
by applying the dynamic programming approach.
19. CO6 An 12
Key A B C D E

Probabilit 17 32 18 45 25
y

a. Given a weighted digraph G=(V, E) with weight, determine the


shortest path length between all pairs of vertices in G using Floyd's
algorithm for the following graph and its adjacency matrix.

20. CO3 A 4

b Solve the knapsack problem by applying the dynamic programming


. method. The capacity of the knapsack, m=12. Represent the
solution using the state space tree
CO3 A 8
Profit 10 15 6 8 4

Weight 4 6 3 4 2

a. Demonstrate the solution to the N-Queens problem with the


21. CO4 U 8
algorithm using Backtracking.
b Illustrate the backtracking solution for the sum of subsets problem
CO4 U 4
. by using the state space tree for S = {3, 5, 6, 7} and d = 15 by using
Calculate the number of bits required for fixed-length encoding of
the message "B C C A B B D D A E C C B B A E D D C C". Find
22. the variable length encoding using the Huffman Code method. CO2 A 12
Analyze the solution by comparing it with the fixed-length
encoding.

a. Using Dijkstra's Algorithm, compute the shortest distance from


source vertex '0' to the remaining vertices in the following graph.

23. CO5 A 6

b Consider the undirected graph given. Construct a minimum


. spanning tree by applying Kruskal's algorithm.

CO5 A 6

COMPULSORY QUESTION
a. Compute the max flow from source to sink in the following graph.

24. CO5 A 6

b
State the CIRCUIT-SAT problem and prove that it is in NP. CO6 R 6
.

CO – COURSE OUTCOME BL – BLOOM'S LEVEL

COURSE OUTCOMES
CO1 analyze the given algorithm and express its complexity in asymptotic notation.
CO2 design algorithms using brute force and greedy techniques.
CO3 develop dynamic programming solutions for optimization problems.
CO4 propose solutions using Backtracking and the branch-and-bound technique.
CO5 solve problems using fundamental graph algorithms.
CO6 apply the suitable algorithmic technique to solve a problem and identify the problems belonging
to the class of P, NP-Complete or NP-Hard.

Assessment Pattern as per Bloom's Taxonomy


CO / P R U A An E C Total
CO1 3 7 6 1 - - 17
CO2 - 2 18 3 - - 23
CO3 - 1 15 1 - - 17
CO4 - 13 3 - - - 16
CO5 1 - 21 - - - 22
CO6 10 1 6 12 - - 29
124
Course Code 20CS2021 Duration 3hrs
Course Name DISTRIBUTED COMPUTING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Inter-process Communication. CO1 R 1
2. List the characteristics of Distributed System. CO2 R 1
3. Differentiate Synchronous and Asynchronous Communication. CO3 U 1
4. Differentiate shared memory and distributed memory. CO4 R 1
5. What is concurrency in Distributed Systems? CO5 U 1
6. List the types of system model. CO1 A 1
7. Define Multicast operation. CO1 U 1
8. What is peer to peer system? CO2 R 1
9. Name the two basic file system used in distributed computing. CO1 U 1
10. List out the design issues in threads. CO3 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Write a short note on quality of service in distributed systems. CO1 R 3
12. Write the key design issues for distributed file systems. CO2 U 3
13. What is the need of Name service? CO3 U 3
State the use of election algorithm. Mention the different election
14. CO4 U 3
algorithms.
15. Mention the use of Locking. CO5 U 3
What type of infrastructure is provided by multicast message for
16. CO6 R 3
distributed system?
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Distinguish between Centralized vs Distributed scheduling
17. a. CO1 U 6
algorithm.
b What are the different types of models for developing distributed
CO2 R 6
. systems? Explain each model in brief.

18. a. Differentiate between Structured vs unstructured peer-to-peer CO4 C 6


systems.
b What are the different ways to control concurrency in distributed
CO5 R 6
. transactions? Explain with examples.

Discuss in detail the design and implementation of name services


19. a. CO1 U 6
and Domain Name services.
b
Explain optimistic concurrency control in detail. CO2 C 6
.

20. a. What is resource sharing? Explain. CO3 U 6


b What are the characteristics of inter-process communications?
CO5 E 6
. Explain.

21. a. Explain about Sun network file system. CO3 R 6


b
Discuss the design issues for Remote Procedure Call. CO4 U 6
.

Write short notes on Napster and its legacy and Peer to Peer
22. a. CO2 C 6
Middleware.
b
Explain directory services. CO1 R 6
.

23. a. Briefly discuss the architecture and server operation of NFS. CO1 R 6
b What are the different ways of synchronizing physical clocks?
CO2 U 6
. Explain.
COMPULSORY QUESTION
24. a. Explain the basic model for the management of replicated data. CO1 U 6
b
Explain passive replication model for fault tolerance. CO2 R 6
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the distributed system models.
CO2 Classify inter-process communication mechanisms and their application scenarios.
CO3 Illustrate a transaction and concurrency control scheme for a real time application.
CO4 Compare the various file system architectures used in distributed systems.
CO5 Construct a real time distributed system with suitable IPC, event coordination, file management,
name service, transaction and concurrency control mechanisms.
CO6 Evaluate an efficient distributed system and its qualities.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 16 14 1 6 - - 37
CO2 14 9 - - - 12 35
CO3 7 1 - 9 - - 17
CO4 1 9 - - - 6 16
CO5 - 1 6 3 6 - 16
CO6 3 - - - - - 3
124

Course Code 20CS2022 Duration 3hrs


Course Name EMBEDDED SYSTEMS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define ambient intelligent. CO1 R 1
2. Describe the dependence graph. CO1 U 1
3. Show the syntax of data flow modelling in VHDL. CO2 U 1
4. Explain the term “package diagram” CO2 U 1
5. Define the assignment part in scheduling decisions. CO3 R 1
6. Explain the term “loop bound”. CO3 U 1
7. State the significance of GPUs. CO4 R 1
8. Define charge coupled devices sensor. CO4 R 1
9. Recall the data that is collected by profiler for each task node. CO5 R 1
10. Visualize the structure of FPGA based emulation. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Develop the sample requirement form for vending machine. CO1 A 3
12. Trace the block diagram of “calling an answering machine”. CO2 U 3
13. List out the factors that determine the worst case of execution time. CO3 R 3
14. CO4 A 3

Compute the energy consumption for E0 in t0 execution time, E1 in t1


execution time.
Name the four design patterns for system representation and hardware-
15. CO5 R 3
software partitioning̣ .
16. Outline the flow the software based self-testing concept. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the major steps in the embedded system design process. CO1 U 4
b Illustrate the non-functional requirements of Embedded Systems
CO1 U 8
. process.

18. a. Explain the work flow of Petri Nets with an example. CO2 U 6
b
Describe the dependability requirements of Embedded System. CO2 U 6
.

19. a. Demonstrate full adder circuit with VHDL code. CO2 A 8


b
List out the advantage and disadvantage of the embedded systems. CO1 R 4
.

Consider an embedded operating system with two different tasks


which does not require periodic processes. The processing time of
the first task C1 and the second task C2 are 25 and 35 nanoseconds
20. a. respectively. The deadline of C1 and C2 is 50 and 80 nanoseconds. CO3 An 8
Higher priority and lower priority tasks perform based on
deadline. By using the preemption and non-preemption scheduler
construct the scheduling algorithm.
b
Describe the three parts of scheduling decisions. CO3 U 4
.

Illustrate the working principle of sample and hold phase with


21. a. CO4 U 4
circuit diagram and its waveform.
Consider a simplified design information of an embedded operating
that converts the digital to analog signal. If the digital input is 0
b then the current through the resistor will also be zero. If the digital
CO4 An 8
. input is 1 then the current through resistor will be equal to the
digital bit value. Construct the total current value for 7-bit
(1011001) digital input.

Explain the steps and parts of hardware/software co-design


22. a. CO5 U 8
embedded systems.
b Sketch the flow diagram of directed acyclic graph-based
CO5 R 4
. partitioning.

Compute the periodic scheduling for two different tasks by using


23. a. CO3 A 8
rate monotonic algorithm.
b
Explain the parallel fault simulation. CO6 R 4
.
COMPULSORY QUESTION
Represent and discuss the rapid prototyping with design flow
24. CO6 U 12
diagram of synthesis and validation.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand specific requirements and problems arising in embedded system applications.
CO2 Design embedded systems using formal models and methods as well as computer-based synthesis
methods
CO3 Apply the formal models and methods in embedded system design in practical applications using
the programming language C, the operating system Free RTOS, a commercial embedded system
platform and the associated design environment.
CO4 Describe embedded architectures and components, hardware-software interfaces, memory
architecture, communication between components.
CO5 Explain embedded operating systems, real-time scheduling theory, shared resources, and
hardware architecture synthesis.
CO6 Identify validation and testing methodologies for embedded system

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 5 13 3 21
CO2 17 8 25
CO3 4 5 8 8 25
CO4 2 4 3 8 17
CO5 8 8 16
CO6 5 15 20
124
Course Code 20CS2024 Duration 3hrs
Course Name ETHICS IN INFORMATION TECHNOLOGY Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)

1. Review the importance of business ethics. CO1 U 1


2. Quote the principles of code of conduct implemented in Intel company. CO1 R 1
3. Differentiate virtues and vices. CO3 U 1
4. Recall Quality Circle. CO3 R 1
5. Describe cyberstalking in an organization. CO4 U 1
6. Distinguish white box testing and black box testing. CO2 U 1
7. Identify the problems associated with whistle blowing. CO3 U 1
8. List the ethical issues of social networking website. CO5 R 1
State the steps involved in developing a Business Continuity Plan (BCP)
9. in an organization. CO6 R 1
10. Infer the term delegated ownership. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Sketch the fishbone diagram for the following statement: CO1 U 3
“Late for work”
12. Examine the importance of confidentiality and integrity. CO2 A 3
13. Evaluate some actions that colleges can take to combat student CO4 E 3
plagiarism and list the plagiarism tools.
14. Justify the cause of poor-quality software developed by programmers. CO3 E 3
15. Illustrate the background of Contingent Workers. CO5 A 3
16. Define cyberbullying and numerous forms of cyberbullying. CO5 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Summarize on the approaches considered for ethical decision CO1 E 12
making.

18. Classify the leadership styles and discuss on any 3 leadership styles CO2 An 12
with examples.
19. Discuss on the steps undertaken to file a patent with a supporting CO2 U 6
flow diagram.
Interpret on the various sections and offences of Information Act CO3 U 6
2000.

20. a. Distinguish, why companies require high-quality software in CO4 An 6


business systems, industrial process control systems, and consumer
products.
b. Explain the essential components of a software development CO3 U 6
methodology and also the benefits of using such a methodology.

21. Summarize the strategies of social network advertising and CO4 U 12


elaborate the ethical issues that are considered for social networking
websites.

22. Examine the key ethical issues identified in an IT organization. CO5 A 12

23. Interpret on the terms: CO4 U 12


(i) Reverse engineering
(ii) Copyright infringement
(iii) Trademark infringement
COMPULSORY QUESTION
24. Review on Information Security Management Systems. CO6 U 12
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand professional ethics and organizational culture conduct in information technology.
CO2 Identify the various leadership styles and the suitability for the specific organization.
CO3 Identify the possible Computer crimes and the rules and regulations for protection.
CO4 Familiarize with the various types of IPR and the procedures for obtaining IPR.
CO5 Understand about the various types of Social Networking and issues.
CO6 Relate to the different national and international organizational model with intellectual ability.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 1 4 - - 12 - 17
CO2 - 7 3 12 - - 22
CO3 1 14 - - 3 - 18
CO4 - 25 - 6 3 - 34
CO5 1 - 12 3 - - 16
CO6 4 13 - - - - 17
124
Course Code 20CS2026 Duration 3hrs
Course Name FOUNDATIONS OF BLOCKCHAIN Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Recall the generation of blockchain that has applications beyond
1. CO1 R 1
currency and finance.
Name the term that arbitrarily encompasses any behaviour that is
2. CO1 R 1
unexpected or malicious.
3. Show the shift function for the row values 1, 2, 3, 4. CO2 U 1
4. Give example for a hardware wallet. CO2 U 1
5. List the types of entity authentication. CO3 R 1
6. Infer the term "Bitcoin" with a lowercase b. CO3 U 1
Recite the feature of a smart contract that will always produce the same
7. CO4 R 1
output for a specific input.
Quote the term for the study of protocols governing the decentralized
8. CO4 R 1
digital economy.
State the term that will execute exactly what is written and not what
9. CO5 R 1
the programmer intended.
10. List the key elements of Artificial Intelligence that are decentralized. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
List out the principal challenges associated with blockchain, especially
11. CO1 R 3
in sectors other than banking.
12. Restate the purpose of Near Field Communication technology. CO2 U 3
13. Interpret transaction malleability. CO3 U 3
14. List the properties of Ricardian Contracts. CO4 R 3
15. Define code reuse. CO5 R 3
16. State the limitations of the existing payment system. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Summarize the principle behind blockchain technology and how
17. a. CO1 U 6
many types of it are available.
b Apply Brewer's theorem and describe why a distributed system CO1 A 6
. can't have consistency, availability, and partition tolerance
simultaneously.

Apply the below table values and design the Advanced Encryption
Standard cipher with a suitable diagram.
No. of rounds Cipher Key
18. a. Size CO2 A 6
10 128
12 192
14 256
b Describe how Merkle trees allow secure and efficient verification of
CO2 R 6
. large data sets.

Employ an encoding technique to convert mnemonics to seeds to


19. CO4 A 12
produce the output as a 512-bit value.

Develop the structure of Blockchain and explain how the block is


20. a. CO3 A 6
linked to its previous block.
Summarize on:
b i) Orphan block
CO3 U 6
. ii) Stale block
iii) Genesis block

21. a. Compare and contrast between proof of work and proof of stake. CO3 U 6
b Explain how proof of elapsed time promises higher performance
CO3 U 6
. with its time-based election mechanism to achieve consensus.

Enumerate on:
i) Non-deterministic wallets
22. ii) Deterministic wallets CO2 R 12
iii) Hierarchical deterministic wallets
iv) Brain wallets

Give examples and emphasize the best practices followed in smart


23. CO4 U 12
contracts.
COMPULSORY QUESTION
24. a. Explain how Cardano improves Ethereum for secure development. CO6 U 6
b With suitable architecture, explain the concept of the Hyperledger
CO6 U 6
. Sawtooth Supply Chain.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the necessity of blockchain and realize where blockchain fits in.
CO2 Compare and contrast cryptocurrencies, blockchain, and concept of wallets.
CO3 Relate classical consensus algorithms with modern algorithms like Proof-of-Work.
CO4 Illustrate the uses of programmable blockchains, smart contracts and oracles.
CO5 Comprehend the various use cases and synergistic layered approach with AI/ML/IOT etc.
CO6 Design and develop blockchain based applications using the principles of cryptoeconomics .
Assessment Pattern as per Bloom’s Taxonomy
CO / P R U A An E C Total
CO1 5 6 6 - - - 17
CO2 18 5 6 - - - 29
CO3 2 21 6 - - - 29
CO4 5 12 12 - - - 29
CO5 4 - - - - - 4
CO6 4 12 - - - - 16
124
Course Code 20CS2027 Duration 3hrs
Course Name GEOMETRIC MODELLING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. Define solid geometry. CO1 R 1
2. Describe refresh rate in computer graphics. CO1 R 1
3. Distinguish between object space and world space. CO2 A 1
4. Visualize window-to-viewport mapping. CO2 R 1
5. Differentiate global and local illumination. CO4 U 1
6. Compare texture magnification and minification. CO5 An 1
7. Compare the three types of Bezier curves. CO3 E 1
8. Construct an example for a 3x5 Bezier patch. CO3 C 1
9. List the elements of 3D graphics. CO6 R 1
10. Write notes on rendering and compositing. CO4 A 1
PART – B (6 X 3 = 18 MARKS)
11. Infer on the usage of geometric primitives. CO1 C 3
Distinguish between right-handed and left-handed 3D Cartesian coordinate
12. CO2 E 3
systems.
13. Summarize bump mapping for volume textures with example. CO4 E 3
14. Illustrate color model transformations. CO3 An 3
15. Examine NURBS in 3D modeling. CO5 A 3
16. Write notes on polygon approximation, reduction and expansion. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss in detail the image processing techniques for computer
CO3 U 6
graphics with illustrative examples.
b. Formulate Digital Differential Analyzer (DDA) algorithm. CO3 C 6

18. a. Explain the steps and techniques involved in 2D computer animation


CO1 An 6
using raster graphics.
b. Summarize boundary fill and flood fill algorithms. CO3 E 6
Compile the steps of Cohen-Sutherland and Liang-Barsky line clipping
19. a. CO3 C 6
algorithms.
Examine the following 3D transformations: translation, rotation, and
b. CO2 A 6
scaling with suitable examples.

Tabulate the metrics for distance, area and volume used by standard
20. a. CO3 R 6
3D modeling tools.
Explain the concepts of perceived color, colorimetry and color model
b. CO4 U 6
transformation.

21. Review 3D texture mapping types with practical use cases. CO4 U 12

22. a. Describe the rendering techniques in 3D with examples. CO4 R 8


b. Write notes on 3D reconstruction. CO5 A 4

Discuss with examples of the usage and application of curves and


23. CO5 U 12
surfaces, splines and patches in computer graphics.
COMPULSORY QUESTION
Explain in detail advanced 3D modeling techniques: revolve,
24. a. CO6 U 8
extrusion, sweeps, lofts and boundary surfaces.
b. Illustrate CAD and its applications in the 3D world. CO6 An 4

COURSE OUTCOMES
CO1 Understand the basics of geometric modelling techniques in computer-aided design.
CO2 Describe the different coordinate systems and views.
CO3 Explain the tools and mathematical models involved in geometric modelling.
CO4 Identify the appropriate Illumination and rendering techniques for modelling the virtual objects.
CO5 Implement various algorithms to map and render the basic geometrical primitives into complex
models.
CO6 Apply the geometric modelling concepts in the development of CAD applications.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 6 3 11
CO2 1 7 3 11
CO3 8 6 3 7 13 37
CO4 6 19 1 3 29
CO5 20 7 1 28
CO6 4 4 8
124
Course Code 20CS2029 Duration 3hrs
Course Name INFORMATION RETRIEVAL AND TEXT ANALYSIS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
1. List down three types of data. CO3 R 1
2. Recite the science from which Information Retrieval is evolved. CO1 R 1
3. Name the best-known relevance feedback method. CO4 R 1
4. State the final procedure in process of Logical View of the Documents. CO1 R 1
Internet is dumped with Unstructured data, Structured Data, and Semi-
Structured data which increases the complexity, how this issue can be
5. solved? Justify your answer with an example CO1 E 1
6. Infer the formula for recall and precision. CO4 U 1
7. Interpret the ways by which the thesaurus is created. CO4 A 1
8. Define Meta Search Engine. CO5 R 1
Identify which two main classes perform well in the Meta-Search
9. Combination Algorithms. CO5 U 1
10. Distinguish between the in-links and out-links of a directed graph. CO4 U 1
PART – B (6 X 3 = 18 MARKS)
11. Differentiate between browsing and retrieval. CO1 U 3
12. Sketch the taxonomy of information retrieval models. CO1 A 3
13. Describe an inverted file with an example. CO2 U 3
14. List the ways to improve recall in search. CO4 R 3
15. Interpret the two main tasks of Meta-Search. CO4 U 3
16. Infer the directed graph with an example. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Illustrate the vector space model with the algebraic expression and list CO2 A 6
its advantages and disadvantages.
b Explain the logical view of the document with a diagram. CO1 An 6
.
18. Infer the Probabilistic Model and write its advantages and CO1 U 12
disadvantages.
19. a. Explain the process of retrieving information with a diagram. CO1 An 6
b Describe the Boolean model with set theory and list the advantage and CO2 R 6
. disadvantages of the Boolean model.
20. a. State the global analysis method to produce the thesaurus. CO4 R 4
b Define Query Expansion and explain the ways by which the thesaurus CO3 R 8
. is created with example.
21. a. State the steps of how min heap is used for selecting top k out of N. CO4 R 8
b Sketch how the keywords and documents are arranged in the tired CO4 A 4
. index and describe it with an example.
22. Enumerate the steps for Borda ranking and Condorcet Ranking. CO4 R 12
23. a. Illustrate the working of the Page Rank algorithm and explain the CO5 A 6
problems in the Page Rank calculation.
b Express your views on Social Network Analysis. CO5 U 6
.
COMPULSORY QUESTION
24. a. Explain the boosting techniques associated with web spam in detail. CO4 An 6
b Infer your views on Byes net and list down the applications of Byes net. CO6 U 6
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Design an effective text indexing system.
CO2 Familiar with the Boolean and vector-space retrieval models.
CO3 Identify the evaluation and interface issues in text processing.
CO4 Understand IR techniques for the web, including crawling, link-based algorithms, and metadata
usage.
CO5 Develop Document clustering and classification applications.
CO6 Compare traditional and machine learning-based ranking approaches.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 15 3 12 1 - 33
CO2 6 3 6 - - - 15
CO3 9 - - - - - 9
CO4 28 5 5 6 - - 44
CO5 1 10 6 - - - 17
CO6 - 6 - - - - 6
124
Course Code 20CS2030 Duration 3hrs
Course Name INTERNET OF THINGS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List the applications of Internet of Things. CO1 R 1
2. Define Actuator. CO1 R 1
3. Name the components of Smart Home. CO2 R 1
4. Illustrate the security systems of Smart Home. CO5 U 1
5. Select any two inertial sensors for monitoring elderly patients. CO3 U 1
6. State the functionality of Textile Clothing. CO3 R 1
7. Write the sensors used for diagnosis of Neurological diseases. CO4 A 1
8. Review the privacy issues with IoT. CO5 U 1
9. Recall the number of Digital pins in Arduino Uno. CO6 R 1
10. Define COMBAT drones. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Describe the importance of disposal and recycling of electronic waste
11. CO1 R 3
generated by IoT devices.
12. Discuss the ESP8266 controller specifications. CO2 U 3
Appraise the system design of sample collection in wearable chemical
13. CO3 An 3
and biochemical sensor.
14. Illustrate the sensor used for detecting cardiovascular diseases. CO3 A 3
Sketch the block diagram of interfacing sensors with NodeMCU for
15. CO4 A 3
agricultural field automation.
16. Differentiate the types of drones based on their body structure. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Sketch the architecture of IoT and explain the working of the
17. CO1 A 12
connected devices in detail.

18. Relate a real-time scenario of a smart home automation and discuss CO2 A 12
the sensor and communications needed for the following
applications
a. Smart heater and cooling
b. Smart Lighting
c. Smart Furniture

Determine a scenario in which a patient is not safe in the


environment, and hence eventually, it becomes inevitable for at
19. a. least one caregiver to be with him all the time for Parkinson CO3 An 8
disease. Illustrate how IoT can help the caregiver in such critical
time when he/she is not available.
b
CO2 U 4
. Explain the elements of a biosensor.

Describe any four wearable assistive non-invasive devices available


20. CO3 U 12
for paralytic patients.

21. a. Illustrate the role of Arduino in the field of agriculture. CO4 A 8


b Describe any one case study to illustrate the advantages of IoT in
CO4 U 4
. Agriculture.

Discuss the merits and demerits of Raspberry Pi and Arduino Uno


22. CO4 U 12
with diagram specifications.

23. a. Paraphrase the types of Connected Devices. CO1 U 8


b Summarize the key differences between UX for IoT and UX for
CO1 U 4
. digital services.
COMPULSORY QUESTION
24. a. Explain in detail the assembly of drones with suitable diagrams. CO6 U 8
b Discuss the basic requirements needed for drone delivery system in
CO6 U 4
. rural areas.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 understand Internet of Things and its hardware and software components
CO2 interface I/O devices, sensors & communication modules
CO3 examine remote data and control devices
CO4 compare the connectivity technologies and protocols in IoT
CO5 infer security issues in IoT
CO6 develop real life IoT based projects

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 5 12 12 - - - 41
CO2 - 8 12 - - - 20
CO3 1 13 3 11 - - 28
CO4 - 16 12 - - - 28
CO5 - 1 1 - - - 2
CO6 4 6 7 - - - 17
124
Course Code 20CS2031 Duration 3hrs
Course Name INTRODUCTION TO DATA SCIENCE Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Differentiate the role of data scientist and data analyst. CO1 U 1
Identify the python command that includes list of all columns with their
2. CO1 R 1
data types and the number of non-null values in each column.
3. Infer the characteristics of scatterplots. CO2 U 1
Write a python code to insert the new row of data {‘Institute’: KITS,
4. CO1 A 1
‘Degree’:B.Tech} at the bottom of the DataFrame.
Discover the broader range dataset among given A and B.
5. A = [6, 19, 21, 3, 7, 28] CO2 A 1
B = [8, 25, 45, 10, 7]
6. Differentiate point estimate and confidence interval estimates. CO2 U 1
A regression model with the following function y = 60 + 5.2x was built
to understand the impact of humidity (x) on rainfall (y). The humidity
7. CO3 A 1
this week is 30 more than the previous week. What is the predicted
difference in rainfall?
Compute the classification Precision from the given confusion matrix.

8. CO6 A 1

9. Define hybrid recommendation systems. CO6 R 1


10. Give the advantage and disadvantage of collaborative filtering. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Construct the data frame using the following structures
11. 1. Numpy array CO1 A 3
2. Dictionary
A dataset has columns as age, gender and country. Express using CO1 U 3
python code the given operations.
12. ● Group the dataset by gender.
● Display the 2nd and 3rd column.
● Display the 10th tuple of the dataset.
Calculate the central tendency measures of the following data:
13. CO2 A 3
25,34,12,34,78,93,34,26,12,34
Describe the taxonomy of machine learning techniques with suitable
14. CO3 R 3
examples
15. Examine the need for a graph-based clustering technique. CO4 R 3
Differentiate collaborative and content based recommendation system
16. CO6 U 3
with suitable example.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Examine the taxonomy of properties of data with suitable examples. CO1 R 6
b Discuss on pros and cons of the python libraries used by a data
CO1 U 6
. science engineer.

18. a. Product Price Bill No GST Purchase Seller


(Rs) (%) Date
iPad 30,000 1246 15% 1/5/2022 Apple
Laptop 95,000 5132 12% 12/10/2021 Dell
Mouse 999 0034 5% 18/4/2020 Dell
Keyboard 1520 1893 4% 19/12/2021 HP
RAM 4589 9843 5% 1/1/2023 Intel
Pendrive 1200 3126 2% 23/5/2020 HP
Airpods 1820 9001 5% 1/5/2022 Apple
Graphics 3879 1234 7% 27/5/2022 Intel
card
CO2 A 6
Refer the above dataset and write suitable python code for the
below operations:
(i) Import necessary libraries and Import the data as
dataframe.
(ii) Display the top and bottom 3 rows.
(iii) Display the seller who sold gadgets for high amount.
(iv) Group the dataset as seller wise.
(v) Find the total amount spend on laptop and its related
accessories.
(vi) Add a new column “Net Price” . Where Net
Price=Price+GST
b X = [ 2019, 2020, 2021, 2022, 2023]
. Y = [10, 12, 14 ,16, 18]
CO2 A 6
Illustrate five data visualization graphs for the above dataset with
appropriate labelling and python code snippet.

19. a. Sales 90 85 68 75 82 80 95 70
No. Of
7 6 2 3 4 5 8 1
Ads CO2 U 6
Calculate the Spearman rank correlation coefficient of the
following sample dataset which describes the sales and number of
advertisements. Infer the correlation.
b A researcher reports that the average salary of assistant professors CO2 A 6
. is more than $42,000. A sample of 30 assistant professors has a
mean salary of $43, 260. At alpha = 0.05, test the claim that
assistant professors earn more than $42,000 a year. The standard
deviation of the population is $5230.Justify the hypothesis.

20. Discuss the working principle of the decision tree for classification
with the ID3 algorithm.Compute the root node and decision for the
following Dataset

CO4 A 12

21. Appraise K-Means clustering algorithm.Use K-Means clustering


algorithm to divide the following data into two clusters and plot the
output. Assume the initial centroid points are C1={2,1} and
C2={2,3}. CO3 An 12

X1 1 2 2 3 4 5
X2 1 1 3 2 3 5

22. Given the dataset {a,b,c,d,e} and the following distance matrix,
cluster the given dataset using single-linkage hierarchical
agglomerative clustering. Also construct the dendrogram tree.
a b c d e
a 0 9 3 6 11 CO3 A 12
b 9 0 7 5 10
c 3 7 0 9 2
d 6 5 9 0 8
e 11 10 2 8 0

23. a. For the given data below


a) Calculate the Fitted regression line
b) Estimate the likely demand when the price is Rs.25
Price(Rs) 10 12 13 12 16 15 CO5 An 6

Amount 40 38 43 45 37 43
Demanded
b The given dataset is of Food varieties. In this dataset, we have 3
. attributes which have Sweetness level, Crunch level and food types.
Food Types have a target attribute. In target attribute, we have three
food types they are Fruits, Vegetables and Proteins and our target
finds the nearest food type which belong from three food types CO5 A 6
using the k-Nearest Neighbours.

Ingredients Sweet Level Crunch Level Food Type


Grapes 8 5 Fruit
Green Beans 3 7 Vegetables
Nuts 3 6 Proteins
Orange 7 3 Fruit
Apply KNN algorithm with K=3 and predict the type of the new
unlabelled ingredient found with the following features.
Ingredients Sweet Level Crunch Level Food Type
Tomato 6 4 ?
COMPULSORY QUESTION
24. a. Final year Computer Science and Engineering student wants to do CO5 An 8
the relevant courses in UDEMY. Evaluate the type of recommender
systems used for this application.
b Estimate the similarity score between users for the given utility CO6 U 4
. matrix using cosine similarity.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Remember the key concepts of data science, data characteristics, its applications, and the toolkit
used by data scientists.
CO2 Recall the mathematical concepts for descriptive and statistical analysis of the given dataset.
CO3 Discuss on the principle operation of various supervised and unsupervised machine learning.
CO4 Select appropriate mathematical machine learning techniques for solving real-world problems.
CO5 Apply the relevant techniques for implementing solutions to solve real-world problems.
CO6 Access the performance of prediction, classification, and recommendation of machine learning.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 7 10 4 - - - 21
CO2 - 8 22 - - - 30
CO3 3 - 13 12 - - 28
CO4 3 - 12 - - - 15
CO5 - - 6 14 - - 20
CO6 2 7 1 - - - 10
124
Course Code 20CS2032 Duration 3hrs
Max.
Course Name MACHINE LEARNING TECHNIQUES 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Identify the type of machine learning approach involved in the following
problem statement:
1. CO1 U 1
“To study a bank credit dataset and make a decision about whether to
approve the loan of an applicant based on his profile”.
2. Define reinforcement learning. CO1 R 1
Assume the mean and standard deviation as 13.25 and 4.6 respectively.
3. Estimate the normalization value of 20 using Z-Score normalization CO2 U 1
technique.
List at least 2 benefits of performing feature selection of the given dataset
4. CO2 R 1
before using it in machine learning algorithm.
5. Consider 3 input neurons with weight link values of (0.3, 0.2, 0.3) and
input vector of (2, 1, 1). If the following thresholding activation function
is used, calculate the output of a single-layer perceptron. CO3 A 1
Output: 1 if Net Input > 0.5
: 0 Otherwise
6. Summarize the techniques to handle imbalanced dataset. CO3 U 1
7. Differentiate soft and hard clustering. CO4 U 1
Assume two cluster centroids C1:(9, 2) and C2:(3,4) in K-Means
8. clustering algorithm. Determine the cluster number to which the new data CO4 A 1
point (4, 3) belongs to.
9. Distinguish between classification and regression tree algorithm. CO5 U 1
10. List the performance evaluation metrics of regression task. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Apply the find-S algorithm to the following dataset and derive the most
specific hypothesis that fits all the positive instances.
Color Toughness Fungus Appearance Poisonous

Green Hard No Wrinkled Yes CO1 A 3

Green Hard Yes Smooth No

Brown Soft No Wrinkled No


Orange Hard No Wrinkled Yes

Green Soft Yes Smooth Yes

Green Hard Yes Wrinkled Yes

Orange Hard No Wrinkled Yes


Apply wavelet transform and convert the following dataset to wavelet
12. coefficients. CO2 A 3
S = [2, 2, 0, 2, 3, 5, 4, 4]
13. Illustrate the multiclass classification approaches with suitable example. CO3 U 3
14. Analyze the given figure, classify and describe the type of data points p, q
and r for the given value of minpts = 4.

r CO4 An 3

15. Consider the given dataset and calculate the weighted average for the
‘Outlook’ attributes using the decision tree algorithm.
Outlook Temperature Windy Play Golf
Sunny Hot FALSE No
CO5 An 3
Overcast Hot FALSE Yes
Sunny Mild TRUE No
Sunny Cool TRUE Yes
Overcast Hot TRUE Yes
Discuss the importance of grid search optimization technique in tuning
16. CO6 U 3
the hyperparameters of machine learning models.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Analyze the given dataset and derive specific and general hypotheses
using Candidate Elimination Algorithm.
S.No Citation Size Library Price Edition Buy
1 Some small No Affordable One No CO1 An 6
2 Many Big No Expensive Many Yes
3 Many Medium No Expensive Few Yes
4 Many small No Affordable Many Yes
b Discuss the concept of geometric and logical models of machine
CO1 R 6
. learning techniques with proper examples.

18. a. A professor interviewed 7 students to find out the number of hours


they spent studying for the final exam. Their responses are: 5, 7, 8, 9, CO2 An 6
9, 11, and 13. Calculate the mean, standard deviation, and IQR.
b In real-world data, tuples with missing and noisy values for some
. attributes are a common occurrence. Describe the various methods for CO2 U 6
handling these problems.

19. Apply the Naive Bayes classifier on the given dataset and determine CO3 A 12
the class output of the given test instance :
<sunny, cool, high, strong>
Outlook Temperature Humidity Wind Play Tennis
Sunny Hot High Weak No
Sunny Hot High Strong No
Overcast Hot High Weak Yes
Rain Mild High Weak Yes
Rain Cool Normal Weak Yes
Rain Cool Normal Strong No
Overcast Cool Normal Strong Yes
Sunny Mild High Weak No
Sunny Cool Normal Weak Yes
Rain Mild Normal Weak Yes
Sunny Mild Normal Strong Yes
Overcast Mild High Strong Yes
Overcast Hot Normal Weak Yes
Rain Mild High Strong No

20. a. Apply perceptron learning algorithm for the given OR gate and
update the weights for one iteration. Assume the initial weights as
W1=0.4, W2=0.1, threshold >= 0.3 and learning rate= 0.2.
X1 X2 Y
0 0 0 CO3 A 6
0 1 1
1 0 1
1 1 1
b Calculate the TPR and FPR for the thresholds greater than 0.9, 0.8,
. 0.7, 0.6, 0.34 and plot ROC curve for the calculated values.
Tuple Class Probability
1 P 0.94
2 P 0.82
3 N 0.75 CO3 A 6
4 P 0.65
5 P 0.62
6 N 0.58
7 N 0.66
8 N 0.44

21. a. Analyze the given distance matrix and construct a dendrogram using a CO4 An 6
single linkage agglomerative clustering algorithm.
A B C D E F
A 0
B 0.23 0
C 0.22 0.14 0
D 0.37 0.19 0.13 0
E 0.34 0.14 0.28 0.23 0
F 0.24 0.24 0.1 0.22 0.39 0
b
CO4 U 6
. Explain the working principle of Self Organizing Map algorithm.

22. a. Cluster the following eight points ((x, y) representing locations) using
K-Means algorithm to find the three cluster centers after the first
iteration.
CO4 A 6
A1(2, 10), A2(2, 5), A3(8, 4), A4(5, 8), A5(7, 5), A6(6, 4), A7(1, 2),
A8(4, 9)
Initial cluster centers are: A1(2, 10), A4(5, 8) and A7(1, 2).
b State why the ensemble methods may improve the accuracy of the
CO3 U 6
. classifier? Explain the working principle of Bagging and Boosting.

23. Apply the decision tree algorithm on the following dataset and
identify the root node of the tree. (Note: Input attributes: Age, Sex,
BP, and Cholesterol, Output attribute: Drug)
Age Sex BP Cholesterol Drug
Young F High Normal Drug A
Young F High High Drug A
Middle-age F High Normal Drug B
Senior F Normal Normal Drug B
Senior M Low Normal Drug B
CO5 A 12
Senior M Low High Drug A
Middle-age M Low High Drug B
Young F Normal Normal Drug A
Young M Low Normal Drug B
Senior M Normal Normal Drug B
Young M Normal High Drug B
Middle-age F Normal High Drug B
Middle-age N High Normal Drug B
Senior F Normal High Drug B
COMPULSORY QUESTION
24. a. Explain the performance metrics to evaluate the multiclass classifier
in detail. Calculate precision per class, recall per class, accuracy, and
F1-score for the given confusion matrix.
Predicted --------------->
A B C D CO6 A 6
A 9 1 0 0
Act
B 1 15 3 1
ual
C 5 0 24 1
D 0 4 1 15
b Illustrate the various cross validation strategies with suitable
CO6 U 6
. examples.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Recall the concepts, mathematical background, applicability, limitations of existing machine
learning techniques.
CO2 Explain the simple feature engineering steps.
CO3 Apply suitable linear / nonlinear / probabilistic machine learning algorithms for a given task.
CO4 Demonstrate the working principle of distance based algorithms to handle unlabeled data.
CO5 Distinguish tree and rule based machine learning algorithms and appropriately apply to the
suitable application.
CO6 Evaluate the performance of machine learning models using suitable metrics.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 7 1 3 6 - - 17
CO2 1 7 3 6 - - 17
CO3 - 10 25 - - - 34
CO4 - 7 7 9 - - 23
CO5 - 1 12 3 - - 16
CO6 1 9 6 - - - 16
124
Course Code 20CS2033 Duration 3hrs
Course Name NATURAL LANGUAGE PROCESSING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recognize the lemmatized word, if the original words “trouble”,
CO1 R 1
“troubling” and “troubled” pass through the model.
2. Identify the type of ambiguity in the given sentence: ‘The chicken is
CO1 R 1
ready to eat”.
3. Recall the process whereby meaning representations are composed and
CO2 R 1
assigned to linguistic inputs.
4. Indicate the number of morphemes in the word ‘desirable’. CO2 U 1
5. Choose a proper POS tag for the given statement:
CO3 A 1
‘The sun rises in the east’
6. Represent the morphologically parsed output of ‘caught’ in lexical and
CO3 U 1
surface level.
7. Relate the role of for the given parameter in lexicalized PCFG. CO4 U 1
8. Identify the relation between the head word (booked) and dependent
CO4 U 1
word (flight) in the sentence: ‘We booked her the first flight to Canada’
9. Predict the lexical relationship between the word ‘newspaper’ in the
following sentences:
CO5 A 1
The newspaper was delivered early today
The newspaper recruited a new journalist
10. Select the named entities in the sentence: "Yesterday, Elon Musk
announced that SpaceX will launch a manned mission to Mars in CO6 An 1
2024".
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Review the possible types of errors created by keyboard mistyping and CO1 U 3
11.
phonetics.
Describe the orthographic rules used in finite state morphological CO2 U 3
12.
processing, with examples.
Analyze the challenges in CKY parsing and propose appropriate CO3 An 3
13.
remedies for the issues identified.
14. Evaluate the parsing metrics recall, precision and F1 Score for the given CO4 E 3
Gold standard and parsed output of the statement ‘Saw the man with a
telescope’
Categorize the possible design choices for matrix type, weighting, CO5 An 3
15. dimensionality reduction and vector comparison in order to build a
distributional semantic model.
Examine the anatomy of an entity linking system in NLP and illustrate CO6 A 3
16.
the different stages of operation.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the minimum edit distance algorithm for spelling error CO1 A 6
correction and apply Levinstein approach to calculate the edit
distance to transform the word ‘numpy’ to ‘numexpr’, by
constructing a two-dimensional array. (Assume cost for each edit
operation to be 1)
b Calculate the bigram probability of the sentence: CO1 An 6
. <s> The cat chased the dog </s> using a corpus of five sentences:

<s> The cat chased the mouse</s>


<s> The dog barked at the cat</s>
<s> The mouse ran away from the cat</s>
<s> The cat meowed loudly</s>
<s> The dog chased the cat</s>
18. CO2 A 12
Apply Viterbi Algorithm to estimate the appropriate POS tags for
the given sentence: ‘one dog bit’
Transition probabilities are given as:
CD PRP NN VB VBD </s>
<s> 0.5 0.2 0 0.3 0 0
CD 0.2 0 0.3 0.2 0.2 0.1
PRP 0.1 0.1 0 0.3 0.4 0.1
NN 0.05 0.15 0.2 0.25 0.3 0.05
VB 0 0.2 0.6 0 0 0.2
VBD 0 0.1 0.6 0 0 0.3
And the observation likelihoods are given as:
one cat dog bit
CD 0.1 0 0 0
PRP 0.02 0 0 0
NN 0.05 0.03 0.04 0.01
VB 0 0 0.03 0
VBD 0 0 0 0.06
19. Compare and contrast the goal- oriented and data-directed parsing CO3 An 12
methods and build parsing trees using the given rule for the
sentence: “Book that flight”.

20. a. CO4 A 6
Apply CKY algorithm to construct possible parse trees for the
statement “a pilot likes flying planes” with the CNF form given
here. Illustrate the stages of tree construction in detail.

b Analyze the challenges involved in basic probabilistic context free CO4 An 6


. grammar and provide effective solutions to address these issues.

21. Explain the methodology of word embedding using the Word2Vec CO5 U 12
model, and illustrate the two commonly employed architectures for
embedding text data.

22. Describe the steps taken in the Noisy channel model for spelling CO1 U 6
a.
correction in detail.
Discover the significance of string similarity and alignment in spell CO1 U 6
b
correction and explain the initialization, recurrence relation and
.
termination stages of edit distance algorithm.

23. a. Examine the importance of lexical semantics and classify the CO5 An 6
different components of lexical semantics while illustrating each
category with examples.
b Show the schematic representation of a typical information retrieval CO5 U 6
. system and describe the query expansion mechanism employing
distributional semantics.
COMPULSORY QUESTION
24. a. Apply Naive Bayes Classifier for the given dataset to classify the CO6 A 6
content into positive (+) and negative (-) classes, and predict the
class for the test sentence.
b Examine the process of extracting semantic relationships from text
. and analyse the methods employed for performing relation CO6 An 6
extraction.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the different linguistic components of natural language.
CO2 Design a morphological analyzer for a given natural language
CO3 Prefer appropriate parts of speech technique.
CO4 Choose on the appropriate parsing techniques necessary for a given language and applications
CO5 Decide on the appropriate semantic techniques necessary for a given language and applications
CO6 Design application involving natural language.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 15 6 6 - - 29
CO2 1 4 12 - - - 17
CO3 - 1 1 15 - - 17
CO4 - 2 6 6 3 - 17
CO5 - 18 1 9 - - 28
CO6 - - 9 7 - - 16
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 20CS2033 Duration 3hrs


Course Name NATURAL LANGUAGE PROCESSING Max. Marks 100

Q.
No.
Questions CO BL Marks
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recognize the stemmed word, if the original words “trouble”, “troubling” CO1 R 1
and “troubled” pass through the model.
2. Identify the type of ambiguity in the given sentence: ‘The car hit the pole CO1 U 1
while it was moving’.
3. Give two examples for Middle clipped words. CO2 U 1
4. Indicate the number of morphemes in the word ‘unstoppable’ CO2 U 1
5. Choose a proper POS tag for the given statement: CO3 A 1
‘I like to read books’
6. Express the headword in the rule set ‘VP  VP PP’ in Probabilistic CO3 U 1
Context-Free Grammer.
7. Relate the role of for the given parameter in lexicalized PCFG. CO4 U 1

8. Identify the relation between the head word (booked) and dependent word CO4 U 1
(her) in the sentence: We booked her the flight to Canada
9. Predict the context words for the sentence ‘I saw a cute grey cat playing CO5 A 1
the garden’ with C=2, and the centre word ‘cat’.
10. Select the named entities in the sentence: "The CEO of Apple, Tim Cook, CO6 An 1
announced yesterday that the company will be releasing a new iPhone
next month".
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Review the different factors that contribute to ambiguity in natural CO1 U 3
language processing.
12. Categorize the reduplication techniques in morphological process and CO2 U 3
explain them with examples.
13. Analyze the characteristics examined by syntactic analysis in the sentence CO3 An 3
that are not addressed by lexical analysis.
14. Differentiate inflection and derivation from each other in terms of word CO4 An 3
formation processes, and illustrate with examples.
15. Evaluate the parsing metrics recall, precision and F1 Score for the given CO5 E 3
gold standard and parsed output of the statement ‘time flies like an arrow’.
Gold standard:
Parsed output:

16. Summarize the relation extraction process in NLP along with an example. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Examine the two important keywords in spell correction process and CO1 A 6
apply Levinstein approach to calculate the edit distance between
‘ELEPHANT’ to ‘RELEVANT’, by constructing a two-dimensional
array. (Assume cost for each edit operation to be 1)
b. Calculate the bigram probability of the sentence ‘<s> The brown dog CO1 An 6
slept</s> ' using a corpus of three sentences:

<s> The quick brown fox jumped over the lazy dog</s>.
<s> The lazy dog slept all day</s>.
<s> The brown fox is quick and agile</s>
18. a. Estimate the appropriate POS tag for the given newspaper headline CO2 E 6
‘Deal talks fail’ using Viterbi algorithm.

b. Compute the HMM parameters by maximum likelihood estimation CO2 A 6


from the training data(ice cream count for every day) with the
following set of input observations O = {1 ,3,2} and the aligned hidden
state sequences (h, c):

19. Compare and contrast the goal- oriented and data-directed parsing CO3 An 12
methods and build parsing trees using the given rule for the sentence:
“The quick brown fox jumps over the lazy dog”.
S -> NP VP
NP -> Det Adj Noun
VP -> Verb NP Prep NP
Det -> "The"
Adj -> "quick" | "brown" | "lazy"
Noun -> "fox" | "dog"
Verb -> "jumps"
Prep -> "over"

20. Apply probabilistic CKY parser algorithm to parse the sentence "Book CO4 A 12
the Flight Through Houston" using the following set of rules.
Illustrate the stages of tree construction in detail.

21. a Analyze the significance of lexical semantics and categorize the CO5 An 6
various elements of lexical semantics while providing examples for
each.
b Show the conceptual diagram of a typical information retrieval system CO5 U 6
and illustrate the query expansion process using distributional
semantics.

22. a. Appraise the performance of Word Sense Disambiguation model in CO5 An 12


solving the ambiguity and explain the Lesk and Walkers algorithms
used in WSD.

23. a. Describe the steps taken in the Noisy channel model for spelling CO1 U 6
correction in detail.
b. Examine the challenges involved in basic probabilistic context free CO4 An 6
grammar and provide effective solutions to address these issues.
COMPULSORY QUESTION
24. a. Analyse the primary stages of text summarization and illustrate the CO6 An 6
principle behind abstractive and extractive summarization models with
examples.
b. Evaluate the effectiveness of different phases in entity linking, such as CO6 E 6
mention detection, link generation and disambiguation.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL


COURSE OUTCOMES
CO1 identify the different linguistic components of natural language.
CO2 design a morphological analyzer for a given natural language
CO3 prefer appropriate parts of speech technique.
CO4 choose on the appropriate parsing techniques necessary for a given language and applications
CO5 decide on the appropriate semantic techniques necessary for a given language and applications
CO6 design application involving natural language.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 10 6 6 - - 23
CO2 - 5 6 - 6 - 17
CO3 - 1 1 15 - - 17
CO4 - 2 12 9 - - 23
CO5 - 6 1 18 3 - 28
CO6 - 3 - 7 6 - 16
124
Course Code 20CS2035 Duration 3hrs
Course Name OBJECT ORIENTED PROGRAMMING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
Predict the output of the following program:
class Test{
public static void main(String[] args) {
1. int a=4; CO1 U 1
System.out.println(a++ + ++a +a++);
}
}
Identify the output of the following program:
class HelloWorld {
public static void main(String[] args) {
int a=1;
switch(a){
case 1:
System.out.println("One");
case 2:
2. System.out.println("two"); CO1 U 1
break;
case 3:
System.out.println("Three");
deafult:
System.out.println("default");
}
}
}
3. Define the term garbage collection. CO2 R 1
4. State the use of finally block in exception handling. CO2 R 1
5. Demonstrate the ordinal() of enumerations in Java CO3 R 1
6. Name the thread method that creates delay in execution of thread. CO3 R 1
7. List any two subclasses of InputStream class. CO4 R 1
8. Tell the purpose of flush() method in File handling. CO6 R 1
Name the String method used to divide a string into ‘n’ sub string based
9. CO5 R 1
on delimiter.
10. Construct an ArrayList to store three numbers CO5 U 1
PART – B (6 X 3 = 18 MARKS)
Demonstrate a java program to check whether a given number is
11. palindrome or not. CO1 U 3

12. Distinguish between Method Overloading and Method Overriding CO2 U 3


13. Describe the life cycle of the thread with neat sketch. CO3 R 3
Create a Java program to get a string "CSE Department" from the user.
 fetch the last character using the string function
14. CO4 U 3
 find the char 'a' in the string
 find and replace all the 'e' with '$'
15. Demonstrate the file reading using byte stream. CO6 R 3
Illustrate the java code snippet to create the JFrame with the size of
16. CO5 U 3
600X600.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. List out the various features of Java with necessary definition. CO1 R 6
b
Exemplify the Bitwise operators and Logical Operators used in Java. CO1 R 6
.

18. a. Illustrate the working of constructors with an example. CO2 R 6


Create a class called “Customer” with name, age and address as data
b members. Develop the member functions such as add_customer,
CO2 U 6
. edit_customer and display_customer. Demonstrate the above-
mentioned class with five array of objects.

19. a. Demonstrate the two ways of creating threads with an example. CO3 R 6
Describe the following concepts with sample snippets,
b  static data
CO3 R 6
.  this keyword
 finalize method

Write a menu driven program in Java to automate the Banking


operations by demonstrating the concept of multi-level inheritance.
Create custom exceptions to deal with the following situations
20. a. CO4 A 6
a. Account is created with Initial Balance < 500
b. Withdraw operation when balance amount < withdraw
amount
Write a java program to create an abstract class named Shape that
contains two integers and an empty method named print Area().
b Provide three classes named Rectangle, Triangle, and Square such that
CO4 A 6
. each one of the classes extends the class Shape. Each one of the
classes contains only the method printArea () that prints the area of the
given shape.
Distinguish the terms method overloading and method overriding with
21. a. CO3 R 6
suitable example programs.
b
State any ten string handling methods of Java with necessary snippets. CO4 R 6
.

Create a java application that uses multi-threading concept to perform


the following.
i) Getting inputs from user by using the thread name called “T1”.
22. a. CO6 U 6
ii) Perform addition operation using the thread name called “T2”
iii)Perform division operation using the thread name called “T3”

Create a file named ‘D:/Sample.txt’ and write your own profile into
b
the that file and then Copy this file into another location named U 6
. CO6
‘E:/Sample.txt’

Explain the TCP Socket programming model with an example


23. a. CO6 U 6
program to send a message from server to client.
Discuss the Bounded Types in Generic class to handle the hierarchical
b inheritance of Animal, Wild and Domestic and each class is
CO6 A 6
. responsible to display information with respect to their class. Prove the
workability of the above classes through bounded types.
COMPULSORY QUESTION
Design a GUI program using Java Swing API to create a frame
containing two text boxes with labels. When button Add is pressed,
the message “The sum of two inputs given on the text box“ gets
displayed in the dialog box. On pressing OK button frame dialog gets
closed.

24. CO5 A 12

CO – COURSE OUTCOME BL – BLOOM’S LEVEL


COURSE OUTCOMES
CO1 Acquire the knowledge of structure and model of object-oriented programming.
CO2 Identify classes, objects, members of a class and relationships among them needed for a specific
problem.
CO3 Evaluate requirements of software functionality to build an application.
CO4 Design and build robust console-based applications using object-oriented features.
CO5 Develop desktop applications using GUI to solve real-time problems.
CO6 Choose engineering approach to solve problems.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 12 5 - - - - 17
CO2 8 9 - - - - 17
CO3 23 - - - - - 23
CO4 7 3 12 - - - 22
CO5 1 4 12 - - - 17
CO6 4 18 6 - - - 28
124
Course Code 20CS2036 Duration 3hrs
Course Name OPERATING SYSTEMS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define System call. CO1 R 1
Name the three general methods for passing parameters in system call
2. CO1 R 1
to the operating system.
3. Differentiate process and program. CO3 U 1
4. List the three different types of process schedulers. CO2 R 1
5. Recall the definition of signal() in semaphore. CO2 R 1
6. Monitor is defined as an abstract data type. Justify your answer. CO2 C 1
7. Write the various necessary conditions of deadlock. CO4 A 1
8. Distinguish between internal and external fragmentation. CO4 U 1
9. Summarize the directory implementation techniques. CO4 U 1
10. Define seek time and random-access time. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Write short notes on storage hierarchy in operating system. CO1 A 3
12. State the concept of PCB. CO2 R 3
13. Describe the structure of process Pi in Peterson’s solution. CO3 R 3
Calculate the size of memory if its address consists of 22 bits and the
14. CO4 A 3
memory is 2-byte addressable.
15. Discuss various free space management techniques with neat diagram. CO5 U 3
16. Differentiate solid state disk and magnetic tape. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain any two of the operating system structure with neat
17. a. CO1 U 6
diagram.
b
Describe any three major categories of system calls with example. CO1 R 6
.

18. a. Apply priority scheduling to calculate waiting time (WT), CO2 A 6


turnaround time (TAT) of each process and find out average WT
and ATAT. (Lower number signifies higher priority)
Process Burst Time Arrival Time
P1 10 3
P2 1 1
P3 2 4
P4 3 5
P5 5 2
Discuss the merits and demerits of the following:
b a) Synchronous and asynchronous communication
CO2 U 6
. b) Automatic and explicit buffering
c) Direct and indirect communication

19. a. Explain about the various multithreading models with neat diagram. CO2 U 6
Enumerate the following file allocation techniques with neat
b diagram.
CO5 R 6
. a) Linked allocation
b) Indexed allocation

Consider the following snapshot of a system:


Allocation Request Available
A B C A B C A B C
P0 0 1 0 0 0 0 0 0 0
P1 2 0 0 2 0 2
20. a. CO3 A 8
P2 3 0 3 0 0 0
P3 2 1 1 1 0 0
P4 0 0 2 0 0 2
Apply deadlock detection algorithm to find whether the system is in
safe state or not. If yes, write the safe sequence.
Consider five memory partitions of size 100 KB, 500 KB, 200 KB,
450 KB and 600 KB in same order. If a sequence of requests for
b
blocks of size 212 KB, 417 KB, 112 KB and 426 KB in same order CO4 A 4
.
come, then apply the first fit, best fit and worst fit memory
allocation method.

Consider the following reference string


5,0,1,2,3,0,5,2,3,0,3,2,1,2,0,1,5,0,1
21. a. CO4 U 8
for a memory with three (03) frames. Estimate the number of page
faults using FIFO and Optimal page replacement algorithms.
b
Enumerate various file formats and discuss the file attributes. CO3 R 4
.

Show how to implement the wait( ) and signal( ) semaphore


22. a. operations in multiprocessor environments using the test and set( ) CO3 U 6
instruction. The solution should exhibit minimal busy waiting.
b Explain the Dining-Philosopher problem with necessary solution to
CO3 U 6
. ensure it free from deadlock.

23. Paging is a memory management scheme. Draw the paging CO5 R 12


hardware diagram. Write the working procedure of paging
hardware in detail.
COMPULSORY QUESTION
Consider a disk with 200 tracks and the queue has random requests
from different processes in the order:
98, 183, 37, 122, 14, 124, 65, 67.
24. CO6 A 12
Initially the arm is at 53.
Calculate the Average Seek length using FIFO, SSTF, SCAN and
C-SCAN algorithm.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand how operating systems makes it possible for many applications to share resources
and to make programming easier for user space applications.
CO2 Distinguish between user and kernel level operating.
CO3 Analyze the thread context management, synchronization methods and various scheduling
algorithms.
CO4 Apply various memory management schemes especially paging and segmentation in real time
applications.
CO5 Illustrate file systems in operating systems like UNIX/Linux and Windows.
CO6 discover input output management, use of device driver and secondary storage (disk) mechanism.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 6 3 - - - 17
CO2 5 12 6 - - 1 24
CO3 7 13 8 - - - 28
CO4 - 10 8 - - - 18
CO5 19 3 - - - - 22
CO6 - 3 12 - - - 15
124
Course Code 20CS2037 Duration 3hrs

Course Name OPTIMIZATION METHODOLOGIES Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)

Label the parameters which are possessed by each optimization problem.


1. CO1 U 1
2. State any two components of optimization problems. CO1 R 1

Describe the essential characteristics of a linear programming model


3. CO2 R 1

Define an optimal solution


4. CO2 R 1
5. Enumerate mixed integer programming. CO3 U 1

State Pure Integer Programming.


6. CO3 R 1
7. Observe when an optimization problem can be categorized as nonlinear. CO4 U 1
8. State how the dichotomous method arrives at new (x1, x2) values. CO4 R 1

Identify the types of programming where all the variables are constrained
to be integers.
9. CO5 U 1

Explain M/M/1 Queue.


10. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Sketch the flowchart of optimal design procedure CO1 An 3
12. CO2 U 3
Explain why some problems have multiple feasible solutions. How is such
information useful in decision making?

13. CO3 An 3
Summarize the cases considered for sensitivity analysis.
14. Explain how a value is derived in the Golden Section method. CO4 U 3
15. CO5 An 3
Give real time examples on integer programming.

16. Explain the queuing models. CO6 U 3


PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. CO1 R 12
State the optimization problem. Classify and explain various types of
optimization problems with examples

18. Solve the LPP using revised simplex method to Maximize Z=2x1+x2 CO2 A 12
subject to
3x1+4x2 ≤ 6
6x1+x2 ≤ 3
X1,x2 ≥ 0

19. Solve the following integer programming integer programming CO3 A 12


problem using branch and bound technique:
Maximize Z = 7x1 + 9x2
Subject to
-x1 + 3x2 < 6
7x1 + x2 < 35
x1 > 0, x2 < 7
x1, x2 integers

20. Solve the following NLPP using Kuhn Tucker method. CO4 A 12
Maximize Z=2x + 2xy+y
Subject to:
3x+2y=12
x1, x2 >=0

21. Determine how much should be the shipment from the milk plant to CO5 A 12
the distribution centre so that the total cost of shipment is minimum.

A dairy firm has three plants located throughout a state. Cost of


shipping milk from each plant to each distribution centre is given in
the following table in hundreds of rupees:
22. Explain the elementary concepts in optimization methodology. CO1 U 12

23. Solve the LPP using simplex method CO2 A 12


Maximize Z= 3x1+4x2
Subject to:
x1+x2 ≤4 50
2x1+x2≤ 600
x1,x2 ≥ 0
COMPULSORY QUESTION
24. CO6 U 12
Explain in detail about the M/G/1 queue with suitable examples.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Formulation of optimization problems.
CO2 Define and use optimization terminology and concepts.
CO3 Describe the appropriate the linear programming techniques.
CO4
Choose the appropriate optimization for real world problems.

CO5 Customize the optimization methodologies for real time problems .


CO6 Apply the knowledge to solve the queuing problems.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 13 13 3 - - - 29
CO2 2 3 24 - - - 29
CO3 2 3 12 - - - 17
CO4 1 4 12 - - - 17
CO5 - 2 12 3 - - 17
CO6 - 15 - - - - 15
124
Course Code 20CS2039 Duration 3hrs
Course Name PRINCIPLES OF INDUSTRY 4.0 Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Identify the model that assists in the decline in the cost of compute,
1. storage, and networks, which allows companies to gather and analyze CO4 U 1
much larger amounts of data.
2. Compare humans and robots based on their working capability. CO1 U 1
3. List the five functional domains of Industrial Internet Systems (IIS). CO2 R 1
4. Give the components of Network Functionality Virtualization (NFV). CO3 A 1
5. Name the fundamental core of any M2M or IIoT architecture. CO5 R 1
6. Define Network Address Translation. CO1 R 1
7. Recall Delay Torrent Networks (DTN) CO2 R 1
8. Define Weightless standard. CO3 R 1
Discuss the need for security in manufacturing industry with an
9. CO6 U 1
example.
10. List the design principles of industry 4.0. CO5 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Name a few key industrial internet of things (IIOT) Technologies. CO1 R 3
Illustrate the three-tier topology of the Industrial Internet Systems (IIS)
12. CO2 An 3
and its application in industrial internet of things (IIOT).
Construct the IPV6 address format with emphasis on the size of the
13. CO3 A 3
address.
14. Compare SOAP and REST protocols of the web services. CO4 U 3
Explain the operational technology (OT) manufacturing network with a
15. CO5 U 3
clear diagram.
16. Define industry 4.0. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Examine the catalysts and precursors of the industrial internet of
17. a. CO1 A 6
things (IIOT).
b Describe the following: a) Intelligent Devices b) The Digital and
CO1 U 6
. Human Workforce.
Connect wireless technology to cyber physical systems with related
18. CO2 An 12
examples.

Explain the key system characteristics of the industrial internet of


19. a. CO3 A 6
things (IIS).
b Paraphrase the features of Data Management for establishing the
CO3 U 6
. industrial internet of things (IIS).

Identify and explain devices that enable us to transition one


20. protocol to another, in the case of the Industrial Internet it is CO4 U 12
typically between a native protocol and Ethernet.

Appraise the publish/subscribe process with more research on the


21. CO5 E 12
various publish/subscribe Protocols.

Describe the IIoT Device Low-Power WAN Optimized


22. CO3 U 12
Technologies for M2M.

Illustrate Industrial Internet Architecture Framework (IIAF) with


23. CO4 An 12
clear emphasis on viewpoints and domains.
COMPULSORY QUESTION
Summarize all the building blocks of industry 4.0 and the reference
24. CO6 U 12
architecture of industry 4.0.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the drivers and enablers of Industry 4.0.
CO2 Define the smartness in Smart Factories, Smart cities, smart products and smart services.
CO3 Understand the various systems used in a manufacturing plant and their role in an Industry 4.0
world.
CO4 Summarize the power of Cloud Computing in a networked economy.
CO5 Express the opportunities, challenges brought about by Industry 4.0 and how organizations and
individuals should prepare to reap the benefits.
CO6 Identify the security challenges involved in industry 4.0.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 3 2 12 17
CO2 1 4 12 17
CO3 3 2 12 17
CO4 1 12 1 3 17
CO5 1 18 6 3 28
CO6 1 12 12 3 28
124
Course Code 20CS2042 Duration 3hrs
Max.
Course Name REAL TIME OPERATING SYSTEMS 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Give examples for real time operating system. CO1 U 1
2. Define hard real time operating system. CO1 R 1
3. Define distributed systems. CO2 R 1
4. Recall the elements of task control block. CO2 R 1
5. Express the role of scheduler in real time operating system. CO3 U 1
6. Enumerate the types of scheduling algorithms. CO3 R 1
7. State sytem on chip. CO4 R 1
8. List the types of multicore processors in embedded systems. CO4 R 1
9. Name the storage devices that are used in embedded systems. CO5 R 1
10. Identify the various mechanisms for transferring data between tasks. CO5 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List the applications of real time operating system. CO1 R 3
12. Summarize the usage of tick in real time systems. CO2 U 3
13. Differentiate the preemptive and non-preemptive scheduling algorithm. CO3 An 3
14. Explain the priority inversion problem. CO4 U 3
Indicate the different forms of communication to support task
15. CO5 U 3
interactions.
16. Identify the most suited application areas for mixed mode systems. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Discuss about the architecture of real time operating system. CO1 U 8
b
Give examples for firm real time operating system. CO1 U 4
.

Describe the various structures of symmetric multicore


18. a. CO2 U 8
multiprocessor in embedded system.
b
Summarize the usage of binary semaphores. CO2 U 4
.

Consider the four tasks such as Task 1, 2, 3 and 4 and its type,
response time, computation time and period is listed in the table
below.

Task Type Response time Computation Period


(milliseconds) time (milliseconds
(milliseconds) )
1 Periodic 20 10 100
2 Periodic 18 15 120
19. a. CO3 An 8
3 Aperiodic 110-Deadline 5 -
4 Aperiodic 5-Deadline 2 -

Analyze the priority-based pre-emptive static scheduling policies


for all tasks in the table and schedule it according to the priority as
a function of
 Response time
 Computation time
 Periodicity
b Analyze the issues of job scheduling in asymmetric multiprocessor
CO3 An 4
. systems.

Explain the task coordination mechanisms using a condition flag


20. a. CO4 U 8
group.
b Classify the strategies that are used for dealing with deadlocks in
CO4 U 4
. embedded system.

Analyze how the digital information is stored in embedded system


21. a. CO5 An 8
and describe the volatile digital storage devices.
b Discuss about the consequences of memory allocation and
CO5 U 4
. fragmentation in random access memory.

Differentiate the priority inheritance and priority ceiling protocol


22. a. CO4 An 8
with relevant examples.
b
CO4 U 4
. Summarize the features of real time operating system.

Construct an embedded system application for solving the shared


23. a. resource problems using a mutual exclusion mechanism with single CO4 A 8
flag.
b Describe about the working principle of a simple monitor
CO2 U 4
. mechanism.
COMPULSORY QUESTION
24. a. Construct an embedded system application using binary semaphore CO6 A 8
in a railway system signals as shown in the figure below.
Depending on the signal position by using semaphore decide
whether a train can proceed or must stop at this point.
An automated materials handling industry that uses two robots such
as a pallet transport robot and a materials loader/unloader
(palletizer) robot. The transport robot’s function is to move the
b pallets about the factory, while the palletizer robot’s function is to
CO6 A 4
. unload and/or load items onto the pallets (palletizing). All
operations are controlled by software, in particular a transport task
and a palletizing task. Determine a mechanism to synchronize the
materials handling robot activities.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 understand the concepts of real-time systems and modeling
CO2 outline the potential benefits of distributed systems
CO3 analyze the time complexity in job handling
CO4 design real time embedded systems using the concepts of RTOS
CO5 identify and evaluate the storage management policies with respect to different storage
management
CO6 design applications in Embedded systems by using RTOS

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 4 13 17
CO2 2 19 21
CO3 1 1 4 11 17
CO4 2 19 8 8 37
CO5 1 8 8 17
CO6 3 12 15
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 20CS2042 Duration 3hrs


Course Name REAL TIME OPERATING SYSTEMS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define kernel. CO1 R 1
2. Express the usage of soft real time operating system. CO1 U 1
3. Identify the purposes of mutex. CO2 R 1
4. Classify the types of multiprocessor structures in embedded systems. CO2 U 1
5. List the types of scheduling policies in real time systems. CO3 R 1
6. Give examples for non-preemptive scheduling algorithms. CO3 U 1
7. Identify the need of dynamic memory allocation. CO4 R 1
8. Recall the memory leakage problem in random access memory. CO4 R 1
9. Name the two major categories of solid-state drives. CO5 R 1
10. Infer the usage of memory protection unit. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Differentiate the general purpose operating systems with real time operating
11. CO1 An 3
systems.
12. Indicate the demerits of semaphore. CO2 U 3
13. Infer the merits of preemptive scheduling algorithms. CO3 U 3
14. Identify the necessary conditions before deadlock can occur. CO4 U 3
15. Give examples for volatile storage devices in embedded system. CO5 U 3
Express the three key decisions when designing and implementing the
16. CO6 U 3
application software.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Summarize the characteristics of real time operating system. CO1 U 8
b
CO1 U 4
. Discuss about the hard real time operating system.

Illustrate the factors that determine the mapping of software onto


18. a. CO2 An 8
hardware in real time embedded distributed applications.
b Describe how to tackle the issues of software structuring in a distributed
CO2 U 4
. computer system.

19. a. Consider the three tasks like Task 1, Task 2 and Task 3. Task 1 has the CO3 A 8
lowest priority and Task 3 has the highest priority. Their arrival times
and execute times are listed in the table below. Apply the preemptive
and non preemptive scheduling algorithm to calculate the execution time
for all tasks to complete its operation.
Execution
Task Name Arrival Time(s)
Time(s)
Task 1 15 50
Task 2 35 50
Task 3 55 40
b
CO3 U 4
. Describe the working principle of round robin scheduling algorithm.

Assume that a shared resource is a single car parking space for a drop-
off, pick-up zone in a restaurant as shown in the figure.

20. a. CO4 A 8
Users before trying to park a car they must first check that the space is
free. An access control interface which consists of a:
 ‘Request’ pushbutton - A user presses this to signal the car park
attendant that entry is required to the car park.
 ‘Finish’ pushbutton - A user presses this on exit to inform the
attendant that the car park is once again free.
 Loudspeaker - The car park attendant uses this to answer the
customer’s request.
Construct an embedded system application using a simple monitor
mechanism to make sure that only one car can enter the parking area.
Explain how to use binary semaphores for notifying occurrences of an
b
event from a task or thread and for notifying another task waiting for CO3 U 4
.
that event.

Develop a mailbox application system using a synchronization


21. a. CO4 A 8
mechanism to show how the communication between tasks is achieved.
b Analyze the structures of loosely coupled and closely coupled
CO4 An 4
. multicomputer in embedded system.

Analyze how the digital information is stored in non volatile digital


22. a. CO5 An 8
storage devices.
b Differentiate between the volatile and non volatile storage devices in
CO5 An 4
. embedded system.

Develop a mechanism to tackle the partitioning and allocation of


23. a. CO6 A 8
application software in real time systems.
b Describe the priority based pre-emptive earliest deadline dynamic
CO3 U 4
. scheduling algorithm.
COMPULSORY QUESTION
Illustrate the steps to prevent deadlock occurrences in real time
24. a. CO6 An 8
operating systems.
b Discuss about the task or thread allocation in asymmetric CO4 U 4
. multiprocessors in embedded system.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 understand the concepts of real-time systems and modeling
CO2 outline the potential benefits of distributed systems
CO3 analyze the time complexity in job handling
CO4 design real time embedded systems using the concepts of RTOS
CO5 identify and evaluate the storage management policies with respect to different storage
management
CO6 design applications in Embedded systems by using RTOS

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 13 3 17
CO2 1 8 8 17
CO3 1 16 8 25
CO4 2 7 16 4 29
CO5 1 3 12 16
CO6 4 8 8 20
124
Course Code 20CS2044 Duration 3hrs
Course Name REINFORCEMENT LEARNING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recall the role of reinforcement learning in a chess game. CO1 R 1
Recall the two feedbacks used in multi-armed bandits with the non-
2. CO1 R 1
associative setting.
Represent the functional components of reinforcement learning with a
3. CO1 U 1
neat diagram.
4. Define state transition and probability transition in Markov decision. CO2 R 1
Recall the different types of simulators used in the Markov decision
5. CO2 R 1
process.
6. List down a few classical algorithms used in dynamic programming. CO3 R 1
7. Recall the two standard approaches used in dynamic programming. CO3 R 1
8. List down any two real-time Monte Carlo applications. CO4 R 1
Define the operations used for Monte Carlo control without exploring
9. CO5 R 1
starts.
Identify a few reinforcement learning applications using recommender
10. CO6 U 1
systems
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Name the two threads that have been used in machine learning to date. CO1 R 3
12. State the bellman’s equation and its elements used in MDP problems. CO2 R 3
Describe the policy evaluation used for state-value function in
13. CO3 U 3
reinforcement learning.
Describe how the Monte Carlo method is used to estimate the policy
14. CO4 U 3
value.
Examine the reproduction of state aggregation cases within the linear
15. CO5 A 3
framework.
Examine the ethical issues that take place in artificial reinforcement
16. CO6 A 3
learning for solving real-world problems
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Discuss the working concept of the n-armed bandit problem for slot
17. a. machines and identify the possible outcome of a jackpot with a CO1 U 6
minimum of four rollers with 12 combinations of labels.
Visualize an apartment with 5 rooms; each door has a bidirectional
way of entering and exiting the rooms. Only one room carries the
reward point of 500 dollars. Apply the Q-learning technique and
represent the scenario in a graph of states, edges, and steps.

b
CO1 A 6
.

Visualize a deer hunting ground, where the tribes decide to go deer


hunting or not in a nearby forest to ensure long-term returns. Each
18. a. deer generates a fixed return. However, if the tribes hunt beyond a CO2 A 8
limit, it can result in a lower yield next year. Identify the MDP
states, actions, policy, and its graphical representation.
Discuss the use of the pick-and-drop robotic arm problem in
b
industrial automation and identify the MDP states, actions, and CO2 U 4
.
policies with a neat graphical representation.

Visualize a grid world of 8x8 size to which the non-terminal states s


= {1, 2, 3 …64} and actions A = {up, down, right, left} are
19. a. CO3 R 9
initialized. Demonstrate the iterative policy evaluation and
represent the random policy for n number of steps.
b Discuss the steps involved in iterative policy evaluation and its
CO3 U 3
. outcome

Discuss the working concept of the Monte Carlo method used in the
20. a. blackjack game and show the total number of possibilities of the CO4 U 9
strike, hit and draw in a neat diagram.
b Discuss the role of Monte Carlo Control and identify the steps
CO4 U 3
. involved in the Monte Carlo ES algorithm.

Examine the effect on learning the size of the receptive fields in


21. a. CO5 A 12
coarse coding using linear function approximation

Discuss the following theorem used in dynamic programming with


its equations
22. a. 1. Policy improvement theorem CO3 U 9
2. Policy iteration
3. Value iteration
b Discuss the parameters involved in the bell curve as the frequencies CO3 U 3
. of the outcome generated by the Monte Carlo simulation.

Discuss the working concept of Off-policy prediction via


23. a. CO4 U 9
importance sampling with a suitable example
b Discuss the off-policy every-visit MC control algorithm using
CO4 U 3
. weighted importance sampling
COMPULSORY QUESTION
Construct a recommender system for a healthcare application
holding four medical conditions from 30 to 70. Identify the
24. CO6 A 12
medication and age as key factors in building the recommender
system for social awareness.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the basics of Reinforcement learning.
CO2 Formalize problems as Markov Decision Processes.
CO3 Analyze the utility of dynamic programming for industrial applications and problems.
CO4 Apply Monte Carlo reinforcement learning algorithms.
CO5 Implement policy gradient methods and linear methods for function approximation.
CO6 Recognize current advanced techniques and applications in RL.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 5 7 6 18
CO2 7 4 6 17
CO3 11 18 29
CO4 1 27 28
CO5 1 15 16
CO6 1 15 16
124
Course Code 20CS2045 Duration 3hrs
Course Name RFID TECHNOLOGIES Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)

1. List few applications of RFID. CO1 R 1


2. Define backscatter coupling Tags. CO1 R 1
3. State the two levels of tag protocols. CO2 R 1
4. List types of shift keying in RFID communications. CO2 R 1
5. List the standards for animal identification. CO3 R 1
6. Recite the standard for container identification CO3 R 1
7. Identify the threats in RFID based public transport. CO4 R 1
8. Define confidentiality. CO4 R 1
9. Recall how RFID can be used for sporting applications. CO5 R 1
10. List few traditional access control mechanisms. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Describe the components of RFID. CO1 U 3
12. Discuss two types of coupling in RFID. CO2 U 3
13. Recall few applications of smart antenna in RFID. CO2 R 3
14. List the standards for contactless cards. CO3 R 3
15. Summarize various threats associated with tags in RFID CO5 U 3
16. How are RFID used in public transports. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Discuss various application types of RFID. CO1 R 12

18. a. Tabulate the frequencies of RFID CO2 U 2


b. Explain the flow of energy between the tag and the reader. CO2 R 10
19. Discuss briefly the antennas of RFID CO3 R 12

20. Identify suitable card and standard for the following applications CO3 A 12
i. Ear Tags pierced for animals
ii. Money transfer through debit/credit cards
iii. RFID based billing system
iv. Mass stock entry in warehouse

21. a. It is observed that an ATM debit cards of a particular bank is CO4 A 6


compromised. Suggest suitable privacy enabling technologies to
mitigate the attack.
b. Sketch the security zones in RFID. CO4 R 6

22. Discuss the categories of NFC. CO5 U 12

23. A car company manufacturing unit shifts its product from warehouse CO6 C 12
to shipping yard. Design a suitable RFID based supply chain
management for the above case study.
COMPULSORY QUESTION
24. Devise a smart RFID system for oil and gas industry. CO6 An 12
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the architecture of RFID, types of readers and tags and their protocols.
CO2 Interface RFID based systems with smart antennas and various levels of frequencies.
CO3 Apply the appropriate RFID configuration for effective communication.
CO4 Analyze the security and privacy issues, standards of RFID technologies.
CO5 Compare the influence of RFID technologies in different case studies.
CO6 Design and deploy RFID based real time Industrial Applications.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 14 3 17
CO2 15 5 20
CO3 17 12 29
CO4 8 6 14
CO5 1 15 16
CO6 1 3 12 12 28
124
Course Code 20CS2046 Duration 3hrs
Course Name ROBOTIC PROCESS AUTOMATION Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
1. List the types of BPO strategies. CO1 R 1
2. Identify the main difference between mainframe era and PC revolution. CO1 U 1
Quote the various factors to determine Total Quality Management
3. (TQM). CO2 R 1
4. Cite some factors that tracks ROI for RPA. CO2 U 1
5. Select any one data source for an In-House type of data. CO3 R 1
6. Classify the different types of log message available in UiPath. CO3 U 1
7. Quote any one best practice involved during the bot development. CO4 R 1
8. State how the security issues are handled using CyberArk. CO4 R 1
Select an important difference between UiPath Orchestrator and UiPath
9. Studio. CO5 R 1
10. List the salient features of PEGA. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Enumerate on few downsides of RPA. CO1 R 3
12. Identify the different belt levels of six sigma. CO2 U 3
13. List the different types of variables allowed in UiPath. CO3 R 3
14. Define White box testing. CO4 U 3
15. Identify the type of data that is extremely important for building AI CO5 U 3
models.
16. Compare and contrast between UiPath Orchestrator and UiPath Studio. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. Discuss on the following technology : CO1 U 12
a. Cloud computing.
b. Database.
18. a. Discuss on the Six Sigma Roles and Levels for a sample project. CO2 U 6
b. Determine the factors to be considered for using a consulting firm CO2 A 6
when planning a RPA along with a case study.
19. Discuss on the types of loops available in UiPath along with CO3 U 12
suitable illustrations and examples.
20. Illustrate and discuss on the frameworks for change management. CO4 A 12
21. Discuss on the various types of AI algorithm along with an example CO5 U 12
22. Describe the various steps involved during the process of data CO5 U 12
mining.
23. Discuss on the following leading RPA vendors: CO6 U 12
a. UiPath
b. IQ Bot
COMPULSORY QUESTION
24. a. Explain how process mining differs from the traditional method and CO6 U 6
its advantage.
b. Discuss on the privacy and ethical factors that need to be considered CO6 U 6
across countries and company.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Articulate the history of RPA technology, benefits, drawbacks, and comparisons to other
automation technologies.
CO2 Examine the implementation of RPA and ensure its processes are in good shape
CO3 Choose the right RPA software by considering its costs, training, functionality, and security.
CO4 Create a bot to develop the UiPath and establish the workflow structures.
CO5 Evaluate the bots and ensure its functionality through scaling and optimization.
CO6 Review the large and small RPA software developers and vendors.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 4 13 17
CO2 1 10 6 17
CO3 4 13 17
CO4 2 3 12 17
CO5 1 27 28
CO6 28 28
124
Course Code 20CS2047 Duration 3hrs
Course Name ROBOTICS Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name few applications of an industrial robot. CO1 R 1
2. Write about safety issues in robot. CO1 R 1
3. State the sensors which are used to detect the motion. CO3 R 1
Identify the robot which is used to clean the main circulating pump in
4. CO3 U 1
nuclear power plant.
5. Name the issues of vision-guided robotics. CO4 R 1
6. Select the actuator to use in the cleaning robot. CO4 U 1
7. Classify the types of locomotion. CO4 An 1
8. Recall the various controlling methods. CO5 R 1
9. Identify grippers are used to transfer ferrous material. CO5 U 1
10. Select the Situatable locomotion for Aquatic robot. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. State the “Laws of Robotics”. CO2 R 3
12. Distinguish between forward and reserve kinematics. CO1 U 3
13. List the applications of machine vision system. CO3 R 3
14. Summarize the physical characteristics in sensor selection. CO4 U 3
15. State the transfer function. CO6 R 3
16. List any three advantages of a pneumatic actuator. CO5 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
List the basic components of a robotic system. Explain the
17. CO1 U 12
functions of each of the components with a neat sketch.

18. a. List the features of Gazebo. CO1 R 6


b
CO2 A 6
. Evaluate the forward kinematics of the 2D manipulator.
19. a. State and explain the physical characteristics in sensor selection. CO3 U 6
b
Classify the various types of sensors. CO4 U 6
.

20. a. Explain the different types of actuators and its limitations. CO3 U 6
b
Explain the pneumatic actuators system with diagram. CO4 U 6
.

Discuss the different types of control systems based on controlling


21. CO6 U 12
location with suitable examples.

22. a. Explain the various applications of computer vision in robotics. CO5 U 6


b
CO5 U 6
. Discuss the steps involved in vision sensors.

Describe the working principle of following sensors


23. a) Ultrasonic Sensors. CO3 U 12
b) IR proximity sensor.
COMPULSORY QUESTION
Identify the type of locomotion used for the following scenario and
justify the answer. “A developer needs to design the robot for
detecting
24. a. CO6 A 6
land mines, Robot will be used in different terrain, Developer
should
select a locomotion method which will be used effectively”.
Consider the delivery company want to design a robot for delivery
b product As robotic developer select and justify the proper actuators
CO6 A 6
. and locomotion which will increase quality of service provided by
company.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Perform kinematic and dynamic analyses with simulation.
CO2 Design control laws for a robot.
CO3 Integrate mechanical and electrical hardware for a real prototype of robotic device.
CO4 Select a robotic system for given application.
CO5 describe the different physical forms of robot architectures.
CO6 develop simple robot control systems integrating perception, planning, and action

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 15 23
CO2 3 6 9
CO3 4 25 29
CO4 1 16 1 18
CO5 4 13 `17
CO6 4 12 12 28
124
Course Code 20CS2050 Duration 3hrs
Course Name SOFTWARE ENGINEERING Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define software engineering. CO1 R 1
2. Why Crystal is called a family of agile methods? CO1 A 1
3. What is requirement engineering? CO2 R 1
4. List the negotiating requirements in software engineering. CO2 U 1
5. List the stages involved for designing a software. CO3 U 1
6. Define Control coupling. CO3 U 1
7. Distinguish between verification and validation. CO4 A 1
8. State the primary objective of Technical Reviews (TR). CO4 R 1
9. Differentiate Six sigma and ISO 9000. CO5 U 1
10. Define software project management? CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List the task regions in spiral model. CO1 R 3
12. Mention the three types of requirements identified by QFD? CO2 R 3
13. What are the different types of Cohesion? CO3 R 3
14. Why is cyclomatic complexity important? CO4 U 3
15. Compare size-oriented metrics with function oriented metrics CO5 U 3
16. List out the task set for project planning process. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain a scenario where RAD model is preferable compare to all
17. a. CO1 An 6
the other models.
b Write a short note on Adaptive Software Development (ASD) and
CO1 U 6
. SCRUM.

With a suitable example discuss the various elements involved to


18. a. CO2 A 6
build the Requirements model.
b Write short notes on the list given below:
CO2 R 6
. (i) Negotiating requirements (ii)Validating requirements

19. a. Explain the various design concepts in software engineering. CO3 U 6


b Illustrate in detail about the three golden rules of user interface
CO3 U 6
. design.

20. a. Describe in detail the various Object-Oriented Testing Strategies. CO4 U 6


b
Compare and contrast black box and white box testing. CO4 An 6
.

21. a. Write a short note on SCM Repository. CO5 U 6


b
Summarize the elements of Software Quality Assurance task. CO5 U 6
.

Explain in detail about the COCOMO II model for software cost


22. a. CO6 U 6
estimation
b Discuss about the Risk management in the software development
CO6 U 6
. life cycle.

23. a. Explain in detail the Software configuration Management. CO5 U 6


b Outline the importance of project scheduling and the use of Gantt
CO6 U 6
. charts.
COMPULSORY QUESTION
Compare the different life cycle models based on their
24. a. CO1 An 6
distinguishing factors, advantages and disadvantages.
b Draw the UML use case diagram and class diagram for SafeHome
CO2 U 6
. home security function.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Discover an effective software engineering process to develop software-intensive systems.
CO2 Translate the requirements specification into an implementable design.
CO3 Construct UML diagrams along with design strategies and design patterns.
CO4 Analyze architectural design methods.
CO5 Evaluate the system using various testing strategies.
CO6 Develop the software system with quality measures.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 4 6 1 12 - - 23
CO2 10 7 6 - - - 23
CO3 3 14 - - - - 17
CO4 1 9 1 6 - - 17
CO5 - 22 - - - - 22
CO6 4 18 - - - - 22
124
Course Code 20CS2051 Duration 3hrs
Max.
Course Name SPRING FRAMEWORK 100
Marks

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name the appropriate mapping annotation to accept http post request. CO1 R 1
2. Discover the use of @ResponseBody in spring application controller. CO1 U 1
Name the HTTP method used to update the existing data using
3. CO5 R 1
RestController.
4. State the format of data returned by HTTP Rest API request. CO3 R 1
Discover the reactive data type for the stream that can emit 0 to N
5. CO4 U 1
number of data items.
6. Identify the use of take() method in reactive programming. CO4 R 1
7. State the name of the spring netflix cloud server CO2 R 1
8. Define the use of HashiCorp vault secret store CO6 R 1
9. Identify the JdbcTemplate method used to execute SQL Queries. CO3 R 1
10. Describe the use of RowMapper interface in Spring JDBC. CO4 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Illustrate how to create model and display model data in view template
11. CO3 U 3
with sample spring controller.
12. Describe the RestTemplate methods. CO5 R 3
13. Visualize the reactive stream workflow with a neat sketch. CO1 R 3
14. Describe the two ways of keeping configuration properties secret. CO6 R 3
Illustrate the sample code for sending notifications to interested JMX
15. CO2 U 3
clients.
16. Give an example program to create MBean in spring application. CO4 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Explain the Spring security implementation for authentication and
17. a. CO4 U 6
authorization using In-memory user store.
b Develop spring application programs to demonstrate the following CO1 A 6
. database access operation using JpaRepository with MVC
components.
 Save the given user details(via HTML form) such as name
and emailid in database table called “Users”

Develop the REST controller programs to perform the following


database operations with bank database with table called “Accounts”.
18. a. CO5 A 6
 Update the existing balance of a customer account
 Display the balance amount of a particular customer account.
Illustrate a spring application program to migrate all files from
b
source directory to another destination directory using Spring CO4 A 6
.
Integration API.

Prepare a reactive restful spring application program to perform the


following reactive operations on the account details such as accno,
accname, and balance available in the table called “Account”
19. CO5 A 12
 To get a particular account details by accno.
 To retrieve first 10 account details.
 To save new account details

Write the required programs with mongodb repository for accessing


the documents from mongodb database as given below
20. a. CO6 A 6
 Display all documents
 Save New Document
Construct a program to consume the following Reactive Rest API
b services using WebClient
CO3 A 6
.  http://localhost:8000/getAllProducts
 http://localhost:8000/addProduct

Illustrate the microservice discovery and communication with


21. a. CO2 U 6
suitable example programs.
Discuss the process of managing configurations in spring cloud
b
config server and consume the same using spring cloud config client CO6 U 6
.
service with example programs.

Illustrate Rest API programs to display all the student details such as
22. a. regno, name, and cgpa from database with hyperlinks for update and CO5 U 6
delete using HATEOAS.
Discuss the following related to administering the spring with
examples.
b
 Creating admin server CO4 U 6
.
 Registering Clients
 Exploring the Admin Server

Describe the process of consuming any seven actuator endpoints in


23. a. CO2 R 6
deployed spring with examples.
Write a program to consume the Rest API services for the following
b database operations using RestTemplate.
CO5 A 6
.  Update the existing record
 Delete a particular record
COMPULSORY QUESTION
Develop a spring application programs using DAO pattern
implementation to perform the following database operations.
 Save new movie details such as moviename, budget, rating
24. CO3 A 12
 Display a particular movie details by moviename
 Display all movies
 Delete a particular movie details
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the variety of ancillary members of the spring ecosystem.
CO2 Describe the usage of dependency Injection, microservices in Spring framework.
CO3 Translate the user requirements into enterprise quality web application using Spring MVC.
CO4 Extend the requirements such as security, AOP, transaction to the Spring applications.
CO5 Practice to build RESTful services to the application.
CO6 Prepare and manage configurations for cloud based application.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 4 1 6 - - - 11
CO2 7 9 - - - - 16
CO3 2 3 18 - - - 23
CO4 1 17 6 - - - 24
CO5 4 6 24 - - - 34
CO6 4 6 6 - - - 16
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 20CS2051 Duration 3hrs


Course Name SPRING FRAMEWORK Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Name the dependency used to create view binding template in spring
1. CO2 R 1
application.
Identify the required spring annotation to process the HTTP delete
2. CO1 R 1
request.
3. Discover the use of the RepresentationModel class in HATEOAS. CO5 U 1
4. Label the annotation used for creating controller class with REST API. CO3 R 1
Express the reactive data type for the stream that can emit 0 or 1 data
5. CO4 U 1
item.
6. List the four building blocks of reactive programming CO4 R 1
State the library name that controls the interaction between
7. CO2 R 1
microservices to provide latency and fault tolerance
Identify the name of the secret management tool for keeping
8. CO6 R 1
configuration properties secure.
9. Define the use of ‘/health’ in spring application devleopment. CO6 U 1
10. State the expansion of DAO in spring framework. CO4 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Indicate the appropriate controller class code to read the value from
HTML form given below and display the same.
<form action= “/save” method=”post”>
11. CO3 U 3
<input type=“text” name=“data”>
<input type=“submit” value=“save”>
</form>
12. Describe any three additional components of spring integration. CO4 R 3
Illustrate filter() and map() methods of Flux reactive data type with
13. CO5 U 3
suitable program.
14. Describe about encrypting properties in Git CO6 R 3
List any five Actuator end points to monitor the running spring
15. CO1 R 3
application.
Discuss any three methods of JdbcTemplate for interacting with
16. CO2 U 3
database.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
Illustrate simple spring MVC application to demonstrate the
following components
17. a.  Model CO1 U 6
 Controller
 View
b Discuss the spring security mechanism for authentication and
CO4 U 6
. authorization using In-memory user store.

Develop the appropriate programs to consume the following Rest


API services using RestTemplate
18. a. CO5 A 6
 http://localhost:8000/getMovieInfo/234
 http://localhost:8000/addNewMovie
b Explain the working principle of HATEOAS with necessary
CO2 U 6
. example programs.

Illustrate the appropriate programs to consume the following


Reactive Rest API services using WebClient for the Employee
details.
19. a.  http://localhost:8000/saveNewEmployee CO5 A 12
 http://localhost:8000/deleteEmployee/245
 http://localhost:8000/findEmployee/245
 http://localhost:8000/viewAllEmployees

Develop a spring Reactive Rest API programs to perform the


following database tasks for the book information such as title,
20. a. author and price. CO5 A 6
 Save New Book Details
 Update the existing Book details.
b
Explain the three ways of deploying spring applications CO1 U 6
.

Explain the following with respect to managing configuration


21. a.  Managing properties in config server via github CO6 U 6
 Consuming the shared configuration via config client
Prepare spring application programs to perform the following
b operations in mongodb database with rest controller services.
CO3 A 6
.  Save new student details such as regno, name, cgpa
 Display all student details.

Develop spring integration flow program for polling all the files
22. a. from the directory “D:/movies” to another directory called CO4 A 6
“E:/files”.
b Illustrate the creating microservices and consuming microservices
CO2 U 6
. with suitable example programs.

Describe the process of handling failure and latency in spring


23. a. CO6 R 6
framework.
b Illustrate the message communication between producer service and
CO2 U 6
. consumer service using JmsTemplate.
COMPULSORY QUESTION
24. a. Develop a spring application using JdbcTemplate to perform the CO3 A 12
following database operations with Rest Controller methods
 Save new customer details such as name, accno, balance in
database table “accounts”
 Display all the customer details
 Edit the balance of particular customer details.
 Delete the customer details by accno
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 identify the variety of ancillary members of the spring ecosystem
CO2 describe the usage of dependency Injection, microservices in Spring framework
CO3 translate the user requirements into enterprise quality web application using Spring MVC
CO4 extend the requirements such as security, AOP, transaction to the Spring applications
CO5 practice to build RESTful services to the application
CO6 prepare and manage configurations for cloud based application.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 4 12 - - - - 16
CO2 2 21 - - - - 23
CO3 1 3 18 - - - 22
CO4 5 7 6 - - - 18
CO5 - 4 24 - - - 28
CO6 10 7 - - - - 17
124
Course Code 20CS2052 Duration 3hrs
Course Name SYSTEM ADMINISTRATION Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (10 X 1 = 10 MARKS)
1. Cite a Linux command to archive a file. CO1 U 1
2. List any 2 examples of Yast control center module. CO1 R 1
3. State the full form of VNC. CO2 R 1
4. Cite a Linux command to Manually Retrieve SSH Host Keys. CO2 U 1
Identify the configuration file which encodes information about a service,
5. a socket, a device. CO3 R 1
Cite the Linux command to remove the write permission from the group
6. using chmod.. CO3 U 1
Recall the RPM utility that handles installation and uninstallation of RPM
7. packages. CO4 R 1
Cite the linux command that is used to extract the contents from a zip file
8. when compiling softwares. CO4 U 1
Name the term that describes extended partition from main partition in
9. storage management. CO5 R 1
Name the network time protocol that is used instead of legacy ntpd
10. daemon in SLE15. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. List the 7 different types of files in linux. CO1 R 3
12. State the 3 ways of Connection via SSH. CO2 R 3
13. Define the term sticky bit. CO3 R 3
14. List the disadvantages Of Unpackaged Software. CO4 R 3
15. Differentiate fdisk vs parted. CO5 An 3
16. List the options available to configure logrotate in system logging.. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss the following properties in Suse Linux CO1 U 6
i) Shell environment
ii) Shell aliases
iii) Shell history
b. List the six ways in which you can find the informations about CO1 R 6
commands used in Suse linux.
18. a. Most authentications in Windows environments are done with a CO2 E 6
username-password pair, which works well for systems that share a
common domain. When working across domains, such as between
on-premises and cloud-hosted systems, it becomes vulnerable to
brute force intrusions. By comparison, Linux environments
commonly use public-key/private-key pairs to drive authentication
that doesn't require the use of guessable passwords.
Justify the above statement by enumerating the linux commands to
configure the Key Based Authentication using OpenSSH in Linux.
b. Define Systemd and describe the unit file structure of system’s boot CO2 R 6
process.

19. a. Assume you are working as a system administrator in a company and CO3 U 7
the work assigned to you is to manage the process running in
background and foreground. There you are asked to create three
processes of your choice and manage the process by these following
operations
i) View
ii) Hungup
iii) Terminate
iv) Kill
And set the third process with the highest priority. Help your
company with the above mentioned configurations.
b. Enumerate the Linux commands to manage the users and groups in CO3 R 5
command line by creating a local user account and a group account.

20. a. Apply the required Linux commands to perform the following CO4 A 7
storage management operations to install RPM packages
i) check dependencies of RPM Package before installing
ii) List all installed RPM packages
iii) List Recently Installed RPM Packages
iv) Upgrade a RPM Package
v) Remove a RPM Package
vi) Remove an RPM Package Without Dependencies
vii) Query a file that belongs which RPM Package
b. Discuss the following ways in which you can manage patterns and CO4 U 5
patches of zypper and provide the relevant syntax for it.

21. a. Describe about different types of network interfaces and briefly CO5 R 6
explain how network management is done using the tool wicked.
b. Apply the Linux command to configure the software RAID. CO5 U 6

22. a. Enumerate the steps to configure Logical Volume Management CO5 R 6


(LVM)
b. List all the traditional Linux File Systems and describe about its CO5 R 6
health tools

23. a. In an enterprise environment, you often deploy multiple applications CO3 An 7


against a shared infrastructure. For instance, you may have both your
HR application and your sales application hosted in the same
application server. These separate applications have separate
administrators, but both depend on the security infrastructure
supplied by the server. Now, estimate the method of privilege
delegation using Polkit authorization, so that only authorized person
can access the application.
b. Summarize the steps involved in managing user account, both using CO3 U 5
yast and command line.
COMPULSORY QUESTION
24. a. Analyze the steps to configure the NTP Service using yast and CO6 An 7
provide linux commands to ensure that configured NTP service is
Loaded and Running in command line tool also query your system to
track the information of NTP.
b. Describe the following features of rsyslog configuration in which CO6 R 5
information is logged
i) Global directives
ii) Filters
iii) Rulesets
iv) Output channels
v) Templates
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the application of Linux commands and Linux flavours.
CO2 Use remote administration and secure system bootup process.
CO3 Managing Process, Identity and Security.
CO4 Managing Software packages.
CO5 Create and Manage storage devices.
CO6 Create policies to monitor and perform installation.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 10 7 - - - - 17
CO2 10 1 6 17
CO3 9 13 - 7 - - 29
CO4 4 6 7 - - - 17
CO5 19 6 - 3 - - 28
CO6 9 - - 7 - - 16
124
Course Code 20CS2053 Duration 3hrs
Course Name SYSTEM SOFTWARE AND COMPILER DESIGN Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Compare single-pass and two-pass assemblers. CO1 U 1
2. Enumerate the assembler directives. CO1 R 1
3. Name the two pointers in the input buffer pair scheme. CO2 R 1
4. Define Lexeme. CO2 R 1
Identify whether the following grammar is ambiguous or not.
5. CO3 U 1
B -> B+B | BB | (B) | B* | a
Omit the left factoring from the following grammar, if any:
6. CO3 R 1
S ->SS+ | SS- | SS* | SS/ | a | b
7. What does a sound type system eliminate? CO4 R 1
8. Interpret the binding of names schematically. CO5 U 1
9. Infer the way the basic block leader is determined. CO6 U 1
10. Differentiate local optimization from global optimization. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate between system software and application software. CO1 U 3
12. Write a LEX program to identify even binary numbers. CO2 A 3
13. Write the rules for finding the FIRST and FOLLOW of non terminals. CO3 A 3
14. Give examples for the S-attributed and L-attributed definitions. CO4 U 3
Represent the way structural equivalence is maintained in type
15. CO5 U 3
expressions.
16. State the global variable analysis. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe the working principle of an absolute loader with the
CO1 U 6
necessary algorithms.

b. Explain the working principle of a macroprocessor. List the types of


CO1 U 6
macro substitution.
18. Explain the various phases of a compiler. Also, show the step-by-step
translation of the statement "Percentage = 0.01 * NoPassed /
CO2 A 12
TotalStrength" through the phases of the compiler to attain the
target language.

19. Construct a predictive parser for the following grammar and check
whether the input not (true or false) is parsed without errors.
bexpr ->bexpr or bterm | bterm CO3 A 12
bterm ->bterm and bfactor | bfactor
bfactor ->not bfactor| (bexpr) | true | false

20. a. Write a syntax-directed definition for constructing the syntax tree of


an expression derived from the grammar.
CO4 A 6
E -> E + T | E – T | T
T -> (E) | id | num
b. Describe in detail checking for types of expressions and statements. CO5 R 6

21. Translate the arithmetic expression (a*b) + (c-d) * (a*b) + b into the
following representations:
i) Syntax Tree
ii) Directed Acyclic Graph
CO5 U 12
iii) Quadruple
iv) Triple
v) Indirect triple
vi) Postfix Expression

22. Construct the SLR parsing table for the following grammar:
E -> E + T | T
CO3 A 12
T -> TF | F
F -> F* | a | b

23. Construct a minimum state DFA directly for the regular expression
m*n(m|nm*) by constructing the syntax tree and finding firstpos(), CO3 A 12
lastpos() and followpos().
COMPULSORY QUESTION
24. a. Enumerate any four issues in the design of a code generator. CO6 U 4
b. Determine the steps for partitioning the three-address instructions into
basic blocks. Also, construct basic blocks and data flow graph for the
following:
i=1
L: t1 = x * 5
t2 = &a
CO6 A 8
t3 = sizeof(int)
t 4 = t3 * i
t 5 = t2 + t4
*t5 = t1
i=i+1
if i <= 10 goto L
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Explain algorithm and data structures for assembler.
CO2 Develop algorithms for macros and loaders.
CO3 List and define various stages of compiler.
CO4 Select and use standard tools and techniques in different stages of compiler design.
CO5 Compare and contrast various methods for implementing the phases of a compiler.
CO6 Design and construct different phases of the compiler.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 16 - - - - 17
CO2 2 - 15 - - - 17
CO3 1 1 39 - - - 41
CO4 1 3 6 - - - 10
CO5 6 16 - - - - 22
CO6 3 6 8 - - - 17
124
Course Code 20CS2054 Duration 3hrs
Course Name THEORY OF COMPUTATION Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. M = (Q, ∑,δ, q0,F), where Q= {q0, q1, q2, q3}, ∑ = {0,1} and F = q0, δ

𝛿
is defined as:
0 1
→*q0 q2 q1 CO1 U 1
q1 q3 q0
q2 q0 q3
3 q1 q2
Determine the input whether “110” is accepted or not.
2. Find ∑2, provided ∑ = {p,q}. CO1 U 1
3. Write a regular expression for the set of all strings 0’s and 1’s ending
CO2 U 1
with “00”.
4. Construct a DFA for the set of all strings over ∑ = {a,b} with length1. CO2 U 1
5. Construct the grammar for the set of all strings starting with “a” and
CO3 U 1
ending with “b” for the alphabet set {a,b}.
6. Use the given grammar to derive the parse tree for the string “a+b”
E→ I | E+E | E*E | (E) CO3 U 1
I→a | b
7. Eliminate ε – production for the following grammar.
S→aaS |aS | ε CO3 A 1
A → bA | ε
8. List the types of Normal Forms. CO3 R 1
9. Differentiate Recursively Enumerable language (RE) and Recursive
CO4 U 1
language.
10. State the name of the machine that accepts Recursively Enumerable
CO6 R 1
language.
PART – B (6 X 3 = 18 MARKS)
11. Describe Chomsky hierarchy with neat diagram. CO1 R 3
12. Compare and contrast NFA and DFA. CO2 An 3
13. Consider the grammar defined by the productions S→aS | aSbS | ε .
CO3 U 3
Prove that the given grammar is ambiguous or not for the string “aab”.
14. State the concept of Linear Bounded Automata. CO4 R 3
15. Define Turing Machine. CO5 R 3
16. State Rice Theorem. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Convert the following regular expression to NFA with ε transitions.
CO2 A 6
(0+1)100(00+11)*

𝛿
b. Convert the following NFA to DFA.
0 1
→p {p,r} {q}
CO2 A 6
q {r,s} {p}


*r {p,s} {r}
*s {q,r}

18. a. Convert the following DFA to a regular expression, using the state

𝛿
elimination technique.
0 1
→* s p
CO2 A 6
p
q p s
r r q
s q r
b. Apply minimization concept to reduce the number of states from the

𝛿
given DFA.
0 1
→q q1 q5
0
q1 q6 q2
CO2 A 6
*q2 q0 q2
q3 q2 q6
q4 q7 q5
q5 q2 q0
q6 q6 q4
q7 q6 q2

19. a. Convert the given LLG to Finite Automata


S→ Sa|Abc CO2 A 6
A→ Sa|Ab|a
b. Change the below-given Automata to Left Linear Grammar.

CO2 A 6
20. a. Apply pumping lemma to prove that the given language is not
regular. CO1 A 6
L={ai^3 | i>=1}.
b. i) Prove that if L is regular language, so is LR
ii) Given h(0) = abb and h(1)=ba. Apply Homomorphism for CO2 U 6
h(1011).

21. a. Construct a Push Down Automata for the language L={a 2ncbn
CO3 U 6
| n>=1}
b. Construct the equivalent Context Free Grammar for the given Push
Down Automata M = ({q0, q1}, {a,b}, {a,z0}, δ, q0, z0, { q1}),
where δ is defined as:
δ(q0, a, Z0 ) = { (q0,AZ0 ) }
δ(q0, a, A ) = { (q0,AA ) } CO3 A 6
δ(q0, b, A ) = { (q1,AZ0) }
δ(q1, a, A ) = { (q1, ε) }
δ(q1, ε , Z0 ) = { (q1, ε) }

22. a. Design a Turing Machine that computes a function f(n,m)=n+m,


CO5 A 6
where n and m are positive integers.
b. Illustrate the Properties of CFL that are closed under union,
CO3 U 6
concatenation and Kleene closure.

23. a. Consider the grammar:


S  ABC | BaB
A  aA | BaC | aaa
B  bBb | a | D
C  CA | AC
CO3 A 6
Dε
vii) Eliminate ε – production
viii) Eliminate unit production
ix) Eliminate useless symbols

b.Find a GNF equivalent to the following CFG.


S  AA | 0 CO3 A 6
A  SS | 1
COMPULSORY QUESTION
24. a. Illustrate the following concepts with suitable example.
 Multidimensional TM
CO6 U 6
 TM with semi-infinite tape
 Multitape TM
b. Describe the procedure to convert the Turing Machine to
CO6 U 6
Unrestricted Grammar.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the concept of languages, basics of grammars and the hierarchy of languages.
CO2 Construct and compare deterministic and non-deterministic finite automata
CO3 Develop push down automata from a given context free language or context free grammar
CO4 Recognize context sensitive grammars
CO5 Design Turing machine for recursively enumerable language
CO6 Compare computability & non-computability and Decidability & Un-decidability.
Assessment Pattern as per Bloom’s Level
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 3 2 6 - - - 11
CO2 - 8 36 3 - - 47
CO3 1 17 19 - - - 37
CO4 3 1 - - - - 4
CO5 3 - 6 - - - 9
CO6 4 12 - - - - 16
124
Course Code 20CS2056 Duration 3hrs
Course Name WEB TECHNOLOGY Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define the use of DOCTYPE in HTML web pages. CO1 R 1
2. State the HTML element to display a photo in 200 X 200 dimensions. CO1 R 1
Define the HTML code to display the following text.
3. CO2 R 1
The Product MRP is Rs.10000, Offer Price is Rs.10000 Rs.5999
4. State the CSS Selector that selects the HTML element by the # symbol. CO2 R 1
5. State the jQuery effect action to switch between fade-in and fade-out. CO1 R 1
Identify the method used to call a JavaScript function every specified
6. CO1 R 1
millisecond.
Identify the angular JS validation state to display the error message for
7. CO4 U 1
the <input type=email>
State the angular JS filter to display the cost of a product in dollar
8. CO4 U 1
format.
9. Name the module used to read HTML file content in Node JS program. CO3 R 1
Label the MongoDB command used to create a new collection in
10. CO3 R 1
MongoDB database.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Describe the HTML code to display the following content on a web
page.
III. Morning
 Discussion
IV. Afternoon CO1 U 3
 Drawing
V. Evening
 Demo

Write an HTML program with JavaScript code to display a popup


12. CO2 U 3
message box when the page loads.
13. Describe the JSON datatypes with suitable examples. CO6 U 3
Display the array elements in HTML list format using AngularJS ng-
14. CO6 U 3
repeat.
15. Illustrate the jQuery code for sliding upwards and downwards effects CO3 A 3
with proper HTML code.
16. Give example of an event emitter in NodeJS. CO4 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Demonstrate an online registration form using HTML as given
below with the necessary attributes to make all fields mandatory.

CO6 A 6

b Explain the CSS box model with a neat sketch and a suitable
CO6 R 6
. example program

18. a. Implement an HTML web page with appropriate JavaScript as per


the following design and read the value of A and B, then display the
sum of A and B in the result text box when the user clicks the
“Addition” button.

CO3 A 6

b Describe any five JavaScript document object model methods with


CO2 R 6
. example programs.

19. a. Prepare a JSON object to store the following details and convert as a
JavaScript object and display all the data in HTML table format.
CO5 U 6
EM CODE SUBJECT GRADE CREDIT
5 20CS2037 Optimization Methodologies A+ 3
5 20CS2045 RFID Technologies A+ 3
5 20CS2054 Theory of Computation A+ 3
5 20CS2016 Database Management Systems A+ 4.5
5 20CS2031 Introduction to Data Science A+ 4.5
5 20CS2056 Web Technology A+ 4.5
b Explain the various traversing methods in jQuery with suitable
CO2 R 6
. example programs

20. a. Explain the following list in HTML with suitable example programs
 Ordered List
 Unordered List CO1 R 6
 Definition List

b Develop a webpage using HTML, Angular JS Routing for your


. personal website as per your choice with the following pages
a. Main HTML program with Angular JS routing
b. Hyper Links
CO5 A 6
 Personal Details
 Academic Details
 Project / Internship Details

21. a. Sketch the following content using HTML

CO1 U 6

b Discuss the following CSS positioning with suitable programs each.


CO5 A 6
. relative b) absolute c) fixed d) sticky

22. a. Illustrate the form validation with proper error messages for the
following validators using Angular JS.
CO3 A 4
 type=email
 required
b Create a web application to develop the following Budget Calculator
. using Angular JS. Here, get the room rent, accessories, emergency
and saving in percentage (%), then divide the given amount based on CO1 A 8
the percentage and display each value in the place provided when the
“Evaluate My Money” button.
23. a. Prepare JSON data to represent the following Bank Account details.

CO2 U 4

b Create an HTML program with jQuery actions to calculate and


. display the BMI value and Status for the given weight and height.
BMI = weight(kg)/[height(m)]2
Check the status using the following conditions.
• Underweight: BMI < 18
• Normal: BMI between 18 – 25
• Overweight: BMI between 25 – 30
• Obese: BM > 30

CO3 A 8

COMPULSORY QUESTION
24. a. Illustrate the following MongoDB operations to organize bank
account details such as customer name, accno, email, phone, and
balance using MongoDB shell commands.
i) create database ‘ABC_Bank’
ii) create a collection ‘SavingAccount’ CO3 U 6
iii) insert five account information
iv) display the balance of a particular account
v) change the balance of a particular customer
vi) delete a particular customer’s detail
b Develop a Node JS program to display all the student details such as CO4 A 6
. name, regno, email, cgpa, and academic credits in a MongoDB
database “College” with the collection “Students” using an HTML
table layout.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the relevant properties and methods to facilitate dynamic web application development.
CO2 Explain the development of fully functional web applications that incorporates front-end and
back-end design technologies.
CO3 Apply client and server-side technologies for creating interactive data-driven websites
CO4 model dynamic web applications using suitable server-side technologies integrated with the
database.
CO5 Develop extensible web applications using the Model View Controller (MVC) framework.
CO6 Apply web development framework for designing attractive web pages along with dynamic and
flexible schema.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 10 9 8 - - - 27
CO2 14 7 - - - - 21
CO3 2 - 21 - - - 23
CO4 2 9 6 - - - 17
CO5 - 6 12 - - - 18
CO6 6 6 6 - - - 18
124
Course Code 20CS2057 Duration 3hrs
Course Name FUNDAMENTALS OF WEB DESIGN Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
Identify the software program that is used by the web clients to view the
1. CO1 R 1
web pages.
Predict the technique required for designing and developing a website to
2. CO1 R 1
be ranked high in search results.
3. Write the syntax of the background property in CSS. CO2 U 1
4. Write the code for including opacity in a web page using CSS. CO2 U 1
5. Quote the syntax to change the foreground color of a text in CSS. CO2 U 1
Name the symbol that is used to select an element with a specific ID in
6. CO2 A 1
CSS.
Write a JavaScript code to display the “Welcome” message on the
7. CO3 A 1
webpage.
Predict the output of the following JavaScript code.
8. CO3 An 1
<script> alert(typeof "john"); </script>
Predict the output of the following PHP code.
9. CO6 An 1
<?php echo 5+4; ?>
10. List the different types of PHP variables. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
Create the following ordered list using HTML.
1. Food
11. CO1 C 3
2. Tea
3. Milk
12. Label the CSS property used for changing the font face. CO2 A 3
13. Discuss the CSS predefined color properties. CO2 R 3
14. Define the CSS box model and state its elements. CO2 R 3
Develop a JavaScript page to demonstrate an If condition by which the
15. time on your browser is less than 10; you will get a “good Morning” CO3 A 3
greeting.
Create a switch statement that will output "Hello" if $color is "red", and
16. CO4 An 3
"welcome" if $color is "green".
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss the working principle of Hyper Text Transport Protocol. CO1 U 6
Explain the technique to suggest which parts of your site where
b. CO1 U 6
search engines should and shouldn't crawl.
18. a. Write the HTML program to create an image gallery. CO1 C 6
Design the following table and format it as it is shown using HTML.
Product Product
Quantity (kg) Price
ID Name
b. CO1 C 6
1 Rice 1 80
2 Sugar 1 50
Total 130
Write the HTML program to make a picture of a background image
19. a. CO1 U 2
of a web page.
Discuss the most commonly used lists that are used while designing
b. CO1 U 6
a page. Give an example.
List the media types and formats supported by HTML. Give an
c. CO1 U 4
example.
20. a. State the usage of an iframe tag in HTML. Give an example. CO1 U 6
Write the difference between cell spacing and cell padding in
b. CO1 U 6
HTML.
Give an example of the following types of CSS.
a) Inline
21. CO2 A 12
b) Internal
c) External
22. a. List the different types of CSS selectors. CO2 U 6
Design a landing web page using HTML and apply all types of CSS
b. CO2 A 6
selectors to style the web page.
Create a JavaScript page and read the student’s details using form
elements as follows.
a. Read five subject marks (s1=50, s2=60, s3=70, s4=80, s5=900.
23. CO5 C 12
b. Consider the minimum marks to pass the subject as 50.
c. Display the results on the next page. (Total, percentage, pass/fail
on each subject).
COMPULSORY QUESTION
Design an online telephone directory system with the following
services using PHP with a database.
24. CO5 C 12
i. Add customer details such as name, phone number, and email.
ii. Display customer details.
CO – COURSE OUTCOME BL – BLOOMS’ LEVEL

COURSE OUTCOMES
CO1 Summarize the concepts used for web development.
CO2 Select appropriate design standards for designing attractive web pages.
CO3 Identify latest client and server-side technologies for creating interactive data driven websites.
CO4 Apply properties and methods which facilitate dynamic application development.
CO5 Create fully functional web applications that incorporate planning, designing, coding, testing,
and publishing to a web server.
CO6 Formulate and build extensible responsive featured web applications.

Assessment Pattern as per Bloom’s Level


CO Remember Understand Apply Analyze Evaluate Create Total
CO1 2 36 - - - 15 53
CO2 6 9 22 - - - 37
CO3 - - 4 - - - 4
CO4 - - - 4 - 4
CO5 - - - - - 24 24
CO6 1 - - 1 - - 2
124
Course Code 21CS2007 Duration 3hrs
ARTIFICIAL INTELLIGENCE: PRINCIPLES AND
Course Name Max. Marks 100
TECHNIQUES

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. Identify the test introduced by Alan in 1950, to check whether a machine CO1 U 1
can think like a human or not.
2. Define Artificial Intelligence. CO1 R 1
3. Define PEAS while specifying the Intelligent Agent task environment. CO2 R 1
4. Define Informed Search. CO2 U 1
5. Analyze the given sentence into wff’s in predicate logic: CO3 A 1
Every child loves Santa
6. Describe any two problems of Indexing. CO3 R 1
7. Define monotonicity. CO4 U 1
8. Solve the given fact into predicate logic. CO4 R 1
All Pompeians died when the volcano erupted in 79 A.D.
9. Enumerate default logic in non-monotonic reasoning. CO5 U 1
10. Apply conceptual dependency to represent the given statement. CO6 U 1
John pushed the cart.
PART – B (6 X 3 = 18 MARKS)
11. Explain the PEAS Representation for a Self-Driving Car. CO1 U 3
12. State the concept of Generate and Test algorithm. CO2 U 3
13. Illustrate the possible issues in knowledge representation techniques. CO3 An 3
14. Produce the PROLOG representation for the knowledge base given below. CO4 An 3
a. x: pet(x)  small(x)  apartmentpet(x)
b. x : poodle(x)  dog(x)  small(x)
poodle(fluffy)
15. Construct semantic net representation for the following: CO5 An 3
Mary gave the green flowered vase to her favorite cousin.
16. Construct the frame for the subject “Artificial Intelligence”. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Elucidate the key characteristics required to analyze the problem in CO1 U 6
AI.
b. Describe the steps performed by problem-solving agent with CO1 U 6
examples.
18. a. Apply DFS on the given problem to reach the Goal node ‘U’ from CO2 A 8
the initial node ‘A’.

b. Highlight the drawbacks of simple hill climbing approach. CO2 R 4


19. Analyze the following statements CO3 An 12
1. Marcus was a man
2. Marcus was a pompeian
3. All pompeians were Romans
4.Caesar was a ruler
5.All Romans were either Loyal to Caesar or hated him
6.Eveyone is loyal to someone
7.People only try to assassinate rulers they are not
loyal to
8.Marcus tried to assassinate Caesar
9.All men are people

Deduce these statements to clause form and answer the question


using Resolution: a)‘Was Marcus loyal to Caesar’?
b)’Did Marcus hate Caesar’?
20. a. Explain Best first search algorithm in detail and apply BFS to reach CO2 A 6
the Goal node ‘G’ from the initial node ‘S’.

b Differentiate between BFS and DFS in detail and suggest when to CO2 An 6
use BFS and DFS.
21. a. Write the script for the following scenario: CO5 A 6
“Tommy went to a theatre to watch a play. He bought the ticket from
the counter and sat in his seat. He watched the play and returned
home”.
a) Highlight the standard components that are to be included
when formulating the script
b) Create five scenes for the scenario such as ‘Going to theater’,
‘Buying ticket’, ‘Entering the theater hall and sitting on a
seat’, ‘Watching a play’ and ‘Exiting’.
b. Explain the different techniques of Knowledge representation CO5 U 6
22. a. Represent the following knowledge in a semantic network: CO5 A 6
Dogs are Mammals Birds have Wings
Mammals are Animals Bats have Wings
Birds are Animals Bats are Mammals
Fish are Animals Dogs chase Cats
Worms are Animals Cats eat Fish
Cats are Mammals Birds eat Worms
Cats have Fur Fish eat Worms
Dogs have Fur
Suppose you learn that Tom is a cat. What additional knowledge
about Tom can be derived from your representation? Explain how.

b. Consider the following block world problem: CO5 A 6

i. Describe the start and goal states.


ii. Solve the problem using Goal Stack Planning.

23. a. Of the students in the college, 60% of the students reside in the CO3 An 6
hostel and 40% of the students are day scholars. Previous year
results report that 30% of all students who stay in the hostel scored
A Grade and 20% of day scholars scored A grade. At the end of the
year, one student is chosen at random and found that he/she has an A
grade. Estimate the probability that the student is a hosteler.
b. Analyze the partitioned semantic net representations for the CO5 An 6
following:
i) The dog bite the mail carrier
ii) Every dog has bitten a mail carrier
iii) Every dog in the town has bitten every mail carrier
COMPULSORY QUESTION
24. Illustrate the following learning techniques with appropriate CO6 A 12
examples.
 Learning by taking advice
 Learning from examples
 Explanation based learning
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the basics of Artificial Intelligence.
CO2 Identify the appropriate search algorithms for any AI problem.
CO3 Prepare appropriate knowledge-based rules to identify causal relationships and conditional
independence of a real-world situation.
CO4 Select the appropriate search method for identifying different search spaces.
CO5 Evaluate the working knowledge of reasoning in the presence of incomplete and/or uncertain
information.
CO6 Produce the learning theory for expert systems.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 1 16 17
CO2 5 4 14 6 29
CO3 1 22 23
CO4 1 1 3 5
CO5 7 12 15 34
CO6 1 12 3 16
124
SUPPLEMENTARY EXAMINATION – JUNE 2023

Course Code 21CS2007 Duration 3hrs


ARTIFICIAL INTELLIGENCE: PRINCIPLES AND
Course Name Max. Marks 100
TECHNIQUES

Q. CO
No Questions BL Marks
.
PART – A (10 X 1 = 10 MARKS)
1. Give an example for Irrecoverable Problem. CO1 U 1
Identify the component through which the agent can perceive through the
2. environment. CO1 R 1
3. Analyze the structure of AI agent. CO2 R 1
4. Discover the Sensors and Actuators of a Human Agent. CO2 U 1
5. Name the different types of knowledge CO3 A 1
Identify the given knowledge representation system.

6. CO3 R 1
7. Describe the abductive reasoning process in one statement CO4 U 1
8. Cite any one of the programming language paradigms to represent a logic. CO4 R 1
Indicate the CD representation of the following statement:
9. Jerry threw the ball CO5 U 1
10. Infer the role of CYC in artificial intelligence. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. List the four steps to be carried out to build a system to solve an AI problem. CO1 U 3

12. Differentiate between informed and uninformed search with example. CO2 U 3
13. Differentiate Procedural and Declarative Knowledge CO3 An 3
14. Enumerate the four factors that helps in deciding whether to reason forward or CO4 An 3
backward.
15. List the components of planning. CO5 An 3
16. Compare the terms ‘Search’ and ‘Planning’ in terms of states ,action, goal and CO6 U 3
plan
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Describe the following types of Intelligent Agents CO1 U 6
 Simple Reflex Agents
 Model-Based Reflex Agents
 Goal-Based Agents
 Learning Agent
b. Describe the steps performed by Problem-solving agent with examples CO1 U 6

18. a. Distinguish between local and global heuristic search technique and apply CO2 A 8
the same for the given hill climbing problem.

b. List the four rules of an AI agent CO2 U 4


19. a. Change the below sentences as well formulated formulas (wffs) in CO3 An 6
predicate logic and solve the question “John likes peanuts” using
Resolution technique.
 John likes all kind of food
 Apple and vegetable are food
 Anything anyone eats and not killed is food.
 Anil eats peanuts and still alive
 Harry eats everything that Anil eats
b. Represent the below system using inheritable knowledge representation. CO3 U 6
A college has certain features such as classrooms, teachers, play ground,
furniture, students etc. Besides these, there will be some general concepts
regarding the functioning of the college, like it will have time table for
each class, a fee deposit plan, examination pattern, course module etc. It
can have many more deep concepts like placement of students etc. Now, if
we say “A is a College”, then A will automatically inherits all the features
of the college. Add all the possible features to represent the system.
20. a. Describe the role of certainty factor in handling uncertainty in the system. CO4 U 6
b Explain rule based system’s and it’s components CO4 A 6

21. a. Consider the following block world problem and apply goal stack planning CO5 A 6
to reach the goal state from initial state.
b. Translate each of the following sentences into conceptual dependencies CO5 U 6
“Jane gave Tom an ice cream cone”
“Tom ate the ice cream with the spoon”
“My grandfather told me a story”
“Basketball players are tall”
“Paul cut down the tree with an axe”
“Place all the ingredients in a bowl and mix thoroughly”
“A nice boy is John”
“Sita ate the apple yesterday”
22. a. Construct semantic network that represents the data given below: CO5 A 6
 Mammals have fur.
 All mammals are animals.
 A bird is an animal.
 A cat is a mammal.
 Tom is a cat.
 Tom is owned by John.
 Tom is ginger in color
 Tom caught a bird.
 Cats like cream.
 The cat sat on the mat
b. Consider the following block world problem: CO5 A 6

iii. Describe the start and goal states.


iv. Solve the problem using Goal Stack Planning.
23. a. Consider the water jug problem: You are given two jugs, a 4-gallon one CO2 A 6
and 3-gallon one. Neither has any measuring marker on it. There is a pump
that can be used to fill the jugs with water. How can you get exactly 2
gallons of water from the 4-gallon jug?
Explicit Assumptions:
A jug can be filled from the pump, water can be poured out of a jug on to
the ground, water can be poured from one jug to another and that there are
no other measuring devices available. Apply suitable production rules to
solve this problem.
b. Analyze the partitioned semantic net representations for the following: CO5 An 6
• Every batter hit a ball
• All the batters like the pitcher
 All batter hit every ball
COMPULSORY QUESTION
24. a. Compare and contrast expert systems and neural networks in terms CO6 An 6
of knowledge representation, knowledge acquisition, and
explanation. Give one domain in which the expert system
approach would be more promising and one domain in which the
neural network approach would be more promising.
b. Apply the given goal and operationality criterion to describe explanation- CO6 A 6
based learning:
Goal concept: Cup
x is a Cup of x is liftable, stable and open – vessel.

COURSE OUTCOMES
CO1 describe the basics of Artificial Intelligence.
CO2 identify the appropriate search algorithms for any AI problem
CO3 prepare appropriate knowledge-based rules to identify causal relationships and conditional independence
of a real-world situation.
CO4 select the appropriate search method for identifying different search spaces.
CO5 evaluate the working knowledge of reasoning in the presence of incomplete and/or uncertain
information.
CO6 produce the learning theory for expert systems

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 1 16 17
CO2 1 8 14 23
CO3 1 6 1 9 17
CO4 1 7 6 3 17
CO5 7 18 9 34
CO6 4 6 6 16
124
Course Code 21CS2008 Duration 3hrs
Course Name ARTIFICIAL INTELLIGENCE FOR GAMES Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)

1. Mention three kinds of Artificial Intelligence (AI) in games. CO1 U 1


2. List the common heuristic approaches. CO1 R 1
3. State the usage of angular velocity. CO2 R 1
4. Differentiate between the pursue and evade steering behaviors. CO2 An 1
Identify the significance of the connections in the movement planning
5. graph. CO3 U 1
6. Define the heuristic function used in the A* algorithm CO3 R 1
7. How many decisions and actions are possible in the following decision
tree?

CO4 A 1
8. Define the terms ‘State’ and ‘Reward’ in reinforcement learning CO4 R 1
9. List the types of games identified in game theory. CO 5 R 1
10. Identify the key AI requirements for real-time strategy games. CO 6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Write short notes on SIMD. CO1 U 3
12. Describe the jumping process in movements. CO2 U 3
13. Draw the velocity diagram for the allowed animations. CO3 U 3
14. Discuss the rule-based system. CO4 U 3
15. Describe the concept of a transposition table in board games. CO 5 U 3
16. Draw the finite state machine for a simple sheep-like creature in CO 6 U 3
flocking and herding games.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Discuss the structure of the AI Engine in detail. CO1 U 8
b. State the benefit of AI in Games. How AI is used in Games? CO1 R 4
18. Define kinematic movements. Explain the kinematic movement CO2 U 12
algorithms with appropriate pseudocode for the following
movements in games:
a) Seek b)Flee c) Arrive d) Wander
19. a. Apply Dijkstra’s algorithm to the following directed weighted CO3 A 6
graph and find the shortest path between A and F. Provide all the
intermediate steps to arrive at the solution.

b. Compare the Dijkstra’s, A*, and Hierarchical pathfinding CO3 An 6


algorithms.
20. Illustrate the ID3 algorithm and identify the root node of the CO4 A 12
decision tree for the given data.

Day Outlook Temp. Humidity Wind Play


Tennis

D1 Sunny Hot High Weak No

D2 Sunny Hot High Strong No

D3 Overcast Hot High Weak Yes

D4 Rain Mild High Weak Yes

D5 Rain Cool Normal Weak Yes

D6 Rain Cool Normal Strong No

D7 Overcast Cool Normal Weak Yes

D8 Sunny Mild High Weak No

D9 Sunny Cool Normal Weak Yes

D10 Rain Mild Normal Strong Yes

D11 Sunny Mild Normal Strong Yes


D12 Overcast Mild High Strong Yes

D13 Overcast Hot Normal Weak Yes

D14 Rain Mild High Strong No


21. a. Explain the min-max algorithm in detail. CO5 U 6
b.
Discuss the alpha-beta pruning to improve the performance of the CO5 U 6
minimax algorithm with a suitable illustration.
22. State the purpose of steering behaviors. Explain the following type CO2 U 12
of behaviors with a neat sketch.
● Wander
● Path following
● Separation
● Attraction
● Collision Avoidance
● Obstacle Avoidance
23. Justify the need to combine the steering behaviors. Explain in detail CO4 U 12
on blending mechanism.
COMPULSORY QUESTION
24. State the most important evaluating behaviors of the AI Model. CO6 An 12
Compare the AI architecture of race driving and urban driving
applications.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Recognize the importance of artificial intelligence in games.
CO2 Identify the different steering behaviors in movement of characters.
CO3 Choose the path finding techniques for designing games.
CO4 Illustrate decision making method for games.
CO5 Design the strategies for the games using game theory.
CO6 Select the appropriate design for artificial intelligence games genre.

Assessment Pattern as per Bloom’s Level


CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 05 12 - - - - 17
CO2 01 27 - 01 - - 29
CO3 01 04 06 06 - - 17
CO4 01 15 13 - - - 29
CO5 01 15 - - - - 16
CO6 01 03 - 12 - - 16
124
Course Code 21CS2009 Duration 3hrs
Course Name COMPUTER VISION Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recall any two real-world applications of computer vision. CO1 R 1
2. Name any two properties of linear filters. CO1 R 1
3. Recall any two pairs of fourier transforms. CO2 R 1
4. Define one importance of corner detection. CO2 U 1
5. Indicate any two unique datasets where the machine learning works. CO3 U 1
6. Define tracking. CO3 R 1
7. Name the two geometries of multiple views. CO4 R 1
8. List the two camera parameters from known 3D points. CO4 R 1
9. Recall one importance of convolutional neural networks (CNN). CO5 R 1
10. Define image rendering. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Express the 4 R’s of computer vision. CO1 U 3
12.

CO2 U 3

Identify the interest point features that you may notice in the above
images (Any 3).
13. Summarize the uses of SIFT operator. CO3 U 3
14. Visualize the human vision-stereopsis of 2D position. CO4 R 3
15. Explain colorization in medical image processing with examples. CO5 U 3
16. Discuss the 3D point processing with two examples. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the real-world applications of computer vision. CO1 U 8
b
CO1 A 4
. Sketch the pinhole image model with their perspective effects.

Explain the useful properties of fourier transform with their signal


18. a. CO2 U 7
and transform values.
b
CO2 U 5
. Summarize a basic feature detection algorithm in 5 steps.

Sketch the three-layered neural network to detect the likely face


19. a. CO3 A 6
locations.
b Examine the differences between supervised and unsupervised
CO3 A 6
. learning.

20. a. Show the epipolar geometry with their perspective effects. CO4 A 5
b Describe the structure from the motion system by using
CO4 U 7
. triangulation.

21. a. Sketch the basic CNN architecture with their perspective layouts. CO5 A 7
b Illustrate the implementation of Forgy’s algorithm for cluster
CO5 U 5
. analysis.

Explain the computer vision techniques in the area of remote


22. a. CO6 U 6
sensing.
b
CO6 U 6
. Represent the 3D model construction using the image sequences.

23. a. Describe the analysis and synthesis process of Laplacian pyramids. CO2 U 6
b Show the working process of the AdaBoost training algorithm in
CO3 A 6
. four steps.
COMPULSORY QUESTION
24. a. The number of matches correctly and incorrectly estimated by a CO2 A 6
feature matching showing the number of true positives (TP), false
positives (FP), false negatives, (FN), and true negatives (TN).
True Matches True Non-
Matches
Predicted Matches TP - 100 FP - 40 '
P =?
Predicted Non- FN - 60 TN - 300 '
N =?
Matches
P =? N =? Total =?
i. Find the actual number of positives (P), the actual number
of negatives (N), P' (predicted number of positives), and N '
(predicted number of negatives) in the above confusion
matrix.
ii. Calculate the true positive rate (TPR), false positive rate
(FPR), positive predictive value (PPV), and accuracy (ACC)
from the above confusion matrix.
Illustrate the implementation of the K-Means clustering algorithm
b
in 5 CO3 U 6
.
Steps.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Define image formation models and light effects in computer vision.
CO2 Describe various methods used for registration, alignment, and matching in images.
CO3 Apply advanced concepts leading to object categorization and segmentation in images.
CO4 Analyze the motion detection and estimation techniques.
CO5 Construct image analysis models for object recognition.
CO6 Execute computer vision techniques for real-time applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 11 4 - - - 17
CO2 1 22 6 - - - 29
CO3 1 4 24 - - - 29
CO4 5 7 5 - - - 17
CO5 1 8 7 - - - 16
CO6 1 15 - - - - 16
124
Course Code 21CS3003 Duration 3hrs
ARTIFICIAL INTELLIGENCE AND MACHINE
Course Name Max. Marks 100
LEARNING

Q.
Mark
No Questions CO BL
s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
Explain the importance of data preprocessing and the common data
a CO
1. preprocessing techniques used in industries, such as scaling, U 10
. 1
normalization, and handling missing values.
Describe the concept of feature extraction and its role in
b dimensionality reduction for machine learning. List the advantages and CO
R 10
. limitations of feature extraction algorithms, such as Principal 1
Component Analysis (PCA) and Linear Discriminant Analysis (LDA).
(OR)
a Explain the concept of Structural Risk Minimization (SRM) and its CO
2. U 10
. role in non-uniform learnability. 2
b List the principles of Minimum Description Length and Occam's CO
R 10
. Razor in non-uniform learnability. 2

Calculate regression coefficient, Ypred and Error value by analyzing


the data given below.
a Price(Rs) 10 12 13 12 16 15 CO
3. An 10
. Amount 40 38 43 45 37 43 3
Demanded

b Discuss the working principle of KNN algorithm. Estimate the class CO U 10


. label for the given unlabeled data point [57kg, 170 cm]. 3
(OR)
Consider the following table and identify the association rules using
the Apriori algorithm with support threshold S=33.34% and
confidence threshold C=60%. Use the final 3-itemsets and produce the
potential association rules using Apriori algorithm.
TID Items
a 1 A, B, C CO
4. R 10
. 4
2 A, B
3 A,D,E
4 D,E
5 C,E
6 A,D,E
b Describe the concept of model-based reinforcement learning and how CO
R 10
. they impact the performance of Monte Carlo methods. 4

Describe the A* algorithm and its role in heuristic search and give an R 10
a CO
5. overview of the admissibility property of heuristics in A* search and
. 5
its implications for finding optimal solutions.
b Explain the hill-climbing algorithm and its role in heuristic search. CO
U 10
. 5
(OR)
a Discuss the architecture and working principles of CNNs, including CO
6. U 10
. convolutional layers, pooling layers, and fully connected layers. 6
b Describe the concept of transfer learning and its importance in deep CO
R 10
. learning. 6

a Describe the process of text generation in NLP with example and the CO
7. R 10
. challenges and limitations of text generation in NLP. 2
b Explain the concept of recurrent neural networks (RNN) and their role CO
U 10
. in sequence modeling and natural language processing. 2
(OR)
a Illustrate Stratified K-fold, Leave-one-out cross-validation and 0.632 CO
8. An 10
. bootstrap methods with suitable examples. 5
b Describe the ERM (Empirical Risk Minimization) approach in CO
U 10
. minimax learning. 5
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Explain the applications of artificial intelligence (AI) and machine
a learning (ML) in healthcare, such as disease diagnosis, personalized CO
9. U 10
. medicine, and predictive analytics and the ethical considerations and 6
challenges associated with the use of AI and ML in healthcare.
b Describe the recent trends in agricultural technology and their impact CO
R 10
. on improving crop yield, precision farming, and sustainability. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the existing machine learning techniques: it’s concepts, mathematical
background, applicability, limitations and toolkit used in industries.
CO2 Create AI/ML solutions for various societal problems.
CO3 Apply some state-of-the-art development frameworks and software libraries in machine
learning task realization.
CO4 Evaluate the performance of machine learning algorithms using suitable metrics.
CO5 Compare the strengths and limitations of selected machine learning algorithms and where
they can be applied in different applications.
CO6 Build and deploy production grade AI/ML applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 10 10 20
CO2 20 20 40
CO3 10 10 20
CO4 20 20
CO5 10 20 10 40
CO6 20 20 40
180

You might also like