PGDCA / MCA (I Yr) I BcA Term-End Examination June, 2006 FUNDAMENTALS CS-O1: COMPUTER Maximum Mqrks : 75
Time: 3 hours Note :
1.
(a)
Question number 7 is compulsory. Answer any three questionsfrom the rest. Simplify the following expressionusing Karnaugh's map in product-of-sumform. F (A, B, C, D) - ) (0, 2, 8, 9, 10, 11, 14, 15) Also, draw the logic circuit for the simplified exnression.
(b)
What is a vector instruction ? Explain briefly the need of an array processorin the execution of a 5
vector instruciion. (c)
Construct an 8 x 1 multiplexer, using two 4 x 1 multiplexers and a decoder. Make assumptions,it I
t t
t
-
-
required.
cs-01
P.T.O.
What is cache coherence? Why is it important for shared-memorymulti-processorsystems? .''..,:,:;..,'.-..'..:;:].,. ('e) Write an 8086 adsemblylaflguage program to find (d)
the total number of occurrencesof the characters "a" and "t" in an array of charactersstored in the memory. (f)
Explain,with an example,one instructionof each of the following types : (i)
Conversion
(ii)
Input-output
(iii) Transferof control (iv) Arithmetic
2.
(a)
Write a program to evaluatethe following expression using an evaluation-stack architecturemachine : A x . B/ D + E x F - G Assume that the machine contains instructionsfor PUSH, POP, ADD, SUBTRACT, MULTIPLY and DIVIDE
(b)
Construct a full-adder circuit using one or more decoders.
(c)
What is the set-associative mapping scheme for memory ? Explain this with the help of a diagram.
cs-01
4
3.
Give at least three differences between each of the following : (i)
Instructionpipeline vs' Floatingpoint pipeline'
(ii)
microinstruction Horizontal microinstruction.
(ii|
Access methods of secondary storage vs' Access methodsof main memory.
vs'
75
Vertical
vs' Tighily coupled (iv) Loosely coupledmicroprocessors microprocessors.
4.
(v)
Flashmemoriesvs. PROMs.
(a)
Design a single precision floating point number : having the following characteristics * The baseof the number is 2' o *
(b)
(c)
The mantissacan representat least 5 decimal digits correctlY. 50' The exponentrange is 10i
Make suitableassumptions,if required'
5
Write a program in 8086 assemblylanguagethat addstwo two-digitunpackedBCD numbers'
5
What is the purpose of data-flowmachines? List at of these least two advantagesand two disadvantages 5
machines. 5.
(a)
Explain the role of the segmentregistersin 8086 microprocessors,with the help of an example for each.
cs-01
P.T.O.
(b)
What are thabasiccharacteristics of RISC ?'Explain briefly the reasonsthat make RISC based designs more popular.
(c)
An
8-bit register contains the binarv value 11001011. Perform the followingopnrufion, on this : (i)
Mask the upper nibbleof the register.(A nibble is a 4-bit sequence.)
(ii)
Insert a value 1101 at the upper nibble.
(iii) Perform circularshift right. (iv) Perform arithmeticshift left. (v)
Perform logical shift right.
Make assumptions,if required.
cs-01
4
12,000
PGDCA / MCA (I Yr) / BCA Term-End Examination June, 2006
CS-02 : INTRODUCTION TO SOFTWARE Time : 2 hours Note :
l.
Maximum Mqrks: 60
Question no. I is compulsciry. Attempt any three questionsfrom the rest.
(a)
Write an algorithmand draw a flow chart to calculate the factorialof a given number.
(b)
What is a process ? Explain the various process states with the help of a state diagram. Why is a PCB required, and what is the information that a PCB contains?
(c)
Write a shell program to convert an integer to its binary equivalent.
(d)
How is a client-servermodel different from the stand-alonemodel ? Explain this with the help of a suitableexampleof each.
(e)
cs-02
Explain the various phasesof systemsinvestigation, with the help of a suitableexample. P.T.O.
2.
(a)
Constructcontext free grammarfor the following 'C' statements: (i)
Do..While
(ii) incrementoperator (b)
What is a project control system ? With the help of an example of each, explain the Gantt chart and the PERT chart schedulingtechniques.
3.
(a)
Explain
the
CPU
scheduling and
memory
managementin a UNIX operatingsystem. (b)
Five jobs arrive in a system in the order given below :
5
Process P
CPU time 1
1
Priority
0 6
3
P
2
5
P
3
b
P
4
4
1
P
5
8
4
z
5 is given the highest priority. Calculate the tumaroundand waitingtime for eachprocessfor the following schedulingalgorithms : '
cs-02
5
(i)
Shortest Job First
(ii)
Round Robin (quantum2)
4.
(a)
What are the main advantagesof distributedOS ? How are the file systemand protectionsupportedin distributedOS ?
(b)
Write UNIX commandsfor the following : (i)
To print how many usersare working on the system.
(ii)
To run a processin the background.
(iii) To print the file namesand their file sizesin the current directory. (iv) To print a long listingof the directory. (v) To print content of the "passwd" file. 5.
(a)
the major activities performed in the development of a software product. Also mention the limitationsof the developmentcycle.
(b)
What is the significanceof thrashing ? Write down the steps performedin demandpaging.
c s -0 2
List
4,000
PGDCA / MCA (I Yr) / BcA Term-End Examination June, ?OOG CS-03 : FILE STRUCTUREAND IN C OB OL P R OGR A MMIN G Mqximum Mqrks:60
Time : 2 hours Note :
1.
(a)
Question number 1 is compulsory. Answer any three ouestionsfrom the rest.
Write a programin COBOL, givingall the divisions, to compute the total marks, averageand the grade as per the following record format : 7-6 7 - 30
RollNo.
31 - 33 34 - 36
Marksin English
37 - 39 40 - 42
Marksin Physics
43 - 45 46 - 48
Marksin ComputerScience
49 -57 52 - 57
cs-03
Name of the student Marksin Mathematics Marks in Chemistry Total marks Average Grade P.T.O.
If a student scores less than 40 in any subject, then print FAIL as the grade. Otherwise print the grade as per the following conditions : 10
(b)
Average
Grade
50<marks<60
A
40<marks<50
B
Explain the use of the followingwith the help of one . exampleof each i (i)
DIVIDE
(iD USAGE clause (iii) REDEFTNES (c)
Write a COBOL program to simulate the billing applicationfor a grocerystore. 10 Note :
(d)
2.
Make suitable assumptions,if needed and mention them.
Mention the purpose of using the RENAMES clause.Wrjte the format. Also, list some important precautions to keep in mind while using the RENAMES clause.
Write a program in COBOL to simulatea simple calculator which performs the basic arithmetic operations like addition,subtraction,multiplication,and division. 10
cs-03
3 . Write a COBOL program that converts a given date (specifiedas the valuesof DAY and MONTH) to the Julian date and storesit in the data name Julian.Assume28 davs in the Februarymonth. 70 Note z
'
The valueof DAY is the date of the month and the value of MONTH is a valuebetween1 and 72. A Julian date is a 3-digit date representing the number of days counted from the first of January.
4 . Write a COBOL programto calculatethe equalinstalment amount to be paid to a nationalized bank every month taking the {ollowingpoints into consideration: 10 (i) Flat 60/ointerest if the loan amount is to be cleared within one year. (ii)
Flat 7.2o/ointerestif the loan amount is to be cleared within 18 months.
(iii) Flat 72o/ointerestif the loan amount is to be cleared within 36 months.
5 . Explain the use and syntax formats of the following COBOL statements,/clauses, with the help of an example for each ' 10 (i) REWRTTE ( i i ) T N S P E C T. . . . T A L L Y T N G (iii) STRING (iv) SET (v)
cs-03
GO TO
6,000
PGDCA / MCA (I Yr) Term-End Examination June, 2006 CS-04 : DATA STRUCTURES THROUGH ,,C '' & ,,P A S C A L " Time : 2 hours
MaximumMqrks: 60
Note :
Question number 7 is compulsory. Answer any three questions from the rest. All algorithms should be written nearer to C or PASCAL Ianguage.
(a)
Supposethe input to a stack is 7, 2, 3, 4, 5 in this order, i.e., 1 comes first, then 2, and so on. Which of the following rearrangementscan be obtained in the output order ? For those that can, explain how, giving the sequenceof operations.For those outputs
l.
that cannot be so obtained,explain why,
( i )r 2 4 ( i 02 r 4
6
5 3 3 5
( i i i ) 2 7 5 3 4 ( i v 3) 1 2 4 5
cs-04
P.T.O.
(b)
What is a circular queue ? Explain how it is implemented,using an array. Write functions to "insert" and "delete" for the queueabove.
(c)
Construct the binary tree whose Pre-order traversal is ABCDEFGH and In-order traversal is CBDAFEGH, where each letter stands for the information stored in some node of the tree. Show all the steps involved. Write an algorithm to implement "insertion sort". Explain how the algorithmworks in sorting the input l i s t2 6 4 9 8 5 .
I
(e)
Distinguishbetweena graph and a tree.
2
(a)
Write a function, with appropriatetype declaration, to read the powers and co-efficientsof different terms of a polynomialand createthe linkedlist.
(b)
(i)
(d)
2.
What is a Binary SearchTree ?
(ii)
Write an algorithm to create a Binary Search . Tree from an input list of integers.
3.
(a)
(b)
cs-04
(i)
What is a linked list ?
(ii)
Explain how linked lists can be used to store polynomialsof arbitrary degree.
Explain, with an example, the usefulness of height-balancingwhile constructing a Binary Search Tree.
2
4.
5.
(c)
Constructan AVL tree from the following input list : 6 4 2 12 10 3, applyingappropriaterotation.
(a)
(i)
Define the terms "lnternal path length" and "External path length" for a binary tree.
(ii)
Prove that for any binary tree of n nodes the Externalpath length: Internalpath length + 2n.
(b)
What is a heap ? Write an algorithm for insertinga new elementinto a heap.
(a)
In C, how does 'union' differ from 'structure'in its working ?
(b)
Explain what an indexedsequentialfile organisation is. Also give two advantageseach of sequentialand indexedsequentialfile organisations.
(c)
What is meant by "Depth First Search" of a graph ? Considerthe followinggraph :
Explain how a Depth First Search Scheme will traversethe graph startingat node 1.
cs-04
7.000
PGDCA / MCA (I Yr) Term-End Examination June, 2OOG CS-OS: ELEMENTSOF SYSTEMS " ANALYSIS& DESIGN Time : 3 hours
Mqximum Mqrks :75
Note :
Questionno, I is compulsory, Answer any three questionsfrom the rest.
(a)
With the help of an exampleapplication,explain the use of a data dictionary.
1.
(b)
Explain the use of requirementanalysisin system design. Make an SRS document for "School 6
ManagementSystem". (c)
3
Briefly describe five types of
documentation
techniques.
5
(d)
Briefly explain five componentsof muliimedia.
5
(e)
What is an MIS ? Give four features of a typical MIS. Explain the steps followedin the development 8 of an MIS.
(f)
Why is it essentialto use systemsanalysisand design methodologies to build a system ? Give three reasoRs.
cs-05
3 P.T.O.
2.
3.
(a)
Design a EFD for a Banking Management System, ' '' l uPto'level2-'-
(b)
Explain the varioustypes of files in which recordsare rnaintainedin a system.
6
(c)
Describethree types of computergraphicssoftware.
3
(a)
Define the following :
6
(i)
Peak load testing
(ii)
Storagetesting
(iii) Recoverytesting (b)
Give two differencesbetweenDSS and KBS.
(c)
How will you prepare a project requestform ? What
2
are the techniques used to review these requests ? Explain with an example. 4.
(a)
Give two symbols used in DFD, along with their purpose.
(b)
List four factors consideredwhile designinga form.
7
Also give {our characteristicsand two examples of forms. (c)
(d)
cs-05
Give, with justification, three different events that can be consideredas comnutercrimes.
3
Explain two differencesbetween unit and integration testing. What is the use of procedure testing ?
4
5.
(a)
Describe the structure of a feasibilityrepori'
3
(b)
List six considerationson which output to be producedusuallYdePends.
3
(c) '
What is structureddesign ? Explain this with an
(d)
What is the role played by user interface of the software in systemdevelopment? Also explain four steps of GUI develoPment.
cs-05
3
example.
6
15,000
PGDCA / MCA (I Yr) Term-End Examination June, 2006 CS-O6 : DATABASEMANAGEMENT SYSTEM T i m e: 3 h o u r s Note :
l.
(a)
Maximum Mqrks: 75
Question no. 1 is compulsory' three questions from the rest.
Attempt
any
With the help of a suitable example, explain a hierarchical database model.
(b)
are the advantages of index-sequential file organisation ? With the help of an example explain
Whai
the structure of index sequential file' (c)
Why are remote procedure calls used ? Why is a set of DDE mainiained at application level ?
(d)
Design an ER diagram for any of IGNOU's study centres. Clearly indicate the entities, attributes, relationships and the key constraints.
(e)
With the help of two examples for each, explain the use of multimedia databases and knowledge databases.
CS-06
P.T.O.
2.
(a)
Consider an employee file with the details given below :
Record E# Name A
80cMilind
B
5 1 0 {dwet
c
200 Darronrl
Occup.DegreeSe> Location Salary
M.E. M Delhi Analyst B.E. M Mumbai Prog.
10,00c 15,00c
Analyst B . E . M Delhi 72,OOC D , 300 Vlukesh Prog. M.E. M Chennai 9,000
3.
(i)
Make a multi list representation of employeeIile.
(ii)
Write a query to retrievethe record of Salary> 12,000, Degree= M.E., Location = Delhi, Occupation= Analyst, Sex = M.
this
(b)
What are the main featuresof client-servermodel ? Explain the stagesinvolvedin the developrnentof an applicationusing this model.
(a)
Why is the administrationof a database system required? What are the variousfunctionsassociated with databaseadministration?
(b)
Define a data manipulationlanguage.Write a.syntax for the following'andgive an examplefor each : 70 (i) Selectstatement (ii)
.
Update statement
(iii) Delete statement (iv) Insert statement
cs-06
4.
(a)
With
the help of an example relation and the
dependency diagram,
explain ihe
concept
of
with
respect
to
functional dependency. (b)
Explain
the
following
tools
client-server environment : (i)
Dynamic data exchange
(ii)
Object linking and embedding
Also mention the usage of these with an example for each. 5.
(a)
Consider the schema given below : Branch-scheme (Branch-name, asset, Branch-city) Customer-scheme (Customer name, street, customer-city) Deposit-scheme (Branch-name, account-number, customer-name, balance) Borrow-scheme (Branch-name. loan-number, customer-name, amount) Client-scheme (Customer-name, banker-name) 8
Write the SQL statements for the following : (i)
Find all customers who have a balance of over
Rs. 1000. (ii)
Write the query to find the clients of banker Patel, and the city they live in.
(iii) Write a statementto find all the customerswho have a loan amountof more than Rs. 1200'
CS-06
P.T.O.
(iv) Write a statement to find all the customers whose name starts with "R" and who have a balanceof more than Rs. 10,000. (b)
CS-06
With the help of an example,explainthe properties of a Balancedsort tree.
20.000
ADCA / NICA (II Yr) Term-End Examination June, 2006 CS-07 : DISCRETE MATHEMATTCS Time : 3 hours Note :
l.
(a)
t ,
IvrcXImUmlVarKS: /5
Question number 7 is compulsory. three questions t'rom the rest.
Attempt any
Find the conjunctive normal form for the followinq
formula :
l ( ( P^ l e ) v ( p n e ) ) v l p (b)
CS-07
Consider the following graph. Write down. its adjacencymatrix :
P.T.O.
(c)
Let A = l\, 2, 3,4, 5). A ielation R is definedon A suchthaa t R b i f fa + b < 6 . (i)
Write the relation matrix R.
(ii)
Make a digraph of the relation.
(iii) Check if R is reflexive. (iv) Check if R is symmetric. (d)
Make the figure of Konigsberg's7-bridge problem, and draw the correspondingmultigraph.
(e)
Establish the following equivalence,using a truth table : P+QvR=(P=Q)
v(P+R)
(f)
Constructa Hassediagramfor the poset({a, b, cl, c ). Does it represent a lattice ? Give reasons for your answer.
G)
Find the booleanexpressionfor the following gating network (write the output of each gate).
xl x2 x3 x4
cs-07
(h)
For the FuzzySetA of X :{7,2,3,
^^:
4, 5l givenby
03 0.4 0.2 07] 10.2 f i n dt h eu - c uotfA ' 2'i' t n ' TJ' t
for each s e { 0.1, 0'3, 0.7}.
2.
(a)
Find the minimum spanning tree for the following graph using Kruskal's algorithm :
(b)
(i)
ExpressP v Q using f only.
(ii)
ExpressP n Q using ,t only
(c)
3.
(a)
Let g : R * R, where R is the set of real numbers, be definedby g(x) = x2 + 2. Check if g is (i)
one-one
(ii)
onto
Check whether the followingformulasare tautologies or not : (i)
( P + Q ) = [ P v ( Q n n 1< + e ^ p v R ) ]
(ii) (PvQ)+(Q=p)
CS.O7
P.T.O.
(b)
In a single Venn diagram, show three sets A, B, C andB\C, AnC, AU(Bc).
(c)
Use the rules of inferenceto check the consistency of the following argument.At each stage, mention the rule you are applying lf you send me sn e-mail message,then I will finish writing the program. If you do not send me sn e-mail message,then I will go to sleep early' If I sleep early, then I wilt wqke up t'eeling ret'reshed. Therefore, il I wqke up feeling refreshed, then I haue t'inished writing the progrqm.
4.
(d)
Let R be a relation from the set A to A, where A : {1, 2, 3, 41and a R b ilf a > b. Find (i) R2, (ii) F, (iii) R-1.
(a)
Find the shortestpath from a to f for the following graph, using Dijkstra's algorithm. Show all the intermediatesteps.
(b)
Minimisethe followingfunction, using K-map : f (w, x, y, z) : > (0, 4, 6, 7, 8, 70, 1'2, 74)
(c)
cs-07
ExpressI (=x flx)) using universalquantifiers'Justify your answer.
5.
(a)
Construct a weighted connected graph on five vertices that has exactly five minimum spanning trees. Justifyyour answer.
(b)
Expressthe number-87 using (i) 1's complement form, (ii)two's complementform, (iii)sign magnitude representation.Use 8-bit representation.
(c)
(d)
c s -0 7
Draw the logic diagram of HA (Half Adder) anci using HA constructFA (FullAdder).
5
Define Well Formed Formula(WFF).
3
15,000
ADCA / MCA (II Year) Term-End Examination Jurie, 2006
CS-08 : NUMERICAL& STATISTICAL C OMP U T IN G MaximumMarks: 75
T)'i^",3 hours Note :
1.
Question 7 is compulsory. Attempt any three questionslrom the rest. Use of calculators is not qllowed.
(a) Write a FORTRAN90 statementfor each of the 3
following :
\''
'
(ii) , =
"*2
,in *
J2""
/1 +* r)'* r ) + l,r- 3)' [o
['-
bJ
( i i i0) = r[ ^M*)j (.,_ "' _ o'l lt-;"-e)
cs-08
P.T.O.
(b)
Which of the following are acceptablenames of integer variables, real variables and unacceptable names and why ?(i)
457.5
(ii) SUMMER
(iiil rNDrA (iv) .ABC2
(c)
Point out the errors in each of the following statements,and correct them. (i)
Y/6.35 : Q
(ii) TEMP :.5 (TA -
T2)/Z
(iii)Y:(-6.32)5'0+X (d)
Write a FORTRAN program to compute the equivalentresistanceR for given 100 sets of values, where you enter R, and R, from the key board.The resistancesR, and R, are connectedin paralleland the formula for the equivalentresistanceis given below :
1 R
cs-08
1 R
1
1 R
2
(eJ
An air foil is to be plotted with a "camber". The mean line of the foil js given by :
y=+
p-
v=:
I-p-
e p x - x z ) f o rx < p o ( 1+ 2 p x - 2 p - * 2 )
forx>p
Write a program that reads 100 sets of data, of m, x and p each, and which computesand prints the valuesof y. (f)
A town has two doctors, X and Y operating independently.If the probability that Doctor X is availableis 0.9 and that Dr. Y is availableis 0.8, then find the probabilitythat at least one of them is availablewhen needed.
(s)
(h)
Find the regressionline of y on x for the given data : X
2
4
5
6
8
v
1B
72
10
8
.1
11 (
Fill in the blanks : (i)
Mr. Shiv Kumar calculatedthe mean of twenty different numbers. The calculated mean is 72'14. But, while calculating,by mistake he took the number 91., 75 and 82 insteadof the correctedvalue of \9, 57 and 28 respectively. The correct mean of twentv numbers is
CS-08
P.T.O.
If two regressioncoefficientsare, --.- 0'1 and - O'9, the valueof r is
(ii)
(iii) The size of the variable which occurs most frequently is known as (iv) The probabilitiesof occurringof two eventsE, F are 0'25 and 0'5, respectively,and of both occurring simultaneouslyis 0'14. Then the probability of the occurrenceof neither event is equal to 2.
(a)
Two one-dimensionalarrays C and D have 25 elements each. Write a computer program to compute and print the quantities 25
A = / t- t
(c+d) l
I'
i.- 1
25
B=> .
(c -di)z
i=1
25
P= I
c,d,
i=1
(b)
Use the method of least squaresto fii the curve f(x) : c.x + .rfi
cs-08
X
1
f(x)
I6
fot the followingdata : A
14
16
25
72
10
6
(c) Writea programsegment to readformattedvaluesof A and B from a file, and to compute S=AB T = A + B - x - = _
ST
S+T
Also write the formattedvaluesof S, T and X into a file.
3.
(a)
(b)
(c)
Given a trianglewith sidesa, b, c, write a FORTRAN program to find whether it is an isoscelestriangle.
4
Find the correlationcoefficientbetweenx and v from the given data :
6
x
1
3
4
6
8
v
1
2
4
4
5
9
11
74
8
9
The ratio of relativisticto classicalmomentum as a function of the speedof light is given by the formula ratio = J==
It-( Write a program that will compute and print a table of the ratio for f = 0 1 to 0.9 in stepsof 0.1 f = 0 1 9 1t o 0 . 9 9 i n s t e p so f 0 . 0 1 .
cs-08
P.T.O.
4.
(a)
ideal compressor outlet temperature and efficiencyfor a gas turbine are given by
The
rp r*
r =ro tfl
, and
e f f i c i e n (ceY)= 1 -
r o,)t; ltl
\ ' 2/
where To is the inlet temperature, P, the inlet pressure,Prthe outlet pressure,and y, the ratio of specificheats.
(b)
Write a program to computeand output T and e for T o = 4 5 0 , P , = 1 0 , P z = 5 5 , a n dY = 1 ' 5 .
5
For the followingfrequencydistribution,computethe mean, standarddeviationand coefficientof variation'
5
Weight (in kS)
2 3 - 2 7 2 8- 3 2 3 3 - 3 7 3 8 - 4 2
No. of persons
(c)
10
35
40
15
Wriie a program to calculateand print the value of c(n, k) =
n! k(n_k)l
Write a subroutineto calculatethe factorial and call it in the main program.
cs-08
5.
(a)
Identify errors, if any, in the following FORTRAN statements: (i) Do8. I=1,3 (ii) Do 33 L = M, N(3),I (iii) GIDAN = XYL + -N(3.2) (iv) DO 44 K : 1. M+2, N (v) C(1e) : B(- 4) + F13
(b)
Three machines, I, II, and III manufacture respectively,0.4,0.5, and 0.1 of the total production. The percentage of defective items produced by I, II, and III is 2o/0, 4o/o and lo/o respectively.For an item chosenat random, what is the probabilitythat it is defective?
fnl
An enquiry into the budget of the middle class familiesin a certaincity of India gave the following information : Expenses
Pricein 1998 Price in 2000 (in Rs.) (in Rs.)
Food 40o/o
140
165
Fuel 10%
20
23
Clothing 20%
60
70
Rent 20o/o
DU
BO
Miscellaneous 1070
30
55
Compute the cost of living index number for 2000 taking 1998 as the basevear. CS-08
P.T.O.
Assume that your stock of sales merchandise is maintained based on the forecast demand' If the distributor'ssalespersonnelcall on the first day of each month, compute your forecastsales from the given historicaldata. Month
Actual Demand
June
140
July
180
August
770
Using a simple three-month moving average' what is the forecastfor SePtember? Using a weighted moving average,with weights of 0'20, 0'30, and 0'50 for June, July, and August, respectively,what is the forecast for September?
cs-08
13,000
ADCA / MCA (II Yr) Term-End Examination June, 2006 AND C S - O 9: D A T A C OMMU N IC A T ION NETWORKS Msximum Marks , 75
Time : 3 hours
Question number 7 is compulsory. three questions Jrom the rest.
Note :
1.
Answer any
An analog signal is limited to 4 kHz. It is converted to a PCM signal using 8 bitlsample. What is the bii
(a)
rate on the transmission line I
3
Make a timing diagram and show the differences
(b)
between
manchester
encoding
and
differential
manchester encoding for the bit stream
10001011011. (c)
'
Calculate the number of networks that can exist in Class A, B and C IP addresses.Also, calculate the number of hosts a network in each class can have'
(d)
What happens in a token bus network if a station accepts the token and then crashes immediately ? How does protocol handle this situation ?
CS-09
P.T.O.
(e)
2.
(i)
Why is the TCP header length required ? Explain this.
(ii)
What is the need of a variable size sliding window ?
(0
What is a subnet? How is subnettingimplemented? Explain this with the help of an example.
(a)
Explairl the TCp connection establishment procedures both in the normal case and in the
(b)
(c)
3.
Answer the following questions with respect to a TCP header:
(a)
call-collisioncase,with the help of a diagram each.
s
Explain two important reasons for having a minimum frame lengthin CSMA/CD. Explainthis diagrammatically.
5
Derive the throughput expressionsfor ALOHA and Slotted ALOHA.
s
Sketch a Network AddressTranslation(NAT) Box, and explain its operations.
s
(b)
Why is there a need for compression? Differentiate betweenJPEG and MPEG standards. 4
(c)
Give at leastthree functionsof a modem
3
(d)
How does UDP handleflow control, error control or retransmissionupon receipt of a bad segment?
s
cs-09
4.. (a)
(b)
Explain the operation of an FDDI token ring, with the help of a diagram. Also, list the two key betweenFDDI and IEEE 802'5. differences Explain the functioning of the HDLC protocol for
I
the following :
-
7
(i)
Busy condition
(ii)
Error recoveryusing RFJ command
(iii) Two-way data exchange (iv) Link setup and disconnection 5.
Write any three differencesbetweenthe following'pairs' (il
Circuit switching and Packet switching
(ii)
services Connectionorientedand Connectionless
75
(iii) ARP and RARP (iv) Upward multiplexingand Downward multiplexing (v)
cs-09
X'25 and Frame relay
20,000
ADCA / McA (II Yr) Term-End Examination June, 2006 CS-10: SOFTWARE ENGINEERING T i m e: 3 h o u r s Note :
l.
(a)
Maximum Mqrks : 75
Question no. I is compulsory. Answerany three questionsfrom the rest.
A library of a Universitywants to automate lending of books. The main objectivesof the s/w are : .
On-line record of valid borrowers.
o
Online record of books issued.
o
Online reservationof books.
For the above mentionedsystem (i)
Developa SoftwareRequirementSpecification.
(iil
Design DFD upto two levels.
(iii) Constructthe structurechart for this system. (iv) Suggest a testing strategy for any two s/w modulesin (iii) above. (b)
cs-10
Explain any five software quality parameters.
20 s
P.T.O.
(c)
Why is there often tension between a software engineering group and an independent software quality assurancegroup ? Is this healthy ? Justify your answer.
2.
3.
(a)
User interfaces can be made effective by following three important principles. Elaborate these principles.
(b)
Differentiate between top down and bottom up integrationtesting.Give one exampleof each.
(c)
What are the advantagesand disadvantages of size oriented metrics?
(a)
What is cyclomatic complexity ? How can you relate it to independent paths ? Explain with suitable example.
(b)
What is risk estimation ? How is a risk table prepared?
(c)
Why is reliabilitya better measureof quality ? How is it measured?
4.
(a)
Develop a use case diagram for an ATM system where the withdrawal and deposit operations are allowed.
(b)
cs-10
What is Software Configuration Management (SCM)? Explain the elementsof a SCM system.
10
5.
(a)
Develop a procedural design for an interactive user interface that queries for basic "lncome Tax" information. Derive your own requirements and assumethat all tax computationsare performed by other modules.
(b)
List and explain any three situationswhere dynamic testing tools are better than the statictestingtools'
(c,
Differentiatebetweenan objectusedin OOA and an object used during data modelling.
cs-10
18,000
ADCA / MCA (III Year) Term-End Examination June, 2006 CS-12 : COMPUTERARCHITECTURE Maximum Mqrks : 75
Time : 3 hours Note :
1.
Question number 7 is compulsory. Answer any three questionst'rom the rest.
(a)
Explain a distributedmemory multicomputersystem, with the help of an appropriatediagram.
(b)
Consider the following two interleaved memory organization for a main memory system with 16 memory modules.Each moduleis assumedto have a capacityoflMbyte. Design 1 : 16-way interleavingwith one memory bank. Design 2 : 8-way interleavingwith two memory banks. For this systemcalculatethe following :
CS-12
(i)
addressformat for each organization.
(ii)
maximum memory bandwidth.
10
P.T.O.
(c)
Show the numerical analysis demonstrating the perf.ormancedegradationcausedby branchingin an instruction pipeline. State all the assumptionsand 8
explain each notation used. (d)
Derive the equationsrepresentingthe followingw.r.t. superpipelinedprocessors: o
Time required to exeiute N instructions
.
The relationship between Speedup and Base machine
Explicitly state the assumptionsand explain each notation used. 2.
(a)
7
Explain any one directory-based protocol fof with the help of network-connected multiprocessors, a diagram.
(b)
Explain five salient featuresof data flow computers.
(c)
Considerthe following pipeline reservationtable :
1 S1
2
3
X
X
s2 S3
4
X X
Calculateforbiddenlatenciesand greedycyclesfor this pipeline processor.
cs-12
5
3.
(a)
List two differencesbetweeneach of the following : (i)
Crossbarversusmultistageswitches
(ii)
Virtual channelvs. physicalchannel
6
(iii) Buffer deadlockvs. channeldeadlock (b)
A computer systemhas a 12g byte cache. It usesa 4-way set associativemapping with B bytes in each block. The physicaladdresssize is 32 btts. and the smallest addressableunit is 1 byte. Answer the following for this system:
.
'(i)
Show the mapping betweenphysicaladdresses and cacheaddresses.
(ii)
To what block frame of cache address will 000010AF1ube assigned?
(iii) If the addresses00001OAFru and FFFFTAxyru are assignedto the same set, find the valuesof x and y. 4.
(a)
Perform a data dependencyanalysison the following code segment: 51 : Load R1, M(100) 52 : MOVE R2, R1 53 : Inc Rl 54 : Add R2, R1 55 : Store M(100),R1 Also draw the corresponding data dependency graph.
c s -1 2
P.T.O.
(b)
5.
Differentiate between a VLIW processor and a superscalarprocessor'Also, explainthe pipeliningin VLIW architecture,with the help of a diagram'
(a)
I
Explain the concept of overlappingregisterwindows in the SPARC architecture,with the help of 'a diagram.
(b)
cs-12
'context' mean with respect to a What does multithreadedsystem ? With the help of a diagram' explain multiple context prQcessors'
25,000
@l ADCA / MCA (lll Year) Term-End Examination June, 2OOG C S-l 3 : OP E R A T IN G S Y STEM S Time : 3 hours Nofe :
1.
(a)
MqximumMsrks: 75
Question number 7 is compulsory. Answer any three questionsfrom the rest.
What
are the factors to
be considered for
an
effective disk space allocation strategy ? Also, explain the indexing strategy for non-contiguous allocation of disk space. (b)
Write
and explain, Belady's Anomaly.
Give an
example illustrating the anomalous behaviour of FIFO. (c)
Explain
the
concurrent
reader's and
writer's
problem. Write an algorithm to solve it. (d)
Write and explain, Ricart and Agrawala's algorithm for mutual exclusion in distributed svstems.
(e)
Compare
the
LINUX
opnruting
system
with
WINDOWS o/s with respect to features of open source software.
cs-13
P.T.O.
: 2.
(a)
(b)
3.
(a)
(b)
4.
(a)
(b)
5.
Explain processor synchronization issues in Multiprocessorsystemwith sharedmemory.
a 6
Define processscheduling.What is the role of the scheduler? List all the schedulersavailable,along with their working principles.
9
Explain protectionand sharingfor the following :
8
(i)
Paging system
(ii)
Segmentedsystem
Write and explain an algorithm for deadlock prevention.
7
Write and explain the Lamport's Bakery algorithm for inter-processsynchronization.
B
What is a digitalsignature? Explain the method for generationand verificationof digital signatures.
7
(a)
Explain the Bell and La-Padulamodel of protection, with an example.
(b)
Explain the architectureof a DistributedFile system, with special relerenceto a client-serverdivision of labour.
cs-13
20,000
MCA (IIl Year) Term-End Examination June, 2006 C S - 1 4 : IN T E L L IGE NSTY STEM S Mqximum Marks : 75
Time : 3 hours Note :
Question number 7 is compulsory. Attempt any three questionslrom the rest.
(a)
Define cognitive systems. Mention three differences
1.
4
between cognitive systems and expert systems' (b)
Transform
each of the following sentences into 4
disjunctive normal form '
( i ) - ( P & Q )& ( P v Q ) (iil -Pv-Q) &(R+S) (c) Write three differences betweenInductiveInference
(d)
(e)
and Abductive Inference mechanisms. Give one application of each type of inferencing technique.
4
Define the three Jechniquesfor indexing and retrieval of knowledge from memorY.
3
Explain
'script'
representation.
in
the
Cteate
necessary assumptions.
cs-14
context of knowledge 'movie script'. Make a 5
P.T.O.
(f)
How does the use of a heuristicfunction reducethe searchspace? Suggesta good heuristicfunction for each of the following : (i)
TravellingSalespersonproblem
(ii)
8 puzzleproblem.
(S) Write an algorithm for matchingsubstrings. 2.
(a)
(b)
'
3.
6
4
Write a LISP code for finding roots of a quadratic equation,ax2 + bx + c = 0, a # 0, a, b, c e R.
5
Transform the following FOPL statements into equivalentconceptualgraphs :
5
(i)
Vx Normal (x) & Grown (x) + Walk (x)
(ii)
Vy Haswings(y) & Layseggs(y) -+ Isbird(y).
(c)
Explain the five levelsof knowledgerepresentation.
5
(a)
Define objectsand messages.Also give one example for each.
3
(b)
Write a LISP function that will reversethe elements of a list. [eg.input list ((ab)(c(de))),outputlist (((ed)c)(ba)) 5
(c)
Name any four arc-relationsused in an associative network. Give an example displaying the three arc-relations. 4
(d)
Apply the unificationalgorithm to the following set of clauses: l P ( X , Y ) n Q f i , j o e )n R ( Y , Z ) , P (john, mary) n Q (john, A) n R (mary,A) )
cs-14
3
4.
(a)
(b)
Write and explain the various steps of the branch and bound searchtechnique.
5
Define the following terms w.r't' heuristic search algorithms'
6
(i)
Admissibilitycondition
(ii) Completenesscondition (iii) Dominanceproperty (c)
5.
(a)
(b)
Give any four functions performed by comprehensivememory managementsystem'
a 4
What is a DistanceMatrix ? How is it different from for matching? the probabilistic'measures
4
Give ihe variablebindings, if any, which will make each of the following pairs of lists match i
4
(il
(.x ab(cd) .x), ((ef)ab .Y ef)
(ii) (abc(da) f), (?x bc (d ?y) ?z) (c)
Considerthe following problem : You are given two jugs of capacity4 gallonsand 3 gallons. Neither has any measuringmark on it' How can you get exactly2 gallonsof water into the 4 gallon jug ? Write production rules for the problem and obtain the solution of this problem.
cs-14
7
19,000
MCA (III Year) Term-End Examination June, ?OOG
C S - 1 5 : R E L A T ION A L D A T ABASE MANAGEMENTSYSTEM Time : 3 hours Note :
1.
(a)
Mqximum Mqrks: 75
Question no. I is compulsory. Answerony three questionsfrom the rest. An organisation has multiple retail stores. These stores have to keep track of products, suppliers, customersand employees.Make an E-R diagram, statingthe assumptionsused,if any.
. (b)
Explain multi-valueddependencywith the help of an example.How is it relatedto normalization? Explain this with the help of an example.
(c)
I
7
Explain the major transaction states with a suitable diagram.Describea suitablemethod using Locks, for handling a large number of concurrenttransactions per minute in an online airline reservationsvstem. 7
cs-15
P.T.O.
(d)
Explain the significance and usage of views in .a relational databasesystem, with the help of suitable examples.Explain any four constraintsof updating a fuple in a view.
2.
(a)
Define indices and their advantagesin RDBMS. 'of clustering and hashing Explain the concepts indices,using an exampleof each.
(b)
Considerthe relations: GRADE (stud_id,subject_id,grade) SUBJECT (subject-id,s-namd, teacher) (i)
(ii)
3.
(a)
Write the relational algebraic query for the following : .
List the studentnumber, subjectnamesand gradesof the studentwhoseid is 100.
'
List the grades of all the students in the subjectstaught by teacher "XYZ".
Convert the queries above into an optimized query graPh.
Consider the following relationsin the context of a BPO: Customer (C-code, C-name, C-phone) Product (P-code, P-desc, P-price) Call (Ca-id, C-code, P-code, Ca-result, Ca-date)
cs-15
Write the appropriate SQL commands for the following : (i) Find the name of customersto whom a call is not made. (ii)
Find the total number of calls made to the 'Smith'. customerwn'osename is
(iii) List C-name and P-desc of the calls made today. (iv) Find the product details of those products whose price is aboveaverage. (b)
A university maintains databasetables about the faculty and the students' FACULTY (f-id, f-name, subject-id) STUDENT (S-id, S-name, S-course,S-dob) MARKS (S-id, subject-id, marks) Constraints' One facultyteachesonly one subject' (i) Identify suitable accessrights for the faculty, (ii)
studentsand databaseadministrator' Createthe accessmatrix for (i) above'
(iii) Write the query modification statement for the students. 4.
(a)
(b)
cs-15
the three problems of concurrent transactionsin RDBMS, with suitableexamples'
5
What is a timestamp ? How does the system generate timestamps ? Explain the timestamp ordering protocol for concurrencycontrol'
5
Explain
P.T.O.
5.
(c)
Explain the different time components involved in accessinga disk block.
(d)
"The decomposition of a relation into BCNF is always dependency preserving." Is this statement true ? Give reasonsfor your answer.
(a)
Explain the following terms with the help of an exampleor diagram : 10 (i)
Data independence
(ii)
Security in statisticaldatabases
(iii) Serialisability (iv) Closureof an FD (b)
cs-15
Supposethe write aheadLog Schemeis being used. Give the REDO and UNDO processesin the strategy of writing the partial update made by a transaction to the database,as well as in the strategyof delaying all writes to databasetill the commit.
4
19,000
ADCA / MCA (lll Yr) Term-End Examination June, 2OOG
CS-16: OBJECTORIENTED SYSTEMS Time :3 hours Note :
l.
(a)
Maximum Mqrks: 75
Questionno. I is compulsory. Answer any three questionsfrom the rest. A library in a universityis having provision to issue books to students and staff. It collects different penalties from both categoriesin case of late return of books.The library also managesdifferentregisters which hold information about members, books, magazines, newspapers, penalties collected, etc., manually.The library needsa systemto maintainthe registersas well as for performingtransactionssuch as issue and return of books, etc. Identify classesfor the system and draw the class diagram. Add three attributesand three operationsto the classes.Explain the classesas well as associations, if any. Make assumptions,if necessary.
cs-16
70
P.T.O.
(b)
Identify at least five classesin a Railway Reservation System,and show their relatedassociations.
(c)
Explain the following terms, with an example of each: (i)
State Diagrams
(ii)
Generalization
(iii) Abstract Classes (d)
Draw an E-R diagram and show the relationships between various entities like Student, College, Teacher, Hostel, Library of a IJniuersity Information System. The diagram should also include attributes. Make necessaryassumptionswherever necessary.
2.
(a) Prepare an object diagram, showing at least five relationshipsamong the following object classes: School, Playground, Principal, Board, Classroom, Book, 'Student, Teacher, Cafeteria, Rest room, Computer, Desk, Chair, Ruler, Door, Swing. Include associations, aggregations and generalizations.Use qualifiedassociationsand show multiplicity balls in your diagrams.You do not need to show attributes of operations. Use association names where needed. (b)
cs-16
What is a Recursiveaggregate? Explain this with an example.
10
3.
(a)
Define a Scenario.Give an example of a Scenario. Also, define an Event trace and give an example of it.
(b)
Draw a Data Flow Diagram for computing the volume and surfacearea of a cylinder. Inputs are the height and radiusof the cylinder.Outputsare volume and surfacearea. 10
4.
(a)
Explain
five methodology
differences between an OMT and the structured software
developmentapproach. (b)
5.
For each of the following systems, identify the relative importance of the three aspects of modelling : (i)
Telephone Answering machine
(ii)
Typewriter
10
(a) What is Overriding ? How is it different from Overloadingof functions? Explain two situationsin which one would need to use overriding, with an
10
exampleof each. (b)
cs-16
What is encapsulation? Explain the need for encapsulation,using an example.
23,000
ADCA / MCA (II Year) Term-End Examination June, 2006 CS-51 : OPERATIONSRESEARCH Maximum Mqrks, 75
Time: 3 hours Nofe :
Question number 7 is compulsory. Attempt any three more questionsfrom questions numbered 2to5.
(a)
3 items are to be loadedonto a truck whose capacity is 10 tons. The weighi per unit (w,) and value per unit (v,)of each item is given in the following table :
1.
i
vi
wi
1
5
2
2
6
3
3
4
1
Assume that only integral units of the items can be loaded. The value of the load carried is to be maximised. Formulate
(iil
If the problem is to be solved by dynamic programming, write the general recursion for this
this situation programming problem.
problem.
CS-51
integer
(i)
as
an
4
P.T.O.
(b)
Find the range of valuesof p and q"whichwill render the entry (2, 2) a saddlepoint for the game Player B 81
82
A,' 12 6 l
83
5-ll
Player A O,
Z lo t A3L6 p
101 4)
l
Are there values for p, q that will make (3, 1) a saddle point ? Justify your answer. (c)
Which of the following statementsare true ? Give reasonsfor your answers. j (i)
The feasibleregion for any Lpp is non-empty.
(ii)
If a random variabletakes two values0 and 1 1 with probabilities = x und 11", then x can 2 2 take any real value.
(iii) The function f, definedby (x) = /n x V x > 0, is a convexfunction. (iv) For a two person zero sum game with the pay-off matrix A, max min a.. >*min max a... i
cs-51
j
'
J
j
i
i
j
4
(d)
My diet requires that all ihe food I eat come from one of the four "basicfood groups" (ice cream, soda,/cola, biscuits and cake). At present, the following four food items are available for consumption: biscuits,chocolateice cream, cola and cake. Each biscuit costs 50 p, each scoop of chocolateice cream costsRs. 10, each bottle of cola costs Rs. 10 and each piece of cake costs Rs. 5. Each day, I must consume at least 500 calories, 6 grams of chocolate, 10 grams of sugar and 8 grams of fat. Thesecontentsper unit of each food is given below. Fat Sugar Chocolate (grams) grams) Calories (grams)
Food
Biscuit (,zunit)
400
3
2
2
Chocolateice cream (/scoop)
200
2
2
4
Cola (/bottle)
150
0
4
1
Cake (/piece)
500
0
4
5
Formulatean LP model that can be used to satisfy my daily consumptionrequirementat minimum cost. (e)
Solve the following LPP by simplexmethod.
4 70
Max 4x, + 3x, subjectto x, + *2 . 8, 2xr+xr>10 '
CS-51
x1,x2>0
P.T.O.
2.
(a)
Data are gathered on the sale of TV sets at a retail shop over 100 days. They are compiled and presentedbelow. No. of sets sold
Frequency of days
1
5
2
15
3
20
4
30
5
18
6
9
7
3
Work out the expected(mean)number of sets sold per day.
Solve the following LP by graphical method : Maximizez=x7+x2
s.t. 2x, + 3x, < 16 xr+4xr>10 x|xr20
CS-51
-
(c)
An average of 10 customersper hour arrive at a bank with only one teller. The averageservicetime for each customer is 4 minutes. Assume that both inter-arrivaltimes and servicetimes are exponentially distributed. (i)
Which category of queuing models does this situation fall in ?
(ii)
What is the probabilitythat the ieller is idle ?
(iii) What is the average number of customers? (d)
3.
waiting
5
List three major limitationsof the PERT model.
3
A car rental company is facedwith an allocationproblem resulting from rental agreementsthat allows cars to be returned to locations other than those at which they originally rented. At the present time, there are two locations (sources) with 15 and 13 cars surplus, respectively,and four locations(destinations) requiring9, 6, 7 and 9 cars, respectively. The transportationcost (in Rs.) of a car betweenthe locationsare as follows : Destinations
Formulate the above as an LP (Transportation Problem), and obtain an initial basic feasible solution. Further, identify the destination that will receive a supply less than required, and the amount it receives.
CS-51
15
P.T.O.
4.
(a)
Four different jobs can be carried out on any of the four machines.The matrix below gives the cost (in Rs.) of processingjob i on machinej. Machine -+ Job J
M1
M2
M3
M4
J1
5
7
11
6
J2
8
5
9
6
J3
4
7
10
7
J4
10
4
8
3
How should the jobs be assignedto machines(one iob to one machine)so that total processingcost is minimum ? (b)
A machine produces lOo/odefectiveitems. Denote a good unit by G and a defectiveunit by B. Carry out simulation to identify each of the 15 coniecutive units producedas G or B. I Use the sequenceof random digits : 4076486653 8950826528 4934582003 l How many G's and B's are produced?
(c)
A shopping plaza is in the shape of a rhombuswith verticesA (- 1, 0), B (0, 1), C (1, 0), D (0, - 1). A phone booth is to be located at a point P in the plaza so that the sum of the squaresof its distance from all the verticesis minimum. (i) (ii)
Formulate this situation as a quadratic programmingproblem. Write the Kr-rhn- Tucker conditions for this problem.
CS-51
5.
(a)
The daily demandfor a commodityis approximately 100 units. Everytime an order is placed,a fixed cost of Rs. 100 is incurred.The daily holding cost per unit inventory is Rs. 0.02. Determinethe economic lot size. Write down the dual of the following LP (primal) problem : Maximizez = l2xt + 3x, -
x,
s.t. 10x, + 2x, + x, > 100 7xr+3x"+2xr<77 2xr+4xr+xr<80 *1a0,x,xr20. (c)
Two companies A and B are competing for the market of the same product. Their different strategiesare given in the following pay-off matrix. Company B
Company A
81
82
A1 12
-2
ol
2
3l
|
A2 L1
83 |
Determine the best strategies, and find the value of the game. (d)
CS-51
Explain three limitations of operations research.
3
17,000
ADCA / MCA (lI Year) Term-End Examination June, 2006
C S- 5 4 : F IN A N C E& A C C OU NTINGON C OMP U T E R S Mqximum Mqrks : 75
T i m e: 3 h o u r s Note :
l.
(a)
Question number 5 is compulsory. Attempt any three questionsfrom the rest.
Explain, in
detail, the
following accounting
concepts : (i)
Cost concept
(ii)
Accrualconcept
(iii) Consistencyconcept (b)
"Accounting is closely concerned with control"' Explain the
statement. Discuss the
role
accountingfeedbackin the processof control.
c s -5 4
of 6
P.T.O.
2 . From the following balancestaken from the books of M/s Ram Kishore & Co, prepare a Trading and Profit & Loss account for the year ending December 31tt, 2004 and
15
balancesheetas on that date. Particulars
Amount Rs. (Dr)
Amount Rs. (Cr)
Stock (1.1.2004)
17,000
Debtors & Creditors
25,000
22,O00
Purchasesand Sales
89,000
1,15,000
Returns
17,000
12,000
Drawing and Capital
8,000
1,25,000
Fire insurancepremium
2,000
Life insurancepremium
5,000
Income tax paid
10,000
Bills receivableand payable
14,000
12,000
Sales tax payable Wages and Salaries
18,000
Telephone expenses
3,000
Sales promotion expenses
21,000
Cash & Bank overdraft
5,000
Audit fees
8,000
cs-54
16,000
14,000
Amount Rs. (Dr)
Particulars Discount
Amount Rs. (Cr)
4,000
Investments
1,000
60,000
Interest on investment
5,000
Interest on bank overdraft
6,000
Rent paid
12,000
Bad debts recovered
2,000
Total
3 ,2 4 ,0 0 0
3,24,000
Closing Stock as on 31st December.2004 amounted to Rs. 25,000.
3.
Explain, in detail, the featuresof an appropriate capital structure.Also explainthe variousfactorswhich determine and influencethe capitalstructureof a firm.
4.
(a)
Examine different classes of
Js
capital projects.
Explain why they are approacheddifferently. (b)
I
Explain the concept of Zero Base Budgeting, Also give four of its advantagesand three disadvantages. .-'
c s -5 4
3
-
P,T.O.
5.
(a)
The following figures relate to a company manufacturinga varied range of products : Particulars Year ended 31't March. 2003
Total Sales (Rs.)
Total Cost (Rs.)
22,23,000 1 9 , 8 3 , 6 0 0
Year ended 2 4 . 5 1 . 0 0 0 27.43,200 3 1'' March, 2004 Assumingstabilityin price with variablecosts carefully controlled to reflect predeterminedrelationshipsand an unvarying fixed cost, calculate (i) The Profit Volume ratio . (ii) Fixed Costs (iii) Fixed Costs percentageto Sales (iv) Break even Point Margin of Safetyfor the year 2003 and 2004' 75 XYZ Ltd. manufacturerof industrialvalvesprovidesthe following informationfor the year ended3ltt March, (v) (b)
2005. Per unit
Particulars
Total
25
3,75,000
Variable
15
2,25,000
Fixed
3
45,000
18
2,70,000
Sales(15,000 valves)
(i)
Production Overheads
(ii)
L,05,000
Gross Profit
cs-54
Administration,selling and distributionoverheads(Fixed)
32,000
Net Profit
73,000 ' 4
The actual Sales, Production and Stocks for the yeay are as under : Particulars
II Opening Stock
Total
Quarter II
IV
2,000 1,000 4,000
Production 6 , 0 0 0 4 , 0 0 0 5 , 0 0 0 3 , 0 0 0 1 8 , 0 0 0 Sales
4,000 5,000 2,000 4,000 15,000
Closing Stock
2 , 0 0 0 1 , 0 0 0 4 ,0 0 0 3 , 0 0 0 3 , 0 0 0
You are required to prepare quarterly statements of profitability on the basis of Absorption Costing and MarginalCosting. 15
c s- 5 4
18,000
MCA (Revised) Term-End Examination June, 2006
M C S- O 1 1: P R OB L E MS OL V INGAND P R OGR A MMIN G Maximum Morks: 700
Time: 3 hours
(Weightage75o/o) Note :
Questionnumber 7 is compulsory. Attempt any three questionsfrom the rest'
(a)
Design an algorithm, draw a corresponding flow chart
1.
and write a program in C, to print the fibonacci
10
series. (b)
Write a program that does not use the inbuilt string
10
functions to perform the following :
(c)
(i)
To compare two strings
(ii)
To'copy a string
Design an algorithm, and write a program to find ihe factorial of a number using recursion.
MCS-o11
10
P.T.O.
(d)
A C program containsthe followingdeclarations:
10
int i, j; long iX; short S; float X; double dX; char C; Determine the resultantdata type of each of the following expressions: (i) i+C (ii) X+C (iii) dX + X (iv) ((int) dX) + iX (v) i+X (vi) S+j (vii) iX + j (viii) S + C (ix) iX + C (x) i+j 2.
(a)
Summarizethe purpose of the format strings (like o/os,o/od,o/oc) that are' comrnonly used within the printf function, with an examplefor each.
(b)
10
When can two matricesof order a x b and c x d be subtracted? Also write a program in C to find the differenceof two such matrices.
MCS-o11
70
3.
(a)
Design an algorithm, draw a corresponding flow chart and write a C program to check whether a given string is a palindrome or not.
(b)
Explain the meaning of
each of
10
the following
functions prototypes and mention the return data type of each of them : (i)
double f(double a, int b);
(ii)
void f(long a, short b, unsigned c);
70
(iii) unsigned f(unsigned a, unsigned b); (iv) int (-f) (char*, int); (v)
4.
(a)
int * f(charo, int);
What is the difference between a function and a macro ? Find the largest number among two numbers using a function definition as well as a macro. Which is more efficient in terms of execution time and code size ?
(b)
Write
a
program
1t1 IU
to
sort a
list of
strings in
alphabetical order, using an array of pointers.
5.
(a)
10
Wiite a program, using 'structures', to calculate the gross salary and net salary, if the details of an employee along with the basic pay, attendance and deductions are given as input.
(b)
Write a program to count the number of characters, number of words and number of lines in a given file.
MCS-o11
1n tv
1n
11 , 0 0 0
MCA (Revised) Term-End Examination June, 2006 MCS-012 : COMPUTERORGANISATION& ASSEMBLY LANGUAGEPROGRAMMING Time : 3 hours
Mqximum Mqrks: 700 (Weightage 75o/o)
Alote :
l.
Question no. I is compulsory. Attempt any three questionsJrom the rest.
(a) Construct the Karnaugh map for the following function, and find the function in sum of producl form. Draw the resultantlogic diagram. F ( A ,B , C , D ) : > ( 0 , 2 , 4 , 5 , 6 , 7 , 8 , 7 0 , 1 3 , 1 5 ) (b)
Draw the logic diagram for a 4 x 4 random access memory. Assumethat the cellsof RAM are made of R - S flip-flop.
(c)
Seek time on a hard disk is 50 ms. It rotates at a speedof 3000 rotations/sec.Each track on the disk has 100 sectors.Find the averageaccesstime for the disk.
MCS-O12
P.T.O
(d)
Explain, with an example of each call, any five DOS function calls supported by INT 21H in the 8086 10
assemblylanguage. (e)
Explain,
with
an
examPle,
the
following
: logic-microoperations (i)
SelectivecomPlement
(ii)
Mask operations
(iii) Insert (iv) Clear
(0
What is the need of master slave flip-flop ? Explain its functioningwith the help of a suitablediagram'
(g)
Write a program to evaluatethe following expression using an accumulatormachine : A = B + C " D . E + F
2.
(a)
How can ihe subtractionoperation on binary numbers be achieved by using addition operations only ? Explain this, using a 4-bit binary number.
(b)
Construct a 4-bit right-shift register with serial input-output using D flip-flops. Describe its functioning.
(c)
5
What is a micro-instruction ? Explain the three micro-instruction formats, with the help of suitable diagrams.
MCS-012
10
3.
4.
(a)
Explain the process of handling an interrupt that occurs during the executionof a program, with the help of an example.
(b)
Write a program in 8086 assemblylanguagethat checks an input string against a password string stored in the memory and outputs an appropriate messageif the stringsare not equal.
(c)
What is the significanceof FAT ? What are the limitationsof FAT 16 ?
(a)
What is the sequenceof micro-operationsrequiredto fetch an instruction?
(b)
Explain any five addressingmodes used in an 8086 microprocessor,with the help of an example of each.
(c)
Assume a computerhas 32 word RAM each having a word of 16 bits and a cache memory of 4 blocks, with each block having 16 bits. Where can we find a main memory address21 in the cache(if it exists)if (i)
Set associative mapping is used?
(ii)
Direct mapping is used?
(iii) Associativemapping is used ? Explain your answerswith the help of a diagram in each case. 5.
(a)
10
Write an 8086 assemblylanguageprogram that finds the largest,'andthe secondlargestnumber from a list of 10 numbersstoredin the memorv.
MCS-012
P.T.O.
(b)
(c)
Draw the logic diagram of a full adder. Create a 2-bit adder-subtractorcircuit using the block diagram of the full adder.
6
Explain the followingwith the help of an exampleor a diagram,whicheveris appropriate:
I
(i)
Parity bit
(ii)
Floatingpoint notation
(iii) Refreshrates in video controllers (iv) An l/O channel
MCS-O12
11 , 0 0 0
MCA (Revised) Term-End Examination June, 2006
MCS-013: DISCRETE MATHEMATICS Mqximum Marks: 50
Time : 2 hours Note :
l.
Question number 7 is compulsory. Attempt any three questionsfrom the rest.
(a)
Prove (p + q) = (-p v q) using a truth table.
(b)
Express the following statement using existential
2
2
quantifiers :
-(vx P(x)) (c)
Give a direct proof of the statement "The cube of 4
an odd integer is odd". (d)
Find the logic circuit correspondingto the statement ( ( x ,v x r ) ' n ( x , A x i ) ' ) '
(e)
Let f and g be functions defined by f(X) = x2, Sfi) = x * 1. Check whether foS(X) = gof(X).
MCS-o13
S
3
P.T.O.
(0
In how many different ways can a 7-person committee be formed containing 3 women and 4 men from amongst a group of 20 women and 30 men ?
(g)
2.
(a)
How many numbers between 1 and 100, both inclusive,are there which are divisibleby 2 or 5 ?
3
Let A and B be n x n matrices.Check the truth value of the following statements:
5
(i) lBvA1(A+B) =Al (ii)
lB VA [A + B = 1,.,1
where I,.,is the n x n identity matrix. (b)
Let A = 17, 2, 3, 4, 5lr.Let R be a relation defined on A such that aRb iII a + b. Check if R is a (i)
3
Reflexiverelation
(ii) Symmetricrelation (iii) Transitive relation (c)
For the setsA, B, C represent (i) Au(BnC)
.
(ii) AAB using Venn diagrams. 3.
(a)
2
Prove by mathematicalinduction that 13+ 23 + 33 +... * n3_
MCS-O13
n2(n+1)2 4
(b) For the booleanalgebra ( { 0 ,1 1 ,A , V , ' ) evaluatethe booleanexpression E ( X 1X, 2 ,X 3 )= ( X 1v X 2 )^ ( X i v X ; ) n ( X , v X r ) ' forXr=0,X2=1,X3=0. (c)
Four cards are chosen randomly from a pack of 52 cards. What is the probability that all four are kings ?
4.
(a)
Using truth tables, check if each of the following is a tautology or not., (i) (qnp) v(qn-p) (ii)
p ^ -p
(iii) q -+ (q --> p) (b)
Differentiate between a theorem and a conjecture. Also give an exampleof a famous conjecturewhich is not a theorem. 7C'
(c)
Use Pascal'striangleto find
(d)
Define a multinomialcoefficient.
MCS-013
P.T.O.
5.
(a)
For the following functions defined in tabular form below, find the boolean expression in CNF and DNF.
x1
x2
x3
f(x1,x2, x3)
0
0
0
1
0
0
1
0
0
1
0
1
0
1
1
1
1
0
0
0
1
0
1
1 I
1
1
0
1
1
1
1
0
Show that in a group of 100 people we can always find 9 people who were bom in September. (c)
Define a partition, and find Pu3.
(d)
Find the number of 4-letter words which can be formed using the English alphabet. How many will begin with a vowel ?
MCS-O13
11 , 0 0 0
\
MCA (Revised)
Term-End E>ramination June, 2006
MCS-014 : SYSTEMS ANALYSIS AND DESIGN Time: 3 hours
Maximum Mqrks : 700 (Weightqge 75o/o)
Note :
Question number 7 Is compulsory. Answer any three questionsfrom the rest.
(a)
What is a System ? List the various types of systems
l.
10
and explain each of them in detail. (b)
Explain the role of a system analyst in software development.
(c)
Differentiate between the following : (i)
Coupling and Cohesion
(ii)
Decision tree and Decision table
70
(iii) Alpha Testing and Beta Testing (iv) Forward Engineering and Reverse Engineering
MCS.O14
P.T.O.
(d)
Considerthe followingsituation: A bank offers two types of savingsaccounts,Type A and Type B. For the Type A account,the bank pays a dividendon the accountbalanceat the end of each quarter. The balance can be insured. The insured amount gets 8'750/oannual interest. The uninsured amount gets 5'00o/oannualinterest. For the Type B account, dividendsare paid monthly on an average daily balance for that month. No dividend is paid for a balancebelow Rs. 2,000,/-, otherwise50lointerestis paid on the first Rs. 5,000/-, 5'5%o on the next Rs. 20,000/- and 7o/o over Rs. 25,000,/-. Draw a decision table and a decision tree for this 15 situation.
2.
(a) What is a feasibilitystudy ? Why is it important for system design ? How does cost benefit analysis contribute in it ? (b)
Define logical design of a system. How is it performed ? Describe the relationship between data mining and logical design.Also, describea tool for data mining
3.
(a)
10
What is a CASE tool ? How are CASE tools important for an organization ? List the advantages and disadvantages of CASE tools.
MCS-O14
70
4.
5.
(b)
What is the importanceof studyingthe maintenance of a system ? Explain the various types of system maintenancein SDLC.
(c)
Explain information security architecture,with the help of a suitablediagram.
(a)
What are the risks and threats involvedin a system security? Also, briefly describe3 risksand 3 threats. 10
(b)
What are the mbthods for gathering the user requirement? What problemsare encounteredwhen using these methods? 10
(a)
Explain five components required to construct a DFD.
(b)
Construct the zerolevel and first level DFDs for the problem of "on line examination".
(c)
Explain four reasonsfor the need of documentation of a system.
MCS-O14
11 , 0 0 0
MCA (Revised) Term-End Examination June, 2006 M C S- O 1 5: C OMMU N IC A T ION SKILLS Time : 2 hours Note :
l.
Mqximum Marks: 50
Answer sll questions.
Readthe followingpassageand answerthe questionsgiven after it : Finally, a virus infects a worm and it has nothing to do with computers. But it does have a lot to do with humans. Courtney Wilkins, a microbiology and immunology student at the University of Arkansas, successfullyinfected the ... elegansearthworm with the mammalianvesicularstomatitisvirus and had it replicate. Others had tried and failed before and Wilkins' breakthroughwill let researcherslearn more about how viruses move from one host to another, and what proteins they attach to in humans. Some cells in C elegans, a microscopic earthworm comrhonly used in biomedicalresearch,are similar to some human cells.
MCS-o15
1
i
P.T.O.
"There were a lot of labs interestedin whether this could work, so it just seemedpretty exciting,l' she said. Since January 2002, Wilkins began siudyingwhether she could infect the worms with a virus and have the virus spread.She usuallyworked with muscleor intestinalcells and eventually settled on using the vesicular stomatitis virus. The virus is related to rabies and similar to foot-and-mouth disease and mostly infects livestock, Wilkins said. It took three to four months to establishthe cell cultures. Khaled Machaca, one of Wilkins' advisers and a professor of cell biology,. said the experiment wasn't without its rough spots. He said that there were points when he had to remind Wilkins that her decision to undertakethe researchwas a risky one, becauseit was unknown whether it would work. And that meant Wilkins' degreewas at stake,becauseher careercould be stopped if nothing came of the research,he said. After two years, it was clear that Wilkins was successful in
her
experiment. Wilkins remeinbered
discoveringabout 9 pm, one night in 2004 that the VSV had replicated inside the worm cell. She immediately called Marie Chow, a professorof virology and another advisor. "Courtney gets so excited that she starts to stutter," Chow-said. "She couldn't get the words out, so we knew there was somethingto it," she said.
MCS-o15
(i)
(iil
How was the researchmentionedin the passagea risky proposition?
2
Whai was the outcomeof the research?
1
(iii) What was the researcher's.reaction to the outcome 2+2 of the research? Why was it so ?
2.
(iv) Find out a word from the passagewhich has similar 'spread'. meaningas (v) Use 'livestock'and 'rough spots' in a sentenceeach of your own to bring out their specificmeanings.
2
Fill in the blankschoosingthe most suitableword from the choicesgiven :
5
(i)
their new housetwo years They moved back. (round/on/over /into)
(ii)
Be careful. Your gun should not go accidentaily.(awayI oII/ over/ on)
7
(iii) The Government was determined to push ihe legislation . (through/in/on/oII) (iv) I ran an old friend in Amsterdam. (out/th rough/ into/ upi (v)
3.
The flight could not take -becauseof the fog. (on,/off/up/awag)
in time
Write down the text of a group discussionbetween four participantson the need for more strict quality control 10 measuresin India. (About 500 words)
MCS-o15
P.T.O.
4 . You are Nihal Chand, ManagingDirector, PurifiersIndia Ltd. Write a Memo to all the three Managers (Sales, Productionand Finance)to hold a meetingwith them, in a week'stime, for the yearlyreviewof the Company.
10
5 . Write a letter of application,togetherwith your Curriculum Vitae (CV) for the job in response to the following advertisement: 75 "COBOL
Programmers, with minimum 2 years' experience required by a well-known Data Processing Company in Delhi. Apply within 10 daysto Box 65, New Delhi- 110068.
MCS-o15
11 , 0 0 0
MCA (Revised) Term-End Examination June, 2006 MCS-021: DATA AND FILESTRUCTURES T i m e: 3 h o u r s Note:
1.
(a)
Maximum Marks : 700 (Weightase75%)
Question number 7 is compulsory. Attempt any three questions from the rest. AII algorithms 'C language. should be written nearer to
Calculatethe complexity of the following code by 'O' notation : using Big 1.
scanf("%d", &n);
2.
for (i:1, m=n+66; i<:m; i++)
3.
printf ("%d\n", i);
4.
for (j:n/27, m:n/5; j<:m; j++)
5.
printf ("%d\n", j);
Also compute the overall complexity of the given code. (b)
Derive the expressionfor computingthe height of a completebinary tree. Also, computethe height of a completebinary tree of 1024 nodes.
MCS-021
70
P,T.O.
(c)
Write a program to delete the leftmost node from a doubly linked list. 10
(d)
Construct a heap for the list given below. Clearly indicatethe changesin each step. 10 4 , 2 , 7 , 7 , 6 , 5 , 9 , 3 , 9 I9 ,
2.
3.
(e)
Show that the lower ordereflterms and the constant terms do not matter in computingthe complexityof the algorithm in Big 'O' notation.
(a)
Write a program to createan AVL binary tree, insert an elementinto the tree and displaythe tree. 10
(b)
Write five differencesbetween :
(a)
(i)
Sequentialfile and Index file
(ii)
Linear Data structure and Nonlinear Data structure
5+5
Considerthe matrix
lt z 3 1 tl t l A = 1 12 0 l t l 3 1 J ss. L1 (i) (ii) (b)
Write the steps involved in calculatingthe ranlc of A.
5
Write an algorithmto find the transposeof A.
5
Write an algorithm to implement binary search.
MCS-021
10
4.
(a)
(i)
How does DFS algorithm differ from BFS algorithm?
(ii)
What are the stepsof DFS algorithm?
(iii) Give two examples each of applications in which the BFS and DFS algorithms, respectively,are implemented. 10
5.
(b)
Write an algorithm each for PUSH & pop operationson a stack,implementedusing linked list. 10
(a)
Explain Dijkstra's algorithm with the help of an example.Which shortestpath algorithm is the most ' efficient ? And why ? 10
(b)
Write the quick sort algorithm.Further,use the input numbers given below in the algorithm, and showeach and every step of the algorithm.
10
7, 6, 7, 0, g, 72, 3, 2, 5, 2g
MCS-021
5,000
MCA (Revised) Term-End Examination ' June, 2006 MCS-022: OPERATING SYSTEM CONGEPTS AND NETWORKING MANAGEMENT Time : 3 hours
MqximumMarks: 700
Note :
Question number f. is compulsory. Answer any three questionst'rom the rest.
(a)
Describethe structureof 5 classesof IP addresses.
5
(b)
Differentiatebetweenthe following concepts:
6
l.
(i)
Multiprogramming
(ii)
Multitasking
(iii) Multiprocessing (c)
(d)
Write a shell script that prints a list of every unique word in a file, in reversealphabeticalorder.
6
Explain the function of the following :
4
(i)
LS-L
(ii)
/etc/shadow Iile
MCS-022
P.T.O.
(e)
Define the concepts of domains, workgroups and trusted relationships in the context of Windows
2000. (f)
What is Kerberos ? Describe Kerberos management in the Windowsoperatingsystem.
6
k)
Describe two types of back-ups.
5
(h)
Differentiate between virtual circuit and datagram approachesto packet switching.
2.
(a)
Explain four basic design issues in a multimedia operating system.
(b)
DifferentiatebetweentheTCP/lP and OSI relerence models, and map the layers between the two approaches.
(c)
How would you set the IP addressof a LAN card in Lintx ?
3.
(a)
Describethe various securityfeaturesin the Windows 2000 operating system. Further, explain the differencebetweenthe securityfeaturesof an OS and of a network.
(b)
(c)
10
Describe the steps needed to configure the network file sewer in the LINUX operatingsystem; .-
5
Explain the drawback of LINUX.
5
MCS-022
4.
(a)
Describethe GUI featuresof Linux. Also explain the corresponding GUI features of Windows 2000. Further, comparethe usefulnessof thesefeatures.
(b)
(c)
5.
10
Describe two features of the Intrusion Detection System(lDS).
5
What are the requirementsfor a user to be able to kill a process in Linux ? Write the necessary commands.
5
Describethe following :
20
(i)
Fault tolerant system
(ii)
sNMP
(iii) IPSec (iv) Architectureof the Windows2000 operatingsystem
MCS.O22
5,000
MCA (Revised) Term-End Examination June, 2006 MCS-023: DATABASEMANAGEMENT SYSTEMS Time : 3 hours
Maximum Mqrks : 700 (Weightage 750/o)
Nofe :
Question no. I is compulsory. Attempt any three questionsfrom the rest.
(a)
Consider the following requirements of a company :
1.
(i)
The company is organized into departments. Each department has a name, a unique number, and a particular employee who manages the department.
(ii)
A department controls a number of projects, each of which has a name, a unique number and a single location.
(iii) An employee has name, id#, address, salary, sex, and bdate. An employee is assigned to one department but may work on several projects.
MCS-023
P.T.O
(iv) We are keeping track of the dependents of each employee for insurance purposes. We keep each dependent'sname, sex, birthdate, relationship to the employee. Draw the E - R the company. Make suitable
diagram for
assumptions,if any. Fxplain all the relationships in your E - R diagmm w'r-t. relationship cardinalityand participation constraints' (b)
Given the relation (R) shown below, state wh6iher or not the following functional dependencies are satisfiedby the relation or cannot be determined.Give reasonsfor your answers. A + B, A -+ C, AB -+ C, C + A, BC -+ A, AC-+B,B-+A r(R)
(c)
A
B
C
1
4
2
3
5
6
J
4
6
7
3
8
9
1
0
fxplain five differences between the' database approach and the file basedapproach'
MCS-023
i
(d)
Considerthe following relationalschema: STUDENT (sname,Phone,dob, s-id) COURSE (1$, c-tame, credit, teacher-id) RESULT (s-id, c-id, marks) 70 Formulatethe SQL queriesfor the following : (0 Find the namesof the studentswhose resultsare not declaredin anYcourse. (ii) Find the teacherswho are teaching more than one course. (iii) Display the name and marks of those students '1-1-1985' and have who were born before scoredmore than 80 mark in any course' (iv) Find the details of studentssecuringpass marks (50%) in more than 3 courses. (v) Find the total number of credits earned by a studentwhose id is 10'
(e)
(fl
2.
(a)
What is serializability? Explain this with the help of an example. How is it related to concurrency control ?
5
What are two advantagesand one disadvantageof data replication ? Explain the classification of replication.
5
Considera relation R with five attributesA, B, C, D and E, having the followingFD's : A-+B,BC+E,andED-+A. (il
List anY two candidatekeYsof R'
(ii)
Is R in 3NF ? ExPIain'
(iii) Is R in BCNF ? ExPlain.
MCS-023
10 P.T.O.
(b)
Describe the 3-tier client-serverarchitecfure. List 4 advantagesof client-serverarchitecture.
(c)
What is data independence? How can_youachieve data independence? Explain this with the help of an example.
3.
(a)
Explain primary, secondaryand clustering indices, with the help of an exampleeach. Give a situation with justification, in which multi-level indices are required.
(b)
10
Write a pseudocode of two different types of concurrent transactions that may be executed in a Railwayreservationsystem.What are the concurrency related problems that may be encountered in concurrent execution of the transactionsabove ? 10
4.
(a)
What is a checkpoint ? How is it useful for the process of recovery ? Explain this with the help of suitableexample.
(b)
What is an Inverted file organization ? Explain this with the help of an example. What are its advantages?
(c)
What are the different levels of security for database systems? What is the relationshipbetween securitgr and integrity ?
MCS-023
5.
Explain the following in the context of DBMS, with the help of an exampleor diagram: (i)
Views
(ii)
Referentialintegrityconstraint
(iii) Databasemanager (iv) Data dictionary (v)
Strict 2-phaselocking
MCS-023
5,000
J
trcs{r-l MCA (Revised) Term-End Examination June, 2006 MCS-024: OBJECTORIENTED TECHNOLOGIES AND JAVA PROGRAMMING Time : 3 hours Note :
l.
(a)
MaximumMarks: 700
Question number 7 is compulsory. Attempt any three questionsfrom the rest.
Explain the conceptof Polymorphism.Also, give an exampleof a Polymorphism.
5
(b)
What is an object ? How are objects and classes associated with each other ? Also give two advantagesof messagespassingbetweenobjects. 5
(c)
When can an object be used as a reference of another object ? What care shouldbe taken in such kind of referencing? Your explanation should be supportedby an example.
(d)
5
What is multilevelinheritance? How does it differ from multiple inheritance? Also give an example of multiple inheritance.
MC5-024
5
P.T.O.
(e)
What are the five issuesthat are to be taken care of while overridinga method ?
(f)
Explain the concept of Multithreadingwith the help of a diagram. Also, give at least two advantagesof Multithreading.
k)
Give the reasonswhy the main( ) method in Java is defined as public and static. Also explain, why the name of Java class containingthe main( ) method has the same name as the name of the file in which it is stored.
2-
3.
(h)
Where does the Applet class appear in the hierarchy of Java classes? Show this through a class hierarchydiagram.
(a)
Explain the eight basicfeaturesof Java.
(b)
What is a Package ? Explain the processof defining your own package,with the help of an example.
(c)
Write the syntax, and explain, any four constructors of the String class.
(d)
Explain the order of constructorcalling in multilevel inhefitance,with the help of an example
(e)
What is this pointer ? Explain its use'with the help of an example.
(a)
What is the method to retrieve the colour of the text ? Write a program to retrieve RGB values in a given colour
(b)
What is a TCP socket? Explain how a TCP socket is different from a UDP socket.
MCS-024
(c)
What is
'abstraction'? Explain two advantagesof
abstractionwith an examPle. 4.
(a)
Considerthe following definition : 1
public class exam I
2
Publicint a = 1;
3
public int b : 2;
4
public void method (final int c)
5
{intd=3; classassignI
6
Privatevoid iMethod (int e) {
7 8
// line 8
e
l
10 11
1 l
12 1 Write all the variablesamong a, b, c, d and e that can be relerencedat Line 8. (b)
Write a program to computethe factorialof a given number in Java.
(c)
Explain the seven steps that are to be followed to establisha connection from a Java program to a database.
(d)
Write an Applet in Java that will displaythe current date.
MC5-024
P.T.O.
5.
(a)
What is a session? Explain how hidden form fields are used for sessiontracking.
(b)
Write a program in Java using the StringBufferclass which reversesthe string"IGNOU MCA student".
(c)
Write five differencesbetween an interface and an abstractclass.
(d)
What is method overloading? Explainhow a method is overloadedin Java, with an example.
- MCS-024
5,000
MCA (Revised) Term-End Examination, June, 2OOG MCS-031: DESIGNAND ANALYS|SOF ALGORITHMS T i m e: 3 h o u r s Note :
1.
(a)
Maximum Mqrks : 700
Question no. I is compulsory. Attempt any three questions from the rest. All algorithms should be written neqrer to C/C++ Ianguage. (i)
Show that for. any real constants a and b, where b > 0. (n + a)b = @(nb).
(ii)
(b)
(c)
6
Give an analysisof the efficiencyof ihe Binary Searchand Linear Searchmethods.
4
What is Randomized euicksort ? Analyse ihe expected running time of Randomized euicksort, with the help of a suitableexample.
7
Explain the Greedy Structure algorithm. Give an example in which the Greedy technique fails to deliveran optimal solution.
s
MCS-031
P.T.O.
(d)
Describethe two properties that characterisea good dynamic programming Problem.
(e)
Define an NP-complete problem. Give examples of two such problems.
(f)
Why does the complexity of an algorithm need to be analysed ? Show that the Travelling Salesperson
10
problem is NP-comPlete.
2.
(a)
What is the running time of heapsort on an array of length n that is already sorted in increasingorder ? What about the time for decreasingorder ?
(b)
What is the differencebetweendynamicprogramming and the greedy choice approach to solve problems ?
(c)
Explain the significanceof the notation ro' Consider function f, defined by f(x= ) 5*3+3x2+10' Show that f(x) = trl(x2).
(d)
Design a TM
to compute the binary function
MONUS, definedas follows. MONUS:NxN--+N [m-n = (m, n) such that MONUS { | 0
MCS-031
if m>n otherwise
3.
(a)
Show how a DFS (Depth First Search)works on the graph below. Assume that the vertices are consideredin alphabeticalorder and assumethat the represented using adjacency list representationin which each adjacencylist is ordered
graph
is
alphabetically. For each vertex, write the time it is discovered(i.e., it becomesknown) to its left and the time it is visited (i.e., its adjacentnodes are generated)to its right in the diagram below. For each edge, write its
10
next to it in the diagram. classification
(b)
Build regular expressionsand correspondingFinite Automata (FA) for the following languagesover the 70 alphabet) : {a, b}.
4.
(a)
(i)
Languagehavingwords in which total no. of a's is a multiple of three.
(i0
Languagehaving exactlytwo b's in any word.
Write a randomizedalgorithm to find the ith order statistic in a set of n elements (i.e., Randomized Select).
MCS-031
I
P,T.O.
5.
(b)
Write a recursiveprocedure to compute the factorial of a number.
(c)
Design a Turing Machine that incrementsa binary nurnberwhich is storedon the input tape.
(a)
ConsiderBest first searchtechniqueand Breadthfirst searchtechnique.Answer the following with respect to these techniques. Give justification for your answerin each case. (i)
Which algorithm has some knowledge of problem space?
(iil
Which algorithm has the property that if a wrong path is chosen, it can be corrected afterwards?
(b)
Write Kruskal's algorithm and use it to find a minimal cost spanning tree of the following graph. 10 (Show the intermediatesteps).
(c)
How does alpha beta pruning improve the minimax procedure ?
MCS-031
8.000
MCA (Revised) Term-End Examination June, 2006
MCS-032 : OBJECT ORIENTEDANALYS|S A N D D E S IGN Time : 3 hours
Maximum Msrks : 700
Note :
Question number 7 is compulsory. Attempt ony three questionsfrom the rest.
(a)
A bank has branches in major cities of India. The employees working in the offices are categorised as
1.
Branch Manager and clerks. If needed, the Branch Manager also has to work as a clerk. The bank deals with its customers in terms of opening different types of accounts, deposits and withdrawal of money. The bank wishes to develop a system for each of its branches. Identify the classesin the system and draw a class diagram. Each class must have at least three attributes and two operations. Make necessary assumptions, if any. (b)
10
What is encapsulation ? Explain two benefits of encapsulation with an example.
MCS-032
P.T.O.
(c)
What is a state diagrarn ? Explain the different notations used in state diagram.
(d)
What is a'use case ? Explain different components of a use case.
(e)
What is an association ? Explain the differences two-way association and one-way between association, with an example for each'
(fl
What is an integrity constraint ? Explain
'referential
integrity constraint' with an example. k)
Explain why more emphasis is given on object structure rather than on operation implementations in object oriented systems development'
2.
(a)
(b)
Draw, and explain, a state diagram for an ATM system.
70
Explain the followingin the context of a DFD '
70
(i)
Process
(ii)
Data Flow
(iii) Actor (iv) Data Store Also, illustrateall these componentsin an example DFD. 3.
(a)
What is concurrencyin objects ? Explain, with an example,how concurrencyis identifiedin a dynamic model.
MCS-032
2
+
(b)
Explain how associationsare implemented as a class, 10
with diagrams and code written in C++dava' (c)
What is persistency ? Explain, with an example, how 5
persistent data are identified. 4.
(a)
What is a collaboration diagram ? Draw and explain a collaboration'diagram for a library system' Make 10
necessary assumptions (b)
What
is
composition
? Take
an
example
o{ 5
composition and draw a UML diagram for it' (c)
Explain generalization and specializatio.n, with an 5
example for each. 5.
(a)
What is an event ? Explain how concurrent events 5
are handled. (b)
With the help of a suitable example, explain how 5
objeci classesare mapped to tables. (c)
What
is inheritance ? What
is the
need for
adjustment of inheritance ? Explain one way of adjustment of inheritance, with an example.
MCS-032
10
8,000
MCA (Revised) Term-End Examination June, 2006 MCS-033: ADVANCEDDISCRETE MATHEMATICS Maximum Msrks: 50
Time : 2 hours Note :
1.
(a)
Question no. I is compulsory. hr"" t""ttr""t frt
Check whether ,"
- |
62 -
Attempt any
n + 2) is a solutionto
the recurrencebelow or not. an -
4a,,- 1 + 4an-z = 2n, n > 2.
Also check whether the recurrenceis homogeneous. 3 (b)
State Euler's formula for a planar graph. Give an example of a planar graph with 6 vertices and S-regions, and verify Euler's formula for your example.
MC5-033
4
P.T.O.
(c)
(d)
A post office has stamps only in denominationsof Re. 1, Rs. 2 and Rs. 5. (i)
Find the generatingfunction for the number of ways in which you can pay n rupees using thesLstamps.
(ii)
If the post office has only 20 stampsof Re. 1, 10 stamps of Rs. 5 and 10 stamps of Rs. 2, find the number of ways in which you can pay a postageof Rs. n.
Considerthe following graph.
v4
v^ J
(i)
Write down the degreesequenceof the graph.
(ii)
Draw the complementof the graph.
(iii) How many edgesneed to be removed to get a spanning tree of the graph ? (e)
Using an appropriate substitution, solve the recurrence Yn =
MCS-033
n-1 n
Vr,-1 + n for n t 1, go = 1
4
2.
(a)
Let an be the numberof subsets of lI, 2,3, ..., nJ with at leasttwo elements,n > 1. (i)
What are the values of.a, a, and a, ?
(ii) Set up a recurrencefor an, and solve it. 'The Petersen graph is bipartite.' True or false ?
(b)
whv ? 3.
(a)
Find the vertex chromatic and number of the following graph :
edge chromatic
v4 (b)
Let A(x) be the generatingfunction of a sequence {aO,a' uz, ...l.Find the generating functionof the s e q u e n c {ea o ,a o * u l , u 1 + a 2 , . . . } . U s e t h i s t o deduce the identity C ( n , r ) + C ( n ,r + 1 ) = C ( n + 1 , r + 1 ) , r > 1 .
4.
(a)
Define the edge connectivitgr),(G) of a graph G. Give examples of graphs G, and G, such that ),(G1)= d(Gr) and ),(G2)< 6(Gr).Is it possibleto find a graph G with f(G) > 6(G)? Justifyyour answer.
MCS-033
P.T.O.
(b)
Find the general form of the soluiion to a recurrence relation with constant coefficients for which ihe characteristicroots are 1 with multiplicity 2 and 2 with multiplicity 1. The relation also has a part which is a linear combination non-homogeneous. of n2 and 2".
5.
(a)
Find the generatingfunction of the sequence{a,.,}, - 6un_r, Ior n> 2, where an satisfiesar.,- Sar.,_ 1 andao=1,ar=1.
(b)
State Dirac's and Ore's sufficiencycondition for a graph to be Hamiltonian.Which of the conditionsis stronger ? If neither of the conditions apply for a graph, can you conclude that the graph is non'Hamiltonian ? Justify your answer with examples.
MCS-033
8.000
MCA (Revised) Term-End Examination June, 2006 ENGINEERING MCS-034: SOFTWARE Time: 3 hours Nofe :
l.
MaximumMarks: 700
Question no. I is compulsory. Attempt any three questionsfrom the rest.
(a)
with the five Explainthe key processareasassociated 10 levelsof CapabilityMaturity Model (CMM).
(b)
What is the relationshipon which estimationmodels are based? Explain the COCOMO model in detail, 70
with ihe hetp of an example. (c)
Define the term Sot'twareQuality.Explain any nine 10 attributesof softwarequality.
(d)
What are CASE tools ? Explainthe variouscategories of CASE tools. Also, depictthe positioningof CASE tools in a SoftwareApplicationdevelopment,with the help of an example.
MC5-034
70
P.T.O.
2.
3.
(a)
Write the outline of Software Requirement Specifications(SRS). With the help of a suitable example, explain the different sectionsof an SRS document. 12
(b)
Draw, and explain, a risk analysistable.
(a)
What is the objectiveof data design? What are the attributes that include the description of different
8
data items ? Give an exampledata item indicatingits attributes. 13
4.
5.
(b)
Write any seven challenges faced by (ComponentBasedSoftwareEngineering).
(a)
Define Bqseline. Explain the process of making changesto a Baseline,with the help of a diagram. 1 0
(b)
Define Software Project Management.Explain any four elementsof it. 10
(a)
What is SoJtwareProject Verification ? Write all the test case selection guidelinesfor Boundary Value Analysis,and illustratethem using an example. 12
(b)
Explain the factors that affect the task set for a project.
MCS-034
CBSE
8,000
MCA (Revised) Term-End Examination June, 2006
MCS-035 : ACCOUNTINGAND FINANCIAL MANAGEMENT Msximum Mqrks : 100
T i m e: 3 h o u r s Note :
l.
(a) '
Question 7 is compulsory. Attempt any three questionsJrom the remainingquestions. From the followingTrial Balance,prepare a Trading Account, Profit and LossAccount for the year ended 37.72.2005 and a BalanceSheet as on that date :
Dr. Investments Plant and Machinery
cash Sundrydebtors
MCS-035
Rs.
Cr.
1,800
Sales
6,000
Discount on purchases
600 lt"yttlol .
for bad debts
10,500
Capital
30
Rs. 75,000 1,200
1,500 15,000
P.T.O.
Dr. stock
Rs. Cr. 28.800
Sunlw creditors
Rs.
6,990
Wages
9,600 Bills payable
3,500
Railway charges
State Bank 1,500 A/c
I,2OO
Purchases
36,000
Return inward
300
Income tax
150
Insurance
1,500
Discount on sales
1,500
Repairs to plant
48O
Travelling expense
1,500
Rent paid
600
Interest on overdraft
60
Drawings
1,500
Advance (Dr)
2,000
MCS-035
Adjustments : (i)
ClosingstockRs. 10,500.
(ii)
WagesoutstandingRs. 900.
(iii) Rent is payable@ Rs. 60 per month. (iv) Commissionearnedbut not receivedRs. 1,000. (v) Write off bad debts Rs. 800 and adjust the provisionsfor doubtfuldebtsat 5%. (vi) Depreciateplant at 10% p.a. (vii) Intereston capitalat 5%op.a. (viii) The proprietor introducedan extra Rs. 1,000 capitalon 1tt December. (ix) Prepaidinsuranceamountedto Rs. 500. (b)
Shree Pipes Ltd. usesabout 75,000 valvesper year and the usageis fairly cohstantat 6250 per month. The valvescost Rs. 1.50 per unit when bought in quantitiesand the carrying cost is estimatedto be 20o/o of average inventory investment on annual basis. The cost to place an order and processthe deliveryis Rs. 18. It takes45 dayslo receivedelivery from the date of an order and a safety stock of 3,200 valves is desired. You are required to determine: 10 (i)
The most economical order quantity and frequencyof orders.
(ii)
The order point.
(iii) The most economical order quantity if the valvescost Rs. 4.50 each insteadof Rs. 1'50 each. MCS:035
P.T.O
2.
Explain the meaning and significanceof the following 20 accountingconcepts,giving suitableexamplesfor each : (i)
Businessentity
(ii)
Money measurement
(iii) Continuity (iv) Cost 3.
4.
(a)
Explain the concept of agency relationship, and elaborateon the problemsand cost associatedwith it. 10
(b)
Briefly explain the various evaluationcriteria used for evaluatingcapital projects.
10
What are the various sourcesof working capital ? Explain giving suitableexamples.
20
5.
Highlight the main componentsof a credit policy. Briefly discussthe different credit policy variablesgiving examples of each. 20
6.
What is treasury management ? What are the main functions and focus areas of the treasurydepartment ? 20
MCS-035
8,000