Ziddi Razan

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ziddi Razan as PDF for free.

More details

  • Words: 2,024
  • Pages: 23
Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology Questions for Sessional- II (CD) 1. consider the following code fragment ,Generate the quadruple for it switch (a + b) { case 1: x = x + 1; case 2: y = y + 2; case 3: z = z + 3; default: c = c -1; } Write its three-address statement code and quadruple representation. 2. Translate the following program segment into three-address segment: Switch( a + b ) { case 2: { x = y; break; } case 5: { switch( x ) { case 0:{ a = b + 1; break:} case 1:{a = b + 3; break;} default :{a = 2;} } break; case 9: {x = y – 1; break;} default: {a = 2;} } 3. What is a basic-block? How can a sequence of three-address statements be transformed into a list of basic blocks. Show it with example. 4. Explain the following categories of intermediate codes: i. Three-address codes ii. Quadruples iii. Triples

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

5. Consider the following sequence of three address code: (1) PROD =0 (2) I = 1 (3) T = 4*I (4) T2 = addr( A )-4 (5) T3 = T2 [T1] (6) T4 = addr( B )-4 (7) T5 = T4[T1] (8) T6 = T3 * T5 (9) PROD = PROD + t6 (10) I = I+1 (11) If I <= 20 goto 3 (i) Find the basic blocks and construct a flow graph. (ii) Eliminate common sub-expression (iii)Move the loop invariant computation out of the loop. (iv)Find the induction variables and eliminate them where possible. 6. Explain the backpatching. Also generate three address code for the following program segment. While( a < c and b > d) do if a = 1 then c = c + 1; else while( a <= d) do a = a + 3; 7. What are the different data structures for the symbol table implementation. 8. Explain various allocation storage strategies. Which storage allocation model is to be used if a language permits recursion? 9. What do you mean by heap allocation ? Explain the following terms releted to heap allocation: i) Fragmentation ii) Free List iii) Bit Map iv) Reference Count 10. Explain activation record and display structure.

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology 11. What is printed by the program given under : a. Call–by-name b. Call-by –reference c. Call-by-value Procedure PROC (X,Y,Z) begin Y = Y+1 Z=Z+X end PROC begin A=2 B=3 C=1 PROC (A,A+C,A+B) Print A End 12. Define attributes of symbol table: i) Class and related attributes ii) Scope attributes 13. Give the algorithm for the elimination of local and global common subexpression. Discuss the algorithm with the help of an example. 14. Discuss loop optimization technique with suitable examples. 15. Describe how a for-statement can be systematically turned into a corresponding while statement. Does it make sense to use this to generate code? 16. Discuss the algorithm for the elimination of induction variables with the help of example. Also generalize this algorithm to the case where multiplicative constants can be negative. 17. Suppose parameter are passed by value instead by reference. Can two names be aliases of one another? What if copy-restore linkage is used? 18. What do you mean by code optimization? What are the areas of optimization? 19..

Construct DAG for the following code sequence: A [I] = B *P = C D = A [J] E = *P *P = A [I] Assume that :

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology a. P can point anywhere b. P point to only B or D 20. i. What is global data flow analysis? What is its use in code optimization?

D5 J := J- 4

D1 I := 2 D2 J := I+1

B1

D3 I := 1

B2

D4 J := J+1

B3

B4

B5 Block B1 B2 B3 B4 B5 ii.

IN[B] 01111 11111 01111 00110 00111

OUT[B] 11000 01111 00110 00101 00111

consider the above given table and flow graph then find ud-chain for following 1. J at D2 in B1 2. I at D3 in B2 3. J at D4 in B3 4. I at D2 in B1 5. J at D5 in B4

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology Questions for Sessional- II (IS) Q1-Write short notes on : a) Information controls d) Hacking

b) Denial of service e) Privacy of the Internet

c) Computer crime f) Encryption

Q2- Is there an ethical crisis in E- business today ? List the various “PAPA” ethical issues related to how information system store and process information. Q3- Why are controls needed for information system ? What are the various types of Information system controls? Q4-Discuss various security and ethical challenges as faced by MIS manager. Q5- Identify several ways that business manager and professional help lessen the harmful effects and increase the beneficial effects of the use of information technology. Q6-What has been the impact of e- business technologies on the work relationships, activities and resources of managers. Q7- List some of the problems faced by the manager of a global organization. Q8-Identify various business reasons or business drivers behind global information technology application. Q9- Identify various cultural and geo economic challenges that confront the managers in the management of global e business technologies. Q10-List the major types of international business strategies. Do you believe that the various firms will tend to strive towards the transnational model over time?

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

Q11- Write short notes on : a) Transborder dataflows c)Transnational strategies b) Outsourcing information system operations Q12- Explain the following: a) Strategic management b) Technical management

c) Operational management d)Distributed management

Q13-Which planning technique would you prefer critical success factor , strategic opportunity matrix Explain your reasoning Q14 Do you think BPR is prerequisite for implementing ERP in an organization? If yes or no give justification o0f your answer. Q15-ERP is the backbone of of E- business . ERP is a business operating system , the equivalent of the windows operating system for back office operations comment. Q16-Prove that SCM is an absolute requirement for the E- business initiatives of many companies. Q17- List some major application components of CRM. Why are the businesses turning to CRM as a major customer centric business strategy? Q18- Why should you procure? What do you mean by procurement management? Q19- Write a short note on end user computing. Q20- Explain the planning process. Discuss the hierarchy of planning.

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology Important Question For Semister Exam (CD) SET-1

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology SET-2

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology SET-3 1. What is a cross compiler? How is bootstrapping of a compiler done to a second machine. 2. What is the input buffering? How sentinel symbol is used to reduce the number of comparisons in lexical analysis of the statements gives algorithms to clarify. 3. Consider the following statement : Firstvalue = nextvalue + rate* 19 Compile this statement in all six phases. 4

Construct the parsing table for the following LL (1) grammar: SaA/B A b B / a B  c / bAc

5. Construct an LALR (1) parsing table for the following grammar: DL :T L  L id /id T  integer 6. Construct an SLR parsing table for the following grammar: S  A) S  A,P/ ( P,P P{num,num} 7. Eliminate the left recursion from the following grammar: S  a / Λ / (t) TTS/S 8. Construct the following grammar: E  TE’ E’  +E / ε T  FT’ T’  T / ε F  PF’ F’  *F’ / ε PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology P  (E)/ a / b/ ε (b) Compute FIRST and FOLLOW for each nnon-terminal of above grammar. (c) Show that the grammar is Wheather LL(1) or not. 9. Construct LR(0) parsing table for the following grammar: E  E + T /T T  T*F / F F  (E) / id 10 Give the algorithm for computing precedence function . 11.Translate the following program segment into three-address segment: Switch( a + b ) { case 2: { x = y; break; } case 5: { switch( x ) { case 0:{ a = b + 1; break:} case 1:{a = b + 3; break;} default :{a = 2;} } break; case 9: {x = y – 1; break;} default: {a = 2;} } 12. What is symbol table ? Discuss the various approaches used for organization of symbol table. 13. What are the different data structures for the symbol table implementation? 14 What are the various types of errors that may appear in compilation process ? Explain the function of Error handling phase of a compiler. 15.

i Explain global data flow analysis

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

D5 J := J- 4

D1 I := 2 D2 J := I+1

B1

D3 I := 1

B2

D4 J := J+1

B3

B4

B5

Block B1 B2 B3 B4 B5

IN[B] 01111 11111 01111 00110 00111

OUT[B] 11000 01111 00110 00101 00111

ii consider the above given table and flow graph then find ud-chain for following 2. J at D2 in B1 3. I at D3 in B2 4. J at D4 in B3 5. I at D2 in B1 6. J at D5 in B4

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology Important Questions for Semester exams(IS) SET-1

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

SET-2

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology

SET-3 1. What is a system? How the feedback and control components can makes a system more useful? 2. How an information system supports a company s business operation, decision making by managers and give competitive advantage 3. What do you think prototyping has become a popular way to develop new computer Based information system ? 4. What do you mean by CASE? What are the different categories of CASE tools? 5. Explain: a)Testing and quality assurance b)Control design c) preparing system proposal d) Feasibility study 6. Identify several groupware tools for E- communication , conferencing and work management and give example of how they can enhance the collaboration of teams and workgroups in business enterprise? 7. Give some business application of the internet. What business value do companies derive from their business application on intranet. 8. What are the benefits and limitation of interactive marketing for business? 9. List some of the problems faced by the manager of a global organization also identify various business reasons or business drivers behind global information technology application.

PTO

Dronacharya College Of Engg. Gr. Noida Department of Computer Science & Information Technology 10. How can a company use change management to minimize the resistance and maximize the acceptance of changes in business and technology? Give examples.

PTO

Related Documents

Ziddi Razan
November 2019 2
Razan And Zaid
April 2020 4