## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Time: 3 hours Note : Maximum Mqrks : 75

Question number 7 is compulsory. Answer any three questionsfrom the rest. Simplify the following expressionusing Karnaugh's form. map in product-of-sum F (A, B, C, D) - ) (0, 2, 8, 9, 10, 11, 14, 15) Also, draw the logic circuit for the simplified exnression.

1.

(a)

(b)

What is a vector instruction ? Explain briefly the need of an array processorin the execution of a vector instruciion. 5

(c)

**Construct an 8 x 1 multiplexer, using two 4 x 1 multiplexers and a decoder. Make assumptions,it
**

I t t t -

required.

cs-01

P.T.O.

What is cache coherence? Why is it important for ? systems multi-processor shared-memory .''..,:,:;..,'.-..'..:;:].,. ('e) Write an 8086 adsemblylaflguage program to find (d) the total number of occurrencesof the characters "a" and "t" in an array of characters stored in the memory. (f) Explain,with an example,one instructionof each of the following types : (i) (ii) Conversion Input-output

(iii) Transferof control (iv) Arithmetic

2.

(a)

Write a program to evaluatethe following expression machine : using an evaluation-stack architecture A x . B/ D + E x F - G Assume that the machine contains instructionsfor PUSH, POP, ADD, SUBTRACT, MULTIPLY and DIVIDE

(b)

Construct a full-adder circuit using one or more decoders.

(c)

What is the set-associative mapping scheme for memory ? Explain this with the help of a diagram. 4

cs-01

3.

Give at least three differences between each of the following : (i) (ii) Instructionpipeline vs' Floatingpoint pipeline' microinstruction Horizontal microinstruction. vs' Vertical

75

(ii|

Access methods of secondary storage vs' Access methodsof main memory.

vs' (iv) Loosely coupledmicroprocessors Tighily coupled microprocessors. (v) 4. (a) Flashmemoriesvs. PROMs. Design a single precision floating point number : having the following characteristics * The baseof the number is 2' o * The mantissacan representat least 5 decimal digits correctlY. 50' The exponentrange is 10i 5

if Make suitableassumptions, required' (b) Write a program in 8086 assemblylanguagethat addstwo two-digitunpackedBCD numbers' What is the purpose of data-flowmachines? List at of and two disadvantages these least two advantages machines. 5. (a) Explain the role of the segmentregistersin 8086 with the help of an example for microprocessors, each.

5

(c)

5

cs-01

P.T.O.

An 8-bit register contains the binarv value 11001011. Make assumptions. if cs-01 4 12. Perform the followingopnrufion. (c) (ii) (iii) Perform circularshift right.(b) What are thabasiccharacteristics RISC ?'Explain of briefly the reasonsthat make RISC based designs more popular.) Insert a value 1101 at the upper nibble. (v) Perform logical shift right.000 .(A nibble is a 4-bit sequence. on this : (i) Mask the upper nibbleof the register. (iv) Perform arithmeticshift left. required.

O. P. Attempt any three questionsfrom the rest.T. with the help of a suitableexample. cs-02 . (e) Explain the various phasesof systemsinvestigation. (a) Write an algorithmand draw a flow chart to calculate the factorialof a given number. What is a process ? Explain the various process states with the help of a state diagram. Why is a PCB required. and what is the information that a PCB contains ? Write a shell program to convert an integer to its binary equivalent. (b) (c) (d) How is a client-servermodel different from the stand-alone model ? Explain this with the help of a suitableexampleof each. l. I is compulsciry. 2006 CS-02 : INTRODUCTION SOFTWARE TO Time : 2 hours Note : Maximum Mqrks: 60 Question no.PGDCA / MCA (I Yr) / BCA Term-End Examination June.

(a) Constructcontext free grammarfor the following 'C' statements: (i) Do. 3. explain the Gantt chart and the PERT chart schedulingtechniques. in (b) Five jobs arrive in a system in the order given below : Process P P 1 2 CPU time 1 0 6 Priority 3 5 5 P P P 3 4 5 b 4 8 z 1 4 5 is given the highest priority. (a) Explain the CPU scheduling and memory 5 management a UNIX operatingsystem. Calculate the tumaround waitingtime for eachprocess the and for following schedulingalgorithms : ' (i) (ii) Shortest Job First Round Robin (quantum2) cs-02 .While (ii) incrementoperator (b) What is a project control system ? With the help of an example of each..2.

(iii) To print the file namesand their file sizesin the current directory. What is the significance thrashing ? Write down of the steps performedin demandpaging. Also mention the limitationsof the development cycle. (iv) To print a long listingof the directory. (a) the major activities performed in the development of a software product.4. List (b) c s -0 2 4. (v) To print content of the "passwd" file.000 . 5. To run a processin the background. (a) What are the main advantages distributedOS ? of How are the file systemand protectionsupportedin distributedOS ? (b) Write UNIX commandsfor the following : (i) (ii) To print how many usersare working on the system.

.

O. Name of the student Marksin English Marksin Mathematics Marksin Physics Marks in Chemistry Marksin ComputerScience Total marks Average Grade P.45 46 .30 31 .T. Answer any three ouestionsfrom the rest.36 37 . cs-03 . 1.33 34 .PGDCA / MCA (I Yr) / BcA Term-End Examination June. to compute the total marks. givingall the divisions.57 RollNo.42 43 . (a) Write a programin COBOL.39 40 . averageand the grade as per the following record format : 7-6 7 .48 49 -57 52 . ?OOG AND CS-03 : FILE STRUCTURE IN P R OGR A MMIN G C OB OL Time : 2 hours Note : Mqximum Mqrks:60 Question number 1 is compulsory.

and division.subtraction. then print FAIL as the grade. exampleof each i (i) DIVIDE (iD USAGE clause (iii) REDEFTNES (c) Write a COBOL program to simulate the billing applicationfor a grocerystore. (d) Mention the purpose of using the RENAMES clause. list some important precautions to keep in mind while using the RENAMES clause.If a student scores less than 40 in any subject. 10 cs-03 . Write a program in COBOL to simulatea simple calculator which performs the basic arithmetic operations like addition. multiplication. Also.if needed and mention them. 2.Wrjte the format. Otherwise print the grade as per the following conditions : 10 Average 50<marks<60 40<marks<50 (b) Grade A B Explain the use of the followingwith the help of one . 10 Note : Make suitable assumptions.

A Julian date is a 3-digit date representing the number of days counted from the first of January. Write a COBOL program that converts a given date (specifiedas the valuesof DAY and MONTH) to the Julian date and storesit in the data name Julian. Write a COBOL programto calculate equalinstalment the amount to be paid to a nationalized bank every month taking the {ollowingpoints into consideration : 10 (i) Flat 60/o interest if the loan amount is to be cleared within one year. (ii) Flat 7. 4 .2o/o interestif the loan amount is to be cleared within 18 months.000 . the help of an example with for each ' 10 (i) REWRTTE ( i i ) T N S P E C T. . T A L L Y T N G (iii) STRING (iv) SET (v) GO TO cs-03 6. (iii) Flat 72o/o interestif the loan amount is to be cleared within 36 months. Explain the use and syntax formats of the following COBOL statements. 5 . .Assume28 davs in the Februarymonth./clauses. 70 Note z ' The valueof DAY is the date of the month and the value of MONTH is a valuebetween1 and 72.3 . .

.

3. . 5 in this order. Answer any three questions from the rest. (a) Supposethe input to a stack is 7.T. 6 ( i )r 2 4 ( i 02 r 4 5 3 3 5 ( i i i ) 2 7 5 3 4 ( i v3 1 2 4 5 ) cs-04 P.For those outputs of that cannot be so obtained. i.PGDCA / MCA (I Yr) Term-End Examination June.. All algorithms should be written nearer to C or PASCAL Ianguage. explain how. giving the sequence operations..C '' & . then 2. Which of the following rearrangements can be obtained in the output order ? For those that can. and so on.e.P A S C A L " Time : 2 hours Note : MaximumMqrks: 60 Question number 7 is compulsory.. 2006 CS-04 : DATA STRUCTURES THROUGH .explain why.O. 2. 1 comes first. l. 4.

Write a function. Explain how the algorithmworks in sorting the input l i s t2 6 4 9 8 5 . Write functions to "insert" and "delete" for the queueabove. (i) (ii) What is a Binary SearchTree ? Write an algorithm to create a Binary Search .(b) What is a circular queue ? Explain how it is implemented. Distinguishbetweena graph and a tree. the usefulness of height-balancingwhile constructing a Binary Search Tree. where each letter stands for the information stored in some node of the tree. to read the powers and co-efficientsof different terms of a polynomialand createthe linkedlist. (a) (b) 3. (c) Construct the binary tree whose Pre-order traversal is ABCDEFGH and In-order traversal is CBDAFEGH. with an example. Tree from an input list of integers.using an array. What is a linked list ? Explain how linked lists can be used to store polynomialsof arbitrary degree. (a) (i) (ii) (b) Explain. Write an algorithm to implement "insertion sort". with appropriatetype declaration. 2 cs-04 . Show all the steps involved. (d) I 2 (e) 2.

(c) Constructan AVL tree from the following input list : 6 4 2 12 10 3. file What is meant by "Depth First Search" of a graph ? Considerthe followinggraph : 5. Prove that for any binary tree of n nodes the Externalpath length: Internalpath length + 2n. (a) (b) What is a heap ? Write an algorithm for insertinga new elementinto a heap. 4. In C. cs-04 7. Also give two advantages each of sequential and indexedsequential organisations. (i) (ii) Define the terms "lnternal path length" and "External path length" for a binary tree. (a) (b) (c) Explain how a Depth First Search Scheme will traversethe graph startingat node 1.000 . how does 'union' differ from 'structure'in its working ? Explain what an indexedsequential organisation file is. applyingappropriate rotation.

.

and design analysis to Why is it essential use systems methodologies to build a system ? Give three reasoRs.explain the use of a data dictionary. With the help of an exampleapplication.T. Management 6 documentation 5 5 Briefly describe five types of techniques. (a) (b) 3 (c) (d) (e) Briefly explain five componentsof muliimedia. I is compulsory. Answer any three questionsfrom the rest. 1. Explain the use of requirementanalysisin system design. Explain the steps followedin the development 8 of an MIS. 3 P.O. Make an SRS document for "School System". 2OOG OF CS-OS: ELEMENTS SYSTEMS " ANALYSIS& DESIGN Time : 3 hours Note : Mqximum Mqrks :75 Questionno. (f) cs-05 .PGDCA / MCA (I Yr) Term-End Examination June. What is an MIS ? Give four features of a typical MIS.

(c) Give. in 6 3 6 (b) (c) 3. How will you prepare a project requestform ? What are the techniques used to review these requests ? Explain with an example. Define the following : (i) (ii) Peak load testing Storagetesting (iii) Recoverytesting (b) (c) Give two differences betweenDSS and KBS. with justification. (a) Describethree types of computergraphicssoftware. Also give {our characteristicsand two examples of forms. as (d) Explain two differencesbetween unit and integration testing. ' '' l uPto'level 2-'Explain the varioustypes of files in which recordsare rnaintained a system. List four factors considered while designinga form. three different events that can be considered comnutercrimes. What is the use of procedure testing ? 3 7 2 (b) 4 cs-05 . along with their purpose. 4. (a) Give two symbols used in DFD. (a) Design a EFD for a Banking Management System.2.

3 3 (c) ' (d) 3 6 cs-05 15. What is the role played by user interface of the ? software in systemdevelopment Also explain four steps of GUI develoPment. producedusuallY What is structureddesign ? Explain this with an example.5.000 . (a) (b) Describe the structure of a feasibilityrepori' List six considerationson which output to be dePends.

.

Maximum Mqrks: 75 Attempt any l. relationships and the key constraints. explain the use of multimedia databases and knowledge databases. (b) Whai are the advantages of index-sequential file organisation ? With the help of an example explain the structure of index sequential file' (c) Why are remote procedure calls used ? Why is a set of DDE mainiained at application level ? Design an ER diagram for any of IGNOU's study centres.PGDCA / MCA (I Yr) Term-End Examination June. Clearly indicate the entities. 2006 CS-O6 : DATABASEMANAGEMENT SYSTEM T i m e: 3 h o u r s Note : Question no.O. (a) With the help of a suitable example. 1 is compulsory' three questions from the rest.T. . explain a hierarchical database model. (d) (e) With the help of two examples for each. CS-06 P. attributes.

this (b) What are the main featuresof client-server model ? Explain the stagesinvolvedin the developrnent an of applicationusing this model.000 (i) (ii) Make a multi list representation of employeeIile.OOC D .. Write a query to retrievethe record of Salary> 12. M Delhi Analyst B. E . Occupation= Analyst. Sex = M.000. Location = Delhi. (a) Consider an employee file with the details given below : Occup.E. 10.00c c Analyst B . M Chennai 9. Write a.E. M Mumbai Prog. (a) (b) .syntax for the following'andgive an examplefor each : 70 (i) Selectstatement (ii) Update statement (iii) Delete statement (iv) Insert statement 3. M. Degree= M.2.DegreeSe> Location Salary Record E# Name A B 80cMilind 5 1 0 {dwet 200 Darronrl M.00c 15. Why is the administrationof a database system required? What are the variousfunctionsassociated with database administration ? Define a data manipulationlanguage.E.E. 300 Vlukesh Prog. M Delhi 72. cs-06 .

customer-city) Deposit-scheme (Branch-name. 1000. Branch-city) Customer-scheme (Customer name.4. asset. who (iii) Write a statement find all the customers to than Rs. amount) Client-scheme (Customer-name. (a) Consider the schema given below : Branch-scheme (Branch-name. . street.O. account-number. customer-name. loan-number. banker-name) Write the SQL statements for the following : (i) Find all customers who have a balance of over 8 Rs. balance) Borrow-scheme (Branch-name. customer-name. (b) Explain the following tools with respect to client-server environment : (i) (ii) Dynamic data exchange Object linking and embedding Also mention the usage of these with an example for each. (a) With the help of an example relation and the explain ihe concept of dependency diagram. 1200' have a loan amountof more CS-06 P.T. (ii) Write the query to find the clients of banker Patel. and the city they live in. 5. functional dependency.

explainthe properties of a Balancedsort tree.000. of (b) With the help of an example. 10. CS-06 20.(iv) Write a statement to find all the customers whose name starts with "R" and who have a balance more than Rs.000 .

Question number 7 is compulsory. . 2006 CS-07 : DISCRETE MATHEMATTCS Time : 3 hours Note : IvrcXImUmlVarKS: /5 t . (a) Find the conjunctive normal form for the followinq formula : l ( ( P^ l e ) v ( p n e ) ) v l p (b) Consider the following graph. three questions t'rom the rest.T.ADCA / NICA (II Yr) Term-End Examination June. Write down. its adjacency matrix : CS-07 P.O. Attempt any l.

b. 2. c ). multigraph. t (i) (ii) Write the relation matrix R.(c) Let A = l\. 5). and draw the corresponding Establish the following equivalence.using a truth table : P+QvR=(P=Q) (f) v(P+R) (e) Constructa Hassediagramfor the poset({a. Make a digraph of the relation. for Find the booleanexpression the following gating network (write the output of each gate). G) xl x2 x3 x4 cs-07 . A ielation R is definedon A s u c h t h a a R b i f fa + b < 6 . Does it represent a lattice ? Give reasons for your answer. cl. (iii) Check if R is reflexive. (iv) Check if R is symmetric. 3. (d) Make the figure of Konigsberg's7-bridge problem.4.

(a) Find the minimum spanning tree for the following graph using Kruskal's algorithm : (b) (i) (ii) ExpressP v Q using f only. 0'3. be definedby g(x) = x2 + 2. 2. 4.c u tfA t u o ' 2'i' n ' TJ' t t for each s e { 0.(h) For the FuzzySetA of X :{7.7}.O. . (a) Check whether the followingformulasare tautologies or not : (i) ( P + Q ) = [ P v ( Q n n 1< + e ^ p v R ) ] (ii) (PvQ)+(Q=p) CS. Check if g is (i) (ii) one-one onto 3. where R is the set of real numbers.O7 P.T.3.t only (c) Let g : R * R.2.203 0.2 07] f i n dh e . ExpressP n Q using .4 0. 0.1. 5l givenby ^ ^: 10.

z) : > (0. B. Therefore. 3. where A : {1. Use the rules of inferenceto check the consistency of the following argument. x. C andB\C. Find the shortestpath from a to f for the following graph. intermediate 4. cs-07 . show three sets A. using K-map : f (w. AnC. (a) (b) Minimisethe followingfunction. 70. 4. If you do not send me then I will go to sleep early' sn e-mail message. Find (i) R2. 41and a R b ilf a > b. then I haue t'inished writing the progrqm. using Dijkstra's algorithm. 8. AU(Bc). y. il I wqke up feeling refreshed. 2. 7. (c) (d) Let R be a relation from the set A to A. (ii) F. If I sleep early. 6. Show all the steps. (iii) R-1.then I will finish writing the program. 74) (c) ExpressI (=x flx)) using universalquantifiers'Justify your answer.At each stage. mention the rule you are applying lf you send me sn e-mail message. 1'2.(b) In a single Venn diagram. then I wilt wqke up t'eeling ret'reshed.

Use 8-bit representation. (ii)two's complement form. (b) (c) 5 3 (d) c s -0 7 15. Justifyyour answer. Define Well Formed Formula(WFF). (a) Construct a weighted connected graph on five vertices that has exactly five minimum spanning trees.5. Expressthe number-87 using (i) 1's complement form.000 . (iii)sign magnitude representation. Draw the logic diagram of HA (Half Adder) anci using HA constructFA (FullAdder).

.

ADCA / MCA (II Year) Term-End Examination Jurie._ "' _ o'l ) [M lt-. 1..3)' + r)+ [o ( i i i0 = r ^ *)j (.T."-e) cs-08 P. 2006 & CS-08 : NUMERICAL STATISTICAL C OMP U T IN G T)'i^".O. .r. = /1 * r)'* l.3 hours Note : MaximumMarks: 75 Question 7 is compulsory. for (a) Write a FORTRAN90 statement each of the following : 3 .in * \'' ' "*2 J2"" ['bJ (ii) . Use of calculators is not qllowed. Attempt any three questionslrom the rest.

R where you enter R.32)5'0+X (d) Write a FORTRAN program to compute the equivalent resistance for given 100 sets of values.5 (TA - (iii)Y:(-6.5 (ii) SUMMER (iiil rNDrA (iv) . and R. real variables and unacceptable names and why ?(i) 457.35 : Q T2)/Z (ii) TEMP :.(b) Which of the following are acceptablenames of integer variables.The resistances and R. from the key board. are connectedin paralleland R. and correct them. (i) Y/6. the formula for the equivalentresistanceis given below : 1 R R 1 1 R 1 2 cs-08 .ABC2 (c) Point out the errors in each of the following statements.

75 and 82 insteadof the correctedvalue of \9. The mean line of the foil js given by : y=+ p- e p x .. of m. The calculated mean is 72'14.x z ) f o rx < p o ( 1+ 2 p x . x and p each. The correct mean of twentv numbers is CS-08 P. X and Y operating independently.(eJ An air foil is to be plotted with a "camber".8.T. But.2 p . . and which computesand prints the valuesof y. while calculating.by mistake he took the number 91. (s) Find the regression line of y on x for the given data : X 2 1B 4 5 10 6 8 8 . is is then find the probabilitythat at least one of them is available when needed.If the probability that Doctor X is available 0. (f) A town has two doctors.1 11 ( v (h) 72 Fill in the blanks : (i) Mr.* 2 ) forx>p v=: I-p- Write a program that reads 100 sets of data. 57 and 28 respectively.O.9 and that Dr. Y is available 0. Shiv Kumar calculated mean of twenty the different numbers.

Then the probability of the occurrenceof neither event is equal to 2. i=1 Use the method of least squaresto fii the curve f(x) : c.. 25 (c -di)z i=1 P= I (b) 25 c.0'1 and If two regression coefficients .(ii) are. (a) Two one-dimensionalarrays C and D have 25 elements each.1 (c+d) l I' B=> . of and of both F are 0'25 and 0'5.d.x + ..rfi X fot the followingdata : A 6 1 16 72 25 10 f(x) I6 14 cs-08 . Write a computer program to compute and print the quantities 25 A = / tt i. --. the valueof r is (iii) The size of the variable which occurs most frequently is known as (iv) The probabilities occurringof two eventsE. is occurring simultaneously 0'14.O'9. respectively.

b.T.= _ ST S+T Also write the formattedvaluesof S. cs-08 P. write a FORTRAN program to find whether it is an isosceles triangle. T and X into a file.(c) Writea program segment readformatted to values of A and B from a file.9 in stepsof 0. and to compute S=AB T = A + B . 3.x . Find the correlationcoefficient betweenx and v from given data : the x v 4 (b) 6 1 1 3 2 4 4 6 8 5 9 11 8 74 9 4 (c) The ratio of relativistic classical to momentum as a function of the speedof light is given by the formula ratio = J== It-( Write a program that will compute and print a table of the ratio for f = 0 1 to 0. (a) Given a trianglewith sidesa. . 0 1 . 9 9 i n s t e p so f 0 .O. c.1 f = 0 1 9 1t o 0 .

and r o. computethe distribution. cs-08 . k) = n! k(n_k)l the factorial and call Write a subroutineto calculate it in the main program. of persons (c) Wriie a program to calculateand print the value of c(n. a n dY = 1 ' 5 . the inlet pressure. (a) The ideal compressor outlet temperature and efficiencyfor a gas turbine are given by r =ro tfl rp r* .Prthe outlet pressure.4.)t.3 2 3 3 .2 7 2 8. ltl \ ' 2/ e f f i c i e n ( e )= 1 cY where To is the inlet temperature. For the followingfrequency mean.3 7 3 8 . = 1 0 . standarddeviationand coefficientof variation' Weight (in kS) 5 (b) 5 2 3 . Write a program to computeand output T and e for T o = 4 5 0 . P . P.4 2 10 35 40 15 No.and y. the ratio of specificheats. P z = 5 5 .

M+2. II.0.4. CS-08 P. and III manufacture respectively. in the following FORTRAN statements: (i) Do8. I.) 140 20 60 DU 165 23 70 BO 55 Fuel 10% Clothing 20% Rent 20o/o Miscellaneous 1070 30 Compute the cost of living index number for 2000 taking 1998 as the basevear. N (v) C(1e) : B(.I (iii) GIDAN = XYL + -N(3. (a) Identify errors. if any.) (in Rs.5. what is the probabilitythat it is defective? fnl An enquiry into the budget of the middle class familiesin a certaincity of India gave the following information : Expenses Food 40o/o Pricein 1998 Price in 2000 (in Rs.T. and III is 2o/0.O. II.0.3 (ii) Do 33 L = M.4) + F13 (b) Three machines. I=1.5. The percentage of defective items produced by I. N(3). . For an item chosenat random.1 of the total production.2) (iv) DO 44 K : 1. and 0. 4o/o and lo/o respectively.

and 0'50 for June. 0'30. Month June July August Actual Demand 140 180 770 Using a simple three-month moving average' what is the forecastfor SePtember? Using a weighted moving average. and August. compute your forecastsales from the given historicaldata.what is the forecast for September? cs-08 13.with weights of 0'20.Assume that your stock of sales merchandise is maintained based on the forecast demand' If the distributor'ssalespersonnelcall on the first day of each month. July. respectively.000 .

What is the bii rate on the transmission line I 3 (b) Make a timing diagram and show the differences between manchester encoding and differential manchester encoding for the bit stream 10001011011.ADCA / MCA (II Yr) Term-End Examination June. (c) ' Calculate the number of networks that can exist in Class A. 75 Answer any Question number 7 is compulsory.T. 2006 AND C S . It is converted to a PCM signal using 8 bitlsample. B and C IP addresses. 1. . (a) An analog signal is limited to 4 kHz. calculate the number of hosts a network in each class can have' (d) What happens in a token bus network if a station accepts the token and then crashes immediately ? How does protocol handle this situation ? CS-09 P.O 9: D A T A C OMMU N IC A T ION NETWORKS Time : 3 hours Note : Msximum Marks .Also. three questions Jrom the rest.O.

Explairl the TCp connection establishment procedures both in the normal case and in the call-collision case. Derive the throughput expressions ALOHA and for Slotted ALOHA. Sketch a Network AddressTranslation(NAT) Box. What is the need of a variable size sliding window ? (0 What is a subnet? How is subnetting implemented? Explain this with the help of an example. Explainthis diagrammatically.with the help of a diagram each.(e) Answer the following questions with respect to a TCP header: (i) (ii) Why is the TCP header length required ? Explain this. error control or retransmission upon receipt of a bad segment? 3 (c) (d) s cs-09 . and explain its operations. (a) (b) 5 (c) s 3. s Explain two important reasons for having a minimum frame lengthin CSMA/CD. 2. (a) s (b) Why is there a need for compression Differentiate ? betweenJPEG and MPEG standards. 4 Give at leastthree functionsof a modem How does UDP handleflow control.

4. (a) Explain the operation of an FDDI token ring. with the help of a diagram.. between differences Explain the functioning of the HDLC protocol for the following : (i) Busy condition Error recoveryusing RFJ command 7 (b) I - (ii) (iii) Two-way data exchange (iv) Link setup and disconnection 5. Also.000 . betweenthe following'pairs' Write any three differences (il (ii) Circuit switching and Packet switching services Connectionorientedand Connectionless 75 (iii) ARP and RARP (iv) Upward multiplexingand Downward multiplexing (v) X'25 and Frame relay cs-09 20. list the two key FDDI and IEEE 802'5.

**ADCA / McA (II Yr) Term-End Examination June, 2006 CS-10: SOFTWARE ENGINEERING
**

T i m e: 3 h o u r s Note : Maximum Mqrks : 75

Question no. I is compulsory. Answerany three questionsfrom the rest.

l.

(a)

A library of a Universitywants to automate lending of books. The main objectivesof the s/w are : . o o On-line record of valid borrowers. Online record of books issued. Online reservation books. of

For the above mentionedsystem (i) (iil Developa SoftwareRequirement Specification. Design DFD upto two levels.

(iii) Constructthe structurechart for this system. (iv) Suggest a testing strategy for any two s/w modulesin (iii) above. (b) Explain any five software quality parameters.

20 s

cs-10

P.T.O.

(c)

Why is there often tension between a software engineering group and an independent software quality assurance group ? Is this healthy ? Justify your answer.

2.

(a)

User interfaces can be made effective by following three important principles. Elaborate these principles. Differentiate between top down and bottom up integrationtesting.Give one exampleof each. What are the advantages of and disadvantages size oriented metrics? What is cyclomatic complexity ? How can you relate it to independent paths ? Explain with suitable example.

(b)

(c)

3.

(a)

(b)

What is risk estimation ? How is a risk table prepared? Why is reliabilitya better measureof quality ? How is it measured ?

(c)

4.

(a)

Develop a use case diagram for an ATM system where the withdrawal and deposit operations are allowed.

10

(b)

What is Software Configuration Management (SCM)? Explain the elementsof a SCM system.

cs-10

(a) Develop a procedural design for an interactive user interface that queries for basic "lncome Tax" information. (b) where dynamic List and explain any three situations testing tools are better than the statictestingtools' Differentiatebetweenan objectusedin OOA and an object used during data modelling.5. Derive your own requirements and assumethat all tax computationsare performed by other modules. (c.000 . cs-10 18.

.

Each moduleis assumed have a capacityoflMbyte. 1. Answer any three questionst'rom the rest. Explain a distributed with the help of an appropriatediagram.O. address maximum memory bandwidth. with two memory Design 2 : 8-way interleaving banks.T. Consider the following two interleaved memory organization for a main memory system with 16 to memory modules. . memory multicomputersystem. (a) (b) 10 CS-12 P. with one memory Design 1 : 16-way interleaving bank. the following : For this systemcalculate (i) (ii) format for each organization. 2006 ARCHITECTURE CS-12 : COMPUTER Time : 3 hours Note : Maximum Mqrks : 75 Question number 7 is compulsory.ADCA / MCA (III Year) Term-End Examination June.

table : Considerthe following pipeline reservation 5 1 S1 X 2 3 4 X s2 S3 X X Calculateforbiddenlatencies and greedycyclesfor this pipeline processor. State all the assumptionsand explain each notation used. (a) Explain any one directory-based protocol fof with the help of network-connected multiprocessors.t. processors : superpipelined o . Time required to exeiute N instructions The relationship between Speedup and Base machine Explicitly state the assumptionsand explain each notation used.(c) Show the numerical analysis demonstrating the perf. a diagram. (b) (c) Explain five salient featuresof data flow computers. cs-12 . 8 (d) the Derive the equations representing followingw.r.ormance degradation causedby branchingin an instruction pipeline. 7 2.

channeldeadlock (b) A computer systemhas a 12g byte cache. . (a) Perform a data dependency analysis the following on code segment: 51 : Load R1.3. R1 55 : Store M(100).T. 4. It usesa 4-way set associative mapping with B bytes in each block. (a) List two differences betweeneach of the following : (i) (ii) Crossbarversusmultistage switches Virtual channelvs. R1 53 : Inc Rl 54 : Add R2.O. To what block frame of cache address will 000010AF1ube assigned ? (iii) If the addresses 00001OAFru and FFFFTAxyru are assigned the same set. and the smallest addressable unit is 1 byte. The physicaladdresssize is 32 btts. physicalchannel 6 (iii) Buffer deadlockvs.R1 Also draw the corresponding data dependency graph. M(100) 52 : MOVE R2. c s -1 2 P. '(i) (ii) Show the mapping betweenphysicaladdresses and cacheaddresses. find the valuesof to x and y. Answer the following for this system: .

(a) (b) cs-12 25.000 .with the help of 'a diagram. 'context' mean with respect to a What does multithreadedsystem ? With the help of a diagram' explain multiple context prQcessors' I 5.(b) Differentiate between a VLIW processor and a processor'Also. Explain the concept of overlappingregisterwindows in the SPARC architecture. explainthe pipeliningin superscalar with the help of a diagram' VLIW architecture.

Ricart and Agrawala's algorithm for mutual exclusion in distributed svstems. cs-13 P. Belady's Anomaly. (a) What are the factors to be considered for an effective disk space allocation strategy ? Also. Write an algorithm to solve it.O. Give an example illustrating the anomalous behaviour of problem. . (c) Explain the concurrent reader's and writer's and explain. (d) Write and explain. 2OOG C S-l 3 : OP E R A T IN G Y STEM S S Time : 3 hours Nofe : MqximumMsrks: 75 Question number 7 is compulsory. Answer any three questionsfrom the rest.T.@l ADCA / MCA (lll Year) Term-End Examination June. (b) Write FIFO. (e) Compare the LINUX opnruting system with WINDOWS o/s with respect to features of open source software. 1. explain the indexing strategy for non-contiguous allocation of disk space.

000 . 7 4. with an example. Write and explain the Lamport's Bakery algorithm for inter-process synchronization. (a) B (b) 7 5.: 2. Explain protectionand sharingfor the following : (i) (ii) Paging system Segmented system 9 8 3. of with special relerenceto a client-server division of labour. (a) (b) Write and explain an algorithm for deadlock prevention.along with their working principles. Explain the Bell and La-Padula model of protection. Explain the architecture a DistributedFile system. (a) Explain processor synchronization issues in Multiprocessor systemwith sharedmemory. a 6 (b) Define processscheduling. What is the role of the scheduler? List all the schedulers available. (a) (b) cs-13 20. What is a digitalsignature? Explain the method for generationand verificationof digital signatures.

MCA (IIl Year) Term-End Examination June. cs-14 P. .O. (a) (b) Transform each of the following sentences into 4 disjunctive normal form ' ( i ) . Explain 'script' in the context of knowledge 'movie script'. 2006 T C S . Give one application of each type of inferencing technique.T.1 4 : IN T E L L IGE NS Y STEM S Time : 3 hours Note : Mqximum Marks : 75 Question number 7 is compulsory. Mention three differences between cognitive systems and expert systems' 4 1. Define cognitive systems. (d) Define the three Jechniquesfor indexing and retrieval of knowledge from memorY.( P & Q )& ( P v Q ) (iil -Pv-Q) &(R+S) Inference Inductive (c) Write three differences between and Abductive Inference mechanisms. Make a 5 4 3 (e) representation. Attempt any three questionslrom the rest. Cteate necessary assumptions.

6 (S) Write an algorithm for matchingsubstrings.ax2 + bx + c = 0. (a) (ii) Vx Normal (x) & Grown (x) + Walk (x) (y) Vy Haswings(y) & Layseggs -+ Isbird(y). 4 Apply the unificationalgorithm to the following set of clauses: l P ( X . a # 0. Transform the following FOPL statements into equivalent conceptualgraphs : (i) ' (c) 3. 5 3 (b) Write a LISP function that will reversethe elements of a list. 4 5 (b) 5 Explain the five levelsof knowledgerepresentation. b. Give an example displaying the three arc-relations. j o e )n R ( Y . Also give one example for each. 2. Define objectsand messages.input list ((ab)(c(de))). c e R. Z ) . Y ) n Q f i . a. mary) n Q (john.A) ) 3 (c) (d) cs-14 . Name any four arc-relations used in an associative network. P (john. A) n R (mary. (a) Write a LISP code for finding roots of a quadratic equation.(f) How does the use of a heuristicfunction reducethe searchspace? Suggesta good heuristicfunction for each of the following : (i) (ii) TravellingSalespersonproblem 8 puzzleproblem. outputlist (((ed)c)(ba)) 5 [eg.

which will make each of the following pairs of lists match i (il (. ((ef)ab .4. if any. (a) What is a DistanceMatrix ? How is it different from for the probabilistic'measures matching? Give ihe variablebindings.x). (a) Write and explain the various steps of the branch and bound searchtechnique. (?x bc (d ?y) ?z) (c) Considerthe following problem : You are given two jugs of capacity4 gallonsand 3 gallons. Neither has any measuringmark on it' How can you get exactly2 gallonsof water into the 4 gallon jug ? Write production rules for the problem and obtain the solution of this problem. Define the following terms w.r't' heuristic search algorithms' (i) condition Admissibility 5 (b) 6 (ii) Completenesscondition (iii) Dominanceproperty (c) Give any four functions performed by system' memory management comprehensive a 4 5.Y ef) 4 (b) 4 (ii) (abc(da) f).000 . 7 cs-14 19.x ab(cd) .

.

statingthe assumptions used.if any. suppliers. 7 (c) Explain the major transaction states with a suitable diagram. Answerony three questionsfrom the rest. These stores have to keep track of products.T.MCA (III Year) Term-End Examination June.O.1 5 : R E L A T ION A L A T ABASE D MANAGEMENT SYSTEM Time : 3 hours Note : Mqximum Mqrks: 75 Question no. An organisation has multiple retail stores.How is it relatedto normalization Explain ? this with the help of an example. customersand employees. for handling a large number of concurrenttransactions per minute in an online airline reservation svstem.Make an E-R diagram. I 1. I is compulsory. (a) . 7 cs-15 P.Describe suitable a method using Locks. ?OOG C S . . (b) Explain multi-valued dependency with the help of an example.

teacher) SUBJECT (subject-id. C-phone) Product (P-code. (i) Write the relational algebraic query for the following : . 3. subjectnamesand gradesof the studentwhoseid is 100. C-code. P-code. GRADE (stud_id.a relational databasesystem. List the grades of all the students in the taught by teacher "XYZ".Explain any four constraintsof updating a fuple in a view. ' List the studentnumber. s-namd. 'of clustering and hashing Explain the concepts indices. with the help of suitable examples. P-price) Call (Ca-id.(d) Explain the significance and usage of views in .using an exampleof each. 2. subjects (ii) Convert the queries above into an optimized query graPh. C-name. Ca-date) cs-15 . P-desc. Ca-result. (a) Define indices and their advantagesin RDBMS. (b) Considerthe relations: grade) subject_id. (a) Consider the following relationsin the context of a BPO: Customer (C-code.

4. (ii) Find the total number of calls made to the 'Smith'. (a) Explain the three problems of concurrent in transactions RDBMS.T. subject-id STUDENT (S-id. f-name. (b) A university maintains databasetables about the faculty and the students' ) FACULTY (f-id. with suitableexamples' What is a timestamp ? How does the system generate timestamps ? Explain the timestamp control' ordering protocol for concurrency 5 (b) 5 cs-15 P. S-course. (ii) studentsand databaseadministrator' matrix for (i) above' Createthe access (iii) List C-name and P-desc of the calls made (iii) Write the query modification statement for the students. S-name. (iv) Find the product details of those products whose price is aboveaverage. subject-id. customerwn'osename is today. . marks) Constraints' One facultyteachesonly one subject' (i) Identify suitable accessrights for the faculty.Write the appropriate SQL commands for the following : (i) Find the name of customersto whom a call is not made.O.S-dob) MARKS (S-id.

(a) (iii) Serialisability (iv) Closureof an FD (b) Supposethe write aheadLog Schemeis being used.(c) Explain the different time components involved in accessinga disk block. till cs-15 4 19. well as in the strategyof delaying as all writes to database the commit. "The decomposition of a relation into BCNF is always dependency preserving.000 . Explain the following terms with the help of an exampleor diagram : 10 (i) (ii) Data independence Security in statisticaldatabases (d) 5. Give the REDO and UNDO processes the strategy in of writing the partial update made by a transaction to the database." Is this statement true ? Give reasonsfor your answer.

(a) cs-16 P. It collects different penalties from both categoriesin case of late return of books.T.ADCA / MCA (lll Yr) Term-End Examination June. etc. as if Make assumptions. I is compulsory. penalties collected.The library needsa systemto maintainthe registersas well as for performingtransactions such as issue and return of books. necessary. books.. etc. newspapers. magazines. any. A library in a universityis having provision to issue books to students and staff.O. Explain to the classes well as associations. . 2OOG CS-16: OBJECT ORIENTED SYSTEMS Time :3 hours Note : Maximum Mqrks: 75 Questionno. Add three attributes and three operations the classes. Identify classesfor the system and draw the class diagram. Answer any three questionsfrom the rest. if 70 l. manually.The library also manages differentregisters which hold information about members.

(b) What is a Recursiveaggregate? Explain this with an example. Include associations. Board. Computer. College. Swing. Teacher.and show their relatedassociations. Rest room. Make necessaryassumptionswherever necessary. Ruler. Classroom.(b) Identify at least five classes a Railway Reservation in System. showing at least five relationshipsamong the following object classes: School. Use qualifiedassociations and show multiplicity balls in your diagrams. Chair. The diagram should also include attributes. aggregations and generalizations. with an example of each: (i) (ii) State Diagrams Generalization (c) (iii) Abstract Classes (d) Draw an E-R diagram and show the relationships between various entities like Student. Principal. Door. Desk. 10 cs-16 . Teacher. Hostel. 'Student.You do not need to show attributes of operations. Explain the following terms. Cafeteria. 2. Library of a IJniuersity Information System. Use association names where needed. (a) Prepare an object diagram. Playground. Book.

Give an example of a Scenario. using an example. (b) What is encapsulation? Explain the need for encapsulation. Inputs are the height and radiusof the cylinder.000 . (a) Define a Scenario.3. identify the relative importance of the three aspects of modelling : (i) (ii) 5. (b) Draw a Data Flow Diagram for computing the volume and surfacearea of a cylinder. define an Event trace and give an example of it. Also. with an exampleof each. 10 4. Telephone Answering machine Typewriter 10 (a) What is Overriding ? How is it different from Overloadingof functions? Explain two situationsin which one would need to use overriding. 10 cs-16 23.Outputsare volume and surfacearea. (b) For each of the following systems. (a) Explain five methodology differences between an OMT and the structured software development approach.

.

as an integer If the problem is to be solved by dynamic programming.) and value per unit (v. write the general recursion for this problem.ADCA / MCA (II Year) Term-End Examination June. . (a) 3 items are to be loadedonto a truck whose capacity is 10 tons.O. (i) (iil Formulate this situation programming problem.)of each item is given in the following table : i vi wi 1 2 3 5 6 4 2 3 1 Assume that only integral units of the items can be loaded. The weighi per unit (w.T. 2006 RESEARCH CS-51 : OPERATIONS Time: 3 hours Nofe : Maximum Mqrks. Attempt any three more questionsfrom questions numbered 2to5. The value of the load carried is to be maximised. 75 Question number 7 is compulsory. 1. 4 CS-51 P.

2) a saddlepoint for the game the entry Player B 81 82 83 A. A Z lo t A3L6 p 5-l l 101 4) l Are there values for p.. 4 (iii) The function f. then x can 2 2 take any real value. If a random variabletakes two values0 and 1 1 with probabilities = x und 11". max min a. is a convexfunction.(b) Find the range of values p and q"whichwill render of (2. >*min max a. 1) a saddle point ? Justify your answer . q that will make (3. (iv) For a two person zero sum game with the pay-off matrix A. (c) Which of the following statementsare true ? Give reasonsfor your answers.. i j ' J j i i j cs-51 . 12 6 ' l Player O. definedby (x) = /n x V x > 0.. j (i) (ii) The feasibleregion for any Lpp is non-empty.

8. ice chocolate cream. 6 grams of chocolate. + *2 .O.x2>0 CS-51 P. 10. Each biscuit costs 50 p. Fat Sugar Chocolate (grams) grams) Calories (grams) Food Biscuit (. + 3x.(d) My diet requires that all ihe food I eat come from one of the four "basicfood groups" (ice cream. 2xr+xr>10 ' x1. I must consume at least 500 calories. Max 4x. Thesecontentsper unit of each food is given below. 10 grams of sugar and 8 grams of fat. each bottle of cola costs Rs. subjectto x. each scoop of chocolateice cream costsRs. cola and cake. 10 and each piece of cake costs Rs./cola. 5. the following four food items are available for consumption: biscuits. biscuits and cake). . At present. soda.T. at (e) Solve the following LPP by simplexmethod. Each day.zunit) Chocolateice cream (/scoop) Cola (/bottle) Cake (/piece) 400 200 150 500 3 2 0 0 2 2 4 4 2 4 1 5 4 70 Formulatean LP model that can be used to satisfy my daily consumptionrequirement minimum cost.

< 16 xr+4xr>10 x|xr20 CS-51 . + 3x. (a) Data are gathered on the sale of TV sets at a retail shop over 100 days. 2x.t. No. They are compiled and presentedbelow.2. - Solve the following LP by graphical method : Maximizez=x7+x2 s. of sets sold Frequency of days 1 2 3 4 5 6 7 5 15 20 30 18 9 3 Work out the expected(mean)number of sets sold per day.

four locations (destinations) and requiring9. and obtain an initial basic feasible solution. (i) (ii) Which category of queuing models does this situation fall in ? What is the probabilitythat the ieller is idle ? waiting (iii) What is the average number of customers? (d) 5 3 List three major limitationsof the PERT model. 3. 7 and 9 cars. A car rental company is facedwith an allocationproblem resulting from rental agreementsthat allows cars to be returned to locations other than those at which they originally rented.T. Further. 15 CS-51 P. Assume that both inter-arrival times and servicetimes are exponentially distributed.) of a car betweenthe locations are as follows : Destinations Formulate the above as an LP (Transportation Problem). respectively. 6. . The averageservicetime for each customer is 4 minutes.(c) An average of 10 customersper hour arrive at a bank with only one teller.O. and the amount it receives. there are two locations (sources) with 15 and 13 cars surplus. The transportation cost (in Rs. respectively. identify the destination that will receive a supply less than required. At the present time.

CS-51 .The matrix below gives the cost job (in Rs. (a) Four different jobs can be carried out on any of the four machines. (i) (ii) Formulate this situation as a quadratic programmingproblem. . 0).1. Write the Kr-rhn Tucker conditions for this problem. Carry out simulation to identify each of the 15 coniecutive units producedas G or B. Machine -+ Job J M1 5 8 4 10 M2 7 5 7 4 M3 11 9 M4 6 6 7 3 J1 J2 J3 J4 10 8 to How should the jobs be assigned machines(one processingcost is iob to one machine)so that total minimum ? (b) A machine produces lOo/odefectiveitems.1). A phone booth is to be located at a point P in the plaza so that the sum of the squaresof its distance from all the verticesis minimum. 0). C (1. 1).4. D (0. Denote a good unit by G and a defectiveunit by B.) of processing i on machinej. I Use the sequenceof random digits : 4076486653 8950826528 4934582003 l How many G's and B's are produced? (c) A shopping plaza is in the shape of a rhombuswith A vertices (. B (0.

3 CS-51 17.02.5.000 . Everytime an order is placed. 10x.x. 0. Their different strategies given in the following pay-off matrix. (d) Explain three limitations of operations research. (a) The daily demandfor a commodityis approximately 100 units. (c) Two companies A and B are competing for the market of the same product. s. and find the value of the game. 100 is incurred.t.xr20. Write down the dual of the following LP (primal) problem : Maximizez = l2xt + 3x.The daily holding cost per unit inventory is Rs. are Company B 81 Company A 82 83 A1 12 A2 L1 | -2 2 ol 3l | Determine the best strategies. + x. + 2x.a fixed cost of Rs. > 100 7xr+3x"+2xr<77 2xr+4xr+xr<80 *1a0. x. Determinethe economic lot size.

.

accounting c s -5 4 P. detail. the following accounting l.ADCA / MCA (lI Year) Term-End Examination June. Discuss the role of 6 in feedback the processof control.5 4 : F IN A N C E A C C OU NTING C OMP U T E R S T i m e: 3 h o u r s Note : Mqximum Mqrks : 75 Question number 5 is compulsory. (a) Explain. in concepts : (i) (ii) Cost concept Accrualconcept (iii) Consistencyconcept (b) "Accounting is closely concerned with control"' Explain the statement.T. 2006 ON & C S. . Attempt any three questionsfrom the rest.O.

15.000 18. (Dr) Amount Rs. prepare a Trading and Profit & Loss account for the year ending December 31tt. From the following balancestaken from the books of M/s Ram Kishore & Co.1.000 16.000 8.000 21.000 12.000 17.000 89.000 14.000 10.000 3.2004) Debtors & Creditors Purchases and Sales Returns Drawing and Capital Fire insurancepremium Life insurancepremium Income tax paid Bills receivableand payable Sales tax payable Wages and Salaries Telephone expenses Sales promotion expenses Cash & Bank overdraft Audit fees Amount Rs.000 2.000 5.2 .000 12.000 22. Particulars Stock (1.000 8.000 1.000 14. (Cr) 15 17.000 25. 2004 and balancesheetas on that date.O00 1.25.000 cs-54 .000 5.

T.000 5. (Dr) Amount Rs. Also .0 0 0 3.24. 3.000 6. the featuresof an appropriate capital structure. I Explain why they are approacheddifferently.000 1.000 3 .Particulars Discount Investments Interest on investment Interest on bank overdraft Rent paid Bad debts recovered Total Amount Rs.O.000 12. .2 4 .000. (b) Explain the concept of Zero Base Budgeting. of Js 4.000 2.000 Closing Stock as on 31st December.2004 amounted to Rs. in detail. (a) Examine different classes of capital projects.-' give four of its advantages and three disadvantages. 25.Also explainthe variousfactorswhich determine and influencethe capitalstructure a firm. c s -5 4 3 - P. Explain. (Cr) 4.000 60.

5. (ii) Fixed Costs to (iii) Fixed Costs percentage Sales (iv) Break even Point (b) Margin of Safetyfor the year 2003 and 2004' 75 providesthe XYZ Ltd.selling and distributionoverheads(Fixed) Net Profit (i) Per unit Total 25 15 3 18 3.) Total Cost (Rs.000 L. 2003 Total Sales (Rs. 6 0 0 Year ended 2 4 . calculate (i) The Profit Volume ratio . 0 0 0 27.05.23.000 73. manufacturerof industrialvalves following informationfor the year ended3ltt March. (v) 2005.000 cs-54 ' 4 .000 45. 8 3 . Particulars Sales(15.200 3 1'' March.000 2.000 2.25. 2004 Assumingstabilityin price with variablecosts carefully controlled to reflect predeterminedrelationshipsand an unvarying fixed cost.43.000 32.75. (a) The following figures relate to a company manufacturinga varied range of products : Particulars Year ended 31't March.000 1 9 .70.) 22. 5 1 .000 valves) Production Overheads Variable Fixed (ii) Gross Profit Administration.

0 0 0 4 .000 15. 0 0 0 5 .000 4.000 2 . 0 0 0 1 . Production and Stocks for the yeay are as under : Particulars Quarter II Opening Stock II IV Total 2.000 4. 15 c s. 0 0 0 3 .000 5. 0 0 0 4 .000 2. 0 0 0 You are required to prepare quarterly statements of profitability on the basis of Absorption Costing and MarginalCosting.000 1.000 Production 6 .5 4 18.0 0 0 3 .The actual Sales. 0 0 0 3 .000 . 0 0 0 Sales Closing Stock 4. 0 0 0 1 8 .

.

(b) Write a program that does not use the inbuilt string functions to perform the following : (i) (ii) (c) To compare two strings To'copy a string 1. 2006 AND S M C S. draw a corresponding flow chart and write a program in C. Attempt any three questionsfrom the rest' Design an algorithm. to print the fibonacci series. .MCA (Revised) Term-End Examination June.O. and write a program to find ihe factorial of a number using recursion.T.O 1 1: P R OB L E M OL V ING P R OGR A MMIN G Time: 3 hours Maximum Morks: 700 (Weightage75o/o) Note : Questionnumber 7 is compulsory. 10 MCS-o11 P. (a) 10 10 Design an algorithm.

with an examplefor each. Determine the resultantdata type of each of the following expressions : (i) i+C (ii) X+C (iii) dX + X (iv) ((int) dX) + iX (v) i+X (vi) S+j (vii) iX + j (viii) S + C (ix) iX + C (x) i+j 10 2. (a) Summarizethe purpose of the format strings (like o/os. short S. long iX.o/od.o/oc) that are' comrnonly used within the printf function. j. char C. 10 (b) When can two matricesof order a x b and c x d be subtracted? Also write a program in C to find the differenceof two such matrices. double dX. float X. 70 MCS-o11 .(d) A C program containsthe followingdeclarations : int i.

int b). 0 0 0 .3. (a) Design an algorithm. 70 (iii) unsigned f(unsigned a. draw a corresponding flow chart and write a C program to check whether a given string is a palindrome or not. to calculate the gross salary and net salary. attendance and deductions are given as input. (iv) int (-f) (char*. (a) What is the difference between a function and a macro ? Find the largest number among two numbers using a function definition as well as a macro. 4. unsigned b). (v) int * f(charo. 1n MCS-o11 11 . (a) Wiite a program. short b. 10 (b) Explain the meaning of each of the following functions prototypes and mention the return data type of each of them : (i) (ii) double f(double a. using an array of pointers. int). 10 5. using 'structures'. Which is more efficient in terms of execution time and code size ? 1t1 IU (b) Write a program to sort a list of strings in alphabetical order. 1n tv (b) Write a program to count the number of characters. int). number of words and number of lines in a given file. void f(long a. if the details of an employee along with the basic pay. unsigned c).

.

Draw the resultantlogic diagram. Seek time on a hard disk is 50 ms. (a) Construct the Karnaugh map for the following function. C . 7 . (c) MCS-O12 P. 2006 MCS-012 : COMPUTER ORGANISATION & ASSEMBLY LANGUAGEPROGRAMMING Time : 3 hours Mqximum Mqrks: 700 (Weightage 75o/o) Alote : Question no. 4 .S flip-flop.T.O . and find the function in sum of producl form. Each track on the disk has 100 sectors.Find the averageaccesstime for the disk. 1 5 ) (b) Draw the logic diagram for a 4 x 4 random access memory.MCA (Revised) Term-End Examination June. It rotates at a speedof 3000 rotations/sec. 7 0 . F ( A . l. 1 3 .B . D ) : > ( 0 . 8 . 2 . 6 . Attempt any three questionsJrom the rest. I is compulsory. Assumethat the cellsof RAM are made of R . 5 .

(b) Construct a 4-bit right-shift register with serial input-output using D flip-flops. E + F 2.(d) Explain. Describe its functioning. any five DOS function calls supported by INT 21H in the 8086 language. using a 4-bit binary number. with an : logic-microoperations (i) (ii) SelectivecomPlement Mask operations (iii) Insert (iv) Clear (0 (g) What is the need of master slave flip-flop ? Explain its functioningwith the help of a suitablediagram' Write a program to evaluatethe following expression using an accumulatormachine : A = B + C " D . assembly 10 examPle. with the help of suitable diagrams. the following (e) Explain. 5 (c) What is a micro-instruction ? Explain the three micro-instruction formats. with an example of each call. (a) How can ihe subtractionoperation on binary numbers be achieved by using addition operations only ? Explain this. 10 MCS-012 .

Write a program in 8086 assemblylanguagethat checks an input string against a password string stored in the memory and outputs an appropriate message the stringsare not equal.T.O.'and secondlargestnumber from a list the of 10 numbersstoredin the memorv. Assume a computerhas 32 word RAM each having a word of 16 bits and a cache memory of 4 blocks. P. with the help of an example. 5.with the help of an example of each.3. with each block having 16 bits. Where can we find a main memory address in the cache(if it exists)if 21 (i) (ii) Set associative mapping is used? Direct mapping is used? (b) (c) 4. (a) Write an 8086 assembly program that finds language the largest. if What is the significanceof FAT ? What are the limitationsof FAT 16 ? What is the sequence micro-operations of requiredto fetch an instruction? Explain any five addressing modes used in an 8086 microprocessor. 10 MCS-012 . (a) Explain the process of handling an interrupt that occurs during the executionof a program. (a) (b) (c) (iii) Associative mapping is used ? Explain your answerswith the help of a diagram in each case.

6 Explain the followingwith the help of an exampleor a diagram. 0 0 0 .(b) Draw the logic diagram of a full adder.whicheveris appropriate: (i) (ii) Parity bit Floatingpoint notation (c) I (iii) Refreshrates in video controllers (iv) An l/O channel MCS-O12 11 . Create a 2-bit adder-subtractorcircuit using the block diagram of the full adder.

(a) (b) -(vx P(x)) (c) Give a direct proof of the statement "The cube of an odd integer is odd". Check whether foS(X) = gof(X). A x i ) ' ) ' (e) Let f and g be functions defined by f(X) = x2.v x r ) ' n ( x .T. Sfi) = x * 1.O. 2006 MCS-013: DISCRETE MATHEMATICS Time : 2 hours Note : Mqximum Marks: 50 Question number 7 is compulsory. S 4 3 MCS-o13 P. (d) Find the logic circuit correspondingto the statement ( ( x . Express the following statement using existential quantifiers : 2 2 l. Prove (p + q) = (-p v q) using a truth table. . Attempt any three questionsfrom the rest.MCA (Revised) Term-End Examination June.

is the n x n identity matrix. B... * n3_ n2(n+1)2 4 2 MCS-O13 . 4. For the setsA.Let R be a relation defined on A such that aRb iII a + b.1 3 2. (b) Let A = 17. (a) 5 where I. Check if R is a (i) Reflexiverelation 3 (ii) Symmetricrelation (iii) Transitive relation (c) . 5lr. 3..(0 In how many different ways can a 7-person committee be formed containing 3 women and 4 men from amongst a group of 20 women and 30 men ? (g) How many numbers between 1 and 100. (a) Prove by mathematicalinduction that 13+ 23 + 33 +. are there which are divisibleby 2 or 5 ? Let A and B be n x n matrices... 2. 3.Check the truth value of the following statements: (i) lBvA1(A+B) =Al (ii) lB VA [A + B = 1. C represent (i) Au(BnC) (ii) AAB using Venn diagrams.. both inclusive.

MCS-013 P. V .1 1 . What is the probability that all four are kings ? 4. (a) Using truth tables. (i) (qnp) v(qn-p) (ii) p ^ -p (iii) q -+ (q --> p) (b) Differentiate between a theorem and a conjecture.T.X3=0. . (c) Four cards are chosen randomly from a pack of 52 cards. check if each of the following is a tautology or not.X 3 )= ( X 1v X 2 )^ ( X i v X .X2=1. forXr=0. Also give an exampleof a famous conjecturewhich is not a theorem. ' ) A the evaluate boolean expression E ( X 1X 2 .(b) For the boolean algebra ( { 0 . . (c) 7C' Use Pascal's triangleto find (d) Define a multinomialcoefficient.O. ) n ( X .. v X r ) ' .

x1 0 0 0 0 1 1 x2 0 x3 0 1 f(x1. x3) 1 0 1 1 0 1 1 0 0 1 0 1 0 1 0 1 0 1 I 1 1 1 1 0 Show that in a group of 100 people we can always find 9 people who were bom in September.5. Find the number of 4-letter words which can be formed using the English alphabet. (c) (d) Define a partition. (a) For the following functions defined in tabular form below. find the boolean expression in CNF and DNF. 0 0 0 . How many will begin with a vowel ? MCS-O13 11 . and find Pu3.x2.

10 (b) Explain the role of a system analyst in software development. l. .O14 P. (c) Differentiate between the following : (i) (ii) Coupling and Cohesion Decision tree and Decision table 70 (iii) Alpha Testing and Beta Testing (iv) Forward Engineering and Reverse Engineering MCS.T. (a) What is a System ? List the various types of systems and explain each of them in detail. Answer any three questionsfrom the rest.O. 2006 MCS-014 : SYSTEMS ANALYSIS AND DESIGN Time: 3 hours Maximum Mqrks : 700 (Weightqge 75o/o) Note : Question number 7 Is compulsory.\ MCA (Revised) Term-End E>ramination June.

000/.and 7o/o over Rs. For the Type B account. (a) What is a feasibilitystudy ? Why is it important for system design ? How does cost benefit analysis contribute in it ? (b) Define logical design of a system. (a) What is a CASE tool ? How are CASE tools important for an organization ? List the advantages and disadvantages CASE tools.Type A and Type B./-. The uninsured amount gets 5'00o/o annualinterest.000.Also. 2. 5'5%o on the next Rs. The insured amount gets 8'750/oannual interest. 25. The balance can be insured. 2.(d) Considerthe followingsituation: A bank offers two types of savingsaccounts. dividendsare paid monthly on an average daily balance for that month. otherwise50lo interestis paid on the first Rs. No dividend is paid for a balancebelow Rs. How is it performed ? Describe the relationship between data mining and logical design.the bank pays a dividendon the accountbalanceat the end of each quarter.000. 5./-. of MCS-O14 .000/-. 20. describea tool for data mining 10 70 3. For the Type A account. Draw a decision table and a decision tree for this 15 situation.

0 0 0 . in Explain information security architecture. (a) (b) 5. (a) (b) (c) MCS-O14 11 . 10 3 What are the mbthods for gathering the user requirement? What problemsare encountered when using these methods? 10 Explain five components required to construct a DFD. Explain four reasonsfor the need of documentation of a system. Construct the zerolevel and first level DFDs for the problem of "on line examination".with the help of a suitable diagram. (c) 4. briefly describe risksand 3 threats.(b) What is the importanceof studyingthe maintenance of a system ? Explain the various types of system maintenance SDLC. What are the risks and threats involvedin a system security? Also.

.

and what proteins they attach to in humans.O. a virus infects a worm and it has nothing to do with computers. Others had tried and failed before and Wilkins' breakthroughwill let researchers learn more about how viruses move from one host to another. But it does have a lot to do with humans. Readthe followingpassage given and answerthe questions after it : Finally.are similar to some human cells. Mqximum Marks: 50 l.T.MCA (Revised) Term-End Examination June. Some cells in C elegans. MCS-o15 1 i P. a microscopic earthworm comrhonly used in biomedicalresearch.. 2006 M C S. . a microbiology and immunology student at the University of Arkansas. Courtney Wilkins. elegansearthworm with the mammalianvesicularstomatitisvirus and had it replicate. successfully infected the ..O 1 5: C OMMU N IC A T ION SKILLS Time : 2 hours Note : Answer sll questions.

And that meant Wilkins' her careercould be stopped degreewas at stake.She usuallyworked with muscleor intestinalcells and eventually settled on using the vesicular stomatitis virus. MCS-o15 .because if nothing came of the research. Wilkins remeinbered discovering about 9 pm. a professorof virology and another advisor. After two years.l' she said. one of Wilkins' advisers and a professor of cell biology. He said that there were points when he had to remind Wilkins that her decision it to undertakethe researchwas a risky one. it was clear that Wilkins was successful in her experiment.. Wilkins began siudyingwhether she could infect the worms with a virus and have the virus spread.he said. so it just seemedpretty exciting. The virus is related to rabies and similar to foot-and-mouth disease and mostly infects livestock. one night in 2004 that the VSV had replicated inside the worm cell. Since January 2002. "She couldn't get the words out." she said. because was unknown whether it would work. so we knew there was somethingto it. She immediately called Marie Chow." Chow-said."There were a lot of labs interestedin whether this could work. Khaled Machaca. said the experiment wasn't without its rough spots. It took three to four months to establish cell cultures. "Courtney gets so excited that she starts to stutter. the Wilkins said.

/off of /up/awag) in time 3. word from the Fill in the blankschoosingthe most suitable given : choices (i) their new housetwo years They moved back. Your gun should not go accidentaily. (through/in /on/oII) (iv) I ran an old friend in Amsterdam. . meaningas (v) Use 'livestock'and 'rough spots' in a sentenceeach of your own to bring out their specificmeanings. (About 500 words) in MCS-o15 P. between four Write down the text of a group discussion participantson the need for more strict quality control 10 measures India. (round /on/over /into) Be careful.T.reaction the outcome to 2+2 of the research? Why was it so ? (iv) Find out a word from the passage which has similar 'spread'.(away oII/ over/ on) I 7 2 5 (ii) (iii) The Government was determined to push ihe legislation . (on. (out/th rough/ into/ upi (v) The flight could not take -because the fog. 2.O.(i) How was the researchmentionedin the passagea risky proposition? Whai was the outcomeof the research? 2 1 (iil (iii) What was the researcher's.

You are Nihal Chand. 10 5 . Write a letter of application. New Delhi. Write a Memo to all the three Managers (Sales. togetherwith your Curriculum Vitae (CV) for the job in response to the following advertisement : 75 Programmers.110068. Apply within 10 daysto Box 65. 0 0 0 . Productionand Finance) hold a meetingwith them. ManagingDirector. PurifiersIndia Ltd. with minimum 2 years' experience required by a well-known Data Processing Company in Delhi. for the yearlyreviewof the Company. "COBOL MCS-o15 11 . in a to week'stime.4 .

j). 2006 MCS-021: DATA AND FILESTRUCTURES T i m e: 3 h o u r s Note: Maximum Marks : 700 (Weightase75%) Question number 7 is compulsory. i). for (i:1. Also compute the overall complexity of the given code. 5. m=n+66. should be written nearer to 1. (b) for Derive the expression computingthe height of a completebinary tree. Attempt any three questions from the rest. j<:m. computethe height of a completebinary tree of 1024 nodes. 3. &n). 4. m:n/5. AII algorithms 'C language. i++) printf ("%d\n".T. Also. (a) Calculatethe complexity of the following code by 'O' notation : using Big 1. j++) printf ("%d\n". 70 MCS-021 P. for (j:n/27. scanf("%d". i<:m.MCA (Revised) Term-End Examination June. 2.O. .

9 I9 . Write a program to createan AVL binary tree. MCS-021 .(c) Write a program to delete the leftmost node from a doubly linked list. 2 . 10 Construct a heap for the list given below. (d) (e) Show that the lower ordereflterms and the constant terms do not matter in computingthe complexityof the algorithm in Big 'O' notation. insert an elementinto the tree and displaythe tree. 5 5 10 Write an algorithm to implement binary search. (a) (b) 5+5 3. 6 . L1 (i) (ii) (b) Write the steps involved in calculatingthe ranlc of A. (a) Considerthe matrix l z 3 1 tl t t l A = 1 12 0 l t l 3 1 J ss . 10 4 . 9 . 7 . Write an algorithmto find the transposeof A. 7 . 3 . 5 . Clearly indicatethe changesin each step. 10 Write five differencesbetween : (i) (ii) Sequential and Index file file Linear Data structure and Nonlinear Data structure 2.

5. respectively. 0. 72.use the input numbers given below in the algorithm.implemented using linked list. 6. 7. 2g 5. and showeach and every step of the algorithm.Which shortestpath algorithm is the most ' efficient ? And why ? 10 Write the quick sort algorithm.4. implemented. 3. 2. (a) (i) How does DFS algorithm differ from BFS algorithm? What are the stepsof DFS algorithm? (ii) (iii) Give two examples each of applications in which the BFS and DFS algorithms. g. (a) (b) 10 MCS-021 5. 10 Explain Dijkstra's algorithm with the help of an example. are 10 (b) Write an algorithm each for PUSH & pop operationson a stack. 7.Further.000 .

.

MCA (Revised) Term-End Examination ' June, 2006 MCS-022: OPERATING SYSTEM CONGEPTS AND NETWORKING MANAGEMENT

Time : 3 hours Note : MqximumMarks: 700

Question number f. is compulsory. Answer any three questionst'rom the rest. Describethe structureof 5 classes IP addresses. of Differentiatebetweenthe following concepts: (i) (ii) Multiprogramming Multitasking

l.

(a) (b)

5 6

(iii) Multiprocessing (c) Write a shell script that prints a list of every unique word in a file, in reversealphabetical order. Explain the function of the following : (i) (ii) LS-L /etc/shadow Iile

6 4

(d)

MCS-022

P.T.O.

(e)

Define the concepts of domains, workgroups and trusted relationships in the context of Windows

2000.

(f) What is Kerberos ? Describe Kerberos management in the Windowsoperatingsystem. Describe two types of back-ups. Differentiate between virtual circuit and datagram to approaches packet switching. 2. (a) Explain four basic design issues in a multimedia operating system. (b) Differentiate betweentheTCP/lP and OSI relerence models, and map the layers between the two approaches. (c) How would you set the IP addressof a LAN card in Lintx ? 3. (a) Describethe various securityfeaturesin the Windows 2000 operating system. Further, explain the differencebetweenthe securityfeaturesof an OS and of a network. (b) Describe the steps needed to configure the network file sewer in the LINUX operatingsystem; .Explain the drawback of LINUX. 10

6 5

k) (h)

5 5

(c)

MCS-022

4.

(a)

Describethe GUI featuresof Linux. Also explain the corresponding GUI features of Windows 2000. Further, comparethe usefulness thesefeatures. of 10

(b)

Describe two features of the Intrusion Detection System(lDS). What are the requirements a user to be able to for kill a process in Linux ? Write the necessary commands.

5

(c)

5 20

5.

Describethe following : (i) (ii) Fault tolerant system sNMP

(iii) IPSec (iv) Architectureof the Windows2000 operatingsystem

MCS.O22

5,000

.

salary. and bdate. An employee is assigned to one department but may work on several projects. sex. address. and a particular employee who manages the department. MCS-023 P. each of which has a name. a unique number and a single location.O . 2006 MCS-023: DATABASE MANAGEMENT SYSTEMS Time : 3 hours Maximum Mqrks : 700 (Weightage 750/o) Nofe : Question no. (a) Consider the following requirements of a company : (i) The company is organized into departments. 1. I is compulsory. (ii) A department controls a number of projects. (iii) An employee has name. Each department has a name.MCA (Revised) Term-End Examination June. Attempt any three questionsfrom the rest. id#.T. a unique number.

AB -+ C. We keep each dependent'sname. A -+ C. C + A. BC -+ A. birthdate.Give reasonsfor your answers.R diagmm w'r-t. any. Draw the E . relationship to the employee.B-+A r(R) A 1 B 4 5 4 3 1 C 2 6 6 8 3 J 7 9 (c) 0 fxplain five differences between the' database approach and the file basedapproach' MCS-023 .R diagram for the company.(iv) We are keeping track of the dependents of each employee for insurance purposes. Make suitable if assumptions. state wh6iher or not the following functional dependencies are satisfiedby the relation or cannot be determined. A + B. AC-+B. relationship cardinalityand participation constraints' (b) Given the relation (R) shown below. sex. Fxplain all the relationships in your E .

teacher-id) RESULT (s-id. How is it related to concurrency control ? What are two advantagesand one disadvantageof data replication ? Explain the classification of replication. (a) (iii) Is R in BCNF ? ExPlain. c-tame.andED-+A. (ii) Find the teacherswho are teaching more than one course.Phone. D and E. 10 P. c-id. (iii) Display the name and marks of those students '1-1-1985' and have who were born before scoredmore than 80 mark in any course' (iv) Find the details of studentssecuringpass marks (50%) in more than 3 courses.dob. (v) Find the total number of credits earned by a studentwhose id is 10' (e) ? What is serializability Explain this with the help of an example. C. having the followingFD's : A-+B. (il (ii) List anY two candidatekeYsof R' Is R in 3NF ? ExPIain' 5 (fl 5 2. A. marks) 70 Formulatethe SQL queriesfor the following : (0 Find the namesof the studentswhose resultsare not declaredin anYcourse.i (d) Considerthe following relationalschema: STUDENT (sname.T. Considera relation R with five attributes B.BC+E. credit.O. MCS-023 . s-id) COURSE (1$.

(a) What is a checkpoint ? How is it useful for the process of recovery ? Explain this with the help of suitableexample. What is an Inverted file organization ? Explain this with the help of an example. with the help of an exampleeach.What are the concurrency related problems that may be encountered in concurrent execution of the transactionsabove ? 10 4.(b) Describe the 3-tier client-serverarchitecfure. (a) Explain primary. What are its advantages? What are the different levels of security for database systems? What is the relationshipbetween securitgr and integrity ? (b) (c) MCS-023 . (c) 3. List 4 advantages client-serverarchitecture. in which multi-level indices are required. of What is data independence How can_youachieve ? data independence? Explain this with the help of an example. Give a situation with justification. secondaryand clustering indices. 10 (b) Write a pseudocode of two different types of concurrent transactions that may be executed in a Railwayreservationsystem.

5.000 . Explain the following in the context of DBMS. with the help of an exampleor diagram: (i) (ii) Views Referentialintegrityconstraint (iii) Databasemanager (iv) Data dictionary (v) Strict 2-phaselocking MCS-023 5.

J .

5 (b) What is an object ? How are objects and classes associated with each other ? Also give two passingbetweenobjects.trcs{r-l MCA (Revised) Term-End Examination June.T. 2006 MCS-024: OBJECT ORIENTED TECHNOLOGIES JAVA AND PROGRAMMING Time : 3 hours Note : MaximumMarks: 700 Question number 7 is compulsory. give an exampleof a Polymorphism. . 5 (c) 5 (d) MC5-024 P. (a) Explain the conceptof Polymorphism. Also. advantages messages 5 of When can an object be used as a reference of another object ? What care shouldbe taken in such kind of referencing? Your explanation should be supportedby an example. l.O. Attempt any three questionsfrom the rest. What is multilevelinheritance? How does it differ from multiple inheritance? Also give an example of multiple inheritance.

What is the method to retrieve the colour of the text ? Write a program to retrieve RGB values in a given colour What is a TCP socket? Explain how a TCP socket is different from a UDP socket. why the name of Java class containingthe main( ) method has the same name as the name of the file in which it is stored. and explain.with the help of an example What is this pointer ? Explain its use'with the help of an example. Explain the eight basicfeaturesof Java.with the help of an example. any four constructors of the String class. (f) k) (h) 2- (a) (b) (c) (d) (e) 3. give at least two advantages Multithreading. Give the reasonswhy the main( ) method in Java is defined as public and static. Also explain. (a) (b) MCS-024 . Where does the Applet class appear in the ? hierarchy of Java classes Show this through a class hierarchydiagram. What is a Package ? Explain the processof defining your own package.(e) What are the five issuesthat are to be taken care of while overridinga method ? with the help Explain the concept of Multithreading of of a diagram. Write the syntax. Explain the order of constructorcalling in multilevel inhefitance. Also.

O. (c) MC5-024 P. Explain the seven steps that are to be followed to establisha connection from a Java program to a database. (b) Write a program to computethe factorialof a given number in Java. classassignI Privatevoid iMethod (int e) { // line 8 e 10 11 12 1 l 1 l Write all the variablesamong a. (a) Considerthe following definition : 1 2 3 4 5 6 7 8 public class exam I Publicint a = 1. c. public int b : 2. public void method (final int c) {intd=3. d and e that can be relerencedat Line 8. (d) Write an Applet in Java that will displaythe current date. b. .(c) What is 'abstraction'? Explain two advantages of abstractionwith an examPle. 4.T.

What is method overloading Explainhow a method ? is overloaded Java. with an example.5. the Write five differencesbetween an interface and an abstractclass. Write a program in Java using the StringBufferclass which reverses string"IGNOU MCA student". in (b) (c) (d) .MCS-024 5.000 . (a) What is a session? Explain how hidden form fields are used for session tracking.

any real constants a and b. 6 4 1.O. Attempt any three questions from the rest.T. (i) Show that for. (ii) Give an analysis the efficiencyof ihe Binary of Searchand Linear Searchmethods. (n + a)b = @(nb). Give an example in which the Greedy technique fails to deliveran optimal solution.MCA (Revised) Term-End Examination. 2OOG MCS-031 DESIGN : AND ANALYS|S OF ALGORITHMS T i m e: 3 h o u r s Note : Maximum Mqrks : 700 Question no. I is compulsory. All algorithms should be written neqrer to C/C++ Ianguage. 7 (c) Explain the Greedy Structure algorithm. June. (a) (b) What is Randomized euicksort ? Analyse ihe expected running time of Randomized euicksort. . where b > 0. s MCS-031 P. with the help of a suitableexample.

Give examples of two such problems. (a) What is the running time of heapsort on an array of length n that is already sorted in increasingorder ? What about the time for decreasingorder ? What is the differencebetweendynamicprogramming and the greedy choice approach to solve problems ? Explain the significanceof the notation ro' Consider function f. (e) (f) Why does the complexity of an algorithm need to be analysed ? Show that the Travelling Salesperson problem is NP-comPlete. n) = { such that MONUS | 0 if m>n otherwise MCS-031 . Define an NP-complete problem.(d) Describethe two properties that characterisea good dynamic programming Problem. defined by f(x=5*3+3x2+10' ) Show that f(x) = trl(x2). MONUS:NxN--+N [m-n (m. 10 2. (b) (c) (d) Design a TM to compute the binary function MONUS. definedas follows.

Languagehaving exactlytwo b's in any word. write the time it is discovered it becomesknown) to its left and the time it is visited (i. classification 10 (b) Build regular expressions and correspondingFinite over the Automata (FA) for the following languages 70 alphabet : {a. b}. Randomized Select). write its next to it in the diagram. (i... For each vertex. of a's is a multiple of three.e. Assume that the vertices are in order and assumethat the considered alphabetical graph represented using adjacency list list representation which each adjacency is ordered in is alphabetically.T.e. (a) Write a randomizedalgorithm to find the ith order statistic in a set of n elements (i. For each edge. its adjacentnodes are generated) its right in to the diagram below.. (a) Show how a DFS (Depth First Search)works on the graph below.O. I MCS-031 P.3.e. 4. . ) (i) (i0 Language havingwords in which total no.

(a) (b) Write Kruskal's algorithm and use it to find a minimal cost spanning tree of the following graph.Answer the following with respect to these techniques. (c) How does alpha beta pruning improve the minimax procedure ? MCS-031 8.000 . (i) (iil Which algorithm has some knowledge of problem space? Which algorithm has the property that if a wrong path is chosen.(b) Write a recursiveprocedure to compute the factorial of a number. Give justification for your answerin each case. it can be corrected afterwards? (c) 5. and Breadthfirst ConsiderBest first searchtechnique searchtechnique. Design a Turing Machine that incrementsa binary nurnberwhich is storedon the input tape. 10 (Show the intermediate steps).

2006 MCS-032 : OBJECT ORIENTEDANALYS|S A N D D E S IGN Time : 3 hours Note : Maximum Msrks : 700 Question number 7 is compulsory. Make necessary assumptions.T. If needed. The bank deals with its customers in terms of opening different types of accounts. A bank has branches in major cities of India. deposits and withdrawal of money. the Branch Manager also has to work as a clerk. The employees working in the offices are categorised as Branch Manager and clerks. if any. Attempt ony three questionsfrom the rest.MCA (Revised) Term-End Examination June. 1. MCS-032 P. (a) 10 (b) What is encapsulation ? Explain two benefits of encapsulation with an example. Each class must have at least three attributes and two operations.O. The bank wishes to develop a system for each of its branches. . Identify the classesin the system and draw a class diagram.

with an is example. (a) What is concurrencyin objects ? Explain.how concurrency identifiedin a dynamic model. and explain. MCS-032 2 + . a state diagram for an ATM system. 70 70 Explain the followingin the context of a DFD ' (i) (ii) Process Data Flow (b) (iii) Actor (iv) Data Store Also.(c) What is a state diagrarn ? Explain the different notations used in state diagram. with an example for each' 'referential (fl What is an integrity constraint ? Explain integrity constraint' with an example. (e) What is an association ? Explain the differences two-way association and one-way between association. k) Explain why more emphasis is given on object structure rather than on operation implementations in object oriented systems development' 2. illustrateall these componentsin an example DFD. (a) Draw. (d) What is a'use case ? Explain different components of a use case. 3.

how persistent data are identified. (a) What is a collaboration diagram ? Draw and explain a collaboration'diagram for a library system' Make necessary assumptions 10 ? Take an example o{ 5 (b) What is composition composition and draw a UML diagram for it' (c) Explain generalization and specializatio. (a) What is an event ? Explain how concurrent events are handled. with an example for each. (c) What is inheritance ? What is the need for 5 5 5 adjustment of inheritance ? Explain one way of adjustment of inheritance. 5.n.000 .(b) Explain how associationsare implemented as a class. explain how objeci classesare mapped to tables. with an example. with an example. 5 4. (b) With the help of a suitable example. with diagrams and code written in C++dava' 10 (c) What is persistency ? Explain. 10 MCS-032 8.

**MCA (Revised) Term-End Examination June, 2006 DISCRETE MCS-033: ADVANCED MATHEMATICS
**

Time : 2 hours Note : Maximum Msrks: 50 Attempt any

Question no. I is compulsory. hr"" t""ttr""t frt - | 62 -

1.

(a)

Check whether ,"

n + 2) is a solutionto

the recurrencebelow or not. an 4a,,- 1 + 4an-z = 2n, n > 2.

is Also check whether the recurrence homogeneous. 3 (b) State Euler's formula for a planar graph. Give an example of a planar graph with 6 vertices and S-regions, and verify Euler's formula for your example. 4

MC5-033

P.T.O.

(c)

A post office has stamps only in denominationsof Re. 1, Rs. 2 and Rs. 5. (i) Find the generatingfunction for the number of ways in which you can pay n rupees using thesLstamps. If the post office has only 20 stampsof Re. 1, 10 stamps of Rs. 5 and 10 stamps of Rs. 2, find the number of ways in which you can pay a postageof Rs. n.

(ii)

(d)

Considerthe following graph.

v4

v^

J

(i) (ii)

Write down the degreesequence the graph. of Draw the complementof the graph.

(iii) How many edgesneed to be removed to get a spanning tree of the graph ? (e) Using an appropriate substitution, solve the recurrence Yn = n-1 n Vr,-1 + n for n t 1, go = 1

4

MCS-033

? (b) (ii) Set up a recurrence an. and solve it. r ) + C ( n . ..Find the generating {aO.O. u 1 + a 2 . .. U s e t h i s t o e deduce the identity C ( n . for 'The Petersen graph is bipartite.(G1)= d(Gr) and ).l. r + 1 ) .(G2)< 6(Gr). . > 1. (a) Let an be the numberof subsets lI.a o * u l . MCS-033 P. a. functionof the s e q u e n c { a o . (a) Find the vertex chromatic and number of the following graph : edge chromatic v4 (b) Let A(x) be the generatingfunction of a sequence a' uz. nJ of with at leasttwo elements. . 2.. Give examples of graphs G.r + 1 ) = C ( n + 1 . and a. .' True or false ? whv ? 3.(G) of a graph G.2. 4. such that ).T.. .a.Is it possibleto find a graph G with f(G) > 6(G)? Justifyyour answer. } . (a) Define the edge connectivitgr ). n (i) What are the values of. and G.3. r > 1 ..

State Dirac's and Ore's sufficiencycondition for a graph to be Hamiltonian..Which of the conditionsis stronger ? If neither of the conditions apply for a graph.. 1 andao=1.}. ar.ar=1. Ior n> 2. where an satisfies ._ .6un_r. which is a linear combination of n2 and 2"...Sar. 5. (b) MCS-033 8. can you conclude that the graph is non'Hamiltonian ? Justify your answer with examples.(b) Find the general form of the soluiion to a recurrence relation with constant coefficients for which ihe characteristic roots are 1 with multiplicity 2 and 2 with multiplicity 1. (a) Find the generatingfunction of the sequence{a.000 . The relation also has a part non-homogeneous.

Explain any nine 10 attributesof softwarequality. help of an example. 70 (b) (c) Define the term Sot'twareQuality.T.O. I is compulsory. 70 (d) MC5-034 P. l. Attempt any three questionsfrom the rest. Also. What are CASE tools ? Explainthe variouscategories of CASE tools. depictthe positioningof CASE with the tools in a SoftwareApplicationdevelopment. (a) with the five areasassociated Explainthe key process 10 levelsof CapabilityMaturity Model (CMM). 2006 ENGINEERING MCS-034 SOFTWARE : Time: 3 hours Nofe : MaximumMarks: 700 Question no. on What is the relationship which estimationmodels are based? Explain the COCOMO model in detail. . with ihe hetp of an example.MCA (Revised) Term-End Examination June.

and explain. 12 Explain the factors that affect the task set for a project. CBSE 4. 1 0 Define Software Project Management. explain the different sectionsof an SRS document. Explain the process of making changesto a Baseline.Explain any four elementsof it. 13 (b) 3. With the help of a suitable example. (a) Define Bqseline. with the help of a diagram.000 . (b) 5. (a) (b) MCS-034 8.and illustrate them using an example. (a) Write the outline of Software Requirement Specifications(SRS). 12 Draw. a risk analysis table. 10 What is SoJtware Project Verification ? Write all the test case selection guidelinesfor Boundary Value Analysis.2. What is the objectiveof data design? What are the attributes that include the description of different data items ? Give an exampledata item indicatingits attributes. (a) 8 (b) Write any seven challenges faced by (ComponentBasedSoftwareEngineering).

2005 and a BalanceSheet as on that date : Rs.000 cash Sundrydebtors 600 lt"yttlol . 2006 AND FINANCIAL MCS-035 : ACCOUNTING MANAGEMENT T i m e: 3 h o u r s Note : Msximum Mqrks : 100 Question 7 is compulsory. 10.800 Cr.000 MCS-035 P. questions Jrom the remaining From the followingTrial Balance.200 30 l.prepare a Trading Account.000 1.O. Profit and LossAccount for the year ended 37. 1. . Sales Discount on purchases 6. Investments Plant and Machinery Rs.500 Capital for bad debts 1. (a) ' Dr. Attempt any three questions.T.72.500 15.MCA (Revised) Term-End Examination June. 75.

500 600 60 1. 6.600 Bills payable State Bank 1.500 9. 28. stock Wages Railway charges Purchases Return inward Income tax Insurance Discount on sales Repairs to plant Travelling expense Rent paid Interest on overdraft Drawings Advance (Dr) Rs.000 300 150 1.000 MCS-035 .500 48O 1. Cr.2OO 1.500 A/c 36.990 3.500 2.Dr.500 I.800 Sunlw creditors Rs.

The order point.50 per unit when bought in quantitiesand the carrying cost is estimatedto be 20o/o of average inventory investment on annual basis. 10. (iii) Rent is payable@ Rs. Wagesoutstanding 900.200 valves is desired. 18. (vii) Intereston capitalat 5%o p. The valvescost Rs. (b) Shree Pipes Ltd. 800 and adjust the provisionsfor doubtfuldebtsat 5%. 1. 4. (vi) Depreciateplant at 10% p. Rs. (iv) Commission earnedbut not received Rs. usesabout 75. It takes45 dayslo receivedelivery from the date of an order and a safety stock of 3. 500.500.50 each insteadof Rs.a.a. (iii) The most economical order quantity if the valvescost Rs. You are required to determine: 10 (i) (ii) The most economical order quantity and frequencyof orders. (viii) The proprietor introducedan extra Rs. (ix) Prepaidinsurance amountedto Rs. 1. The cost to place an order and processthe deliveryis Rs. 1'50 each.O . 60 per month.000. (v) Write off bad debts Rs.T.Adjustments : (i) (ii) ClosingstockRs.000 valvesper year and the usageis fairly cohstantat 6250 per month. 1. MCS:035 P.000 capitalon 1tt December.

20 What is treasury management ? What are the main functions and focus areas of the treasurydepartment ? 20 6. (b) 10 4. and elaborateon the problemsand cost associated with it.giving suitableexamplesfor each : (i) (ii) Businessentity Money measurement (iii) Continuity (iv) Cost 3. Highlight the main componentsof a credit policy.2. Briefly discussthe different credit policy variablesgiving examples of each. MCS-035 8.000 . (a) Explain the concept of agency relationship. 10 Briefly explain the various evaluationcriteria used for evaluating capital projects. Explain the meaning and significanceof the following 20 accountingconcepts. What are the various sourcesof working capital ? Explain giving suitableexamples. 20 5.

- How Android Draws Views _ Android Developers
- MCQs_CS301_For_Fnal_2010
- licenta
- A6-R3
- DC08_sol
- Short Questions on DS
- mcq
- MCAREVISEDSYLLABUSF09
- DS Basic
- UIUC Final 3.1
- ds ppt
- DS
- binary search tree
- Implementing Data Structures Binary Trees and Hash Tables
- Algorithms 1
- POD_omENa
- ds unit 2.ppt
- Csi 2120 Midterm Cheat Sheet
- iterlevel2
- Trees
- R07A1EC01-CPROGRAMMINGANDDATASTRUCTURES
- Ancestor queries
- iterlevel
- 1-slide
- Noise Removal Efficient Web Data Mining
- 1 dmee
- 131352-LM
- complete tress
- DAT-4
- Computer Notes - Data Structures - 26

- A Survey on Connected Target Coverage Algorithms in WSN
- null
- Novel Approach for Mining E-Commerce Feedback Comments Using Comm Trust Data Mining Algorithm
- AUTONOMOUS SURFACE CLEANING ROBOT EAMBEDED WITH AT89S52
- ClassMate - The Academic Assistant
- Prediction of changes in facial structure in anaplasty using Kinect
- The benefits of collaboration in TOPdesk
- A Study on CRAN R and MRAN R Interpreters
- Pi_Llution Monitoring Using Raspberry Pi
- tmp5DAF.tmp
- Supply Chain and Value Chain Management for Sugar Factory
- MOUSE CONTROL USING COLOR BANDS
- GSTV 2015-16 CPNI Procedures.pdf
- Ohio-Edison-Co-Trade-Ally-Sign-up-Form
- Identification and Prevention of Masquerade Attack using DDSGA Algorithm
- Tips and Tricks
- Ministry of Interior Request
- Clustering and Summarization of Tweet Streams
- Image Processing Techniques For Quality Checking In Food Industry
- Analytical Automation using IOT
- Web Page Pattern Prediction Model Based on Dynamic Apriori Algorithm
- null
- Optimization of Routes for Vehicles on Google Map
- Copy Move Image Forgery Detection using Pseudo Zernike Moment for Better Detection Accuracy
- Archiving the Web Guide
- zen.digital Announces BuzzJS 2.0 Conference for January 27th, 2017
- Liveness Detection for Biometric System using Image Quality Assessment

Sign up to vote on this title

UsefulNot usefulClose Dialog## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Close Dialog## This title now requires a credit

Use one of your book credits to continue reading from where you left off, or restart the preview.

Loading