Professional Documents
Culture Documents
f ( x)dx 0.5
0
K
3 x 2 dx 0.5
0
k
x3
3 0.5
3 0
K=0.7937
2. If X is uniformly distributed in ( , ) .find the pdf of Y=tanX.
2 2
Nov./Dec. 2010
Ans:
Given, Y = tanX.
0, x 0
3. TheCDF of a continuous random variable is given by F ( x )
x ,find the PDF
1 e 5 ,0 x
and mean of X.
Nov./Dec. 2011 April / May.2011
Ans:
0, x 0
Given, F ( x )
x
1 e 5 ,0 x
0, x 0
F ( x)
x \
1 e 5 ,0 x
x
x
Pdf f(x) = d F ( x) d 1 e 5 1 e 5
dx dx 5
x
1
E(X) = xf ( x)dx x e 5 dx 5
0 0
5
4. Establish the memory less property of the exponential distribution.
April / May.2011
Ans:
Statement:-
If X is exponential distributed, then P X s t X s P X t , s, t 0
Proof:- P X K e x dx
k
e x dx
k
e x
k
e k ..........................(1)
P X s t.and . X s
P X s t X s
P X s
P X s t.
P X s
by (1)
e s t
s
e
t
e
P X t
Hence P X s t X s P X t .The converse of this result is also true.
(ie ) P X s t X s P X t Then X follows an exponential distribution.
x ,1 x 1
5. Test whether F ( x) can be the probability density function of a continuous
0, otherwise
random variable.
Nov./Dec. 2014 April / May 2015
Ans:
Toprove f ( x )dx 1
L.H .S .
1 0 1
f ( x )dx
1
x dx 1
xdx xdx
0
0 1
x x 2 2
f ( x )dx
1 2 0
2
f ( x )dx 1
f ( x )dx R.H .S
Ans:
4
(ii ) p ( X 4) f ( x)dx
(i) f ( x)dx 1 2
4 1
5 p ( X 4) (1 x 2 ) dx
(1 x )dx 1
2
2
2 24
4
1 x3
5
x3
x 1 p ( X 4) x
3 2 24 3 2
1 31
p ( X 4)
42 63
The moment generating function of a random variable X is given by M (t ) e3( e 1) ,what is
t
P(X=0).
Nov./Dec. 2012
n
2
8.FindC,if p( X n ) C : n 1,2,...
3
May/June.2012
Ans:
p ( X n) 1
n
2
C 3
n 1
1
2 2 2 2 3
C ........ 1
3 3 3
2 2
1
C 1 ........ 1
3 3
1
2 2
C 1 . 1
3 3
1
C
2
9. If the probability that a target is destroyed on any7 one shot is 0.5 find the probability that
it would be
Destroyed on 6th attempt. Nov./Dec. 2012
Ans:
Given: p = 0.5:
q = 1-0.5
= 0.5
p( X r ) q r 1 p
1
p( X 6) q 5 p (0.5) 5 .(0.5)
64
10.Define random variable.
Nov./Dec. 2013
Ans:
A real valued function defined on the outcome of a probability experiment is called a
random variable.
11. Define geometric distribution.
Nov./Dec. 2013
Ans:
A random variable X is said to follow a geometric distribution with parameters p if its
x 1 q x 1 p, x 1,2,.....
probability mass function is given by P( X x) (1 p) p X is
0, otherwise
called a geometric random variable.
0, x 1
1
( x 1),1 x 3
12.A random variable X has cdf F ( x) 2 find the pdf of X and the expected
1, x 3
value of x. May/June.2013
Ans:
0, x 1
1
( x 1),1 x 3
F ( x) 2
1, x 3
0, x 1
1
,1 x 3
pdf , f ( x) F ( x) F ( x) 2
d
dx 1, x 3
1 3
E(X) = xf ( x)dx xf ( x)dx xf ( x)dx xf ( x)dx
0 0 1 3
3
1
0 x dx 0
1
2
2
c
14. Find c if a continuous random variable X has the density function f ( x ) , -
1 x
2
f ( x)dx 1
c
1 x
2
dx 1
1
c dx 1
1 x
2
2c tan 1 x 0 1
1
c
15. Find the moment generating function of Poisson distribution.
Nov./Dec. 2014
Ans:
Given, the moment generating function of Poisson distribution
16.X and Y are independent random variables with variance 2 and 3 .find the variance of
3x+4Y.
May/June.2014
Ans:
Given, var(X) =2
Var(Y) =3
Var(3X+4Y)=32Var(X)+42Var(Y)
=66
𝑒 −𝑥 , 𝑥 ≥ 0
17. Show that the function 𝑓(𝑥 ) = { is a probability density function of a random
0,𝑥 < 0
variable 𝑋. April/May.2015
Ans:
∞
∫ 𝑓(𝑥)𝑑𝑥 = 1
−∞
∞ 𝑒 −𝑥 ∞
∫0 𝑒 −𝑥 𝑑𝑥 = [ −1 ] = −( 𝑒 −∞ − 𝑒 0 ) = 1
0
18. The mean and variance of a binomial distribution are and . Determine the distribution.
Ans:
April/May.2015
𝑥 𝑛−𝑥
𝑝(𝑥 ) = 𝑛𝐶𝑋 𝑝 𝑞
mean(𝑛𝑝) = 5
Variance (𝑛𝑝𝑞 ) = 4
𝑛𝑝𝑞 4 4
𝑞= = ,𝑝 =1−𝑞 = 1−5
𝑛𝑝 5
𝑛𝑝 = 5implies𝑛 = 25
1 𝑥 4 25−𝑥
𝑝(𝑥 ) = 25𝐶𝑋 ( ) ( ) , 𝑥 = 0,1,2 …
5 5
19. Assume that 𝑋 is a continuous random variable with the probability density function
3
(2𝑥 − 𝑥 2 ), 0 < 𝑥 < 2
𝑓 ( 𝑥 ) = {4 . Find 𝑃(𝑋 > 1) .
0 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Nov/Dec.2015
Ans:
2
23 3 𝑥3
𝑃(𝑥 > 1) = ∫1 4 (2𝑥 − 𝑥 2 )𝑑𝑥 = 4 [𝑥 2 − ]
3 1
3 8 1 1
= [(4 − ) − (1 − )] =
4 3 3 2
20. A random variable 𝑋 is uniformly distributed between 3 𝑎𝑛𝑑 15. Find the variance of 𝑋.
Ans:
Nov/Dec.2015
1
𝑉𝑎𝑟(𝑋) = 12 [𝑏 − 𝑎]2 ; 𝑎 = 3, 𝑏 = 15
1
= [15 − 3]2 = 12
12
𝐾𝑒 −𝑥 , 𝑥 ≥ 0
21.If𝑓 (𝑥 ) = { is the PDF of a random variable 𝑋, the n find the value of 𝐾.
0 ,𝑥 < 0
Ans:
May/Jun.2016
∞
∫ 𝑘𝑒 −𝑥 𝑑𝑥 = 1
0
−𝑥 ∞
𝑒
𝑘[ ] = 𝑘 – ( 𝑒 −∞ − 𝑒 0 ) = 1
−1 0
𝑘=1
22. Write the formula for moment generating function of Poisson distribution.
Nov./Dec. 2017
Ans:
Given, the moment generating function of Poisson distribution
PART B
x2 x2
Ans: F X 0, x 0 : , 0 x 1: 2 x 1,1 x 2 :1, x 2
2 2
(ii) P0.2 x 1.2 Ans:
P X 0.66
(iii) P0.5 x 1.5 / x 1 Ans: P X 0.75
April/May2011
03. The probability function of an infinite discrete distribution is given by
P X j
1
, j 1, 2,3, .. . Find
2 j
(i) Mean of X Ans: E X 2
Ans: P X
1
(ii) P( X is even ) and
3
Ans: P X
1
(iii) P( X is divisible by 3 )
7
Nov./Dec. 2011
k
, x
04. A continuous random variable X has the PDF f ( x ) 1 x 2 . Find
0 , otherwise
1
(i) The value of ‘k’ Ans: k
1
(ii) Distribution function of X Ans: F X tan 1 x
2
(iii) P X 0 Ans: P X 0.5
Nov./Dec. 2011
1
, x 1, 2, 3,...
05. Show that the probability function P X x x x 1 E X does not exist.
0 ,
otherwise
[This is divergent series. So Mean and Moments do not exists] Nov./Dec. 2012
2𝑥 , 0 ≤ 𝑥 ≤ 𝑏
10. The pdf of a random variable 𝑋 is given by 𝑓 (𝑥 ) = { . For what value of 𝑏
0 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
is 𝑓(𝑥)a valid pdf?
Also find the cdf of the random variable 𝑋 with the above pdf. Nov/Dec.2015
11. If the probability that a target is destroyed on any short is 0.5.What is the probability that
it would be destroyed on 6th attempt? Nov/Dec.2017
12.A car hire firm has 2 cars.The number of demands for a car on each day is distributed as
poisson variate with mean 0.5.Caluculate the proportion of days on which (1) neither car is
used (2)some demand is refused.
April/May2017.
May/June.2013
2 1 x , 0 x 1
14. If the probability density of X is given by f ( x ) . Find its rth
0 , otherwise
moment. Hence evaluate E 2 X 12 .
Ans: '
2
, E 2 X 12 3
r r 1r 2
Nov./Dec. 2012
2e 2 x , x 0
15. A random variable X has the pdf f ( x ) obtain the mgf and first four
0, x 0
moments about the origin.Find the mean and variance of the same. Nov./Dec.
2014
x
x ,x 0
16. Find the MGF of a random variable X having the pdf f ( x ) 2
4e
0, elsewhere .Also
deduse the first four moments about the origin.
May/June.2013 April/May2011
03. Find the nth moment about mean of normal distribution. Nov./Dec. 2014
04. State and prove memoryless property of Geometric distribution. Nov./Dec. 2015
01. Find moment generating function of the Binomial distribution. Hence find its Mean and
Variance.
Ans: M X t q pe t ,
n
E[ X ] np, V [ X ] npq
02.Describe binomial B(n,p) distribution & obtain the mgf.hence compute (i) first four
moments and (ii)the recursion relation for the central moments.
May/June.2014
03. A coin is biased so that a head is twice as likely to appear as a tall. If the coin is tossed 6
times, find the probabilities of getting (1) exactly 2 heads, (2) atleast 3 heads, (3) atmost 4
heads. May/June.2016
02. Derive Poisson distribution from the binomial distribution. Nov./Dec. 2014
Nov./Dec. 2013
03. Suppose that a customer arrive at a bank according to a poisson process with a mean rate
of 3 per minute.find the probability that during a time interval of 2 min.(1)exactly 4
customers arrive and (2)more than 4 customers arrive.
Nov./Dec. 2013
04.An office has four phone lines .each is busy about 10% of the time.Assume that the phone
lines act independently(1)what is the probability that all four phones are busy?(2)what is the
probability that atleast two of them are busy?
May/June.2013
01. If the probability that an applicant for a driver’s license will pass the road test on any
given trial is 0.8, what is the probability that he will finally pass the test
(i) On the fourth trial and Ans: P( x 4) 0.0064
(ii) In less than 4 trials. Ans: P( x 4) 0.992
April/May2010 April/May2015
01. Find the MGF and hence the mean and variance of the uniform distribution.
e bt e at ba (b a) 2
M X t , mean , var iance
Ans: t (b a) 2 12
01. Find the MGF of the two parameter exponential distribution whose density function is
x a
given by f ( x ) e , x a and hence find the mean and variance.
e a e a
Ans: M X t , EX
t
April/May2010
02. The time in hours required to repair a machine is exponentially distributed with parameter
1 2 .
(i) What is the probability that the repair time exceeds 2 hours?Ans:
P X 2 0.3679
(ii) What is the conditional probability that a repair takes atleast 10 hours given that its
duration exceeds 9 hours? Ans: P X 10| X 9 P X 1 0.6065
May/June.2012
e x , for0 x
f ( x)
06.The random variable X has exponential distribution with 0, otherwise Find
the density function of the variable given by (1)Y=3X+5 (2)Y=X 2
Nov./Dec. 2012
07. The length of time a person speaks over phone follows exponential distribution with
mean 6 mins. What is the probability that the person will talk for (1) more than 8 mins, (2)
between 4 and 8 mins.
May/June.2016
08.Suppose X has an exponential distribution with mean equal to 10.Determine the value of x
such that 𝑝(𝑋 < 𝑥 ) = 0.95. April/May2017
PROBLEM RELATED TO GAMMA DISTRIBUTIONS
01. Define Gamma distribution and find its mean and variance of the same.
Ans: mean , var iance 2
Nov./Dec. 2014, Nov./Dec. 2013May/June.2013,Nov./Dec. 2017
02. The daily consumption of milk in excess of 20,000 liters is approximately distributed as
1
gamma random variable with parameter k 2, . If the city has a daily stock of
10,000
30,000 liters on a given day, find the probability that the stock is insufficient.
Ans: px 10,000 0.7357
03. Find moment generating function of the Gamma distribution. Hence find its Mean and
Variance.
Ans: M X t 1 t
, mean
, var iance 2
04. Define the mgf of a random variable? Derive the mgf,mean,variance and the first four
moments of a gamma distribution.
May/June.2014
05. In a certain city, the daily consumption of electric power in millions of Kilowatt – hours
can be considered as a random variable following gamma distribution with parameters 𝜆 =
1
and 𝛼 = 3. If the power plant in this city has a daily capacity of 12 million Kilowatt hours,
2
what is the probability that this supply of power will be insufficient on any given day?
May/June.2016
01. Assume that the radiation of a person’s oxygen consumption during a period of
Transcendental Meditation (T.M) is a continuous random variable X normally distributed
with mean 37.6 cc/min and S.D 4.6 cc/min. determine the probability that during a period
of T.M a person’s oxygen consumption will be reduced by
(i) At least 44.5 cc/min Ans: P X 44.5 0.0668
(ii) At most 35.0 cc/min Ans: P X 35 0.2877
(iii) Anywhere from 30.0 to 40.0 cc/min. Ans: P30 X 40 0.65
Nov./Dec. 2012
02. Given that X is distributed normally, if P X 45 0.31 and P X 64 0.08 find the
mean and standard deviation of the distribution. Ans: 50, 10
May/June.2012
01. If X is uniformly distributed in (-1,1), then find the probability density function of
X
Y sin .
2
h y
1
; 1 y 1
y 2
Ans: 1 y
April/May2011
02. If X is uniform random variable in the interval(−2, 2). Find the PDF of Y X and EY
hY y Ey 1
1
,
Ans: 2 Nov./Dec. 2011
UNIT 2
PART –A
1. Let X and Y be continuous random variable with joint probability density function
x( x y )
f xy ( x, y ) ,0 x 2, x y x
8
y
and f xy ( x, y ) 0 elsewhere find f y ( ) Nov./Dec. 2010 April / May.2011
x
x
Ans:
x( x y )
Given, f xy ( x, y ) ,0 x 2, x y x
8
x( x y )
x x
x3
f ( x)
x
f ( x, y )dx
x
8
dx
4
x( x y )
f ( x, y ) 8 1
f Y ( y / x) 3
3 ( x y)
X
f ( x) x 2x
4
Ans:
If X , X , X , ....... X the random variables have the same distribution with mean and
1 2 3 n
variance 2 then the R.V S X X X ....... X , follows a normal distribution
n 1 2 3 n
with mean n and variance n 2 , i.e S n , n 2
n
3.Find the value of k,if f(x,y)=k(1-x)(1-y) in 0<x,y<1 and f(x ,y)=0 otherwise is to be the
joint density function.
Ans:
f ( x, y)dxdy 1
1 1
k (1 x)(1 y)dxdy 1
0 0
1 1
k (1 x)dx (1 y )dy 1
0 0
1 1
k 1
2 2
k4
4. The joint probability density function of a two dimensional R.V x, y is given by
f x, y k 6 x y ;
To find K:-
f x, y dxdy 1
x y
2 4
k 6 x y dxdy 1
0 2
4
2
y2
k 6 y xy dx 1
0
2 2
2
16 4
k 24 4 x 12 2 x dx 1
0
2 2
2
k 6 2 x dx 1
0
k 6x 2x
2
2
2
0
1
k 12 4 1
8k 1
1
k
8
e ( x y ) , x 0, y 0
5. If the point of (X,Y) is f xy ( x, y ) ,check whether X and Y are
0, otherwise
independent.
Nov./Dec. 2011
Ans:
e ( x y ) , x 0, y 0
Given, f xy ( x, y)
0, otherwise
f ( x) e ( x y ) dy e x
0
f ( y ) e ( x y ) dx e y
0
f ( x ) f ( y ) e x e y e ( x y ) f ( x, y )
Ans:
Since both the regression equation pass thro. (x,y)
5x-y = 22………….(1)
64x-45y =24……….(2)
From (1) and (2)
X=6 and y=8.
7. Find the acute angle between the two lines of regression assuming the two lines off
regression.
Ans:
6
( x y 2 ),0 x 1,0 y 1
8. Find the marginal density function off X and Y if f ( x, y ) 5
0, otherwise
Nov./Dec. 2012
Ans:
6 6 1
f ( x) f ( x, y )dy ( x y 2 )dy ( x )
0 0
5 5 3
6 6 1
f ( y ) f ( x, y )dx ( x y 2 )dx ( y 2 )
0 0
5 5 2
9.Let X and Y be two discrete random variables with joint probability mass unction
1
( 2 x y ), , x 1,2andy 1,2
P( X x, Y y ) 18 .find the marginal probability mass
0, otherwise
function of X and Y.
May/June.2012
Ans:
1
( 2 x y ), , x 1,2andy 1,2
Given, P( X x, Y y ) 18
0, otherwise
Y 1 2 Px(X)=Pi*
P(X=1) =7/18
P(X=2) =11/18&
P(Y=1) =8/18
P(Y=2) =10/18
10. The joint pdf of the random variables (x,y) is given by f ( x, y ) kxye( x y2 )
2
,x>0,y>0.find
the value of k
Nov./Dec. 2013
Ans:
Given f x, y kxye x y2 x 0. y 0
2
To find K:
f x, y dxdy 1
X Y
dxdy 1
Kxye
x2 y2
x 0 y 0
K xyex y2 dxdy 1
2
0 0
2
K xe x 1 e t dt dx 1
2
0 0
K xe x 1 e dx 1
2 t
2 1 0
0
xe x 0 1dx 1
2
2
K
0
2
x2
K xe dx 1
0
4
K e t dt 1
0
K
4
e 1 1t
K e 1 t
4 1 0
K 1; K 4
4
Ans:
(i) If X and Y are independent the COV(X,Y) =0 then X and Y are correlated.
(ii) (ii) If COV(X,Y)=0 then X and Y are uncorrelated and Y need not be
independent.
12. The joint pmf of the random variables (x,y) is given by
kxy, x 1,2,3 : y 1,2,3
p X ,Y ( x, y ) ,find the value of k. May/June.2013
0, otherwise
Ans:
Given,
1 2 3
1 K 2k 3k
2 2k 4k 6k
3 3k 6k 9k
Total probability=1
36k=1
K=1/36
x2
13. The joint pdf of the random variables (x,y) is given by f xy ( x, y ) xy 2
8
,0≤x≤2,0≤y≤1.find P(X<y). May/June.2013
Ans:
x2
Given, f xy ( x, y) xy 2
8
1 y
x2
p( X Y ) xy 2 dxdy
0 0
8
y
1
2 x2 1
y4 y3 53
p( X Y ) xy dy dy
0
8 0 0
2 24 480
14. Define the joint pmf of a two dimensional discrete random variable.
Nov./Dec. 2014
Ans:
P( X x, Y y ) P( x, y ) provided
p( x, y) 1,0 p( x, y) 1
x y
15. State the basic properties of joint distribution of (x,y) when X and Y are random
variables.May/June.2014
Ans:
1.F (, ) 1
2.F (,) 0, F (, y ) 0, F ( x,) 0,
3.F ( x 2 , y 2 ) F ( x1 , y 2 ) F ( x1 , y 2 ) F ( x 2 , y1 ) P( x1 X x 2 ; y1 Y y 2
2+𝑦 2)
16. Find the value of 𝑘, if 𝑓 (𝑥, 𝑦) = 𝑘𝑥𝑦𝑒 −(𝑥 ∶ 𝑥 ≥ 0 , 𝑦 ≥ 0 is to be a joint probability
density function.
∞ ∞ 2+𝑦 2)
Ans:𝑘 ∫0 ∫0 𝑥𝑦𝑒 −(𝑥 𝑑𝑥𝑑𝑦 = 1 April. / May 2015
∞ 2 ∞ 2
𝑘[∫0 𝑥𝑒 −𝑥 ][∫0 𝑦𝑒 −𝑦 ] = 1 _______________ (1)
∞
∞ 𝑑𝑡 1 𝑒 −𝑡 1
∫0 𝑒 −𝑡 2
= 2 [ −1 ] = 2
0
11
(1) ⇒ 𝑘 2 2 = 1 ⇒ 𝑘 = 4
18. Let (𝑋, 𝑌) be a two dimensional random variable. Define covariance of (𝑋, 𝑌). If 𝑋 and 𝑌
are independent,
𝐶𝑜𝑣 (𝑋, 𝑌) = 0
1
, 0 < 𝑥, 𝑦 < 2
19. If the joint pdf of (𝑋, 𝑌) is 𝑓(𝑥, 𝑦) = {4 . Find 𝑃(𝑋 + 𝑌 ≤ 1) .
0 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
May / June 2016
1 1−𝑦 1
Ans: 𝑃(𝑋 + 𝑌 ≤ 1) = ∫0 ∫0 𝑑𝑥𝑑𝑦
4
1 1−𝑦
= ∫0 [𝑥 ]0 𝑑𝑦
1
1 1 𝑦2 1
∫0 1 − 𝑦 𝑑𝑦 = [𝑦 − ] =
4 2 0 8
20. The regression equations are 3𝑥 + 2𝑦 = 26 𝑎𝑛𝑑 6𝑥 + 𝑦 = 31.Find the means of X and
Y. April/May.2017
Ans:
21. Find k if the joint probability density function of a bivariate r.v.(X,Y) is given by
𝑘(1 − 𝑥 )(1 − 𝑦), 𝑖𝑓 0 < 𝑥 < 1,0 < 𝑦 < 1
𝑓 (𝑥, 𝑦) = { Nov/Dec.2017
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Ans: If f(x,y) is a joint p.d.f then
∞ ∞
∫ ∫ 𝑓 (𝑥, 𝑦)𝑑𝑥 𝑑𝑦 =1
−∞ −∞
1 1
∫ ∫ 𝑘(1 − 𝑥 )(1 − 𝑦)𝑑𝑥 𝑑𝑦 = 1
0 0
1 1
𝑘 ∫ (1 − 𝑥 )𝑑𝑥 ∫ (1 − 𝑦) 𝑑𝑦 = 1
0 0
1 1
𝑘 (1 − − 0) (1 − − 0) =1
2 2
𝑘 = 4.
PART - B
01. If X and Y are independent Poisson random variables with parameters 1 and 2 .
Calculate the conditional distribution of X, given that X + Y = n.
r n r
Ans: PX r / X Y n nc r 1 2
1 2 1 2 April/May2011
April/May2015
04. The joint PDF of the random variable (X, Y) is given by
x 2 y 2
f x, y k x y e
: x 0, y 0 . Find
0
: otherwise
i. Find k Ans: k 4
ii. Find Cov X ,Y Ans: Cov x, y 0
iii. Prove that X and Y are independent
May/June2012
Ans: f ( x)
4x
9
4 x 2 ,1 x 2 & f ( y )
4y 2
9
y 1 , 1 y 2
k 1 x 2 y
: 0 x 1, 0 y 1
f x ,y
0
: otherwise
i. Find the value of ‘k’ Ans: k 6 / 5
April/May2010
16.The joint density of X and Y is given by p x, y k (2 x 3 y ) ,x=0,1,2,y=1,2,3.find the
marginal and
conditional distribution. Nov./Dec.2013 Nov./Dec.2014
1
( ) ( )
17. The joint probability mass function of (𝑋, 𝑌) is given by 𝑝 𝑥, 𝑦 = 72 2𝑥 + 3𝑦 , 𝑥 =
0,1,2and 𝑦 = 1,2,3. Find all the marginal and conditional probability functions of 𝑋and 𝑌.
Nov./Dec.2015
( ) ( ) −(x+y)
18.The joint pdf of X, Y id f x, y = e , x, y ≥ 0. Are X and Y
independent?Nov./Dec.2015
19.The waiting times X and Y of two customers entering a bank at different times are
−𝑥
𝑓 (𝑥 ) = { 𝑒 , 𝑖𝑓 𝑥 > 0 and
assumed to be independent random variables with p.d.f s 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑒 −𝑦 , 𝑖𝑓 𝑦 > 0 𝑋
𝑓(𝑦) = { .Find the joint p.d.f of 𝑈 = 𝑋 + 𝑌, 𝑉 = 𝑋+𝑌. Nov./Dec.2017
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
( )
20. If X and Y are independent random variables with p.d.f s 𝑓 𝑥 =
𝑒 −𝑥 , 𝑖𝑓 𝑥 > 0 𝑒 −𝑦 , 𝑖𝑓 𝑦 > 0
{ and 𝑓(𝑦) = { .Find the joint p.d.f of 𝑉 = 𝑋 + 𝑌, 𝑈 =
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑋
.Check whether U and V are April/May2017
𝑋+𝑌 independent random variables.
24𝑥𝑦; 𝑥 > 0, 𝑦 > 0, 𝑥 + 𝑦 ≤ 1
21.The joint PDF of (X,Y) is given by 𝑓 (𝑥, 𝑦) = { .Find the
0 𝑒𝑙𝑠𝑒𝑤ℎ𝑒𝑟𝑒
conditional mean and variance of Ygiven X. April/May2017
01. The independent variables X and Y have the probability density functions given by
4ax , 0 x 1 4ay , 0 y 1
f x and f y . Find the correlation coefficient
0, otherwise 0, otherwise
between X + Y and X – Y. Ans: r 0
May/June2013
02. The joint probability density function of the two dimensional random variable (X,Y) is
2 x y , 0 x , y 1
f x , y . Find the correlation coefficient between X and Y.
0, otherwise
Ans: r 1 / 11 Nov./Dec.2011
03. Calculate the Correlation coefficient between height of father (x ) and height of son ( y )
65 66 67 67 69 68 70 72
Ans: r 0.6030
67 68 65 68 72 72 69 71
April/May2015
04. If X and Y are uncorrelated random variables with variances 16 and 9. Find the
correlation co efficient between X + Y and X – Y Ans: r 0.28
May/June2012
05. If the independent random variables X and Y have the variances 36 and 16 respectively,
5
find the coefficient of correlation between X+Y and X–Y Ans: r
13
Nov./Dec.2012
1, 1 x 2
01. If X and Y are independent random variables with density function f x
0, otherwise
y
, 2 x4
and f y 6 find the density function of Z = XY. Ans:
0 , otherwise
1
z 2, 2 z 4
6
f z April/May2011
1 8 z , 4 z 8
12
02. If X and Y are independent random variables with probability density functions
f x 4 e 4 x , x 0; f y 2 e 2 y , y 0; respectively
X
i. Find the density function of U and V X Y .
X Y
Ans: f u, v 8 v e 2uvv
ii. Are U and V independent?
iii. What is PU 0.5
Nov./Dec.2012
x y : 0 x, 0 y
03. If the JPDF. of a RV (X, Y) is f x, y
. Find the density function of
0 : otherwise
U X Y
u ,
2
0 u 1
f u
2u u , 1 u 2
2
Ans:
April/May2015May/June2012
x y
04. If X and Y are independent random variables with PDF f x e , x 0 and f y e , y0 .
Find the PDF for X – Y (or)
If X and Y are independent exponential random variables each with parameter 1. Find the PDF
of U = X – Y
f u e u , u 0
1
Ans: 2
Nov./Dec.2011Nov./Dec.2013
x x
1 2 ,x ,x 0
05. If the JPDF is given f x1 , x 2 e 1 2 , find the probability of
0, otherwise
X
Y 1
X X
1 2
Ans: f Y 1
If X and Y are independent continuous random variables, show that the PDF of U = X + Y is
given by hu f v f u v dv
Nov./Dec.2010
06. The random variables 𝑋 and 𝑌 each follow exponential distribution with parameter 1 and
are independent.
Find the pdf of 𝑈 = 𝑋 − 𝑌.Nov./Dec 2015
07. Three balls are drawn at a rando, without replacement fom a box containing 2 white, 3red
and 4 black balls. If 𝑥 denotes the number of white balls drawn and 𝑦 denotes the numbere of
red balls drawn, find the joint probability distribution of (𝑥, 𝑦). May. /June 2016
1 2 3 n n
S X X X ....... X , where n 75 , find P 120 S 160 using CLT.
n
Ans: p120 S n 160 0.7868 May/June2012
UNIT 3
(RANDOM PROCESSES)
PART –A
1. Consider the random process X (t ) cos(t ) where a random variable with density
function is
1
f ( ) , Check whether or not the process is wide sense stationary.
2 2 .
Nov./Dec. 2010
Ans:
Given, X (t ) cos(t ) , f ( ) 1 ,
2 2
E ( X (t )) X (t ) f ( )d
2
1
cos(t ) d
2
2
cos t
= not a constant.
The process is not wide sense stationary .
and ij
Pij 0 P 1 for all i, j
5 1
8. If the initial state probability distribution of a Markov chain is P ( 0 ) and the
6 6
transition probability
0 1
Matrix is 1 1 .find the probability distribution of the chain after 2 steps.
2 2
May/June.2012
Ans:
5 1
P (0)
Given 6 6
0 1
p 1 1
2 2
Let
5 1 0 1 1 11
p (1) p ( 0) p 1 1
6 6 12 12
2 2
1 11 10 1
1
11 13
p ( 2) p (1) p
12 12 2 2 24 24
9. Prove that a first order stationary process has a constant mean. April / May.2011
Ans:
Consider a random process X(t) at two different instants t1 and t2.
E ( X (t1 ) xf
x ( x, t1) dx
E ( X (t 2 ) xf
x ( x, t 2) dx
Let t2=t1+C
E ( X (t 2 ) xf
x ( x, t1 c)dx
E ( X (t 2 ) xf
x ( x , t1 ) Its value must be a constant.
E ( X (t 2 ) E ( X (t1 )
n
P ( X (t ) n ) [ P( X
r 0
1 (t ) r ][ P ( X 2 (t ) n r ]
n
e 1t (1 (t )) r e 2t (2 (t )) n r
r 0 r! ( n r )!
e ( 1 2 ) n
n! (1 (t )) r (2 (t )) n r
n!
r 0 r! ( n r )!
e ( 1 2 )
(1t 2 t ) n
n!
X (t) =X1(t)+X2(t) is a Poisson distribution with parameter λ 1+ λ2
If the future behavior of a process depends only the present state but not on past,
then the process is called a Markov process.
i. e A random process is said to be a Markov Process if for any
t1 t 2 t 3 ........ t n .
PX t n x n | X t n 1 x n 1, X t n 2 x n 2 ............. X t1 x1,
PX t n xn | X t n1 xn1
Ans: If a random process is stationary to all order then the random process is said to be strict
sense stationary
process.
Ans: A random process is called stationary to order one, if its first order density function
does not change with a shift in time origin.
Ans :Theprocess whose future behavior cannot be accurately predicted from its past behavior
(except the
current or present behavior) and which involves random chance or probability is called
Markov Process.
Behavior of a business or economy, flow of traffic, progress of an epidemic, all are examples
of Markov processes.
20.If the customers arrive at a bank according to a poisson process with mean rate 2 per
minute,find the probability that during a 1-minute interval no customer arrives,
PART –B
02. If X (t ) A cos t B sin t , where A and B are two independent normal random variables
2 2
with EA 0 EB, E A E B and is a constant, prove that X (t ) is a strict
2
01. Show that the random process X (t ) A sin( t ) is WSS, where A and are constants
and is uniformly distributed in 0, 2
E[ X (t )] 0 const
Ans: A2 April / May .2010
R XX (t , t ) cos
2
02. If X (r ) Y cos t Z sin t for all‘t’ where Y and Z are independent binary random
variables, each of which assumes the values – 1 and 2 with the probabilities 2/3 and 1/3
respectively, prove that X (r ) is wide sense stationary.
E[ X (t )] 0 const
Ans:
R XX (t , t ) 2 cos
April / May.2011 May/June.2013
03. Show that the random process X (t ) A cos(0 t ) is WSS process where A, and 0 are
constants and is uniformly distributed random variable in 0, 2 .
E[ X (t )] 0 const
Ans: A2
R XX (t , t ) cos 0
2
Nov./Dec. 2011
04. If X t is a WSS process with auto correlation R A e , determine the second order
moment of the random variable X 8 X 5 .
Ans: V U 2 A 1 e
3
May/June.2012
05.Mention any three properties each of auto correlation and of cross correlation functions of
a WSS.
May/June.2013
06.If the two random variables Ar and Br are uncorrelated with zero mean and
n
E ( A ) E ( B ) ,show that the process X (t ) ( Ar cos t Br sin t ) is WSS.what are
2
r
2
r
2
r
r 1
07.Examine whether the random process {𝑋(𝑡)} = 𝐴 cos(𝑤𝑡 + 𝜃)is a wide sense stationary if
Aand w are constants and 𝜃 is uniformly distributed random variable in (0,2𝜋)
Nov./Dec. 2017
PROBEM RELATED TO ERGODIC PROCESS
01. The random binary transmission process X (t ) is a WSS process with zero mean and
Auto correlation function R 1 , where T is a constant. Find the mean and variance
T
of the time average of X (t ) over 0, T . Is X (t ) mean Ergodic.
Ans: lim Ver[ X T ] 2 0
T 3
April / May .2010
02. Given that WSS random process X (t ) 10 cos(0 t ) where is uniformly distributed
over , . Prove that the process X (t ) is correlation Ergodic?
R( ) 50 cos( 0 )
Ans:
lim Z T 50 cos( 0 )
T
03. A random process has sample functions of the form X ( t ) A cos( t ) , where is
constant, A is a random variable with mean zero and variance one and is a random
variable that is uniformly distributed between 0 and 2 . Assume that the random variables
A and are independent. Is X t a mean – Ergodic process?
April / May.2011
PROBLEM RELATED TO MARKOV PROCESS
01. The transition probability matrix of a Markov chain X n , three states 1, 2, and 3 is
0.1 0.5 0.4
P 0.6 0.2 0.2 and the initial distribution is P 0 0.7 0.2 0.1. Find
0.3 0.4 0.3
1. PX 2 3 And Ans:
PX 2 3 0.279
2. PX 3 2, X 2 3, X 1 3, X 0 2 Ans:
PX 3 2, X 2 3, X 1 3, X 0 2 0.0048
03. Suppose that customers arrive at a bank according to a Poisson process with mean rate of
2 per minute. Find the probability that the interval between 2 consecutive arrival is
i. More than 1 minute
Ans: PT 1 0.135
ii. Between 1 minute and 2 minute and
Ans: P1 T 2 0.117
iii. 4 minute or less.
Ans: PT 4 0.999
May/June.2012
04. Assume that the number of messages input to a communication channel in an interval of
duration t seconds, is a Poisson Process with mean rate 0.3. compute
i. The probability that exactly 3 messages will arrive during 10 second interval.
Ans:
PX ( 10 ) 3 0.0747
ii. The probability that the number of message arrivals in an interval of duration 5
seconds is between 3 and 7.
7
Ans: P X ( 5 ) i 0.1910
i 3
05.Prove that the interval between two succeve occurrences of a poisson process with
1
parameter has an exponential distribution with mean
April / May.2011
06.Thereare 2 whitemarbles in Urn A and 3 red marbles in Urn B.At each step of the process,
a marble is selected from each urn and the 2 marbles selected are interchanged. The state of
the related markov chain is the number of red marbles in urn A after the interchange. What is
the probability that there are 2 red marbles in urn A after 3 steps? In the long run, what is the
probability that there are 2 red marbles in urn A?
April/May2015
07.A radioactive source emits particles at a rate of 5 per minute in accordance with
Poissonprocess.Each particle emitted has a probability 0.6 being recorded.Find the
probability that 10 particles are recorded in 4 minute period.
April/May2015
08. Suppose that customers arrive at a bank according to a Poisson process with mean rate of
3 per minute. Find the probability that during the interval of 3 mins
i. Exactly four customers arrive.
ii. Greater than 4 customers arrive
iii. Fewer than 4 customers arrive. Nov./Dec. 2015
09. A man either drives a car or catches a train to go to office each day. He never goes two
days ina row by train.
But he drives one day, then the next day is just as likely to drive again as he is to travel by
train. Now suppose
that on the first day of the week, the man tossed a fair dive and drove to work if and only if a
6 appeared.
Find the probability that he takes a train on the fourth day and the probability that he
drives to work on the
fifth day. Nov./Dec. 2015
10. Prove that the difference of two independent Poisson processes is not a Poisson process.
May/June.2016
11.A fisherman catches a fish at a poisson rate of 2 per hour from a large lake with lots of
fish.If he starts at 10.00 a.m.What is the probability that he catches one fish by 10.00 a.m and
three fishes by noon?
April / May.2017
01. Prove that a random telegraph signal process Y t X t is a Wide sense Stationary
Process when is a random variable which is independent of X t , assumes values – 1
2 t t
and 1 with equal probability and , R XX t1 ,t 2 e 1 2
02. Define a semi random telegraph signal process and prove that it is evolutionary
May/June.2013
03. Define a random telegraph signal process and prove that it is WSS.
Nov./Dec. 2013 Nov./Dec. 2014 April / May.2015
01. Define semi random telegraph signal process and prove that it is an evolutionary process.
Nov./Dec. 2015
02. Prove that a random telegraph signal process 𝑦(𝑡) = 𝛼𝑥(𝑡) is a WSS process, where 𝛼 is
a random variable which is independent of 𝑥(𝑡), assumes values −1 and 1 with equal
probability and 𝑅𝑥𝑥 (𝑡1 , 𝑡2 ) = 𝑒 −2𝜆|𝑡1 −𝑡2 | .
03.Define random telegraph signal process and prove that it is an wide sense stationarys.
Nov./Dec. 2017
( )
04. Prove that a random telegraph signal process 𝑦 𝑡 = 𝛼𝑥(𝑡) is a WSS process
April / May.2017
UNIT 4
PART –A
1. Find the variance of the stationary process X(t) whose auto correlation function is given by
2
Rxx ( ) 2 4e Nov./Dec. 2010 Nov./Dec. 2012
Ans:
2
Given, Rxx ( ) 2 4e
2 2
( X ) lim Rxx ( ) lim 2 4e 2
Mean =2
E ( X 2 (t )) Rxx (0) 2 2
var( X (t )) E ( X 2 (t )) ( E ( X (t ))) 2 2 2 2 2
2. State any two properties of cross correlation function. Nov./Dec. 2010
Ans:
e
e i d
0
e d e e i d
i
e
0
1 1
1 i 1 i
2
1 2
5. Find the variance of the stationary Ergodic process X(t) whose auto correlation function iis
4
given by Rxx ( ) 25 . Nov./Dec. 2011 May/June.2014
1 6 2
Ans:
R XX E X t X t
R XX E X t X t
put , t p
t p
R XX E X p X p
R XX E X p X p
R XX R XX
Transform of RXX AS
i.e. S XX R eXX
i
d
Ans:
Statement: Let X t be a real WSS process with power spectral density S XX () . Let X T t
be the portion of the process X t in the time interval –T to T.
X t , T t T
X T t
0, otherwise
Let X T be the Fourier transform of X T t then prove that
S XX lim
1
T 2T
E X T
2
9. A random process X(t) is defined by X(t)=Kcoswt ,t>0 where w is a constant and kis
uniformly distributed
Ans:
1
, in (0,2)
f k 2
0, otherwise
X(t)=kcoswt
X (t ) k cos (t )
R XX E X t X t
R XX E k cos t k cos (t
2
R XX cos t cos (t ) k 2 dk
1
0
2
R XX
4
cos t cos (t )
3
10. Define cross correlation function of X(t) and Y(t) .when do you say that they are
independent? May/June.2013
Ans:
The cross correlation function of the two random process X t and Y t is
defined by
RXY t1 , t 2 EX t1 .Y t 2
11. Write any two properties off auto correlation. Nov./Dec. 2014
Ans:
If X t is WSS then
i. RXX is an even function
ii. RXX RXX 0
iii.
R XX 0 E X 2 t
Auto correlation function RXX is periodic function.
12. Define Cross Correlation function and state any two of its properties. May/June.2014
Ans:
The cross correlation function of the two random process X t and Y t is defined by
RXY t1 , t 2 EX t1 .Y t 2
Ans:
4
Given R XX (τ) = 25 + 1+6τ2
4
̅]2 = lim [25 +
We know that lim R XX (τ) = [X ]
τ→∞ 1+6τ2
τ→∞
4
= 25 + ∞ = 25 +0 = 25
32. Prove that the spectral density of a real random process is an even function.Nov./Dec.
2015
∞
Ans: We have 𝑠𝑋𝑋 (𝜔) = ∫−∞ 𝑅𝑋𝑋 (𝜏)𝑒 −𝑖𝜔𝜏 𝑑𝜏
∞
𝑠𝑋𝑋 (−𝜔) = ∫ 𝑅𝑋𝑋 (𝜏)𝑒 𝑖𝜔𝜏 𝑑𝜏
−∞
−∞
𝑠𝑋𝑋 (−𝜔) = ∫ 𝑅𝑋𝑋 (−𝑢)𝑒 𝑖𝜔(−𝑢) (−𝑑𝑢)
∞
−∞
= −∫ 𝑅𝑋𝑋 (−𝑢)𝑒 𝑖𝜔(−𝑢) 𝑑𝑢
∞
∞
= ∫ 𝑅𝑋𝑋 (−𝑢)𝑒 𝑖𝜔(−𝑢) 𝑑𝑢
−∞
∞
= ∫ 𝑅𝑋𝑋 (−𝜏)𝑒 𝑖𝜔(−𝜏) 𝑑𝜏
−∞
= R XY (τ) =L.H.S
01. 34.State any two properties of cross-power density spectrums. April / May .2017
Ans: (1) The spectral density function of a real random process is an even function.
PART - B
02. Find the Auto Correlation function of the periodic time function X t Asin t.
April / May .2010
03. Show that R XX R XX 0 Nov./Dec. 2012
04. Define auto correlation and state the properties of ACF. Nov./Dec. 2012
05. A Stationary random process has an Auto Correlation function and is given by
25 2 36
R XX . Find the mean and variance of the Process.
6.25 2 4
Ans: EX ( t ) 2 & VarX ( t ) 5 April / May .2010
06. If X t and Y t are zero mean and stochastically independent random processes having
Auto Correlation function RXX e and RYY cos 2 respectively. Find the auto
correlation function of
i. W t X t Y t and Z t X t Y t Ans:
RW W e
cos 2
RZZ e
cos 2
RW Z e
cos 2
ii. The cross correlation function of W t and Z t
April / May .2010
07. Find the mean and variance of auto correlation function of the Poisson process.
May/June.2014
08. Prove that the random process X(t) and Y(t) defined by X(t)=Acoswt+Bsinwt and
Y(t)=Bcoswt-ABsinwt are jointly wide sense stationary. May/June.2014
Problem Related to Cross Correlation Functions
01. If X t and Y t are two WSS process, then show that R XY R XX 0.RYY 0.
Nov./Dec. 2010
Ans: S XX
2
4a
e April / May.2011 Nov./Dec. 2014
06. Find the power spectral density of binary transmission process, whose Auto Correlation
1 : T
function is R T Ans:
0, : otherwise
T
4 sin 2
S XX 2
T 2
April / May .2010 Nov./Dec. 2014 April / May .2010
07. Find the power spectral density of binary transmission process, whose Auto Correlation
1 : 1
function is R
0, : otherwise
4 sin 2
2
Ans: S XX
2
Ans: S XX p p
2
Nov./Dec. 2014
2
09. Find power spectral density of WSS process with Auto correlation 𝑅 (𝜏) = 𝑒 −𝑎𝜏 𝑐𝑜𝑠𝜔0 𝜏.
April / May .2017
4
Nov./Dec. 2011 Nov./Dec. 2013
b
a : a
01. If the power spectral density of a WSS process is given by S XX a .
0, : a
Find the Auto correlation of the process.
Ans: R XX sin 2 a / 2
2b
Nov./Dec. 2013 Nov./Dec. 2014,Nov./Dec. 2017
a 2
02. Find the Auto correlation function of the process X t for which the power density
1 : for 1
2
spectrum is given by S XX
0, for 1
2 sin cos sin
Ans: R XX 2 3 April / May .2010,April / May.2017
2 9
03. Given the power spectral density of a continuous process as S XX 4 . Find
5 2 4
the mean square value of the process.
Ans: R XX 0
11
12
Nov./Dec. 2011 April / May .2010
04. The power spectral density function of a zero mean WSS process X (t ) is given by
1, 0
S XX . Find R and show that X (t ) and X (t ) are uncorrelated.
0
0, 0
sin 0
Ans: R XX
April / May .2011
1 − |τ| , if |τ| ≤ 1
05.The autocorrelation function of an ergodic process x(t) is R XX (τ) = { .
0 , Otherwise
Obtain the spectral density of x(t). May/June.2016
06.If{x(t)} and {y(t)} are two random processes with autocorrelation functions R XX (τ)and
R YY (τ) respectively and jointly WSS, then prove that |R XY (τ)| ≤ √R XX (0). R YY (0). Establish
any two properties of autocorrelation function R XX (τ). May/June.2016
R XY t , t
AB
sin 0 cos 0 2t where A, B, and 0 are constants. Find the
2
Cross Power Spectrum S XY
i AB
Ans: S XY 0 0 May/June.2012
2
03. Let X t and Y t be both zero mean and WSS random processes consider the random
process Z t defined by Z t X t Y t . Find
i. The Auto Correlation function and the Power Spectrum of Z t if X t and
Y t are jointly WSS.
Ans: S ZZ S XX SYY S XY SYX
ii. The Power Spectrum of Z t if X t and Y t are orthogonal.
Ans: S ZZ 0
May/June.2012, Nov./Dec. 2017
The Cross power spectrum of real random process and is given by
j b
a : for , 0
S XY where α and b are constants.Find the Cross
0, : for 1
Correlation function.
May/June.2013,
04. Define spectral density of a stationary random process X(t).Prove that for a real
random process X(t) the power spectral density is an even function. May/June.2013
05. Two random processes {X(t)}and {Y(t)} are defined as {X(t)} = Acos(ωt + θ) and
{Y(t)} = Bsin(ωt + θ) , where A, B and ω are constants and θ is uniformly distributed
random variable over (0,2π) . Find the cross correlation function of {X(t)} and
{Y(t)}.Nov./Dec. 2015
1
06. The power spectrum of a WSS process {X(t)}is given by S(ω) = . Find its
(1+ω2 )2
autocorrelation functionR(τ). Nov./Dec. 2015
08. If{Y(t)} = X(t + a) − X(t − a), Prove thatR YY (τ) = 2R XX (τ + 2α) − R XX (τ − 2α).
Hence prove that 𝑆𝑌𝑌 (𝜔) = 4𝑠𝑖𝑛2 𝛼𝜔𝑆𝑋𝑋 (𝜔). Nov./Dec. 2015
09.The autocorrelation function of the random telegraph signal process is given by R(τ) =
α2 e−2γ|τ| .
Determine the power density spectrum of the random telegraph signal.Nov./Dec. 2015
UNIT 5
PART – A
1. IfY(t) is the output of an linear time invariant system with impulse response h(t) then find
the cross
Correlation of the input function X(t) and output function Y(t). Nov./Dec. 2010
Ans:
The cross Correlation of the input function X(t) and output function Y(t) are
Ans:
3. State the auto correlation function of the white noise. April / May.2010
Ans:
N0
The auto correlation of the white noise is given by RNN E t .
2
4. State any two properties of linear time invariant system. Nov./Dec. 2011
Ans:
Ans:
Given, X (t) and Y(t) in the system y (t ) h(u) X (t u)du
6. Find the system transfer function,if a linear Time system has an impulse function
1
:t c
H ( t ) 2c
0: t c
Ans:
1
:t c
Given, an impulse function H (t ) 2c
0: t c
sin c
The system transfer function is H
c
7. Prove that the system y (t ) h(u) X (t u)du
is a linear time invariant system.
May/June.2012
Ans:
Ans:
if a system is of the form Y t hu X t u du , then the system weighting function
ht is also called unit impulse response of the system. It is called so because the response
(output) Y t will be hu , when the input X t the unit impulse function t
9. Define white noise process Nov./Dec. 2013 April / May.2011 Nov./Dec. 2014
Ans:
The output Y(t) is expressed as a convolution of the input X(t) with a system
weighting function h(t).
ie. Y t hu X t u du
11.the autocorrelation function for a Stationary Ergodic process with no periodic component
4
is Rxx ( ) 25 .find the mean and variance of the process X(t).
1 6 2
Nov./Dec. 2014
Ans:
Ans:
13. Define Band Limited White noise.Nov./Dec. 2010 Nov./Dec. 2012 May/June.2014
Ans:
Noise having a non-zero and constant power spectrum over a finite frequency band
and zero
Ans: Let 𝑦1 (𝑡) and 𝑦2 (𝑡) be output signals to input signals 𝑥1 (𝑡)and 𝑥2 (𝑡).
15. State the relation between input and output of a linear time invariant system.
April / May.2015
Ans: Let𝑋 (𝑡)and 𝑌(𝑡) be the input and output of a linear time invariant system.
PART-B
01. For a linear system time invariant system with X t and impulse response ht . Find an
expression for the output auto correlation function. Establish the relation between the
spectrum of random input signal and the spectrum of output signal. Ans:
R XY R XX h , RYY R XY h , S YY ( ) S XX ( ) H
2
04. Show that the power spectral densities of the input and output processes in the linear
system are connected by the relation S YY H ( ) S XX , where H ( ) is the Fourier
2
05. A WSSprocess X t with R Ae where A and are real positive constants is
applied to the input of a linear time invariant system with ht e .U t where b is a real
bt
positive constant. Find the power spectral density of the output of the system.
2A
Ans: S YY
2 b 2 2
2
06. X t is the input voltage to a circuit (system) and Y t is the output voltage X t is a
stationary random process with x 0 and RXX e . . Find y , S YY , and RYY ,
R
if the power transfer function is H ( ) .
R iL
Ans:
2 R2
E Y (t ) y 0, S YY
2 2 R 2 L2 2
R
R L
RYY
R L 1
e e
L 2 R
2
R2
L2 2
2
L Nov./Dec. 2013 May/June.2014
07. If X t is a band limited process such that S XX 0 when prove that
2RXX 0 RXX 2 2 RXX 0 April / May.2010
08. Show that the cross correlation function between the input X t and the output Y t of a
linear system is given by RXY RXX h and also Prove that
S XY S XX H May/June.2012
1
09. Consider the system with transfer function H ( ) . An input signal with Auto
1 j
Correlation function m m 2 is fed as input to the system. Find the mean and mean –
square value of the output.
m
2
Ans: E Y t m , E Y 2 t m 2 . April / May.2011 May/June.2012
10. A stationary random process X t having the Auto Correlation RXX A is applied
to a linear system at time t 0 where f represent the impulse function. The linear
system has the impulse response of h t e bt u t where u t represents the units step
function. Find RYY . Also find the mean and variance of Y t
Ans: RYY e , E Y t 0, V Y t
A b A
2b 2b
April / May.2011 May/June.2012
11. If X t is the input voltage to a circuit and Y t is the output voltage. X t is a stationary
2
random process with x 0 and R XX e . Find the mean y and power spectrum
1
SYY of the output if the system transfer function is given by H ( ) .
2 i
Ans: EY t 0, sYY
4
Nov./Dec. 2012
4
2 2
t
12. A linear system is described by the impulse response h t e RC u t .
1
Assume an
RC
input process whose Auto Correlation function is B . Find the mean and Auto
EY t 0, RYY
B RC
e
Correlation function of the output process. Ans: 2RC
April / May.2011 Nov./Dec. 2014
23.A random process X(t) is the input to a linear system whose impulse function is h(t)=2e-
2
t;t>0.The auto correlation function of the process is R XX e .Find the power spectral
density of the output process(t).
May/June.2013
3
24.A wide sense stationary process N(t) has an auto correlation function RNN P e
27.The power spectral density of a signal x(t) is Sx(w) and its power is P.Find the power of
the signal(t).
Nov./Dec. 2014.
h t
1
28.A circuit has an impulse response given by ;0 t T Express Syy(w) in terms of
T
sxx(w).
April / May.2015
∞
29. If {X(t)} is a WSS process and if Y(t) = ∫−∞ h(u)(t − u)du, prove that
Nov./Dec. 2015,Nov./Dec. 2017
(i) R XY (τ) = R XX (τ) ∗ h(−τ)and
(iii) SXY (ω) = SXX (ω)H ∗ (ω)whereH ∗ (ω) is the complex conjucate of H(ω).
30. A Random process X(t) is the input to a linear system whose I,pulse response is h (t) =
2e−t , t ≥ 0.
If the autocorrelation fuction of the process is R XX (τ) = e−2|τ| , determine the cross
correlation
fuctionR XY (τ) between the imput process X(t) and the output process Y(t) and the cross
correlation
fuctionR YX (τ)between the outputprocess Y(t) and the imput process X(t).Nov./Dec. 2015
31. A linear time invariant system has an impulse response h(t) = e−Bt U(t). Find the power
spectral density of the output Y(t) corresponding to the input X(t). May/June.2016
32. Assume a random process X(t) is given as input to a system with transfer fuction
H(W) = 1 for −w0 < 𝑤 < w0 . If the auto correlation function of the input process is
N0
δ(T), find the autocorrelation fuction of the output process. May/June.2016
2
1
;0 ≤ t ≤ T
33. A circuit has unit impulse response given by h (T) = { T . Evaluate
0 ; otherwise
SYY (w) interms of SXX (w). May/June.2016
34. A system has an impluse response ℎ(𝑡) = 𝑒 −𝛽𝑡 𝑈(𝑡) .find the power spectral density of
the output Y(t) corresponding to the input X(t). Nov./Dec. 2017
35. If X(t) is the input voltage to a circuit and Y(t) is the output voltage, {X(t) } is a stationary
random process with 𝜇𝑥 = 0,and 𝑅𝑋𝑋 (𝜏) = 𝑒 −𝛼|𝑡| .Find 𝜇𝑦 ,𝑠𝑦𝑦 (𝑤)and 𝑅𝑦𝑦 (𝑇),if the power
𝑅
transfer function is 𝐻 (𝜔) = 𝑅+𝑖𝐿𝜔 . Nov./Dec. 2017
∞
35.If a system is connected by a convolution integral 𝑌 (𝑡) = ∫−∞ ℎ(𝑢)𝑋(𝑡 − 𝑢)𝑑𝑢 where
X(t) is the input and Y(t) is the output then prove that the system is a linear time invariant
system.
April / May.2017
36. If X(t) is the input voltage to a circuit and Y(t) is the output voltage, X(t) } is a stationary
{
random process with 𝜇𝑥 = 0,and 𝑅𝑋𝑋 (𝜏) = 𝑒 2|𝑡| .Find 𝜇𝑦 ,𝑠𝑦𝑦 (𝑤)and 𝑅𝑦𝑦 (𝑇),if the power
1
transfer function is 𝐻 (𝜔) = 𝜔+𝑖 2 . April / May.2017
PROBLEM RELATED TO WHITE NOISE
01. If N t is a band limited white noise centered a carrier frequency 0 such that
N0
: 0
S NN 2 . Find the auto correlation N t
0 : otherwise
N 0 B sin B
Ans: RNN . cos 0
2 B
April / May.2010 April / May.2011 May/June.2012
02. If Y t A cos0 t N t , , where A is a constant, is a random variable with a
uniform distribution in , and N t is a band limited Gaussian white noise with a
power spectral density
N0
, for 0 B A2
S NN 2 , Ans: S YY ( 0 ) ( 0 ) S NN
2
0, elsewhere
Find the power spectral density of Y t . Assume that N t and are independent.
April / May.2010 Nov./Dec. 2010Nov./Dec. 2012 Nov./Dec. 2013 May/June.2014
N
03. A white Gaussian Noise X t with zero mean and Spectral density 0 is applied to a low
2
– pass RC filter shown in the figure. Determine the Auto Correlation of the output Y t
RC
Input X t Output Y t
N
RYY 0 e RC
Ans: 4 RC
Nov./Dec. 2011
It includes the information formats, the instruction set and techniques for addressing
memory.
It describes the function and design of the various units of digital computer that
store and process information.
It refers to the operational units and their interconnections that realize
the architectural specifications.
Input unit
Memory unit
Output unit
Control unit
Response time also called execution time. The total time required for the computer
to complete a task, including disk accesses, memory accesses, I/O activities, operating
system overhead, CPU execution time, and so on.
5. What is CPU execution time, user CPU time and system CPU time?
CPU time : The actual time the CPU spends computing for
a specific task. user CPU time: The CPU time spent in a
program itself.
system CPU time: The CPU time spent in the operating system performing
tasks on behalf the program.
6. Define CPI
The term Clock Cycles Per Instruction Which is the average number of
clock cycles each instruction takes to execute, is often abbreviated as CPI.
7.State and explain the performance equation?
8. Define MIPS .
Throughput rate-The rate at which the total amount of work done at a given
time.
11. What are the various types of operations required for instructions?
• Data transfers between the main memory and the CPU registers
• I/O transfers
A mode field that specifies the way the operand or the effective
address is determined
The CPU control circuitry automatically proceed to fetch and execute instruction,
one at a time in the order of the increasing addresses. This is called straight line sequencing.
20. What is Addressing Modes?
23. What is a Immediate addressing Mode? The operand is given explicitly in the
instruction. Eg: Move 200 immediate
It places the value 200 in the register R0.The immediate mode used to specify the value
of source operand.
24.What is a Relative Addressing mode?
It is same as index mode. The difference is, instead of general purpose register,
here we can use program counter(PC).
Relative Mode:
The Effective Address is determined by the Index mode using the PC in place of
the general purpose register (gpr).
This mode can be used to access the data operand. But its most common use
is to specify the target address in branch instruction.Eg. Branch>0 Loop
It causes the program execution to goto the branch target location. It is
identified by the name loop if the branch condition is satisfied.
PART-B
2. Explain the components of a computer with the block diagram in detail. (16)
3.Explain the technologies for building computer over time with a neat graph.(6)
5.(i)Prove that how performance and execution are inverse to each other.(2)
(ii) If computer A runs a program in 10 seconds and computer B runs the samem program in
15 seconds, how much faster is A than B?(2)
(iii)Write the formula to calculate the CPU execution time for a program.(2)
6.Explain how clock rate and power are related to each other in microprocessor over years
with a neat graph. (6)
7. Explain the need to switch from uniprocessors to multiprocessors and draw the
performance chart for processors over years . (6)
10. Whatdo you mean by addressing modes? Explain various addressing modes with the help
of examples.(16)
PART-A
The input carry needed by a stage is directly computed from carry signals obtained
from all the preceding stages i-1,i-2,…..0, rather than waiting for normal carries to
supply slowly from stage to stage. An adder that uses this principle is called carry
look-ahead adder.
1) The first technique guarantees that the maximum number of summands that must be
added is n/2 for n-bit operands.
2) The second technique reduces the time needed to add the summands.
4. What is bit pair recoding? Give an example.
Bit pair recoding halves the maximum number of summands. Group the Booth-
recoded multiplier bits in pairs and observe the following: The pair (+1 -1) is
equivalent to the pair (0 +1). That is instead of adding -1 times the multiplicand m at
shift position i to +1 ( M at position i+1, the same result is obtained by adding +1 ( M
at position i.
2) It achieves efficiency in the number of additions required when the multiplier has
When the decimal point is placed to the right of the first (nonzero) significant digit,
the number is said to be normalized.
The end values 0 to 255 of the excess-127 exponent E( are used to represent special
values such
as:
When E(= 0 and the mantissa fraction M is zero the value exact 0 is
represented. When E(= 255 and M=0, the value ( is represented.
When E(= 0 and M (0 , denormal values are represented.
When E(= 2555 and M(0, the value represented is called Not a number.
1) Choose the number with the smaller exponent and shift its mantissa right a number
of steps equal to the difference in exponents.
3) Perform addition/subtraction on the mantissa and determine the sign of the result
12. What is the purpose of guard bits used in floating point arithmetic
There are several ways to truncate the guard bits:1) Chooping 2) Von Neumann
rounding 3) Rounding
Instead of letting the carries ripple along the rows, they can be saved and introduced
into the next roe at the correct weighted position. Delay in CSA is less than delay
through the ripple carry adder.
The generate
function is
given by
Gi=xiyi and
The propagate function is
given as Pi=xi+yi.
16. What is floating point numbers?
17. In floating point numbers when so you say that an underflow or overflow has
occurred?
In single precision numbers when an exponent is less than -126 then we say that an
underflow has occurred. In single precision numbers when an exponent is less than
+127 then we say that an overflow has occurred.
18. What are the difficulties faced when we use floating point arithmetic?
Mantissa overflow: The addition of two mantissas of the same sign may result in a
carryout of the most significant bit
Mantissa underflow: In the process of aligning mantissas ,digits may flow off the
right end of the mantissa.
19. In conforming to the IEEE standard mention any four situations under which a
processor sets exception flag.
20. Why floating point number is more difficult to represent and process than
integer?(CSE May/June 2007)
5.Derive and explain an algorithm for adding and subtracting two floating point binary
numbers.(8)
6.Design a 4-bit adder/subtractor circuit using full adders and explain it’s function?(8)
9/4
UNIT-III
PART-A
1. Define pipelining.
Pipelining is a technique of decomposing a sequential process into sub operations
with each sub process being executed in a special dedicated segment that operates
concurrently with all other segments.
Parallel processing is a term used to denote a large class of techniques that are used
to provide simultaneous data-processing tasks for the purpose of increasing the
computational speed of a computer system. Instead of processing each instruction
sequentially as in a conventional computer, a parallel processing system is able to perform
concurrent data
A hazard is also called as hurdle .The situation that prevents the next instruction in
the instruction stream from executing during its designated Clock cycle. Stall is introduced
by hazard. (Ideal stage)
1. Data hazards.
2. Instruction hazards.
3. Structural hazards.
Instruction ‘j’ tries to read a source operand before instruction ‘i’ writes it.
Instruction ‘j’ tries to write a source operand before instruction ‘i’ writes it.
13. Define WAR hazard :( write after read)
Instruction ‘j’ tries to write a source operand before instruction ‘i’ reads it.
Many instruction in localized area of the program are executed repeatedly during
some time period and the remainder of the program is accessed relatively infrequently .this
is referred as locality of reference.
18. What is the need for reduced instruction chip?
The time that elapses between the initiation of an operation and completion of that
operation ,for example ,the time between the READ and the MFC signals .This is Referred
to as memory access time.
The minimum time delay required between the initiations of two successive
memory operations, for example, the time between two successive READ operations.
21. Define Static Memories.
Memories that consist of circuits capable of retaining the state as long as power is
applied are known as static memories.
22. List out Various branching technique used in micro program control unit?
a) Bit-Oring
* Pc is loaded with address of interrupt handler and handling program to handle it.
1. Processor clock
2.Basic Performance Equation
3.Pipelining
4.Clock rate
5.Instruction set
6.Compiler
PART-B
2.State and explain the different types of hazards that can occur in a pipeline.
3.Draw and explain the modified three-bus structure of the processor suitable for four
–stage pipelined execution. How this structure is suitable to provide four -stage pipelined
execution?
4.What is data hazard?Explain the methods for dealing with the data hazards
UNIT-IV
PARALLELISM
PART-A
3. What is Multithreading?
Multithreading allows multiple threads to share the functional units of a single
processor in an overlapping fashion. To permit this sharing, the processor must
duplicate the independent state of each thread.
9. What is CMT?
Chip multiprocessors - also called multi-core microprocessors or CMPs for short -
are now the only way to build high-performance microprocessors, for a variety of reasons.
Large uniprocessors are no longer scaling in performance, because it is only possible to
extract a limited amount of parallelism from a typical instruction stream using
conventional superscalar instruction issue techniques. In addition, one cannot simply
ratchet up the clock speed on today's processors, or the power dissipation will become
prohibitive in all but water-cooled systems.
18. Draw the basic structure of Basic Structure of a Symmetric Shared Memory
Multiprocessor
PART-B
8. What are multicore processors? Explain the common configurations that support
multiprocessing?
UNIT-V
PART-A
14. What are the two types of latencies associated with storage?
The latency associated with storage is divided into 2 categories
1. Seek Latencies which can be classified into Overlapped seek,Mid transfer seek and
Elevator seek.
2. Rotational Latencies which can be reduced either by Zero latency read or Write and
Interleave factor.
29. Why program controlled I/O is unsuitable for high-speed data transfer?
In program controlled i/o considerable overhead is incurred. Because several
program instruction have to be executed for each data word transferred between the
external devices and MM. Many high speed peripheral; devices have a synchronous modes
of operation. That is data transfers are controlled by a clock of fixed frequency,
independent of the CPU.
30. What is the function of I/O interface?
The function is to coordinate the transfer of data between the CPU and external
devices.
PART-B
1. Explain with the block diagram the DMA transfer in a computer system.
UNIT-I-RELATIONAL DATABASES
PART-A
1. What is database?
A database is logically coherent collection of data with some inherent meaning,
representing some aspect of real world and which is designed, built and populated with
data for a specific purpose.
2. Which of the following plays an important role in representing information about the
real world in a database? Explain briefly.
1. The data definition language.
2. The data manipulation language.
Designing the logical and physical schemas, as well as widely-used portions of the
external schema.
Security and authorization.
Data availability and recovery from failures.
Database tuning: The DBA is responsible for evolving the database, in particular
the conceptual and physical schemas, to ensure adequate performance as user
requirements change.
4. Explain the following terms briefly: attribute, domain, entity, relationship, entity set,
relationship set, one-to-many relationship, many-to-many relationship, participation
constraint, overlap constraint, covering constraint, weak entity set, aggregation, and role
indicator.
Entity - an object in the real world that is distinguishable from other objects such as the green
dragon toy.
Entity set - a collection of similar entities such as all of the toys in the toy department.
One-to-many relationship - a key constraint that indicates that one entity can be associated
with many of another entity. An example of a one-to-many relationship is when an employee
can work for only one department, and a department can have many employees.
Many-to-many relationship - a key constraint that indicates that many of one entity can be
associated with many of another entity. An example of a many-to-many relationship is
employees and their hobbies: a person can have many different hobbies, and many people can
have the same hobby.
Covering constraint - within an ISA hierarchy, a covering constraint determines where the
entities in the subclasses collectively include all entities in the superclass.
For example, with an Employees entity set with subclasses HourlyEmployee and
SalaryEmployee, does every Employee entity necessarily have to be within either
HourlyEmployee or SalaryEmployee?
Weak entity set - an entity that cannot be identified uniquely without considering some
primary key attributes of another identifying owner entity. An example is including
Dependent information for employees for insurance purposes.[Nov/Dec 2016]
Aggregation - a feature of the entity relationship model that allows a relationship set
to participate in another relationship set. This is indicated on an ER diagram by drawing a
dashed box around the aggregation.
Role indicator - If an entity set plays more than one role, role indicators describe the different
purpose in the relationship. An example is a single Employee entity set with a relation
Reports-To that relates supervisors and subordinates.
5. Define the following terms: relation schema, relational database schema, domain,
attribute, attribute domain, relation instance, relation cardinality, and relation degree.
There are five fields or columns, with names and types as shown above.
table. Therefore, an attribute domain refers to the data type associated with a column.
A relation instance is a set of tuples (also known as rows or records) that each conform to
the schema of the relation.
The relation degree is the number of fields (or columns) in the relation.
6. Does the relational model, as seen by an SQL query writer, provide physical and
logical data independence? Explain.
The user of SQL has no idea how the data is physically represented in the machine.
He or she relies entirely on the relation abstraction for querying. Physical data independence
is therefore assured. Since a user can define views, logical data independence can also be
achieved by using view definitions to hide changes in the conceptual schema.
7. What is the difference between a candidate key and the primary key for a given
relation? What is a superkey?
Redundancy is controlled
Unauthorized access is restricted.
Providing multiple user interface
Enforcesing integrity constraints.
Providing backup and recovery.
Candidate Key – A Candidate Key can be any column or a combination of columns that can
qualify as unique key in database. There can be multiple Candidate Keys in one table. Each
Candidate Key can qualify as Primary Key.
Primary Key – A Primary Key is a column or a combination of columns that uniquely
identify a record. Only one Candidate Key can be Primary Key.
Data model is a collection of concepts that can be used to describe the structure of a data
base.
Types:
• High level or Conceptual Data model
• Low level or Physical Data model
• Entity Relationship Model
• Representational Model
• Relational data model
• Network and Hierarchical Data Model
• Object Data Model
• Record based data model
• Granting of authorization for data access.
Procedural, where the user instructs the system to perform a sequence of operations
on the database. This will compute the desired information.
Nonprocedural, where the user specifies the information desired without giving a
procedure for obtaining the information.
20. What are the different types of integrity constraints used in designing a
relational database?
Constraint is a rule that is used for optimization purposes.
There are five types of constraints:
A NOT NULL constraint is a rule that prevents null values from being entered into
one or more columns within a table.
A unique constraint (also referred to as a unique key constraint) is a rule that forbids
duplicate values in one or more columns within a table. Unique and primary keys are
the supported unique constraints.
A primary key constraint is a column or combination of columns that has the same
properties as a unique constraint.
A foreign key constraint (also referred to as a referential constraint or a referential
integrity constraint) is a logical rule about values in one or more columns in one or
more tables.
A check constraint (simply called a check constraint) sets restrictions on data added to
a specific table.
Aggregate function are functions that take a collection of values as input and return a single
value.
SQL offers five built-in aggregate functions:
Average: avg
Minimums: min
Maximum : max
Total: sum
Count: count
SQL provides a mechanism for the nesting of sub queries. A sub query is a select-from-where
expression that is nested within another query. A common use of sub queries is to perform
tests for set membership, set comparison, and set cardinality.
40. Define SQL and state the difference between SQL and other conventional
programming Language.
SQL is a nonprocedural language that is designed specifically for data access operations on
normalized relational database structures. The primary difference between SQL and other
conventional programming languages is that SQL statements Specify what data operations
should be performed rather than how to perform them.
41. What is database trigger is a PL/SQL block that can defined to automatically
execute for insert, update and deleted statements against a table .The trigger can be defied to
execute once for the entire statement or once for every row that is inserted,updated,or deleted.
For any one table, there are twelve events for which you can define database triggers.
Integrity constraints provide a means of ensuring that changes made to the database by
authorized user do not result in a loss of data consistency. Thus Integrity constraints guard
against accidental damage to the database. The constraints were is the following forms: Key
declaration and form of a relationship.
Often, we wish to ensure that a value that appears in one relation for a given set of attributes
also
appears for a certain set of attributes in another relation. This condition is called referential
integrity.
The tuple relational calculation is anon procedural query language. It describes the desired
information with out giving a specific procedure for obtaining that Information.
{t | P (t)}
which means the set of all tuples‘t’ such that predicate P is true for‘t’.
Notations used:
• there exists
t r(Q(t))
• for all
t r(Q(t))
‘r’.
• Implication
A query with respect to DBMS relates to user commands that are used to interact with a
database.
The query language can be classified into data definition language and data manipulation
language.
Subqueries, or nested queries, are used to bring back a set of rows to be used by the parent
query.
Depending on how the subquery is written, it can be executed once for the parent query of it
can beexecuted once for each row returned by the parent query. If the subquery is executed
for each row of the parent, this is called correlated subquery.
PART- B
Let relations 1, (A, B,C) and r,(C, D, E)) have the following properties: r,; has
20,000 tuples, r, has 45,000 tuples, 25 tuples ofr, fit on one block
and 30 tuples of r, fit on one block. Estimate the number of block
transfers and seeks required, using each ofthe following join strategies for 7, or:
18.
(i) Nested-loop join
(ii) Block nested-loop join
(iii) Merge join.
(iv) Hash join. [NOV/DEC2016]
19. Explain briefly about the steps required in query processing.
20. What is data integrity? Explain the types of integrity constraints. [April/May-2011]
21. What are the relational algebra operations supported in SQL? [April/May-2011]
22. Explain the strength and weakness of the Triggers mechanism.
23. What is meant by Selection and projection used in Relational algebra?
24. How we made lossless and loss-join in relational model?
25. What is data integrity? Explain the types of integrity constraints.
26. Explain query optimization with an example. [NOV/DEC2016]
PART-A
decomposition is lossless?
6. Define - 3NF
Third normal form (3NF) is based on the concept of transitive dependency. A functional
dependency X→Y in a relation schema R is a transitive dependency if there exists a set of
attributes Z in R that is neither a candidate key nor a subset ofany key of R,10 and both X→Z
and Z→Y hold.
Lossless-join decomposition
Dependency preservation
Repetition of information
1. Repletion of information
Reflexive rule:
Augmentation rule:
Transitive Rule:
15. Is it possible for several attributes to have the same domain? Illustrate you
Possibility for several attributes to have same domain. Yes, several attributes to have
same domain. For example Attributes:name, address, belong to same domains contains all
text string of certain
length.
PART-B
Define a functional dependency. List and discuss the six inference rules for functional
16.
dependencies. Give relevant examples.
17. Discuss Join Dependencies and Fifth Normal Form, and explain why 5NF?
18. Write about decomposition preservation algorithm for all FD’s.
19. Explain functional dependency concepts.
20. Explain the codd’s rules for relational database design.
UNIT III TRANSACTIONS
PART-A
1. What is a transaction?
A transaction is any one execution of a user program in a DBMS. This is the basic
unit of change in a DBMS.
3. Why does a DBMS interleave the actions of different transactions instead of executing
A DBMS is typically shared among many users. Transactions from these users can be
interleaved to improve the execution time of users’ queries. By interleaving queries, users do
not have to wait for other user’s transactions to complete fully before their own transaction
begins. Without interleaving, if user A begins a transaction that will take 10 seconds to
complete, and user B wants to begin a transaction, user B would have to wait an additional 10
seconds for user A’s transaction to complete before the database would begin processing user
B’s request.
4. What must a user guarantee with respect to a transaction and database consistency?
A user must guarantee that his or her transaction does not corrupt data or insert
nonsense in the database. For example, in a banking database, a user must guarantee that a
cash withdraw transaction accurately models the amount a person removes from his or her
account. A database application would be worthless if a person removed 20 dollars from an
ATM but the transaction set their balance to zero! A DBMS must guarantee that transactions
are executed fully and independently of other transactions. An essential property of a DBMS
is that a transaction should execute atomically, or as if it is the only transaction running. Also,
transactions will either complete fully, or will be aborted and the database returned to it’s
initial state. This ensures that the database remains consistent.
Strict two-phase locking uses shared and exclusive locks to protect data. A transaction
must hold all the required locks before executing, and does not release any lock until the
transaction has completely finished.
The WAL property affects the logging strategy in a DBMS. The WAL, Write- Ahead
Log, property states that each write action must be recorded in the log (on disk) before the
corresponding change is reflected in the database itself. This protects the database from
system crashes that happen during a transaction’s execution. By recording the change in a log
before the change is truly made, the database knows to undo the changes to recover from a
system crash. Otherwise, if the system crashes just after making the change in the database
but before the database logs the change, then the database would not be able to detect his
change during crash recovery.
7. Define these terms: atomicity, consistency, isolation, durability, schedule, blind write,
dirty read, unrepeatable read, serializable schedule, recoverable schedule, avoids-
cascading-aborts schedule.
(a) Atomicity means a transaction executes when all actions of the transaction are completed
fully, or none are. This means there are no partial transactions (such as when half the actions
complete and the other half do not).
(b) Consistency involves beginning a transaction with a ’consistent’ database, and finishing
with a ’consistent’ database. For example, in a bank database, money should never be
”created” or ”deleted” without an appropriate deposit or withdrawal. Every transaction should
see a consistent database.
(c) Isolation ensures that a transaction can run independently, without considering any side
effects that other concurrently running transactions might have. When a database interleaves
transaction actions for performance reasons, the database protects each transaction from the
effects of other transactions.
(d) Durability defines the persistence of committed data: once a transaction commits, the data
should persist in the database even if the system crashes before the data is written to non-
volatile storage.
(f) A blind write is when a transaction writes to an object without ever reading the object.
(g) A dirty read occurs when a transaction reads a database object that has been modified by
another not-yet-committed transaction.
(h) An unrepeatable read occurs when a transaction is unable to read the same object value
more than once, even though the transaction has not modified the value. Suppose a
transaction T2 changes the value of an object A that has been read by a transaction T1 while
T1 is still in progress. If T1 tries to read the value of A again, it will get a different result,
even though it has not modified A.
(i) A serializable schedule over a set S of transactions is a schedule whose effect on any
consistent database instance is identical to that of some complete serial schedule over the set
of committed transactions in S. [May/June 2016] [April/May 2017]
(j) A recoverable schedule is one in which a transaction can commit only after all other
transactions whose changes it has read have committed.
(k) A schedule that avoids-cascading-aborts is one in which transactions only read the
changes of committed transactions. Such a schedule is not only recoverable, aborting a
transaction can be accomplished without cascading the abort to other transactions.
2) All locks held by a transaction are released when the transaction is completed.
9. What is the phantom problem? Can it occur in a database where the set of database
objects is fixed and only the values of objects can be changed?
10. Describe how a typical lock manager is implemented. Why must lock and unlock be
atomic operations? What is the difference between a lock and a latch?
What are convoys and how should a lock manager handle them?
A typical lock manager is implemented with a hash table, also called lock table, with
the data object identifier as the key. A lock table entry contains the following information: the
number of transactions currently holding a lock on the object, the nature of the lock, and a
pointer to a queue of lock requests. Lock and unlock must be atomic operations because
otherwise it may be possible for two transactions to obtain an exclusive lock on the same
object, thereby destroying the principles of 2PL.
A lock is held over a long duration, and a latch is released immediately after the physical read
or write operation is completed. Convoy is a queue of waiting transactions. It occurs when a
transaction holding a heavily used lock is suspended by the operating system, and every other
transactions that needs this lock is queued.
11. Compare lock downgrades with upgrades. Explain why downgrades violate 2PL but
are nonetheless acceptable. Discuss the use of update locks in conjunction with lock
downgrades.
A lock upgrade is to grant a transaction an exclusive lock of an object for which it
already holds a shared lock. A lock downgrade happens when an exclusive lock is obtained
by a transaction initially, but downgrades to a shared lock once it’s clear that this is sufficient.
Lock downgrade violates the 2PL requirement because it reduces the locking privileges held
by a transaction, and the transaction may go on to acquire other locks. But the transaction did
nothing but read the object that it downgraded. So it is nonetheless acceptable, provided that
the transaction has not modified the object.
12. Contrast the timestamps assigned to restarted transactions when timestamps are
used for deadlock prevention versus when timestamps are used for concurrency
control.
When timestamps are used for deadlock prevention, a transaction that is aborted and re-
started it is given the same timestamp that it had originally. When timestamps are used for
concurrency control, a transaction that is aborted and restarted is given a new, larger
timestamp.
The Thomas Write Rule says that if an transaction T with timestamp TS(T) acts on a database
object O with a write timestamp of WTS(O) such that TS(T) < WTS(O), we can safely
ignore writes by T and continue.
To understand and justify the Thomas Write Rule fully, we need to give the complete context
when it arises.
(a) If TS(T )< RTS(O), the write action conflicts with the most recent read action of O, and T
is therefore aborted and restarted.
(b) If TS(T )<WTS(O), a naive approach would be to abort T as well because its write action
conflicts with the most recent write of O, and is out of timestamp order. But it turns out that
we can safely ignore such previous write and process with this new write; this is called
Thomas_WriteRule.
The justification is as follows: had TS(T )< RTS(O), T would have been aborted and we
would not have bothered to check the WTS(O). So to decide whether to abort T based
onWTS(O), we can assume that TS(T ) >= RTS(O). If TS(T ) >= RTS(O) and TS(T ) <
WTS(O), then RTS(O) < WTS(O), which means the previous write occurred immediately
before this planned-new-write of O and was never read by anyone, therefore the previous
write can be safely ignored.
13. Show that, if two schedules are conflict equivalent, then they are view equivalent.
If two schedules over the same set of actions of the transactions are conflict
equivalent,they must order every pair of conflicting actions of two committed transactions in
the same way. Let’s assume that two schedules are conflict equivalent, but they are not view
equivalent, then one of the three conditions held under view equivalency must be violated.
But as we can see if every pair of conflicting actions is ordered in the same way, this cannot
happen. Thus we can conclude that if two schedules are conflict equivalent, they are also
view equivalent.
Motivate and describe the use of locks for improved conflict resolution in Optimistic
Concurrency Control.
In Optimistic Concurrency Control, we have no way to tell when Ti wrote the object at the
time we validate Tj, since all we have is the list of objects written by Ti and the list read by
Tj. To solve such conflict, we use mechanisms very similar to locking. The basic idea is that
each transaction in the Read phase tells the DBMS about items it is reading, and when a
transaction Ti is committed and its writes are accepted, the DBMS checks whether any of the
items written by Ti are being rad by any (yet to be validated) transaction Tj. If so, we know
that Tj’s validation must eventually fail. Then we can pick either the die or kill policy to
resolve the conflict.
16. How does the recovery manager ensure atomicity of transactions? How does it
ensure durability?
Stable storage is guaranteed (with very high probability) to survive crashes and media
failures. A disk might get corrupted or fail but the stable storage is still expected to retain
whatever is stored in it. One of the ways of achieving stable storage is to store the
information in a set of disks rather than in a single diskwith some information duplicated so
that the information is available even if one or two of the disks fail.
18. What is the difference between a system crash and a media failure?
A system crash happens when the system stops functioning in a normal way or stops
altogether. The Recovery Manager and other parts of the DBMS stop functioning (e.g. a core
dump caused by a bus error) as opposed to media failure.
In a media failure, the system is up and running but a particular entity of the system is not
functioning. In this case, the Recovery Manager is still functioning and can start recovering
from the failure while the system is still running (e.g., a disk is corrupted).
A no-force policy is in effect if, when a transaction commits, we need not ensure that all the
changes it has made to objects in the buffer pool are immediately forced to disk.
the life of the transaction: the current page table and the shadow p age table. Both the page
tables are identical when the transaction starts. The current page table may be changed when
a transaction performs a write operation.
• Garbage collection
26.Differentiate strict two phase locking protocol and rigorous two phase locking
protocol.
In strict two phase locking protocol all exclusive mode locks taken by a transaction
is held until that transaction commits.
Rigorous two phase locking protocol requires that all locks be held until the transaction
commits.
• Use the value of the system clock as the time stamp. That is a transaction’s time stamp is
equal to the value of the clock when the transaction enters the system.
• Use a logical counter that is incremented after a new timestamp has been assigned; that is
the time stamp is equal to the value of the counter.
28. What are the time stamps associated with each data item?
• W-timestamp (Q) denotes the largest time stamp if any transaction that executed WRITE
(Q) successfully.
• R-timestamp (Q) denotes the largest time stamp if any transaction that executed READ
(Q) successfully.
PART-B
1. Explain in detail about Lock based protocols and Timestamp based protocols.
2. Write briefly about serializability with example.
3. Explain various recovery techniques during transaction in detail.
4. How can we achieve concurrency control achieved in DBMS through Serializability?
5. Explain the concept of Deadlock avoidance and prevention in detail.
6. Explain the ACID properties of a transaction.
Explain about immediate update and deferred update recovery techniques.
7.
[April/May-2011]
8. Explain the following protocols for concurrency control
i) Lock based protocols (8)
ii) Time stamp based protocols Database Management System.
9. Explain the concepts of serializability. April/May-2011
10. Explain two-phase locking protocol. [April/May-2011] , [NOV/DEC2016]
11. Describe about the deadlock prevention schemes. April/May-2011
How Transactions are possible in Distributed database? Explain briefly.
12.
What is Transaction state and its ACID properties?
13. Explain Recovery schemas in detail.
14. What is deadlock prevention and dead lock detection method. [NOV/DEC2016]
15. What is concurrency control? how is it implemented in DBMS?
16. Write short notes on shadow paging.
17. Explain the deffered and immediate-modification version of the log-based recovery
scheme
18. What is deadlock? Explain the various approaches used to recover from deadlock.
PART-A
1. What are the advantages and disadvantages of indexed sequential file? APRIL/MAY-
2011
The advantage of ordering records in a sequential file according to a key is that you
can then search the file more quickly. If you know the key value that you want, you can use
one of the relatively fast searches. The disadvantage is that when you insert, you need to
rewrite at least everything after the insertion point, which makes inserts very expensive
unless they are done at the end of the file. An indexed file approach keeps a (hopefully) small
part of each row, and some kind of "pointer" to the row's location within the data file. This
allows a search to use the index, which is ordered by the index and (again hopefully) much
smaller and therefore much faster than scanning the entire data file for the indexed data.
Database tuning describes a group of activities used to optimize and homogenize the
performance of a database. It usually overlaps with query tuning, but refers to design of the
database files, selection of the database management system (DBMS), operating system and
CPU the DBMS runs on.
Capacity
Access time
Seek time
Data transfer rate
Reliability
Rotational latency time.
4. Compare sequential access devices versus random access devices with an example.
Must be accessed from the beginning It is possible to read data from any location
Primary storage
Secondary storage
Tertiary storage
6.Draw the storage device hierarchy according to their speed and their cost.
Cache
Main memory
Flash memory
Magnetic disk
Optical disk
Magnetic tapes
7.What are called jukebox systems?
Jukebox systems contain a few d rives and numerous disks that can be loaded into one
of the drives automatically.
If the controller detects that a sector is damaged when the disk is initially formatted,
or when an attempt is made to write the sector, it can logically map the sector to a different
physical location.
begins.
The time for repositioning the arm is called the seek time and it increases with the
distance that the arm is called the seek time.
The average seek time is the average of the seek times, measured over a sequence of
random requests.
The time spent waiting for the sector to be accessed to appear under the head is called
the rotational latency time.
Load –balance multiple small accesses, so that the throughput of such accesses
increases.
Parallelize large accesses so that the response time of large accesses is reduced
15. What are the factors to be taken into account when choosing a RAID level?
RAID can be implemented with no change at the hardware level, using only software
modification. Such RAID implementations are called software RAID systems and the
systems with
Hot swapping permits the removal of faulty disks and replaces it by new ones without
turning
RAID level 1 is the RAID level of choice for many applications with moderate
storage
requirements and high I/O requirements. RAID 1 follows mirroring and provides best write
performance.
19. Distinguish between fixed length records and variable length records.
Every record has the same fields and field lengths are fixed.
File records are of same type but one or more of the fields are of varying size.
20. What are the ways in which the variable-length records arise in database systems?
in the header?
The slotted-page structure is used for organizing records within a single block.
The header contains the following information.
The number of record entries in the header.
The end of free space .
An array whose entries contain the location and size of each record.
23. What are the two types of blocks in the fixed –length representation? Define them.
• Overflow block: Contains the records other than those that are the first Record o f a chain.
24. What is known as heap file organization?
In the heap file organization, any record can be placed anywhere in the file where
there is
space for the record. There is no ordering of records. There is a single file for relation.
In the sequential file organization, the records are stored in sequential order,
according to the value of a “search key” of each record.
In the hashing file organization, a hash function is computed on some attribute of each
record. The result of the hash function specifies in which block of the file the record should
be placed.
The main disadvantage of the index sequential file organization is that performance
degrades as the file grows. This degradation is remedied by reorganization of the file.
A B+-Tree index takes the form of a balanced tree in which every path from the root
of the root of the root of the tree to a leaf of the tree is of the same length.
A B-tree eliminates the redundant storage of search-key values .It allows search key
values to appear only once.
Static hashing
Static hashing uses a h ash function in which the set of bucket adders is fixed. Such
hash functions cannot easily accommodate databases that grow larger over time.
Dynamic hashing
organization?
• Open hashing
If a record must be inserted in to a bucket b, and b is already full, the system provides
an overflow bucket for b, and inserts the record in to the overflow bucket. If the overflow
bucket is also full, the system provides another overflow bucket, and so on. All the overflow
buckets of a given buckets are chained together in a linked list, overflow handling using
linked list is known as closed hashing.
Selection operation
Join operations.
Sorting.
Projection
Set operations
Aggregation
34. What is meant by block nested loop join?
Block nested loop join is the variant of the nested loop join where every block of the inner
relation is paired with ever y block of the outer relation. With in each pair of blocks ever y
tuple in one block is paired with every tuple in the other blocks to generate all pairs of tuples.
PART-B
1. How the records are represented and organized in files . Explain with suitable example.
2. Write about the various levels of RAID with neat diagrams. [NOV/DEC2016]
Construct a B+ tree with the following (order of 3)
3.
5,3,4,9,7,15,14,21,22,23
4. List the different levels in RAID technology and explain its features. [April/May-2011]
5. Explain static and dynamic Hashing Techniques?
6. Briefly describe about B+ tree index file structure. [May/June 2016]
7. Discuss about primary file storage system
Describe the different types of file organization. Explain using a sketch of each of them,
8.
with their advantages and disadvantages. [Nov/Dec 2008]
Since indices speed query processing. Why might they not be kept on several search
9.
keys? List as many reason as possible. [Nov/Dec 2011]
10. Illustrate indexing and hashing techniques with suitable examples. [Nov/Dec 2015]
11. What is the difference between primary index and secondary index? [April/May 2006]
Construct a B+ tree with the following data. 30,31,23,32,22,28,24,29 where number of
12.
pointers that fit in node are 5.
13. Write down detailed notes on ordered indices and B-tree index files. [Nov/Dec 2012]
Why is hash structure not the best choice for a search key on which range of queries are
14.
likely? [April/May 2016]
Explain the distinction between static and dynamic hashing. Discuss the relative merits
15.
of each technique in database applications. [Nov/Dec 2017]
Give a detailed description about query processing and optimization. Explain the cost
16.
estimation of query optimization. [Nov/Dec 2013]
PART-A
The software system that permits the management of the distributed database and
makes the distribution transparent to users.
A DBMS running across multiple processors and disks that is designed to execute
i)To maintain direct correspondence between real world and database object, so that the
object will not loose its integrity and identity.
ii) The objects, which are complex, need not be scattered in the database, and hence to
Objects in OOPL exist only during program execution and are hence called transient
objects.
Objects in OODB can be extended, so that they can exist in permanent storage even after the
program termination. They are called persistent objects.
8. What is OID?
OO databases provide a unique system generated object -identifier (OID) for each
object. Its value is not visible to the external user and they are used to create and manage
inter - object references
.9.What are the characteristics an OID possess? (What are the properties of OID?)
1) State(Value) and
2) Behavior(Operation).
11. Write the formal structure of an object.
The six type constructors are : Atom, Tuple, Array, List, Bag and Set.
Array, List, Bag and Set are called Collection types or Bulk types.
13. Explain each type constructor.
Atom –If c is atom, the value v is atomic and it is supported by the system.
Set –The IODs for the set of objects are of same type. This does not allow duplicates.
Array-The IODs for the set of objects are single dimensional array of object identifier.
List –The list is similar to set, except that the OIDs are ordered.
Bag –Bag is also called multiset. This can also contain duplicate elements.
Two objects are said to have equal states, if their states at the atomic levels are the
same, but the values are reached through distinct objects.
Two objects are said to be in identical states, if the objects are identical even though the
objects themselves are not as they have distinct OIDs.
The internal structure of object is hidden and the object is accessible only through the
predefined operations.
i)Signature or interface of the operation –It specifies the operation name and arguments.
Visible attributes are the attributes that may be directly accessed for reading by
external operators or by high - level query language. Hidden attributes are the attributes that
are completely encapsulated and can be only applied through predefined operations.
Object constructors are the operations, which are used to create new object. Object
destructors are used to destroy objects. The object modifiers are the operations declared to
modify various attributes of an object.
19. What are the methods for creating persistent objects?
Persistent objects are the objects stored in databases that persist even after the
program termination. The techniques to create persistence objects are: Naming and reach
ability.
Naming mechanism involves giving an object a unique persistent name through which it can
be retrieved with this and other programs. The named persistent objects are the entry points to
the database.
The reach ability mechanism works by making the object reachable from some other
persistent object. Making the object to be referenced by another persistent object B can make
an object as persistent.
The subtype is the type, which must be formed from already existing type by
inheriting some of its features. The super type is the type from which the functions are
inherited.
name may refer to each distinct implementation, depending on the type of objects it is
applied to.
If the type of object to which the function is applied is not known until runtime and in
this
case the function must check the type of object and then invoke the appropriate method.
PART-B
Draw a neat sketch to indicate the architecture of a distributed database system. With
1.
an example explain the various form of data fragmentation used in DDB.
2. Explain detail in distributed databases and client/server databases.
3. Explain in detail about Dataware housing and data mining. [Nov/Dec 2015]
4. Explain in detail about mobile and web databases.
5. What is XML? Explain Breifly
6. Explain the types of database security and database security issues. [May/June 2016]
7. Explain clearly the Classification& clustering techniques.
8. Explain briefly the retrieval of information.
9. Explain in detail about Association & regression.
10. Explain Geographic information system.
11. Explain about cloud based databases.
12. Explain about XML query languages.
13. Give details about approaches used to store XML documents in database.
14. Describe Cloud storage architecture with neat diagram
Give the DTD or XML Schema for an XML representation of the following nested-
relational schema :
Emp = (ename, ChildrenSet setof (Children), SkillsSet setof (Skills)) Children = (name,
15. Birthday)
Birthday = (day, month, year) . ‘
Skills = (type, ExamsSet setof(Exams)) Wwwereceitigc swan Paper.com Exams=
(year, city) . . [NOV/DEC2016]
Explain about Distributed Databases and their characteristics, functions and advantages
16.
and disadvantages. [May/June 2016]
17. Explain the process of querying XML data with an example. [April/May 2017]
Explain the necessary characteristics a system must satisfy to be considered as an object
18.
oriented database management system. [April/May 2018]
UNIT-I
PART-A
1. Define algorithm.
statement 1
statement n
Algorithm sum(a,n)
{ S : = 0.0
For i=1 to n do
S : - S + a[i];
Return S;
if(n≤ 0) then
return 0.0;
PART-B
UNIT-II
PART-A
1. What is Empirical Analysis?
It is performed by running a program implementing the algorithm on a sample of
inputs and analyzing the data observed. This involves generating pseudo code and
random numbers.
5. Define O-Notation.
A function t(n) is said to be O (g(n)), denoted t(n) C O (g(n)), if t(n) is bounded
above by some constant multiple of g(n) for all large n, ie ., if there exist some positive
constant c and some nonnegative integer 0 such that
t(n) <= cg(n) for all>=0
11. What are the different criteria used to improve the effectiveness of algorithm?
Input- Zero or more quantities are externally supplied .
Output-At least one quantity is produced
Definiteness-Each instruction is clear and unambiguous
Finiteness-If we trace out the instructions of algorithm, then for all case the
algorithm terminates after finite number of steps
Effectiveness-Every instruction must be very clear
17.Define profiling?
Profiling is an important resource the empirical analysis of an algorithm running time.
Measuring n different segments of program can pinpoint a bottleneck in the program’s
performance that can be missed by an abstract deliberation about the algorithm’s basic
operations. The process of getting such data is called profiling.
18. Write the Control abstraction for Divide-and conquer.
Algorithm D And(ρ)
{ if small(p)
then return
S(ρ); else
{
divide P into smaller instance ρ 1, ρ 2, ρ k, k ≥ 1;
Apply D and C to each of these subproblems
Return combine (DAnd C(ρ1) DAnd C(ρ2),----, DAnd ((ρk));
}}
Successful searches
for i = 2 to n
do
if(a[i] >max)
}}
PART-B
1. Devise an algorithm to sort the following elements using merge sort technique
2. 286, 45,278,368,475,389,656,788,503,126
3. Write an efficient and exhaustive search algorithm for the traveling salesman
problem.
4. Explain Binary search in detail.
6. Solve the recurrence for the number of additions required by strassen’s algorithm.
(Assume that n is a power of 2)
7. Implement in C, the divide and conquer closest pair algorithm.
8. Explain the upper and lower hulls in the convex-hull problem, with an example.
9. Give a specific example of inputs that make the quickhull algorithm run in quadratic
time.
UNIT III
PART-A
25. Write the difference between the Greedy method and Dynamic programming.
PART-B
1. Apply Floyd’s algorithm or obtain all pair shortest path for the following graph.
Explain with the algorithm.
2. Solve the following instance of the 0/1 Knapsack problem for the given knapsack
capacity M=5.
UNIT-IV
PART-A
1. Define rotation?
A rotation in an AVL tree is a local transformation of its sub tree rooted at a node,
which is performed, when the balance factor of a node either +2 or -2.If an insertion or
deletion of a new node in AVL Tree creates a tree with a violated balance requirement,
then the tree is restructured by performing special transformation called rotation, that
restore the balance required.
2. What are the different type’s rotations?
The four types of rotations are.
Right rotation
Left rotation
Double right-left rotation
Double left right rotation.
5. Define Heap.
Heap is partially ordered data structure that is especially suitable for implementing
priority queues. A heap is said to be a max heap, then the children of every node have a
value less than that node. A heap is said to be a min heap, then the children of every node
have a value greater than node
PART-B
5. Explain how the maximum flow problem for a network with several sources and
sinks can be transformed into the same problem for a network with a single source
and a single link.
6. Define the following: source, sink, capacity, flow network and preflow.
7. Proof a matching M is maximal if and only if there exists no augmenting path
with respect to M.
8. Write an algorithm for Maximum Bipartite matching with example.
UNIT V
PART-A
1. Define backtracking.
Depth first node generation with bounding function is called backtracking. The backtracking
algorithm has its virtue the ability to yield the answer with far fewer than m trials.
8. What is heuristic?
A heuristic is common sense rule drawn from experience rather than from
mathematically proved assertion.
For example, going to the nearest unvisited city in the travelling salesman
problem is good example for heuristic.
10. Give the upper bound and lower bound of matrix multiplication algorithm?
Upper bound: The given algorithm does n*n*n multiplication hence at most
n*n*n multiplication are necessary.
Lower bound: It has been proved in the literature that at least n*n multiplications
are necessary.
13. What are the additional items are required for branch and bound compare to
backtracking technique?
Compared to backtracking, branch and bound requires 2 additional items.
1) A way to proved , for every node of node of state space tree, a bound on the best
value of the objective function on any solution that can be obtain d by adding further
components to the partial solution represented by the node.
2) The value of the best solution seen so far.
22. What are the requirements that are needed for performing Backtracking?
To solve any problem using backtracking, it requires that all the solutions satisfy a
complex set of constraints. They are:
i. Explicit constraints.
ii. Implicit constraints.
2. Solve the following instance of the knapsack problem by the branch & bound
algorithm.
3. Apply backtracking technique to solve the following instance of subset sum
problem:
S={1,3,4,5} and d=11
4. Solve the following 6 city traveling salesperson problem using the branch and
bound algorithm.
α 21 42 31 6 24
11 α 17 7 35 18
25 5 α 27 14 9
12 9 24 α 30 12
14 7 21 15 α 48
40 15 16 5 20 α
5. Explain how branch and bound technique is used to solve 0/1 knapsack problem.
for n=4 , W=10, (p1,p2,p3,p4) = (40,42,25,12) and (w1,w2,w3,w4) = (4,7,5,3).
7. Explain about assignment problem using branch and bound with example.
8. Discuss the solution for travelling salesman problem using branch & bound
technique.
9. Discuss the decision trees for sorting algorithms.
UNIT – I
PART-A
Program execution
I/O Operation
File-System manipulation
Communications
Error detection
A more common definition is that the OS is the one program running at all
times on the computer, usually called the kernel, with all else being application
programs.
Operators batched together jobs with similar needs and ran through the computer
as a group .The operators would sort programs into batches with similar
requirements and as system become available, it would run each batch.
Several users simultaneously compete for system resources (i.e) the job currently
waiting for I/O will yield the CPU to another job which is ready to do calculations,
if another job is waiting. Thus it increases CPU utilization and system throughput.
Application Programs
System Program
Operating
System
Computer
Hardware
Increased throughput
Economy of scale
Increased
reliability
Increased throughput
Economy of scale
Increased reliability
Asymmetric Clustering
In this clustering, one machine is in hot standby mode, while the other is running the
application. The hot standby machine just monitors the active server. If that
server fails, hot standby host become the active server.
Two or more hosts are running applications and they are monitoring each
other. This clustering requires more than one application be available to run and it
uses all of the available hardware.
Parallel clusters allow multiple hosts to access the same data on the shared storage.
Each machine has full access to all data in the database.
Real time systems are systems that have their in-built characteristics as supplying
Resource sharing
Load balancing
Reliability
Military applications.
22. What are the types of Real time
systems?
They are generally required to and they guarantee that the critical tasks are
completed in given amount of time.
Security weakness
User Mode
Monitor Mode
Error Detection
29. What is System Programs?
PART B
1. Briefly explain in detail the types of systems calls provided by a typical operating.
Nov/Dec2012
4. Explain how protection is provided for the hardware resources by the operating
system.
5. What are the system components of an operating system & explain them?
6. Write about the various system calls.
7. Explain the various memory hierarchies with neat block diagram.
8. Explain the different operations of processes.
UNIT-II
PART-A
1. Define process?
A process is more than a program code, which is sometime known as the text section. IT
also includes the current activity, as represented by the value of the program counter and
the processor’s registers.
Each process is represented in the operating system by a process control block (PCB) –
also
called as task control block. The PCB simply serves as the repository for any information
that may vary from process to process.
Process state
Program counter
CPU registers
Accounting information
Job Queue: As process enters the system they are put into job queue.
Ready Queue: The processes that are residing in the main memory and are ready
and waiting to execute are kept in the queue
Device Queue: The list of processes waiting for particular I/O device is called a device
queue.
6. Define schedulers?
A process migrates between the various scheduling throughout its lifetime. The operating
system must select, for scheduling purposes, processes from these queues in some fashion.
The selection process is carried out by the appropriate scheduler.
A solution to the critical section problem must satisfy the following 3 requirements.
Progress: If no process is executing in its critical section and some processes wish
to enter their critical sections, then only those processes that are not executing in their
remainder section can participate in the decision on which will enter its critical section
next, and this selection cannot be postponed indefinitely.
Bounded waiting: There exists a bound on the number of times that other
processes are allowed to enter their critical section after a process has made a request to
enter its critical section and before that request is granted.
Wait
Signal
wait indefinitely within a semaphore. Indefinite blocking may occur if we add and remove
processes from the list associated with a semaphore in LIFO order.
A process request resources; if the resource are not available at that time, the process enters a
wait
state. Waiting processes may never change state, because the resources they are requested
are held by other waiting processes. This situation is called deadlock.
Under the normal mode of operation, a process may utilize a resource in only the
following sequence:
Request: If the request cannot be granted immediately, then the requesting process
must wait until
A deadlock situation can arise if the following 4 condition hold simultaneously in a system.
Mutual Exclusion
No preemption
Circular Wait
A state is safe if the system allocates resources to each process in some order and still
avoid deadlock.
Information sharing: Since several users may be interested in the same piece of
information, we must provide an environment to allow concurrent access to these type of
resources.
Responsiveness
Resource sharing
Economy
An algorithm that examines the state of the system to determine whether a deadlock
has occurred
When several process access and manipulate same data concurrently, then the outcome of
the execution depends on particular order in which the access takes place is called race
condition. To avoid race condition, only one process at a time can manipulate the shared
variable
Consider a system consists of ‘n‘processes. Each process has segment of Code called a
critical section, in which the process may be changing common variables, updating a table,
writing a file. When one process is executing in its critical section, no other process can
allowed to execute in its critical section.
When a process is in its critical section, any other process that tries to enter its critical
section must loop continuously in the entry code. This is called as busy waiting and this type
of semaphore is also called a spinlock, because the process while waiting for the lock.
24. What are the requirements that a solution to the critical section problem must
satisfy?
Mutual Exclusion
Progress
Bounded waiting
The critical section problem is to design a protocol that the processes can use to cooperate.
Each process must request permission to enter its critical section. The section of the code
implementing this
request is the entry section. The critical section is followed by an exit section. The
remaining code is the remainder section.
26. What are conditions under which a deadlock situation may arise?
A deadlock situation can arise if the following four conditions hold Simultaneously in a
system: a. Mutual exclusion
Deadlocks can be described more precisely in terms of a directed graph called a system
resource allocation graph. This graph consists of a set of vertices V and a set of edges
E. The set of vertices V is partitioned into two different types of nodes; P the set
consisting of all active processes in the system and R the set consisting of all resource
types in the system.
PART-B
1. Explain any three policies for process scheduling tha uses resource consumption
information. what is response ratio.(16) Nov/Dec 2014
2. What are semaphores? how do they implement mutual exclusion?(8). Nov/Dec 2014
3. Give a solution for readers-writers problem using condition critical regions (8).
Nov/Dec 2014
4. How does a deadlock can be avoided using banker’s algorithm (8). Nov/Dec 2013
5. Discuss in detail the critical section problrms and also write the algorithm for readers-
writers problem with semaphores. (8) Nov/Dec 2013
6. Explain the difference in the degree to which FCFS,RR,Non-preemptive SJF
scheduling algorithm, discriminate in favour of short process. (16) Nov/Dec 2013
8. What is critical section? specify the requirements, for a solution to the critical section
problem. (8) Nov/Dec 2012
12. What is critical section problem and explain two process solutions and multiple
Process solutions?
13. Explain what semaphores are, their usage, implementation given to avoid busy
waiting and binary semaphores.
19. What is the important feature of critical section? State the dining philosophers
problem and How to allocate the several resources among several processes in a
deadlock and starvation free manner.
20. Consider the following five processes, with the length of the CPU burst time given in
milliseconds.
P2 29
P3 3
P4 7
P5 12
21. Consider the First come First serve(FCFS),Non Preemptive Shortest Job First(SJF),
23. How many page faults would occur for the following replacement algorithms,
assuming three frames that all frames are initially empty?
Construct a Resource Allocation Graph for the following scenario. At time’t’ ProcessP1
request for a resource X, process P2 requests for a resource Y. Both the resources are
Available and they are allocated to the requesting process. At time t1 where t1>t2 both
the processes are still holding the resources, however process P1 request for Y which is
held by P2, process P2 request for X held by P1. Will there be a deadlock? f there is a
deadlock discuss the four necessary conditions for deadlock, else justify there is no
deadlock
24. Consider the following snapshot of a system. Execute Banker's algorithm answer the
following. Allocation Max Available
A B C D A B C D A B C D P0
0 0 1 1 0 0 1 1 1 5 2 2 P1 1 0 0
11751
P3 1 3 5 1 2 3 5 2
P4 0 0 1 1 5 6 5 1
25. What are the methods involved in recovery from deadlocks?
26. Explain implementation of producers/Consumers problem using monitor.
27. Discuss the critical section problem. State the basic requirements of critical sectio
problem solution.
UNIT-III
PART-A
To enable a process to be larger than the amount of memory allocated to it, overlays are
used. The idea of overlays is to keep in memory only those instructions and data that are
needed at a given time. When other instructions are needed, they are loaded into space
occupied previously by instructions that are no longer needed.
4. Define Swapping.
Best fit allocates the smallest hole that is big enough. The entire list has to be searched,
unless it is sorted by size. This strategy produces the smallest leftover hole.
First fit allocates the first hole that is big enough. Searching can either start at the beginning
of the set of holes or where the previous first-fit search ended. Searching can be stopped as
soon as a free hole that is big enough is found.
Protection bits that are associated with each frame accomplish memory protection in a
paged environment. The protection bits can be checked to verify that no writes are being
made to a read-only page.
External fragmentation exists when enough total memory space exists to satisfy a request,
but it is not contiguous; storage is fragmented into a large number of small holes.
When the allocated memory may be slightly larger than the requested memory, the
difference between these two numbers is internal fragmentation.
Paging is a memory management scheme that permits the physical -address space of a
process to be non-contiguous. In the case of paging, physical memory is broken into fixed-
sized blocks called frames and logical memory is broken into blocks of the same size called
pages.
When the bit is set to valid, this value indicates that the associated page is in the process’s
logical address space, and is thus a legal page. If the bit is said to invalid, this value indicates
that the page is not in the process’s logical address space. Using the valid-invalid bit traps
illegal addresses.
Segmentation is a memory management scheme that supports the user view of memory. A
logical address space is a collection of segments. The logical address consists of segment
number and offset. If the offset is legal, it is added to the segment base to produce the
address in physical memory of the desired byte.
14. A Program containing relocatable code was created, assuming it would be loaded at
address 0. In its code, the program refers to the following addresses:
50,78,150,152,154. If the program is loaded into memory starting at location 250, how
do those addresses have to be adjusted?
All addresses need to be adjusted upward by 250.So the adjusted addresses would be 300,
328, 400, 402, and 404.
Virtual memory is a technique that allows the execution of processes that may not be
completely in memory. It is the separation of user logical memory from physical memory.
This separation provides an extremely large virtual memory, when only a smaller physical
memory is available.
Virtual memory is commonly implemented by demand paging. In demand paging, the pager
brings only those necessary pages into memory instead of swapping in a whole process. Thus
it avoids reading into memory pages that will not be used anyway, decreasing the swap time
and the amount of physical memory needed.
17. Define Lazy Swapper.
Rather than swapping the entire process into main memory, a lazy swapper is used. A lazy
swapper never swaps a page into memory unless that page will be needed.
When starting execution of a process with no pages in memory, the operating system
sets the instruction pointer to the first instruction of the process, which is on a non-
memory resident page, the process immediately faults for the page. After this page is
brought into memory, the process continues to execute, faulting as necessary until every
page that it needs is in memory. At that point, it can execute with no more faults. This
schema is pure demand paging.
Let p be the probability of a page fault close to 0; that is, there will be only a few page
faults. The effective access time is,
Effective access time = (1-p)*ma+p*page fault time ma: memory access time
This memory holds those pages that are not present in main memory. The secondary
memory is usually a high speed disk. It is known as the swap device, and the section of the
disk used for this purpose is known as swap space.
If no frame is free is available, find one that is not currently being used and free it. A frame
can be freed by writing its contents to swap space, and changing the page table to
indicate that the page is no longer in memory. Now the freed frame can be used to hold the
page for which the process faulted.
22. What is the various Page Replacement Algorithms used for Page Replacement?
Virtual memory is a technique that allows the execution of processes that may not be
completely in memory. It is the separation of user logical memory from physical memory.
This separation provides an extremely large virtual memory, when only a smaller physical
memory is available.
This memory holds those pages that are not present in main memory. The secondary memory
is usually a high speed disk. It is known as the swap device, and the section of the disk used
for this purpose is known as swap space.
PART-B
3. What is the maximum file size supported by a file system with 16 direct blocks, single,
double, and triple indirection? The block size is 512 bytes. Disk block number can be
stored in 4 bytes. Nov/Dec 2014
4. List the steps needed to perform page replacement. Nov/Dec 2014
5. Explain with the help of examples FIFO and LRU page replacement algorithms.(8)
Nov/Dec 2014
7. Briefly explain and compare, fixed and dynamic memory partitioning schemes.
Nov/Dec 2012
8. Explain with the help of examples FIFO and LRU, optical page replacement algorithms
with example reference string. Mention the merits and demerits of each of the above
algorithm. Nov/Dec 2012
9. Explain how paging supports virtual memory. With neat diagram explain hoe logical
address is translated into physical address. Nov/Dec 2012
19. Discuss the advantages of paging memory management and the conversion of logical
address into physical address with necessary
UNIT-IV
PART-A
What is a File?
File attributes: Name, identifier, type, size, location, protection, time, date
A file has certain other attributes, which vary from one operating system to another, but
typically consist of these: Name, identifier, type, location, size, protection, time, date and user
identification.
3. What are the various File Operations? The basic file operations are,
Creating a file
Writing a file
Reading a file
Deleting a file
Truncating a file
Several pieces of information are associated with an open file which may be:
File pointer
Access rights
5. What are the different Accessing Methods of a File? The different types of accessing a
file are:
Direct access: Information in the file can be accessed without any particular order.
Other access methods: Creating index for the file, indexed sequential access method
6. What is Directory?
The device directory or simply known as directory records information- such as name,
location, size, and type for all files on that particular partition. The directory can be viewed
as a symbol table that translates file names into their directory entries.
7. What are the operations that can be performed on a Directory? The operations that
can be performed on a directory are,
Create a file
Delete a file
Rename a file
Listdirectory
Traverse the file system
8. What are the most common schemes for defining the Logical Structure of a
Directory? The most common schemes for defining the logical structure of a directory
Single-Level Directory
Two-level Directory
Tree-Structured Directories
Acyclic-Graph Directories
In the two-level directory structure, each user has own user file directory Each UFD has a
similar structure, but lists only the files of a single user. When a job starts the system‟s master
file directory
A pathname is the path from the root through all subdirectories to a specified file. In a two-
level directory structure a user name and a file name define a path name.
The most general scheme to implement identity-dependent access is to associate with each
file and directory an access control unit.
The way to split „m’ frames among „n’ processes is to give everyone an equal share, m/n
frames. For instance, if there are 93 frames and 5 processes, each process will get 18 frames.
The leftover 3 frames could be used as a free-frame buffer pool. This scheme is called equal
allocation.
13. What is the cause of Thrashing? How does the system detect thrashing? Once it
detects thrashing,
14. If the average page faults service time of 25 ms and a memory access time of
100ns.Calculate the effective access time.
Effective access time = (1-p) *ma + p*page fault time = (1-p) *100+p*25000000
= 100-100p+25000000*p = 100 + 24999900p
For some page replacement algorithms, the page fault rate may increase as the number of
allocated frames increases.
16. What are the types of Path Names? Path names can be of two types.
Absolute path name: Begins at the root and follows a path down to the specified file,
giving the directory names on the path.
The locality model states that, as a process executes, it moves from locality to locality.
Locality is of two types.
Spatial locality
Temporal locality.
The time taken by the head to move to the appropriate cylinder or track is called seek time.
Once the head is at right track, it must wait until the desired block rotates under the read-
write head. This delay is latency time.
Three major methods of allocating disk space which are widely in use are
Contiguous allocation
Linked allocation
Indexed allocation
20. What are the advantages of Contiguous Allocation? The advantages are,
21. What are the drawbacks of Contiguous Allocation of Disk Space? The disadvantages
are,
No external fragmentation
SCAN Scheduling
C-SCAN Scheduling
LOOK scheduling
Programmed I/O
26. Give an example of an application in which data in a file should be accessed in the
following order:
Sequentially - Print the content of the file.
Randomly - Print the content of record i. This record can be found using hashing or index
techniques.
PART-B
1. Discuss the different techniques with which a file can be shared among different
users. Nov/Dec 2014
3. Explain the concept of demand paging and the performance issue of demand paging.
Nov/Dec 2014
12. Give an example for an application that could benefit from operating system support for
random access to indexed files.
13. List and briefly discuss the most common schemes for defining the logical structure of a
directory.
14. With necessary diagram explain the different allocation methods of disk space.
15. List and discuss various methods for implementing a directory. Single-Level
directory
17. Explain the indexed and linked file allocation methods. Discuss the advantages and
Disadvantages in those methods.
UNIT V
PART-A
1. List three main bodies of Linux System.
Kernel.
System libraries
System utilities
The module loader and unloader, which are user-mode utilities, work
with the module-management system to load a module into memory.
The driver-registration system allows modules to tell the rest of the
kernel that a new driver has become available.
Aconflict-resolution mechanism allows different device drivers to
reserve hardware resources and to protect those resources fromaccidental
use by another driver.
processor. All processes, regardless of the target latency,will run for at least the
minimum granularity.
10. What is big kernel lock.
single kernel spinlock (sometimes termed
BKL for “big kernel lock”) was created to allow multiple processes (running on
different processors) to be active in the kernel concurrently. However, the BKL
provided a very coarse level of locking granularity, resulting in poor scalability
to machines with many processors and processes.
11. four different zones, or regions that linux separates physical memory:
• ZONE DMA
• ZONE DMA32
• ZONE NORMAL
• ZONE HIGHMEM
12. a slab may be in one of three possible states:
Second, the paging mechanism carries out the transfer and pages data back
PART-B
UNIT I
PART-A
Level 4:Managed – Both the software process and product are quantitatively
understood
and controlled using detailed measures.
Level 5:Optimizing – Establish mechanisms to plan and implement change.
23. What are the new practices that are appended to XP to create IXP
Readiness Assessment
Project Community
Project Chartering
Test Driven Management
Retrospectives
Continuous Learning
25. What are the five values defined by beck that serve as a basis for the
work performed in XP?
Communication
Simplicity
Feedback
Courage
Respect
PART-B
1. Explain iterative waterfall and spiral model for software life cycle and various
activities in each phase. (AU: May-15)
2. Explain how waterfall model is applicable for the development of the following
systems:
a) University Accounting Systems
b) Interactive systems that allow railway passengers to find time and other
information from the terminals installed in the station.
3. Explain about the software process model that is refined and expanded in later
releases
4. Explain in detail about the software process.
5. Explain in detail about the life cycle process.
6. Discuss the prototyping model. What is the effect of designing a prototype on the
overall cost of the software project? (AU: May-16)
7. Explain about rapid prototyping techniques.
8. A software project which is considered to be very simple and the customer in position
of giving all the requirements at the initial stage, which process model would you
prefer for developing the project?
9. Assume that you are the technical manager of a software development organization. A
client approached you for a software solution. The problems stated by the client have
uncertainties which lead to loss if it not planned and solved. Which software
development model will suggest for this project – justify. Explain the model with its
pros and cons and neat sketch.
10. What is the role of user participation in the selection of life cycle model?
11. What is process model? Describe the process model that you would chose to
manufacture car. Explain by giving suitable reasons.
UNIT II
PART-A
16. What is the major distinction between user requirements and system
requirement?
The user requirements describe both the functional and non functional
requirements in such a way that they are understandable by the user who do not
have detailed technical knowledge. On the other hand the system requirements
are more detailed specification of system functions, services and constraints than
user requirements.
The user requirements are specified using natural language whereas system
model expressed in system models.
PART-B
1. Explain in detail about data modeling.
2. Explain in detail about Functional Modeling.
3. Explain in detail about Structural Modeling.
4. Explain the merits used for specifying non functional requirements.
(AU: May-13, May-16)
5. What are the components of the standard structure for the software requirements
document?
6. Explain the organization of SRS and highlight the importance of each subsection.
7. What is requirement engineering? Explain in detail the various processes in
requirement engineering. (AU: May-17)
8. An independent truck company wants to track and record its driver driving habits. For
this purpose the company has rented 800 phone numbers and has printed the numbers
in the front, back and sides of all trucks owned by the company. Next to the 800
numbers a massage is written “PLEASE REPORT ANY DRIVER OR TRUCK
PROBLEM BY CALLING THIS NUMBER”. The hacking company waits for you to
develop a system that:
a. Collect information from caller about driver performance and behavior as well
as truck condition,
b. Generates daily and monthly reports for each driver and truck management
c. Reports problems that require immediate action to an on-duty manager.
Analyze the problems that statement and list major functions to be incorporated with
the SRS document.
9. Explain the feasibility studies. What are the outcomes? Does it have implicit or
explicit effects on software requirement collection? (AU: May-17)
10. What is requirement elicitation? Briefly describe the various activities performed in
the requirements elicitation phase with an example of a watch system that facilitates
to set time and alarm. (AU: Dec-16, May-18)
11. Design DFD for library management system for level 0 DFD and level 1 DFD
12. Consider an online book stores. It accepts individual/bulk orders, process payments,
triggers delivery of the books. Some of the major features of the system include:
a. Order books
b. User friendly online shopping cart function
c. Create, view, modify and delete books to be sold
d. To store inventory and sales information in database
e. To provide an efficient inventory system
f. Register for book payment options
g. Request book delivery
h. Add a wish list
i. Place request for books not available
j. To be able to print invoices to members and print a set of summary reports
k. Internet access
Analyze the system using the context diagram and level 1 DFD for the system.
Explain the components of DFD
13. Consider the process of ordering a pizza over the phone. Draw the use case diagram
and also sketch the activity diagram representing each step of the process, from the
moment you pick up the phone to the point where you start eating the pizza. Include
activities that others need to perform. Add exception handling to the activity diagram
you developed. Consider at-least two exceptions (Example Delivery person wrote
down wrong address, deliver person brings wrong pizza)
14. What is the purpose of DFD? What are the components of DFD? Construct DFD for
the following system: An online shopping system for XYZ provides many services
and benefits to its members and staffs manually handle the purchasing information
with the use of basic office software, such as Microsoft office word and excel. It may
results in having mistakes easily and the process is very inconvenient. XYZ needs an
online shopping system has five key features:
a. To provide the user friendly online shopping cart function to members to
replace hardcopy ordering form;
b. To store inventory and sales information in database to reduce the human
mistakes, increase accuracy and enhance the flexibility of information
processing;
c. To provide an efficient inventory system which can help the XYZ staffs to
gain enough information to update the inventory;
d. To be able to print invoices to members and print a set of summary reports for
XYZ’s internal usage;
To design the system that is easy to maintain and upgrade.
UNIT III
PART-A
1. What are the elements of design model?
i. Data design
ii. Architectural design
iii. Interface design
iv. Component-level design
5. Define Modularity.
The modularity is an approach used during the designing of the software
system. I this approach, the software is divided into separately named and
addressable components called modules. Due to modularity, the program
becomes manageable.
1. Explain about the various design concepts considered during the design.
(AU: Dec-17)
2. Discuss in detail about the design process in software development process.
3. What is software architecture? Describe in detail different types of software
architectures with illustrations. (AU: May-17)
4. Discuss the design heuristics for effective modularity design. (AU: May-16)
5. What is software architecture? Describe in detail different software architectural
styles with examples. (AU: May-18)
6. Explain the design steps of the transform mapping.
7. Explain the design steps in transaction mapping.
8. Discuss about user interface design of software with an example and neat sketch.
(AU: Dec-17)
9. For an inventory system show the architectural and component design.
UNIT IV
PART-A
Validation refers to a different set of activities that ensure that the software
that has been built is traceable to the customer requirements.
According to Boehm,
Verification:” Are we building the product right?”
Validation:” Are we building the right product?”
13. What are the various testing strategies for conventional software? (May-
06)
i. Unit testing ii. Integration testing.
iii. Validation testing. iv. System testing.
14. Write about drivers and stubs. (Dec -17)
Drivers and stub software need to be developed to test incompatible software.
The “ driver” is a program that accepts the test data and prints the relevant
results.
The “ stub” is a subprogram that uses the module interfaces and performs
the minimal data manipulation if required.
15. What are the approaches of integration testing?
The integration testing can be carried out using two approaches.
1. The non-incremental testing.
2. Incremental testing.
16. What are the advantages and disadvantages of big-bang? Advantages:
This approach is simple.
Disadvantages:
It is hard to debug.
It is not easy to isolate errors while testing.
In this approach it is not easy to validate test results.
After performing testing, it is impossible to form an integrated system.
17. What are the benefits of smoke testing?
Integration risk is minimized.
The quality of the end-product is improved.
Error diagnosis and correction are simplified.
Assessment of program is easy.
18. What are the conditions exists after performing validation testing?
After performing the validation testing there exists two conditions.
The function or performance characteristics are according to the
specifications and are accepted.
The requirement specifications are derived and the deficiency list is created.
The deficiencies then can be resolved by establishing the proper
communication with the customer.
19. Distinguish between alpha and beta testing.
Alpha and beta testing are the types of acceptance testing.
Alpha test: The alpha testing is attesting in which the version of complete
software is tested by the customer under the supervision of developer. This
testing is performed at developer‟s site.
Beta test: The beta testing is a testing in which the version of the software
is tested by the customer without the developer being present. This testing
is performed at customer‟s site.
20. What are the various types of system testing?
1. Recovery testing – is intended to check the system‟ s ability to recover
from failures.
2. Security testing – verifies that system protection mechanism prevent
improper penetration or data alteration.
3. Stress testing – Determines breakpoint of a system to establish maximum
service level.
4. Performance testing – evaluates the run time performance of the
software, especially real-time software.
21. What is smoke Testing? (May- 17)
The smoke testing is a kind of integration testing technique used for time critical
project where in the project need to be assessed on frequent basis.
22. Define debugging.
Debugging is defined as the process of removal of defect. It occurs as a
consequence of successful testing.
23. Identify the type of maintenance for each of the following:
a) Correcting the software faults
b) Adapting the change in environment.
Corrective maintenance
Adaptive maintenance
24. What is the need of Regression testing? (May-15)
Regression testing is required to test the defects that get propogated from one
module to another when changes are made to existing program. Thus regression
testing is used to reduce the side effects of changes
25. What are the common approaches in debugging?
Brute force method: The memory dumps and run-time tracks are
examined and program with write statements is loaded to obtain clues to
error causes.
Back tracking method: The source code is examined by looking
backwards from symptom to potential causes of errors.
Cause elimination method: This method uses binary partitioning to reduce the number
of locations where errors can exists.
PART-B
UNIT V
PART-A
1. Define measure.
Measure is defined as a quantitative indication of the extent, amount,
dimension, or size of some attribute of a product or process.
2. Define metrics.
Metrics is defined as the degree to which a system component, or process
possesses a given attribute.
3. What are the types of metrics?
Direct metrics – It refers to immediately measurable attributes. Example –
Lines of code, execution speed.
Indirect metrics – It refers to the aspects that are not immediately quantifiable
or measurable. Example – functionality of a program.
4. What are the advantages and disadvantages of size measure? Advantages:
Artifact of software development which is easily counted.
Many existing methods use LOC as a key input.
A large body of literature and data based on LOC already exists.
Disadvantages:
This method is dependent upon the programming language.
This method is well designed but shorter program may get suffered.
It does not accommodate non procedural languages.
In early stage of development it is difficult to estimate LOC.
5. Write short note on the various estimation techniques.
Algorithmic cost modeling – the cost estimation is based on the size of the
software.
Expert judgement – The experts from software development and the
application domain use their exoerience to predict software costs.
Estimation by analogy – The cost of a project is computed by comparing the
project to a similar project in the same application domain and then cost can be
computed.
Parkinson’s law – The cost is determined by available resources rather
than by objective assessment.
Pricing to win – The project costs whatever the customer ready to spend it.
6. What is COCOMO model?
COnstructive COst MOdel is a cost model, which gives the estimate of
number of man- months it will take to develop the software product.
7. Give the procedure of the Delphi method.
1. The co-ordinator presents a specification and estimation form to each expert.
2. Co-ordinator calls a group meeting in which the experts discuss estimation
issues with the coordinator and each other.
3. Experts fill out forms anonymously.
4. Co-ordinator prepares and distributes a summary of the estimates.
5. The Co-ordinator then calls a group meeting.In this meeting the experts mainly
discuss the points where their estimates vary widely.
6. The experts again fill out forms anonymously.
7. Again co-ordinator edits and summarizes the forms,repeating steps
5 and 6 until the co-ordinator is satisfied with the overallprediction synthesized
from experts.
8. What is the purpose of timeline chart?
The purpose of the timeline chart is to emphasize the scope of the individual
task. Hence set of tasks are given as input to the timeline chart.
9. What is EVA? (May-18)
Earned Value Analysis is a technique of performing quantitative analysis of
the software Project.It provides a common value scale for every task of software
project.It acts as a measure for software project progress.
10. What are the metrics computed during error tracking activity?
Errors per requirement specification page.
Errors per component-design level
Errors per component-code level
DRE-requirement analysis
DRE-architectural analysis
DRE-component level design
DRE-coding.
11. Why software change occurs?
Software change occurs because of the following reasons. ¾_New
requirements emerge when the software is used. ¾_The business environment
changes. ¾_Errors need to be repaired. ¾_New equipment must be
accommodated. ¾_The performance or reliability may have to be improved.
12. Write about software change strategies.
The software change strategies that could be applied separately or together are:
a. Software maintenance – The changes are made in the software
due to requirements.
b. Architectural transformation – It is the process of changing one
architecture into another form.
c. Software re-engineering – New features can be added to existing
system and then the system is reconstructed for better use of it in
future.
13. What is software maintenance?
Software maintenance is an activity in which program is modified after it has
been put into use.
14. Define maintenance.
Maintenance is defined as the process in which changes are implemented by
either modifying
the existing system‟ s architecture or by adding new components to the
system.
15. What is Risk Management? (Dec-16)
Risk management refers to the process of making decision based on an
evaluation of factors that treats to be business.
Various activities that are carried out for risk managements are
Risk identification
Risk Projection
Risk Refinement
Risk mitigation, monitoring and management.
16. List out the principles of Project Scheduling. (Dec-17)
Compartmentalize
Interdependency
Time allocation
Effort Validation
Defined Responsibilities.
17. What are the different types of productivity estimation measures? (May-
17)
LOC based Estimation
Function based estimation
18. What is architectural evolution?
Architectural evolution is the process of changing a system from a centralized
architecture to a distributed architecture like client server.
PART-B