Menu

SMU/IGNOU/NMIMS/ANNAMALAI ASSIGNMENTS

SYNOPSIS, PROJECTS & MODEL PAPERS AVAILABLE

FOR SOLUTIONS OF ASSIGNMENTS AT NOMINAL COST FEEL FREE TO MAIL US- solvemyassignments@gmail.com

SMU BSCIT FALL 2017

SEM 1  SEM 2  SEM 3  SEM 4  SEM 5  SEM 6

SMU BSCIT SUMMER 2017

SEM 1  SEM 2  SEM 3  SEM 4  SEM 5  SEM 6

SMU BSCIT SPRING 2017

SEM 1  SEM 2  SEM 3  SEM 4  SEM 5  SEM 6

SMU BSCIT WINTER 2016 

SEM 1  SEM 2  SEM 3  SEM 4  SEM 5  SEM 6

SMU BSCIT FALL 2016 

SEM 1  SEM 2  SEM 3  SEM 4  SEM 5  SEM 6

SMU BSCIT SEM 1 FALL 2016 ASSIGNMENTS

BIT101-FUNDAMENTALS OF INFORMATION TECHNOLOGY

1 What is mainframe computer? List and explain the types of mainframe computer

2 What is system development model? Explain the waterfall and spiral model.

3 Explain the following

• Web Browsers

• Web Servers

• WWW

 

BIT102- DIGITAL ELECTRONICS

1 List and explain the following types of number system with example

• Decimal Number System

• Binary Number System

• Octal Number System

2 What is Boolean Algebra? List and explain the Law of Boolean Algebra

3 What is Asynchronous ripple counter? Explain 3- Bit Asynchronous Up Counter with circuit diagram and Truth table.

 

BIT104-PRINCIPLES OF C PROGRAMMING

1 Explain the basic structures of C programming.

2 What is Bitwise operator? List and explain the Bitwise operator with example

3 What is two dimensional array? Write a C program to add two matrices.

SMU BSCIT SEM 3 FALL 2016 ASSIGNMENTS

 

BT0074, OOPS with JAVA

1 What are the keywords that java supports? Describe the data types available in java programming language.

2 Describe the syntax and working of if-else with an example. Also write a program in java that assigns a grade based on the value of a test score: an A for a score of 90% or above, a B for a score of 80% or above, and so on.

3 Describe with the help of an example the implementation of inheritance in java.

4 What is needed to write JSP based web application? How does JSP look? How to test JSP?

5 Discuss the information stored in X 509 certificates.

6 Explain the different JDK Security tools.

 

BT0075, RDBMS and MySQL

1 Explain the blob, text and enum data types.

2 How to alter databases and tables? Explain with the help of examples.

3 Explain CALL statements with examples.

4 Mention the properties of the account that is created using GRANT statement.

5 Define grant tables. Describe the steps to set up MySQL user accounts. Also explain the method to assign passwords to the anonymous accounts.

6 Briefly describe the binary log.

 

BT0076, TCP/IP

1 Define frame relay. Describe its format with diagram.

2 Define ports and explain the two types of ports.

3. Write note on:

1. The Hierarchical Namespace

2. Fully Qualified Domain Names (FQDNs)

4 Write short notes on SMTP.

5 With block diagram give an overview of Web Browser.

6 Give an overview of Simple Network Management Protocol (SNMP).

 

BT0077, Multimedia Systems

1 Explain the following color models

1. HSB model

2. RGB model

3. CMYK model

4. L*a*b model

2 Describe in brief the following:

1. Calligraphy

2. Text in multimedia application

3 Mention the important features of these type of images:

1. JPEG

2. PNG

3. GIF

 

BT0083, Server Side Programming-Theory

1 Draw and explain the diagram of website development life cycle.

2 Describe the following in context of validating XML documents with DTDs

1. Concept of data validation

2. Writing document type definition (DTD) files

3. Internal and external DTDs

4. Validating parsers

5. The NMTOKEN and NMTOKENS Type

3 Explain XPath Functions and Predicates.

SMU BSCIT SEM 4 FALL 2016 ASSIGNMENTS

 

BT0080, Fundamentals of Algorithms

1 Describe insertion sort algorithm with the help of an example. Give the complexity of it.

2 State the concept of divide and conquer strategy with the help of an example.

3 Prove the theorem

“A given connected graph G is a Euler graph Û all the vertices of G are of even degree.”

4 Explain Adjacency and Incidence Matrix.

5. State Cook’s theorem.

6 Mention different classification of problems.

 

BT0081, Software Engineering

1 Explain different kinds of software applications.

2 What are the Limitations of waterfall model? Explain in brief.

3 Discuss the “Importance of People in the Problem-Solving Process”.

4 How software technology helps business organization?

5 Explain Black-Box Testing in detail

6 Mention the different Architectural Alternatives. Explain the briefly.

 

BT0082, Visual Basic

1 Explain the event driven applications in VB.NET.

2 Explain the event driven applications in vb.net. Explain common control events and common form events in vb.net.

3 Describe the concept of Exit Try statement in VB.NET with an example.

4 How to objectify your programs?

5 Explain the mechanics of Implementation of Interface.

6 Explain the mechanism of thread creation.

 

BT0083, Server Side Programming-Theory

1 Describe java servlets and compare it with CGI.

2 Explain handling the form elements to retrieve the data from form using servlet API. Give some examples

3 Write a note on tracking the sessions using cookies. Give advantages and disadvantages of cookies.

4 Explain the two JSP architectures.

5 What is the function and advantages of jsp: plugin element? State The difference between JSP: include and include directive.

6 What is the need for MVC(Model View Controller) ?

SMU BSCIT SEM 6 FALL 2016 ASSIGNMENTS

 

BT9402, Artificial Intelligence

1 Briefly explain Attributes of Artificial Intelligence (AI).

2 Explain State Space Search. What do you mean by production system?

3 Explain the Inheritance and Reification in semantic networks.

4 Explain the two principal parts of an expert system.

5 Discuss the characteristics of robot.

6 Briefly explain the Basic Data Structure and Syntax of Prolog.

 

BT0092, Software Project Management

1 Explain any five activities involved in project management.

2 Define software cost estimation process. Why it is required?

3 Define risk assessment. Explain the elements of risk assessment and risk control.

4 Mention and explain different types of Software Testing.

5 What is the role of software reengineering?

6 Explain the Role of Closure Analysis.

 

BT9301, Computer Graphics

1Explain image processing through picture analysis. List the uses of interactive graphics.

2Write and explain midpoint circle drawing algorithm.

3 Define polygon filling. Explain flood fill algorithm for polygon filling.

4  Write Liang Barkey’s line clipping algorithm. Write advantages of it.

5 Explain Two dimensional transformations.

6 Write short notes on Three Dimensional Viewing.

SMU BSCIT SEM 5 SUMMER 2016 ASSIGNMENTS

BT0086, Mobile Computing

1 How “wireless and mobile are two different concepts”. Explain any two applications that use wireless networks and mobile communications.

2 What is modulation? Briefly explain Amplitude Modulation (AM), Frequency Modulation (FM) & Phase modulation (PM).

3 Explain the GSM TDMA frame with the help of frame structure.

4 Explain Hard handover and Soft handover in UMTS.

5 List the advantages and disadvantages of Infra-red technology.

6 Write short notes on:

(a) HiCoMo: High Commit Mobile Transaction Model

(b) Kangaroo mobile transaction model

 

BT0087, WML and WAP Programming-Theory

1 Explain doctype declaration and line breaking in WML with examples.

2 Describe the various data types available in WML script.

3 Briefly explain the WML external functions with an example

 

BT0088- Cryptography and Network Security

1 Explain Caesar’s Cipher encryption technique.

2 Explain data encryption standard (DES).

3 Describe the principles of Public-Key Cryptosystems.

4 Write short notes on the following:

a) Digital signature

b) Attacks on digital signature

5  Describe Kerberos.

6 Explain Security Socket Layer (SSL).

 

BT8903, C# Programming

1 Define type conversion. Explain implicit and explicit type conversions.

2 Write a note on the following :

1. Mutable strings

2. Arrays of strings

3. Regular expressions

3 Explain the following in context of methods in C# with the help of examples:

1. Invoking methods

2. Nesting of methods

4 Define members. Explain constant members and read only members.

5 Define and explain the class visibility and class members’ visibility.

6 Describe the methods used to handle exceptions. Provide examples.

 

BT8901, Object Oriented Systems

1 Explain State charts and Activity Diagrams with examples.

2 What is Booch methodology? Explain its macro and micro development processes.

3 Explain the structural things in UML.

4 Discuss Extracting Entity Classes. Draw necessary diagram.

5 Explain the Elaboration Phase and Construction Phase of unified process.

6 Explain Synchronize-and-Stabilize Team Organization with an example.

 

BT9001, Data Mining

1 Describe the Three–Tier Data Warehouse Architecture.

2 How data mining is used in telecommunication field? Explain.

3 Define noisy data. Briefly explain the data smoothening techniques.

4 Briefly explain mining quantitative association rules.

5 Briefly explain Agent Based and Database Approaches to web mining.

6 Define text mining. State the text retrieval methods

 

BT9002, Grid Computing

1 What are the components that are necessary to form a grid?

2 Briefly explain the various layers of grid architecture.

3 Explain autonomic computing and its properties.

4 Briefly explain the scenarios and use case situation analysis in virtual organization grid portal.

5 Explain OGSA core platform components with diagram.

6 Briefly explain the major components of OSGI.net.

SMU BSCIT SEM 5 SPRING 2016 ASSIGNMENTS

BT0086, Mobile Computing

1 How “wireless and mobile are two different concepts”. Explain any two applications that use wireless networks and mobile communications.

2 What is modulation? Briefly explain Amplitude Modulation (AM), Frequency Modulation (FM) & Phase modulation (PM).

3 Explain the GSM TDMA frame with the help of frame structure.

4 Explain Hard handover and Soft handover in UMTS.

5 List the advantages and disadvantages of Infra-red technology.

6 Write short notes on:

(a) HiCoMo: High Commit Mobile Transaction Model

(b) Kangaroo mobile transaction model

 

BT0087, WML and WAP Programming-Theory

1 Explain doctype declaration and line breaking in WML with examples.

2 Describe the various data types available in WML script.

3 Briefly explain the WML external functions with an example

 

BT0088- Cryptography and Network Security

1 Explain Caesar’s Cipher encryption technique.

2 Explain data encryption standard (DES).

3 Describe the principles of Public-Key Cryptosystems.

4 Write short notes on the following:

a) Digital signature

b) Attacks on digital signature

5 Explain IP security policy.

6 Write a note on Wireless Transport Layer Security (WTLS).

 

BT8901, Object Oriented Systems

1 Explain State charts and Activity Diagrams with examples.

2 What is Booch methodology? Explain its macro and micro development processes.

3 Explain the structural things in UML.

4 Discuss Extracting Entity Classes. Draw necessary diagram.

5 Explain the Elaboration Phase and Construction Phase of unified process.

6 Explain Synchronize-and-Stabilize Team Organization with an example.

 

BT9002, Grid Computing

1 What are the components that are necessary to form a grid?

2 Briefly explain the various layers of grid architecture.

3 Explain autonomic computing and its properties.

4 Briefly explain the scenarios and use case situation analysis in virtual organization grid portal.

5 Explain OGSA core platform components with diagram.

6 Briefly explain the major components of OSGI.net.

SMU BSCIT SEM 5 WINTER 2015 ASSIGNMENTS

 

BT0086, Mobile Computing

1 How “wireless and mobile are two different concepts”. Explain any two applications that use wireless networks and mobile communications.

2 What is modulation? Briefly explain Amplitude Modulation (AM), Frequency Modulation (FM) & Phase modulation (PM).

3 Explain the GSM TDMA frame with the help of frame structure.

4 Explain Hard handover and Soft handover in UMTS.

5 List the advantages and disadvantages of Infra-red technology.

6 Write short notes on:

(a) HiCoMo: High Commit Mobile Transaction Model

(b) Kangaroo mobile transaction model

 

BT0087, WML and WAP Programming-Theory

1 Explain doctype declaration and line breaking in WML with examples.

2 Describe the various data types available in WML script.

3 Briefly explain the WML external functions with an example

 

BT0088- Cryptography and Network Security

1 Explain Caesar’s Cipher encryption technique.

2 Explain data encryption standard (DES).

3 Describe the principles of Public-Key Cryptosystems.

4 Write short notes on the following:

a) Digital signature

b) Attacks on digital signature

5 Explain IP security policy.

6 Write a note on Wireless Transport Layer Security (WTLS).

 

BT8901, Object Oriented Systems

1 Explain State charts and Activity Diagrams with examples.

2 What is Booch methodology? Explain its macro and micro development processes.

3 Explain the structural things in UML.

4 Discuss Extracting Entity Classes. Draw necessary diagram.

5 Explain the Elaboration Phase and Construction Phase of unified process.

6 Explain Synchronize-and-Stabilize Team Organization with an example.

 

BT9002, Grid Computing

1 What are the components that are necessary to form a grid?

2 Briefly explain the various layers of grid architecture.

3 Explain autonomic computing and its properties.

4 Briefly explain the scenarios and use case situation analysis in virtual organization grid portal.

5 Explain OGSA core platform components with diagram.

6 Briefly explain the major components of OSGI.net.

 

SMU BSCIT SEM 3 WINTER 2015 ASSIGNMENTS

BT0074, OOPS with JAVA

1 What are the tools available in JDK? Briefly explain.

2 Write a note on:

1. String Handling

2. String Literals

3. Character Extraction

3 Explain the implementation of inheritance in java with an example.

4 Describe the catch and finally block statement in java with examples.

5 Draw and Explain the Life cycle of a java applet with an example.

6 What are the information required while creating a new key pair using key tool? Explain self-signed certificates?

 

BT0075, RDBMS and MySQL

1 Write the SQL statements to demonstrate the following using SELECT command:

a. Expression Evaluation

b. Using table aliases

c. ORDER BY

2 List the advantages of subqueries. Explain correlated subquery with an example.

3 Write a short note on update and replace statements with examples.

4 Explain the date and time functions in detail.

5 Define grant tables. Describe the steps to set up MySQL user accounts. Also explain the method to assign passwords to the anonymous accounts.

6 Briefly describe the error log and general query log.

 

BT0076, TCP/IP

1 What do you mean by RFC? List and explain common terms and concepts used in TCP/IP.

2 What is the role of Internet Protocol (IP)? How IP address are classified? Explain.

3 Write note on:

1. The Hierarchical Namespace

2. Fully Qualified Domain Names (FQDNs)

4 Define Telnet and explain its operation.

5 Define and explain Internet Message Access Protocol (IMAP4). Describe Fundamental IMAP4 Electronic Mail Models.

6 Give an overview of HTTP operation.

 

BT0078, Website Design

1 Explain the uses of client-side image maps and transparent graphics.

2 Describe the following in context of validating XML documents with DTDs

1. Concept of data validation

2. Writing document type definition (DTD) files

3. Internal and external DTDs

4. Validating parsers

5. The NMTOKEN and NMTOKENS Type

3 Define XSL-FO.

Explain the following:

1. Purpose of XSL Formatting Objects (XSL-FO)

2. XSL-FO Documents and XSL-FO Processors

SMU BSCIT SEM 5 WINTER 2015 ASSIGNMENTS

 

BT0086, Mobile Computing

 

1 How “wireless and mobile are two different concepts”. Explain any two applications that use wireless networks and mobile communications.

2 What is modulation? Briefly explain Amplitude Modulation (AM), Frequency Modulation (FM) & Phase modulation (PM).

3 Explain the GSM TDMA frame with the help of frame structure.

4 Explain Hard handover and Soft handover in UMTS.

5 List the advantages and disadvantages of Infra-red technology.

6 Write short notes on:

(a) HiCoMo: High Commit Mobile Transaction Model

(b) Kangaroo mobile transaction model

 

BT0087, WML and WAP Programming-Theory

 

1 Why HTTP, TLS and transmission control protocol (TCP) are inefficient over mobile networks.

2 Briefly explain the components of WAP Architecture.

3 Briefly explain the WML external functions with an example

 

BT0088- Cryptography and Network Security

 

1 List and explain the three objectives of computer security.

2 Write a note on:

(i) Plaintext

(ii) Ciphertext

(iii) Encryption

(iv) Decryption

(v) Cryptology

3 Briefly explain evaluation criteria for Advanced Encryption Standard (AES).

4 What is cryptographic hash function? Explain. What is birthday attack?

5 Explain symmetric key distribution using symmetric encryption.

6 What is World Wide Web? What are the requirements of web security?

 

BT8903, C# Programming

 

1 Define type conversion. Explain implicit and explicit type conversions.

2 Write a note on the following :

1. Mutable strings

2. Arrays of strings

3. Regular expressions

3 Explain the following in context of methods in C# with examples:

1. Invoking methods

2. Nesting of methods

4 Define members. Explain constant members and read only members.

5 Define and explain the class visibility and class members’ visibility.

6 Describe the methods used to handle exceptions. Provide examples.

 

BT9003, Data Storage management

 

1 Explain the practices and techniques to consider when developing a data protection strategy

2 Explain RAID 0, RAID1 and RAID 0+1.

3 How ILM supports implementation of regulatory concerns? Explain with an example.

4 Describe the two major product classes in storage networking.

5 Briefly explain redundant I/O path elements.

6 Describe file system hierarchy and parsing the file system.

SMU BSCIT SEM 6 WINTER 2015 ASSIGNMENTS

 

BT0092, Software Project Management

1 Explain any five activities involved in project management.

2 Define software cost estimation process? Why it is required?

3 Define risk assessment. Explain the elements of risk assessment and risk control.

4 What is conflict management? How do we remove conflicts among team members?

5 What are the qualities for which an SQE (Software Quality Engineering) evaluation is to be done? Describe all.

6 Explain the activities of software reengineering with diagram.

 

BT9301- COMPUTER GRAPHICS

1 Explain image processing through picture analysis. List the uses of interactive graphics.

2 Write and explain midpoint circle drawing algorithm.

3 Define polygon filling. Explain flood fill algorithm for polygon filling.

4 Write Liang Barkey’s line clipping algorithm. Write advantages of it.

5 Define shear. Explain X shear and Y shear.

6 Explain the various types of parallel projections

 

BT9403, Artificial Intelligence

1 Write a note on Convolvotron. Draw the block diagram of it.

2 Define haptic feedback. Explain haptic sensing. 3+7 10

3 Define distributed VR engine. Write a note on multiple pipeline synchronization.

4 Explain the first stage of haptic rendering. 10 10

5 Expalin automatic cell segmentation process. 10 10

6 Explain the geometry of stereoscopic vision. Give the advantages of stereopsis.

 

SMU BSCIT SEM 1 SUMMER 2015 

BT0062- Fundamentals of IT

1 Define gate and explain OR, AND, NOT gates.

2 Compare:

i. Multi-user and Single-user Operating Systems.

ii. Multi-tasking and Single-tasking Operating Systems.

3 What is cache memory? Explain the importance of cache computer memory.

4 Write the steps to insert one or more columns and one or more cells in MS Excel.

5 Explain different parts of Power Point Window.

6 What is the importance of graphics multimedia? Explain the two types of graphics.

BT0063, MATHEMATICS FOR IT

1 (i) Express 792 in radians and (7 p /12)c in degrees

(ii) Prove that tan0+sec0-1  =  cos0   = 1+sin0

                              Tan0- sec0+1   1- sin0     cos0

2. i. Y = x^{m/n), m, n being integers, n > 0 find dy/dx

ii. Differentiate log (2x + 3) from first principles

3. Evaluate 2 cosx+ 3sinx/ 4 cosx+ 5 sinx dx= I

4 Solve dy/dx = y+x-2/y-x-4

5. i. If a = cos q + i sin 0,0 <0 < 2p prove that 1+a/1-a = i cot q/2

ii. If x=1y = a+ ib/c+ id prove that (x^2+y^2) = a^2+b^2/c^2+d^2

6. Solve: 2x + 3y + 4z = 20, x + y + 2z = 9, 3x + 2y + z = 10

BT0064, DIGITAL LOGIC

1 Solve each of the following 4-bit subtraction problems using 2's complement representation.

i. (00110)2 – (00101)2

ii. (0111)2 - (0001)2

2 What is difference between minterm and maxterm? Express the following function

F(x,y,z) = (x+z) y in form of minterm and maxterm?

3 Draw truth table for following Boolean function

a) F(x,y) =(x+z)y

b) F(x,y) = xy +xy'

4 Simplify the following Boolean function using k map.

F(A,B,C,D)=∑m(0,2,3,5,6,7,8,10,11,14,15)

5 What are combinational circuits? Explain differences between sequential circuits and combinational circuits.

6 What is the difference between Ring counter and Johnson counter? Explain

BT0065, C PROGRAMMING AND DATA STRUCTURES – THEORY

1 Explain the structure of the C program.

2 Explain bubble sort with the help of an example

3 What is structure? What is its importance? Explain with an example how to declare and initialize structure.

4 What do you mean by dynamic memory allocation? Explain the three functions for dynamic memory allocation in C language.

5 Write C program to implement stack using arrays.

6 Write an algorithm for selection sort. Sort the list given below in ascending order by using this sorting technique. 64 , 25, 12, 22 , 11.

BT0066, Database Management Systems

1 Draw and explain the diagram of SQL server 2000 architecture.

2 Why relational data model is important? Explain the terms relation and tuple.

3 What is the system catalog in RDBMS? Also explain what information is stored in the system catalog.

4 Explain semantics of TRC queries with examples.

5 Explain data fragmentation with an example.

6 Describe the approaches for incorporating object orientation capabilities in databases.

SMU BSCIT SEM 2 SUMMER 2015 

BT0068, Computer Organization and Architecture

1. Define microoperation and explain its types

2 Describe bus in computer system and explain its structure.

3 Explain the simple instruction format with diagram and examples.

4 Explain infinite-precision and finite-precision ten's complement.

5 Explain the mapping functions between the main memory and CPU

6 Explain interrupt and interrupt driven I/O.

BT0069, Discrete Mathematics

1 Find the sum of all the four digit number that can be obtained by using the digits 1, 2, 3, 4 once in each.

2 (i) State the principle of inclusion and exclusion.

(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234 or 487?

3 If G is a group, then

The identity element of G is unique.

Every element in G has unique inverse in G.

For any a  G, we have (a-1)-1 = a.

For all a, b  G, we have (a.b)-1 = b-1.a-1.

4 (i)Define valid argument

(ii) Show that  (P  Q) follows from  P  Q.

5 (i)Construct a grammar for the language. 'L⁼{x/ xє{ab} the number of as in x is a multiple of 3.

(ii)Find the highest type number that can be applied to the following productions:

1. S  A0, A  1  2  B0, B  012.

2. S  ASB  b, A  bA  c ,3. S  bS  bc.

6 (i) Define tree with example

(ii) Any connected graph with ‘n’ vertices and n -1 edges is a tree.

BT0070, Operating Systems

1 Describe batch operating system. Explain its advantages and disadvantages.

2 Write short notes on:

1. Critical section problem

2. Buffering

3 What are TLBs? Why they are required in paging?

4 Describe the techniques of free space management of free space list.

5 What are computer viruses? How do they affect our system?

6List and explain the types of multiprocessor OS.

BT0071- TECHNICAL COMMUNICATION – THEORY

1 Explain the Characteristics of Technical Communication. What are the indicators of Excellence in Technical Communication?

2 Explain the preparatory stage in SME Interviews.  Prepare notes on Post Interview Session and Validation

3 Explain the role of a technical editor. List the strength and weakness of SDLC).

BT0072, COMPUTER NETWORKS

1 What is Message switching and Packet switching?

2 What is Framing? Briefly explain Fixed-Size Framing, Variable Size Framing.

3 What is Stop-and-Wait Automatic Repeat Request?

4 What is the role of Internet Protocol version 4 (IPV4) in addressing and routing packets between hosts? Briefly explain the structure of an IPV4 packet.

5 Explain the working and applications of SMTP.

6 Describe Caching and TTL. How it is useful in query resolving?

SMU BSCIT SEM 2 SPRING 2015 

BT0068, Computer Organization and Architecture

1. Explain various units of a digital computer with the help of a diagram.

2 Describe bus in computer system and explain its structure.

3 Explain the simple instruction format with diagram and examples.

4 Explain memory interleaving with the help of a diagram.

5 Explain interrupt and interrupt driven I/O.

6 Explain DMA controller with the help of diagram.

 

BT0069, Discrete Mathematics

1 U= {a,b, c, d, e}, A= {a, c, d} , B= {d, e},C= {b, c, e}

Evaluate the following:

2 (i) State the principle of inclusion and exclusion.

(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234 or 487?

3 If G is a group, then

The identity element of G is unique.

Every element in G has unique inverse in G.

For any a  G, we have (a-1)-1 = a.

For all a, b  G, we have (a.b)-1 = b-1.a-1.

4 (i)Define valid argument

(ii) Show that  (P  Q) follows from  P  Q.

5 (i)Construct a grammar for the language.

(ii)Find the highest type number that can be applied to the following productions:

1. S  A0, A  1  2  B0, B  012.

2. S  ASB  b, A  bA  c ,3. S  bS  bc.

6 (i) Define tree with example

(ii) Any connected graph with ‘n’ vertices and n -1 edges is a tree.

 

BT0070, Operating Systems

1 Write short notes on:

1. Process Creation

2. Terminating Process.

2 Write short notes on:

1. Critical section problem

2. Buffering

3 What are TLBs? Why they are required in paging?

4 Describe the techniques of free space management of free space list.

5 What are computer viruses? How do they affect our system?

6List and explain the types of multiprocessor OS.

 

BT0071- TECHNICAL COMMUNICATION – THEORY

1 What’s Audience Analysis? Explain its significance in Technical Communication

2 Explain the role of a technical editor. Differentiate between Micro and Macro editing.

3 Explain the various phases involved in System Development Life Cycle (SDLC).

 

BT0072, COMPUTER NETWORKS

1 What is OSI model? Explain all its layers with diagram.

2 Write a short note on ALOHA protocols.

3 What is the function of data link layer? Explain its services.

4 Explain Shortest Path routing Algorithm.

5 Discuss any two design issues of Session Layer.

6 Describe the structure of the DNS namespace on the Internet

SMU BSCIT SEM 3 SPRING 2015 

BT0074, OOPS with JAVA

1 Describe the syntax and working of if-else with an example. Also write a program in java that assigns a grade based on the value of a test score: an A for a score of 90% or above, a B for a score of 80% or above, and so on.

2 List and explain all the string comparison functions. Write a program in java to reverse a string.

3 Describe with the help of an example the implementation of inheritance in java.

4 Describe the catch and finally block statement in java with examples.

5 Draw and Explain the Life cycle of a java applet with an example.

6 Define java beans and beanbox. Describe the advantages of java beanbox.

 

BT0075, RDBMS and MySQL

1 How to alter databases and tables? Explain with the help of examples.

2 1. Explain insert statement with example.

2. Exercise: Create table CUSTOMERS with fields – ID, name, age, address and salary and insert records in the table (insert at least five records.)

3 Explain update and replace statements with examples.

4 Explain the date and time functions in detail.

5 Define grant tables. Describe the steps to set up MySQL user accounts. Also explain the method to assign passwords to the anonymous accounts.

6 Briefly describe the error log and general query log.

 

BT0076, TCP/IP

1 Draw the diagram of TCP/IP protocol suit. Explain network interface layer and Internet layer.

2 Define and explain address resolution protocol (ARP). Describe ARP packet generation.

3 Define user datagram. Explain UDP datagram format and UDP Application Programming Interface.

4 Write note on:

1. The Hierarchical Namespace

2. Fully Qualified Domain Names (FQDNs)

5 Define Remote Execution Command Protocol (REXEC and RSH). Explain its principle of operation.

6 State unique features of following versions of SNMP:

1. SNMPv1

2. SNMPv2

3. SNMPv2 entity

4. SNMPv2 party

BT0077, Multimedia Systems

1 List all the elements of drawing and explain any four element.

2 Describe in brief the following

1. Calligraphy

2. Text in multimedia application

3 Describe the following file formats:

1. Photoshop Format

2. Photoshop EPS

3. EPS TIFF or EPS PICT Preview

4. PCX

 

BT0078, Website Design

1 Explain ISDN connections. Also explain its advantages and disadvantages.

2 Describe the following in context of validating XML documents with DTDs

1. Concept of data validation

2. Writing document type definition (DTD) files

3. Internal and external DTDs

4. Validating parsers

5. The NMTOKEN and NMTOKENS Type

3 Define XSL-FO.

Explain the following:

1. Purpose of XSL Formatting Objects (XSL-FO)

2. XSL-FO Documents and XSL-FO Processors

SMU BSCIT SEM 4 SPRING 2015 

BT0080, Fundamentals of Algorithms

1 Describe insertion sort algorithm with the help of an example. Give the complexity of it.

2 State the concept of divide and conquer strategy with the help of an example.

3 Explain knapsack problem. Write algorithm for it.

4 Explain trees and subgraphs with examples.

5 Define spanning trees. Explain Kruskal’s algorithm to find out minimal cost spanning trees.

6 Define and explain Hamiltonian circuit and path.

 

BT0081 - Software Engineering

1 Explain Information content and determinacy.

2 Describe spiral model and its various task regions.

3 Explain the various steps involved in establishing a reliability specification and statistical testing.

4 Differentiate object-oriented and function oriented approaches.

5 Identify the different documents which may be produced to aid the maintenance process.

6 Discuss the various test design methods used in real time software testing.

 

BT0082, Visual Basic

1 Explain the event driven applications in VB.NET. Explain common control events and common form events in VB.net.

2 Describe the concept of Exit Try statement in VB.NET with an example.

3 Define SQL. Explain the select statement of SQL with examples.

4 Describe the concept of record navigation in VB.NET.

5 Describe the concept of jagged arrays in visual basic with an example.

6 Describe the features of ListView Control. Also describe how to set its design time properties.

 

BT0083, Server Side Programming-Theory

1 Describe java servlets and compare it with CGI.

2 Explain handling the form elements to retrieve the data from form using servlet API. Give some examples

3 Describe the following exception handling methods in a servlet with the help of examples

1. Using the web.xml file

2. Using a Request Dispatcher.

4 Explain the two JSP architectures.

5 Draw and explain the diagram of custom tag life cycle.

6 Describe the usage of EL (Expression Language) operators with suitable examples.

SMU BSCIT SEM 5 SPRING 2015 

BT0086, Mobile Computing

1 Write short notes on:

(a) Frequency modulation (FM)

(b) Phase modulation (PM).

2 What is near and far effect problem in wireless communication? Explain in brief.

3 Explain about the Operation Sub System (OSS) of GSM system.

4 Explain Hard handover and Soft handover in UMTS.

5 List the advantages and disadvantages of Infra-red technology.

6 Write short notes on:

(a) HiCoMo: High Commit Mobile Transaction Model

(b) Kangaroo mobile transaction model

 

BT0087, WML and WAP Programming-Theory

1 Explain the functions of WAP proxy.

2 Describe the various data types available in WML script.

3 Briefly explain the WML external functions with an example

.

BT0088- Cryptography and Network Security

1 Explain Caesar’s Cipher encryption technique.

2 Compare DES and AES algorithms.

3 Explain Developmental Controls and Administrative Controls for software development.

4 List all the models of security and explain any two models for operating system security

5 Define and explain IP security. Explain its architecture.

6 Describe guard and personal firewalls.

 

BT8902, E-COMMERCE

1 Explain the modes of operation associated with E – Commerce.

2 Explain the purpose of Network layer of the OSI model.

3 Differentiate between direct and indirect metrics.

4 Explain the architectural components of CRM.

5 Explain the working of a WAP transaction.

6 What is the purpose of Security and Resolution Centre of eBay? Explain.

 

BT8903, C# Programming

1 Explain the Web Services, Web Forms, and Windows Forms in .Net framework.

2 Write a note on the following :

1. Mutable strings

2. Arrays of strings

3. Regular expressions

3 Explain the following in context of methods in C# with examples:

1. Invoking methods

2. Nesting of methods

4 Define members. Explain constant members and read only members.

5 Define and explain the class visibility and class members’ visibility.

6 Describe the methods used to handle exceptions. Provide examples.

 

BT9001, Data Mining

1 What is Online Analytical Processing (OLAP)? Explain its benefits.

2 Define noisy data. Briefly explain the data smoothening techniques.

3 Briefly explain mining quantitative association rules.

4 Briefly explain Agent Based and Database Approaches to web mining.

5 Define text mining. State the text retrieval methods.

6 How data mining is used in telecommunication field? Explain.

 

BT9003, Data Storage management

1 State the reasons for data loss in some business corporations.

2 How ILM supports implementation of regulatory concerns? Explain with an example.

3 Describe the two product classes in storage networking.

4 Briefly explain redundant I/O path elements.

5 Describe file system hierarchy and parsing the file system.

6 Explain RAID 0, RAID1 and RAID 0+1.

SMU BSCIT SEM 6 SPRING 2015 

BT0092, Software Project Management

1 Define software cost estimation process? Why software cost estimation is required?

2 A project has been defined to contain the following list of activities along with their required times for completion:

1. Draw the PERT chart for the activities.

2. Calculate the earliest expected completed time

3. Show the critical path.

3 Define risk assessment. Explain the elements of risk assessment and risk control.

4 What is conflict management? How do we remove conflicts among team members?

5 What are the qualities for which an SQE (Software Quality Engineering) evaluation is to be done? Describe all.

6 Describe briefly the activities of software reengineering. Draw the necessary diagram.

 

 

BT9301- COMPUTER GRAPHICS

1 Draw and explain the diagram of a Raster scan system with a display processor. Explain each unit of the diagram.

2 Write and explain midpoint circle drawing algorithm.

3 What do you mean by polygon filling? Explain flood fill algorithm for polygon filling.

4 Write Liang Barkey’s line clipping algorithm. Write advantages of it.

5 What is shear? Explain X shear and Y shear.

6 Derive the 3-D transformation matrix to transform world coordinates to viewing coordinates.

 

BT9402, Artificial Intelligence

1 Explain the first and second principle of AI.

2 Explain knowledge representation with an example.

3 Explain the Inheritance and Reification in semantic networks.

4 Explain the two principal parts of an expert system.

5 Describe the factors affecting learning performance of a system.

6 Briefly explain the hardware requirements for designing a robot.

SMU BSCIT SEM 3 WINTER 2014 

BT0074, OOPS with JAVA

1 What are the keywords that java supports? Describe the data types available in java programming language.

2 Describe the syntax and working of if-else with an example. Also write a program in java that assigns a grade based on the value of a test score: an A for a score of 90% or above, a B for a score of 80% or above, and so on.

3 Describe with the help of an example the implementation of inheritance in java.

4 Describe the catch and finally block statement in java with examples.

5 Draw and Explain the Life cycle of a java applet with an example.

6 Define java beans and beanbox. Describe the advantages of java beanbox.

 

BT0075, RDBMS and MySQL

1 Explain the blob, text and enum data types.

2 How to alter databases and tables? Explain with the help of examples.

3 Explain update and replace statements with examples.

4 Explain the date and time functions in detail.

5 Define grant tables. Describe the steps to set up MySQL user accounts. Also explain the method to assign passwords to the anonymous accounts.

6 Briefly describe the error log and general query log.

 

BT0076, TCP/IP

 

1 Define frame relay. Describe its format with diagram.

2 Define ports and explain the two types of ports.

3 Write note on:

1. The Hierarchical Namespace

2. Fully Qualified Domain Names (FQDNs)

4 Define Telnet and explain its operation.

5 Define and explain Internet Message Access Protocol (IMAP4). Describe Fundamental IMAP4 Electronic Mail Models.

6 Give an overview of HTTP operation.

 

BT0077, Multimedia Systems

 

1 Explain the following color models

1. HSB model

2. RGB model

3. CMYK model

4. L*a*b model

2 Describe in brief the following

1. Calligraphy

2. Text in multimedia application

3 Describe the following file formats:

1. Photoshop Format

2. Photoshop EPS

3. EPS TIFF or EPS PICT Preview

4. PCX

 

BT0078, Website Design

 

1 Draw and explain the diagram of website development life cycle.

2 Describe the following in context of validating XML documents with DTDs

1. Concept of data validation

2. Writing document type definition (DTD) files

3. Internal and external DTDs

4. Validating parsers

5. The NMTOKEN and NMTOKENS Type

3 Define XSL-FO.

Explain the following:

1. Purpose of XSL Formatting Objects (XSL-FO)

2. XSL-FO Documents and XSL-FO Processors

SMU BSCIT SEM 4 WINTER 2014 

 

BT0080, Fundamentals of Algorithms

 

1 Describe insertion sort algorithm with the help of an example. Give the complexity of it.

2 State the concept of divide and conquer strategy with the help of an example.

3 Explain knapsack problem. Write algorithm for it.

4 Explain trees and subgraphs with examples.

5 State Cook’s theorem.

Prove the theorem “CNF satisfiability is polynomially transformable to the clique problem. Therefore, the clique problem is NP complete.”

6 Define and explain Hamiltonian circuit and path.

 

BT0081 - Software Engineering

 

1 Explain different kinds of software applications.

2 What are the Limitations of waterfall model? Explain in brief.

3 Describe the operation of Data flow model with the help of a block diagram.

4 Explain the various activities involved in Software Reengineering process model.

5 Explain Black-Box Testing in detail.6 With the help of bock diagram explain how global problem solving can apply a software-driven approach to enhance the efficiency of problem solving.

 

BT0082, Visual Basic

 

1 Describe the data types in VB.NET.

2 Explain the event driven applications in VB.NET. Explain common control events and common form events in VB.net.

3 Describe the concept of Exit Try statement in VB.NET with an example.

4 Define SQL. Explain the select statement of SQL with examples.

5 Describe the concept of record navigation in VB.NET.

6 Describe the concept of jagged arrays in visual basic with an example.

 

BT0083, Server Side Programming-Theory

 

1 Describe java servlets and compare it with CGI.

2 Explain handling the form elements to retrieve the data from form using servlet API. Give some examples

3 Write a note on tracking the sessions using cookies. Give advantages and disadvantages of cookies.

4 Explain the two JSP architectures.

5 Draw and explain the diagram of custom tag life cycle.

6 Describe the process of deactivating individual expression language statements with example.

SMU BSCIT SEM 1 FALL 2014 

BT0062- Fundamentals of IT

 

 1 What is the role of computers in business and in science and engineering? Explain.

 

 2 Differentiate between primary memory and secondary memory.

 

 3 What is cache memory? Explain the importance of cache computer memory.

 

 4 Write the steps to insert one or more columns and one or more cells in MS Excel.

 

 5 What do you mean by animations? Explain web animation.

 

 6 What is Internet? What is the use of it Internet in the modern world.

 

 

 

BT0065, C PROGRAMMING AND DATA STRUCTURES – THEORY

 

 1 Write an algorithm to check whether a given number is even or odd number and after that draw the flowchart.

 

 2 Explain the structure of the C program.

 

 3 What is structure? What is its importance? Explain with an example how to declare and initialize structure.

 

 4 What do you mean by dynamic memory allocation? Explain the three functions for dynamic memory allocation in C language.

 

 5 Write C program to implement stack using arrays.

 

 6 What do you mean by binary tree? Explain the storage representations of binary tree.

 

 

 

 BT0066, Database Management Systems

 

 1 Explain the concept of data independence and explain why it is required?

 

 2 Draw and explain the diagram of SQL server 2000 architecture.

 

 3 What do you mean by indexed sequential file organization? Explain with the help of an example.

 

 4 What is the system catalog in RDBMS? Also explain what information is stored in the system catalog.

 

 5 What do you mean by semantics of TRC queries? Give an example of TRC queries.

6 Explain BCNF with an example.

 

SMU BSCIT SEM 2 FALL 2014 

BT0068, Computer Organization and Architecture 

1. a) Subtract (76425-28321) using 10’s complement. Show the steps. B) Subtract (28531-345620) using 10’s complement. Show the steps 

2 What do you mean by bus in computer system? Explain the bus structure 

3 Explain the instruction format with diagram and examples 

4 Explain the non-negative integers and negative integers representation 

5 Explain the mapping functions between the main memory and CPU 

6 Write a short note on DMA controller. Draw the diagram of it.

  

BT0069, Discrete Mathematic 

1 A bit is either 0 or 1: a byte is a sequence of 8 bits. Find the number of bytes that, (a)can be formed (b)begin with 11 and end with 11 

(c)begin with 11 and do not end with 11 

(d) begin with 11 or end with 11. 

2 (i) State the principle of inclusion and exclusion. 

(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234 or 487? 

3 If G is a group, then 

The identity element of G is unique. 

Every element in G has unique inverse in G. 

For any a  G, we have (a-1)-1 = a. 

For all a, b  G, we have (a.b)-1 = b-1.a-1. 

4 (i)Define valid argument 

(ii) Show that  (P  Q) follows from  P  Q. 

5 (i)Construct a grammar for the language. 

(ii)Find the highest type number that can be applied to the following productions: 

1. S  A0, A  1  2  B0, B  012. 

2. S  ASB  b, A  bA  c ,3. S  bS  bc. 

6 (i) Define tree with example 

(ii) Any connected graph with ‘n’ vertices and n -1 edges is a tree.

  

BT0070, Operating Systems 

1 Describe the mechanism of process creation in an OS. 

2 Suppose that the following processes arrive for execution at the times indicated. 

Process Burst Time 

P1 24

 

P2 3

 

P3 3

 

1. Suppose the process arrives in the order P1, P2, P3 and

 

2. Suppose the process arrive in the order P2, P3, P1.

 

For both the above situation draw the Grantt Chart and calculate the waiting time for each process and average waiting time.

 

3 Write short notes on:

 

1. Critical section problem

 

2. Buffering

 

4 What are TLBs? Why they are required in paging?

 

5 Describe the techniques of free space management of free space list.

 

6 What are computer viruses? How do they affect our system?

 

 

 

BT0071- TECHNICAL COMMUNICATION – THEORY

 

1 What’s Audience Analysis? Explain its significance in Technical Communication

 

2 Explain the role of a technical editor. Differentiate between Micro and Macro editing.

 

3 Explain the various phases involved in System Development Life Cycle (SDLC).

 

 

 

BT0072, COMPUTER NETWORKS

 

1 What is Message switching and Packet switching?

 

2 What is Framing? Briefly explain Fixed-Size Framing, Variable Size Framing,

 

3 What is Stop-and-Wait Automatic Repeat Request? Briefly explain.

 

4 What is the role of Internet Protocol version 4 (IPV4) in addressing and routing packets between hosts? Briefly explain the structure of an IPV4 packet.

 

5 How SMTP works? Briefly explain applications of SMTP.

6 What is SSL protocol? How SSL handles a message?

 

SMU BSCIT SEM 6 FALL 2014 

 

BT0092, Software Project Management

 

1 What are the factors influencing project management? Explain the role of project manager.

 

2 What do you mean by software cost estimation process? Why software cost estimation is required?

 

3 Define risk assessment. Explain the elements of risk assessment and risk control.

 

4 What is conflict management? How do we remove conflicts among team members?

 

5 Describe briefly the activities of software reengineering. Draw the necessary diagram.

 

6 What do you mean by software testing? Why it is required?

 

 

BT9302, Human Computer Interface

 

1 What do you mean by direct manipulation? How is it applicable to human computer interface?

 

2 What are the phases in determining basic business functions?

 

3 Explain the uses of toolbars and message boxes in designing windows.

 

4 Explain Goal-Operation-Methods-Selections (GOMS) user interface design approach. List advantages and disadvantages of it

 

5 Write a note on joystick and graphic tablet device based controls. Also explain advantages and disadvantages of both.

 

6 What are operable controls? Explain any of two operable controls (ex: button, tool bar).

 

 

BT9402, Artificial Intelligence

 

1 Explain the third and fourth principles of AI.

 

2 Explain knowledge representation? Explain with the help of an example.

 

3 Explain the Inheritance and Reification in semantic networks.

 

4 Explain knowledge base and building a knowledge base.

 

5 Describe the factors affecting learning performance.

 

6 What is the purpose of backtracking? Why is it important in artificial intelligence?

 

SEM 1 BSCIT SUMMER 2014 

 

BT0062- Fundamentals of IT

 

1 Write a short notes on fourth and fifth generation computers

 

2 Differentiate between primary memory and secondary memory.

 

3 What is cache memory? Explain the importance of cache computer memory.

 

4 Write the steps to insert one or more columns and one or more cells in MS Excel.

 

5 What is sound multimedia? Explain common sound file formats?

 

6 What is Internet? What is the use of it Internet in the modern world.

 

 

 

BT 0063- MATHEMATICS FOR IT

 

1. (i) Let A = {1, 2, 3, 4, 5, 6} and B = {2, 4, 6, 8}. Find A – B and B – A.

 

(ii) In a group of 50 people, 35 speak Hindi, 25 speak both English and Hindi and all the people speak at least one of the two languages. How many people speak only English and not Hindi ? How many people speak English?

 

2. (i) Express 792° in radians and (7p/12)c in degrees

 

(ii) Prove that (tanq + secq – 1)/(tanq - secq + 1) = cosq/(1- sinq ) = (1+ sinq)/ cosq

 

3 (i) Define continuity of a point

 

(ii) Test the continuity of the function f where f is defined by

 

F(x) =  ((X-2)/|(X-2)| if x ¹ 2

 

             ( 7                         if x = 2

 

4. Solve dy/dx = (y+x-2)/(y-x-4)

 

5. A bag contains two red balls, three blue balls and five green balls. Three balls are drawn at random. Find the probability that

 

a) the three balls are of different colours

 

b) two balls are of the same colour

 

c) all the three are of the same colour.

 

6. Solve: 2x + 3y + 4z = 20, x + y + 2z = 9, 3x + 2y + z = 10

 

 

 

BT0064, LOGIC DESIGN

 

1 Add the following 4-bit binary numbers. i. (0110)2 + (0101)2 = (1011)2 ii. (0101)2 + (0101)2= (1010)2 Add the following 8-bit binary numbers iii. (01001110)2 + (00111100)2 = (10001010)2 iv. (10011101)2 + (10001111)2= (100101100)2

 

2 Draw the symbol for XNOR & X-OR and explain the truth table?

 

3 What are adders? Explain half adders and full adders with circuit diagrams.

 

4 What is ring counter? Explain it working with the help of diagram.

 

5 Explain the concept of resolution in digital and analog multi meters.

 

6 What are shift registers? Explain serial in serial out shift register.

 

 

 

BT0065, C Programming and Data Structures,

 

1 Why data types are required in any programming language? Explain in detail the primary data types of C language.

 

2 Explain the structure of the C program.

 

3 i. What is recursion?

 

ii. Differentiate between recursion and iteration.

 

iii. Write a program to generate Fibonacci series using recursion.

 

4 What do you mean by dynamic memory allocation? Explain the three functions for dynamic memory allocation in C language.

 

5 Write C program to implement stack using arrays.

 

6 What do you mean by binary tree? Explain the storage representations of binary tree.

 

 

 

BT0066, Database Management Systems

 

1 What do you mean by entity and attributes in E-R diagram?

 

Explain the importance of E-R diagram.

 

2 Explain the following terms:

 

 Relational database schema

 

 Entity Integrity

 

 Referential Integrity

 

 Referential Integrity Constraints

 

3 What do you mean by indexed sequential file organization? Explain with the help of an example.

 

4 What is the system catalog in RDBMS? Also explain what information is stored in the system catalog.

 

5 What do you mean by semantics of TRC queries? Give an example of TRC queries.

6 Explain vertical framentation with the help of an example.

SEM 3 BSCIT SUMMER 2014 

BT0074, OOPS with JAVA

1 Explain the main method in java and its rules. Also explain how to invoke methods in java. Explain with examples.

2 List and explain all the string comparison functions. Write a program in java to reverse a string.

3 Describe with the help of an example the implementation of inheritance in java.

4 Describe the catch and finally block statement in java with examples.

5 Draw and Explain the Life cycle of a java applet with an example.

6 Write a note on JDK security tools.

 

BT0075, RDBMS and MySQL

1 Write the steps for Accessing and Creating Databases and Tables.

2 How to alter databases and tables in MySQL? Explain with the help of examples.

3 Explain MySQL update and replace statements with example.

4 Explain all the date and time functions in MySQL.

5 Describe the following functions for maintaining stored procedures in MySQL.

1. CREATE PROCEDURE and CREATE FUNCTION

2. ALTER PROCEDURE and ALTER FUNCTION

3. DROP PROCEDURE and DROP FUNCTION Syntax

4. SHOW CREATE PROCEDURE and SHOW CREATE FUNCTION

5. SHOW CREATE FUNCTION

6 How to keep our passwords secure in MySQL? Explain.

 

BT0076, TCP/IP

1 Explain the following TCP/IP terminology:

1. Node

2. Route

3. Host

4. Upper – Layer Protocol

5. LAN Segment

6. Subnet

7. Network

8. Neighbor

9. Interface

10. Address

2 What do you mean by frame relay? Describe the frame relay frame format with diagram.

3 Define ports and explain the two types of ports.

4 Describe the following operations of FTP:

1. Connect to a remote host

2. Navigate and manipulate the directory structure.

3. List files available for transfer.

5 Define and explain Internet Message Access Protocol (IMAP4). Describe Fundamental IMAP4 Electronic Mail Models.

6 Define web servers. List and explain all well-known web servers.

 

BT0077, Multimedia Systems

1 List all the elements of drawing and explain any four element.

2 Describe in brief the following

1. Calligraphy

2. Text in multimedia application

3 Briefly describe monitor resolution and printer resolution.

 

 

BT0078, Website Design

1 Explain the dial up connection and its types.

2 What do you mean by frame in HTML? Describe the <frame> and <frameset>. Also explain frame construction and frame navigation.

3 Describe the SOAP’s use of XML and schemas. Explain the elements of SOAP message.

SEM 4 BSCIT SUMMER 2014 

BT0080, Fundamentals of Algorithms

1 Explain the three basic actions and corresponding instructions that form the basis of any imperative language.

2 Explain quick sort. Write algorithm for it.

3 Explain knapsack problem. Write algorithm for it.

4 Explain trees and sub graphs with examples.

5 Define and explain Hamiltonian circuit and path.

6 Define and explain the following with examples;

1. Reflexive and irreflexive digraph

2. Equivalence digraph

3. Relation matrix

4. Directed path

5. Directed walk

 

BT0081, SOFTWARE ENGINEERING

1 1) Describe the meaning of software engineering

2) List and explain the various types of software maintenance

2 Explain the various steps involved in establishing a reliability specification and statistical testing

3 1) Briefly explain the different kinds of assessment techniques

2) Give the importance of dimension of time in software development

4 Describe the Top-Down Testing strategy with the help of suitable diagram.

5 Explain People Factor in Multidisciplinary aspects.

6 Identify the factors that affect Interdisciplinary Ignorance

 

BT0082, Visual Basic

1 Describe in brief about the code editor window and solution explorer in visual studio.

2 Describe the following:

1. How to use the new project dialogue box in vb.net

2. How to use the options dialogue box in vb.net.

3 Describe the concept of Exit try statement in Vb.net with an example.

4 Describe the concept of jagged arrays in visual basic with an example.

5 Explain how to add new objects to the ListView controls? Also explain adding of column headers to ListView control.

6 What is The jsp: plugin Element? Describe JSP: Plugin Optional Attributes.

 

BT0083, Server Side Programming-Theory

1 Define and explain web servers and application servers.

2 Explain handling the form elements to retrieve the data from form using servlet API. Give some examples

3 State the advantages and disadvantages of http digest authentication. Compare digest and basic authentication.

4 Explain the two JSP architectures.

5 Explain the impacts of software technology on business on the following:

• Exponential Growth in Capability

• Business Problem-Solving Optimization

6 Describe briefly the driving Forces of Diversity in Development Strategies.

 

 

BSCIT 

SESSION- SPRING 2014

  

BSCIT – Sem 1 

BT0062- Fundamentals of IT 

1 What is Operating system? Explain the importance of operating system. 

2 Perform the following binary arithmetic operations: 

1. 101001+1001 

2. 101101-100111 

3. 101*101 

4. 0110*1101 

5. 10011/110 

3 Explain all the options of start menu.

4 Explain the steps to insert the special symbols in MS word. Also explain the steps to insert the word art in MS word.

5 Can Database be created in MS – Excel? Explain any four options supported by MS Excel to handle databases in MS Excel.

6 What is search engine and what is the importance of it?

 

 

 

BT0063

 

1 (i) Let A = {1, 2, 3, 4, 5, 6} and B = {2, 4, 6, 8}. Find A – B and B – A.

 

(ii) In a group of 50 people, 35 speak Hindi, 25 speak both English and Hindi and all the people speak at least one of the two languages. How many people speak only English and not Hindi ? How many people speak English?

 

2 (i) Express 792° in radians and (7p/12)c in degrees

 

(ii) Prove that tan0+sec0-1  = cos0   = 1+sin0

 

                      Tan0- sec0+1   1- sin0     cos0

 

3 (i) Define continuity of a point

 

(ii) Test the continuity of the function f where f is defined by

 

4 Solve dy/dx = y+x-2/y-x-4

 

5 A bag contains two red balls, three blue balls and five green balls.

 

Three balls are drawn at random. Find the probability that

 

a) the three balls are of different colours

 

b) two balls are of the same colour

 

c) all the three are of the same colour.

 

6. Solve: 2x + 3y + 4z = 20, x + y + 2z = 9, 3x + 2y + z = 10

 

 

 

BT0064, LOGIC DESIGN

 

1 Convert each of the following hexadecimal numbers to binary, octal, and decimal formats.

 

i) (4FB2)16

 

ii) (DC4)16

 

5+5 10

 

2 Construct the following gates using NAND

 

a)AND b) NOR c) XOR d)XNOR

 

3 Expand the following Boolean functions into their canonical form:

 

i. f(X,Y,Z)=XY+YZ+ X Z+ X Y

 

ii. f(X,Y,Z)=XY+ X Y + X YZ

 

4 Simplify the following Boolean function:

 

F = A’C + A’B + AB’C + BC, using K-map?

 

5 What are sequential circuits? Explain differences between sequential circuits and combinational circuits.

 

6 What are shift registers? Explain serial in serial out shift register.

 

 

 

BT0065, C Programming and Data Structures

 

1 Explain the structure of the C program.

 

2 What is recursion? Differentiate between recursion and iteration.

 

3 Define array and explain its need. Write a program to calculate sum and average of the elements stored in an array.

 

4 Explain Union. Differentiate between structure and union

 

5 What is data structure? Explain abstract data type in brief. Differentiate between linear and nonlinear data structure.

 

6 What is linked list? Explain the advantages of linked lists over array.

 

 

 

BT0066, Database Management Systems

 

1 Explain the concept of data independence and explain why it is required?

 

2 Why relational data model is important? Explain the terms relation and tuple.

 

3 Perform the following DML operations on the table:

 

1. Insert values for the table CUSTOMERS with fields – ID, name, age, address and salary and insert records in the table given below:

 

+----+----------+-----+-----------+----------+

 

| ID | NAME | AGE | ADDRESS | SALARY |

 

+----+----------+-----+-----------+----------+

 

| 1 | Ramesh | 32 | Ahmedabad | 2000.00 |

 

| 2 | Khilan | 25 | Delhi | 1500.00 |

 

| 3 | kaushik | 23 | Kota | 2000.00 |

 

| 4 | Chaitali | 25 | Mumbai | 6500.00 |

 

| 5 | Hardik | 27 | Bhopal | 8500.00 |

 

| 6 | Komal | 22 | MP | 4500.00 |

 

| 7 | Muffy | 24 | Indore | 10000.00 |

 

+----+----------+-----+-----------+----------+

 

2. Based on the customer table given above update the salary to 20000 whose salary is less than that.

 

Based on the customer table given above Fetch ID,

 

3. Name and Salary fields from the CUSTOMERS table for a customer with name Hardik.

 

4 Consider the relations

 

EMPLOYEE(emp#, name)

 

ASSIGNED_TO(project#, emp#)

 

PROJECT(project#, project_name, chief)

 

Express the following queries in Relational Algebra

 

(i) Get details of employee working on both comp354 and comp345 project numbers.

 

(ii)Find the employee number of employee who do not work on project comp678 5

 

What do you mean by anamoly in database system? Why it is required? Explain the types of anamolies in database system.

 

6 Differentiate between Relational Database Management System And Object Oriented Database Management System.

 

 

 

BSCIT – Sem 2

 

 

 

BT0068, Computer Organization and Architecture

 

1. i). Find 10’s and 9’s complement of (348)10

 

ii)  Find 10’s and 9’s complement of (134795)10

 

2 Draw and explain the Von- Neumann architecture. What are the drawbacks of it?

 

3 Describe the types of busses and types of control lines.

 

4 Explain Booth’s multiplication algorithm with its advantages and disadvantages.

 

5 Explain the concept of memory interleaving with diagram.

 

6 Explain interrupt driven I/O. Describe the design issues in implementing interrupt driven I/O.

 

 

 

BT0069, Discrete Mathematics

 

1 A bit is either 0 or 1: a byte is a sequence of 8 bits. Find the number of bytes that, (a)can be formed (b)begin with 11 and end with 11 (c)begin with 11 and do not end with 11

 

(d)begin with 11 or end with 11.

 

2 (i) State the principle of inclusion and exclusion.

 

(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234 or 487?

 

3 If G is a group, then

 

i) The identity element of G is unique.

 

ii) Every element in G has unique inverse in G.

 

iii) For any a  G, we have (a-1)-1 = a.

 

iv) For all a, b  G, we have (a.b)-1 = b-1.a-1.

 

4 (i)Define valid argument

 

(ii) Show that  (P  Q) follows from  P  Q.

 

5 (i)Construct a grammar for the language.

 

    *

 

L x x  a,b ,the number of a's in x is a multiple of 3

 

(ii)Find the highest type number that can be applied to the following productions:

 

1. S  A0, A  1  2  B0, B  012.

 

2. S  ASB  b, A  bA  c ,3. S  bS  bc.

 

6 (i) Define tree with example

 

(ii) Any connected graph with ‘n’ vertices and n -1 edges is a tree.

 

 

 

BT0070, Operating Systems

 

1 List the approaches to design operating system structures. Explain any two of them.

 

2 Write short notes on:

 

1. Process Creation

 

2. Terminating Process

 

3 Is it possible to check the condition of mutual exclusion through hardware assistance? If yes, how?

 

4 1. Given a total of 5 units of resource type 1 and 4 units of resource type 2, tell whether the following system is in a safe or unsafe state. Show your work.

 

Type 1 Type 2

 

Process Used Max Used Max

 

P1 1 2 1 3

 

P2 1 3 1 2

 

P3 2 4 1 4

 

2. Given a total of 10 units of a resource type, and given the safe state shown below, should process 2 be granted a request of 2 additional resources? Show your work.

 

Process Used Max

 

P1 2 5

 

P2 1 6

 

P3 2 6

 

P4 1 2

 

P5 1 4

 

5 What is the concept of virtual memory? Why virtual memory is needed?

 

6 What do you mean by Global OS? State the concept of migration and resource allocation in Global OS.

 

 

 

BT0071, TECHNICAL COMMUNICATION – THEORY

 

1 What’s Audience Analysis? Explain its significance in Technical Communication

 

2 Explain the role of a technical editor. Differentiate between Micro and Macro editing.

 

3 Explain the various phases involved in System Development Life Cycle (SDLC).

 

 

 

BT0072 COMPUTER NETWORKS

 

 

 

1 What is OSI model? Explain all its layers with diagram.

 

2 Write a short note on ALOHA protocols.

 

3 What is the function of data link layer? Explain the services of the data link layer.

 

4 Explain Shortest Path routing Algorithm.

 

5 Discuss any two design issues of Session Layer.

 

6 Explain Recursive queries and Iterative queries that a DNS resolver (either a DNS client or another DNS server) can make to a DNS server.

 

 

 

BSCIT – Sem 4

 

 

 

BT0080, Fundamentals of Algorithms

 

1 Define and explain recursion with the help of an example.

 

2 Describe insertion sort algorithm with the help of an example. Give the complexity of it.

 

3 Prove that If p1/w1 ³ p2/w2 ³…..³ pn/wn. Then, Greedy knapsack algorithm generates an optimal solution to the given instance of the knapsack problem.

 

4 State the backtracking strategy. Also define explicit and implicit constraints.

 

5 Explain lower bound theory and ordered searching.

 

6 Explain trees and subgraphs with examples.

 

 

 

BT0081, Software Engineering

 

1 Explain different kinds of software applications.

 

2 What are the Limitations of waterfall model? Explain

 

3 Describe the operation of Data flow model with the help of a block diagram

 

4 Explain the various activities involved in Software Reengineering process model

 

5 Explain Black-Box Testing in detail

 

6 With the help of bock diagram explain how global problem solving can apply a software-driven approach to enhance the efficiency of problem solving.

 

 

 

BT0082, Visual Basic

 

1 Write a note on Microsoft development environment.

 

2 Explain the loops in vb.net with examples.

 

3 Explain the event driven applications in vb.net. Explain common control events and common form events in vb.net.

 

4 How to handle error in VB? Explain.

 

5 Describe the methods in VB.net to set a connection string and to open a connection.

 

6 Explain the following:

 

1. Forwarding Requests to JSP Pages

 

2. Redirecting instead of forwarding

 

 

 

BT0083, Server Side Programming-Theory

 

1 Draw and explain the architecture of Java EE.

 

2 Describe Common Gateway Interface (CGI) and features of it.

 

3 List the techniques of session tracking. Explain the session tracking technique using cookies. Give advantages and disadvantages of cookies.

 

4 Define and explain Java Database Connectivity (JDBC). Describe JDBC architecture and also the steps of making JDBC connection.

 

5 Describe type 3 and type 4 JDBC drivers with advantages and disadvantages.

 

6 List the factors that affect Interdisciplinary Ignorance and explain any two of them.

 

 

 

BSCIT – Sem 5

 

 

 

BT0086, Mobile Computing

 

1 Explain CDMA technique. Draw necessary diagram.

 

2 List and explain the different kinds of domains available in wireless communication.

 

3 What do you mean by mobile operating system? Explain Symbian operating system. List the mobile operating systems which are currently popular in market.

 

4 Explain WAP forum and mobile wireless devices.

 

5 What are the two methods of Spread Spectrum modulation? Explain in detail.

 

6 What is demand routing protocols? Explain cluster based routing protocols.

 

 

 

BT0087, WML and WAP Programming-Theory

 

1 What is wireless markup language? Where it is used? Explain its advantages and disadvantages.

 

2 Explain doctype declaration and line breaking in WML with examples.

 

3 What is the use of Lang library functions in WML? What are the functions available in Lang library? Explain any two of them in detail with examples.

 

 

 

BT0088- Cryptography and Network Security

 

1 Describe the stream and block encryption with their advantages and disadvantages.

 

2 Compare DES and AES algorithms.

 

3 Explain Developmental Controls and Administrative Controls.

 

4 List all the models of security and explain any two models.

 

5 Define and explain IP security. Explain IP security architecture.

 

6 Describe guard and personal firewalls

 

 

 

BT8903, C# Programming

 

1 Describe the components of .Net framework with the help of a diagram. Also explain the Common Language Runtime (CLR) in .Net.

 

2 Describe the C# program structure with the help of a diagram.

 

3 Write the following programs in C#:

 

1. Write a program in C# to reverse a string using for loop.

 

2. Write a program in C# that concatenates list of strings.

 

4 Explain the following in C#:

 

1. Pass by value

 

2. Pass by reference

 

3. Output parameters

 

4. Variable argument list

 

5 Give the similarities and differences between structure and classes.

 

6 Explain the concept of inheritance with the help of an example. Also explain containment inheritance.

 

 

 

BT9001, Data Mining

 

1 What is the relation between data mining and data warehousing? Explain.

 

2 Define data mining. State the differences between data mining and DBMS.

 

3 Explain clustering and its applications.

 

4 Define decision tree. Briefly explain the decision tree induction.

 

5 How data mining is used in telecommunication field? Explain

 

6 Draw and explain the architecture of data mining based IDS and explain.

 

 

 

BSCIT – Sem 6

 

 

 

BT9301, Computer Graphics

 

1 Describe the architecture of vector display with diagram.

 

2 Write short note on:

 

1. Color Tables

 

2. Gray Scale levels

 

3 Explain DDA algorithm for circle drawing. Also write algorithm for it.

 

4 Describe in brief the scan line algorithm for polygon filling.

 

5 What do you mean by line clipping? Explain Sutherland and Cohen Subdivision Line Clipping Algorithm.

 

6 Briefly describe orthographic projection and oblique projection.

 

 

 

BT9402, Artificial Intelligence

 

1 What is the goal of AI? Explain the importance of AI in today’s world.

 

2 What do you mean by speech recognition? Where it is used?

 

3 Define logic. What is the role of logic in artificial intelligence?

 

4 What do you mean by resolution in AI? Write resolution algorithm. Explain all the resolution strategies.

 

5 What do you mean by conceptual dependency? What are the advantages and disadvantages of it?

 

6 What is the purpose of backtracking? Why is it important in artificial intelligence?

 

 

 

 SEM 2 BSCIT WINTER 2014

BT0068, Computer Organization and Architecture

1 Perform the following conversions:

1. (11 101 110)2 = ()8

2. ( 1110 0010 1111) 2 = ()16

3. ( 85)10 = ()2

4. ( 10101)2 = ()10

5. (111.001)2 = ()8

2 Differentiate between primary memory and secondary memory.

3 Explain CPU organization of 8085 microprocessor with diagram.

4 Explain fundamental Computer Architectures.

5 Explain direct and associative mapping functions.

6 Explain any five addressing modes with example.

 

BT0069, Discrete Mathematics

1 A bit is either 0 or 1: a byte is a sequence of 8 bits. Find the number of bytes that,

(a)can be formed

(b)begin with 11 and end with 11

(c)begin with 11 and do not end with 11

(d)begin with 11 or end with 11.

2 Solve the recurrence relation ar -7ar-1 + l0ar-2 = 0 for n ³ 2 given that a0 = 10, a1 = 41 using generating functions.

3 Show that R ® S can be derived from the premises P ® (Q ® S), ~ R Ú P and Q.

4 (i) Define Poset

(ii) Let n be a positive integer and Dn denotes the set of all divisors of n. Consider the partial order ‘divides’ in Dn. Draw the Hasse diagrams for D6,, D24 and D30 .

5 If f is a homomorphism of G into G1 with kernal K, then prove that K is a normal subgroup of G.

6 (i) State the rules of inference

(ii) Consider the following statements:

All men are selfish, All kings are men. Prove that all kings are selfish.

 

BT0070, Operating Systems

1 What do you mean by batch operating system? Explain advantages and disadvantages of it.

2 Why do we need threads in designing of OS? Describe similarity and differences between processes and threads.

3 Explain process state with diagram.

4 Explain the concept of paging with the help of an example.

5 Explain any two basic architectures for multiprocessor interconnections.

6 Explain the methods of directory implementation.

 

BT0071, Technical Communication

1 Explain meaning of technical writers and also explain its role.

2 What is Audience Analysis? Explain its significance in Technical Communication.

3 Explain any five things that are needed to be kept in mind before interview.

 

BT0072, Computer Networks

1 What is Computer networking? Explain LAN and WAN.

2 How do you Implement packet switching? Briefly explain.

3 What is the function of data link layer? Explain the services of the data link layer.

4 Explain sliding window protocol.

5 Discuss any two design issues of Session Layer.

6 Explain the types of modes on which IPSec operates.

SEM 5 BSCIT WINTER 2013

BT0086, Mobile Computing

1 Explain the three basic communication modes.

2 What do you mean by frequency division multiple access (FDMA)? Discuss channel considerations and influence of antenna height in FDMA.

3 What do you mean by virtual LANs? Explain that how multicast is done in IPV6 protocol.

4 List the routing protocols. Explain Fisheye and hierarchical state routing .

5 Explain BCH, CCCH, DCCH control channels.

6 Write short notes on:

a. wireless routing protocol

b. global state routing

 

BT0087, WML and WAP Programming

1 Draw and explain the diagram of WAP architecture.

2 What is the need of script in WML? Discuss briefly the WML script language rules.

3 Explain Naming convention for WML Scripts and Characteristics of the functions in WML scripts.

 

BT0088- Cryptography and Network Security

1 What is the need for security? Explain types of security attacks.

2 List substitution techniques. Explain Ceaser’s cipher.

3 Explain in brief types of encryption systems.

4 Explain authentication header with necessary diagrams.

5 Explain the processing of Encrypted E-Mail

6 Explain characteristics of good security policy.

 

BT8902-E-COMMERCE

1 Define E-Commerce. List any eight benefits of E-Commerce

2 Explain four primary function of Portal. Also its give advantages.

3 Brief the following

a. Telnet

b. POP

4 What are the features of Knowledge Management Tools? Explain Knowledge Management Strategies for Different Organizations?

5 Discuss any five modern payment systems

6 Define supply chain management? Explain any four major functions of supply chain management.

 

BT9003, Data Storage management

1 What do you mean by data protection? Discuss about the techniques to consider when developing a data protection strategy.

2 Discuss in detail about the network storage architectures.

3 Explain SCSI Logical Units and Asymmetrical communications in SCSI.

4 Explain techniques for switch based virtualization with necessary diagram.

5 Explain in brief heterogeneous mirroring with necessary diagram.

6 Discuss Disk-to-disk-to-tape (D2D2T) technology in brief.

 

 SEM 2 BSCIT FALL 2013

BT0068, Computer Organization and Architecture

1 Convert the following binary numbers to octal:

a. 101110

b. 111010

c. 110110

d. 101010

e. 110010

2 Explain all the arithmetic microoperations.

3 Explain CPU organization of 8085 microprocessor with diagram.

4 Explain the fundamental Computer Architectures.

5 Explain any five addressing modes with example.

6 Explain direct and associative mapping functions.

 

BT0069, Discrete Mathematics

1 Let A ={ 1,2,3,4 }, B = { 3,4,5,6 } and C = { 1,4,7,8 } , verify that

a) A ? B ? C = (A ? B) ? C

b) A ? B ? C = A ? (B ? C )

2 If pth ,qth, rth terms of G.P are x, y, z respectively. Prove that x q-r. y r-p. z p-q = 1

3 How many different two digit positive integers can be formed from the digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.

((i) When repetition is not allowed

(ii) When repetition is allowed.

4 Solve the recurrence an = -3an-1 + 10an-2, n ? 2, given a0 = 1, a1 = 4. Consider the lattice A = {0, a1, a2, a3, a4, a5, 1} given below.

5 Check whether the following set of vectors is LD or LI

(i) {(1, 0, 0), (2 , 0, 0), (0, 0, 1)},

(ii) {(1, 0, 1) , (1, 1, 0), (1, 1, -1)}

6 Prove the theorem.

(i) Let (L, ?) be a lattice ordered set. Define x ? y = inf (x,

y), and x ? y = sup (x, y). Then (L, ?, ?) is an algebraic lattice.

(ii) Let (L, ?, ?) be an algebraic lattice. Define x ? y ? x ? y = x, The n(L, ?) is a lattice ordered set.

 

BT0070, Operating Systems

1 What is operating System? Explain any two types of operating systems.

2 Explain Preemptive and Non-preemptive scheduling approaches.

3 Explain process state with diagram.

4 Explain the concept of paging with the help of an example.

5 Explain the methods of directory implementation.

6 Explain any two basic architectures for multiprocessor interconnections.

 

BT0071, Technical Communication

1 Explain meaning of technical writers and also explain its role.

2 What is Audience Analysis? Explain its significance in Technical Communication.

3 Explain any five things that are needed to be kept in mind before interview.

 

BT0072, Computer Networks

1 What is OSI model? Explain all its layers with diagram.

2 Write a short note on ALOHA protocols.

3 What is the function of data link layer? Explain the services of the data link layer.

4 Explain sliding window protocol.

5 Discuss any two design issues of Session Layer.

6 What is firewall? Explain components of firewall system.

 

SEM 5 BSCIT FALL 2013

BT0086, Mobile Computing

1 Write notes on FDMA and CDMA techniques.

2 Explain the three basic communication modes.

3 Differentiate circuit switching and packet switching techniques.

4 Explain any two table driven routing protocol.

5 Explain BCH, CCCH, DCCH control channels.

6 Write short notes on:

a. wireless routing protocol

b. global state routing

 

BT0087, WML and WAP Programming

1 Write short note on WAP toolkit software.

2 What is WML input field? Explain WML password input field.

3 Explain Naming convention for WML Scripts and Characteristics of the functions in WML scripts.

 

BT0088, Cryptography and Network Security

1 What is the need for security? Explain types of security attacks.

2 List substitution techniques. Explain Ceaser’s cipher.

3 Explain in brief types of encryption systems.

4 Explain authentication header with necessary diagrams.

5 Explain the processing of Encrypted E-Mail

6 Explain characteristics of good security policy.

 

BT903, C# Programming

1 Explain Object Oriented Concepts.

2 Write are constructors? Explain overload and copy constructors.

3 Explain boxing and unboxing with examples.

4 What is exception? Explain exception handling mechanism in C#.

5 Explain console input and output with suitable examples.

6 List the methods to create the sample windows application on .NET using the Microsoft Visual Studio. Write steps to create form on .NET using the Microsoft Visual Studio.

 

BT9001, Data Mining

1 Define data mining. Also explain how data mining works.

2 What is Business Intelligence? Explain the significance of BI in various fields.

3 What is OLAP? Give Comparison between OLAP and OLTP systems.

4 Explain web content mining and Web content mining problems.

5 What is the use of data mining in biomedical engineering? Explain.

6 Discuss the need of data mining in security systems.

 

SEM 6 BCA FALL 2013

BT0092, Software Project Management

1 Explain the four P’s for the effective software project management.

2 Explain any ten CASE tools.

3 List all the project management activities and explain any eight of it.

4 Differentiate between ISO 9001 & SEI-CMM.

5 Differentiate between black box and white box testing techniques.

6 Explain Business Process Reengineering.

 

Computer Graphics, BT9301,

1 What is computer graphics? Explain representative uses of computer graphics.

2 Explain graphics workstation with diagram.

3 Explain the raster scan display system with diagram.

4 Explain boundary fill and flood fill algorithm.

5 Explain in brief Liang-Barsky Line Clipping Algorithm

6 What is shear? Explain X shear and Y shear.

 

BT9402, Artificial Intelligence

1 Define AI. And explain the types of AI tasks.

2 List Advances in Artificial Intelligence in several areas and explain any two of them.

3 State water jug problem and explain it as a state space.

4 Explain in brief the two building parts of expert system.

5 Briefly describe the hardware required for robot.

6 What is purpose of backtracking? Why is it important in artificial intelligence?

 

BSCIT SEM 1 SUMMER 2013

BT0062 – Fundamentals of IT – 4 Credits

1. Explain the Impact of Information Technology on governments and educational organizations

2. Explain application and system software.

3. Briefly explain real time and distributed operating system.

4. Perform the following arithmetic operations in binary: (i)11011 – 11110 (ii)1110 + 1100 (iii)1011 * 110 (iv)1111 / 111 (v) 10010 +1111

5. Explain different basic parts of Power Point Window

6. Write short notes on router and ISP.

 

BT0063 – Mathematics for IT – 4 Credits

1. In a group of 50 people, 35 speak Hindi, 25 speak both English and Hindi and all the people speak at least one of the two languages. How many people speak only English and not Hindi ? How many people speak English?

2. Show that

a) (p Ú q) Ú (~ p) is a tautology.

b) (p Ù q) Ù (~ p) is a contradiction.

3. Prove that the intersection of two subgroups of a group is again a subgroup.

4. A circular wheel is rotating at the rate of 25 revolutions per minute. If the radius of the wheel is 50 cms, find the distance covered by a point on the rim in one second (Take p = 3.1416)

5. Find the Cube roots of the Complex f numbers i+1 and express it in the Argand diagram.

6 Derive the necessary and sufficient condition for the differential equation Mdx + Ndy to be exact

 

BT0064 – Logic Design – 4 Credits

1. Convert the following hexadecimal numbers to base 2.

a) (D73)16

b) (A21)16

2. Convert the following binary numbers to base 16 :

a. (11001011)2

b. (11100011)2

3. Explain ring counter with diagrams.

4. Simplify the following three-variable Boolean functions algebraically:

a. f1 = Σ1, 2, 5, 6

b. f2 = Σ0, 1, 2, 3, 7

5. Minimize the following functions using Quine-McCluskey tabular method:

a. f ( A, B, C, D) = å0,1,3,6,9,10,11,12,14,15

b. f ( A, B, C, D, E) = å0,1,5,8,11,12,14,16,20,21,25,27,28,30,31 (with don’t care terms 2,7,13,22,23)

6. Explain operation and application of digital to analog convertor.

 

BT0065 – C Programming and Data Structures – 3 Credits

1. Define and explain flow chart with an example.

2. Write an algorithm to print all even numbers in descending order and draw the flowchart.

3. Explain while and do-while statement with an example.

4. Distinguish library functions and user defined functions.

5. Explain Breadth-first traversal of a tree also write algorithm for it.

6. Explain binary search and write algorithm for it.

 

BT0066 – Database Management Systems – 3 Credits

1. What are relationships? Explain the relationship types.

2. Explain Second Normal and Third Normal Form

3. Explain query engine and storage manager in MySQL architecture.

4. Explain any five Relational database components.

5. What are the benefits of making the system catalogs relations?

6. Explain any five Alternative Objective Oriented Database Strategies.

 

BSCIT- SEM 4 SUMMER 2013

BT0080 – Fundamentals of Algorithms – 4 Credits

1. Write the different characteristics of an algorithm.

2. Explain in brief the asymptotic notations.

3. Write an algorithm of insertion sort and explain with an example.

4. Write short notes on (i) Path matrix (ii) Circuit Matrix.

5. Explain Greedy method strategy and also write algorithm for it.

6. Find the in-degree and out-degree of the following digraph:

 

BT0081 – Software Engineering – 4 Credits

1. Give the two roles of the software process.

2. Explain software maintenance and it types.

3. Explain RAD model and its phases.

4. Explain spiral model and its phases.

5. Explain inheritance with an example.

6. Explain top down and bottom up integration testing

 

BT0082 – Visual Basic – 4 Credits

1. The components of the .NET Framework also give a diagram for this.

2. Explain Code Editor Window and Solution Explorer.

3. Write a VB program to sort and display an array of integers in ascending and descending order using the array concept in VB. Net.

4. Explain arithmetic and relational operators in VB.net

5. Explain If…Then… Else statement in VB.net with an example.

6. Describe the following methods of the Object class in VB.Net:

a. Equals and ReferenceEquals

b. MemberWiseClone

 

BT0083 – Server Side Programming - Theory – 4 Credits

1. What is HTTP? How does it work?

2. What are the various methods of HttpServletResponse interface?

3. What is Web server? What are the various Web servers?

4. What are attributes? Explain tags with attributes.

5. What are the ways of handling exception? Explain any two in detail.

6. Explain the need for Model View Controller (MVC).

 

BSCIT- SEM 6 SUMMER 2013

BT0092 – Software Project Management – 4 Credits

1. Explain black box and white box testing techniques.

2. Explain different roles of the software development?

3. List out different project development stages in detail?

4. Explain any ten CASE tools.

5. What is CMM? Explain its various levels?

6. Explain software reengineering and technical problems of reengineering.

 

BT9301 – Computer Graphics – 4 Credits

1. Explain boundary fill and flood fill polygon filling algorithm.

2. Draw and explain the block diagram of typical workstation.

3. Explain the raster scan display system.

4. With the help of a block diagram explain the display system with only frame buffer.

5. Explain the steps in DDA line drawing algorithm.

6. Write a short note on orthographic projection and oblique projection.

 

BT9402 – Artificial Intelligence – 4 Credits

1. What do you mean by semantic networks? Explain inheritance in semantic networks.

2. Explain Partitioned semantic networks with an example.

3. What are the advantages and disadvantages of CD?

4. Define expert system and explain applications and architectural principals of expert system.

5. What do you mean by the term “Robotics”? Explain.

6. Explain general learning model with necessary diagrams.